GRAPHICAL REPRESENTATION OF A COMPLEX TASK
    21.
    发明申请

    公开(公告)号:US20200342549A1

    公开(公告)日:2020-10-29

    申请号:US16930252

    申请日:2020-07-15

    Abstract: Systems and methods are provided for storing data representing respective sub-elements of a complex task. Data representing one or more links between two or more sub-elements is stored, the links indicating a dependency between said sub-elements. A work order is calculated based on the identified links. A graphical representation of the calculated work order which indicates said sub-elements and their dependencies is provided. The links may indicate a temporal dependency of a second sub-element on a first sub-element and in which the provided graphical representation presents the temporal relationship of the sub-elements. Historical data may be received for association with one or more selected links or sub-elements, the historical data related to a prior event and which affects the temporal relationship between the sub-elements. An updated work order modified by the historical data may be calculated. An updated graphical representation of the work order may be provided.

    Malicious software detection in a computing system
    24.
    发明授权
    Malicious software detection in a computing system 有权
    计算系统中的恶意软件检测

    公开(公告)号:US09558352B1

    公开(公告)日:2017-01-31

    申请号:US14698432

    申请日:2015-04-28

    Abstract: A computer system identifies malicious Uniform Resource Locator (URL) data items from a plurality of unscreened data items that have not been previously identified as associated with malicious URLs. The system can execute a number of pre-filters to identify a subset of URLs in the plurality of data items that are likely to be malicious. A scoring processor can score the subset of URLs based on a plurality of input vectors using a suitable machine learning model. Optionally, the system can execute one or more post-filters on the score data to identify data items of interest. Such data items can be fed back into the system to improve machine learning or can be used to provide a notification that a particular resource within a local network is infected with malicious software.

    Abstract translation: 计算机系统从未被先前识别为与恶意URL相关联的多个未被筛选的数据项中识别恶意统一资源定位符(URL)数据项。 系统可以执行多个预过滤器以识别可能是恶意的多个数据项中的URL的子集。 评分处理器可以使用合适的机器学习模型基于多个输入向量来评分URL的子集。 可选地,系统可以对得分数据执行一个或多个后置过滤器以识别感兴趣的数据项。 这样的数据项目可以反馈到系统中以改进机器学习,或者可以用于提供本地网络中的特定资源被恶意软件感染的通知。

    User-agent data clustering
    25.
    发明授权
    User-agent data clustering 有权
    用户代理数据聚类

    公开(公告)号:US09165299B1

    公开(公告)日:2015-10-20

    申请号:US14139713

    申请日:2013-12-23

    Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.

    Abstract translation: 在各种实施例中,公开了用于从种子生成相关数据集合的集合的系统,方法和技术。 可以根据种子生成策略或规则生成种子。 可以通过例如检索种子,将种子添加到第一群集,检索群集策略或规则,以及基于聚类策略将相关数据和/或数据实体添加到群集来生成群集。 可以基于给定簇中的数据的属性来生成各种聚类分数。 此外,可以基于与集群相关联的各种聚类分数来生成集群组合。 群集可能会根据群集元素进行排名。 各种实施例可以使分析人员能够发现与数据集群相关的各种见解,并且可以适用于各种任务,包括例如税欺诈检测,信标恶意软件检测,恶意软件用户代理检测和/或活动趋势检测 其他。

    Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
    26.
    发明授权
    Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores 有权
    用于动态和交互式同时查询多个数据存储的系统和用户界面

    公开(公告)号:US09116975B2

    公开(公告)日:2015-08-25

    申请号:US14504103

    申请日:2014-10-01

    Abstract: Embodiments of the present disclosure relate to a computer system and interactive user interfaces configured to enable efficient and rapid access to multiple different data sources simultaneously, and by an unskilled user. The unskilled user may provide simple and intuitive search terms to the system, and the system may thereby automatically query multiple related data sources of different types and present results to the user. Data sources in the system may be efficiently interrelated with one another by way of a mathematical graph in which nodes represent data sources and/or portions of data sources (for example, database tables), and edges represent relationships among the data sources and/or portions of data sources. For example, edges may indicate relationships between particular rows and/or columns of various tables. The table graph enables a compact and memory efficient storage of relationships among various disparate data sources.

    Abstract translation: 本公开的实施例涉及被配置为能够同时有效和​​快速地访问多个不同数据源的计算机系统和交互式用户界面,以及由非熟练用户。 不熟练的用户可以向系统提供简单和直观的搜索项,并且系统可以自动地查询不同类型的多个相关数据源并将结果呈现给用户。 系统中的数据源可以通过数学图形来有效地相互关联,其中节点表示数据源和/或数据源(例如,数据库表)的部分,边缘表示数据源和/或 部分资料来源。 例如,边缘可以指示各种表的特定行和/或列之间的关系。 表格可以实现对各种不同数据源之间关系的紧凑和高效的存储。

    Malware data clustering
    27.
    发明授权
    Malware data clustering 有权
    恶意软件数据集群

    公开(公告)号:US08788407B1

    公开(公告)日:2014-07-22

    申请号:US14139603

    申请日:2013-12-23

    Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.

    Abstract translation: 在各种实施例中,公开了用于从种子生成相关数据集合的集合的系统,方法和技术。 可以根据种子生成策略或规则生成种子。 可以通过例如检索种子,将种子添加到第一群集,检索群集策略或规则,以及基于聚类策略将相关数据和/或数据实体添加到群集来生成群集。 可以基于给定簇中的数据的属性来生成各种聚类分数。 此外,可以基于与集群相关联的各种聚类分数来生成集群组合。 群集可能会根据群集元素进行排名。 各种实施例可以使分析人员能够发现与数据集群相关的各种见解,并且可以适用于各种任务,包括例如税欺诈检测,信标恶意软件检测,恶意软件用户代理检测和/或活动趋势检测 其他。

    Presentation and analysis of user interaction data
    28.
    发明授权
    Presentation and analysis of user interaction data 有权
    演示和分析用户交互数据

    公开(公告)号:US08689108B1

    公开(公告)日:2014-04-01

    申请号:US14035889

    申请日:2013-09-24

    CPC classification number: G06Q30/02 G06F17/30539 G06F17/30572

    Abstract: An interactive, graph-based user interaction data analysis system is disclosed. The system is configured to provide analysis and graphical visualizations of user interaction data to a system operator. In various embodiments, interactive visualizations and analyzes provided by the system may be based on user interaction data aggregated across particular groups of users, across particular time frames, and/or from particular computer-based platforms and/or applications. According to various embodiments, the system may enable insights into, for example, user interaction patterns and/or ways to optimize for desired user interactions, among others. In an embodiment, the system allows an operator to analyze and investigate user interactions with content provided via one or more computer-based platforms, software applications, and/or software application editions.

    Abstract translation: 公开了一种交互式的,基于图形的用户交互数据分析系统。 该系统被配置为向系统操作者提供用户交互数据的分析和图形可视化。 在各种实施例中,由系统提供的交互式可视化和分析可以基于在特定时间帧和/或特定的基于计算机的平台和/或应用之间跨特定用户组聚合的用户交互数据。 根据各种实施例,系统可以使诸如用户交互模式和/或对于期望的用户交互进行优化的方式等等。 在一个实施例中,该系统允许操作者分析和调查与通过一个或多个基于计算机的平台,软件应用和/或软件应用版本提供的内容的用户交互。

    Graphical representation of a complex task

    公开(公告)号:US11715167B2

    公开(公告)日:2023-08-01

    申请号:US17578224

    申请日:2022-01-18

    Abstract: Systems and methods are provided for storing data representing respective sub-elements of a complex task. Data representing one or more links between two or more sub-elements is stored, the links indicating a dependency between said sub-elements. A work order is calculated based on the identified links. A graphical representation of the calculated work order which indicates said sub-elements and their dependencies is provided. The links may indicate a temporal dependency of a second sub-element on a first sub-element and in which the provided graphical representation presents the temporal relationship of the sub-elements. Historical data may be received for association with one or more selected links or sub-elements, the historical data related to a prior event and which affects the temporal relationship between the sub-elements. An updated work order modified by the historical data may be calculated. An updated graphical representation of the work order may be provided.

    Malicious software detection in a computing system

    公开(公告)号:US11496509B2

    公开(公告)日:2022-11-08

    申请号:US16935045

    申请日:2020-07-21

    Abstract: A computer system identifies malicious Uniform Resource Locator (URL) data items from a plurality of unscreened data items that have not been previously identified as associated with malicious URLs. The system can execute a number of pre-filters to identify a subset of URLs in the plurality of data items that are likely to be malicious. A scoring processor can score the subset of URLs based on a plurality of input vectors using a suitable machine learning model. Optionally, the system can execute one or more post-filters on the score data to identify data items of interest. Such data items can be fed back into the system to improve machine learning or can be used to provide a notification that a particular resource within a local network is infected with malicious software.

Patent Agency Ranking