Systems and Methods for Facial Recognition Training Dataset Adaptation with Limited User Feedback in Surveillance Systems
Granted: November 24, 2022
Application Number:
20220374656
Various embodiments provide systems and methods for updating a training dataset so that the generated machine learning model can adapt to both short-term and long-term face variations including, for example, head pose, dressing, lighting conditions, and/or aging.
Systems and Methods for Hierarchical Facial Image Clustering
Granted: November 24, 2022
Application Number:
20220374627
Various systems and methods for clustering facial images in, for example, surveillance systems.
DETERMINATION OF A SECURITY RATING OF A NETWORK ELEMENT
Granted: November 17, 2022
Application Number:
20220368719
Systems and methods for a security rating framework that translates compliance requirements to corresponding desired technical configurations to facilitate generation of security ratings for network elements is provided. According to one embodiment, a host network element executes a collection of security checks on at least a first network element. The execution is performed by receiving configuration data of the first network element pertaining to each security check of the collection…
SYSTEMS AND METHODS FOR INCORPORATING AUTOMATED REMEDIATION INTO INFORMATION TECHNOLOGY INCIDENT SOLUTIONS
Granted: November 17, 2022
Application Number:
20220368587
Various approaches for providing network maintenance and health monitoring. In some cases, some approaches include systems, methods, and/or devices that provide for receiving and cataloging network incidents and invoking automated remediation in relation to network incidents.
MULTI-PATH CELLULAR CHANNEL EXTENSIONS TO SUPPORT MULTIPLE SIMULTANEOUS PACKET DATA NETWORKS
Granted: October 27, 2022
Application Number:
20220346169
Embodiments discussed generally relate to cellular network gateways. In some cases, embodiments discussed relate to cellular network gateways capable of processing multiple streams of IP traffic over multiple channels.
SYSTEMS AND METHODS FOR SCALABLE ZERO TRUST SECURITY PROCESSING
Granted: October 27, 2022
Application Number:
20220345491
Various approaches for providing scalable network access processing. In some cases, approaches discussed relate to systems and methods for providing scalable zero trust network access control.
FRAMEWORK FOR DETERMINING METRICS OF AN AUTOMATION PLATFORM
Granted: October 20, 2022
Application Number:
20220337490
Systems and methods for determining an efficiency score for an automation platform are provided. According to one embodiment, a first weight for each playbook of multiple playbooks of an automation framework and a second weight for each type of error of multiple types of errors that may cause execution of one of the multiple playbooks to fail are maintained. The first weight represents a relative importance of the playbook and the second weight represents an effort required to address…
DETERMINING A RISK PROBABILITY OF A URL USING MACHINE LEARNING OF URL SEGMENTS
Granted: September 8, 2022
Application Number:
20220286483
Systems, methods, and apparatuses enable a machine learning model to determine a risk probability of a URL. A query configurator receives a URL in a query and normalizes the URL. The normalized URL is segmented into a plurality of segments. The plurality of segments is serially provided to the machine learning model trained to provide an indication of risk associated with the URL. The indication of risk associated with the URL can be a probability value based on one or more risk…
SYSTEMS AND METHODS FOR PORTABLE COMPUTING DEVICE PROTECTION
Granted: September 8, 2022
Application Number:
20220286436
Various approaches for providing intermediary threat detection. In some cases, the intermediary threat detection is performed by a communication control port that operatively couples with a portable computing device to protect the portable computing device from network based vulnerabilities and exploits.
THERMISTOR SENSOR ARRANGEMENT FOR MEASURING CHIPSET TEMPERATURE
Granted: April 14, 2022
Application Number:
20220113200
A thermistor sensor arrangement for measuring chipset temperature is provided. According to various aspects of the present disclosure, a sensor assembly is placed between a heat sink of a chipset and a PCB on which the chipset is mounted. The sensor assembly includes a thermistor sensor, an electrical connector, and a resilient pad. The thermistor sensor includes a first end having a sensing element and a second end having sensor contacts. The electrical connector has a first interface…
SECURE LINK AGGREGATION
Granted: March 31, 2022
Application Number:
20220104016
Systems and methods are for securing link aggregation are provided. According to an embodiment, a network device in a secure domain discovers device information associated with a peer network device in an untrusted domain that is connected through a first link directly connecting a first interface of the network device to a first interface of the peer network device, and authenticates the peer while allowing at least some network traffic to continue to be transmitted through the first…
ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION
Granted: March 31, 2022
Application Number:
20220103594
Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device detects whether the endpoint has moved to a new network by monitoring for changes to an IP address associated with the endpoint. When the detecting is affirmative, the agent further determines whether a trusted network determination service associated with a cloud-based security service is reachable. When the…
ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION
Granted: March 31, 2022
Application Number:
20220103569
Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the…
ESTABLISHING A SECURE INTERNET CONNECTION BETWEEN AN ENDPOINT AGENT AND A CLOUD-BASED SECURITY SERVICE
Granted: March 31, 2022
Application Number:
20220103523
Systems and methods for establishing a secure connection between an endpoint agent and a cloud-based security service are provided. According to one embodiment, a DNS request is issued by an agent running on an endpoint device to a secure Internet connection service of a cloud-based security service that includes multiple pools of geographically distributed VPN servers. A DNS response to the DNS request is received containing an IP address of a particular VPN server within a pool of the…
NETWORK TRAFFIC METERING CREDIT DISTRIBUTION IN NETWORK DEVICE HAVING MULTIPLE PROCESSING UNITS
Granted: March 31, 2022
Application Number:
20220103474
Systems and methods for network traffic metering credit distribution and packet processing in a network device having multiple processing units are provided. According to an embodiment, management of multiple meters is distributed among multiple processing units of a network device. Each meter is implemented in a form of a master entry and a slave entry. Responsive to receipt by one of the processing units of a packet subject to rate-limiting by a meter, an action to be taken on the…
SYSTEMS AND METHODS FOR CENTRALLY MANAGED HOST AND NETWORK FIREWALL SERVICES
Granted: March 24, 2022
Application Number:
20220091994
Systems and methods for a unified, cloud-managed platform for controlling enterprise network security are provided. According to one embodiment, a network of an enterprise is protected by a cloud-managed platform. An underlying architecture of the cloud-managed platform is abstracted by providing a portal through which modifications to security policies are expressed as business requirements of the enterprise. The security policies are automatically enforced regardless of location or…
CONVEX OPTIMIZED STOCHASTIC VECTOR SAMPLING BASED REPRESENTATION OF GROUND TRUTH
Granted: March 17, 2022
Application Number:
20220083810
Systems and methods are described for training a machine learning model using intelligently selected multiclass vectors. According to an embodiment, a processing resource of a computing system receives a first set of un-labeled feature vectors. The first set feature vectors are homomorphically translated using a T-Distributed Stochastic Neighbor Embedding (t-SNE) algorithm to obtain a second set of feature vectors with reduced dimensionality. The second set of feature vectors are…
INDUCTIVE LEARNING AND INDUCTIVE FORGETTING FOR BOLSTERING MACHINE-LEARNING MODEL PERFORMANCE
Granted: March 17, 2022
Application Number:
20220083901
Systems and methods are described for training a machine learning model using intelligently selected multiclass vectors. According to an embodiment, an un-labeled feature vector is selected from a set of feature vectors. A model classified cluster and a confidence score are obtained by classifying an un-labeled feature vector using a machine-learning model. A determination is made regarding whether the confidence score is greater than a threshold. When the determination is affirmative:…
INTELLIGENT VECTOR SELECTION BY IDENTIFYING HIGH MACHINE-LEARNING MODEL SKEPTICISM
Granted: March 17, 2022
Application Number:
20220083900
Systems and methods are described for training a machine learning model using intelligently selected multiclass vectors. According to an embodiment, a processing resource of a computer system receives a set of feature vectors. For each feature vector of the set of feature vectors: (i) the feature vector is classified as one of multiple classes using a machine-learning model trained for multiclass classification; and (ii) a prediction skepticism metric, representing a degree of prediction…
REAL-TIME MINIMAL VECTOR LABELING SCHEME FOR SUPERVISED MACHINE LEARNING
Granted: March 17, 2022
Application Number:
20220083815
Systems and methods are described for training a machine learning model using intelligently selected multiclass vectors. According to an embodiment, a set of un-labeled feature vectors are received. The set of feature vectors are grouped into clusters within a vector space having fewer dimensions than the first set of feature vectors by applying a homomorphic dimensionality reduction algorithm to the set of feature vectors and performing centroid-based clustering. An optimal set of…