SECURITY POLICY ENFORCEMENT
    1.
    发明申请

    公开(公告)号:US20230132635A1

    公开(公告)日:2023-05-04

    申请号:US18091682

    申请日:2022-12-30

    IPC分类号: G06Q30/018 G06Q20/40

    摘要: Requests to perform activity with respect to a customer account can be monitored to attempt to detect fraudulent activity due to compromised customer credentials or other unauthorized access. The unauthorized party can request actions such as to create a new account, mount a snapshot of customer data, and exfiltrate the customer data. Various embodiments monitor such requests and permissions granted to accounts not directly owned by a customer, and can apply automatic mitigations for suspicious activity in order to reduce the risk of exposing data to unauthorized accounts. Such an offering determines mitigations to perform, such as to block, alert, rate limit, or terminate the linked or non-linked account based on account reputation. The detection mechanism can use various heuristics to make mitigation decisions, as may consider factors such as account age, geolocation, access history, device fingerprint, network domain, payment type, prior suspicious activity, and the like.

    Device management using stored network metrics

    公开(公告)号:US11641592B1

    公开(公告)日:2023-05-02

    申请号:US16667683

    申请日:2019-10-29

    IPC分类号: H04W24/04 H04W88/02 G10L15/22

    摘要: Systems and methods for managing network connectivity of speech processing-enabled devices are provided. The speech-enabled device may periodically monitor a variety of metrics related to the network connectivity status of the device, and save those metrics in a local events log. The speech-enabled device may then periodically send those metrics to a remote speech processing management system. Users may then use voice commands to request the status of the speech-enabled device, and the speech-enabled device will send that request to the speech processing management system. The speech processing management system can then retrieve the historical metrics for that device and determine one or more inferences regarding the condition of the device. These inferences are used to diagnose potential network connectivity problems being experienced by the speech-enabled device, and to generate recommendations for remediating those problems. These recommendations may then be provided to the user as verbal instructions for troubleshooting and/or resolving those problems.

    Distributed metric collection for dynamic content delivery network selection using DNS

    公开(公告)号:US11641410B1

    公开(公告)日:2023-05-02

    申请号:US17030759

    申请日:2020-09-24

    摘要: Techniques for dynamic content delivery network (CDN) selection using the domain name service (DNS) protocol are described. A DNS resolver utilizes a network identifier provided within a DNS query seeking to resolve a domain to select between different CDNs. The selection can be based on an analysis of network metric summary data corresponding to the CDNs from the perspective of an approximate location of the requesting client, as determined via the network identifier as a proxy. The selection process and involved network metric types can be configured by the user associated with the domain via a selection policy. Network metrics can be provided by the user or collected based on reported data generated by remote clients through provided metric-generating code, and thereafter transformed into network metric summary data that is used for resolution.

    In-flight reconfigurable hybrid unmanned aerial vehicle

    公开(公告)号:US11639220B1

    公开(公告)日:2023-05-02

    申请号:US16848605

    申请日:2020-04-14

    摘要: This disclosure is directed to an unmanned aerial vehicle (“UAV”) that transitions in-flight between vertical flight configuration and horizontal flight configuration by changing an orientation of the UAV by approximately ninety degrees. The UAV may include propulsion units that are coupled to a wing. The wing may include wing segments rotatably coupled together by pivots that rotate to position the propulsion units around a center of mass of the UAV when the fuselage is oriented perpendicular with the horizon. In this vertical flight configuration, the UAV may perform vertical flight or hover. During the vertical flight, the UAV may cause the wing to extend outward via the pivots such that the wing segments become positioned substantially parallel to one another and the wing resembles a conventional fixed wing. With the wing extended, the UAV assumes a horizontal flight configuration that provides upward lift generated from the wing.

    GLOBAL COLUMN INDEXING IN A GRAPH DATABASE

    公开(公告)号:US20230127055A1

    公开(公告)日:2023-04-27

    申请号:US18145839

    申请日:2022-12-22

    摘要: Methods, systems, and computer-readable media for global column indexing in a graph database are disclosed. A plurality of data elements of a graph database are stored. The triples comprise identifiers, column names, and values. The column names are globally scoped in the graph database and are associated with data types. Indices corresponding to the column names are created. A particular one of the indices comprises one or more of the values associated with the corresponding column name. A query is performed on the graph database using one or more of the indices corresponding to one of more of the column names associated with the query.

    CONSISTENT FILTERING OF MACHINE LEARNING DATA

    公开(公告)号:US20230126005A1

    公开(公告)日:2023-04-27

    申请号:US18146075

    申请日:2022-12-23

    IPC分类号: G06N20/00

    摘要: Consistency metadata, including a parameter for a pseudo-random number source, are determined for training-and-evaluation iterations of a machine learning model. Using the metadata, a first training set comprising records of at least a first chunk is identified from a plurality of chunks of a data set. The first training set is used to train a machine learning model during a first training-and-evaluation iteration. A first test set comprising records of at least a second chunk is identified using the metadata, and is used to evaluate the model during the first training-and-evaluation iteration.