-
公开(公告)号:US12259968B2
公开(公告)日:2025-03-25
申请号:US17708855
申请日:2022-03-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Shinesa Elaine Cambric , Maria Puertas Calvo , Ye Xu , Etan Micah Basseri , Sergio Romero Zambrano , Jeffrey Thomas Sakowicz
Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein are configured to detect anomalous post-authentication behavior/state change(s) with respect to a workload identity. For example, audit logs that specify actions performed with respect to the workload identity of a platform-based identity service, a causing state change(s), while another identity is authenticated with the platform-based identity service, are analyzed. The audit log(s) are analyzed via a model for anomaly prediction based on actions. The model generates an anomaly score indicating a probability whether a particular sequence of the actions is indicative of anomalous behavior/state change(s). A determination is made that an anomalous behavior has occurred based on the anomaly score, and when anomalous behavior has occurred, a mitigation action may be performed that mitigates the anomalous behavior.
-
公开(公告)号:US12174937B2
公开(公告)日:2024-12-24
申请号:US17670105
申请日:2022-02-11
Applicant: Microsoft Technology Licensing, LLC
Inventor: Shinesa Elaine Cambric , Maria Puertas Calvo , Ye Xu
Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein are configured to detect anomalous post-authentication behavior with respect to a user identity. For example, one or more audit logs that specify a plurality of actions performed with respect to the user identity of a platform-based identity service, while the user identity is authenticated with the platform-based identity service, are analyzed. The audit log(s) are analyzed via an anomaly prediction model that generates an anomaly score indicating a probability whether a particular sequence of actions of the plurality of actions is indicative of anomalous behavior. A determination is made that an anomalous behavior has occurred based on the anomaly score. In response to determining that anomalous behavior has occurred, a mitigation action may be performed that mitigates the anomalous behavior.
-
公开(公告)号:US10042894B2
公开(公告)日:2018-08-07
申请号:US14528643
申请日:2014-10-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ye Xu , Zang Li , Abhishek Gupta , Ahmet Bugdayci , Anmol Bhasin
Abstract: A system and method for temporal-based professional similarity are provided. In example embodiments, a request to identify, from among a plurality of member profiles of a social network service, a profile that is similar to a source profile, is received. Profile data of the source profile and a candidate profile are accessed from the social network service. Profile features are extracted from the profile data. The profile features include source features extracted from the profile data of the source profile and candidate features extracted from the profile data of the candidate profile. Respective profile features correspond to temporal data included in the profile data. Data structures are generated by structuring the profile features according to the temporal data. The data structures include a source data structure generated using the source features and a candidate data structure generated using the candidate features. A profile similarity score is determined by comparing the candidate data structure with the source data structure. The profile similarity score indicates the similarity between the candidate profile and the source profile.
-
公开(公告)号:US10984385B2
公开(公告)日:2021-04-20
申请号:US15168811
申请日:2016-05-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ye Xu , Viet Thuc Ha , Xianren Wu , Satya Pradeep Kanduri , Vijay Dialani , Yan Yan , Abhishek Gupta , Shakti Dhirendraji Sinha
IPC: G06Q10/10 , G06Q50/00 , G06F16/248 , G06F16/2457 , G06F16/242
Abstract: In an example embodiment, one or more specified ideal candidates are used to perform a search in a database. One or more attributes are extracted from one or more ideal candidate member profiles. A search query is then generated based on the extracted one or more attributes. Then, a search is performed on member profiles in the social networking service using the generated search query, returning one or more result member profiles.
-
公开(公告)号:US10606847B2
公开(公告)日:2020-03-31
申请号:US15169346
申请日:2016-05-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yan Yan , Viet Thuc Ha , Xianren Wu , Satya Pradeep Kanduri , Vijay Dialani , Ye Xu , Abhishek Gupta , Shakti Dhirendraji Sinha
IPC: G06F16/2457 , G06Q50/00 , G06N20/00 , G06F16/9535 , G06N3/08
Abstract: In an example embodiment, one or more sample ideal candidate member profiles in a social networking service are obtained, as well as one or more sample search result member profiles in the social networking service. Then, for each unique pair of sample ideal candidate member profile and sample search result member profile, a label is generated using a score generated from log information of the social networking service, the log information including records of communications between a searcher and members of the social networking service, the score being higher if the searcher communicated with both the member corresponding sample ideal candidate member profile and the member corresponding to the sample search result member profile in a same search session. The generated labels are fed into a machine learning algorithm to train a combined ranking model used to output ranking scores for search result member profiles.
-
公开(公告)号:US10373075B2
公开(公告)日:2019-08-06
申请号:US15188590
申请日:2016-06-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Xianren Wu , Satya Pradeep Kanduri , Vijay Dialani , Ye Xu , Yan Yan , Viet Thuc Ha , Abhishek Gupta , Shakti Dhirendraji Sinha
IPC: G06F17/00 , G06N20/00 , G06F16/2453 , G06Q50/00 , H04L29/08
Abstract: In an example embodiment, a query for search results is received, the query including at least one value for one facet, a facet defining a categorical dimension for the search results. It is then determined that the facet in the query is exclusive. In response to the determination that the facet is exclusive: for each potential facet different from the facet in the query: for each potential value in the potential facet: conditional entropy gain of the value in the query and the potential value is determined. The potential value in the potential facet that has the highest conditional entropy gain is determined, as is the potential facet with the minimum maximum conditional entropy gain. Then the potential facet with the minimum maximum is input into a machine learning model, causing the machine learning model to output one or more suggested facets to add to the query.
-
-
-
-
-