Processing

Please wait...

Join our LinkedIn PATENTSCOPE users Community Group
Settings

Settings

Goto Application

Offices all Languages en Stemming true Single Family Member false Include NPL false
RSS feed can only be generated if you have a WIPO account

Save query

A private query is only visible to you when you are logged-in and can not be used in RSS feeds

Query Tree

Refine Options

Offices
All
Specify the language of your search keywords
Stemming reduces inflected words to their stem or root form.
For example the words fishing, fished,fish, and fisher are reduced to the root word,fish,
so a search for fisher returns all the different variations
Returns only one member of a family of patents
Include Non-Patent literature in results

Full Query

FP:(towers watson)

Side-by-side view shortcuts

General
Go to Search input
CTRL + SHIFT +
Go to Results (selected record)
CTRL + SHIFT +
Go to Detail (selected tab)
CTRL + SHIFT +
Go to Next page
CTRL +
Go to Previous page
CTRL +
Results (First, do 'Go to Results')
Go to Next record / image
/
Go to Previous record / image
/
Scroll Up
Page Up
Scroll Down
Page Down
Scroll to Top
CTRL + Home
Scroll to Bottom
CTRL + End
Detail (First, do 'Go to Detail')
Go to Next tab
Go to Previous tab

Analysis

1.20240119315METHODS FOR DEVELOPMENT OF A MACHINE LEARNING SYSTEM THROUGH LAYERED GRADIENT BOOSTING
US 11.04.2024
Int.Class G06N 5/022
Appl.No 18530732 Applicant Towers Watson Software Limited Inventor Rachael MCNAUGHTON

A layered machine learning system for processing data. The machine learning system comprises decision trees with different depths. An iterative training process is performed on the layered machine learning system to determine the structures of the decision trees based on prior predictions. The fitted decision trees are further configured to update leaf values with a gradient boosting method. By cumulating the predictions of decisions trees in prior iterations, interaction effects are modeled among different depths within the layered machine learning system.

2.20230419128METHODS FOR DEVELOPMENT OF A MACHINE LEARNING SYSTEM THROUGH LAYERED GRADIENT BOOSTING
US 28.12.2023
Int.Class G06N 5/022
Appl.No 18301660 Applicant Towers Watson Software Limited Inventor Rachael MCNAUGHTON

A layered machine learning system for processing data. The machine learning system comprises decision trees with different depths. An iterative training process is performed on the layered machine learning system to determine the structures of the decision trees based on prior predictions. The fitted decision trees are further configured to update leaf values with a gradient boosting method. By cumulating the predictions of decisions trees in prior iterations, interaction effects are modeled among different depths within the layered machine learning system.

3.WO/2024/003609METHODS FOR DEVELOPMENT OF A MACHINE LEARNING SYSTEM
WO 04.01.2024
Int.Class G06N 20/00
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
20Machine learning
Appl.No PCT/IB2023/000229 Applicant TOWERS WATSON SOFTWARE LIMITED Inventor MCNAUGHTON, Rachael
A layered machine learning system for processing data. The machine learning system comprises decision trees with different depths. An iterative training process is performed on the layered machine learning system to determine the structures of the decision trees based on prior predictions. The fitted decision trees are further configured to update leaf values with a gradient boosting method. By cumulating the predictions of decisions trees in prior iterations, interaction effects are modeled among different depths within the layered machine learning system.
4.3168768SOFTWARE PROTECTION
EP 17.05.2017
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 16198679 Applicant TOWERS WATSON LTD Inventor BEARDALL MARK
A method and system are provided for controlling access to software installed on a storage device or during installation of said software. The method comprises checking parameters to determine if a user is/was entitled to install the software and determining the physical location of (part of) the software on the storage device. The method further comprises storing the determined installation-time physical location (including an installation time/date and an expiry period for allowing/denying access to the software). The method also comprises storing data confirming the software has been successfully activated. Upon launching the software, the method comprises determining the physical location of (part of) the software, and comparing the determined runtime physical location of software with the predetermined installation-time physical location. The method further comprises denying access to or preventing execution of the software where the determined runtime location and the predetermined installation-time physical location do not match.
5.2574316Controlling access to data
GB 04.12.2019
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 201905376 Applicant TOWERS WATSON LTD Inventor MARK BEARDALL
A method and system are provided for controlling access to data in an executable file installed on a storage device or during installation of said executable file. The method includes, upon installation checking one or more parameters against data from a license server to determine if a user is entitled to install the executable file. Determining the physical location of the executable file, or a part thereof, on a storage device, said location being the installation-time physical location. Encrypting the installation-time physical location and storing the encrypted installation-time physical location. Upon launching, determining the physical location of the executable file, or a part thereof, on a storage device, said location being the runtime physical location. Encrypting the runtime physical location and comparing the encrypted runtime physical location of the executable file with the encrypted installation-time physical location and where they do not match, denying access to the data or preventing execution of the executable file.
6.3168768SOFTWAREBESKYTTELSE
DK 26.10.2020
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 16198679 Applicant Towers Watson Limited Inventor Beardall, Mark
A method and system are provided for controlling access to software installed on a storage device or during installation of said software. The method comprises checking parameters to determine if a user is/was entitled to install the software and determining the physical location of (part of) the software on the storage device. The method further comprises storing the determined installation-time physical location (including an installation time/date and an expiry period for allowing/denying access to the software). The method also comprises storing data confirming the software has been successfully activated. Upon launching the software, the method comprises determining the physical location of (part of) the software, and comparing the determined runtime physical location of software with the predetermined installation-time physical location. The method further comprises denying access to or preventing execution of the software where the determined runtime location and the predetermined installation-time physical location do not match.
7.3168768SOFTWARE PROTECTION
PT 30.10.2020
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 161986799 Applicant TOWERS WATSON LIMITED Inventor
8.60962SOFTWARE PROTECTION
RS 30.11.2020
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 20201243 Applicant TOWERS WATSON LIMITED Inventor Mark BEARDALL
9.2826551Protección de software
ES 18.05.2021
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 16198679 Applicant Towers Watson Limited Inventor BEARDALL, Mark
Un método de control de acceso a software instalado en un dispositivo de almacenamiento o durante la instalación de dicho software, el método que comprende: (i) tras la instalación del software: comprobar (104) un número de licencia frente a los datos de un servidor de licencias (34) para determinar si un usuario tiene derecho a instalar el software en el dispositivo de almacenamiento; determinar (110) la ubicación física de dicho software, o una parte del mismo, en dicho dispositivo de almacenamiento, siendo dicha ubicación la ubicación física en el momento de la instalación; almacenar (116) la ubicación física determinada en el momento de la instalación en un archivo de configuración almacenado en el dispositivo de almacenamiento (10), incluyendo el almacenamiento de uno o más parámetros que incluyen una hora y fecha de la instalación y un período de expiración para permitir o denegar el acceso sin licencia al software; y almacenar (114) datos que confirmen que el software se ha activado con éxito según dicho uno o más parámetros; y (ii) tras iniciar o durante el tiempo de ejecución del software instalado: comprobar (301; 402, 430) si el software puede conectarse al servidor de licencias (34); y (a) si el software puede conectarse al servidor de licencias: comprobar (404) uno o más parámetros en el archivo de configuración almacenado en el dispositivo de almacenamiento frente a datos del servidor de licencias para determinar si un usuario tiene derecho a retirar una licencia del servidor de licencias para ejecutar el software; si se determina que el usuario tiene derecho a retirar una licencia, retirar una licencia, ejecutar o continuar ejecutando (309; 408) el software y actualizar (406) el uno o más parámetros, en donde el uno o más parámetros incluyen además la hora y la fecha de retirada; o (b) si el software no puede conectarse al servidor de licencias: determinar (302; 412) la ubicación física del software, o una parte del mismo, en un dispositivo de almacenamiento, siendo dicha ubicación la ubicación física de tiempo de ejecución; comparar (306; 414) la ubicación física de tiempo de ejecución determinada del software con la ubicación física de tiempo de instalación predeterminada almacenada en el archivo de configuración; comprobar (416) si la presente hora está dentro del período de expiración; y negar el acceso o impedir la ejecución (310; 420) del software cuando la ubicación del tiempo de ejecución determinada y la ubicación física del tiempo de instalación predeterminada no coincidan o si la hora presente no está dentro del período de expiración.
10.3168768SOFTWARE PROTECTION
LT 11.01.2021
Int.Class G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
Appl.No 16198679 Applicant TOWERS WATSON LTD Inventor BEARDALL MARK