Patents by Inventor Jihane Zouaoui

Jihane Zouaoui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200050941
    Abstract: Machine learning systems and methods for embedding attributed sequence data. The attributed sequence data includes an attribute data part having a fixed number of attribute data elements and a sequence data part having a variable number of sequence data elements. An attribute network module includes a feedforward neural network configured to convert the attribute data part to an encoded attribute vector having a first number of attribute features. A sequence network module includes a recurrent neural network configured to convert the sequence data part to an encoded sequence vector having a second number of sequence features. In use, the machine learning system learns and outputs a fixed-length feature representation of input attributed sequence data which encodes dependencies between different attribute data elements, dependencies between different sequence data elements, and dependencies between attribute data elements and sequence data elements within the attributed sequence data.
    Type: Application
    Filed: August 7, 2018
    Publication date: February 13, 2020
    Inventors: Zhongfang Zhuang, Aditya Arora, Jihane Zouaoui, Xiangnan Kong, Elke Rundensteiner
  • Patent number: 10110634
    Abstract: Systems and methods for monitoring user authenticity during user activities in a user session on an application server is provided. The method being carried out in a distributed manner by a distributed server system. The method comprises a user modeling-process and a user-verification process. The user-modeling process is performed on a user-model server in which a user model is adapted session-by-session to user activity data received from the application server. The user-verification process is performed on the application server on the basis of the user model adapted on the user-model server. The user-verification process comprises comparing the user model with features extracted from user activity in the user session on the application server and determining a total risk-score value based on the comparison. If the total risk-score value is greater than a given threshold, a corrective action is performed.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: October 23, 2018
    Assignee: AMADEUS S.A.S.
    Inventors: Virginie Amar, Jeremie Barlet, Romain Peicle, Olivier Thonnard, Jihane Zouaoui
  • Patent number: 9876825
    Abstract: Systems and methods for monitoring user authenticity according to user activities on an application server. A user-modeling process and a user-verification process are performed. In the user-modeling process, a user model is adapted session-by-session to user activities in which the user model includes a plurality of adaptive feature-specific user-behavior models. The user-verification process includes determining a plurality of feature-specific risk-score values, comparing the at least one of the adaptive feature-specific user-behavior models with a respective feature extracted from user activity in the user session on the application server, and determining a total risk-score value indicative of user authenticity by weighting and combining the plurality of feature-specific risk-score values. If the total risk-score value is greater than a given threshold, a corrective action is performed.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: January 23, 2018
    Assignee: Amadeus S.A.S.
    Inventors: Virginie Amar, Jeremie Barlet, Marc Campora, Joseph El Hayek, Romain Peicle, Olivier Thonnard, Jihane Zouaoui
  • Publication number: 20170230417
    Abstract: Systems and methods for monitoring user authenticity during user activities in a user session on an application server is provided. The method being carried out in a distributed manner by a distributed server system. The method comprises a user modeling-process and a user-verification process. The user-modeling process is performed on a user-model server in which a user model is adapted session-by-session to user activity data received from the application server. The user-verification process is performed on the application server on the basis of the user model adapted on the user-model server. The user-verification process comprises comparing the user model with features extracted from user activity in the user session on the application server and determining a total risk-score value based on the comparison. If the total risk-score value is greater than a given threshold, a corrective action is performed.
    Type: Application
    Filed: February 4, 2016
    Publication date: August 10, 2017
    Inventors: Virginie Amar, Jeremie Barlet, Romain Peicle, Olivier Thonnard, Jihane Zouaoui
  • Publication number: 20170230418
    Abstract: Systems and methods for monitoring user authenticity according to user activities on an application server. A user-modeling process and a user-verification process are performed. In the user-modeling process, a user model is adapted session-by-session to user activities in which the user model includes a plurality of adaptive feature-specific user-behavior models. The user-verification process includes determining a plurality of feature-specific risk-score values, comparing the at least one of the adaptive feature-specific user-behavior models with a respective feature extracted from user activity in the user session on the application server, and determining a total risk-score value indicative of user authenticity by weighting and combining the plurality of feature-specific risk-score values. If the total risk-score value is greater than a given threshold, a corrective action is performed.
    Type: Application
    Filed: February 4, 2016
    Publication date: August 10, 2017
    Inventors: Virginie Amar, Jeremie Barlet, Marc Campora, Joseph El Hayek, Romain Peicle, Olivier Thonnard, Jihane Zouaoui