-
公开(公告)号:US09720685B2
公开(公告)日:2017-08-01
申请号:US14387627
申请日:2012-03-30
Applicant: Miroslav Novak , Albert Regner , Vojtech Janota
Inventor: Miroslav Novak , Albert Regner , Vojtech Janota
CPC classification number: G06F8/71 , G06F8/33 , G06Q10/06395 , G06Q10/101 , G06Q10/103
Abstract: Disclosed herein is a system and method that determine whether activity pertaining to a software development project violates at least one development rule whose associated severity level exceeds a predetermined threshold.
-
公开(公告)号:US09716587B1
公开(公告)日:2017-07-25
申请号:US13570128
申请日:2012-08-08
Applicant: Xavier Boyen
Inventor: Xavier Boyen
CPC classification number: H04L9/08 , H04L9/0643 , H04L9/0863 , H04L9/0869 , H04L2209/38
Abstract: A halting key derivation function is provided. A setup process scrambles a user-supplied password and a random string in a loop. When the loop is halted by user input, the setup process may generate verification information and a cryptographic key. The key may be used to encrypt data. During a subsequent password verification and key recovery process, the verification information is retrieved, a user-supplied trial password obtained, and both are used together to recover the key using a loop computation. During the loop, the verification process repeatedly tests the results produced by the looping scrambling function against the verification information. In case of match, the trial password is correct and a cryptographic key matching the key produced by the setup process may be generated and used for data decryption. As long as there is no match, the loop may continue indefinitely until interrupted exogenously, such as by user input.
-
公开(公告)号:US09704159B2
公开(公告)日:2017-07-11
申请号:US12467188
申请日:2009-05-15
Applicant: Matthew J. Pauker , Terence Spies
Inventor: Matthew J. Pauker , Terence Spies
CPC classification number: G06Q20/3829 , G06Q20/20 , G06Q20/3674 , G06Q20/3823 , G06Q20/40975 , H04L9/0825 , H04L9/3073 , H04L2209/56
Abstract: Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may use a symmetric key to encrypt payment card information associated with the payment card. The symmetric key may be encrypted at the point-of-sale equipment using the identity-based-encryption (IBE) public key of a purchase transaction processor to produce a key transfer block. The key transfer block and the encrypted payment card information may be conveyed from the point-of-sale equipment to the purchase transaction processor over a communications network. At the purchase transaction processor, an IBE private key may be used to recover the symmetric key from the key transfer block. The symmetric key can be used to decrypt the encrypted payment card information for processing and re-encryption using a key associated with the purchase transaction processor.
-
公开(公告)号:US20240210516A1
公开(公告)日:2024-06-27
申请号:US18585597
申请日:2024-02-23
Applicant: ENTIT SOFTWARE LLC
Inventor: Wei LI , Jie ZHOU , Xiaoqiang WANG
CPC classification number: G01S5/02524 , G01S5/0278 , G01S5/0294 , H04W4/029
Abstract: Examples herein involve estimating a first position of a mobile device based on first communication signals, assigning a first set of particles to a number of respective first sampling locations within a threshold distance of the first position, adjusting the assignment of the first set of particles to second sampling locations based on movement of the mobile device, and estimating a second position of the mobile device based on the second sampling locations.
-
公开(公告)号:US20230273286A1
公开(公告)日:2023-08-31
申请号:US18312962
申请日:2023-05-05
Applicant: ENTIT SOFTWARE LLC
Inventor: Wei LI , Jie ZHOU , Xiaoqiang WANG
CPC classification number: G01S5/02524 , H04W4/029 , G01S5/0278 , G01S5/0294
Abstract: Examples herein involve estimating a first position of a mobile device based on first communication signals, assigning a first set of particles to a number of respective first sampling locations within a threshold distance of the first position, adjusting the assignment of the first set of particles to second sampling locations based on movement of the mobile device, and estimating a second position of the mobile device based on the second sampling locations.
-
66.
公开(公告)号:US11563754B2
公开(公告)日:2023-01-24
申请号:US16284884
申请日:2019-02-25
Applicant: ENTIT Software LLC
Inventor: Pratyusa K. Manadhata , Martin Arlitt
IPC: H04L9/40
Abstract: A service receives, from client computing devices of client networks, information regarding incoming network traffic addressed to dark Internet Protocol (IP) address spaces the of client networks. The service can predict a cyber attack based on the information received from the client computing devices of the client networks. The server computing device notifies the client computing device of each client network affected by the predicted cyber attack.
-
公开(公告)号:US11487780B2
公开(公告)日:2022-11-01
申请号:US15773395
申请日:2015-11-04
Applicant: ENTIT SOFTWARE LLC
Inventor: Alexander Kalinin , Alkis Simitsis , Kevin Wilkinson , Mahashweta Das
IPC: G06F16/25 , G06F16/248 , G06F16/28 , G06F9/54
Abstract: A non-transitory computer readable medium can store machine readable instructions that when accessed and executed by a processing resource cause a computing device to perform operations. The operations can include establishing a connection between data stores (such as a relational data store and a graph engine), wherein the connection includes a shared memory buffer storing data in a data format according to internal structures of the graph engine. The connection between the data stores is bi-directional. The connection enables data that is stored in the shared memory to be processed by either of the graph engine and the relational database. Upon receiving a query, the graph engine or the relational database can be selected to process the data based on a query. The data can be processed by the selected one of the graph engine or the relational database.
-
公开(公告)号:US11449789B2
公开(公告)日:2022-09-20
申请号:US16077591
申请日:2016-02-16
Applicant: ENTIT SOFTWARE LLC
Inventor: George Forman , Hila Nachlieli
Abstract: An example method comprises performing for each class from a plurality of classes: constructing binary training set for the class, the binary training set including labeled cases for that class from the main training set other labeled cases from the main training set; training classifier for the class on the binary training set; computing a local calibration threshold using scores of the labeled cases in the binary training set; and adjusting all scores of the label cases in the binary training set with the local calibration threshold to meet a global decision threshold. The method also comprises determining, with the processor, a global hierarchical calibration threshold by using the adjusted scores for all classes to optimize a performance measurement of all trained classifiers. The method further comprises classifying, with the processor, a new case by using a previously trained classifier, a local calibration threshold, and the global hierarchical calibration threshold.
-
公开(公告)号:US11436133B2
公开(公告)日:2022-09-06
申请号:US16086176
申请日:2016-03-23
Applicant: ENTIT SOFTWARE LLC
Inventor: Inbar Shani , Ilan Shufer , Amichai Nitsan
IPC: G06F11/36 , G06F16/28 , G06F16/25 , G06F3/0484
Abstract: Example implementations relate to comparable UI object identifications. Some implementations may include a data capture engine to capture data points during test executions of the application under test. The data points may include, for example, test action data and application action data. Additionally, some implementations may include a data correlation engine to correlate each of the data points with a particular test execution of the test executions, and each of the data points may be correlated based on a sequence of events that occurred during the particular test execution. Furthermore, some implementations may also automatically identify, based on the correlated data points, a set of comparable UI objects.
-
公开(公告)号:US11256685B2
公开(公告)日:2022-02-22
申请号:US16092522
申请日:2016-04-15
Applicant: ENTIT SOFTWARE LLC
Inventor: Qiming Chen , Meichun Hsu , Malu G. Castellanos
IPC: G06F16/00 , G06F16/242 , G06F16/33
Abstract: In one example in accordance with the present disclosure, a method may include separating a list of keywords into a set of word tokens and a set of wildcard tokens. The method may also include removing each wildcard token in the set of wildcard tokens that is inferred by at least one word token in the set of word tokens and removing each wildcard token in the set of wildcard tokens that is inferred by at least one other wildcard token in the set of wildcard tokens. The method may also include executing a search query comprising a new list of keywords that includes each wildcard token not removed from the set of wildcard tokens.
-
-
-
-
-
-
-
-
-