LAYERED CYBERSECURITY USING SPURIOUS DATA SAMPLES

    公开(公告)号:US20240283822A1

    公开(公告)日:2024-08-22

    申请号:US18170492

    申请日:2023-02-16

    CPC classification number: H04L63/1491 H04L41/16 H04L63/1416

    Abstract: In some aspects, a computing system may iterate between adding spurious data to the dataset and training a model on the dataset. If the model's performance has not dropped by more than a threshold amount, then additional spurious data may be added to the dataset until the desired amount of performance decrease has been achieved. the computing system may determine the amount of impact each feature has on a model's output. The computing system may generate a spurious data sample by modifying values of features that are more impactful than other features. The computing system may repeatedly modify the spurious data that is stored in a dataset. If a cybersecurity incident occurs (e.g., the dataset is stolen or leaked), the system may identify when the cybersecurity incident took place based on the spurious data that is stored in the dataset.

    COMPUTER-BASED SYSTEMS CONFIGURED TO RESOLVE WEAK LABELING FOR ENTITY RESOLUTION THROUGH NEAREST NEIGHBOR AND METHODS OF USE THEREOF

    公开(公告)号:US20250005383A1

    公开(公告)日:2025-01-02

    申请号:US18343110

    申请日:2023-06-28

    Inventor: Samuel Sharpe

    Abstract: In some embodiments, the present disclosure provides an exemplary method resolving weak labeling of entity records that may include steps of retrieving a plurality of entity records, processing the plurality of entity records with a natural language processing model, classifying by a similarity measure the plurality of entity records, determining embeddings of the entity records, determining feature groups based on a clustering model, determining a search space group rule based on at least one feature of feature groups that is determined to reduce the search space of combinations for weak labeling and merging the resolved plurality of entity records.

    SYSTEMS AND METHODS FOR PROVIDING A SECURE PHYSICAL STORAGE SYSTEM

    公开(公告)号:US20240153327A1

    公开(公告)日:2024-05-09

    申请号:US18416988

    申请日:2024-01-19

    CPC classification number: G07C9/00563 H04L63/083

    Abstract: Disclosed embodiments include systems and methods for providing a secure physical storage system. The system may receive a request to register a first physical storage box from an entity including location information and security information. The request can be validated by comparing the security information to a predetermined security threshold. The location information associated with the first physical storage box can be recorded to a blockchain. The first registration information can be received from a first user device. The first physical storage box can be assigned to the first user device and a first identity token associated with the first physical storage box. The assignment information associated with the first physical storage box can be recorded to the blockchain. A first identity token can be received from the first user device. Instructions can be transmitted to the first physical storage box to transition from a locked to an unlocked state.

    Systems and methods for dynamic modification of events based on bandwidth availability

    公开(公告)号:US11811615B1

    公开(公告)日:2023-11-07

    申请号:US17818952

    申请日:2022-08-10

    CPC classification number: H04L41/16 G06F18/214 G06N20/00 H04L41/0896

    Abstract: Methods and systems are described herein for modifying scheduled events based on bandwidth availability. To modify the scheduled event, the system determines a plurality of user devices corresponding to an event. The system receives first network conditions for a first user device and generates a feature input based on the first network conditions. The system inputs the feature input into an artificial intelligence model to determine a first available bandwidth metric and aggregates the first available bandwidth metric with respective available bandwidth metrics for other user devices of the plurality of user devices to determine a composite available bandwidth metric. The system can compare the composite available bandwidth metric to a threshold available bandwidth metric and in response to determining that the composite available bandwidth metric equals or exceeds the threshold available bandwidth metric, the system generates for display, on a user device interface, a recommendation for modifying the event.

    Comparing code repositories
    7.
    发明授权

    公开(公告)号:US12164867B1

    公开(公告)日:2024-12-10

    申请号:US18356435

    申请日:2023-07-21

    Abstract: In some implementations, a device may obtain a first document set associated with a first code repository. The device may generate a first embedding set of one or more embeddings for respective documents included in the first document set. The device may obtain a second embedding set of one or more embeddings for respective documents included in a second document set associated with a second code repository. The device may compare the first embedding set to the second embedding set. The device may generate a code repository similarity score that indicates a similarity between the first code repository and the second code repository. The device may perform, based on the code repository similarity score satisfying a threshold, an action associated with the first code repository and/or the second code repository.

    SYSTEMS AND METHODS FOR AUTHENTICATION USING PARTITIONED AUTHENTICATION TOKENS

    公开(公告)号:US20240267367A1

    公开(公告)日:2024-08-08

    申请号:US18165915

    申请日:2023-02-07

    CPC classification number: H04L63/0807

    Abstract: Disclosed embodiments may include a method for authentication using partitioned authentication tokens. The system can receive an indication of a first and second user device associated with a user. The indication can include a priority order of the first and second user device. The system can then receive an authentication request associated with the user from an application. The system can generate an authentication token to authenticate the user and partition the authentication token to create a first token portion and a second token portion. The system can determine which device of the first and second user device has a higher priority based on the priority order and can transmit the first token portion and the second token portion to the devices in order of priority. The system can receive a receipt of the token portions and transmit instructions to the application to authenticate the user.

    Systems and methods for generating custom content

    公开(公告)号:US11966449B2

    公开(公告)日:2024-04-23

    申请号:US17896689

    申请日:2022-08-26

    CPC classification number: G06F16/9577 G06F16/958 H04L67/535

    Abstract: Disclosed embodiments may include a system for generating custom content. The system may generate a first webpage comprising first feature(s). The system may transmit the first webpage for display via a graphical user interface (GUI) of a user device. The system may iteratively, until a predetermined threshold is achieved: receive data corresponding to a first user; generate, by an encoder, encoded data based on the data; generate, by a decoder, second feature(s) based on the encoded data; modify the first webpage to generate a second webpage comprising the second feature(s); transmit the second webpage for display via the GUI of the user device; receive user feedback associated with the second webpage; and determine whether the user feedback exceeds the predetermined threshold. Responsive to the predetermined threshold being achieved, the system may transmit the latest version of the second webpage without requesting additional user feedback.

Patent Agency Ranking