Extending a classification database by user interactions

    公开(公告)号:US11256859B2

    公开(公告)日:2022-02-22

    申请号:US15272961

    申请日:2016-09-22

    Inventor: Pavel Studenÿ

    Abstract: Web page items and other requests can be automatically categorized. An interaction with a web page item can be categorized based on previous categorizations of other web page items in which the same or similar data has been entered into a web page. A classification database containing categories of classified web page items is maintained. An interaction database containing interaction records of a user is maintained. The interaction records include a value corresponding to the user and a web page item. A web page item on a web page visited by a user and that is a user-fillable field that has been previously categorized in the classification database may be automatically populated with a value stored in an interaction database and that corresponds to the user and the user-fillable field.

    Length of the longest common subsequence algorithm optimization

    公开(公告)号:US11170053B2

    公开(公告)日:2021-11-09

    申请号:US15178235

    申请日:2016-06-09

    Abstract: Systems and methods perform various optimizations of an LLCS algorithm for use in determining if a set of input sequences are similar to a query sequence. The optimizations include filtering out sequence from the set of input sequences where the estimated similarity of the sequence with the query sequence is below a threshold value. The remaining sequences can then be provided to an LLCS algorithm where the output of the LLCS algorithm is used in a similarity function to determine an actual similarity of an input sequence with a query sequence.

    REDUCING BATTERY IMPACT OF NETWORK DEVICE ARP SPOOFING

    公开(公告)号:US20210211402A1

    公开(公告)日:2021-07-08

    申请号:US16736492

    申请日:2020-01-07

    Abstract: A private network device such as a security device is inserted in a private network using ARP spoofing, which includes sending periodic ARP packets from the private network device to a router and to client devices to ensure the private network device spoofing remains intact. The private network device determines when at least one of the one or more private network devices is inactive, such as by monitoring the network for activity between the devices and a router, and suspends sending the periodic ARP packets to the client devices when they are inactive.

    ENDPOINT SECURITY DOMAIN NAME SERVER AGENT

    公开(公告)号:US20210136037A1

    公开(公告)日:2021-05-06

    申请号:US16668861

    申请日:2019-10-30

    Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example processing the received DNS request comprises identifying the client device, end user, and the DNS request to a cloud-based DNS server, and processing a response received from the cloud-based DNS server received in response to the DNS request. The endpoint DNS agent is further operable to distinguish between DNS requests for local domains and remote domains, and to redirect DNS requests for local domains to a local network DNS server.

    COMPRESSION OF ARRAY OF STRINGS WITH SIMILARITIES

    公开(公告)号:US20210097029A1

    公开(公告)日:2021-04-01

    申请号:US16586400

    申请日:2019-09-27

    Inventor: Pavel Cimbál

    Abstract: A method of compressing a string array comprising strings with similarity includes selecting a string compression method from among a plurality of available compression methods based on at least which of the available compression method yields the shortest compressed string. The string is then compressed using the selected string compression method. The array of strings to be compressed comprises text characters represented by a first range of values within a word, and compressed string comprises one or more words in a second range of values dedicated to compression and not overlapping with the first range of values. This process is repeated for additional strings in the string array, such that the compression method used for each of a plurality of strings is independently selected.

    Identifying and protecting personal sensitive documents

    公开(公告)号:US10915657B2

    公开(公告)日:2021-02-09

    申请号:US16037997

    申请日:2018-07-17

    Abstract: Systems and methods obtain personal identity information, identify a user's personal documents containing sensitive information, and can optionally protect the sensitive documents. A user's personal identity information can be obtained from various sources such as operating system, email clients, web browsers, Active Directory or from user's documents. The user's documents on hard drives, cloud storage etc. can be searched. Sensitive documents with personal identities are identified and optionally protected against misuse and theft.

    COMPUTING DEVICE USE RESTRICTION SYSTEM
    140.
    发明申请

    公开(公告)号:US20200210549A1

    公开(公告)日:2020-07-02

    申请号:US16235427

    申请日:2018-12-28

    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.

Patent Agency Ranking