Systems for determining regulatory compliance of smart contracts

    公开(公告)号:US10656923B1

    公开(公告)日:2020-05-19

    申请号:US16527068

    申请日:2019-07-31

    摘要: A system for determining regulatory compliance of smart contracts is disclosed. The system may receive positive smart contracts that comply with regulations, convert positive section(s) of the positive smart contracts into a first set of intermediate representation of code, and train a neural network to classify smart contract sections. The system may then receive a first smart contract including first sections, convert the first sections into a second set of intermediate representation of code, classify the second set of intermediate representation of code as a first classification corresponding to the first set of intermediate representation of code or as a second classification not corresponding to the first set of intermediate representation of code, and generate for display a negative or positive indication based on the classification.

    Methods, mediums, and systems for establishing and using security questions

    公开(公告)号:US10482236B1

    公开(公告)日:2019-11-19

    申请号:US16294297

    申请日:2019-03-06

    IPC分类号: G06F21/45 G06F21/60

    摘要: Exemplary embodiments relate to the secure storage of security questions through an immutable log, such as a blockchain. The security questions may be stored in a centralized location, accessible from an application or browser tab running on the user's device. When a security question is required, such as to perform a password reset on a website, the website may interact with the application or browser tab, which retrieves the question(s) from the blockchain. The user may enter their answers to the question(s), which may be hashed by the application or tab. The hashed answers may be entered into the original requesting website, which may verify with the blockchain that the correct answers have been provided. Thus, the requesting website sees neither the questions nor the answers. Additional security features may include logging requests for questions, so that a user can determine if a security question may have been compromised.

    Data model generation using generative adversarial networks

    公开(公告)号:US10460235B1

    公开(公告)日:2019-10-29

    申请号:US16151385

    申请日:2018-10-04

    摘要: Methods for generating data models using a generative adversarial network can begin by receiving a data model generation request by a model optimizer from an interface. The model optimizer can provision computing resources with a data model. As a further step, a synthetic dataset for training the data model can be generated using a generative network of a generative adversarial network, the generative network trained to generate output data differing at least a predetermined amount from a reference dataset according to a similarity metric. The computing resources can train the data model using the synthetic dataset. The model optimizer can evaluate performance criteria of the data model and, based on the evaluation of the performance criteria of the data model, store the data model and metadata of the data model in a model storage. The data model can then be used to process production data.

    Generating synthetic models or virtual objects for training a deep learning network

    公开(公告)号:US10430692B1

    公开(公告)日:2019-10-01

    申请号:US16250719

    申请日:2019-01-17

    IPC分类号: G06K9/62 G06N3/08

    摘要: In some implementations, a training platform may receive data for generating synthetic models of a body part, such as a hand. The data may include information relating to a plurality of potential poses of the hand. The training platform may generate a set of synthetic models of the hand based on the information, where each synthetic model, in the set of synthetic models, representing a respective pose of the plurality of potential poses. The training platform may derive an additional set of synthetic models based on the set of synthetic models by performing one or more processing operations with respect to at least one synthetic model in the set of synthetic models, and causing the set of synthetic models and the additional set of synthetic models to be provided to a deep learning network to train the deep learning network to perform image segmentation, object recognition, or motion recognition.

    Real-time synthetically generated video from still frames

    公开(公告)号:US10382799B1

    公开(公告)日:2019-08-13

    申请号:US16173374

    申请日:2018-10-29

    摘要: Systems and methods for generating synthetic video are disclosed. For example, a system may include a memory unit and a processor configured to execute the instructions to perform operations. The operations may include receiving video data, normalizing image frames, generating difference images, and generating an image sequence generator model. The operations may include training an autoencoder model using difference images, the autoencoder comprising an encoder model and a decoder model. The operations may include identifying a seed image frame and generating a seed difference image from the seed image frame. The operations may include generating, by the image sequence generator model, synthetic difference images based on the seed difference image. In some aspects, the operations may include using the decoder model to synthetic normalized image frames from the synthetic difference images. The operations may include generating synthetic video by adding background to the synthetic normalized image frames.

    Methods, mediums, and systems for establishing and using security questions

    公开(公告)号:US10268817B1

    公开(公告)日:2019-04-23

    申请号:US16153164

    申请日:2018-10-05

    IPC分类号: G06F21/45 G06F21/60

    摘要: Exemplary embodiments relate to the secure storage of security questions through an immutable log, such as a blockchain. The security questions may be stored in a centralized location, accessible from an application or browser tab running on the user's device. When a security question is required, such as to perform a password reset on a website, the website may interact with the application or browser tab, which retrieves the question(s) from the blockchain. The user may enter their answers to the question(s), which may be hashed by the application or tab. The hashed answers may be entered into the original requesting website, which may verify with the blockchain that the correct answers have been provided. Thus, the requesting website sees neither the questions nor the answers. Additional security features may include logging requests for questions, so that a user can determine if a security question may have been compromised.