AUTOMATIC MASKING OF SENSITIVE DATA
    21.
    发明申请

    公开(公告)号:US20200042739A1

    公开(公告)日:2020-02-06

    申请号:US16599677

    申请日:2019-10-11

    Abstract: A masking system and method for automatically masking sensitive user information on a webpage is provided. The method includes the steps of identifying a location of the first user data of the first type of sensitive user information on the webpage, updating an initial path to the first user data to account for changes to the initial path detected in response to repeated visits to the webpage, wherein the updated initial path to the first user data is stored as a stable path, locating a second user data associated with a second type of sensitive user information on the webpage, by accessing a central database containing path information to a location of the second user data on the webpage, and masking the first user data and the second user data on the webpage, using the stable path and the path information obtained from the central database.

    Security threat detection using collaborative intelligence

    公开(公告)号:US12229262B2

    公开(公告)日:2025-02-18

    申请号:US17934640

    申请日:2022-09-23

    Abstract: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to generating a security threat prediction. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a prediction component that analyzes a public data graph model to generate a primary security threat determination, wherein the prediction component can further generate a secondary security threat prediction based on the primary security threat determination and on a proprietary data graph model, wherein the proprietary data graph model comprises proprietary security threat data from a source, and wherein the proprietary security threat data has been scrubbed of source-identifiers. An obtaining component can obtain an agreement from the source to share the proprietary security threat data with another source that has access to the proprietary data graph model.

    POSITIONING CAMERA IN METAVERSE
    23.
    发明公开

    公开(公告)号:US20240242421A1

    公开(公告)日:2024-07-18

    申请号:US18155782

    申请日:2023-01-18

    Abstract: Embodiments of present invention provide a method of taking photo in a virtual reality environment. The method includes defining a group that includes multiple entities; detecting multiple directions that the multiple entities are facing based upon orientations of the multiple entities; identifying multiple extension lines that start from the multiple entities in the group and extend in the multiple directions; identifying one or more intersections associated with the multiple directions; identifying one or more connection lines that connect a center of the group to the one or more intersections; defining a camera line based on the one or more connection lines; determining a camera location along the camera line; taking an image of virtual view of the multiple entities by a virtual camera; and providing the image as a photo to the multiple entities in the group. A non-transitory storage medium and a computing environment are also provided.

    Automated Identification of Malware Families Based on Shared Evidences

    公开(公告)号:US20240176880A1

    公开(公告)日:2024-05-30

    申请号:US18536736

    申请日:2023-12-12

    CPC classification number: G06F21/561 G06F21/568 G06N5/02 G06N5/04

    Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.

    Automated identification of malware families based on shared evidences

    公开(公告)号:US11899791B2

    公开(公告)日:2024-02-13

    申请号:US17489725

    申请日:2021-09-29

    CPC classification number: G06F21/561 G06F21/568 G06N5/02 G06N5/04

    Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.

    GRAPH COMPUTING OVER MICRO-LEVEL AND MACRO-LEVEL VIEWS

    公开(公告)号:US20230012202A1

    公开(公告)日:2023-01-12

    申请号:US17368627

    申请日:2021-07-06

    Abstract: Graph computing over micro and macro views includes expanding, with a processor at run-time, a set of nodes to include a node generated in response to received data corresponding to an event query. A first inference of an inference ensemble is determined by traversing a base graph whose nodes are associated with a discriminant power that exceeds a predetermined entity threshold. A second inference of the inference ensemble is determined by traversing a micro-view graph whose nodes are selected based on a number of references that exceeds a predetermined reference threshold. A third inference of the inference ensemble is determined by traversing a macro-view graph having one or more committee nodes and computing for each committee node a macro-node vote and generating a response to the event query based on the inference ensemble.

    SECURED EVENT MONITORING LEVERAGING BLOCKCHAIN

    公开(公告)号:US20180219883A1

    公开(公告)日:2018-08-02

    申请号:US15418050

    申请日:2017-01-27

    CPC classification number: H04L63/1425 H04L63/1441

    Abstract: A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in a chain configuration where sensors communicate with the monitors. The present invention may include receiving a first set of information from the sensor to a primary and backup monitor based on an event. The present invention may include broadcasting the information from the primary and backup monitor to a plurality of monitors and logging the information. The present invention may include receiving a second set of information from within the chain of monitors. The present invention may include determining that the sets of information conflict. The present invention may include marking at least one temporary log within the plurality of temporary logs as conflicting. The present invention may include determining that a conflicting threshold has been exceeded and then generate an audit and recovery plan.

    Real-Time Resource Negotiation with Dynamic Options

    公开(公告)号:US20180191864A1

    公开(公告)日:2018-07-05

    申请号:US15398860

    申请日:2017-01-05

    Abstract: Automatically reserving a requested resource in real-time is provided. In response to posting a resource request message that includes a set of resource request criteria on a network, a set of resource availability options is received from a set of resource service providers via the network using a negotiation communication channel. The set of resource availability options received from the set of resource service providers is ranked based on an amount of matching between constraints of each respective resource availability option and the set of resource request criteria. The set of resource availability options is displayed by rank from a greatest amount to a least amount of matching in a resource negotiation table.

    Generating Solution Keyword Tag Clouds Based on Support Forum Post Analytics

    公开(公告)号:US20180121929A1

    公开(公告)日:2018-05-03

    申请号:US15338666

    申请日:2016-10-31

    CPC classification number: G06Q30/016

    Abstract: Generating a solution keyword tag cloud is provided. Keywords are identified in a question asking how to resolve an issue experienced by a user with a product. The keywords identified in the question are matched with keyword tags included in a set of condition-solution trees corresponding to the product. The solution keyword tag cloud for the product is generated based on the matching of the keywords identified in the question with the keyword tags included in the set of condition-solution trees corresponding to the product. The solution keyword tag cloud is presented in a graphical user interface display on a client device corresponding to the user.

Patent Agency Ranking