Validating a metadata tree using a metadata integrity validator

    公开(公告)号:AU2012387666B2

    公开(公告)日:2016-02-11

    申请号:AU2012387666

    申请日:2012-09-12

    Abstract: A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator.

    Visual call apparatus and method
    12.
    发明专利

    公开(公告)号:AU2012393561B2

    公开(公告)日:2017-03-02

    申请号:AU2012393561

    申请日:2012-10-31

    Abstract: According to an example, a visual call apparatus is described for providing a health care service to a user. The apparatus includes a memory storing machine readable instructions to receive input related to a health related status of a user. The machine readable instructions analyze the health related status of the user to select options, from a plurality of available options, to provide services to the user. The user is to actuate one of the selected options to receive a service related to the actuated option. The machine readable instructions further output the selected options to allow the user to actuate one of the selected options, and upon actuation of one of the selected options, provide feedback to the user related to completion of the service related to the actuated option. The apparatus includes a processor to implement the machine readable instructions.

    Storing log data efficiently while supporting querying to assist in computer network security

    公开(公告)号:AU2007339801B2

    公开(公告)日:2012-03-22

    申请号:AU2007339801

    申请日:2007-12-28

    Abstract: A logging system includes an event receiver and a storage manager. The receiver receives log data, processes it, and outputs a data "chunk." The manager receives data chunks and stores them so that they can be queried. The receiver includes buffers that store events and a metadata structure that stores metadata about the contents of the buffers. The metadata includes a unique identifier associated with the receiver, the number of events in the buffers, and, for each "field of interest," a minimum value and a maximum value that reflect the range of values of that field over all of the events in the buffers. A chunk includes the metadata structure and a compressed version of the contents of the buffers. The metadata structure acts as a search index when querying event data. The logging system can be used in conjunction with a security information/event management (SIEM) system.

    REPRESENTATION OF USER INTERFACE INTERACTIVE REGIONS

    公开(公告)号:WO2020172765A1

    公开(公告)日:2020-09-03

    申请号:PCT/CN2019/076040

    申请日:2019-02-25

    Abstract: In some examples, a system executes a program that generates a user interface (UI) screen, provides a user input event to the program during execution, and captures images of the UI screen before and after the user input event. The system determines, based on the captured images, whether a first region of the UI screen changed in response to the user input event, and indicates the first region as a user interactive region and adds an element representing the user interactive region to a representation of user interactive regions of a UI of the program.

    RISK CLASSIFICATION OF INFORMATION TECHNOLOGY CHANGE REQUESTS

    公开(公告)号:WO2020062224A1

    公开(公告)日:2020-04-02

    申请号:PCT/CN2018/109057

    申请日:2018-09-30

    Abstract: A computing device includes a processor and a machine-readable storage medium storing instructions. The instructions are executable by the processor to: receive input data defining an information technology (IT) change request; in response to a receipt of the input data, perform a first risk classification of the IT change request using a decision tree model; generate a graphical user interface based on the first risk classification, the graphical user interface indicating risk impacts for each of a plurality of request features, and the graphical user interface including a graphic representation of the decision tree model; in response to a user modification to a first request feature of the plurality of request features in the graphical user interface, automatically perform a second request analysis using the decision tree model; and automatically update the graphical user interface based on the second request analysis.

    CODE COVERAGE THRESHOLDS FOR CODE SEGMENTS BASED ON USAGE FREQUENCY AND CHANGE FREQUENCY
    16.
    发明申请
    CODE COVERAGE THRESHOLDS FOR CODE SEGMENTS BASED ON USAGE FREQUENCY AND CHANGE FREQUENCY 审中-公开
    基于使用频率和变化频率的代码涵盖代码段的阈值

    公开(公告)号:WO2017171708A1

    公开(公告)日:2017-10-05

    申请号:PCT/US2016/024480

    申请日:2016-03-28

    Abstract: In some examples, a system includes a segment identification engine and a coverage determination engine. The segment identification engine may a code segment in application code for updating a code coverage threshold applicable to the code segment. The coverage determination engine may update the code coverage threshold for the code segment based on a usage frequency of the code segment and a change frequency of the code segment.

    Abstract translation: 在一些示例中,系统包括分段识别引擎和覆盖确定引擎。 段标识引擎可以是用于更新适用于代码段的代码覆盖阈值的应用代码中的代码段。 覆盖确定引擎可以基于代码段的使用频率和代码段的改变频率来更新代码段的代码覆盖阈值。

    SIMULATION ENVIRONMENT CREATION
    17.
    发明申请
    SIMULATION ENVIRONMENT CREATION 审中-公开
    仿真环境创建

    公开(公告)号:WO2017155499A1

    公开(公告)日:2017-09-14

    申请号:PCT/US2016/021137

    申请日:2016-03-07

    CPC classification number: G06F9/455 G06F11/3414 G06F11/3457

    Abstract: Example implementations relate to creating a simulation environment. For example, a system for simulation environment creation may include a system controller. The system may also include a functional agent coupled to and executed by the system controller to create a simulation environment based on input comprising real user data and sensor data continuously received from a plurality of sources, perform tests within the simulation environment, continuously react to events occurring during the tests within the simulation environment, and continuously verify results of the tests.

    Abstract translation:

    示例实现涉及创建模拟环境。 例如,用于模拟环境创建的系统可以包括系统控制器。 系统还可以包括耦合到系统控制器并由其执行的功能代理,以基于包括从多个源连续接收的实际用户数据和传感器数据的输入来创建模拟环境,在模拟环境内执行测试,对事件 在模拟环境中的测试过程中发生,并不断验证测试结果。

    STRUCTURED DATA ARCHIVAL WITH REDUCED DOWNTIME
    18.
    发明申请
    STRUCTURED DATA ARCHIVAL WITH REDUCED DOWNTIME 审中-公开
    结构化数据存档,减少停机时间

    公开(公告)号:WO2017146750A1

    公开(公告)日:2017-08-31

    申请号:PCT/US2016/026790

    申请日:2016-04-08

    CPC classification number: G06F17/40 G06F11/1446

    Abstract: Structured data archival with reduced downtime is disclosed. One example is a system including a deployer that manages an active table (AT), and a non-active table (NAT), and creates an intermediate table (IT) to record, during data archival, changes to the data to be archived. The deployer creates triggers on the AT and the NAT to facilitate the record, by the IT, of the changes to the data to be archived. An archiver initiates the data archival by archiving the copy of the data to be archived from the NAT, merges the recorded data from the IT to the NAT upon receiving an indication that the client access to the AT is not enabled, and switches the client access from the AT to the NAT by changing a table synonym, where the client access to the NAT is enabled upon completion of the data archival.

    Abstract translation: 公开了减少停机时间的结构化数据存档。 一个例子是包括管理活动表(AT)和非活动表(NAT)的部署者的系统,并且创建中间表(IT)以在数据存档期间记录对要存档的数据的改变。 部署者在AT和NAT上创建触发器,以便IT记录要存档数据的更改。 归档器通过归档要从NAT归档的数据的副本来启动数据归档,在接收到对客户端访问AT的指示未被启用的指示时将来自IT的记录数据合并到NAT中,并切换客户端访问 从AT到NAT,通过更改表同义词,在完成数据存档后客户端可以访问NAT。

    GENERATING RECOMMENDED INPUTS
    19.
    发明申请
    GENERATING RECOMMENDED INPUTS 审中-公开
    产生推荐的输入

    公开(公告)号:WO2017138910A1

    公开(公告)日:2017-08-17

    申请号:PCT/US2016/016948

    申请日:2016-02-08

    CPC classification number: G06Q10/04

    Abstract: Example embodiments relate to generating sets of recommended inputs for changing predicted results of a predictive model. The examples disclosed herein access, from a database, a historical set of inputs and results of a predictive model. A function is approximated based on the historical set of inputs and results, and a gradient of the function is computed using a result of the function with respect to a local maximum value of the function. A set of recommended inputs is generated based on the gradient of the function, where a recommended input produces a positive result of the function.

    Abstract translation: 示例实施例涉及生成用于改变预测模型的预测结果的推荐输入组。 本文公开的示例从数据库访问历史输入集合和预测模型结果。 基于历史输入和结果集来近似函数,并且函数的梯度利用函数的关于函数的局部最大值的结果来计算。 根据函数的梯度生成一组推荐的输入,其中推荐的输入产生该函数的肯定结果。

    EXTENDED CIPHERTEXTS
    20.
    发明申请
    EXTENDED CIPHERTEXTS 审中-公开
    扩展的CIPHERTEXTS

    公开(公告)号:WO2017135970A1

    公开(公告)日:2017-08-10

    申请号:PCT/US2016/016867

    申请日:2016-02-05

    Inventor: MINNER, Richard

    CPC classification number: H04L9/0894 H04L9/0618

    Abstract: Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a format preserving encryptor to obtain a plaintext, obtain a key from a plurality of keys stored in a key database, and encrypt the plaintext using the key to produce a ciphertext having a length of the plaintext. The encrypting device may also include a key reference embedder to obtain a key reference associated with the key, and generate an extended ciphertext by adding to the ciphertext a set of characters associated with the key reference, such that the key reference can be determined based on the extended ciphertext.

    Abstract translation: 这里讨论的示例尤其公开了加密设备。 加密装置可以包括格式保持加密器以获得明文,从存储在密钥数据库中的多个密钥获得密钥,并且使用该密钥加密明文以产生具有明文长度的密文。 加密设备还可以包括密钥参考嵌入器以获得与密钥相关联的密钥引用,并且通过向密文添加与密钥引用相关联的一组字符来生成扩展密文,使得可以基于 扩展的密文。

Patent Agency Ranking