摘要:
The present disclosure relates a system, method, and computer program for detecting anomalous user network activity based on multiple data sources. The system extracts user event data for n days from multiple data sources to create a baseline behavior model that reflects the user's daily volume and type of IT events. In creating the model, the system addresses data heterogeneity in multi-source logs by categorizing raw events into meta events. Thus, baseline behavior model captures the user's daily meta-event pattern and volume of IT meta events over n days. The model is created using a dimension reduction technique. The system detects any anomalous pattern and volume changes in a user's IT behavior on day n by comparing user meta-event activity on day n to the baseline behavior model. A score normalization scheme allows identification of a global threshold to flag current anomalous activity in the user population.
摘要:
The present disclosure relates to a system, method, and computer program for predicting migraines using machine learning. More specifically, the system predicts the likelihood that a user will have a migraine within a certain period of time (e.g., a month) based on migraine causes/triggers X1 . . . n identified from a migraine pattern built using deep neural networks. The system collects data from the user with respect to his/her profile, his/her migraine incidents (having experienced a migraine or not) and his/her daily habits. Based on these data, it creates the user's migraine pattern and combines this pattern with the migraine patterns from similar users (when necessary). As a result, it is able to predict the probability of getting a migraine within a period of time.
摘要:
The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.
摘要:
The present invention provides a system and method for optimizing a message. Components of a starting message are identified, and at least one rule is applied for modifying at least one message component to create at least one variation of the starting message. Message variants are tested by sending each variant to a sample of people and measuring a response rate for each sent message variant. The measured response rates are used to create an optimal version of the message. In one embodiment, message variants may be created and tested in multiple rounds.
摘要:
The present disclosure describes a system, method, and computer program for identifying and classifying service accounts in a network based on account behavior. For each evaluated account in the network, a plurality of behavior indicators are calculated. The behavior indicators correspond to service account behaviors and, for each account, are calculated based on network events associated with the account. Each behavior indicator is compared to a threshold specific to the corresponding behavior. If one or more behavior indicators for an account satisfies the applicable threshold, the account is deemed to display service account behavior. Consistency in which an account displays service account behavior is factored into classifying accounts as service accounts.
摘要:
The disclosure is directed to a system, method, and computer program for dynamically identify a merchant associated with an authorization request for a payment card, wherein a merchant identifier in the authorization request is unrecognized. A plurality of unique signatures is created for each of a plurality of registered merchants, wherein the signatures for each registered merchant are based on values of merchant attributes associated with the registered merchant. In response to the system receiving an authorization request for a payment card that includes an unrecognized merchant identifier used to process authorization requests, a plurality of unique signatures is generated for the unrecognized merchant based on a combination of merchant attributes in the authorization request. A payment processing system then determines if the signatures match one of the signatures previously created for the registered merchants. If so, the authorization request is identified as originating from the matching registered merchant.
摘要:
The present invention provides a system and method for optimizing a message. Components of a starting message are identified, and at least one rule is applied for modifying at least one message component to create at least one variation of the starting message. Message variants are tested by sending each variant to a sample of people and measuring a response rate for each sent message variant. The measured response rates are used to create an optimal version of the message. In one embodiment, message variants may be created and tested in multiple rounds.
摘要:
The present invention provides a system, method, and software program for enabling a user to view and interact with a visual map in an external application. According to one embodiment of the invention, a visual mapping application creates a file with (i) visual map data and (ii) software code capable of being executed by an external application to display the visual map and provide select visual mapping application in the external application. In one embodiment, such functionality includes the ability to expand and collapse map topics, scroll the map, zoom in and out, follow hypertext links in the map, find content in the map, and print the map. The created file can be thought of as a “visual map player” in that an external application can “play” the created file, resulting in a live map in the external application.
摘要:
The present invention provides a system, method, and software application for enabling a user to view data from an external data source in a visual map, wherein the external data source has a web services interface. Visual mapping software on a computer provides a visual mapping interface in which a user can create, edit, and/or view a visual map. Within the visual mapping interface, the visual mapping software provides the user with an option to obtain data from one or more data sources associated with a web service. In response to the user selecting a data source associated with a web service, the visual mapping software builds a web service request for the web service associated with the selected data source. The visual mapping application makes a call to the applicable web service with the web service request. The visual mapping application subsequently receives data from the web service and transforms the data into a format that can be used to generate visual map data. The visual mapping software then displays the data in a visual map.
摘要:
A system and method is provided for generating a dynamic, user interface that is capable of frequently changing and learning to provide the most relevant information to the user. The method includes executing a plurality of user interface (UI) modules on a computing device. Each UI module is a software component that provides content for display in the user interface. Each UI module determines its own content and its own priority level and bids for user interface space using its determined priority level. A UI controller is executed on the computing device. The UI controller is a software component that receives bids for the UI modules, determines the number of available spots for UI modules in the user interface, and selects UI modules associated with the highest priority for display in the available user interface spots.