Classifying user behavior as anomalous

    公开(公告)号:US11727311B2

    公开(公告)日:2023-08-15

    申请号:US17870733

    申请日:2022-07-21

    摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for classifying user behavior as anomalous. One of the methods includes obtaining user behavior data representing behavior of a user in a subject system. An initial model is generated from training data, the initial model having first characteristic features of the training data. A resampling model is generated from the training data and from multiple instances of the first representation for a test time period. A difference between the initial model and the resampling model is computed. The user behavior in the test time period is classified as anomalous based on the difference between the initial model and the resampling model.

    CLASSIFYING USER BEHAVIOR AS ANOMALOUS

    公开(公告)号:US20220366309A1

    公开(公告)日:2022-11-17

    申请号:US17870733

    申请日:2022-07-21

    摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for classifying user behavior as anomalous. One of the methods includes obtaining user behavior data representing behavior of a user in a subject system. An initial model is generated from training data, the initial model having first characteristic features of the training data. A resampling model is generated from the training data and from multiple instances of the first representation for a test time period. A difference between the initial model and the resampling model is computed. The user behavior in the test time period is classified as anomalous based on the difference between the initial model and the resampling model.

    OBJECT RELATIONAL MAPPING WITH A SINGLE DATABASE QUERY

    公开(公告)号:US20220027358A1

    公开(公告)日:2022-01-27

    申请号:US16937454

    申请日:2020-07-23

    发明人: Jens SCHAUDER

    摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating an object graph from records of a relational database. One of the methods includes receiving a request to populate a software object with values from a plurality of tables represented in a graph, the plurality of tables stored in a relational database maintained by a database management system, each table comprising one or more respective tuples of values; generating a single query statement that, when executed by the database management system, causes the database management system to retrieve the values from the plurality of tables represented in the graph as a result set; querying the relational database using the single query statement to obtain the result set; and populating the software object with one or more values of the result set.

    Light-weight mirror container
    8.
    发明授权

    公开(公告)号:US10901864B2

    公开(公告)日:2021-01-26

    申请号:US16027195

    申请日:2018-07-03

    摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for allocating a number of first containers to implement one primary segment instance each and a number of second containers to implement one mirror segment instance each. In one example system, the second containers are configured to have less computing resources than the first containers. The containers are distributed among a number of physical computers. The system receives an indication of a failure of a physical computer hosting a particular first container implementing a first primary segment instance. In response to receiving the indication, the system promotes a second mirror segment instance that is a mirror of the first primary segment instance to be a new primary segment instance. The system allocates additional resources to the particular second container implementing the promoted mirror segment instance.

    License compliance analysis platform

    公开(公告)号:US10747852B1

    公开(公告)日:2020-08-18

    申请号:US15811448

    申请日:2017-11-13

    摘要: Methods, systems, and computer-readable media for managing license compliance in software development. A license analyzer receives a triggering event for analyzing license obligations associated with a software package. In response, the license analyzer performs a first scan on dependencies in the software package to determine libraries included in the software package and declared licenses in the included libraries. The license analyzer performs a second scan on source files in the software package to detect, based on license indicators present in the source files, licenses implicitly used in the software package. The license analyzer generates a compliance document specifying the license obligations based on results of the scans.

    Secure binding workflow
    10.
    发明授权

    公开(公告)号:US10693968B2

    公开(公告)日:2020-06-23

    申请号:US16129517

    申请日:2018-09-12

    IPC分类号: G06F15/16 H04L29/08 H04L29/06

    摘要: Methods, systems, and computer programs encoded on computer storage media, for binding service credentials to an application. One example system receives a service bind request for an application in a cloud application platform. The service bind request includes a request to bind a service provided by a service host in the cloud application platform. The service bind request specifies (i) an identifier for the service and (ii) a unique identifier for the application. The system receives, from the service host, credentials for the application to access the service. The system provides the credentials to a secure credential hub installed on the cloud application platform. The secure credential hub stores the credentials in association with a credential location identifier. The system grants, to the unique identifier for the application, read access to the credential location identifier. The system stores the credential location identifier as application metadata for the application.