Internet disruption detection
    1.
    发明授权

    公开(公告)号:US12126487B1

    公开(公告)日:2024-10-22

    申请号:US18209149

    申请日:2023-06-13

    申请人: Two Six Labs, LLC

    摘要: A network disruption detection engine gathers and stores network routing path update messages that routinely modify routing tables used by internet routers for transporting message traffic between a source and a destination. Routing path messages continually maintain a network transport infrastructure both for intranets used for particular entities such as corporations, and internet traffic between arbitrary source and destination nodes. Major disruptions or outages typically result in an increase in routing path messages, typically focused on a particular set, region or network entity where the disruption occurred, as other routing entities seek to avoid the troubled region. Analysis of this sudden activity of routing messages and extracting message content about the network region they seek to avoid allows identification and queries of a widespread network outage.

    Stateless lossless compression
    3.
    发明授权

    公开(公告)号:US11818191B1

    公开(公告)日:2023-11-14

    申请号:US17524263

    申请日:2021-11-11

    申请人: Two Six Labs, LLC

    IPC分类号: H04L65/70

    CPC分类号: H04L65/70

    摘要: An approach for gathering, encoding and transmitting histogram data mitigates the need for transmission resources by compressing the gathered data in a lossless, stateless manner for transmission. A generally sparse data set benefits from an encoding mechanism based on a bit plane arrangement of the raw data. The approach organizes bit planes in a sequential manner, and then encodes values based on intervals of non-zero bit positions. By traversing a sequential string based on the bit plane, each “run” of zeroes tends to produce relatively small values, easing encoding burdens, but also accommodated larger values when necessary. A selective encoding technique invokes different encoding processes based on the magnitude of the interval, to allow use of an encoding that stores each respective value in the fewest bits. Different encoding techniques are applied based on ranges of the interval magnitude, or zero run.

    Dynamic updating of a force approximation data model

    公开(公告)号:US11568106B1

    公开(公告)日:2023-01-31

    申请号:US17381467

    申请日:2021-07-21

    申请人: Two Six Labs, LLC

    IPC分类号: G06F30/20

    摘要: One example method of operation may include creating a force approximation of a number of nodes in a defined space at an initial time (t0), the force approximation being based on a data realization simulation model of an n-body simulation, where n is an integer greater than one. The method may also include determining initial displacement changes of one or more of the nodes within the defined space has occurred in the force approximation, summing the initial displacement changes of the one or more of the nodes to create a summed total displacement, creating an initial displacement threshold (Td) based on the summed total displacement. At a later time (t1), determining additional displacement changes of one or more of the nodes have occurred, summing the additional displacement changes of the one or more of the nodes to create a new summed total displacement, comparing the new summed total displacement to the summed total displacement, and determining whether to create a new force approximation based on the comparison of the new summed total displacement to the summed total displacement.

    Personal information skimmer detection device

    公开(公告)号:US11489848B2

    公开(公告)日:2022-11-01

    申请号:US16580019

    申请日:2019-09-24

    申请人: Two Six Labs, LLC

    摘要: A detection device for identification and isolation of unauthorized skimmer/shimmer devices takes the form of a portable electronics package adapted for deployment under or near a point-of-sale (POS) station that may be targeted by such skimmer. The detection device is intended for placement near or adjacent an electronic exchange of personal, financial, and/or sensitive information from a payment card, mobile device, or similar magnetic, optical, or radio frequency medium. Unscrupulous interception devices periodically transmit gathered information for reception. The detection device monitors transmissions for those having characteristics indicative of the unscrupulously gathered information, and renders an output signal alerting to the presence and location of an illicit capture device.

    Error identification in memory and disk allocation layouts

    公开(公告)号:US11327671B2

    公开(公告)日:2022-05-10

    申请号:US16518056

    申请日:2019-07-22

    申请人: Two Six Labs, LLC

    发明人: Huy Vu

    摘要: One example method of operation may include identifying event block allocations of one or more of data memory and data storage allocations, assigning indicators to the event block allocations based one or more determined statuses associated with the event block allocations, populating a display interface with the event block allocations and the indicators, performing a trace event of the event block allocations, identifying a target event block allocation among the event block allocations, and creating a notification identifying an allocation violation based on the identified target event block allocation.

    Dynamic updating of a force approximation data model

    公开(公告)号:US11087048B2

    公开(公告)日:2021-08-10

    申请号:US16194033

    申请日:2018-11-16

    申请人: Two Six Labs, LLC

    IPC分类号: G06F30/20

    摘要: One example method of operation may include creating a force approximation of a number of nodes in a defined space at an initial time (t0), the force approximation being based on a data realization simulation model of an n-body simulation, where n is an integer greater than one. The method may also include determining initial displacement changes of one or more of the nodes within the defined space has occurred in the force approximation, summing the initial displacement changes of the one or more of the nodes to create a summed total displacement, creating an initial displacement threshold (Td) based on the summed total displacement. At a later time (t1), determining additional displacement changes of one or more of the nodes have occurred, summing the additional displacement changes of the one or more of the nodes to create a new summed total displacement, comparing the new summed total displacement to the summed total displacement, and determining whether to create a new force approximation based on the comparison of the new summed total displacement to the summed total displacement.

    ERROR IDENTIFICATION IN MEMORY AND DISK ALLOCATION LAYOUTS

    公开(公告)号:US20210026533A1

    公开(公告)日:2021-01-28

    申请号:US16518056

    申请日:2019-07-22

    申请人: Two Six Labs, LLC

    发明人: Huy Vu

    摘要: One example method of operation may include identifying event block allocations of one or more of data memory and data storage allocations, assigning indicators to the event block allocations based one or more determined statuses associated with the event block allocations, populating a display interface with the event block allocations and the indicators, performing a trace event of the event block allocations, identifying a target event block allocation among the event block allocations, and creating a notification identifying an allocation violation based on the identified target event block allocation.

    Multi-stage narrative analysis
    9.
    发明授权

    公开(公告)号:US12130852B1

    公开(公告)日:2024-10-29

    申请号:US17748318

    申请日:2022-05-19

    申请人: Two Six Labs, LLC

    IPC分类号: G06F16/30 G06F16/35

    CPC分类号: G06F16/35

    摘要: An extractive summarization model provides extraction and classification of research assertions, or claims, made by a documented body of research such as a scientific paper or article. Modern electronic publication and dissemination allows tremendous capability for researching and scrutinizing previous documented efforts for further research and study. Accordingly, a substantial volume of material is easily obtained in response to research efforts. The extractive summarization model provides a summarization of this scientific literature by identifying and classifying asserted claims made by a particular research document. Researchers may quickly identify relevant documents based on the extracted claims asserted by the document, facilitating substantive review.

    Research replicability assessment
    10.
    发明授权

    公开(公告)号:US12118311B1

    公开(公告)日:2024-10-15

    申请号:US17322096

    申请日:2021-05-17

    申请人: Two Six Labs, LLC

    摘要: A machine learning approach for evaluating the replicability of research receives a scholarly paper or publication about a research effort, and applies learning models and natural language processing (NLP) to identify replicability of the asserted results. Rule based and machine learning approaches employ models based on preexisting research papers having defined replicability, and compares language features, research parameters and factual assertions extracted from a research paper for evaluation. A pipeline of evaluations and feature extraction analyzes the content of the research paper and renders a prediction value that the described research can be repeated with similar results.