Techniques for security artifacts management

    公开(公告)号:US11038861B2

    公开(公告)日:2021-06-15

    申请号:US16211540

    申请日:2018-12-06

    Abstract: Techniques are provided to manage security artifacts. Specifically, a security management system is disclosed for implementing security artifact archives to manage security artifacts. A security artifact archive may include information for managing one or more security artifacts that can be referenced or included in the security artifact archive. The security management system can create, edit, read, send, and perform other management operations for security artifact archives. Objects can be bundled in an object-specific security artifact archive. Security artifact archives may be named, versioned, tagged and/or labeled for identification. Security artifact archives may be transmitted to a destination (e.g., a service provider or a client system) that provides access to an object whose access is dependent on security artifacts. The destination may can manage access to the object using a security artifact archive that includes relevant and current security artifacts for the object.

    SYNTHETIC DOCUMENT GENERATION PIPELINE FOR TRAINING ARTIFICIAL INTELLIGENCE MODELS

    公开(公告)号:US20240005640A1

    公开(公告)日:2024-01-04

    申请号:US17994712

    申请日:2022-11-28

    CPC classification number: G06V10/774 G06V30/413 G06V30/414

    Abstract: Embodiments described herein are directed towards a synthetic document generation pipeline for training artificial intelligence models. One embodiment includes a method including a device that receives an instruction to generate a document to be used as a training instance for a first machine learning model, the instruction including an element configuration, a document class configuration, a format configuration, an augmentation configuration, and data bias and fairness. The device can receive an element from an interface based at least in part on the element configuration, the element can simulate a real-world image, real-world text, or real-world machine-readable visual code. The device can generate metadata describe a layout for the element on the document based on the document class configuration. The device can generate the document by arranging the element on the document based on the metadata, wherein the document is generated in a format based on the format configuration.

    Data encryption service
    4.
    发明授权

    公开(公告)号:US11244061B2

    公开(公告)日:2022-02-08

    申请号:US16510424

    申请日:2019-07-12

    Abstract: A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources. The services may include managing application policies, cryptographic policies, and encryption objects related to applications. The encryption objects may include encryption keys and certificates used to secure the resources. In an embodiment, the data encryption service may be included or implemented in a cloud computing environment and may provide a centralized framework for effectively managing the data encryption requirements of various applications hosted or provided by different customer systems. The disclosed data encryption service may provide monitoring and alert services related to encryption objects managed by the data encryption service and transmit the alerts related to the encryption objects via various communication channels.

    Integrated circuit clock tree visualizer
    6.
    发明授权
    Integrated circuit clock tree visualizer 有权
    集成电路时钟树可视化器

    公开(公告)号:US09275175B2

    公开(公告)日:2016-03-01

    申请号:US14179127

    申请日:2014-02-12

    CPC classification number: G06F17/5022 G06F17/5045 G06F2217/62 G06F2217/74

    Abstract: A system that visualizes a clock tree for an integrated circuit receives an extracted cell library, an extracted clock netlist including clock headers and interconnects, and simulation results. The system generates an internal data structure for the clock headers, and divides the clock headers into a plurality of levels based on the interconnects. The system then orders the clock headers from a lowest level to a highest level, and displays the ordered clock headers in an untangled manner.

    Abstract translation: 可视化集成电路的时钟树的系统接收提取的单元库,提取的时钟网表,包括时钟标题和互连以及模拟结果。 该系统产生用于时钟标头的内部数据结构,并且基于互连将时钟标头划分成多个级别。 系统然后将时钟标头从最低级别排列到最高级别,并以无凸起的方式显示有序的时钟标头。

    Pseudo labelling for key-value extraction from documents

    公开(公告)号:US12106595B2

    公开(公告)日:2024-10-01

    申请号:US18379091

    申请日:2023-10-11

    CPC classification number: G06V30/414 G06V30/19147 G06V30/19173 G06V30/19187

    Abstract: A computing device may access visually rich documents comprising an image and metadata. A graph, based on the image or metadata, can be generated for a visually rich document. The graph's nodes can correspond to words from the visually rich document. Features for nodes can be determined by the device. The device may generate model labeled graphs by assigning a pseudo-label to nodes using a pretrained model. The device may generate a plurality of graph labeled graphs by assigning a pseudo-label to nodes by matching a first node from a first graph to at least a second node from a second graph. The device may generate a plurality of updated graphs by cross referencing labels from the model labeled graphs and the graph labeled graphs. Until a change in labels is below a threshold, a model can be trained to perform key-value extraction using the updated graphs.

    DOMAIN ADAPTING GRAPH NETWORKS FOR VISUALLY RICH DOCUMENTS

    公开(公告)号:US20240289551A1

    公开(公告)日:2024-08-29

    申请号:US18240480

    申请日:2023-08-31

    CPC classification number: G06F40/284

    Abstract: In some implementations, techniques described herein may include identifying text in a visually rich document and determining a sequence for the identified text. The techniques may include selecting a language model based at least in part on the identified text and the determined sequence. Moreover, the techniques may include assigning each word of the identified text to a respective token to generate textual features corresponding to the identified text. The techniques may include extracting visual features corresponding to the identified text. The techniques may include determining positional features for each word of the identified text. The techniques may include generating a graph representing the visually rich document, each node in the graph representing each of the visual features, textual features, and positional features of a respective word of the identified text. The techniques may include training a classifier on the graph to classify each respective word of the identified text.

    Key encryption key (KEK) rotation for multi-tenant (MT) system

    公开(公告)号:US10819513B2

    公开(公告)日:2020-10-27

    申请号:US15948405

    申请日:2018-04-09

    Abstract: An example method facilitates enabling Key Encryption Key (KEK) rotation for a running multi-tenant system without requiring system downtime or interruption. The example method facilitates decrypting a set of one or more DEKs using a preexisting KEK; using a new KEK to re-encode the DEKs using the new KEK, all while simultaneously enabling servicing of tenant requests. This is enabled in part, by strategic caching of tenant DEKs in a secure local memory, wherein the cached tenant DEKs are maintained in the clear and are readily accessible to running processes that are using the DEKs to decrypt and access tenant data, irrespective of the state of a background process used to implement the KEK rotation to the new KEK.

    DATA ENCRYPTION SERVICE AND CUSTOMIZED ENCRYPTION MANAGEMENT
    10.
    发明申请
    DATA ENCRYPTION SERVICE AND CUSTOMIZED ENCRYPTION MANAGEMENT 审中-公开
    数据加密服务和自定义加密管理

    公开(公告)号:US20170004313A1

    公开(公告)日:2017-01-05

    申请号:US15197472

    申请日:2016-06-29

    Abstract: A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources. The services may include managing application policies, cryptographic policies, and encryption objects related to applications. The encryption objects may include encryption keys and certificates used to secure the resources. In an embodiment, the data encryption service may be included or implemented in a cloud computing environment and may provide a centralized framework for effectively managing the data encryption requirements of various applications hosted or provided by different customer systems. The disclosed data encryption service may provide monitoring and alert services related to encryption objects managed by the data encryption service and transmit the alerts related to the encryption objects via various communication channels.

    Abstract translation: 公开了一种用于管理资源数据加密的集中式框架。 公开了提供与资源的数据加密的管理相关的各种服务的数据加密服务。 服务可以包括管理与应用有关的应用策略,加密策略和加密对象。 加密对象可以包括用于保护资源的加密密钥和证书。 在一个实施例中,可以在云计算环境中包括或实现数据加密服务,并且可以提供用于有效管理由不同客户系统托管或提供的各种应用的数据加密要求的集中式框架。 公开的数据加密服务可以提供与由数据加密服务管理的加密对象有关的监视和警报服务,并通过各种通信信道发送与加密对象有关的警报。

Patent Agency Ranking