-
公开(公告)号:US11356460B2
公开(公告)日:2022-06-07
申请号:US16731703
申请日:2019-12-31
申请人: EQUIFAX INC.
发明人: Rajkumar Bondugula , Piyush Patel , Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage
摘要: In some aspects, a computing system can control access of a user computing device to a resource. The computing system can obtain an access request submitted by a user computing device. The computing system can verify permission information in the access request to determine that the access request is valid. If the access request is valid, the computing system submits an authentication request to request an authentication system to authenticate the user and obtains authentication results generated by the authentication system. The computing system further provides, based on the authentication results, an access control decision for the access request.
-
公开(公告)号:US11893493B2
公开(公告)日:2024-02-06
申请号:US17933608
申请日:2022-09-20
申请人: EQUIFAX INC.
发明人: Rajkumar Bondugula , Piyush Patel
IPC分类号: G06N3/082 , G06N20/00 , G06N3/084 , G06F18/23213 , G06F18/211 , G06F18/2134 , G06Q40/03 , G06N3/04
CPC分类号: G06N3/082 , G06F18/211 , G06F18/2134 , G06F18/23213 , G06N3/04 , G06N3/084 , G06N20/00 , G06Q40/03
摘要: In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. A dataset used for training a neural network model configured can be clustered into a first set of clusters and a second set of clusters. The neural network model can be constructed with a number of nodes in a hidden layer that is based on the number of clusters in the first set of clusters. The neural network can be trained based on training samples selected from the second set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.
-
公开(公告)号:US11374940B2
公开(公告)日:2022-06-28
申请号:US16652309
申请日:2019-09-24
申请人: EQUIFAX INC.
摘要: According to certain implementations, a permissions gateway receives an access request indicating multiple sets of secured data that include high-granularity data stored on multiple secured data repositories. The access request is compared to a permission set with multiple consent parameters, which indicate access types for the secured data. Based on a comparison of the access request to a permission set, the permissions gateway queries, the permission gateway queries a first data repository for a high-granularity dataset that includes a portion of the high-granularity data, and queries a second data repository for a low-granularity dataset that includes a summary of part of the high-granularity data. The permissions gateway generates a multi-granularity response to the access request, based on a combination of the high-granularity dataset and the low-granularity dataset.
-
公开(公告)号:US12061671B2
公开(公告)日:2024-08-13
申请号:US17450169
申请日:2021-10-07
申请人: EQUIFAX INC.
发明人: Bo Guo , Rajkumar Bondugula
IPC分类号: G06N20/00 , G06F18/214
CPC分类号: G06F18/2148 , G06N20/00
摘要: In some aspects, techniques for creating representative and informative training datasets for the training of machine-learning models are provided. For example, a risk assessment system can receive a risk assessment query for a target entity. The risk assessment system can compute an output risk indicator for the target entity by applying a machine learning model to values of informative attributes associated with the target entity. The machine learning model may be trained using training samples selected from a representative and informative (RAI) dataset. The RAI dataset can be created by determining the informative attributes based on attributes used by a set of models and further extracting representative data records from an initial training dataset based on the determined informative attributes. The risk assessment system can transmit a responsive message including the output risk indicator for use in controlling access of the target entity to an interactive computing environment.
-
公开(公告)号:US11876807B2
公开(公告)日:2024-01-16
申请号:US17659294
申请日:2022-04-14
申请人: EQUIFAX INC.
发明人: Rajkumar Bondugula , Piyush Patel , Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage
IPC分类号: H04L9/40
CPC分类号: H04L63/108 , H04L63/08 , H04L63/0876 , H04L63/102
摘要: In some aspects, a computing system can control access of a user computing device to a resource. The computing system can obtain an access request submitted by a user computing device. The computing system can verify permission information in the access request to determine that the access request is valid. If the access request is valid, the computing system submits an authentication request to request an authentication system to authenticate the user and obtains authentication results generated by the authentication system. The computing system further provides, based on the authentication results, an access control decision for the access request.
-
公开(公告)号:US11475235B2
公开(公告)日:2022-10-18
申请号:US16875658
申请日:2020-05-15
申请人: EQUIFAX INC.
发明人: Rajkumar Bondugula , Piyush Patel
摘要: In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. A dataset used for training a neural network model configured can be clustered into a first set of clusters and a second set of clusters. The neural network model can be constructed with a number of nodes in a hidden layer that is based on the number of clusters in the first set of clusters. The neural network can be trained based on training samples selected from the second set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.
-
公开(公告)号:US10671812B2
公开(公告)日:2020-06-02
申请号:US16333359
申请日:2018-03-22
申请人: EQUIFAX INC.
发明人: Rajkumar Bondugula , Allan Joshua , Hongchao Li , Hannah Wang
IPC分类号: G06F40/295 , G06N5/04 , G06N20/00 , G06F16/35
摘要: Certain aspects produce a scoring model that can automatically classify future text samples. In some examples, a processing device perform operations for producing a scoring model using active learning. The operations includes receiving existing text samples and searching a stored, pre-trained corpus defining embedding vectors for selected words, phrases, or documents to produce nearest neighbor vectors for each embedding vector. Nearest neighbor selections are identified based on distance between each nearest neighbor vector and the embedding vector for each selection to produce a text cloud. Text samples are selected from the text cloud to produce seed data that is used to train a text classifier. A scoring model can be produced based on the text classifier. The scoring model can receive a plurality of new text samples and provide a score indicative of a likelihood of being a member of a selected class.
-
公开(公告)号:US11995470B2
公开(公告)日:2024-05-28
申请号:US17634825
申请日:2020-09-03
申请人: EQUIFAX INC.
发明人: Ligaj Pradhan , Piyush Patel , Rajkumar Bondugula
CPC分类号: G06F9/5011 , G06F9/466 , G06F9/5038
摘要: Systems and methods for secure resource management are provided. A secure resource management system receives from a client computing system associated with a resource provider a query for classifying a resource user associated with the resource provider. The secure resource management system determining a set of resource abuser criteria for classifying the resource user as a resource abuser. The secure resource management system determines that the resource user is a resource abuser or a potential resource abuser based on the set of resource abuser criteria and a resource transaction history associated with the resource user. Based on determining that the resource user is a resource abuser or a potential resource abuser, the secure resource management system generates and transmits a response to the query to the client computing system. The response can be used to restrict or deny access to the resource by the resource user.
-
公开(公告)号:US11489843B2
公开(公告)日:2022-11-01
申请号:US16414504
申请日:2019-05-16
申请人: EQUIFAX INC.
摘要: According to certain implementations, an access control system controls access to secured data that is stored on a secured source. A requestor system may request information representing the secured data. The access control system receives the secured data from the secured source, and selects a portion of the secured data based on a lens including a filter criteria or a modification instruction. Adjusted data may be generated based on a modification of the selected portion of data, where the modification is based on the lens. The access control system provides the adjusted data to the requestor system via an access interface. In some cases, upon completion of a time period, the access control system prevents the requestor system from accessing the adjusted data, by disabling the access interface used to access the adjusted data. The adjusted data may be deleted from the access control system.
-
公开(公告)号:US11425144B2
公开(公告)日:2022-08-23
申请号:US16652309
申请日:2019-09-24
申请人: EQUIFAX INC.
摘要: According to certain implementations, a permissions gateway receives an access request indicating multiple sets of secured data that include high-granularity data stored on multiple secured data repositories. The access request is compared to a permission set with multiple consent parameters, which indicate access types for the secured data. Based on a comparison of the access request to a permission set, the permissions gateway queries, the permission gateway queries a first data repository for a high-granularity dataset that includes a portion of the high-granularity data, and queries a second data repository for a low-granularity dataset that includes a summary of part of the high-granularity data. The permissions gateway generates a multi-granularity response to the access request, based on a combination of the high-granularity dataset and the low-granularity dataset.
-
-
-
-
-
-
-
-
-