-
公开(公告)号:US11366959B2
公开(公告)日:2022-06-21
申请号:US16541524
申请日:2019-08-15
发明人: Timothy Yousaf , Yichen Xing , Rhys Brett-Bowen
IPC分类号: G06F40/18 , G06F16/27 , G06F40/174 , G06F40/226 , G06F3/14 , H04L67/1095 , G06F40/197 , G06F3/0481
摘要: A system comprising a computer-readable storage medium storing at least one program and a method for integrating collaborative spreadsheet data into one or more network applications is presented. Spreadsheet data and an application data schema are accessed. The spreadsheet data corresponds to a spreadsheet having one or more validation rules. The application data schema comprises a set of constraints on application data consumed by an application hosted by an application server. A notification is displayed in response to determining that the one or more validation rules exclude at least one constraint from the set of constraints. The notification includes an indication that the application data is unable to be synchronized with the spreadsheet data and specifies one or more additional validation rules to associate with the spreadsheet to trigger synchronization of the application data with the spreadsheet data.
-
公开(公告)号:US11087080B1
公开(公告)日:2021-08-10
申请号:US15901736
申请日:2018-02-21
发明人: Timothy Yousaf , Jeffrey Martin , Jasmine Peterson , Julie Tibshirani , Kevin Ng , Rhys Brett-Bowen , Yichen Xing
IPC分类号: G06F17/00 , G06F40/18 , G06F3/0486
摘要: A system and a method are provided for collaborative data entry and integration. An operation performed by the system and the method include causing a collaborative interface for input to a spreadsheet to be provided via a user interface, receiving a data entry to the spreadsheet via the collaborative interface, validating the received data entry based on one or more validity rules associated with the spreadsheet, capturing a snapshot of the spreadsheet including the validated data entry, and causing at least the validated data entry of the spreadsheet to be integrated into datasets for one or more applications, at least based on the captured snapshot of the spreadsheet.
-
公开(公告)号:US10740342B2
公开(公告)日:2020-08-11
申请号:US15859167
申请日:2017-12-29
发明人: Timothy Yousaf , Alexander Mark , Sharon Hao , David Cohen , Andrew Elder , Daniel Lidor , Joel Ossher , Christopher Richbourg , Joshua Zavilla , Kevin Zhang
IPC分类号: G06F16/24 , G06F16/248 , G06F3/0482
摘要: Implementations for searching and analyzing large, object-oriented data sets in an efficient manner involving innovative user interface features and/or search algorithm functionality are disclosed. In one exemplary embodiment, a system may search for information and/or relationships based on specified search criteria and return results that may be displayed dynamically and further filtered or analyzed. Systems may involve object oriented database(s) and a software layer including a specialized user interface between the user and the database(s). The user interface may comprise various tools as well as predefined and configurable features that enable effective search of the data as well as display of search results that are configurable and readily managed to provide immediate and useful search results. The user interface may display the search results and various associated graphical representations and models, and/or provide tools enabling dynamic manipulation and display of search results or underlying object models, among other things.
-
公开(公告)号:US20190081971A1
公开(公告)日:2019-03-14
申请号:US16186801
申请日:2018-11-12
发明人: Samuel Jones , Timothy Yousaf , Drew Dennison , Vivek Lakshmanan , Joseph Staehle , Samuel Kremin , Maxim Kesin , Taylor Heroux
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
-
公开(公告)号:US11695580B2
公开(公告)日:2023-07-04
申请号:US17159081
申请日:2021-01-26
发明人: David Skiff , Peter Wilczynski , Timothy Yousaf
IPC分类号: G06F15/16 , H04L12/18 , H04L9/40 , H04L51/04 , H04L51/216
CPC分类号: H04L12/1818 , H04L12/1859 , H04L51/04 , H04L63/0245 , H04L63/105 , H04L51/216
摘要: Systems, methods, and non-transitory computer readable media are provided for providing category-sensitive chat channels. A category-sensitive chat channel may be provided. The category-sensitive chat channel may be assigned a given category level. The given category level may determine a scope of content allowed in the category-sensitive chat channel. Information to be posted through the category-sensitive chat channel may be obtained. The obtained information may be filtered based on the given category level. The filtered information may be posted in the category-sensitive chat channel.
-
公开(公告)号:US20220335211A1
公开(公告)日:2022-10-20
申请号:US17664332
申请日:2022-05-20
发明人: Timothy Yousaf , Yichen Xing , Rhys Brett-Bowen
IPC分类号: G06F40/18 , G06F16/27 , G06F40/174 , G06F40/226 , G06F3/14 , H04L67/1095
摘要: A system comprising a computer-readable storage medium storing at least one program and a method for integrating collaborative spreadsheet data into one or more network applications is presented. The method may include accessing an application data schema comprising a set of constraints on application data consumed by an application hosted by an application server. The method may further include accessing a spreadsheet having one or more data validation rules. The method may further include determining whether the one or more data validation rules include the set of constraints. In response to determining the one or more data validation rules include the set of constraints, application data consumed by the application is synchronized with spreadsheet data corresponding to the spreadsheet.
-
公开(公告)号:US20200034417A1
公开(公告)日:2020-01-30
申请号:US16541524
申请日:2019-08-15
发明人: Timothy Yousaf , Yichen Xing , Rhys Brett-Bowen
摘要: A system comprising a computer-readable storage medium storing at least one program and a method for integrating collaborative spreadsheet data into one or more network applications is presented. Spreadsheet data and an application data schema are accessed. The spreadsheet data corresponds to a spreadsheet having one or more validation rules. The application data schema comprises a set of constraints on application data consumed by an application hosted by an application server. A notification is displayed in response to determining that the one or more validation rules exclude at least one constraint from the set of constraints. The notification includes an indication that the application data is unable to be synchronized with the spreadsheet data and specifies one or more additional validation rules to associate with the spreadsheet to trigger synchronization of the application data with the spreadsheet data.
-
公开(公告)号:US20180046801A1
公开(公告)日:2018-02-15
申请号:US15726917
申请日:2017-10-06
发明人: Matthew Falk , Timothy Yousaf , Joseph Staehle , Lucas Lemanowicz , Sebastien Noury , Robin Lim , Michael Glazer
CPC分类号: G06F21/56 , G06F21/6209 , G06F21/6218 , G06F2221/034 , H04L63/105
摘要: Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware file(s) may include one or more automatic analysis techniques. Automatic analysis of may include production and gathering of various items of information related to the suspected malware file(s) including, for example, calculated hashes, file properties, academic analysis information, file execution information, third-party analysis information, and/or the like. The analysis information may be automatically associated with the suspected malware file(s), and a user interface may be generated in which the various analysis information items are presented to a human analyst such that the analyst may quickly and efficiently evaluate the suspected malware file(s). For example, the analyst may quickly determine one or more characteristics of the suspected malware file(s), whether or not the file(s) is malware, and/or a threat level of the file(s).
-
9.
公开(公告)号:US11580680B2
公开(公告)日:2023-02-14
申请号:US16714283
申请日:2019-12-13
发明人: Timothy Yousaf , Drew Dennison , Paul Thoren , Khoa Pham , Eliot Ball , Spencer Tank , John McRaven , Lucas Ray , Jeffrey Tsui
IPC分类号: G06F3/0481 , G06F16/33 , G06F16/332 , G06F16/338 , G06T11/20 , G06F21/55 , G06F21/50
摘要: Embodiments of the present disclosure relate to a data analysis system that may receive data comprising a plurality of raw data items from one or more data sources, such as a monitoring agent located in a monitored network. The received data may be scored using one or more scoring rules and/or algorithms, with raw data items satisfying a score threshold designated as “data item leads.” Raw data items associated with a data item lead may be searched and displayed to the user via an interactive user interface. The data analysis system may be used to execute searches and additional enrichments against the received raw data items. The data analysis system may group received raw data items based upon shared attribute values. The data analysis system may be used to categorize received data and construct timelines, histograms, and/or other visualizations based upon the various attributes of the raw data items.
-
公开(公告)号:US11470102B2
公开(公告)日:2022-10-11
申请号:US16186801
申请日:2018-11-12
发明人: Samuel Jones , Timothy Yousaf , Drew Dennison , Vivek Lakshmanan , Joseph Staehle , Samuel Kremin , Maxim Kesin , Taylor Heroux
IPC分类号: H04L9/40 , G06F21/55 , H04L67/306
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
-
-
-
-
-
-
-
-
-