EFFICIENT VECTOR COMPARISON FOR EVENT IDENTIFICATION

    公开(公告)号:US20240394332A1

    公开(公告)日:2024-11-28

    申请号:US18693580

    申请日:2022-08-24

    Abstract: A computer implemented method for detecting the existence of a condition indicated by a signature vector sequence of events in an input vector sequence of events, each of the signature and input vector sequences being constituted by an ordered sequence of vectors, can include converting the signature vector sequence into an signature ordered numerical sequence in which each vector in the signature vector sequence is converted to a number indicative of a magnitude of the vector such that the signature numerical sequence is a sequence of magnitudes in the order of the signature vector sequence; converting the input vector sequence into an input ordered numerical sequence in which each vector in the input vector sequence is converted to a number indicative of a magnitude of the vector such that the input numerical sequence is a sequence of magnitudes in the order of the input vector sequence; and determining a degree of similarity of the signature numerical sequence and the input numerical sequence to detect the existence of the condition indicated by the input numerical sequence.

    DETECTING VULNERABLE SOFTWARE SYSTEMS

    公开(公告)号:US20220027477A1

    公开(公告)日:2022-01-27

    申请号:US17309529

    申请日:2019-12-01

    Abstract: A computer implemented method of detecting an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; and comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system.

    GRAPH-BASED CONDITION IDENTIFICATION

    公开(公告)号:US20240394393A1

    公开(公告)日:2024-11-28

    申请号:US18693623

    申请日:2022-08-24

    Abstract: A computer implemented method for detecting the existence of a condition indicated by data represented by a set of input graph data structures can include receiving at least a pair of training graph data structures of nodes and edges wherein each node indicates one or more characteristics of an event and each edge indicates an association between events, and wherein at least a subset of nodes and edges in each training graph relate to the existence of the condition, identifying an association between at least one pair of nodes in which each node of a pair occurs in a disparate training graph and at least one of the pair of nodes relates to the existence of the condition, and generating an edge between the pair of nodes so as to generate a composite training graph including at least a pair of the training graph data structures; extracting a proper subgraph of the composite training graph including at least one of the at least one pair of nodes, such that the proper subgraph indicates the existence of the condition including nodes and edges from each of the pair of graphs for comparison with the set of input graphs to identify an indication of the existence of the condition by the input graphs.

    FEATURE DETECTION WITH NEURAL NETWORK CLASSIFICATION OF IMAGES REPRESENTATIONS OF TEMPORAL GRAPHS

    公开(公告)号:US20220255953A1

    公开(公告)日:2022-08-11

    申请号:US17593626

    申请日:2020-03-18

    Inventor: Robert HERCOCK

    Abstract: A computer implemented method of feature detection in temporal graph data structures of events, the method including receiving a temporal series of graph data structures of events each including a plurality of nodes corresponding to events and edges connecting nodes corresponding to relationships between events; rendering each graph data structure in the series as an image representation of the graph data structure including a representation of nodes and edges in the graph being rendered reproducibly in a cartesian space based on attributes of the nodes and edges, so as to generate a temporal series of image representations ordered according to the temporal graph data structures; processing the series of image representations by a convolutional neural network to classify the image series so as to identify a feature in the image series, the convolutional neural network being trained by a supervised training method including a plurality of training example image series in which a subset of the training examples are classified as including the feature.

    OPTICAL COMPUTING DEVICE
    5.
    发明申请

    公开(公告)号:US20240419205A1

    公开(公告)日:2024-12-19

    申请号:US18719144

    申请日:2022-11-08

    Inventor: Robert HERCOCK

    Abstract: An optical computing device is described which has a plurality of light sources, each light source arranged to generate a photon stream, whereby the plurality of photon streams together represent a data input to be processed. There is a plurality of modulators, each modulator arranged to modulate a photon stream received from one of the light sources, each modulator producing a caustic wavefront. The modulators are positioned relative to one another such that there is interference between the caustic wavefronts. A controller controls the modulators in order to control the interference between the caustic wavefronts such that there is computation of the data input. An output stage outputs light resulting from the interference between the caustic wavefronts, the output light representing the result of optical computation of the data input.

    IDENTIFYING DERIVATIVES OF DATA ITEMS
    6.
    发明公开

    公开(公告)号:US20230274406A1

    公开(公告)日:2023-08-31

    申请号:US18246221

    申请日:2021-09-27

    CPC classification number: G06T7/0002 H04L9/50 G06V10/56

    Abstract: A computer implemented method of determining an association between disparate first and second data items wherein the second data item is at least partly derived from the first data item, the method comprising: evaluating a cryptographic hash to each result of each of a plurality of disparate feature extraction methods, each feature extraction method being applied to each of the first and second data items to generate a set of hashes for each data item; responsive to a non-empty set of hashes in the intersect of the sets of hashes for each data item, identifying an association between the first and second data items.

    REMEDIATING SOFTWARE VULNERABILITIES

    公开(公告)号:US20220027465A1

    公开(公告)日:2022-01-27

    申请号:US17309531

    申请日:2019-12-01

    Abstract: A computer implemented method of remediating an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system, responsive to which iteratively adjusting the software components in the software system and, at each iteration, regenerating an aggregate vector representation for the software system so adjusted to compare with the multiple generations of aggregate vector representations to identify a software component adjustment leading to a change in vector representation not exceeding the maximum threshold degree of change so as to reduce the vulnerability of the software system.

    COMPUTER-IMPLEMENTED VALIDATION METHODS AND SYSTEMS

    公开(公告)号:US20240403468A1

    公开(公告)日:2024-12-05

    申请号:US18694858

    申请日:2022-08-23

    Abstract: A beacon device transmits a challenge message to each of one or more responder devices over a respective direct communication link, inviting each responder device to prove the existence of its respective direct communication link by transmitting to a respective recipient device, distinct from the beacon device, a respective response message indicating knowledge of contents of the challenge message. A predetermined time period after its transmission of the challenge message, the beacon device transmits a confirmation message indicating knowledge of the contents of the challenge message to a message store. A validation device then compares contents of each response message which preceded the confirmation message in time, if any, to contents of the confirmation message and infers therefrom which of the respective responder devices, if any, received the challenge message over the respective direct communication link.

    MODELLING GEOSPATIAL DATA
    10.
    发明申请

    公开(公告)号:US20240395018A1

    公开(公告)日:2024-11-28

    申请号:US18693562

    申请日:2022-08-24

    Abstract: A computer implemented method for detecting an occurrence of an event indicated by a set of data records, the event being associated with an event type, can include receiving a plurality of sets of training data records, each training data record having associated a geospatial indication, wherein the training data records in each set relate to an occurrence of an event of the event type; generating a training bitmap to represent each set of training data records in the plurality of sets, the bitmap defining a representation of a geospatial region including the locations identified by geospatial indications of training data records in the set, and the bitmap including identifications of each training data record in the set mapped into the geospatial region of the bitmap; training an image classifier based on each training bitmap such that the trained classifier is operable to classify an input bitmap as indicating an event of the event type.

Patent Agency Ranking