Patent classifications
G06F21/32
Digital assistant processing of stacked data structures
Processing stacked data structures is provided. A system receives an input audio signal detected by a sensor of a local computing device, identifies an acoustic signature, and identifies an account corresponding to the signature. The system establishes a session and a profile stack data structure including a first profile layer having policies configured by a third-party device. The system pushes, to the profile stack data structure, a second profile layer retrieved from the account. The system parses the input audio signal to identify a request and a trigger keyword. The system generates, based on the trigger keyword and the second profile layer, a first action data structure compatible with the first profile layer. The system provides the first action data structure for execution. The system disassembles the profile stack data structure to remove the first profile layer or the second profile layer from the profile stack data structure.
Triage engine for document authentication
Computer systems and methods are provided for receiving a first authentication request that includes an image of an identification document. A risk value is determined using one or more information factors that correspond to the authentication request. A validation user interface that includes the image of the identification document is displayed. A risk category that corresponds to the risk value is determined using at least a first risk threshold. In accordance with a determination that the risk value corresponds to a first risk category, a visual indication that corresponds to the first risk category is displayed. In accordance with a determination that the risk value corresponds to a second risk category, a visual indication that corresponds to the second risk category is displayed.
Triage engine for document authentication
Computer systems and methods are provided for receiving a first authentication request that includes an image of an identification document. A risk value is determined using one or more information factors that correspond to the authentication request. A validation user interface that includes the image of the identification document is displayed. A risk category that corresponds to the risk value is determined using at least a first risk threshold. In accordance with a determination that the risk value corresponds to a first risk category, a visual indication that corresponds to the first risk category is displayed. In accordance with a determination that the risk value corresponds to a second risk category, a visual indication that corresponds to the second risk category is displayed.
Management of virtual goods in a blockchain-ledger based gaming architecture
Various embodiments provide management of virtual goods. In some embodiments, a gaming platform can be used to provide a secure ledger system for recording money transfer, play action, bets, analytics, gaming statistics, and the like, which are associated with virtual goods. Non-limiting examples of virtual goods comprise: characters; badges/icons; gameplay attributes; virtual money; cryptocurrencies; tokens; digital gifts; gameplay levels/add-ons; and prizes, among other examples. In some examples, gaming systems can directly interact with the distributed multi-ledger architecture for secure and transparent transactions which can also be accessed by auditors, tax authorities, partners, and/or other entities. Some examples may use private and/or public blockchains as part of the distributed multi-ledger gaming architecture. For instance, multiple distributed network nodes may be utilized to manage transaction records.
Management of virtual goods in a blockchain-ledger based gaming architecture
Various embodiments provide management of virtual goods. In some embodiments, a gaming platform can be used to provide a secure ledger system for recording money transfer, play action, bets, analytics, gaming statistics, and the like, which are associated with virtual goods. Non-limiting examples of virtual goods comprise: characters; badges/icons; gameplay attributes; virtual money; cryptocurrencies; tokens; digital gifts; gameplay levels/add-ons; and prizes, among other examples. In some examples, gaming systems can directly interact with the distributed multi-ledger architecture for secure and transparent transactions which can also be accessed by auditors, tax authorities, partners, and/or other entities. Some examples may use private and/or public blockchains as part of the distributed multi-ledger gaming architecture. For instance, multiple distributed network nodes may be utilized to manage transaction records.
Automatic anonymous visitor identity resolution using machine learning
A method for automatic anonymous visitor identity resolution using machine learning, which includes generating a visitor histogram set from visitor events of a visitor event stream that include a visitor identifier and an internet protocol address, filtering a set of user identifiers into a candidate set of user identifiers based on the internet protocol address, obtaining one or more user histogram sets generated from user events that include user identifiers from the candidate set of user identifiers, and mapping the visitor identifier to a user identifier of the candidate set of user identifiers using a machine learning model and a histogram similarity matrix generated from the visitor histogram set, the one or more user histogram sets, and a set of histogram similarity functions. The method further includes presenting a response based on the mapping of the visitor identifier to the user identifier.
Automatic anonymous visitor identity resolution using machine learning
A method for automatic anonymous visitor identity resolution using machine learning, which includes generating a visitor histogram set from visitor events of a visitor event stream that include a visitor identifier and an internet protocol address, filtering a set of user identifiers into a candidate set of user identifiers based on the internet protocol address, obtaining one or more user histogram sets generated from user events that include user identifiers from the candidate set of user identifiers, and mapping the visitor identifier to a user identifier of the candidate set of user identifiers using a machine learning model and a histogram similarity matrix generated from the visitor histogram set, the one or more user histogram sets, and a set of histogram similarity functions. The method further includes presenting a response based on the mapping of the visitor identifier to the user identifier.
CONNECTED ECOSYSTEM FOR LABORATORY ENVIRONMENT
- John Wilfred Coddaire ,
- Maryanne De Chambeau ,
- James Thomas Eickmann ,
- Paula Mary Flaherty ,
- Anthony Glenn Frutos ,
- Vasiliy Nikolaevich Goral ,
- Angela Langer Julien ,
- Marshall Jay Kosovsky ,
- Brent Ravaughn Lanterman ,
- Gregory Roger Martin ,
- Christie Leigh McCarthy ,
- John Forrest Roush ,
- John Shyu ,
- Tora Ann-Beatrice Eline Sirkka ,
- Allison Jean Tanner ,
- Kimberly Ann Titus ,
- Todd Michael Upton ,
- Timothy James Wood
A connected ecosystem for a laboratory environment comprises an electronic lab notebook, and instrumented biosafety cabinet, and one or more sensing vessels containing cell cultures. The electronic lab notebook interfaces with the instrumented biosafety cabinet to provide instructions, guidance, and monitoring of a user during the set up of the experimental protocol and to receive commands from the user via one of several input modalities. After the experimental protocol has been set up in the instrumented biosafety cabinet, cell cultures may be moved to an incubator where the connected ecosystem may provide automatic monitoring of the cultures. The automatic monitoring is provided by sensors integrated into cell culture vessels and supplemented by images of the cell cultures captured by a camera. The user may be informed of deviations from expected results detected based on the automatic monitoring.
CONNECTED ECOSYSTEM FOR LABORATORY ENVIRONMENT
- John Wilfred Coddaire ,
- Maryanne De Chambeau ,
- James Thomas Eickmann ,
- Paula Mary Flaherty ,
- Anthony Glenn Frutos ,
- Vasiliy Nikolaevich Goral ,
- Angela Langer Julien ,
- Marshall Jay Kosovsky ,
- Brent Ravaughn Lanterman ,
- Gregory Roger Martin ,
- Christie Leigh McCarthy ,
- John Forrest Roush ,
- John Shyu ,
- Tora Ann-Beatrice Eline Sirkka ,
- Allison Jean Tanner ,
- Kimberly Ann Titus ,
- Todd Michael Upton ,
- Timothy James Wood
A connected ecosystem for a laboratory environment comprises an electronic lab notebook, and instrumented biosafety cabinet, and one or more sensing vessels containing cell cultures. The electronic lab notebook interfaces with the instrumented biosafety cabinet to provide instructions, guidance, and monitoring of a user during the set up of the experimental protocol and to receive commands from the user via one of several input modalities. After the experimental protocol has been set up in the instrumented biosafety cabinet, cell cultures may be moved to an incubator where the connected ecosystem may provide automatic monitoring of the cultures. The automatic monitoring is provided by sensors integrated into cell culture vessels and supplemented by images of the cell cultures captured by a camera. The user may be informed of deviations from expected results detected based on the automatic monitoring.
AUTHENTICATION SYSTEM, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
Provided is an authentication system that improves user convenience. This authentication system includes at least one first terminal, a plurality of second terminals, and a server device. The first terminal is capable of providing services using a biometric authentication function or non-biometric authentication function. Each of the second terminals is capable of switching between a biometric authentication function and a non-biometric authentication function and capable of providing services using the biometric authentication function or non-biometric authentication function. The server device is connected to the first terminal and the plurality of second terminals. The server device calculates the rate of usage of a biometric authentication function by the at least one first terminal. The server device determines an operation mode for at least one of the plurality of second terminals on the basis of the calculated rate of usage.