Resource cluster chaining architecture

    公开(公告)号:US11334393B2

    公开(公告)日:2022-05-17

    申请号:US16736507

    申请日:2020-01-07

    Abstract: A device configured to receive requirements that identifies hardware operating characteristics and to determine a performance metric for the requirements. The device is configured to generate a set of resource cluster configurations that each identify a set of hardware resources and a set of algorithms. The device is further configured to identify a first resource cluster configuration having a first performance value with the highest performance value from among the set of resource cluster configurations. The device is further configured to combine the first resource cluster configuration with a second resource cluster configuration, and to determine a second performance value for the combined resource cluster configuration. The device is further configured to modify the combined resource cluster configuration when the second performance value is less than the first performance value and to output the combined resource cluster configuration when the second performance value is greater than the first performance value.

    RESOURCE CLUSTER CHAINING ARCHITECTURE

    公开(公告)号:US20210208947A1

    公开(公告)日:2021-07-08

    申请号:US16736507

    申请日:2020-01-07

    Abstract: A device configured to receive requirements that identifies hardware operating characteristics and to determine a performance metric for the requirements. The device is configured to generate a set of resource cluster configurations that each identify a set of hardware resources and a set of algorithms. The device is further configured to identify a first resource cluster configuration having a first performance value with the highest performance value from among the set of resource cluster configurations. The device is further configured to combine the first resource cluster configuration with a second resource cluster configuration, and to determine a second performance value for the combined resource cluster configuration. The device is further configured to modify the combined resource cluster configuration when the second performance value is less than the first performance value and to output the combined resource cluster configuration when the second performance value is greater than the first performance value.

    Multiplexed—proactive resiliency system

    公开(公告)号:US10997292B2

    公开(公告)日:2021-05-04

    申请号:US16545179

    申请日:2019-08-20

    Abstract: Methods for machine-learned detection and removal of malicious software within a network are provided. Methods may record environment behavior of an application and a plurality of components. The plurality of components may touch the application. Methods may generate a baseline dataset based on the recorded environment behavior. Methods may schedule snapshots of the application. Methods may take snapshots of the application and the components based on the scheduling. Methods may store the snapshots in a repository. Methods may monitor the application and the components, using the stored snapshots, for any deviation in the environment behavior. Methods may detect a deviation in the behavior of the application or components. Methods may take a snapshot, outside of the scheduling, of the application and components upon detection of the deviation. Methods may determine that the deviation is unwarranted. Methods may revert the application and components back to a previous version.

    Network security system with cognitive engine for dynamic automation

    公开(公告)号:US10958691B2

    公开(公告)日:2021-03-23

    申请号:US16777455

    申请日:2020-01-30

    Abstract: Embodiments of the present invention provide an automated network security system for dynamically managing network security rules. The system uses a cognitive engine to capture network traffic and analyze behavioral data about said network traffic. Based on analysis of the behavioral data, the system may identify one or more vulnerabilities in the network security system and determine one or more changes to the network security rules to remedy the one or more vulnerabilities. The system further uses a robotic process automation system to test and simulate the one or more changes.

    NETWORK SECURITY SYSTEM WITH COGNITIVE ENGINE FOR DYNAMIC AUTOMATION

    公开(公告)号:US20200169585A1

    公开(公告)日:2020-05-28

    申请号:US16777455

    申请日:2020-01-30

    Abstract: Embodiments of the present invention provide an automated network security system for dynamically managing network security rules. The system uses a cognitive engine to capture network traffic and analyze behavioral data about said network traffic. Based on analysis of the behavioral data, the system may identify one or more vulnerabilities in the network security system and determine one or more changes to the network security rules to remedy the one or more vulnerabilities. The system further uses a robotic process automation system to test and simulate the one or more changes.

    Blockchain-Based Digital Token Utilization
    8.
    发明申请

    公开(公告)号:US20200027066A1

    公开(公告)日:2020-01-23

    申请号:US16584442

    申请日:2019-09-26

    Abstract: Methods, systems, and apparatuses for blockchain-based digital token utilization are described herein. Data corresponding to digital tokens may be stored on a blockchain associated with a decentralized peer-to-peer (P2P) network. Smart contracts for collecting digital tokens in exchange for service provider tokens may be deployed to the blockchain. Smart contracts for distributing digital tokens based on credit tokens may be deployed to the blockchain. Through execution of the smart contracts, digital tokens may be utilized by users in various ways.

    Environment mapping and patching synthesis

    公开(公告)号:US10481890B2

    公开(公告)日:2019-11-19

    申请号:US16289830

    申请日:2019-03-01

    Abstract: Method and apparatus for a system to efficiently and with limited disruption of overall activities, install software patches into a target application. The system maps out segments comprising the various system units that interact with the target application and that may be impacted by the patch. A model simulates various possible alternatives for deactivating none, one, some or all of the various units of the segment in identification of an optimal patching strategy. Implementation of the optimal strategy results in efficient patching with minimal disruption of system activities.

    ENVIRONMENT MAPPING AND PATCHING SYNTHESIS
    10.
    发明申请

    公开(公告)号:US20190196803A1

    公开(公告)日:2019-06-27

    申请号:US16289830

    申请日:2019-03-01

    Abstract: Method and apparatus for a system to efficiently and with limited disruption of overall activities, install software patches into a target application. The system maps out segments comprising the various system units that interact with the target application and that may be impacted by the patch. A model simulates various possible alternatives for deactivating none, one, some or all of the various units of the segment in identification of an optimal patching strategy. Implementation of the optimal strategy results in efficient patching with minimal disruption of system activities.

Patent Agency Ranking