GENERATING RECOMMENDED INPUTS
    51.
    发明申请

    公开(公告)号:US20190050739A1

    公开(公告)日:2019-02-14

    申请号:US16075846

    申请日:2016-02-08

    Abstract: Example embodiments relate to generating sets of recommended inputs for changing predicted results of a predictive model. The examples disclosed herein access, from a database, a historical set of inputs and results of a predictive model. A function is approximated based on the historical set of inputs and results, and a gradient of the function is computed using a result of the function with respect to a local maximum value of the function. A set of recommended inputs is generated based on the gradient of the function, where a recommended input produces a positive result of the function.

    DETERMINING A FUNCTIONAL STATE OF A SYSTEM UNDER TEST

    公开(公告)号:US20190018748A1

    公开(公告)日:2019-01-17

    申请号:US16069057

    申请日:2016-01-13

    Abstract: Example implementations relate to determining a functional state of a system under test. For example, a system to determine a functional state of a system under test may include a system controller to execute a functional test of the system under test by invoking a subset of a plurality of functional agents to interact with the system under test. Further, the system may include an agent repository to interact with the system controller and store the plurality of functional agents. Also, the system may include a state module to determine a functional state for the system under test by querying each of the subset of functional agents and comparing aggregated results from the subset of functional agents against defined for the system under test.

    ACCESS CONTROL VALUES
    56.
    发明申请

    公开(公告)号:US20180343258A1

    公开(公告)日:2018-11-29

    申请号:US15603675

    申请日:2017-05-24

    Abstract: In some examples, a system receives, from a sender, an access control value generated based on information of a plurality of recipients. The system sends, to the sender, a signed version of the access control value for sending by the sender to the plurality of recipients with an encrypted message. The system receives, from a first recipient a request for a key to decrypt the encrypted message, a signed access control value and recipient information for deriving the access control value. The system determines whether the first recipient is one of the plurality of recipients using the signed access control value and the recipient information.

    ANOMALOUS ENTITY DETERMINATIONS
    57.
    发明申请

    公开(公告)号:US20180337935A1

    公开(公告)日:2018-11-22

    申请号:US15596042

    申请日:2017-05-16

    Abstract: In some examples, a system generates a graphical representation of entities associated with a computing environment, and derives features for the entities represented by the graphical representation, the features comprising neighborhood features and link-based features, a neighborhood feature for a first entity of the entities derived based on entities that are neighbors of the first entity in the graphical representation, and a link-based feature for the first entity derived based on relationships of other entities in the graphical representation with the first entity. The system determines, using a plurality of anomaly detectors based on respective features of the derived features, whether the first entity is exhibiting anomalous behavior.

    MODELS BASED ON DATA AUGMENTED WITH CONCEIVABLE TRANSITIONS

    公开(公告)号:US20180315103A1

    公开(公告)日:2018-11-01

    申请号:US15770899

    申请日:2015-10-29

    CPC classification number: G06Q30/06

    Abstract: According to an example, a model is selected from models including an augmented buyer model based on probabilities of conceivable transitions, and each conceivable transition includes a multi-step transition between a first URL and a second URL via at least one intermediate URL of the website. A user is determined to likely be a buyer or a non-buyer based on interaction data and the selected model. The user is presented with an offer that encourages the user to buy from the website upon the determination that the user is a buyer.

    FORMAT PRESERVING ENCRYPTION OF FLOATING POINT DATA

    公开(公告)号:US20180309733A1

    公开(公告)日:2018-10-25

    申请号:US15496282

    申请日:2017-04-25

    CPC classification number: G06F21/52 G06F5/00 G06F21/6209 G06F2221/2107

    Abstract: Format preserving encryption of floating point data is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive floating point data to be secured, where the floating point data comprises a sign bit, exponent bits and fraction bits. A format preserving encryption (FPE) is applied to the received data, where the FPE is applied separately to the sign bit, the exponent bits and the fraction bits to generate an encrypted floating point data comprising an encrypted sign bit, encrypted exponent bits and encrypted fraction bits. The encrypted floating point data is provided to a service provider as a secure representative of the received data.

Patent Agency Ranking