SYSTEM AND METHOD FOR DATA COMPRESSION AND DECOMPRESSION

    公开(公告)号:US20230214367A1

    公开(公告)日:2023-07-06

    申请号:US17569071

    申请日:2022-01-05

    CPC classification number: G06F16/211 H03M7/30

    Abstract: A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed. Each of the plurality of integers is split to generate a first plurality of numbers respectively paired with a second plurality of numbers. A first tuple is generated based on the first plurality of numbers. A second tuple is generated based on the second plurality of numbers and the first plurality of numbers. The first tuple and the second tuple are stored. A system and computer readable medium enabling the data processing method are further provided.

    Virtual network function enabled secure communication systems and methods

    公开(公告)号:US11689388B2

    公开(公告)日:2023-06-27

    申请号:US17034719

    申请日:2020-09-28

    CPC classification number: H04L12/4641 H04L12/4633 H04L63/1408 H04L63/1441

    Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.

    Creating generic rules in a high dimensional sparse feature space using negative feedback

    公开(公告)号:US11550910B2

    公开(公告)日:2023-01-10

    申请号:US16588704

    申请日:2019-09-30

    Inventor: Peter Kovác

    Abstract: Systems and methods use negative feedback to create generic rules for a high dimensional sparse feature space. A system receives a set of fingerprints, where a fingerprint can be a set of features of a file. The fingerprints can be clustered according to similarity. For each cluster, a proto-rule is created that has a condition for each feature. The proto-rule is simplified using negative feedback to create a well-formed rule having a comparatively small subset of the conditions in the proto-rule that are useful in determining malware. The well-formed rule can be added to a set of rules used in a malware detection system.

    USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHOD

    公开(公告)号:US20220368699A1

    公开(公告)日:2022-11-17

    申请号:US17317707

    申请日:2021-05-11

    Inventor: Allan Thomson

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    Privacy preference based device controls

    公开(公告)号:US11496479B2

    公开(公告)日:2022-11-08

    申请号:US16714318

    申请日:2019-12-13

    Inventor: Rajarshi Gupta

    Abstract: A method for controlling application enabling includes receiving from a user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the user to enable an application via a computing device is detected. Data permission requirements of the application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the application. The multidimensional zone is compared to the multidimensional coordinate, and the user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the user via the computing device, and the application is enabled responsive to the affirmation of the request.

    Updating a toplist for a continuous data stream

    公开(公告)号:US11475014B2

    公开(公告)日:2022-10-18

    申请号:US16721745

    申请日:2019-12-19

    Abstract: Systems and methods maintain a toplist associated with a sliding window having m elements. The toplist can include the top k elements of the sliding window, where k is less than m (typically an order of magnitude or more less than m). As new elements are received from a data stream, a counter associated with the new element is updated and the new element is inserted into the sliding window. If the toplist has less than k elements, the new element is added. Otherwise, if the new element is already in the toplist, its counter value is updated with the new value. Otherwise, if the new element's counter is smaller than the smallest element in toplist, then do nothing. If the new element counter is larger than the smallest counter in the toplist, the smallest element is discarded from the toplist and the new element is inserted.

    Content feed delivery system and method

    公开(公告)号:US11451841B2

    公开(公告)日:2022-09-20

    申请号:US17111086

    申请日:2020-12-03

    Abstract: A method of providing a content feed. The method includes monitoring a plurality of user content streams of a plurality of users on a plurality of computing devices, the plurality of user content streams including a plurality of content instances accessible via a network. A plurality of archetypes are generated based on the plurality of user content streams. A selection of a particular archetype of the plurality of archetypes from a particular user is received on a particular computing device. A particular content stream is determined based on the particular archetype, and the particular content stream is delivered to the particular user via the particular computing device.

    UNIVERSAL VIRTUAL REMOTE CONTROL FOR SMART DEVICES

    公开(公告)号:US20220239523A1

    公开(公告)日:2022-07-28

    申请号:US17649027

    申请日:2022-01-26

    Abstract: A universal virtual device remote control is implemented on a computerized device such as a smart phone. The remote control operates by receiving one or more pictures of a target device, and identifying the target device by comparing the one or more pictures to pictures in a data set. The remote control also receives functional data associated with the identified device from the data set, and presents controls for the physical device to a user based on the received functional data. An input is received from the user in association with one or more of the controls, and a command associated with the input is sent to the identified device based on the functional data associated with the identified device.

    Automatic device selection for private network security

    公开(公告)号:US11316861B2

    公开(公告)日:2022-04-26

    申请号:US16455480

    申请日:2019-06-27

    Inventor: Rajarshi Gupta

    Abstract: A method of selecting devices on a private network for security protection via a network security device comprises classifying devices on the private network into devices that are sometimes protected and devices that are always either protected or not protected. Threats are monitored, the threats comprising at least one of a macro security event and a local security event, the macro security event detected by one or more external systems and the local security event detected by one or more devices local to the private network. When a threat is detected, it is determined whether the detected threat is a threat to one or more devices on the private network classified as devices that are sometimes protected, and if the detected threat is determined to be a threat to the one or more devices that are sometimes protected the one or more devices are protected.

    VIRTUAL NETWORK FUNCTION ENABLED SECURE COMMUNICATION SYSTEMS AND METHODS

    公开(公告)号:US20220103398A1

    公开(公告)日:2022-03-31

    申请号:US17034719

    申请日:2020-09-28

    Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.

Patent Agency Ranking