Administration of services executing in cloud platform based datacenters

    公开(公告)号:US11463544B1

    公开(公告)日:2022-10-04

    申请号:US17537240

    申请日:2021-11-29

    Abstract: A cloud infrastructure is configured and deployed for managing services executed on a cloud platform. The cloud infrastructure includes a control datacenter configured to communicate with one or more service datacenters. The service datacenter deploys one or more application programming interfaces (API's) associated with a service. The service datacenter also deploys an administration agent. The control datacenter hosts an engine that receives requests from users to perform administration operations by invoking the administration API's. In this manner, the control datacenter functions as a centralized control mechanism that effectively distributes administration operation requests as they are received from users to service datacenters that can service the requests. The cloud infrastructure provides an auditable, compliant and secure management system for administering services for distributed systems running in the cloud.

    LEVERAGING INDIVIDUAL ENGAGEMENT HISTORY IN ACCOUNT BASED PERSONALIZATION

    公开(公告)号:US20220300988A1

    公开(公告)日:2022-09-22

    申请号:US17206310

    申请日:2021-03-19

    Abstract: Methods, computer readable media, and devices for leveraging individual engagement history in account-based marketing personalization are provided. One method may include receiving information identifying an individual associated with a first business and an interaction between the individual and a second business, creating a new entity contact record, determining a global party identifier to be associated with the new entity contact record, updating the new entity contact record to include the global party identifier, calculating a unified lead score indicating a propensity of the individual as a prospect based on the individual, the first business, and the interaction, updating the new entity contact record to include the unified lead score, and, if the global party identifier is associated with an additional entity contact record, recalculating the unified lead score based on the additional entity contact record and updating the new entity contact record with the recalculated unified lead score.

    Automated authorization response techniques

    公开(公告)号:US11451559B2

    公开(公告)日:2022-09-20

    申请号:US16913967

    申请日:2020-06-26

    Abstract: Techniques are disclosed relating to automating permission requests, e.g., in the context of multi-factor authorization. A mobile device may allow a user to automate responses to future permission requests for multi-factor authorization procedures. The mobile device may automatically respond to subsequent permission requests based on one or more automation criteria. Authorized actions may include login, transaction approval, physical access, vehicle ignition, account recovery, etc. The automation criteria may include location, acceleration, velocity, wireless connectivity, proximity to another device, temperature, lighting, noise, time, biometrics, altitude, pressure, image characteristics, etc. Disclosed techniques may increase authorization security while reducing user interaction for multi-factor authorization, in some embodiments.

    Facilitating mobile device interaction with an enterprise database system

    公开(公告)号:US11449525B2

    公开(公告)日:2022-09-20

    申请号:US16775024

    申请日:2020-01-28

    Inventor: Subrata Ashe

    Abstract: Disclosed are systems, methods, apparatus and computer program products for facilitating voice-based interaction by a mobile device with an enterprise database. In some implementations, a command and a type of enterprise work record are identified in a first one or more voice signals obtained at the mobile device. One or more fields of the identified record type required by the enterprise database to be populated to carry out the identified command is determined. Field data can be identified in a second one or more voice signals obtained at the mobile device. Structured text data comprising the identified command, the identified record type and the identified field data can be sent to a server.

    Communicating information about product or service

    公开(公告)号:US11436636B2

    公开(公告)日:2022-09-06

    申请号:US14833300

    申请日:2015-08-24

    Abstract: In a method for communicating information about a service or product, a record can be retrieved from a database storing records of communications related to a second entity. The record can include information related to an identity of a first entity. The first entity can be defined, at a processor and based upon content of the record, as a member of a set designated to be sent the information about the product or service. The first entity can have previously engaged in a first communication related to the second entity. The second entity can be associated with the product or service. A second communication, which can include the information related to the identity of the first identity, can be sent from the processor to an advertising platform. A third communication, which can include the information about the product or service, can be sent from the processor to the advertising platform.

    Systems and methods for named entity recognition

    公开(公告)号:US11436481B2

    公开(公告)日:2022-09-06

    申请号:US16134957

    申请日:2018-09-18

    Abstract: A method for natural language processing includes receiving, by one or more processors, an unstructured text input. An entity classifier is used to identify entities in the unstructured text input. The identifying the entities includes generating, using a plurality of sub-classifiers of a hierarchical neural network classifier of the entity classifier, a plurality of lower-level entity identifications associated with the unstructured text input. The identifying the entities further includes generating, using a combiner of the hierarchical neural network classifier, a plurality of higher-level entity identifications associated with the unstructured text input based on the plurality of lower-level entity identifications. Identified entities are provided based on the plurality of higher-level entity identifications.

    Generating adaptive match keys
    177.
    发明授权

    公开(公告)号:US11436233B2

    公开(公告)日:2022-09-06

    申请号:US16258217

    申请日:2019-01-25

    Abstract: A system creates graph of nodes connected by edges. Each node represents corresponding value of corresponding attribute and is associated with count of corresponding value. Each edge is associated with count of instances that values represented by corresponding connected nodes are associated with each other. The system identifies each node associated with first count as first set of keys, and deletes each node associated with first count. The system identifies each edge associated with second count as second set of keys, and deletes each edge associated with second count. The system identifies each node associated with third count as third set of keys, and deletes each node associated with third count. The system identifies each edge associated with fourth count as fourth set of keys, and deletes each edge associated with fourth count. The system uses each set of keys to search and match records.

    Query pin planner
    178.
    发明授权

    公开(公告)号:US11436223B2

    公开(公告)日:2022-09-06

    申请号:US15419509

    申请日:2017-01-30

    Abstract: Systems, methods, and computer-readable media for pinning query execution plans are described. A database system may obtain a query, and determine a organization identifier and/or user identifier associated with the query. The database system may identify an optimized plan among a set of query plans that correspond with the query, and may generate a query execution plan based on the query and the optimized plan. The database system may determine a pinned plan that is associated with the optimized plan, and may generate a query execution plan based on the pinned plan when the pinned plan is associated with the optimized plan and corresponds with the organization identifier and/or the user identifier. The database system may generate a query execution plan using optimization functions when the pinned plan is not associated with the pinned plan, or the organization identifier and/or the user identifier. Other embodiments may be described and/or claimed.

    NEURAL NETWORK BASED REPRESENTATION LEARNING FOR NATURAL LANGUAGE PROCESSING

    公开(公告)号:US20220277141A1

    公开(公告)日:2022-09-01

    申请号:US17187608

    申请日:2021-02-26

    Abstract: A machine learning based model generates a feature representation of a text sequence, for example, a natural language sentence or phrase. The system trains the machine learning based model by receiving an input text sequence and perturbing the input text sequence by masking a subset of tokens. The machine learning based model is used to predict the masked tokens. A predicted text sequence is generated based on the predictions of the masked tokens. The system processes the predicted text sequence using the machine learning based model to determine whether a token was predicted or an original token. The parameters of the machine learning based model are adjusted to minimize an aggregate loss based on prediction of the correct word for a masked token and a classification of a word as original or replaced.

    Centralized privacy management system for automatic monitoring and handling of personal data across data system platforms

    公开(公告)号:US11429714B2

    公开(公告)日:2022-08-30

    申请号:US16299851

    申请日:2019-03-12

    Abstract: A method of operating a privacy management system for managing personal data includes receiving a first input indicative of a first user activity in accessing personal data stored within a memory element. The method also includes creating an activity model based on the first input. The activity model is indicative of typical activity in accessing personal data stored in the memory element. The method further includes receiving a second input indicative of a second user activity in accessing personal data stored within the memory element. Also, the method includes recognizing, according to the activity model, the second user activity as being anomalous to the typical activity in accessing personal data stored in the memory element. Moreover, the method includes generating, as a result of recognizing the second user activity as being anomalous, a command that causes at least one of the client devices to perform an anomaly corrective action.

Patent Agency Ranking