Intellectual Property
oue.ai has filed provisional patent applications with the USPTO covering the core methods, systems, and architectures across every product in the suite. The technologies described below are protected under pending patent applications.
50
Applications filed
9
Technology areas
USPTO
Filing jurisdiction
Multi-Domain Personal Data Aggregation for AI Context Generation
Method for aggregating structured personal data across health, finance, legal, insurance, and family domains into a weighted AI inference context, with domain-specific field prioritization per query type.
Per-User LoRA Adapter Training on Synthetic Personal Data
System for automatically generating synthetic question-answer training data from a user's personal records and training per-user LoRA adapters for language model personalization.
Ensemble AI Model Routing via Two-Dimensional Domain and Task Classification
Method for routing queries to domain-specialized AI models using simultaneous domain and task-type classification, with multi-model output aggregation for cross-domain queries.
Personal AI Model Adapter Hot-Swapping at Inference Time
System for maintaining shared base model weights in GPU memory and dynamically applying per-user LoRA adapters at inference time with LRU caching, supporting concurrent multi-user personalized inference.
Synthetic Training Data Generation from Structured Personal Records
Pipeline for generating, verifying, and augmenting synthetic training data from personal records at three complexity tiers, with factual accuracy verification against source data.
Continuous Open-Source Model Intake with Automatic Benchmark Evaluation
System for monitoring model repositories for new releases, automatically benchmarking candidates, and integrating qualifying models via shadow deployment with quality-gated promotion.
Knowledge Distillation from Prior LoRA Adapters to New Base Model Architectures
Method for preserving per-user personalization when upgrading base model architectures by using prior adapter outputs as distillation targets for new adapter training.
Per-User AI Adapter Storage with Encrypted Tenant Isolation
Storage system treating per-user model adapters as sensitive personal data with AES-256 per-user encryption, tenant-isolated access controls, and cryptographic deletion on account termination.
Personalized Daily Digest Generation from Multi-Domain User Data
System for extracting time-sensitive, anomalous, and recently changed items from multi-domain personal data, ranking by composite urgency, and generating a grounded natural language daily briefing.
Breaking News Relevance Filtering Based on Personal Profile
Method for matching external event relevance dimensions against a user's structured personal profile to compute personalized relevance scores and generate specific impact explanations.
External Platform Data Import Parsing for AI Personalization
Pipeline for ingesting heterogeneous data export archives from external platforms, applying schema-versioned parsers, extracting behavioral signals, and normalizing into a personal AI context store.
Personal AI Personalization Quality Measurement via Held-Out Evaluation
Method for measuring per-user adapter personalization quality using held-out evaluation sets from the user's personal domain, with type-appropriate comparison metrics and a Personalization Quality Score.
Domain-Weighted Field Scoring for Personal AI Context Generation
Method for dynamically prioritizing personal data fields within a token-budget-constrained AI context string based on query domain classification, with highest-relevance fields positioned for transformer attention.
Confidence-Weighted Output Aggregation in Domain-Specialized AI Ensembles
Method for aggregating multi-model outputs using precomputed domain specialization scores and claim-level weighted voting, with generative synthesis by the highest-scoring domain specialist.
Shadow Deployment with Gradual Traffic Migration in Personal AI Ensembles
System for evaluating new AI model candidates via parallel shadow inference, asynchronous judge model scoring, and quality-gated gradual traffic migration with automatic reversion on regression.
Proactive AI Nudge Generation from Structured Personal Data State Analysis
Layered nudge generation system combining deterministic rules, cross-domain LLM inference, and behavioral pattern analysis, with source-grounded annotations and hash-based deduplication.
Priority-Ranked Proactive Notification with Multi-Tier Urgency Classification
Method for classifying AI advisory observations into urgency tiers by time-to-impact and magnitude, with appropriate delivery cadence per tier.
Cross-Domain Personal Risk Factor Inference from Multi-Product Data
Two-component system combining a curated cross-domain implication map with an LLM inference pass to detect unaddressed obligations arising from interactions between life domains.
Rule-Based Trigger Generation from Personal Data State Transitions
Structured rule engine with a declarative specification language, versioned rule registry, and append-only trigger audit log for proactive personal AI notification triggering.
AI Observation Grounding with Source Data Citation for Accountability
Constrained generation method requiring AI-generated observations to cite specific data field identifiers, with post-processing verification and user-accessible citation trails.
Behavioral Pattern Analysis Across Time-Series Personal Data
Statistical anomaly detection system using z-score analysis against rolling baselines of time-series personal data to generate proactive wellbeing and financial health observations.
Outdated Legal Document Detection via Elapsed Time and Life Event Correlation
Method for flagging potentially outdated legal documents by comparing document age against type-specific thresholds and detecting intervening life events from personal data changes.
Differential Privacy-Guaranteed Personal Data Contribution to Research Cohorts
System with per-user epsilon budget tracking using Rényi DP accounting across all cohort computations, Gaussian mechanism aggregation, and cryptographic proof of data contribution.
Granular Per-Category Consent Management for Personal Data Contribution
Consent management system with data-category and program-type granularity, mandatory enforcement gates on all pipeline access, time-bounded consent, and revocation propagation to downstream programs.
Points-Based Compensation for Personal Data Contributions to AI Training
Compensation system with dynamic points pricing from quality, scarcity, and demand multipliers; cryptographically chained tamper-evident ledger; and points redemption for platform benefit types.
Consent Revocation with Downstream AI Model Deletion Triggering
System tracking which AI model training runs incorporated each user's data via a provenance ledger, triggering retraining or machine unlearning upon revocation with membership inference verification.
Differential Privacy Budget Tracking Across Research Cohort Enrollments
Cross-program privacy budget accounting system with unified per-user ledger, Rényi DP composition across simultaneous program enrollments, time-window caps, and consumer-facing budget dashboard.
Cryptographic Proof of Data Contribution Without Individual Exposure
Zero-knowledge proof system providing verifiable proof of personal data inclusion in cohort computations using Pedersen commitments, without revealing individual data values or aggregate outputs.
Conversational AI-Guided Estate Plan Generation with Jurisdiction Awareness
Conversational AI system for estate plan creation that loads jurisdiction-specific requirement rulesets, validates each collected field, and produces legally structured documents with execution checklists.
Beneficiary Designation Cross-Document Consistency Detection
Automated system comparing beneficiary designations across financial accounts and estate planning documents using fuzzy identity resolution, detecting omission, commission, and allocation conflicts.
Life Event-Triggered Automated Estate Plan Update Notification
System detecting life events from personal data field changes and mapping them to estate plan components requiring review, generating targeted notifications for unupdated components.
Trust Document Generation with Machine-Readable Distribution Condition Encoding
Dual-format trust generation system producing parallel natural language legal text and structured machine-readable condition schemas for potential future programmatic condition verification.
Estate Plan Complexity Scoring for Legal Review Routing
Multi-dimensional complexity scoring method routing users to self-service AI generation, attorney review recommendation, or mandatory professional engagement based on situation complexity.
Heartbeat-Based Digital Vault Access Control with Inactivity Detection
Access control system using passive session heartbeats, tiered inactivity thresholds, escalating notification cascade, and credential-free beneficiary emergency access via time-limited tokens.
Time-Delayed Beneficiary Vault Access via Escrowed Access Rights
Escrowed beneficiary designation system storing per-beneficiary access scopes with no tokens generated until inactivity trigger fires, with server-side scope enforcement on all retrieval requests.
Cryptographically Signed Emergency Access Tokens with Temporal Expiration
RS256-signed JWT-based emergency access token system with stateless validation, compact revocation list, and access scope enforcement from token payload without database lookup.
Configurable Multi-Stage Inactivity Detection with Escalating Notification
Four-stage inactivity system with independently configurable thresholds, escalating from in-app alert through owner email, trusted contact notification, and beneficiary emergency access grant.
Emergency Vault Access Without Beneficiary Platform Account Requirement
Account-free emergency access method using token-only authentication, server-side document retrieval via service role key, and stateless read-only interface requiring no beneficiary account creation.
Life Status Verification via Multi-Signal Behavioral Analysis
False-positive reduction method computing a multi-signal behavioral score from email open events, navigation depth, calendar-linked absence, and device signals to gate emergency vault activation.
Multi-Member Family Health Record Aggregation with Tiered Access Controls
Family health record system with a relationship graph defining tiered access permissions, field-level sensitive record restrictions, emergency override, and cross-family medication interaction checking.
Family Health Risk Assessment from Aggregated Genetic and Medical History
Risk assessment method aggregating conditions, genetic results, and family history across members to compute hereditary risk flags, multi-generation patterns, and age-appropriate screening recommendations.
Distributed Caregiver Coordination with Medication and Appointment Tracking
Multi-caregiver coordination system with attributed care logging, medication administration conflict detection, missed-dose alerting, appointment assignment, and care gap anomaly detection.
Hierarchical Goal Decomposition Across Time Horizons from Minutes to Lifetime
Goal management system spanning seven time horizon levels with parent-child linkage, bottom-up contribution metric computation, and horizon-specific planning views.
Calendar Time Block Linkage to Nested Long-Term Goal Hierarchies
Method for deriving goal progress from time block completion by propagating completion up the goal hierarchy and detecting goal drift from declining completion trends.
Cross-Product Life Data Graph for AI Context and Recommendation
Personal life data graph with typed entity nodes and relationship edges enabling graph-traversal AI context enrichment and life-stage pattern matching for product recommendation.
Predictive Life Event Detection from Cross-Domain Behavioral Data Patterns
Leading indicator detection system matching life event signature patterns against personal data change logs to generate pre-event advisory content before events occur.
Net Worth Aggregation Across Heterogeneous Asset Classes Without Bank Connection
Manual-entry net worth system with comprehensive asset class and liability taxonomy, historical snapshot time series, allocation percentage computation, and reference benchmark comparison.
Retirement Timeline Sensitivity Analysis via Parameterized Scenario Modeling
Monte Carlo retirement projection method producing a ranked sensitivity matrix that quantifies which planning assumptions most affect retirement date and portfolio depletion probability.
Time-Delayed Personal Message Delivery with Configurable Life Trigger Conditions
Message delivery system supporting temporal, life event, and owner status trigger conditions, with encrypted message storage and automated delivery upon trigger activation.
Multi-Generational Family Data Inheritance with Cryptographic Access Control Succession
Digital data inheritance system with per-domain successor designation, confirmed death triggering, access control re-provisioning, and cryptographically chained ownership records for succession verification.
Notice
All inventions described on this page are the subject of provisional patent applications filed with the United States Patent and Trademark Office. Unauthorized reproduction, implementation, or use of these methods and systems may constitute patent infringement upon issuance of corresponding utility patents.