Abstract:
Documents are analyzed for best practices and compliance with rules normalized for an industry or an enterprise by identifying, grouping, and scoring clauses. Key clauses in each stored document are identified which distinguish a relationship with restrictions on the principal party. A document set containing potentially conflicting restrictions is scanned for clauses, which mutually conflict. Documents with circular dependencies, obligations on the same resources, commitments to exclusivity, or compel action or inaction are surfaced for renegotiation, risk remediation, or conflict resolution.
Abstract:
A file shard store includes high performance encoding and compaction circuits. An apparatus and its method of operation avoids duplicate storage of file fragments. A plurality of tables control write operations into a plurality of log segments. Shard keys are transferred to uniquely identify fragments of files which may have been previously stored and associated with one or more of client subscribers. An apparatus comprises a plurality of location/subscription tables, a shard transfer circuit, a storage control circuit, an append-to-log circuit coupled to a large storage array, and a log segment compactor circuit.
Abstract:
A network gateway coupled to a backup server on a wide area network which receives and de-duplicates binary objects. The backup server provides selected data segments of binary objects to the gateway to store into a prescient cache (p-cache) store. The network gateway optimizes network traffic by fulfilling a local client request from its local p-cache store instead of requiring further network traffic when it matches indicia of stored data segments stored in its p-cache store with indicia of a first segment of a binary object requested from and received from a remote server.
Abstract:
An apparatus, system, and method for measuring the similarity of binary objects is disclosed. The method determines at least one pattern signature in an Nth binary object, accessing a location in a similarity store which has object identifiers for each of the previous N−1 binary objects which contain the corresponding pattern, and writing the object identifier of the Nth binary object at that same location in the similarity store. Reporting the number of locations in similarity store which contain the object identifiers of two apparently diverse binary objects is a measure of similarity to each other.
Abstract:
A new approach is proposed to support an authorization server to continuously monitor and revoke device access authorization to a plurality of resources. A client device associated with a user or consumer first sends a request to the authorization server for authorization to access or perform certain operations on one or more resources. Upon receiving the request, the authorization server makes an initial authorization determination on whether to grant or deny the request for authorization to the one or more resources by the client device based on the type of the request and/or the one or more resources requested to access. After an initial authorization determination is made, the authorization server continues to monitor the resources being accessed and update the initial authorization determination to the client device in real time. An live update in the authorization determination is then provided to the client device in real time.
Abstract:
Network traffic inspection is disclosed. An application executing on a client device as an operating system that uses a virtual private network (VPN) stack of the operating system intercepts a first IP packet. The application determines that a policy should be applied to the intercepted first IP packet. The policy is applied to the intercepted first IP packet.
Abstract:
A new approach is proposed that contemplates systems and methods to support quick recovery of an appliance by adopting a multi-layered filesystem having a plurality of layers that enables recovery and restoration of the appliance to factory default settings in seconds. In some embodiments, the multi-layered filesystem adopts a copy-on-write paradigm for all I/O operations to the appliance to create and superimpose an overlay layer by copying data from a read-only bottom layer of the appliance for modification and recovery of the appliance. The plurality of layers of the multi-layered filesystem are also tied to a general-purpose reset button or a software interface for implementation of an instant factory reset feature. When a reset signal is sent via the reset button or the software interface, one or more of the plurality of layers of the multi-layered filesystem are modified accordingly to provide a clean factory-reset of the appliance.
Abstract:
A new approach is proposed to support appliance configuration identification and profiling management. An appliance scanning component running on an appliance is configured to scan, examine, and determine current configuration of the appliance including hardware components and/or software components installed on the appliance. The configuration of the appliance is then provided to an appliance profiling engine running on a server, wherein the appliance profiling engine hashes the configuration of the appliance into a unique identifier of the appliance and look up a model of the appliance from an appliance profiling database using the unique identifier as a key. If the configuration of the appliance is not found, the appliance profiling engine identifies discrepancies between the configuration of the appliance and other appliances in the appliance profiling database to determine if the appliance is a new model, a revision of an existing model, or is simply misconfigured.
Abstract:
A new approach is proposed to support software validation and licensing management. An instance of a software component deployed to a physical computing device is configured to request a copy of license of the software component from a license server out-of-band before the software component can be installed and/or booted up on the physical computing device. Upon receiving a request for the copy of license from the instance of the software component, the license server is configured to grant or deny the request based on the current number of copies of license of the software component available. If the request is granted, the instance of the software component is booted up on the physical computing device. During its operation, the instance of the software component continues to communicate with the license server periodically to indicate whether the copy of license assigned by the server is still in use.
Abstract:
A new approach is proposed to support account takeover (ATO) detection based on login attempts by users. The approach relies on assessing fraudulence confidence level of login IP addresses to classify the login attempts by the users. A plurality of attributes/features in one or more user login data logs are extracted and used to build a labeled dataset for training a machine learning (ML) model that relies on statistics of the login attempts to classify and detect fraudulent logins. These attributes make it possible to ascertain if a login attempt or instance by a user is suspicious based on the ML model. In some embodiments, the ML model is trained using anonymized user login data to preserve privacy of the users and a proper level of data anonymization is determined based on the ML model's accuracy in detecting the ATO attacks when trained with different versions of the anonymized data.