-
公开(公告)号:US11972255B2
公开(公告)日:2024-04-30
申请号:US17358166
申请日:2021-06-25
摘要: A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences. The method may additionally include determining whether a closest existing control clause exists, providing the generated programming language template to a user responsive to determining that a closest existing control clause does not exist, and receiving feedback from the user regarding the generated programming language template.
-
公开(公告)号:US20220383093A1
公开(公告)日:2022-12-01
申请号:US17330771
申请日:2021-05-26
摘要: A computer system, program code, and a method are provided to leverage an AI model with respect to a target specification for a target standard. The AI model is configured to identify at least one candidate control associated with a corresponding standard. A map is subject to traversal to identify the candidate control in the map. Source and destination controls of the map are leveraged to identify at least one mapped control associated with the target standard. The AI model is selectively subject to training with the mapped control and the target standard.
-
公开(公告)号:US20230155984A1
公开(公告)日:2023-05-18
申请号:US17530185
申请日:2021-11-18
发明人: Constantin Mircea Adam , Nerla Jean-Louis , Hubertus Franke , Edward Charles Snible , Abdulhamid Adebowale Adebayo
IPC分类号: H04L29/06
CPC分类号: H04L63/0281
摘要: Techniques for managing and processing of configuration changes associated with a service container associated with a service mesh are presented. An application management component can determine immutable configuration data (ICD) relating to configuration change processing for the service container based on policies received from an application owner. A message processing component (MMC) of a service proxy associated with the service container can receive, via a control plane, a message associated with an untrusted entity. MMC can determine whether the message comprises a configuration change request relating to interaction between the application and the service mesh, and, if so, can determine whether to allow the service proxy to process the configuration change based on analysis of the configuration change and ICD. If ICD indicates the configuration change is not allowed, service proxy can discard the request. If ICD indicates the configuration change is allowed, service proxy can implement the configuration change.
-
公开(公告)号:US20230229812A1
公开(公告)日:2023-07-20
申请号:US17577978
申请日:2022-01-18
摘要: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to compliance mapping, and more particularly to aggregated mapping of one or more sets of context-based compliance data with standard compliance data, such as from a target domain and one or more associate domains. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a mapping component that can map a compliance control for a target domain based on a model trained by an active learning process that incorporates a plurality of contexts representing relationships between entities and associate domain specific dependencies.
-
公开(公告)号:US20230177169A1
公开(公告)日:2023-06-08
申请号:US17643205
申请日:2021-12-08
发明人: Muhammed Fatih Bulut , Abdulhamid Adebowale Adebayo , Lilian Mathias Ngweta , Ting Dai , Constantin Mircea Adam , Daby Mousse Sow , Steven Ocepek
CPC分类号: G06F21/577 , G06F21/566 , G06N5/04 , G06F2221/034
摘要: An apparatus, a method, and a computer program product are provided that combine policy compliance with vulnerability management to provide a more accurate risk assessment of an environment. The method includes training a policy machine learning model using a first training dataset to generate a policy machine learning model to produce mitigation technique classifications and training a vulnerability machine learning model using a second training dataset to generate a vulnerability machine learning model to produce weakness type classifications. The method also includes mapping the mitigation technique classifications to attack techniques to produce a policy mapping and mapping the weakness type classifications to the attack techniques to produce a vulnerability mapping. The method further includes producing a risk assessment of a vulnerability based on the policy mapping and the vulnerability mapping.
-
公开(公告)号:US20240320687A1
公开(公告)日:2024-09-26
申请号:US18189681
申请日:2023-03-24
发明人: Abdulhamid Adebowale Adebayo , Braulio Gabriel Dumba , Alexei Karve , Robert Filepp , Andrew John Anderson
IPC分类号: G06Q30/018
CPC分类号: G06Q30/018
摘要: A computer implemented method determines a compliance of an application. A number of processor units determines compliance scores resulting from compliance checks performed at each layer in layers in an edge computing network for components for the application running in the layers. The compliance checks performed at each layer are determined using a compliance profile identifying a set of the compliance checks for each component in the application. The number of processor units transmit the compliance scores determined in each layer in the layers upward to a top layer in the layers. The number of processor units aggregate compliance scores received from the components in a lower layer for transmission upward in the layers to the top layer as aggregated compliance scores. The number of processor units determine the compliance for the application using an overall aggregate score determined at the top layer.
-
公开(公告)号:US20240201264A1
公开(公告)日:2024-06-20
申请号:US18081682
申请日:2022-12-14
IPC分类号: G01R31/367 , G01R31/382 , H01M10/42
CPC分类号: G01R31/367 , G01R31/382 , H01M10/4207 , H01M10/4285
摘要: A method for unifying battery-status observability across a plurality of heterogeneous devices includes identifying a plurality of heterogeneous devices where each device includes a battery to power the device. The method monitors battery status of each device of the heterogeneous devices. The method may also access crowdsourced data to determine battery life associated with at least one device of the heterogeneous devices. Using the battery status and potentially the crowdsourced data, the method predicts the remaining battery life for each device of the heterogeneous devices. The method presents the remaining battery life of each of the heterogeneous devices on a unified dashboard. In certain embodiments, a user may be alerted in the event the remaining battery life of a device of the heterogeneous devices falls below a selected threshold. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US20220413847A1
公开(公告)日:2022-12-29
申请号:US17358166
申请日:2021-06-25
摘要: A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences. The method may additionally include determining whether a closest existing control clause exists, providing the generated programming language template to a user responsive to determining that a closest existing control clause does not exist, and receiving feedback from the user regarding the generated programming language template.
-
-
-
-
-
-
-