29 patents
Utility
Method, Apparatus, and Computer-readable Medium for Data Asset Ranking
18 Jan 24
Systems, methods, and related techniques and apparatus containing instructions which when executed by one or more computing devices for determining dataset rankings by determining, from the lineage order requirement, one or more first lineage level datasets from the collection of datasets, generating one or more first lineage level asset ranks respectively for each one of the one or more first lineage level datasets, determining at least one second lineage level dataset having an outflow to the one or more first lineage level datasets, and generating a first dataset rank for the at least one second lineage level dataset as a first function of the outflow and at least one of the one or more first lineage level asset ranks.
Awez SYED, Gaurav PATHAK
Filed: 1 Aug 23
Utility
Method, Apparatus, and Computer-readable Medium for Data Protection Simulation and Optimization In a Computer Network
18 Jan 24
A system, method and computer-readable medium for data protection simulation and optimization in a computer network, including grouping data stored in data stores in the computer network into groupings according to an architectural or a conceptual attributes, storing, current values of risk metrics for each grouping, each of the metrics corresponding to sensitive domains, receiving a risk reduction goal corresponding to at least one risk metric in the risk metrics, the at least one risk metric corresponding to at least one sensitive domain in the sensitive domains, determining a simulated value of the at least one risk metric for each grouping in the groupings by simulating application of a protection mechanism to sensitive data in each corresponding data store, the sensitive data corresponding to the at least one sensitive domain, and ranking the groupings based on the at least one simulated value of the at least one risk metric for each grouping.
Gregorio Convertino, Tianyi Li, Gary Patterson, Ranjeet Kumar Tayi, Shima Kazerooni
Filed: 26 Jul 23
Utility
ly2xxoymxt00dw996 v5ue0lvyllazedbzncr48ki
9 Jan 24
A deployment platform, computer-readable medium, and computer-implemented method for intelligent execution of a solution on a computer network, including receiving an instruction to execute a solution in a local runtime environment on the deployment platform, the solution including solution code written in a solution language, determining, by a helper program on the deployment platform, whether the solution is executable on the deployment platform based on the solution language and either launching, by the helper program, the solution on the deployment platform when the solution is executable on the deployment platform or launching, by the helper program, the solution on a remote platform on the computer network that is configured to execute the solution when the solution is not executable on the deployment platform, the helper program being configured to communicate with the launched solution to enable the launched solution to interface with the local runtime environment on the deployment platform.
Hemshankar Sahu
Filed: 8 Nov 21
Utility
3blvhzvdc5yzg8bmc1yhwt v2cr0u4yllm
21 Dec 23
A method, apparatus, and computer-readable medium for searching polymorphically encrypted data includes storing one or more pseudonymous tokens in a data store, the one or more pseudonymous tokens being generated by encrypting a ciphertext using a first algorithm and an encryption key, the first algorithm comprising a polymorphic algorithm configured to generate a distinct pseudonymous token for each application of the polymorphic algorithm to the same plaintext, and identifying data in the data store that corresponds to the ciphertext by querying the data store using a search token generated by encrypting the plaintext using a second algorithm and the encryption key, the search token being distinct from the one or more pseudonymous tokens.
Igor Balabine, Richard Grondin
Filed: 15 Jun 23
Utility
z6edymuoa9hupgsgl38sp7zii4qu0p6
14 Nov 23
A system, method, and computer-readable medium for determining customer adoption based on monitored data, including receiving product usage parameters from a product data store on the computer network, each product usage parameter being determined based on tracking usage of the product by the customer over a predetermined time period, storing a customer profile for the customer comprising customer parameters, the customer parameters being determined based on customer information stored in a customer database on the computer network, receiving service parameters from a customer support data store on the computer network, each service parameter being determined based on tracking support services provided to the customer for the product over the predetermined time period, and generating a product adoption score by applying a machine learning model to the product usage parameters and the customer profile to generate a usage-based adoption score and adjusting the usage-based adoption score based on the service parameters.
Ansa Sekharan, Ashok Gunasekaran, Kali Prasad Vittala, Arjun Krishnamoorthy, Vivekanand Kompella, Rengarajan Margasahayam
Filed: 23 Sep 19
Utility
q67e7he4x23kuukhrbjae4z3ssjqqi9mk1oujizavjg3 xp4yxbswhni4m39
17 Oct 23
A system, method, and computer-readable medium for determining risk associated with anomalous behavior of a user on a computer network including receiving anomalous behavioral data corresponding to anomalous activity of the user on the computer network, determining surprisal values corresponding to one or more behavioral factors based on one or more of: one or more probabilities corresponding to one or more current values or one or more characteristics of the one or more behavioral factors, determining one or more dynamic weights corresponding to the one or more behavioral factors based at least in part on the one or more current values and historically expected values of the one or more behavioral factors for the user, and determining a risk metric corresponding to the anomalous activity of the user based on the surprisal values, the one or more dynamic weights, and static weights assigned to the one or more behavioral factors.
Igor Balabine
Filed: 21 Mar 22
Utility
bv2bb1864zrdgh2mj2kl r7ynpmidbtly0mxspemiu9a0x93rhen3vz8s2
12 Sep 23
Systems, methods, and related techniques and apparatus containing instructions which when executed by one or more computing devices for determining dataset rankings by determining, from the lineage order requirement, one or more first lineage level datasets from the collection of datasets, generating one or more first lineage level asset ranks respectively for each one of the one or more first lineage level datasets, determining at least one second lineage level dataset having an outflow to the one or more first lineage level datasets, and generating a first dataset rank for the at least one second lineage level dataset as a first function of the outflow and at least one of the one or more first lineage level asset ranks.
Awez Syed, Gaurav Pathak
Filed: 25 Oct 21
Utility
wluxt2mqw45xc4to03hq2kby90x6x5u870xlb
12 Sep 23
A system, method and computer-readable medium for data protection simulation and optimization in a computer network, including grouping data stored in data stores in the computer network into groupings according to an architectural or a conceptual attributes, storing, current values of risk metrics for each grouping, each of the metrics corresponding to sensitive domains, receiving a risk reduction goal corresponding to at least one risk metric in the risk metrics, the at least one risk metric corresponding to at least one sensitive domain in the sensitive domains, determining a simulated value of the at least one risk metric for each grouping in the groupings by simulating application of a protection mechanism to sensitive data in each corresponding data store, the sensitive data corresponding to the at least one sensitive domain, and ranking the groupings based on the at least one simulated value of the at least one risk metric for each grouping.
Gregorio Convertino, Tianyi Li, Gary Patterson, Ranjeet Kumar Tayi, Shima Kazerooni
Filed: 25 Jun 20
Utility
6gu62wv3z dlzpj8p5dpepmnc6bthwz
7 Sep 23
An apparatus, computer-readable medium, and computer-implemented method for data subsetting, including receiving a request comprising a criterion indicating a criterion table in a plurality of tables of a database, as schema of the database corresponding to an entity graph, the entity graph comprising a plurality of entities corresponding to the plurality of tables and a plurality of directed edges connecting the plurality of entities, determining directed edges in the plurality of directed edges that must be traversed in both directions in order to traverse all entities in the entity graph starting from a criterion entity corresponding to the criterion table, generating, an ordered list of edges for the entity graph based on the directed edges that must be traversed in both directions and topological ordering, and generating a subset of data from the plurality of tables based on the ordered list of edges for the entity graph and the request.
Chitresh Kakwani
Filed: 27 Feb 23
Utility
2v0bt71mihjc0y7voy6fwa1vnrrlkp0jj8tjocy4djltplj
1 Aug 23
A method, apparatus, and computer-readable medium for searching polymorphically encrypted data includes storing one or more pseudonymous tokens in a data store, the one or more pseudonymous tokens being generated by encrypting a ciphertext using a first algorithm and an encryption key, the first algorithm comprising a polymorphic algorithm configured to generate a distinct pseudonymous token for each application of the polymorphic algorithm to the same plaintext, and identifying data in the data store that corresponds to the ciphertext by querying the data store using a search token generated by encrypting the plaintext using a second algorithm and the encryption key, the search token being distinct from the one or more pseudonymous tokens.
Igor Balabine, Richard Grondin
Filed: 10 Feb 21
Utility
0xi1wwbo1 ugmhkdjqfp
4 May 23
An apparatus, computer-readable medium, and computer-implemented method for efficiently classifying a data object, including representing the data object as a data object vector in a vector space, each dimension of the data object vector corresponding to a different feature of the data object, determining a distance between the data object vector and centroids of data domain clusters in the vector space, each data domain cluster comprising data domain vectors representing data domains, sorting the data domain clusters according to their respective distances to the data object vector, and iteratively applying data domain classifiers corresponding to data domains represented in a closest data domain cluster in the sorted data domain clusters to the data object.
Igor BALABINE
Filed: 3 Nov 21
Utility
ue6e4yucn555rq455tbxjj5uik d4pb2dpwn0pjnvb5v1n2h7oh
28 Feb 23
An apparatus, computer-readable medium, and computer-implemented method for data subsetting, including receiving a request comprising a criterion indicating a criterion table in a plurality of tables of a database, as schema of the database corresponding to an entity graph, the entity graph comprising a plurality of entities corresponding to the plurality of tables and a plurality of directed edges connecting the plurality of entities, determining directed edges in the plurality of directed edges that must be traversed in both directions in order to traverse all entities in the entity graph starting from a criterion entity corresponding to the criterion table, generating, an ordered list of edges for the entity graph based on the directed edges that must be traversed in both directions and topological ordering, and generating a subset of data from the plurality of tables based on the ordered list of edges for the entity graph and the request.
Chitresh Kakwani
Filed: 7 Oct 16
Utility
y1eaftklllb3ama7ovkfonr lk42pp2lgizqik6dcq
2 Feb 23
A deployment platform, computer-readable medium, and computer-implemented method for intelligent execution of a solution on a computer network, including receiving an instruction to execute a solution in a local runtime environment on the deployment platform, the solution including solution code written in a solution language, determining, by a helper program on the deployment platform, whether the solution is executable on the deployment platform based on the solution language and either launching, by the helper program, the solution on the deployment platform when the solution is executable on the deployment platform or launching, by the helper program, the solution on a remote platform on the computer network that is configured to execute the solution when the solution is not executable on the deployment platform, the helper program being configured to communicate with the launched solution to enable the launched solution to interface with the local runtime environment on the deployment platform.
Hemshankar SAHU
Filed: 8 Nov 21
Utility
f26i4ezhmuhdjp6no0cuh5k8joiqdaicbmz590xt8kxpt 2gky74yf
8 Dec 22
An apparatus, computer-readable medium, and computer-implemented method for extracting a subset, including receiving a request comprising one or more criteria indicating one or more criteria tables in a plurality of tables of the database, storing an entity graph corresponding to a schema of the database and the one or more criteria, determining one or more top-most criteria entities in the entity graph, and generating the subset from the plurality of tables by traversing the entity graph starting at the one or more top-most criteria entities without traversing any directed edge more than once.
Saurabh GARG, Anay GHOTIKAR
Filed: 15 Aug 22
Utility
in2ahw7i4m38e0ngb2ewdrbcqh9ogq9pw1dp7dl3xo8hdb0f
13 Oct 22
An apparatus, computer-readable medium, and computer-implemented method for postal address identification, including receiving one or more sequences of tokens corresponding to candidate postal address data objects, evaluating the sequences of tokens with the statistical postal address model to identify candidate postal address data objects, computing candidate vectors corresponding to the identified candidate postal address data objects in the vector space, and determining whether the identified candidate postal address data objects correspond to a postal address based on applying outlier detection methods to the candidate vectors and one or more clusters of the clusters.
Igor Balabine, Dina Laevsky
Filed: 13 Apr 21
Utility
t6ou3pfhaaktzk32m5v0y p5p0
16 Aug 22
An apparatus, computer-readable medium, and computer-implemented method for extracting a subset, including receiving a request comprising one or more criteria indicating one or more criteria tables in a plurality of tables of the database, storing an entity graph corresponding to a schema of the database and the one or more criteria, determining one or more top-most criteria entities in the entity graph, and generating the subset from the plurality of tables by traversing the entity graph starting at the one or more top-most criteria entities without traversing any directed edge more than once.
Saurabh Garg, Anay Ghotikar
Filed: 8 Jan 21
Utility
stv6uah032bw4z bvnd473mjh6kl48vnswd6ef8plvdldcf1ynphv
24 May 22
A system, method and computer-readable medium for missing data identification, including identifying columns in tables of a database, generating categorical columns of categorical data by transforming data values in the columns into categorical data values, generating a co-occurrence matrix corresponding to a pair of categorical columns in the categorical columns, determining an expected frequency of co-occurrence corresponding to each unique pair of categorical data values based at least in part on a marginal totals corresponding to categorical data values in the co-occurrence matrix, and identifying one or more locations of missing data based at least in part on the count of co-occurrence of each unique pair of categorical data values and the expected frequency of co-occurrence corresponding to each unique pair of categorical data values.
Gregorio Convertino, Ranjeet Kumar Tayi, Swati Tomar, Manish Gupta, Chitresh Kakwani
Filed: 21 Feb 18
Utility
g8y2p6kil8vss3iggeswp99w6vqr4m7opzgy4ocqatom76oluuvoxk8o0nfc
28 Apr 22
A system, method and computer-readable medium format-preserving encryption of a numerical value, including storing a binary numerical value, the binary numerical value comprising a plurality of binary bits, dividing the plurality of binary bits into a plurality of bit groups and storing the plurality of bit groups in a plurality of bytes, encrypting each byte in the plurality of bytes using a radix value corresponding to a quantity of binary bits in a bit group corresponding to that byte to generate a plurality of ciphertext bytes, and combining a quantity of least-significant bits from each ciphertext byte in the plurality of ciphertext bytes to generate a binary ciphertext value, the quantity of least-significant bits combined from each ciphertext byte corresponding to the radix value used to generate that ciphertext byte.
Igor BALABINE, Rajagopal GUDURU, Ramesh NALLAMOTHU
Filed: 10 Jan 22
Utility
23uwm36wvwbyiw7fqdxrdu1uzexcwbwzbzlp51gdc6n3u1ti3cfq
14 Apr 22
A method, apparatus, and computer-readable medium for dynamic hierarchical data flow mapping, including storing dynamic data flow mappings, each dynamic data flow mapping including a mapping of data from an input port corresponding to a source data container to an output port corresponding to a destination data container and a dynamic hierarchical field having a dynamic hierarchical data type, determining a rule language corresponding to each dynamic hierarchical field in the dynamic data flow mappings, the rule language defining acceptable parameters for sub-fields of that dynamic hierarchical data type, and generating static data flow mappings by resolving all dynamic hierarchical fields into static hierarchical fields during compilation of the dynamic data flow mappings with the source data container and the destination data container, the static data flow mappings being generated based at least in part on the rule language corresponding to each dynamic hierarchical field and underlying data in one or more of the source data container or the destination data container.
Chandra Vikas RANGHABHATLA, Tejaswinee SOHONI
Filed: 21 Dec 21
Utility
wxq7y66xl1weu5 idrw9g0xqpapqa81b
24 Mar 22
Systems, methods, and techniques for optimizing a plurality of data integration tasks within a data integration collection by identifying, as a sub-set of the plurality of data integration tasks, a plurality of point-to-point data integration tasks defining a data integration transformation plan to include: generating one or more publication data integration tasks comprising publishing from each respective data source of the plurality of point-to-point data integration tasks to generate a single publication topic; and generating one or more subscription data integration tasks causing each respective target of the plurality of point-to-point data integration tasks to subscribe to the single publication topic; and generating a set of optimization instructions configured to cause the at least one computer to implement the data integration transformation plan; and executing the set of optimization instructions to generate the one or more publication data integration tasks and the one or more subscription data integration tasks.
Gadi Wolfman, Kobi Gol, Jaganmohan Reddy Kancharla
Filed: 6 Dec 21