Matrix factorization for automated malware detection
    32.
    发明授权
    Matrix factorization for automated malware detection 有权
    自动恶意软件检测的矩阵分解

    公开(公告)号:US09398034B2

    公开(公告)日:2016-07-19

    申请号:US14135247

    申请日:2013-12-19

    CPC classification number: H04L63/1416 G06F21/56

    Abstract: Disclosed herein is a system and method for automatically identifying potential malware files or benign files in files that are not known to be malware. Vector distances for select features of the files are compared to vectors both known malware files and benign files. Based on the distance measures a malware score is obtained for the unknown file. If the malware score exceeds a threshold a researcher may be notified of the potential malware, or the file may be automatically classified as malware if the score is significantly high.

    Abstract translation: 本文公开了一种用于自动识别不知道是恶意软件的文件中的潜在恶意软件文件或良性文件的系统和方法。 将文件的特征的矢量距离与已知恶意软件文件和良性文件的向量进行比较。 根据距离测量,为未知文件获取恶意软件得分。 如果恶意软件得分超过阈值,可能会向研究人员通知潜在的恶意软件,否则如果分数显着较高,则文件可能会自动分类为恶意软件。

    Keyword-based dialogue summarizer
    33.
    发明授权

    公开(公告)号:US12165631B2

    公开(公告)日:2024-12-10

    申请号:US17735663

    申请日:2022-05-03

    Abstract: A method of generating keyword-based dialogue summaries is provided. The method includes inputting a transcript of an audio conversation and a keyword into a machine learning model trained based on encodings representing the keyword and the transcript, generating computer-generated text different from and semantically descriptive of the transcript and semantically associated with the keyword, and outputting the computer-generated text in association with a selectable item selectable for inclusion of the computer-generated text in displayed text representing the transcript, the selectable item associated with the keyword.

    System and method for speaker role determination and scrubbing identifying information

    公开(公告)号:US11182504B2

    公开(公告)日:2021-11-23

    申请号:US16397738

    申请日:2019-04-29

    Abstract: Methods for speaker role determination and scrubbing identifying information are performed by systems and devices. In speaker role determination, data from an audio or text file is divided into respective portions related to speaking parties. Characteristics classifying the portions of the data for speaking party roles are identified in the portions to generate data sets from the portions corresponding to the speaking party roles and to assign speaking party roles for the data sets. For scrubbing identifying information in data, audio data for speaking parties is processed using speech recognition to generate a text-based representation. Text associated with identifying information is determined based on a set of key words/phrases, and a portion of the text-based representation that includes a part of the text is identified. A segment of audio data that corresponds to the identified portion is replaced with different audio data, and the portion is replaced with different text.

    Identifying paths using social networking data and application data

    公开(公告)号:US11126651B2

    公开(公告)日:2021-09-21

    申请号:US16229040

    申请日:2018-12-21

    Abstract: Data from social networking applications and other applications that can be used to communicate are combined for a user to generate a graph of the various relationships that the user has with other users in the social networking applications and other applications. In addition, the behaviors of each user with respect to communicating through the various social networking applications and other applications are monitored to generate task data that describes user preferences for communicating using each social networking application or other application for different tasks. At a later time, when a user is looking to connect with another user for an indicated task such as networking, the graph can be used to recommend paths to other users in the various social networking applications and other applications, and the generated task data can be used to rank the recommended paths based on the indicated task.

    System and method for speaker role determination and scrubbing identifying information

    公开(公告)号:US11062706B2

    公开(公告)日:2021-07-13

    申请号:US16397745

    申请日:2019-04-29

    Abstract: Methods for speaker role determination and scrubbing identifying information are performed by systems and devices. In speaker role determination, data from an audio or text file is divided into respective portions related to speaking parties. Characteristics classifying the portions of the data for speaking party roles are identified in the portions to generate data sets from the portions corresponding to the speaking party roles and to assign speaking party roles for the data sets. For scrubbing identifying information in data, audio data for speaking parties is processed using speech recognition to generate a text-based representation. Text associated with identifying information is determined based on a set of key words/phrases, and a portion of the text-based representation that includes a part of the text is identified. A segment of audio data that corresponds to the identified portion is replaced with different audio data, and the portion is replaced with different text.

    Detection of botnets using command-and-control access patterns

    公开(公告)号:US10594711B2

    公开(公告)日:2020-03-17

    申请号:US15362076

    申请日:2016-11-28

    Abstract: A method and device for detecting botnets in a cloud-computing infrastructure are provided. The method includes gathering data feeds over a predefined detection time window to produce a detection dataset, wherein the detection dataset includes at least security events and a first set of bot-labels related to the activity of each of at least one virtual machine in the cloud-computing infrastructure during the detection time window; generating, using the detection dataset, a features vector for each of a plurality of virtual machines in the cloud-computing infrastructure, wherein the features vector is based on idiosyncratic (iSync) scores related to botnet activity; transmitting each generated features vector to a supervised machine learning decision model to generate a label indicating if each of the plurality of virtual machines is a bot based on the respective features vector; and determining each virtual machine labeled as a bot as being part of a botnet.

    Detection of compromised devices via user states

    公开(公告)号:US10534925B2

    公开(公告)日:2020-01-14

    申请号:US15286558

    申请日:2016-10-05

    Abstract: Controlling device security includes obtaining a set of device activity data indicating current device activity on a device and a set of user activity data indicating a current activity state of one or more legitimate users of the device. It is determined whether the indicated current activity state of the users indicates that a legitimate user is in an active state on the device, or that none of the legitimate users is in an active state on the device. A statistical fit of the indicated current device activity on the device, with the indicated current activity state of the one or more legitimate users, is determined, by a comparison with at least one of the models that are generated via supervised learning. A security alert action may be initiated, based on a result of the determination of the statistical fit indicating a compromised state of the device.

Patent Agency Ranking