Systems and methods for recommending software based on user similarity

    公开(公告)号:US10672056B2

    公开(公告)日:2020-06-02

    申请号:US15472474

    申请日:2017-03-29

    Abstract: Systems and methods for determining software recommendations for a user. A first application list of applications installed on a user's computer is received. A distribution score is determined for each application in the first application list. A set of least distributed applications is determined based on the distribution score. A similarity score is determined for each user in a set of users having one or more applications of the set of least distributed applications installed on their respective systems. A second list of applications is determined based on applications installed by users in the set of users having a similarity score above a threshold. Recommendations for applications in the first list of applications are determined based, at least in part, on typicality scores for the applications.

    DEFAULT FILTER SETTING SYSTEM AND METHOD FOR DEVICE CONTROL APPLICATION

    公开(公告)号:US20200099783A1

    公开(公告)日:2020-03-26

    申请号:US16140035

    申请日:2018-09-24

    Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.

    MOBILE LOCATION SECURITY SYSTEM
    143.
    发明申请

    公开(公告)号:US20200008009A1

    公开(公告)日:2020-01-02

    申请号:US16451943

    申请日:2019-06-25

    Inventor: Juyong Do

    Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.

    File clustering using filters working over file attributes

    公开(公告)号:US10248789B2

    公开(公告)日:2019-04-02

    申请号:US15349506

    申请日:2016-11-11

    Inventor: Michal Augustýn

    Abstract: Systems and method classify a file using filters. A file event can be determined for the file. In response to the file event, metadata is received for the file. In response to receiving the metadata, a filter of a plurality of filters is selected based on the metadata. One or more rules in the selected filter can classify the file to determine an action to be performed with respect to the file.

    Accelerated loading of guest virtual machine from live snapshot

    公开(公告)号:US10152255B2

    公开(公告)日:2018-12-11

    申请号:US15636108

    申请日:2017-06-28

    Abstract: Loading a guest virtual machine from a snapshot includes determining a plurality of executable modules loaded in a guest operating system. Hash values for pages of guest physical memory in the snapshot file are determined. Hash values for pages of the executable modules executing in the guest operating system are determined. Matches to the pages in the guest physical memory and the pages of the executable modules are searched for using the hash values. Context information associated with the matching pages in the guest physical memory and the pages of the executable modules is written to the snapshot. The snapshot is modified to link the guest physical memory to the pages of the executable modules.

    NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD

    公开(公告)号:US20250039182A1

    公开(公告)日:2025-01-30

    申请号:US18909465

    申请日:2024-10-08

    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.

    MALWARE ANALYSIS USING GROUP TESTING
    150.
    发明公开

    公开(公告)号:US20240362335A1

    公开(公告)日:2024-10-31

    申请号:US18306861

    申请日:2023-04-25

    CPC classification number: G06F21/577 G06F21/53 G06F2221/033

    Abstract: Malicious activity is identified in a plurality of sequences of computer instructions by identifying a plurality of sequences of computer instructions of interest, and assigning the plurality of sequences of computer instructions into two or more groups. A virtual machine sandbox is executed for each of the two or more groups, and each of the plurality of sequences of computer instructions is executed in the virtual machine sandbox into which the sequence of computer instructions has been assigned. Behavior of the executing instruction sequences is monitored, and is used to determine whether each of the groups has at least one executed sequence of computer instructions that is likely malicious.

Patent Agency Ranking