-
公开(公告)号:US20190182167A1
公开(公告)日:2019-06-13
申请号:US15841137
申请日:2017-12-13
Applicant: EntIT Software LLC
Inventor: Abdul WASAY , Alkiviadis SIMITSIS , Martin ARLITT
IPC: H04L12/815 , H04L12/825 , H04L12/26
CPC classification number: H04L47/225 , H04L43/02 , H04L43/026 , H04L43/04 , H04L43/067 , H04L43/0888 , H04L43/16 , H04L47/25
Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions executable by the processor to: access network traffic data pertaining to data flows among nodes in a network; partition the network traffic data into a plurality of windows; for each of the plurality of windows, aggregate data flows between pairs of nodes; compute a data distribution of each of the aggregated data flows; select a summary structure for each of the aggregated data flows based on the computed data distributions of the aggregated data flows; generate a summary of each of the aggregated data flows using the selected summary structures for the aggregated data flows; and store the generated summaries.
-
公开(公告)号:US20190163374A1
公开(公告)日:2019-05-30
申请号:US16179615
申请日:2018-11-02
Applicant: ENTIT SOFTWARE LLC
Inventor: Lokesh Murthy Venkatesh , Nandan Shantharaj , Sunil Turakani
Abstract: In some examples, as part of backing up a plurality of data objects to a target storage system, a system retrieves plural redundancy configuration information associated with respective data objects of the plurality of data objects, and stores backup data objects corresponding to the plurality of data objects in the target storage system using different redundancy schemes according to the retrieved plural redundancy configuration information.
-
公开(公告)号:US10282059B2
公开(公告)日:2019-05-07
申请号:US14921594
申请日:2015-10-23
Applicant: ENTIT SOFTWARE LLC
Inventor: Daniel Freedman , Pavel Kisilev , Anastasia Dubrovina , Sagi Schein , Ruth Bergman
IPC: G06F3/048 , G06F3/0482 , G06K9/00 , G06F3/0481 , G06K9/46 , G06F3/0484
Abstract: In one implementation, a plurality of signature vectors from a multi-dimensional representation of a graphical object is generated. Each of the signature vectors comprises attributes that vary little in response to changes in shape, size, orientation, and visual layer appearance of the graphical object, and each of the signature vectors includes attributes based on operations of integration, differentiation, and transforms on the multi-dimensional representation of the graphical object. Each signature vector is composited into multiple portions from the plurality of signature vectors to define an appearance-invariant signature of the graphical object.
-
公开(公告)号:US20190103963A1
公开(公告)日:2019-04-04
申请号:US15720910
申请日:2017-09-29
Applicant: EntIT Software LLC
Inventor: Cheryl HE , Timothy ROAKE , Luther MARTIN
Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.
-
公开(公告)号:US20190080321A1
公开(公告)日:2019-03-14
申请号:US16093832
申请日:2016-04-22
Applicant: ENTIT SOFTWARE LLC
Inventor: Jesse Mundis , Joshua Lubliner
Abstract: Examples herein involve authorization of use of cryptographic keys based on cryptocurrency payments. An example method includes analyzing a request for a cryptographic key of a key server where the request may be received from a requesting device and the cryptographic key is used to decrypt or encrypt a message of the request, and authorizing use of the cryptographic key to decrypt or encrypt the message based on a balance in a cryptocurrency wallet associated with the request.
-
公开(公告)号:US20190079849A1
公开(公告)日:2019-03-14
申请号:US16077899
申请日:2016-02-17
Applicant: ENTIT SOFTWARE LLC
Inventor: Amitay Korn , Avivi Siman-Tov , Olga Kogan
Abstract: Example implementations relate to simulating an environment. For example, a system for environment simulation may include a simulation engine to build an environment simulation to mimic portions of a real environment relevant to a detected anomaly trend, an acceleration engine to simulate, within the environment simulation, a scenario associated with the detected anomaly at a rate faster than the scenario occurs in the real environment, a abnormal behavior engine to detect a abnormal behavior associated with the scenario, and an adaptation engine to modify a device within the real environment to be adaptive to the scenario, based on the detected abnormal behavior.
-
公开(公告)号:US20190075088A1
公开(公告)日:2019-03-07
申请号:US16084408
申请日:2016-03-18
Applicant: ENTIT SOFTWARE LLC
Inventor: Liqun Chen , Stuart Haber , Tomas Sander
Abstract: Examples disclosed herein relate to data objects associated with private set intersection (PSI). Some examples disclosed herein may enable identifying a set of server elements and a set of data objects. Each data object of the set of data objects may be associated with at least one server element of the set of server elements. Some examples further enable sending the set of server elements and the set of data objects to a client computing device that has a set of client elements. A private set intersection (PSI) between the set of server elements and the set of client elements may be inaccessible by the client computing device, and a subset of the set of data objects that are associated with the PSI may be accessible by the client computing device.
-
公开(公告)号:US20190074969A1
公开(公告)日:2019-03-07
申请号:US16083668
申请日:2016-03-18
Applicant: ENTIT SOFTWARE LLC
Inventor: Terence Spies , Karl Reiner Kappenberger
Abstract: Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a key engine to obtain a first key associated with a first access level, and a second key associated with a second access level. The encrypting device may also include a multi-key encryption engine to encrypt a first portion of the plaintext with the first key, and encrypt a second portion of the plaintext with the second key, where the first portion may include more detailed information than the second portion, and where the first access level may be higher than the second access level.
-
49.
公开(公告)号:US20190065357A1
公开(公告)日:2019-02-28
申请号:US15693175
申请日:2017-08-31
Applicant: EntIT Software LLC
Inventor: Gali BRAFMAN , Gil Baruch , Miroslav NOVAK
IPC: G06F11/36
Abstract: In some examples, continuous integration and continuous deployment (CI/CD) system failure analysis and resolution may include analyzing data for a CI/CD system to identify anomalous tests related to the CI/CD system. A plurality of hypotheses on a cause of failure associated with the CI/CD system may be determined based on a further analysis of the analyzed data. The determined hypotheses may be prioritized based on a confidence level analysis. Failure resolution to prevent failure associated with the CI/CD system may be determine based on a response to one of the prioritized hypotheses. Further, the determined failure resolution may be implemented.
-
公开(公告)号:US20190050872A1
公开(公告)日:2019-02-14
申请号:US16074631
申请日:2016-02-05
Applicant: Xiao-Feng YU , Jun-Qing XIE , Meng GUO , ENTIT SOFTWARE LLC
Inventor: Xiaofeng Yu , Jun Qing Xie , Meng Guo
Abstract: In one example in accordance with the present disclosure, a method for user interest and relationship determination may include distributing a first and a second set of pairs to a plurality of data nodes. The method may also include calculating, on a first data node, a probability of a user's interest in a product based on an observable factor and a latent factor and calculating, on second data node, a probability of a likelihood of a relationship between the user and a second user, based on an observable factor and a latent factor. The method may also include determining a most likely interest and a most likely relationship of the user and predicting a potential interest of the user based on the most likely interest and the most likely relationship.
-
-
-
-
-
-
-
-
-