Spoken language understanding system

    公开(公告)号:US12254867B2

    公开(公告)日:2025-03-18

    申请号:US17856090

    申请日:2022-07-01

    Abstract: A system is provided for a self-learning policy engine that can be used by various spoken language understanding (SLU) processing components. The system also provides for sharing contextual information from processing performed by an upstream SLU component to a downstream SLU component to facilitate decision making by the downstream SLU component. The system also provides for a SLU component to select from a variety of actions to take. A SLU component may implement an instance of the self-learning policy that is specifically configured for the particular SLU component.

    Plug-in energy sensor
    32.
    发明授权

    公开(公告)号:US12253543B1

    公开(公告)日:2025-03-18

    申请号:US16021735

    申请日:2018-06-28

    Abstract: Described implementations monitor potential voltage at a location to determine device usage at the location. The implementations utilize a plug-in energy sensor that is plugged directly into any electrical outlet at the location and measures deviation in voltage at the location. Once plugged into an electrical outlet, the plug-in energy sensor monitors one or more of the lead line and ground, the neutral line and ground, and/or the ground line with respect to a reference for changes in potential voltage at the location. Different devices and different device states of those devices generate different signatures of voltage as they operate, thereby making the signatures unique, or almost unique, to different device types, different devices, and/or different device states. By monitoring for signatures in the voltage, operation of devices in different device states at the location can be determined, along with start times and stop times of those states associated with the various devices.

    Network connection monitoring
    34.
    发明授权

    公开(公告)号:US12244483B1

    公开(公告)日:2025-03-04

    申请号:US17535514

    申请日:2021-11-24

    Abstract: In networks, some communication links may be provided as part of a network overlay. Technologies are disclosed for monitoring/analyzing targeted networks (e.g., network overlays) using probe packets sent from outside of the targeted networks/overlays. The probe packets are configured to include a stack of headers, including indications of UDP source ports, which are respectively examined in order at network devices in the targeted network to determine a routing scheme to utilize to route the packet.

    Testing for unchanged passwords in IoT devices

    公开(公告)号:US12242593B1

    公开(公告)日:2025-03-04

    申请号:US17543593

    申请日:2021-12-06

    Abstract: An agent running on an IoT device of a client's network may receive a default password from a provider network and use the received default password to determine whether the password assigned to the IoT device has been changed from the default password to a different one. The agent may retrieve a salt string, a hashing algorithm, and a hashed string from a password database of the IoT device, combine the salt string with the received default password to generate a salted default password, and apply the hashing algorithm to the salted default password to generate a new hashed string. The agent may then compare the new hashed string to the hashed string retrieved from the password database. If they match, then the agent sends an indication to the provider network that the default password is still assigned to the IoT device.

    Managed lifecycle roles for secure credential vending

    公开(公告)号:US12242591B2

    公开(公告)日:2025-03-04

    申请号:US18314076

    申请日:2023-05-08

    Abstract: Managed lifecycle roles are disclosed. Managed lifecycle roles may be used for secure credential vending or otherwise. For instance, an entity (e.g., administrator or other entity) requests, via an interface of a role manager, creation of a role associated with a lifecycle definition (e.g., an expression of an enforceable expiration of the role or similar characteristic). The role manager stores the role and role lifecycle definition to a data store. Another entity requests to use the role to perform some operation with respect to a resource. A credential service validates the request against a lifecycle definition for the role (and against an access control list, in some examples) and responds to valid requests with credentials useable to perform the operation with respect to the resource. The other entity uses the credentials to perform the operation with respect to the resource. A sweep process manages attributes of the roles.

    Systems for determining anomalous interactions based on characteristic types

    公开(公告)号:US12242557B1

    公开(公告)日:2025-03-04

    申请号:US18066854

    申请日:2022-12-15

    Abstract: Anomalous interactions with a website or other system may be detected based on the types of characteristics associated with previous anomalous interactions, independent of the values associated with those characteristics. Historical data is used to determine characteristics of interactions, each characteristic having a type and a value. For historical interactions in which a set of characteristic values are associated with a potentially anomalous interaction, the characteristic types are analyzed in subsequent interactions. If values for those characteristic types occur at a frequency greater than a threshold frequency for a set of subsequent interactions, this may indicate that the interactions are anomalous. Use of the characteristic types for this purpose, rather than historical characteristic values, enables anomalous interactions to be detected independent of the characteristic values associated with the interactions.

Patent Agency Ranking