-
1.
公开(公告)号:US11556868B2
公开(公告)日:2023-01-17
申请号:US16898034
申请日:2020-06-10
IPC分类号: G06Q10/00 , G06Q10/06 , G06F16/28 , G06F16/2457
摘要: Embodiments of the present invention provide systems and methods for automated and intelligent analysis of information. The system receives interaction data, interaction metadata, and external information in order to identify parties of interactions, subjects of interactions, and infer relationships between parties and subjects based on the content, context, frequency, and amount of available interaction data. Weighted score scores are generated and used to rank the inferred relationships and determined relevance between parties and subjects. This data may be stored in a graphical database and later used to response to user data queries to facilitate collaboration.
-
公开(公告)号:US20220318753A1
公开(公告)日:2022-10-06
申请号:US17217948
申请日:2021-03-30
发明人: Michael Ogrinz , Allison Baker , Jeremiah Fellows , Gerard P. Gay , Mark Odiorne , Regina Peyfuss , Susan Teague Rector , Siddhesh V. Wadikar
摘要: Embodiments of the present invention provide a system for performing analysis and generating remediation estimations for user interfaces associated with software applications. The system is configured for crawling one or more software applications associated with an entity, identifying one or more user interface elements associated with the one or more software applications, comparing and analyzing the one or more user interface elements with one or more standards stored in a data repository, and generating one or more remediation estimations associated with modifying the one or more user interface elements to meet the one or more standards based on comparing and analyzing the one or more user interface elements with the one or more standards.
-
3.
公开(公告)号:US11425100B2
公开(公告)日:2022-08-23
申请号:US16930555
申请日:2020-07-16
IPC分类号: H04L9/40 , H04L41/5006
摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.
-
公开(公告)号:US11354325B2
公开(公告)日:2022-06-07
申请号:US16170317
申请日:2018-10-25
发明人: Michael Ogrinz , Heather Linn
IPC分类号: G06F16/248 , G06F16/901 , G06F7/14 , G06F21/55
摘要: Aspects of the disclosure relate to a system for amalgamating a plurality of graphs. The system may include a set of graphs. A user may input search criteria via a user interface (“UI”) module. The system may search the set of graphs for a subset of qualifying graphs that satisfy the search criteria. The subset of graphs may be merged into an amalgamated graph. Merging the graphs may include superimposing the qualifying graphs over each other at a locus. The locus may be a node or a sub-graph. The amalgamated graph may be displayed via the UI module.
-
公开(公告)号:US11258768B2
公开(公告)日:2022-02-22
申请号:US16920482
申请日:2020-07-03
摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.
-
公开(公告)号:US20210209306A1
公开(公告)日:2021-07-08
申请号:US16732417
申请日:2020-01-02
发明人: Elena Kvochko , Michael Ogrinz
IPC分类号: G06F40/30 , H04L12/58 , G06F40/295
摘要: A system for aggregating sentiment analysis of communications between a plurality of entity groups is provided. The system may include a plurality of entity groups. Each entity group may include one entity, two entities or a plurality of entities. The system may include a plurality of communications. Each of the communications may be transmitted from a first entity. A first entity group may include the first entity. The plurality of entity groups may include the first entity group. Each of the communications may be transmitted to a second entity. The second entity may be included in a second entity group. The second entity group may be included in the plurality of entity groups. The system may also include a sentiment score determination module. The sentiment score determination module may determine an aggregate sentiment score for the plurality of communications. The sentiment score may determine a communication threat level.
-
公开(公告)号:US10917491B1
公开(公告)日:2021-02-09
申请号:US16808856
申请日:2020-03-04
摘要: Aspects of the disclosure relate to cognitive automation-based engine processing to propagate data across multiple systems via a private network to overcome technical system, resource consumption, and architecture limitations. Data to be propagated can be manually input or extracted from a digital file. The data can be parsed by analyzing for correct syntax, normalized into first through sixth normal forms, segmented into packets for efficient data transmission, validated to ensure that the data satisfies defined formats and input criteria, and distributed into a plurality of data stores coupled to the private network, thereby propagating data without repetitive manual entry. The data may also be enriched by, for example, correcting for any errors or linking with other potentially related data. Based on data enrichment, recommendations of additional target(s) for propagation of data can be identified. Reports may also be generated. The cognitive automation may be performed in real-time to expedite processing.
-
公开(公告)号:US20190268370A1
公开(公告)日:2019-08-29
申请号:US15903154
申请日:2018-02-23
发明人: Michael Ogrinz , David Hsiang , John C. Checco
摘要: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
-
公开(公告)号:US11410506B2
公开(公告)日:2022-08-09
申请号:US17108109
申请日:2020-12-01
发明人: Matthew E. Carroll , Michael Ogrinz , Nathan Dent
摘要: Aspects of the disclosure relate to processing systems that implement an enhanced reality device to facilitate transactions at a screen-less automated teller machine (ATM). A computing platform may receive a request to initiate a transaction with a screen-less automated ATM. Based on the request to initiate the transaction, the computing platform may send pre-transaction interface information and commands directing the enhanced reality device to generate a pre-transaction interface. The computing platform may receive an authentication request from the screen-less ATM indicating its availability and requesting authentication information. In response to validating the authentication information, the computing platform may generate transaction interface information. The computing platform may send the transaction interface information to the enhanced reality device. The computing platform may receive a transaction completion indication from the screen-less ATM. After receiving the transaction completion indication, the computing platform may send haptic feedback indicating that the transaction is complete.
-
公开(公告)号:US20220086250A1
公开(公告)日:2022-03-17
申请号:US17533351
申请日:2021-11-23
摘要: Aspects of the disclosure relate to cognitive automation-based engine processing to propagate data across multiple systems via a private network to overcome technical system, resource consumption, and architecture limitations. Data to be propagated can be manually input or extracted from a digital file. The data can be parsed by analyzing for correct syntax, normalized into first through sixth normal forms, segmented into packets for efficient data transmission, validated to ensure that the data satisfies defined formats and input criteria, and distributed into a plurality of data stores coupled to the private network, thereby propagating data without repetitive manual entry. The data may also be enriched by, for example, correcting for any errors or linking with other potentially related data. Based on data enrichment, recommendations of additional target(s) for propagation of data can be identified. Reports may also be generated. The cognitive automation may be performed in real-time to expedite processing.
-
-
-
-
-
-
-
-
-