TECHNIQUES AND ARCHITECTURES FOR SHARING REMOTE RESOURCES AMONG A TRUSTED GROUP OF USERS

    公开(公告)号:US20220345458A1

    公开(公告)日:2022-10-27

    申请号:US17238180

    申请日:2021-04-22

    Abstract: Various techniques and mechanisms for sharing remote resources among a trusted group are disclosed. A credential management agent utilizes a resource credential for a first user to access a secure resource corresponding to the first user for a second user by at least validating a second user and validating a consent of the first user to allow the second user to access the secure resource using the resource credential for the first user. The secure resource resides on a remote server system accessible via one or more application program interfaces (APIs). A platform management agent provides an interface for shared resource-agnostic credential sharing. The platform management agent validates credentials for the second user as belonging to a trusted group and forwards a request for access to the secure resource for the second user to the credential management agent. In response to receiving the resource credential for the first user to access the secure resource, the platform management agent accesses the secure resource on behalf of the second user to allow the second user to utilize the secure resource.

    ESTIMATING PRODUCT ATTRIBUTE PREFERENCES

    公开(公告)号:US20220343389A1

    公开(公告)日:2022-10-27

    申请号:US17230257

    申请日:2021-04-14

    Abstract: Methods, computer readable media, and devices for estimating product attribute preferences are disclosed. One method may include identifying a set of users, a set of products offered to users of the set of users, and a set of product attributes associated with products in the set of products, creating a product embedding matrix, an attribute embedding matrix, a user interaction matrix, a product attribute matrix, and a user attribute matrix, assigning an attribute weight to each product attribute, assigning, for each user, a user attribute weight for each product attribute, and displaying the set of products to a user in a ranked order based on the attribute weights and the user attribute weights assigned to the user.

    EVALUATING CLUSTERING IN CASE OF DATA STEWARDSHIP ACTIONS

    公开(公告)号:US20220342909A1

    公开(公告)日:2022-10-27

    申请号:US17237524

    申请日:2021-04-22

    Abstract: A method, apparatus, and computer-readable medium are disclosed. The method may include receiving a request to merge a first unified profile with a second unified profile, the first and second unified profile each having a set of records grouped according to a set of rules. The method may include merging the first unified profile with the second unified profile to generate a merged unified profile including a merged set of records. The method may include generating an association between the second set of records and the first set of records. The method may include receiving a request to undo the merging. The method may include ingesting, based at least in part on the request to undo the merging, the merged set of records into the automated match process by applying the set of rules and excluding the generated association.

    Secure handling of customer-supplied encryption secrets

    公开(公告)号:US11483135B2

    公开(公告)日:2022-10-25

    申请号:US16777044

    申请日:2020-01-30

    Inventor: Patrick Calahan

    Abstract: An application server sends a public key from an asynchronous key-pair to a user system to encrypt a user encryption secret that forms part of a first encryption key. The application server uses a second encryption key provided by a key derivation server to encrypt a private key from the asynchronous key-pair. The application server then deletes the second encryption key to prevent decryption of the user encryption secret received from the user system. The application server receives the encrypted user encryption secret from the user system and sends a request to the key derivation server to re-encrypt the user encryption secret. The key derivation server uses a key encryption secret to generate the second encryption key and decrypt the private key. The key derivation server uses the decrypted private key to decrypt the user encryption secret and then re-encrypts the first encryption secret to prevent decryption by the application server.

    Systems and methods for out-of-distribution classification

    公开(公告)号:US11481636B2

    公开(公告)日:2022-10-25

    申请号:US16877325

    申请日:2020-05-18

    Abstract: An embodiment provided herein preprocesses the input samples to the classification neural network, e.g., by adding Gaussian noise to word/sentence representations to make the function of the neural network satisfy Lipschitz property such that a small change in the input does not cause much change to the output if the input sample is in-distribution. Method to induce properties in the feature representation of neural network such that for out-of-distribution examples the feature representation magnitude is either close to zero or the feature representation is orthogonal to all class representations. Method to generate examples that are structurally similar to in-domain and semantically out-of domain for use in out-of-domain classification training. Method to prune feature representation dimension to mitigate long tail error of unused dimension in out-of-domain classification. Using these techniques, the accuracy of both in-domain and out-of-distribution identification can be improved.

    Model instantiation mechanism
    207.
    发明授权

    公开(公告)号:US11481365B2

    公开(公告)日:2022-10-25

    申请号:US16563818

    申请日:2019-09-07

    Inventor: Fernando Castano

    Abstract: Techniques and structures to facilitate instantiating a data model, including receiving a parameterized encoding of a data model including one or more scenarios, receiving data from a source, executing one or more operations associated with each of the one or more scenarios to transform the received data and creating a plurality of records for the data model based on the transformed data.

    Adaptable database deployment
    208.
    发明授权

    公开(公告)号:US11481363B2

    公开(公告)日:2022-10-25

    申请号:US16713223

    申请日:2019-12-13

    Inventor: Swaroop Jayanthi

    Abstract: System and methods are described for creating an instance of a database in a cloud computing environment. One method includes receiving a request to deploy an instance of a database in a cloud computing environment, the request including a database deployment model defining deployment of the database instance, building a deployment model decision tree based on the database deployment model, and initializing a cloud deployment strategy using the database deployment model for enabling one or more cloud service providers of the cloud computing environment to deploy the database instance. The method further includes provisioning cloud computing resources for the database instance according to the cloud deployment strategy, initializing sets of services for the database instance according to the deployment model decision tree, creating the database instance, and indicating the database instance as active in the cloud computing environment.

    BOT BUILDER DIALOG MAP
    209.
    发明申请

    公开(公告)号:US20220335268A1

    公开(公告)日:2022-10-20

    申请号:US17746690

    申请日:2022-05-17

    Abstract: This disclosure relates to tools to facilitate the configuration of interactive agents, sometimes referred to as bots, chatbots, virtual robots, or talkbots. Specifically, the disclosure relates to the provision of a map view visualization of an interactive agent. The map view can display a complexity indicator or usage percentage for each dialog and provide an easy mechanism for creation of new dialogs, actions, parameters, rules, and logic.

    Dynamic user ID
    210.
    发明授权

    公开(公告)号:US11477190B2

    公开(公告)日:2022-10-18

    申请号:US16400192

    申请日:2019-05-01

    Abstract: The disclosed subject matter provides authentication between a client device and a server. The server allocates a dynamic user ID contained within an authentication token that is provided to the client device. In response to each successful authentication with the server, a new dynamic user ID is generated and provided to the client device for use in a subsequent authentication session. In generating the new dynamic user ID for the client device, the server invalidates any previously-provided dynamic user IDs for the client device.

Patent Agency Ranking