-
公开(公告)号:US11030417B2
公开(公告)日:2021-06-08
申请号:US16814105
申请日:2020-03-10
发明人: Austin Walters , Jeremy Edward Goodsitt , Fardin Abdi Taghi Abad , Reza Farivar , Vincent Pham , Mark Watson , Kenneth Taylor , Anh Truong
摘要: A system is configured to perform one or more steps of a method. The system may receive a plurality of attorney communications, identify one or more legal clause interpretations in them, receive a first legal clause and provide it to a trained NN and a probability model. The system may also generate a corresponding first plain English interpretation based on the first legal clause, provide the first plain English interpretation to the probability model, which generates a probability score based on a degree to which the legal clause matches the plain English interpretation in meaning, and determine whether the probability score exceeds a predetermined threshold. Further, the system may instruct the NN to generate a second plain English interpretation based on the first legal clause when the probability score does not exceed the predetermined threshold, and output the first plain English interpretation when the probability score exceeds the predetermined threshold.
-
公开(公告)号:US10656923B1
公开(公告)日:2020-05-19
申请号:US16527068
申请日:2019-07-31
发明人: Reza Farivar , Austin Walters , Anh Truong , Vincent Pham , Fardin Abdi Taghi Abad , Mark Watson , Jeremy Edward Goodsitt , Kenneth Taylor
摘要: A system for determining regulatory compliance of smart contracts is disclosed. The system may receive positive smart contracts that comply with regulations, convert positive section(s) of the positive smart contracts into a first set of intermediate representation of code, and train a neural network to classify smart contract sections. The system may then receive a first smart contract including first sections, convert the first sections into a second set of intermediate representation of code, classify the second set of intermediate representation of code as a first classification corresponding to the first set of intermediate representation of code or as a second classification not corresponding to the first set of intermediate representation of code, and generate for display a negative or positive indication based on the classification.
-
公开(公告)号:US10482236B1
公开(公告)日:2019-11-19
申请号:US16294297
申请日:2019-03-06
发明人: Vincent Pham , Austin Grant Walters , Jeremy Edward Goodsitt , Fardin Abdi Taghi Abad , Anh Truong , Kate Key , Kenneth Taylor
摘要: Exemplary embodiments relate to the secure storage of security questions through an immutable log, such as a blockchain. The security questions may be stored in a centralized location, accessible from an application or browser tab running on the user's device. When a security question is required, such as to perform a password reset on a website, the website may interact with the application or browser tab, which retrieves the question(s) from the blockchain. The user may enter their answers to the question(s), which may be hashed by the application or tab. The hashed answers may be entered into the original requesting website, which may verify with the blockchain that the correct answers have been provided. Thus, the requesting website sees neither the questions nor the answers. Additional security features may include logging requests for questions, so that a user can determine if a security question may have been compromised.
-
公开(公告)号:US10460235B1
公开(公告)日:2019-10-29
申请号:US16151385
申请日:2018-10-04
发明人: Anh Truong , Fardin Abdi Taghi Abad , Jeremy Goodsitt , Austin Walters , Mark Watson , Vincent Pham , Kate Key , Reza Farivar , Kenneth Taylor
摘要: Methods for generating data models using a generative adversarial network can begin by receiving a data model generation request by a model optimizer from an interface. The model optimizer can provision computing resources with a data model. As a further step, a synthetic dataset for training the data model can be generated using a generative network of a generative adversarial network, the generative network trained to generate output data differing at least a predetermined amount from a reference dataset according to a similarity metric. The computing resources can train the data model using the synthetic dataset. The model optimizer can evaluate performance criteria of the data model and, based on the evaluation of the performance criteria of the data model, store the data model and metadata of the data model in a model storage. The data model can then be used to process production data.
-
公开(公告)号:US10452902B1
公开(公告)日:2019-10-22
申请号:US16395139
申请日:2019-04-25
发明人: Jeremy Edward Goodsitt , Austin Walters , Anh Truong , Vincent Pham , Fardin Abdi Taghi Abad , Mark Watson , Reza Farivar , Kenneth Taylor
摘要: A system configured to receive a draft patent specification, provide the draft patent specification to a first neural network (NN), classify, using the first NN, paragraphs of the draft patent specification, provide the one or more paragraphs to a second NN, generate, via the second NN, one or more logical components based on the one or more paragraphs, provide the one or more logical components to a generative adversarial network (GAN), generate, via the GAN, a plurality of image components based on the one or more logical components, provide the plurality of image components to a computing device for modification.
-
公开(公告)号:US10430692B1
公开(公告)日:2019-10-01
申请号:US16250719
申请日:2019-01-17
摘要: In some implementations, a training platform may receive data for generating synthetic models of a body part, such as a hand. The data may include information relating to a plurality of potential poses of the hand. The training platform may generate a set of synthetic models of the hand based on the information, where each synthetic model, in the set of synthetic models, representing a respective pose of the plurality of potential poses. The training platform may derive an additional set of synthetic models based on the set of synthetic models by performing one or more processing operations with respect to at least one synthetic model in the set of synthetic models, and causing the set of synthetic models and the additional set of synthetic models to be provided to a deep learning network to train the deep learning network to perform image segmentation, object recognition, or motion recognition.
-
公开(公告)号:US10382799B1
公开(公告)日:2019-08-13
申请号:US16173374
申请日:2018-10-29
发明人: Austin Walters , Vincent Pham , Kate Key , Kenneth Taylor , Anh Truong , Fardin Abdi Taghi Abad , Jeremy Goodsitt
IPC分类号: H04N21/234 , G06T7/254 , G06N3/08 , H04N21/81 , G06T7/246
摘要: Systems and methods for generating synthetic video are disclosed. For example, a system may include a memory unit and a processor configured to execute the instructions to perform operations. The operations may include receiving video data, normalizing image frames, generating difference images, and generating an image sequence generator model. The operations may include training an autoencoder model using difference images, the autoencoder comprising an encoder model and a decoder model. The operations may include identifying a seed image frame and generating a seed difference image from the seed image frame. The operations may include generating, by the image sequence generator model, synthetic difference images based on the seed difference image. In some aspects, the operations may include using the decoder model to synthetic normalized image frames from the synthetic difference images. The operations may include generating synthetic video by adding background to the synthetic normalized image frames.
-
公开(公告)号:US10268817B1
公开(公告)日:2019-04-23
申请号:US16153164
申请日:2018-10-05
发明人: Vincent Pham , Austin Grant Walters , Jeremy Edward Goodsitt , Fardin Abdi Taghi Abad , Anh Truong , Kate Key , Kenneth Taylor
摘要: Exemplary embodiments relate to the secure storage of security questions through an immutable log, such as a blockchain. The security questions may be stored in a centralized location, accessible from an application or browser tab running on the user's device. When a security question is required, such as to perform a password reset on a website, the website may interact with the application or browser tab, which retrieves the question(s) from the blockchain. The user may enter their answers to the question(s), which may be hashed by the application or tab. The hashed answers may be entered into the original requesting website, which may verify with the blockchain that the correct answers have been provided. Thus, the requesting website sees neither the questions nor the answers. Additional security features may include logging requests for questions, so that a user can determine if a security question may have been compromised.
-
39.
公开(公告)号:US12045265B2
公开(公告)日:2024-07-23
申请号:US18127821
申请日:2023-03-29
发明人: Vincent Pham , Austin Walters , Fardin Abdi Taghi Abad , Kenneth Taylor , Reza Farivar , Anh Troung , Jeremy Goodsitt
CPC分类号: G06F16/285 , G06F16/122 , G06F18/24765 , G06F21/6245 , G06N5/025
摘要: An exemplary system, method, and computer-accessible medium can include, for example, establishing a unique rule-identifier in one-to-one correspondence with at least one set of unknown time-variable rules against which data is to be made compliant, obtaining at least one set of data marked compliant against the one or more set of rules, obtaining meta-data from the compliant data, obtaining at least one set of data marked non-compliant against the set of unknown time-variable rules, extracting meta-data from the non-compliant data, joining the set of compliant and non-compliant metadata to generate a set of estimated rules corresponding to the rule-identifier based at least one of (i) the meta-data of the joined set and (ii) machine learning algorithms.
-
公开(公告)号:US20240104148A1
公开(公告)日:2024-03-28
申请号:US18535066
申请日:2023-12-11
发明人: Austin Walters , Jeremy Goodsitt , Vincent Pham , Mark Watson , Fardin Abdi Taghi Abad , Reza Farivar , Anh Truong , Kenneth Taylor
IPC分类号: G06F16/951 , G06F11/34 , G06N3/08 , G06N20/00
CPC分类号: G06F16/951 , G06F11/3438 , G06N3/08 , G06N20/00
摘要: A computer-implemented method includes tracking, by a computing device, user browsing activity of a first page having known elements; mapping, by the computing device, the user browsing activity to the known elements; storing, by the computing device, mapping information that maps the user browsing activity to the known elements; tracking, by the computing device, user browsing activity of a second page having unknown elements; identifying, by the computing device, the unknown elements based on the mapping information and the user browsing activity of the second page; and executing, by the computing device, one or more computer-based instructions based on the determining the unknown elements that were identified.
-
-
-
-
-
-
-
-
-