G06F16/2379

Method and system for automatically detecting errors in at least one data entry using image maps
11580092 · 2023-02-14 · ·

A method for automatically detecting errors in at least one data entry in a database, the at least one data entry including an input string of characters that do not match at least one predefined string of characters. The method includes generating a first image map; generating at least one classification parameter by comparing the first image map to a second image map, the second image map based at least partially on the predefined string of characters; determining that the input string of characters correlates to the predefined string of characters; and modifying the at least one data entry to match the predefined string of characters in response to determining that the input string of characters correlates to the predefined string of characters. Various other methods and systems for automatically detecting errors in at least one data entry in a database are also disclosed.

Data query method and apparatus

This disclosure provides a data query method and apparatus. The method includes: dividing an object storage system into a plurality of storage spaces based on time slices, establishing a mapping relationship between the storage spaces, the time slices, and operation records, recording time slice information corresponding to a snapshot after generating the snapshot, and implementing services such as a read-only service, a snapshot rollback service, and an object change service based on the snapshot, so as to improve query performance without adding extra storage overheads.

Secure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
11582034 · 2023-02-14 · ·

Secure management of keys and identities of an object manufactured by a manufacturer having a manufacturer key pair, and a client having a client key pair, the management being carried out using a decentralized blockchain database. The method includes generation of a manufacturing key pair; and publication and recording, in the blockchain, of the decentralized object identifier used to obtain the public key of the object. When a client purchases the object from the manufacturer, the method includes providing, by the object manufacturer, the object identifier, and the public manufacturing key to the client; and updating the blockchain. When the object is switched on for the first time, the object enrolls itself by generation of a utilization key pair; auto-enrollment using the manufacturing key pair; and replacement, in the blockchain, of the public manufacturing key associated with the object identifier with the public utilization key associated with the object identifier.

Real-time anomaly determination using integrated probabilistic system
11580094 · 2023-02-14 · ·

An audio stream is detected during a communication session with a user. Natural language processing on the audio stream is performed to update a set of attributes by supplementing the set of attributes based on attributes derived from the audio stream. A set of filter values is updated based on the updated set of attributes. The updated set of filter values is used to query a set of databases to obtain datasets. A probabilistic program is executed during the communication session by determining a set of probability parameters characterizing a probability of an anomaly occurring based on the datasets and the set of attributes. A determination is made if whether the probability satisfies a threshold. In response to a determination that the probability satisfies the threshold, a record is updated to identify the communication session to indicate that the threshold is satisfied.

Asynchronous database session update

Systems and methods for handling database transactions within a database session. A first client request to update a first data piece of a database session is received. A first response to the first client request indicates an update of the first data piece in accordance with the first request and publishes the update to enable further processing of the updated first data piece. An indication indicates that the updated first data piece is to be further updated and/or a second data piece of the database session is to be updated. A second client request is received to update a third data piece of the database session and a second response to the second client request indicates an update of the third data piece in accordance with the second request and an update of the updated first data piece in accordance with the indication.

Predictive pre-authorization of subsidiary accounts using passive biometrics
11580545 · 2023-02-14 · ·

A system and method for predictive pre-authorization of subsidiary accounts using passive biometrics which uses wireless mobile devices and biometric scanning to automatically predict pre-authorized transaction amounts for a plurality of subsidiary accounts in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, verifies the customer with a biometrics verification database, generates a pre-authorization amount with an authorization generator, and automatically deducts payments for purchases from a pre-authorized customer account. The system and method may further include capabilities for facilitating offline transactions using accounts enabled as offline accounts.

Driving mode assessment

An example operation includes one or more of receiving, by a server, data related to an environment associated with a target transport, analyzing, by the server, the data to determine if at least one adverse condition related to the environment exists, and responsive to existence of the at least one adverse condition, sending, by the server, a recommendation related to operation of the target transport in a safe mode to overcome the at least one adverse condition to the target transport.

Distributed database stored at an edge application

Systems and methods for reducing latency in transactions are described herein. In an embodiment, an application edge acts as a system of record for an application. When a client computing device sends a request to perform a transaction to the application, the application edge receives the request and, without forwarding the request to a backend computing network, searches a transaction datastore stored at the application edge for the account balance and responds to the client computing device with the account balance. The client computing device then determines that a transaction can be performed and sends a request to perform the transaction to the application. The application edge passes this request to the backend computing network which performs the requested transaction. The application edge then uses a webhook infrastructure to update each transaction datastore stored at the application edge.

Electrical panel for training a mathematical model for a device using a smart plug

An electrical panel or an electrical meter may provide improved functionality by interacting with a smart plug. A smart plug may provide a smart-plug power monitoring signal that includes information about power consumption of devices connected to the smart plug. The smart-plug power monitoring signal may be used in conjunction with power monitoring signals from the electrical mains of the building for providing information about the operation of devices in the building. For example, the power monitoring signals may be used to (i) determine the main of the house that provides power to the smart plug, (ii) identify devices receiving power from the smart plug, (iii) improve the accuracy of identifying device state changes, and (iv) train mathematical models for identifying devices and device state changes.

Efficient deniable commitment of data and unlinkable proof of commitment for securing user privacy in a digital identity system
11580256 · 2023-02-14 · ·

A method of generating a deniable commitment of personal data of a user with an unlinkable proof of the commitment of the personal data for securing user privacy in a digital identity system includes receiving the personal data of the user and receiving the commitment of the personal data according to a commitment scheme. An interactive zero-knowledge proof is engaged in with the user so as to verify that the commitment of the personal data opens to the personal data of the user.