NEURAL NETWORKS
    11.
    发明公开
    NEURAL NETWORKS 审中-公开

    公开(公告)号:US20230141210A1

    公开(公告)日:2023-05-11

    申请号:US17913606

    申请日:2020-04-10

    CPC classification number: G06N3/04 H04L9/32

    Abstract: The present disclosure relates to a neural network. The neural network may comprise a first portion, comprising a plurality of layers of the neural network, to perform a first cryptographic operation on input data. The neural network may further comprise a second portion, comprising a plurality of layers of the neural network, to perform processing on the data. The neural network may further comprise a third portion, comprising a plurality of layers of the neural network, to perform a second cryptographic operation on the processed data.

    MODIFYING DATA ITEMS
    12.
    发明申请

    公开(公告)号:US20220100900A1

    公开(公告)日:2022-03-31

    申请号:US17414587

    申请日:2019-06-14

    Abstract: In examples, there is provided a method for modifying a data item from a source apparatus, the data item associated with an event, in which the method comprises, within a trusted environment, parsing the data item to generate a set of tuples relating to the event and/or associated with the source apparatus, each tuple comprising a data item, and a data identifier related to the data item, applying a rule to a first tuple to pseudonymise a first data item to provide a transformed data item, and/or generate a contextual supplement to the first data item, generating a mapping between the transformed data item and the first data item, whereby to provide a link between the transformed data item and the first data item to enable subsequent resolution of the first data item using the transformed data item, and forwarding the transformed data item and the data identifier related to the first data item to an analytics engine situated logically outside of the trusted environment.

    MODIFYING RULE SYSTEMS
    13.
    发明申请

    公开(公告)号:US20250148313A1

    公开(公告)日:2025-05-08

    申请号:US18725933

    申请日:2022-01-11

    Abstract: In an example, a method is described. The method comprises receiving an indication of a change to a computing system useable in a computing network. The method further comprises establishing whether a rule system is affected by the change. In response to establishing that the rule system is affected by the change, the method causes the rule system to be modified to account for the change.

    AUTHENTICATION SYSTEM
    20.
    发明申请

    公开(公告)号:US20230011095A1

    公开(公告)日:2023-01-12

    申请号:US17783166

    申请日:2020-01-15

    Abstract: In an example there is provided a method for initiating an auxiliary access protocol in an authentication session. The method comprises providing attestation data attesting to a cause of an outcome of an authentication attempt in an authentication session, accessing a policy to initiate an auxiliary access protocol, determining if the attestation data fulfils a criterion according to the policy and initiating the auxiliary access protocol on the basis of said determination.

Patent Agency Ranking