Patent classifications
G06Q50/26
PREDICTION METHOD
A prediction device 100 of the present invention includes a detection means 121 for, on the basis of a river image that is an image obtained by capturing a river and associated with capturing position information representing a position where the river is captured, detecting river condition information representing a condition of the river at the position where the river image is captured; and a prediction means 122 for, on the basis of the capturing position information, the river condition information, and topography information representing the topography of the river, predicting a river condition representing a condition of the river at a given point of the river. The given point is different from the position represented by the capturing position information.
SYSTEMS AND METHODS FOR PERFORMING SECURE DIGITAL FORENSICS INVESTIGATIONS USING A HYBRID OF ON-PREMISES AND CLOUD-BASED RESOURCES
Computer systems and methods for managing sensitive data items when performing a computer-implemented digital forensic workflow using on-premises (“on-prem”) and cloud resources are provided. The system includes a control computing node configured to: store the digital forensic workflow in a memory; and allocate forensic data processing tasks corresponding to portions of the digital forensic workflow to processing node computing devices (“processing nodes”) for execution by the processing nodes, the processing nodes communicatively connected to the control computing node via at least one data communication network and including at least one cloud processing node and at least one on-premises (“on-prem”) processing node. The control computing node automatically restricts allocation of a given forensic data processing task to the at least one on-prem processing node when forensic data to be operated on in performance of the given processing task is tagged as sensitive.
CONTINUOUS AND ANONYMOUS RISK EVALUATION
Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information. The system generates a second identifier and a third identifier for each target entity and stores a mapping of the second identifiers to the first identifiers and the third identifiers, preventing the second identifiers from being provided to the requesting entity. The system monitors a periodically updated data set and determines risk metrics for the target entities, comparing each risk metric to a threshold value to identify target entities whose risk data indicates an insider threat. The system generates a third identifier for the identified target entities and provides the third identifiers to the requesting entity. Responsive to a request for a corresponding first identifier, the system identifies and provides the first and third identifiers to the requesting entity.
SYSTEM AND METHOD FOR DETECTING FRAUD RINGS
A system and method may identify a fraud ring based on call or interaction data by analyzing by a computer processor interaction data including audio recordings to identify clusters of interactions which are suspected of involving fraud each cluster including the same speaker; analyzing by the computer processor the clusters, in combination with metadata associated with the interaction data, to identify fraud rings, each fraud ring describing a plurality of different speakers, each fraud ring defined by a set of speakers and a set of metadata corresponding to interactions including that speaker; and for each fraud ring, creating a relevance value defining the relative relevance of the fraud ring.
Risk assessment using social networking data
Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and other organizations from identity theft and fraud. Risks associated with various entities can be analyzed and assessed based on analysis of social network data, professional network data, or other networking connections, among other data sources. In various embodiments, the risk assessment may include calculating an authenticity score based on the collected network data.
Dark web monitoring, analysis and alert system and method
A dark web monitoring, analysis and alert system comprising a data receiving module configured to receive data collected from the dark web and structured; a Structured Data Database (SDD) connected with the data receiving module, the SDD configured to store the structured data; a Text Search and Analytic Engine (TSAE) connected with the SDD, the TSAE configured to enable advanced search and basic analysis in the structured data; a Knowledge Deduction Service (KDS) connected with the TSAE, the KDS configured to deeply analyze the collected data; the deep analysis comprises extracting insights regarding dark web surfers behavioral patterns and interactions; a Structured Knowledge Database (SKD) connected with the KDS, the SKD configured to store the deep analysis results; and an Alert Service connected with the TSAE and the SKD, the Alert Service configured to provide prioritized alerts based on the deep analysis.
Dark web monitoring, analysis and alert system and method
A dark web monitoring, analysis and alert system comprising a data receiving module configured to receive data collected from the dark web and structured; a Structured Data Database (SDD) connected with the data receiving module, the SDD configured to store the structured data; a Text Search and Analytic Engine (TSAE) connected with the SDD, the TSAE configured to enable advanced search and basic analysis in the structured data; a Knowledge Deduction Service (KDS) connected with the TSAE, the KDS configured to deeply analyze the collected data; the deep analysis comprises extracting insights regarding dark web surfers behavioral patterns and interactions; a Structured Knowledge Database (SKD) connected with the KDS, the SKD configured to store the deep analysis results; and an Alert Service connected with the TSAE and the SKD, the Alert Service configured to provide prioritized alerts based on the deep analysis.
System and method for safety management
The present disclosure relates to a safety management system. The safety management system calculates a real-time data risk score and an incident data risk score based on real-time data received from a wearable device and incident data selected from big data, calculates a total risk score by summing all values obtained by multiplying calculated risk for respective data by weights for respective data, compares the total risk store with a preset threshold score, and transmits a dangerous situation message to a risk recognition subject when it is determined that a user is at risk. The safety management system of the present disclosure may transmit the real-time data, the incident data, and the dangerous situation message using a 5G communication system, and a safety management server for determining whether or not the user is at risk may be implemented using an artificial neural network.
Prepayment validation by originator and beneficiary
A method performed by a global transaction validation system includes receiving a transaction request from an originator, processing the transaction request by generating a data message containing the transaction data and by generating a notification message including at least part of the transaction data, transmitting the data message to the recipient financial institution, transmitting the notification message to a recipient device associated with the transaction recipient, receiving a return notification from the recipient device, and validating the transaction request based on the return notification indicating that the transaction is valid.
Efficient and fine-grained video retrieval
A computer-implemented method executed by at least one processor for performing mini-batching in deep learning by improving cache utilization is presented. The method includes temporally localizing a candidate clip in a video stream based on a natural language query, encoding a state, via a state processing module, into a joint visual and linguistic representation, feeding the joint visual and linguistic representation into a policy learning module, wherein the policy learning module employs a deep learning network to selectively extract features for select frames for video-text analysis and includes a fully connected linear layer and a long short-term memory (LSTM), outputting a value function from the LSTM, generating an action policy based on the encoded state, wherein the action policy is a probabilistic distribution over a plurality of possible actions given the encoded state, and rewarding policy actions that return clips matching the natural language query.