-
公开(公告)号:US20210224142A1
公开(公告)日:2021-07-22
申请号:US17220409
申请日:2021-04-01
发明人: Austin Walters , Fardin Abdi Taghi Abad , Vincent Pham , Jeremy Goodsitt , Anh Truong , Mark Watson , Reza Farivar , Kenneth Taylor
IPC分类号: G06F9/54 , G06N20/00 , G06F17/16 , G06N3/04 , G06F11/36 , G06N3/08 , G06F21/62 , G06N5/04 , G06F17/15 , G06T7/194 , G06T7/254 , G06T7/246 , G06F16/2455 , G06F16/22 , G06F16/28 , G06F16/906 , G06F16/93 , G06F16/903 , G06F16/9038 , G06F16/9032 , G06F16/25 , G06F16/335 , G06F16/242 , G06F16/248 , G06F30/20 , G06F40/166 , G06F40/117 , G06F40/20 , G06F8/71 , G06F17/18 , G06F21/55 , G06F21/60 , G06K9/03 , G06K9/62 , G06K9/66 , G06K9/68 , G06K9/72 , G06N7/00 , G06Q10/04 , G06T11/00 , H04L29/06 , H04L29/08 , H04N21/234 , H04N21/81 , G06N5/00 , G06N5/02
摘要: Systems and methods for censoring text characters in text-based data are provided. In some embodiments, an artificial intelligence system may be configured to receive text-based data and store the text-based data in a database. The artificial intelligence system may be configured to receive a list of target pattern types identifying sensitive data and receive censorship rules for the target pattern types determining target pattern types requiring censorship. The artificial intelligence system may be configured to assemble a computer-based model related to a received target pattern type in the list of target pattern types. The artificial intelligence system may be configured to use a computer-based model to identify a target data pattern corresponding to the received target pattern type within the text-based data, identify target characters within the target data pattern, and to assign an identification token to the target characters.
-
公开(公告)号:US11055397B2
公开(公告)日:2021-07-06
申请号:US16597830
申请日:2019-10-09
发明人: Vincent Pham , Austin Grant Walters , Jeremy Edward Goodsitt , Fardin Abdi Taghi Abad , Anh Truong , Kate Key , Kenneth Taylor
摘要: Exemplary embodiments relate to the secure storage of security questions through an immutable log, such as a blockchain. The security questions may be stored in a centralized location, accessible from an application or browser tab running on the user's device. When a security question is required, such as to perform a password reset on a website, the website may interact with the application or browser tab, which retrieves the question(s) from the blockchain. The user may enter their answers to the question(s), which may be hashed by the application or tab. The hashed answers may be entered into the original requesting website, which may verify with the blockchain that the correct answers have been provided. Thus, the requesting website sees neither the questions nor the answers. Additional security features may include logging requests for questions, so that a user can determine if a security question may have been compromised.
-
公开(公告)号:US20210193136A1
公开(公告)日:2021-06-24
申请号:US16723546
申请日:2019-12-20
IPC分类号: G10L15/22 , G10L13/04 , G10L15/18 , G10L21/013 , G06T13/20 , G06T19/00 , G06T13/40 , H04L29/06
摘要: A virtual environment platform may receive, from a user device, a request to access a virtual reality (VR) environment and may verify, based on the request, a user of the user device to allow the user device access to the VR environment. The virtual environment platform may receive, after verifying the user of the user device, user voice input and user handwritten input from the user device. The virtual environment platform may generate processed user speech by processing the user voice input, wherein a characteristic of the processed user speech and a corresponding characteristic of the user voice input are different and may generate formatted user text by processing the user handwritten input, wherein the formatted user text is machine-encoded text. The virtual environment platform may cause the processed user speech to be audibly presented and the formatted user text to be visually presented in the VR environment.
-
74.
公开(公告)号:US11010490B1
公开(公告)日:2021-05-18
申请号:US16672259
申请日:2019-11-01
发明人: Vincent Pham , Austin Walters , Fardin Abdi Taghi Abad , Kenneth Taylor , Reza Farivar , Anh Truong , Jeremy Goodsitt
摘要: An exemplary system, method, and computer-accessible medium can include, for example, establishing a unique rule-identifier in one-to-one correspondence with at least one set of unknown time-variable rules against which data is to be made compliant, obtaining at least one set of data marked compliant against the one or more set of rules, obtaining meta-data from the compliant data, obtaining at least one set of data marked non-compliant against the set of unknown time-variable rules, extracting meta-data from the non-compliant data, joining the set of compliant and non-compliant metadata to generate a set of estimated rules corresponding to the rule-identifier based at least one of (i) the meta-data of the joined set and (ii) machine learning algorithms.
-
公开(公告)号:US11004182B2
公开(公告)日:2021-05-11
申请号:US16388997
申请日:2019-04-19
发明人: Reza Farivar , Kenneth Taylor
摘要: Systems and methods for processing image data representing a document to remove deformations contained in the document are disclosed. A system may include one or more memory devices storing instructions and one or more processors configured to execute the instructions. The instructions may instruct the system to provide, to a machine learning system, a training dataset representing a plurality of documents containing a plurality of training deformations. The instructions may also instruct the system to use the machine learning system to process image data representing a target document containing a target document deformation. The machine learning system may generate restored image data representing the target document with the target document deformation removed. The instructions may further instruct the system to provide the restored image data to at least one of a graphical user interface, an image storage device, or a computer vision system.
-
公开(公告)号:US10983841B2
公开(公告)日:2021-04-20
申请号:US16181673
申请日:2018-11-06
发明人: Austin Walters , Fardin Abdi Taghi Abad , Vincent Pham , Jeremy Goodsitt , Anh Truong , Mark Watson , Reza Farivar , Kenneth Taylor
IPC分类号: G06F7/04 , G06F9/54 , G06N20/00 , G06F17/16 , G06N3/04 , G06F11/36 , G06N3/08 , G06F21/62 , G06N5/04 , G06F17/15 , G06T7/194 , G06T7/254 , G06T7/246 , G06F16/2455 , G06F16/22 , G06F16/28 , G06F16/906 , G06F16/93 , G06F16/903 , G06F16/9038 , G06F16/9032 , G06F16/25 , G06F16/335 , G06F16/242 , G06F16/248 , G06F30/20 , G06F40/166 , G06F40/117 , G06F40/20 , G06F8/71 , G06F17/18 , G06F21/55 , G06F21/60 , G06K9/03 , G06K9/62 , G06K9/66 , G06K9/68 , G06K9/72 , G06N7/00 , G06Q10/04 , G06T11/00 , H04L29/06 , H04L29/08 , H04N21/234 , H04N21/81 , G06N5/00 , G06N5/02
摘要: Systems and methods for censoring text characters in text-based data are provided. In some embodiments, an artificial intelligence system a be configured to receive text-based data and store the text-based data database. The artificial intelligence system may be configured to receive a list of target pattern types identifying sensitive data and receive censorship rules for the target pattern types determining target pattern types requiring censorship. The artificial intelligence system may be configured to assemble a computer-based model related to a received target pattern type in the list of target pattern types. The artificial intelligence system may be configured to use a computer-based model to identify a target data pattern corresponding to the received target pattern type within the text-based data, identify target characters within the target data pattern, and to assign an identification token to the target characters.
-
公开(公告)号:US10789353B1
公开(公告)日:2020-09-29
申请号:US16545610
申请日:2019-08-20
发明人: Kenneth Taylor , Fardin Abdi Taghi Abad , Jeremy Goodsitt , Austin Walters , Vincent Pham , Anh Truong
摘要: Systems and methods for augmented reality authentication of a user are described, including authenticating a user by presenting the user with augmented reality authentication challenges, evaluating the user's response, and using the response to authenticate the user.
-
公开(公告)号:US10699330B2
公开(公告)日:2020-06-30
申请号:US16202270
申请日:2018-11-28
发明人: Kate Key , Austin Walters , Anh Truong , Vincent Pham , Jeremy Goodsitt , Kenneth Taylor , Fardin Abdi Taghi Abad
摘要: A device and a backend server are described. The device can determine whether it has entered an indoor location, and once in the indoor location, the device can communicate with the server the name of the location. The device can determine the current location of the user in the indoor location, and based on the floorplan and the indoor location of an item, the device can direct the user to the item. The floorplan can be constructed based on data accumulated from various visitors of the indoor location.
-
公开(公告)号:US10552736B1
公开(公告)日:2020-02-04
申请号:US16293836
申请日:2019-03-06
发明人: Fardin Abdi Taghi Abad , Reza Farivar , Vincent Pham , Kenneth Taylor , Mark Watson , Jeremy Goodsitt , Austin Walters , Anh Truong
摘要: A method for generating a dual-class dataset is disclosed. A single-class dataset and a context dataset are obtained. The context dataset can be labeled. A model can be trained using the combination of the single-class dataset and the labeled context dataset. The model can be run on the context dataset. The data points that are classified the same as the data points included in the single-class dataset, can be removed from the labeled context dataset and added to the single-class dataset. These steps can be repeated until no data points are classified by the model.
-
公开(公告)号:US20200005616A1
公开(公告)日:2020-01-02
申请号:US16235172
申请日:2018-12-28
发明人: Vincent Pham , Kenneth Taylor , Fardin Abdi Taghi Abad , Anh Truong , Jeremy Goodsitt , Austin Walters
摘要: A transaction terminal silent alarm system having processor(s) and memory storing instructions that, when executed by the processor(s), cause the system to perform a method is disclosed. Upon receiving, from a user device, an authentication request to complete a transaction at a transaction terminal, the system may determine whether a fingerprint scan matches a stored fingerprint. Responsive to the fingerprint scan matching a stored normal fingerprint and absent receiving another fingerprint that matches a stored cancellation fingerprint, the system may direct the transaction terminal to complete the transaction. Responsive to the fingerprint scan matching a stored under-duress fingerprint, the system may direct the transaction terminal to send a silent alert to law enforcement and direct the transaction terminal to delay the transaction. Responsive to the fingerprint scan not matching any stored fingerprints, the system may direct the user device to display a fingerprint rescan message.
-
-
-
-
-
-
-
-
-