Smart recommendation engine for preventing churn and providing prioritized insights

    公开(公告)号:US11222377B2

    公开(公告)日:2022-01-11

    申请号:US16146863

    申请日:2018-09-28

    Inventor: Rajarshi Gupta

    Abstract: A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.

    Observation and classification of device events

    公开(公告)号:US11170101B2

    公开(公告)日:2021-11-09

    申请号:US16694123

    申请日:2019-11-25

    Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.

    NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD

    公开(公告)号:US20210288965A1

    公开(公告)日:2021-09-16

    申请号:US16820005

    申请日:2020-03-16

    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.

    PRIVACY PREFERENCE BASED DEVICE CONTROLS

    公开(公告)号:US20210185046A1

    公开(公告)日:2021-06-17

    申请号:US16714318

    申请日:2019-12-13

    Inventor: Rajarshi Gupta

    Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.

    Constructing an inverted index
    115.
    发明授权

    公开(公告)号:US11030151B2

    公开(公告)日:2021-06-08

    申请号:US15940302

    申请日:2018-03-29

    Abstract: Systems and methods create an inverted index for a set of documents utilizing a heap data structure. The documents can be divided into a series of n-grams. The n-grams can be hashed, producing hashed n-gram values. A first hashed n-gram value can be placed into the heap data structure. Operations performed using the heap data structure obtain document identifiers that are associated with documents that include a hashed n-gram value that matches the top n-gram value in the heap.

    Cloud-based anomalous traffic detection and protection in a remote network via DNS properties

    公开(公告)号:US11005871B2

    公开(公告)日:2021-05-11

    申请号:US16245042

    申请日:2019-01-10

    Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.

    SSL/TLS SPOOFING USING TAGS
    117.
    发明申请

    公开(公告)号:US20210136106A1

    公开(公告)日:2021-05-06

    申请号:US16730868

    申请日:2019-12-30

    Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example, the endpoint DNS agent receives an HTTP message from a client browser including a Server Name Identifier tag, and generates a signed certificate spoofing the domain identified in the Server Name Identifier tag to insert itself as a man-in-the-middle between the identified domain and the client browser.

    Computing device use restriction system

    公开(公告)号:US10997278B2

    公开(公告)日:2021-05-04

    申请号:US16235427

    申请日:2018-12-28

    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.

    Normalizing entry point instructions in executable program files

    公开(公告)号:US10909243B2

    公开(公告)日:2021-02-02

    申请号:US16022587

    申请日:2018-06-28

    Abstract: Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer.

Patent Agency Ranking