CONTEXT INJECTION FOR IMPROVED AI RESPONSE

    公开(公告)号:US20250036674A1

    公开(公告)日:2025-01-30

    申请号:US18458739

    申请日:2023-08-30

    Abstract: A method comprises: receiving a query on a topic from a user associated with user attributes indicative of a user comprehension level on the topic; providing the query to an AI model; receiving from the AI model a response to the query that has a response comprehension level on the topic that is less than the user comprehension level; iteratively adding, to the query, topically-relevant user attributes of the user attributes to produce iterative queries that increase in technical detail on the topic; providing the iterative queries to the AI model; responsive to providing the iterative queries, receiving, from the AI model, iterative responses that increase in technical detail on the topic and have response comprehension levels that increase on the topic; and determining, among the iterative responses, a final response having a response comprehension level that most nearly matches the user comprehension level.

    Identification of network device configuration changes

    公开(公告)号:US11438226B2

    公开(公告)日:2022-09-06

    申请号:US17165364

    申请日:2021-02-02

    Abstract: In one example, a logical representation of a first graph is generated. The first graph indicates a configuration of a network device in a network at a first time. The first graph includes a first node representative of a first configuration block of the network device, a second node representative of a second configuration block of the network device, and a first link that indicates, by connecting the first node and the second node, that the first configuration block is associated with the second configuration block. The logical representation of the first graph is compared to a logical representation of a second graph that indicates an actual or planned configuration of the network device at a second time subsequent to the first time. In response, one or more changes in the configuration of the network device from the first time to the second time are identified.

    Analyzing deployed networks with respect to network solutions

    公开(公告)号:US11456917B2

    公开(公告)日:2022-09-27

    申请号:US16889306

    申请日:2020-06-01

    Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.

    ANALYZING DEPLOYED NETWORKS WITH RESPECT TO NETWORK SOLUTIONS

    公开(公告)号:US20210377114A1

    公开(公告)日:2021-12-02

    申请号:US16889306

    申请日:2020-06-01

    Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.

    TECHNIQUES FOR AUTHENTICATING A USER

    公开(公告)号:US20240395072A1

    公开(公告)日:2024-11-28

    申请号:US18791027

    申请日:2024-07-31

    Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.

    RELATIONSHIP DISCOVERY IN STRUCTURED DATA AND SHORTEST PATH TO DATA

    公开(公告)号:US20250021586A1

    公开(公告)日:2025-01-16

    申请号:US18350143

    申请日:2023-07-11

    Abstract: A method for learning potential correlation of data structures and fields across multiple disparate data sources. The method automatically identifies relationships that exist in multiple data sources to facilitate a data broker that can return the “shortest-path-to-data”. The method includes communicating with a data lake that integrates access to data stored in a plurality of different data sources. The method next includes correlating, via the data lake, data fields in data sets across the plurality of different data sources to identify relationships across the plurality of different data sources. A request to access data is obtained, and the method determines that data for the request is stored in two or more data sources of the plurality of different data sources, selects a particular data source of the two or more data sources and retrieves the data for the request from the particular data source.

    TECHNIQUES FOR AUTHENTICATING A USER

    公开(公告)号:US20230018509A1

    公开(公告)日:2023-01-19

    申请号:US17378013

    申请日:2021-07-16

    Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.

Patent Agency Ranking