Resumen de: WO2026029823A1
This disclosure describes a framework for performing user-requested tasks automatically across an interactive interface using various types of machine learning models. Specifically, this disclosure outlines and describes a task execution system that utilizes a generative artificial intelligence (AI) action model and retrieval-augmented generation (RAG) to complete user-requested actions across an interactive interface. The task execution system solves many of the current limitations of LAMs by using a generative AI action model to determine a session plan, which includes a set of actions for accomplishing stages of the actionable task across the interactive interface, obtaining visual context information of each interactive interface segment, integrates RAG results to improve the accuracy of both the session plan and individual actions, and self-corrects when faced with unexpected obstacles.
Resumen de: WO2026030336A1
A system may access a set of training data and determine a timeframe associated with a positively labeled data item of the training data. A system may generate at least two new positively labeled data items based on the positively labeled data item to generate augmented training data. A system may train a machine learning model by applying the augmented training data as input to a machine learning model, and modifying a weight of the machine learning model.
Resumen de: WO2026030330A1
Techniques are disclosed herein for providing and using a natural language to logical form model having execution and sematic error correction capabilities. In one aspect, a method is disclosed that includes: accessing a set of training examples and generating a set of error correction training examples via an iterative process performed for each training example. The iterative process includes generating an inferred logical form, executing the inferred logical form on a database, when executing the inferred logical form on the database fails, obtaining an execution error message corresponding to the failure, and recording the inferred logical form and the execution error message as part of an execution error example, and populating an error correction prompt template with the execution error example to generate an error correction training example. A machine learning model may then be trained with at least the set of error correction training examples.
Resumen de: WO2026030526A1
Quantum-secure, multiparty computation enables the joint evaluation of multivariate functions across distributed users while ensuring the privacy of their local inputs. It uses a linear algebra engine that leverages the quantum nature of light for information-theoretically secure multiparty inference using telecommunication components. This linear algebra engine can perform deep learning inference with rigorous upper bounds on the information leakage of both the deep learning model weights and the client's data, enabling double-blind operations. Applied to the MNIST classification task, it performs with classification accuracies exceeding 95% and a leakage of less than 0.1 bit per weight and data symbols. This leakage is an order of magnitude below the minimum bit precision for accurate deep learning using state-of-the- art quantization techniques. Our quantum-secure, multiparty computation lays the foundation for practical quantum-secure computation and unlocks secure cloud deep learning.
Resumen de: EP4687049A1
Classifying one or more assets in an automated and industrial control system (AIC) according to a classification standard. In a computer monitoring tool, a classification query is received for an asset managed by the AIC. Responsive to this classification query, the computer monitor tool retrieves a listing of candidate ontology classes for the queried asset utilizing information received from a semantic data model of known assets. The computer monitor tool then captures, preferably from a database coupled to the AIC, certain classification attribute variables associated with the queried asset. Additionally, the computer monitor tool receives user information describing certain building information associated with the queried asset. The computer monitor tool then generates a computer query configured for requesting results from a machine learning (ML) algorithm indicative of one or more classification standards for the queried asset.
Resumen de: AU2024318556A1
Techniques for discovering primary, unique, and/or foreign keys for relational datasets are described. The techniques include profiling the relational datasets to obtain respective data profiles; identifying one or more primary key candidates for a first relational dataset using a first data profile of the first relational dataset and a first trained machine learning model; identifying one or more foreign key proposals for a second relational dataset using the one or more primary key candidates by performing a subset analysis of the second relational dataset with respect to the first relational dataset; identifying one or more foreign key candidates for the second relational dataset using the first data profile, a second data profile of the second relational dataset, and a second trained machine learning model different from the first trained machine learning model; and outputting the at primary key candidate(s) and the foreign key candidate(s).
Resumen de: US20260030039A1
Disclosed are methods for managing execution of plugins of a machine-learning based system. A plugin configuration defines inputs required by the plugin and capabilities provided by the plugin. Capabilities describe the plugin’s functionality, such as how the plugin affects the response, what type of content the plugin generates, etc. In some configurations, when responding to a prompt, a collection of relevant plugins is identified. Configurations of these plugins may be analyzed to optimize execution, including determining optimal execution order or enabling parallel execution. Plugin configurations may also be analyzed to improve security by conditionally preventing one plugin from accessing the output of another. Plugin configurations may also be used to inform a client what plugins will run and what results they may yield. This enables the client to optimize and streamline how the response is displayed.
Resumen de: US20260029780A1
Classifying one or more assets in an automated and industrial control system (AIC) according to a classification standard. In a computer monitoring tool, a classification query is received for an asset managed by the AIC. Responsive to this classification query, the computer monitor tool retrieves a listing of candidate ontology classes for the queried asset utilizing information received from a semantic data model of known assets. The computer monitor tool then captures, preferably from a database coupled to the AIC, certain classification attribute variables associated with the queried asset. Additionally, the computer monitor tool receives user information describing certain building information associated with the queried asset. The computer monitor tool then generates a computer query configured for requesting results from a machine learning (ML) algorithm indicative of one or more classification standards for the queried asset.
Resumen de: US20260030319A1
Provided is an information processing method, etc. that assists a user in interpreting behavior of a generated machine learning model. In the information processing method, a computer executes processing of recording a plurality of sets of an explanatory data vector xn input to an existing machine learning model (21) and an objective data vector yn output from the machine learning model (21) in association with each other, calculating an interpretation matrix A_dagger which is a vector product of an explanatory matrix X in which a plurality of sets of the explanatory data vector xn is arranged and a generalized inverse matrix of an objective matrix Y in which the objective data vector yn is arranged in an order corresponding to the explanatory data vector X, and outputting a chart (41, 42, and 43) related to the interpretation matrix A_dagger.
Resumen de: US20260030516A1
Described are systems and method for personalized search results, including a memory storing instructions, a trained machine learning model, and a processor operatively connected to the memory and configured to execute the instructions to perform operations, including receiving the sequence of search queries from a user device associated with a user, predicting the likely next search query from the user by inputting the received sequence of search queries into the trained machine learning model, generating predicted search results by applying the likely next search query, generating the personalized search results by appending the predicted search results to search results from a most recent query of the sequence of queries from the user, and causing the user device to display the personalized search results.
Resumen de: US20260030528A1
A visualization recommendation system generates recommendation scores for multiple visualizations that combine data attributes of a dataset with visualization configurations. The visualization recommendation system maps meta-features of the dataset to a meta-feature space and configuration attributes of the visualization configurations to a configuration space. The visualization recommendation system generates meta-feature vectors that describe the mapped meta-features, and generates configuration attribute sets that describe the attributes of the visualization configurations. The visualization recommendation system applies multiple scoring models to the meta-feature vectors and configuration attribute sets, including a wide scoring model and a deep scoring model. In some cases, the visualization recommendation system trains the multiple scoring models using the meta-feature vectors and configuration attribute sets.
Resumen de: WO2026022822A1
A system is configured to provide data pertaining to a record, performing the following method: (a) obtain, from a first source(s), a first record indicative of an actual financial transaction, paid via the first source; (b) perform enrichment on the first record, thereby determining: a counterparty and/or a financial classification category associated with the first record. The enrichment utilizes machine learning model(s) trained to identify correspondence, of first records indicative of actual financial transactions associated with a business entity, to second data. The second data are obtained from second source(s), distinct from the first source(s); (c) derive an enriched first record, based on the enrichment; and (d) provide the enriched first record.
Resumen de: WO2026024342A1
Disclosed are methods for managing execution of plugins of a machine-learning based system. A plugin configuration defines inputs required by the plugin and capabilities provided by the plugin. Capabilities describe the plugin's functionality, such as how the plugin affects the response, what type of content the plugin generates, etc. In some configurations, when responding to a prompt, a collection of relevant plugins is identified. Configurations of these plugins may be analyzed to optimize execution, including determining optimal execution order or enabling parallel execution. Plugin configurations may also be analyzed to improve security by conditionally preventing one plugin from accessing the output of another. Plugin configurations may also be used to inform a client what plugins will run and what results they may yield. This enables the client to optimize and streamline how the response is displayed.
Resumen de: EP4686214A1
An information processing device according to the present technology includes a calculation unit that calculates a lower limit value of a length of a count period for making likelihood information equal to or greater than a threshold on the basis of an inference result obtained by inputting a plurality of SPAD images obtained by an SPAD sensor to an AI model obtained by machine learning, the SPAD images having different count values by varying lengths of the count period in which photon counting is performed for each pixel, and likelihood information of the inference result.
Resumen de: US20260025388A1
A model verification system and associated method for employing a multi-party verification technique to verify machine learning models and generative AI systems. The models and associated systems can be deployed in an enterprise and require verification to ensure that cohorts are properly verifying the models and systems and evaluation to ensure that the models and systems operate responsibly and achieve intended outcomes. A dynamic, multi-stakeholder blinded verification process can be employed for the continuous verification and evaluation of machine learning models and the systems that use them. This helps promote unbiased, reproducible verification, evaluation and assessments by preventing potential biases from cohorts form part of the verification process.
Resumen de: US20260025327A1
In one embodiment, a device obtains data regarding routing decisions made by a machine learning-based predictive routing engine for a network. The device determines, based on the data regarding the routing decisions, a behavior of the machine learning-based predictive routing engine. The device compares the behavior of the machine learning-based predictive routing engine to a behavioral policy for the machine learning-based predictive routing engine. The device adjusts operation of the machine learning-based predictive routing engine, when the behavior of the machine learning-based predictive routing engine violates the behavioral policy.
Resumen de: WO2026019632A1
A smart system, such as a smart shopping cart system, uses an efficient selection algorithm to select an item identifier prediction for an item. The smart cart system uses a set of machine-learning models to generate identifier predictions based on images. To select an item identifier, the smart system applies an efficient selection algorithm to the predictions from the machine-learning models. An efficient selection algorithm is an algorithm that requires minimal computational resources to perform. For example, the efficient selection algorithm may be a simple majority algorithm that selects the identifier prediction generated by a majority of the models or a weighted voting algorithm where each model's vote is weighted by some metric. The smart system applies the efficient selection algorithm to select an item identifier prediction from the ones generated by the models. The smart system may display content related to the item associated with the item identifier prediction.
Resumen de: US20260023820A1
Various embodiments provide systems and methods for updating a training dataset so that the generated machine learning model can adapt to both short-term and long-term face variations including, for example, head pose, dressing, lighting conditions, and/or aging.
Resumen de: WO2026017666A1
The present invention relates to a method for generating a set of manufacturing data of a cosmetic composition capable of complying with at least one acceptability criterion, said method comprising a step of: - obtaining an set to be completed and optionally at least one constraint parameter to be complied with by the chemical composition, and - applying a technique to the set to be completed and optionally the at least one stress parameter to obtain a completed set, the technique including using at least one machine learning model, the at least one machine learning model being capable of completing a set to be completed.
Resumen de: US20260021828A1
Techniques for generating a tree structure based on multiple machine-learned trajectories are described herein. A planning component (“ML system”) within a vehicle may receive and encode various types of sensor and/or vehicle data. The ML system can provide the encoded data as input to multiple machine-learning models (“ML models”), each of which may be trained to output a unique candidate trajectory for the vehicle follow. In some examples, each ML model may be trained to output a unique type of learned trajectory that causes the vehicle to perform a certain type of action. Using the learned candidate trajectories, the ML system may generate a tree structure that includes some or all of the candidate trajectories. The vehicle may determine a control trajectory based on the generation and traversal of the tree structure using a tree search algorithm, and may follow the control trajectory within the environment.
Resumen de: WO2026019909A1
A model verification system and associated method for employing a multi-party verification technique to verify machine learning models and generative Al systems. The models and associated systems can be deployed in an enterprise and require verification to ensure that cohorts are properly verifying the models and systems and evaluation to ensure that the models and systems operate responsibly and achieve intended outcomes. A dynamic, multi-stakeholder blinded verification process can be employed for the continuous verification and evaluation of machine learning models and the systems that use them. This helps promote unbiased, reproducible verification, evaluation and assessments by preventing potential biases from cohorts form part of the verification process.
Resumen de: US20260023889A1
An example computing platform is configured to (i) receive a data asset related to a construction project; (ii) determine, via a first machine-learning algorithm, at least one physical location within the construction project to which the received data asset is related; (iii) associate the received data asset with the determined physical location; (iv) based on the determined physical location, determine, via a second machine-learning algorithm, a respective relationship between the received data asset and one or more other data assets related to the construction project; and (v) add the received data asset to a construction knowledge graph as a node that is connected to one or more other respective nodes that represent the one or more other data assets.
Resumen de: US20260025400A1
A computing device, that is configured to configure a global machine learning model, performs respective electronic risk audits of client devices configured to train respective local machine learning models that correspond to a global machine learning model. Based on respective electronic risk scores of one or more of the client devices, determined via the respective electronic risk audits, the computing device implements one or more parameter privacy adjustment methods on respective parameters received from the client devices prior to using the respective parameters to configure the global machine learning model, wherein respective client devices determined to have higher electronic risk scores have more of the parameter privacy adjustment methods applied than other respective client devices determined to have lower electronic risk scores. The computing device provides, to the client devices, the global machine learning model configured according to the respective parameters as adjusted.
Resumen de: US20260024101A1
A method of reducing a future amount of electronic fraud alerts includes receiving data detailing a financial transaction, inputting the data into a rules-based engine that generates an electronic fraud alert, transmitting the alert to a mobile device of a customer, and receiving from the mobile device customer feedback indicating that the alert was a false positive or otherwise erroneous. The method also includes inputting the data detailing the financial transaction into a machine learning program trained to (i) determine a reason why the false positive was generated, and (ii) then modify the rules-based engine to account for the reason why the false positive was generated, and to no longer generate electronic fraud alerts based upon (a) fact patterns similar to fact patterns of the financial transaction, or (b) data similar to the data detailing the financial transaction, to facilitate reducing an amount of future false positive fraud alerts.
Nº publicación: EP4682769A1 21/01/2026
Solicitante:
AMADEUS SAS [FR]
Amadeus S.A.S
Resumen de: EP4682769A1
A computing device, that is configured to configure a global machine learning model, performs respective electronic risk audits of client devices configured to train respective local machine learning models that correspond to a global machine learning model. Based on respective electronic risk scores of one or more of the client devices, determined via the respective electronic risk audits, the computing device implements one or more parameter privacy adjustment methods on respective parameters received from the client devices prior to using the respective parameters to configure the global machine learning model, wherein respective client devices determined to have higher electronic risk scores have more of the parameter privacy adjustment methods applied than other respective client devices determined to have lower electronic risk scores. The computing device provides, to the client devices, the global machine learning model configured according to the respective parameters as adjusted.