Data validation and digestible content object generation

    公开(公告)号:US10861032B2

    公开(公告)日:2020-12-08

    申请号:US16263083

    申请日:2019-01-31

    Abstract: A server may be utilized as a content management server for receiving, validating, and formatting an object for use by a second server. The server may receive a selection of a digital communication message type, receive a set of content data corresponding to the selected message type and an indication of one or more target segments. Based on the selected communication message type, the server may validate the data. If the data is validated, then the server generates a communication message content payload object. The communication message content payload object is formatted based on the requirements of the second server, such that the second server may efficiently process the objects for distribution of communication messages using the data of the object. The second server may generate and transmit previews of messages to the first server, for review and approval by an authorized user.

    Mass encryption management
    582.
    发明授权

    公开(公告)号:US10860727B2

    公开(公告)日:2020-12-08

    申请号:US16667618

    申请日:2019-10-29

    Abstract: Methods, systems, and devices for mass encryption management are described. In some database systems, users may select encryption settings for storing data records at rest. A database may receive a request to perform an encryption process on multiple data records corresponding to a user, for example, based on a user input or a change in encryption settings. A database server may partition the data records for encryption (e.g., encryption, decryption, key rotation, or scheme modification) into one or more data record groups of similar sizes, and may perform the encryption process on one record group at a time (e.g., to reduce overhead in the system). The database server may additionally support restricting user access to the data records being actively processed, estimating resources needed for the processing, determining data record encryption statuses to be displayed by a user device, or some combination of these features.

    Techniques and architectures for managing and analyzing system updates

    公开(公告)号:US10860296B2

    公开(公告)日:2020-12-08

    申请号:US16264546

    申请日:2019-01-31

    Inventor: Billy Ma

    Abstract: Techniques and architectures for managing streamlining validation operations. Tokens to represent at least one of a style characteristic, a script component and a layout element are provided. An update bundle having two or more tokens representing changes from previous versions of corresponding tokens to specify current versions of the tokens, is provided. User interface code is analyzed to determine if the code utilizes the two or more tokens in a manner consistent with the current versions of the tokens. An activity list for tokens in the UI not being used in the manner consistent with the current versions of the tokens is generated.

    KEYBOARD INTERACTION MODEL FOR SOFTWARE BUILDER CANVAS NODES

    公开(公告)号:US20200379786A1

    公开(公告)日:2020-12-03

    申请号:US16430090

    申请日:2019-06-03

    Abstract: A system and method for navigating a modeling canvas used in software development accesses the modeling canvas at a starting active cell containing a node. The modeling canvas contains a grid pattern arranged in rows and columns of cells. Keyboard initiated control commands are received and executed to indicate and select a new active cell containing a node. An aural signal is generated with a screen reader in response to the selection of the new active cell. The aural signal communicates the contents of a label of the node within the new active cell to a user.

    Secure storage and access to sensitive data

    公开(公告)号:US10853515B2

    公开(公告)日:2020-12-01

    申请号:US14486335

    申请日:2014-09-15

    Abstract: A method and system for securely storing and accessing sensitive user data (e.g., personally identifying information or PII) is described. In an aspect, PII is divided into a plurality of separately stored data stores based on what type or field of PII are collected. Each piece of PII data or PII datum is associated with a unique code so as to form data pairs comprising the PII datum and the unique code associated with that PII datum. A tumbler data structure allows secure association of the unique codes for the PII data for each user. Once the tumbler data structure is unlocked, a provider can search and access the PII data of its users.

    DYNAMIC RANKING OF RECOMMENDATION PAIRINGS
    589.
    发明申请

    公开(公告)号:US20200372561A1

    公开(公告)日:2020-11-26

    申请号:US16421524

    申请日:2019-05-24

    Abstract: A prediction model in a database system may be configured to predict, for a given object instance, a respective probability of acceptance for each of a plurality of recommendations. A determination may be made as to whether the prediction model is associated with sufficient training data to produce predictions at a designated accuracy rate. When it is determined that the prediction model is not associated with sufficient training data, for each of a first set of object instances a respective first message may be sent that includes a respective first one of the recommendations determined based on a static ranking rule applying one or more criteria to one or more object fields associated with the respective object instance. The prediction model may be updated to include additional training data based on a plurality of responses corresponding to a respective first one of the recommendations.

    SYSTEMS AND METHODS FOR VERIFICATION OF DISCRIMINATIVE MODELS

    公开(公告)号:US20200372339A1

    公开(公告)日:2020-11-26

    申请号:US16592474

    申请日:2019-10-03

    Abstract: Verification of discriminative models includes receiving an input; receiving a prediction from a discriminative model for the input; encoding, using an encoder, a latent variable based on the input; decoding, using a decoder, a reconstructed input based on the prediction and the latent variable; and determining, using an anomaly detection module, whether the prediction is reliable based on the input, the reconstructed input, and the latent variable. The encoder and the decoder are jointly trained to maximize an evidence lower bound of the encoder and the decoder. In some embodiments, the encoder and the decoder are further trained using a disentanglement constraint between the prediction and the latent variable. In some embodiments, the encoder and the decoder are further trained without using inputs that are out of a distribution of inputs used to train the discriminative model or that are adversarial to the discriminative model.

Patent Agency Ranking