NETWORK TRAFFIC DATA SUMMARIZATION
    41.
    发明申请

    公开(公告)号:US20190182167A1

    公开(公告)日:2019-06-13

    申请号:US15841137

    申请日:2017-12-13

    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions executable by the processor to: access network traffic data pertaining to data flows among nodes in a network; partition the network traffic data into a plurality of windows; for each of the plurality of windows, aggregate data flows between pairs of nodes; compute a data distribution of each of the aggregated data flows; select a summary structure for each of the aggregated data flows based on the computed data distributions of the aggregated data flows; generate a summary of each of the aggregated data flows using the selected summary structures for the aggregated data flows; and store the generated summaries.

    STORING DATA OBJECTS USING DIFFERENT REDUNDANCY SCHEMES

    公开(公告)号:US20190163374A1

    公开(公告)日:2019-05-30

    申请号:US16179615

    申请日:2018-11-02

    Abstract: In some examples, as part of backing up a plurality of data objects to a target storage system, a system retrieves plural redundancy configuration information associated with respective data objects of the plurality of data objects, and stores backup data objects corresponding to the plurality of data objects in the target storage system using different redundancy schemes according to the retrieved plural redundancy configuration information.

    ZONE BASED KEY VERSION ENCODING
    44.
    发明申请

    公开(公告)号:US20190103963A1

    公开(公告)日:2019-04-04

    申请号:US15720910

    申请日:2017-09-29

    Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.

    AUTHORIZATION OF USE OF CRYPTOGRAPHIC KEYS
    45.
    发明申请

    公开(公告)号:US20190080321A1

    公开(公告)日:2019-03-14

    申请号:US16093832

    申请日:2016-04-22

    Abstract: Examples herein involve authorization of use of cryptographic keys based on cryptocurrency payments. An example method includes analyzing a request for a cryptographic key of a key server where the request may be received from a requesting device and the cryptographic key is used to decrypt or encrypt a message of the request, and authorizing use of the cryptographic key to decrypt or encrypt the message based on a balance in a cryptocurrency wallet associated with the request.

    ENVIRONMENT SIMULATIONS
    46.
    发明申请

    公开(公告)号:US20190079849A1

    公开(公告)日:2019-03-14

    申请号:US16077899

    申请日:2016-02-17

    Abstract: Example implementations relate to simulating an environment. For example, a system for environment simulation may include a simulation engine to build an environment simulation to mimic portions of a real environment relevant to a detected anomaly trend, an acceleration engine to simulate, within the environment simulation, a scenario associated with the detected anomaly at a rate faster than the scenario occurs in the real environment, a abnormal behavior engine to detect a abnormal behavior associated with the scenario, and an adaptation engine to modify a device within the real environment to be adaptive to the scenario, based on the detected abnormal behavior.

    DATA OBJECTS ASSOCIATED WITH PRIVATE SET INTERSECTION (PSI)

    公开(公告)号:US20190075088A1

    公开(公告)日:2019-03-07

    申请号:US16084408

    申请日:2016-03-18

    Abstract: Examples disclosed herein relate to data objects associated with private set intersection (PSI). Some examples disclosed herein may enable identifying a set of server elements and a set of data objects. Each data object of the set of data objects may be associated with at least one server element of the set of server elements. Some examples further enable sending the set of server elements and the set of data objects to a client computing device that has a set of client elements. A private set intersection (PSI) between the set of server elements and the set of client elements may be inaccessible by the client computing device, and a subset of the set of data objects that are associated with the PSI may be accessible by the client computing device.

    PLAINTEXTS ENCRYPTED WITH PLURALITIES OF KEYS

    公开(公告)号:US20190074969A1

    公开(公告)日:2019-03-07

    申请号:US16083668

    申请日:2016-03-18

    Abstract: Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a key engine to obtain a first key associated with a first access level, and a second key associated with a second access level. The encrypting device may also include a multi-key encryption engine to encrypt a first portion of the plaintext with the first key, and encrypt a second portion of the plaintext with the second key, where the first portion may include more detailed information than the second portion, and where the first access level may be higher than the second access level.

    CONTINUOUS INTEGRATION AND CONTINUOUS DEPLOYMENT SYSTEM FAILURE ANALYSIS AND RESOLUTION

    公开(公告)号:US20190065357A1

    公开(公告)日:2019-02-28

    申请号:US15693175

    申请日:2017-08-31

    Abstract: In some examples, continuous integration and continuous deployment (CI/CD) system failure analysis and resolution may include analyzing data for a CI/CD system to identify anomalous tests related to the CI/CD system. A plurality of hypotheses on a cause of failure associated with the CI/CD system may be determined based on a further analysis of the analyzed data. The determined hypotheses may be prioritized based on a confidence level analysis. Failure resolution to prevent failure associated with the CI/CD system may be determine based on a response to one of the prioritized hypotheses. Further, the determined failure resolution may be implemented.

    USER INTEREST AND RELATIONSHIP DETERMINATION
    50.
    发明申请

    公开(公告)号:US20190050872A1

    公开(公告)日:2019-02-14

    申请号:US16074631

    申请日:2016-02-05

    Abstract: In one example in accordance with the present disclosure, a method for user interest and relationship determination may include distributing a first and a second set of pairs to a plurality of data nodes. The method may also include calculating, on a first data node, a probability of a user's interest in a product based on an observable factor and a latent factor and calculating, on second data node, a probability of a likelihood of a relationship between the user and a second user, based on an observable factor and a latent factor. The method may also include determining a most likely interest and a most likely relationship of the user and predicting a potential interest of the user based on the most likely interest and the most likely relationship.

Patent Agency Ranking