Abstract:
A method for using a distributed ledger (DL) of a blockchain applicable to a network of blockchain nodes is provided. The method reduces a time period between an assertion placed on the blockchain by an assertor blockchain node and execution of one or more action items dependent on a consensus of the assertion, by: creating an Artificial Intelligence (AI) model, by one of the blockchain nodes of the network, using historical data stored by the DL, wherein the network of blockchain nodes further comprises the assertor blockchain node; calculating an index value indicating a probability that the consensus is true, based on the AI model and the historical data stored by the DL, by the one of the blockchain nodes, wherein each of the blockchain nodes comprises a computer system including at least a processor, a system memory element, and a communication device configured to send and receive data transmissions between the blockchain nodes of the network; and when the index value exceeds a predefined threshold, initiating the execution of the one or more action items dependent on the consensus, by the one of the blockchain nodes.
Abstract:
Digital data systems and methods support data retrieval with bias reduction. In some embodiments, these minimize the effect of bias in artificial intelligence-based business intelligence engines by preventing reporting of models that are based on “bias-sensitive” predictor variables such as race, sex and political affiliation, and so forth. In other embodiments, e.g., where the AI engine returns measures (or degrees) of correlation, such censure can be with respect to models where those measures are above a designated quantitative or qualitative high water mark values. Alternatively, or in addition, the systems and methods hereof can minimize the effect of data bias by reducing such a measure of correlation so that the corresponding model appears inferior to ones that are not based on bias-sensitive predictor variables.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location of a user. These mechanisms and methods for managing access to systems, products, or data based on information associated with a physical location of a user can enable improved data management efficiency, enhanced data management accuracy, decreased data management costs, decreased licensing costs, increased security, additional marketing opportunities, etc.
Abstract:
Methods, systems, and devices for supporting security for private data inputs to artificial intelligence models are described. A device (e.g., an application server) may receive a request to run an artificial intelligence model. The device may run the artificial intelligence model on a public data set and an extended set of data that includes both the public data set and a private data set. The device may determine a first set of outcomes based on running the artificial intelligence model on the public data set and a second set of outcomes based on rerunning the model on the extended set of data. The device may then compare the two sets of outcomes to determine whether a private data value is identifiable based on the second set of outcomes. If a private data value is identifiable, the device may obfuscate the results prior to transmitting the results to the requestor.
Abstract:
Methods, systems, and devices for supporting security for private data inputs to artificial intelligence models are described. A device (e.g., an application server) may receive a request to run an artificial intelligence model. The device may run the artificial intelligence model on a public data set and an extended set of data that includes both the public data set and a private data set. The device may determine a first set of outcomes based on running the artificial intelligence model on the public data set and a second set of outcomes based on rerunning the model on the extended set of data. The device may then compare the two sets of outcomes to determine whether a private data value is identifiable based on the second set of outcomes. If a private data value is identifiable, the device may obfuscate the results prior to transmitting the results to the requestor.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location of a user. These mechanisms and methods for managing access to systems, products, or data based on information associated with a physical location of a user can enable improved data management efficiency, enhanced data management accuracy, decreased data management costs, decreased licensing costs, increased security, additional marketing opportunities, etc.
Abstract:
Disclosed embodiments are related to blockchain asset token management systems, and in particular, to Multiple Decentralized Tokenization with Personal Control (MDTPC). MDTPC allows users to determine how and when asset token evaluation is performed, and also allows users to determine which token management services they wish to use to manage and store their asset token and related data. In embodiments, multiple blockchain token management services are utilized in conjunction with individual digital wallets to share token data and validate ownership of tokens. A registry service is used to ensure visibility of tokens across multiple token management services, which increases the likelihood of identifying the rightful owner of asset tokens. Other embodiments may be described and/or claimed.
Abstract:
Systems, methods, and apparatuses for implementing a behavioral responsive adaptive context engine for emotionally-responsive experiences are disclosed. According to an exemplary embodiment, there is a system having at least a processor and a memory therein, wherein the system includes a non-transitory machine-readable storage medium that provides instructions that, when executed by the set of one or more processors, the instructions are configurable to cause the system to perform operations including: receiving a pipeline of omni-channel party data having two or more channels of data from different sources; training an artificial intelligence (AI) model using the received pipeline of omni-channel party data; associating the omni-channel party data with a selected user interaction at a graphical user interface (GUI) displayed to a user device; executing the AI model to predict a current emotional state to describe the selected user interaction at the GUI; executing the AI model to output modifications to the GUI configured to bring about a target outcome at the user interface, based on the current emotional state as predicted by the AI model; generating a modified GUI based on the output modifications from the AI model; and transmitting the modified GUI to display at the user device. Other related embodiments are disclosed.
Abstract:
Methods, systems, and devices for supporting security for private data inputs to artificial intelligence models are described. A device (e.g., an application server) may receive a request to run an artificial intelligence model. The device may run the artificial intelligence model on a public data set and an extended set of data that includes both the public data set and a private data set. The device may determine a first set of outcomes based on running the artificial intelligence model on the public data set and a second set of outcomes based on rerunning the model on the extended set of data. The device may then compare the two sets of outcomes to determine whether a private data value is identifiable based on the second set of outcomes. If a private data value is identifiable, the device may obfuscate the results prior to transmitting the results to the requestor.
Abstract:
A method and a cloud-computing architecture for enabling dynamic access of an artificial intelligence engine are described. A record that includes a set of one or more fields is stored in a database. A first field from the set of fields includes an identification of an artificial intelligence (AI) engine and one or more additional fields from the set of fields respectively include one or more parameters for the AI engine. The record is accesses causing the AI engine to run with the one or more parameters. As a result of the AI engine running with the one or more parameters upon access of the record, a desired predicted output is obtained.