H04L67/50

Maze training platform
11694564 · 2023-07-04 · ·

A method and system comprising an adaptive learning platform having a backend component for managing 3D lessons for display on an interface of a user device. A 3D lesson comprises a plurality of scenarios with choices which lead to a next scenario of the 3D lesson. A learner after completing the 3D lesson can analyze results of a completed 3D lesson using an analyzer unit of the adaptive learning platform. In addition, the platform also recommends other 3D lessons based on analytics performed on the learner user's results.

Method, apparatus, electronic device and storage medium for predicting user attribute

The embodiment of the present disclosure provides a method, an apparatus, an electronic device, and a storage medium for predicting user attribute. The method comprises acquiring an input of demographic-related information; determining features corresponding to the input of the demographic-related information and a weight corresponding to each feature, where the features comprise a single feature corresponding to each input of the demographic-related information, and/or a cross feature between the at least two single features; predicting user attribute according to each feature and its corresponding weight. Based on the solution provided by the embodiment of the present disclosure, the accuracy on the prediction of the user attribute can be effectively improved.

Virtual credential authentication based on browsing context

In some implementations, an authentication device may receive information related to website browsing activity at a client device. The information related to the website browsing activity may include information associated with a web address for a current website where information associated with a virtual credential was entered. The authentication device may identify one or more valid web addresses associated with the virtual credential, which may be valid only for an entity associated with the one or more valid web addresses. The authentication device may transmit, to the client device, information to indicate whether the website browsing activity is authenticated based on a comparison of the web address for the current website where the information associated with the virtual credential was entered and the one or more valid web addresses associated with the virtual credential.

System and method for separating content site visitor profiles

Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.

EPHEMERAL AND PRIVATE BEACON NETWORK
20230007098 · 2023-01-05 · ·

A peer to peer service, toolkit, and data feed standard that broadcasts real-time geolocations, provides proximity alerts, records and shares messages that include audio, video, and images through an encrypted technology platform that offers user-initiated privacy controls.

Information provision through temporary social networks
11546725 · 2023-01-03 · ·

A method for providing location-based information via a temporary social network includes detecting each of a plurality of first user devices within a predetermined proximity of a physical location and, in response, connecting each of the plurality of first user devices to a social network that is associated with the physical location using a communications network. In some embodiments, each of the plurality of first user devices will be connected to the social network for a predetermined amount of time or for as long as they are in the predetermined proximity. While in the social network, location-based information about the physical location is received over the communications network from each of the plurality of first user devices connected to the social network. At least some of that location-based information about the physical location may then be over the communications network to a second user device.

Systems and methods for tracking sharing of web content
11546440 · 2023-01-03 · ·

Systems and methods are provided for tracking sharing of an electronic content. An exemplary method may include receiving a request to access content associated with a web address by a user. Based on a unique identity assigned to the user and the web address, a unique tracking web address may be generated. This tracking web address may be shared with additional users. As other users request content associated with the tracking web address, information regarding the sharing of the electronic content may be determined and stored, allowing for tracking of sharing behavior of users.

Mobile computing device with data cognition software

A mobile computing device enabled by a customizable data cognition layer (DCL) software program to convert input information from a variety of sensors into real-time contextual messages is disclosed. The DCL software incorporates customizable software components known as plug-ins to expand the use of the mobile computing device.

SYSTEMS AND METHODS FOR IMPROVED BEHAVIORAL SCORING ACCURACY

Systems and methods are provided for improving behavioral biometrics scoring accuracy. A method includes receiving streamed behavioral biometrics data and associated contextual data, determining a first trust score by evaluating the streamed behavioral biometric data, and if the first trust score is below a first predetermined value, separating the streamed behavioral biometrics data into contextualized bins corresponding to the contextual data to produce binned data. The contextualized bins can include a target identifier such as a data field; or a data type field, an area of a browser window, a task, and/or a physical activity. Responsive to a first threshold amount of accrued binned data, the method can include evaluating the binned data to determine a second trust score that is context-aware and sending an alert to the enterprise server responsive to the second trust score being below a second predetermined value.

Notifications based on user interactions with emails

In some implementations, a method includes extracting message attributes of an email associated with a user from the email. User interaction data is identified that is generated by the user in association with display of the email based on sensor data from one or more sensors. It is determined that the user interaction data corresponds to a routine of the user based on a routine-related aspect generated from a user routine model representing the routine. A time to present a notification of the email is determined based on the routine. The notification is provided to the user on a user device based on the determined time to present the notification.