29 patents
Utility
Method, Apparatus, and Computer-readable Medium for Data Asset Ranking
18 Jan 24
Systems, methods, and related techniques and apparatus containing instructions which when executed by one or more computing devices for determining dataset rankings by determining, from the lineage order requirement, one or more first lineage level datasets from the collection of datasets, generating one or more first lineage level asset ranks respectively for each one of the one or more first lineage level datasets, determining at least one second lineage level dataset having an outflow to the one or more first lineage level datasets, and generating a first dataset rank for the at least one second lineage level dataset as a first function of the outflow and at least one of the one or more first lineage level asset ranks.
Awez SYED, Gaurav PATHAK
Filed: 1 Aug 23
Utility
Method, Apparatus, and Computer-readable Medium for Data Protection Simulation and Optimization In a Computer Network
18 Jan 24
A system, method and computer-readable medium for data protection simulation and optimization in a computer network, including grouping data stored in data stores in the computer network into groupings according to an architectural or a conceptual attributes, storing, current values of risk metrics for each grouping, each of the metrics corresponding to sensitive domains, receiving a risk reduction goal corresponding to at least one risk metric in the risk metrics, the at least one risk metric corresponding to at least one sensitive domain in the sensitive domains, determining a simulated value of the at least one risk metric for each grouping in the groupings by simulating application of a protection mechanism to sensitive data in each corresponding data store, the sensitive data corresponding to the at least one sensitive domain, and ranking the groupings based on the at least one simulated value of the at least one risk metric for each grouping.
Gregorio Convertino, Tianyi Li, Gary Patterson, Ranjeet Kumar Tayi, Shima Kazerooni
Filed: 26 Jul 23
Utility
Method, apparatus, and computer-readable medium for intelligent execution of a solution on a computer network
9 Jan 24
A deployment platform, computer-readable medium, and computer-implemented method for intelligent execution of a solution on a computer network, including receiving an instruction to execute a solution in a local runtime environment on the deployment platform, the solution including solution code written in a solution language, determining, by a helper program on the deployment platform, whether the solution is executable on the deployment platform based on the solution language and either launching, by the helper program, the solution on the deployment platform when the solution is executable on the deployment platform or launching, by the helper program, the solution on a remote platform on the computer network that is configured to execute the solution when the solution is not executable on the deployment platform, the helper program being configured to communicate with the launched solution to enable the launched solution to interface with the local runtime environment on the deployment platform.
Hemshankar Sahu
Filed: 8 Nov 21
Utility
Method, Apparatus, and Computer-readable Medium for Searching Polymorphically Encrypted Data
21 Dec 23
A method, apparatus, and computer-readable medium for searching polymorphically encrypted data includes storing one or more pseudonymous tokens in a data store, the one or more pseudonymous tokens being generated by encrypting a ciphertext using a first algorithm and an encryption key, the first algorithm comprising a polymorphic algorithm configured to generate a distinct pseudonymous token for each application of the polymorphic algorithm to the same plaintext, and identifying data in the data store that corresponds to the ciphertext by querying the data store using a search token generated by encrypting the plaintext using a second algorithm and the encryption key, the search token being distinct from the one or more pseudonymous tokens.
Igor Balabine, Richard Grondin
Filed: 15 Jun 23
Utility
Method, apparatus, and computer-readable medium for determining customer adoption based on monitored data
14 Nov 23
A system, method, and computer-readable medium for determining customer adoption based on monitored data, including receiving product usage parameters from a product data store on the computer network, each product usage parameter being determined based on tracking usage of the product by the customer over a predetermined time period, storing a customer profile for the customer comprising customer parameters, the customer parameters being determined based on customer information stored in a customer database on the computer network, receiving service parameters from a customer support data store on the computer network, each service parameter being determined based on tracking support services provided to the customer for the product over the predetermined time period, and generating a product adoption score by applying a machine learning model to the product usage parameters and the customer profile to generate a usage-based adoption score and adjusting the usage-based adoption score based on the service parameters.
Ansa Sekharan, Ashok Gunasekaran, Kali Prasad Vittala, Arjun Krishnamoorthy, Vivekanand Kompella, Rengarajan Margasahayam
Filed: 23 Sep 19
Utility
Method, apparatus, and computer-readable medium for determining risk associated with anomalous behavior of a user on a computer network
17 Oct 23
A system, method, and computer-readable medium for determining risk associated with anomalous behavior of a user on a computer network including receiving anomalous behavioral data corresponding to anomalous activity of the user on the computer network, determining surprisal values corresponding to one or more behavioral factors based on one or more of: one or more probabilities corresponding to one or more current values or one or more characteristics of the one or more behavioral factors, determining one or more dynamic weights corresponding to the one or more behavioral factors based at least in part on the one or more current values and historically expected values of the one or more behavioral factors for the user, and determining a risk metric corresponding to the anomalous activity of the user based on the surprisal values, the one or more dynamic weights, and static weights assigned to the one or more behavioral factors.
Igor Balabine
Filed: 21 Mar 22
Utility
Method, apparatus, and computer-readable medium for data asset ranking
12 Sep 23
Systems, methods, and related techniques and apparatus containing instructions which when executed by one or more computing devices for determining dataset rankings by determining, from the lineage order requirement, one or more first lineage level datasets from the collection of datasets, generating one or more first lineage level asset ranks respectively for each one of the one or more first lineage level datasets, determining at least one second lineage level dataset having an outflow to the one or more first lineage level datasets, and generating a first dataset rank for the at least one second lineage level dataset as a first function of the outflow and at least one of the one or more first lineage level asset ranks.
Awez Syed, Gaurav Pathak
Filed: 25 Oct 21
Utility
Method, apparatus, and computer-readable medium for data protection simulation and optimization in a computer network
12 Sep 23
A system, method and computer-readable medium for data protection simulation and optimization in a computer network, including grouping data stored in data stores in the computer network into groupings according to an architectural or a conceptual attributes, storing, current values of risk metrics for each grouping, each of the metrics corresponding to sensitive domains, receiving a risk reduction goal corresponding to at least one risk metric in the risk metrics, the at least one risk metric corresponding to at least one sensitive domain in the sensitive domains, determining a simulated value of the at least one risk metric for each grouping in the groupings by simulating application of a protection mechanism to sensitive data in each corresponding data store, the sensitive data corresponding to the at least one sensitive domain, and ranking the groupings based on the at least one simulated value of the at least one risk metric for each grouping.
Gregorio Convertino, Tianyi Li, Gary Patterson, Ranjeet Kumar Tayi, Shima Kazerooni
Filed: 25 Jun 20
Utility
Method, Apparatus, and Computer-readable Medium to Extract a Referentially Intact Subset from a Database
7 Sep 23
An apparatus, computer-readable medium, and computer-implemented method for data subsetting, including receiving a request comprising a criterion indicating a criterion table in a plurality of tables of a database, as schema of the database corresponding to an entity graph, the entity graph comprising a plurality of entities corresponding to the plurality of tables and a plurality of directed edges connecting the plurality of entities, determining directed edges in the plurality of directed edges that must be traversed in both directions in order to traverse all entities in the entity graph starting from a criterion entity corresponding to the criterion table, generating, an ordered list of edges for the entity graph based on the directed edges that must be traversed in both directions and topological ordering, and generating a subset of data from the plurality of tables based on the ordered list of edges for the entity graph and the request.
Chitresh Kakwani
Filed: 27 Feb 23
Utility
Method, apparatus, and computer-readable medium for searching polymorphically encrypted data
1 Aug 23
A method, apparatus, and computer-readable medium for searching polymorphically encrypted data includes storing one or more pseudonymous tokens in a data store, the one or more pseudonymous tokens being generated by encrypting a ciphertext using a first algorithm and an encryption key, the first algorithm comprising a polymorphic algorithm configured to generate a distinct pseudonymous token for each application of the polymorphic algorithm to the same plaintext, and identifying data in the data store that corresponds to the ciphertext by querying the data store using a search token generated by encrypting the plaintext using a second algorithm and the encryption key, the search token being distinct from the one or more pseudonymous tokens.
Igor Balabine, Richard Grondin
Filed: 10 Feb 21
Utility
Method, Apparatus, and Computer-readable Medium for Efficiently Classifying a Data Object of Unknown Type
4 May 23
An apparatus, computer-readable medium, and computer-implemented method for efficiently classifying a data object, including representing the data object as a data object vector in a vector space, each dimension of the data object vector corresponding to a different feature of the data object, determining a distance between the data object vector and centroids of data domain clusters in the vector space, each data domain cluster comprising data domain vectors representing data domains, sorting the data domain clusters according to their respective distances to the data object vector, and iteratively applying data domain classifiers corresponding to data domains represented in a closest data domain cluster in the sorted data domain clusters to the data object.
Igor BALABINE
Filed: 3 Nov 21
Utility
Method, apparatus, and computer-readable medium to extract a referentially intact subset from a database
28 Feb 23
An apparatus, computer-readable medium, and computer-implemented method for data subsetting, including receiving a request comprising a criterion indicating a criterion table in a plurality of tables of a database, as schema of the database corresponding to an entity graph, the entity graph comprising a plurality of entities corresponding to the plurality of tables and a plurality of directed edges connecting the plurality of entities, determining directed edges in the plurality of directed edges that must be traversed in both directions in order to traverse all entities in the entity graph starting from a criterion entity corresponding to the criterion table, generating, an ordered list of edges for the entity graph based on the directed edges that must be traversed in both directions and topological ordering, and generating a subset of data from the plurality of tables based on the ordered list of edges for the entity graph and the request.
Chitresh Kakwani
Filed: 7 Oct 16
Utility
Method, Apparatus, and Computer-readable Medium for Intelligent Execution of a Solution on a Computer Network
2 Feb 23
A deployment platform, computer-readable medium, and computer-implemented method for intelligent execution of a solution on a computer network, including receiving an instruction to execute a solution in a local runtime environment on the deployment platform, the solution including solution code written in a solution language, determining, by a helper program on the deployment platform, whether the solution is executable on the deployment platform based on the solution language and either launching, by the helper program, the solution on the deployment platform when the solution is executable on the deployment platform or launching, by the helper program, the solution on a remote platform on the computer network that is configured to execute the solution when the solution is not executable on the deployment platform, the helper program being configured to communicate with the launched solution to enable the launched solution to interface with the local runtime environment on the deployment platform.
Hemshankar SAHU
Filed: 8 Nov 21
Utility
Method, Apparatus, and Computer-readable Medium for Extracting a Subset from a Database
8 Dec 22
An apparatus, computer-readable medium, and computer-implemented method for extracting a subset, including receiving a request comprising one or more criteria indicating one or more criteria tables in a plurality of tables of the database, storing an entity graph corresponding to a schema of the database and the one or more criteria, determining one or more top-most criteria entities in the entity graph, and generating the subset from the plurality of tables by traversing the entity graph starting at the one or more top-most criteria entities without traversing any directed edge more than once.
Saurabh GARG, Anay GHOTIKAR
Filed: 15 Aug 22
Utility
Method, Apparatus, and Computer-readable Medium for Postal Address Indentification
13 Oct 22
An apparatus, computer-readable medium, and computer-implemented method for postal address identification, including receiving one or more sequences of tokens corresponding to candidate postal address data objects, evaluating the sequences of tokens with the statistical postal address model to identify candidate postal address data objects, computing candidate vectors corresponding to the identified candidate postal address data objects in the vector space, and determining whether the identified candidate postal address data objects correspond to a postal address based on applying outlier detection methods to the candidate vectors and one or more clusters of the clusters.
Igor Balabine, Dina Laevsky
Filed: 13 Apr 21
Utility
Method, apparatus, and computer-readable medium for extracting a subset from a database
16 Aug 22
An apparatus, computer-readable medium, and computer-implemented method for extracting a subset, including receiving a request comprising one or more criteria indicating one or more criteria tables in a plurality of tables of the database, storing an entity graph corresponding to a schema of the database and the one or more criteria, determining one or more top-most criteria entities in the entity graph, and generating the subset from the plurality of tables by traversing the entity graph starting at the one or more top-most criteria entities without traversing any directed edge more than once.
Saurabh Garg, Anay Ghotikar
Filed: 8 Jan 21
Utility
Method, apparatus, and computer-readable medium for missing data identification
24 May 22
A system, method and computer-readable medium for missing data identification, including identifying columns in tables of a database, generating categorical columns of categorical data by transforming data values in the columns into categorical data values, generating a co-occurrence matrix corresponding to a pair of categorical columns in the categorical columns, determining an expected frequency of co-occurrence corresponding to each unique pair of categorical data values based at least in part on a marginal totals corresponding to categorical data values in the co-occurrence matrix, and identifying one or more locations of missing data based at least in part on the count of co-occurrence of each unique pair of categorical data values and the expected frequency of co-occurrence corresponding to each unique pair of categorical data values.
Gregorio Convertino, Ranjeet Kumar Tayi, Swati Tomar, Manish Gupta, Chitresh Kakwani
Filed: 21 Feb 18
Utility
Method, Apparatus, and Computer-readable Medium for Format Preserving Encryption of a Numerical Value
28 Apr 22
A system, method and computer-readable medium format-preserving encryption of a numerical value, including storing a binary numerical value, the binary numerical value comprising a plurality of binary bits, dividing the plurality of binary bits into a plurality of bit groups and storing the plurality of bit groups in a plurality of bytes, encrypting each byte in the plurality of bytes using a radix value corresponding to a quantity of binary bits in a bit group corresponding to that byte to generate a plurality of ciphertext bytes, and combining a quantity of least-significant bits from each ciphertext byte in the plurality of ciphertext bytes to generate a binary ciphertext value, the quantity of least-significant bits combined from each ciphertext byte corresponding to the radix value used to generate that ciphertext byte.
Igor BALABINE, Rajagopal GUDURU, Ramesh NALLAMOTHU
Filed: 10 Jan 22
Utility
Method, Apparatus, and Computer-readable Medium for Dynamic Hierarchical Data Flow Mapping
14 Apr 22
A method, apparatus, and computer-readable medium for dynamic hierarchical data flow mapping, including storing dynamic data flow mappings, each dynamic data flow mapping including a mapping of data from an input port corresponding to a source data container to an output port corresponding to a destination data container and a dynamic hierarchical field having a dynamic hierarchical data type, determining a rule language corresponding to each dynamic hierarchical field in the dynamic data flow mappings, the rule language defining acceptable parameters for sub-fields of that dynamic hierarchical data type, and generating static data flow mappings by resolving all dynamic hierarchical fields into static hierarchical fields during compilation of the dynamic data flow mappings with the source data container and the destination data container, the static data flow mappings being generated based at least in part on the rule language corresponding to each dynamic hierarchical field and underlying data in one or more of the source data container or the destination data container.
Chandra Vikas RANGHABHATLA, Tejaswinee SOHONI
Filed: 21 Dec 21
Utility
Systems, Apparatus, and Methods for Data Integration Optimization
24 Mar 22
Systems, methods, and techniques for optimizing a plurality of data integration tasks within a data integration collection by identifying, as a sub-set of the plurality of data integration tasks, a plurality of point-to-point data integration tasks defining a data integration transformation plan to include: generating one or more publication data integration tasks comprising publishing from each respective data source of the plurality of point-to-point data integration tasks to generate a single publication topic; and generating one or more subscription data integration tasks causing each respective target of the plurality of point-to-point data integration tasks to subscribe to the single publication topic; and generating a set of optimization instructions configured to cause the at least one computer to implement the data integration transformation plan; and executing the set of optimization instructions to generate the one or more publication data integration tasks and the one or more subscription data integration tasks.
Gadi Wolfman, Kobi Gol, Jaganmohan Reddy Kancharla
Filed: 6 Dec 21