Machine Learning Systems and Methods for Using an Orthogonality Heuristic to Identify an Ignored Labeling Target
Granted: December 15, 2022
Application Number:
20220398453
Among a great deal of other disclosure and scope, systems and methods are enclosed that enable efficient assessment of the currently known manifolds within a problem space. A set of labeled vectors is identified as well as a set of unlabeled vectors. An angular based comparison is made between each unlabeled vector and each labeled vector. If the smallest angle between a given unlabeled vector and any of the labeled vectors is deemed satisfactory, such as when the angle is small and…
Machine Learning Systems and Methods for Regression Based Active Learning
Granted: December 15, 2022
Application Number:
20220398449
Among a great deal of other disclosure and scope, systems and methods are enclosed that enable for highly efficient labeling of data. For example, in some of many cases, a novel methodology for ranking vectors most useful to label next is disclosed. In such an example, a neural network is trained to predict this ranking methodology upon being given a set of heuristics from which to assess the given problem space. A user can continue the cycle of identifying a set of candidate vectors to…
Machine Learning Systems and Methods for Using Perturbation to Identify High Value Vector Labeling Targets
Granted: December 15, 2022
Application Number:
20220398436
Among a great deal of other disclosure and scope, systems and methods are enclosed that adapt adversarial learning principles to an active learning regime. Given a problem space of note, a set of labeled vectors, a machine learning model trained on the set of labeled vectors, and a set of unlabeled vectors, we identify the unlabeled vectors our model is most unsure of. Each of our unlabeled vectors in our set of unlabeled vectors is initially classified by our model, and the prediction…
Systems and Methods for Facial Recognition Training Dataset Adaptation with Limited User Feedback in Surveillance Systems
Granted: November 24, 2022
Application Number:
20220374656
Various embodiments provide systems and methods for updating a training dataset so that the generated machine learning model can adapt to both short-term and long-term face variations including, for example, head pose, dressing, lighting conditions, and/or aging.
Systems and Methods for Hierarchical Facial Image Clustering
Granted: November 24, 2022
Application Number:
20220374627
Various systems and methods for clustering facial images in, for example, surveillance systems.
DETERMINATION OF A SECURITY RATING OF A NETWORK ELEMENT
Granted: November 17, 2022
Application Number:
20220368719
Systems and methods for a security rating framework that translates compliance requirements to corresponding desired technical configurations to facilitate generation of security ratings for network elements is provided. According to one embodiment, a host network element executes a collection of security checks on at least a first network element. The execution is performed by receiving configuration data of the first network element pertaining to each security check of the collection…
SYSTEMS AND METHODS FOR INCORPORATING AUTOMATED REMEDIATION INTO INFORMATION TECHNOLOGY INCIDENT SOLUTIONS
Granted: November 17, 2022
Application Number:
20220368587
Various approaches for providing network maintenance and health monitoring. In some cases, some approaches include systems, methods, and/or devices that provide for receiving and cataloging network incidents and invoking automated remediation in relation to network incidents.
MULTI-PATH CELLULAR CHANNEL EXTENSIONS TO SUPPORT MULTIPLE SIMULTANEOUS PACKET DATA NETWORKS
Granted: October 27, 2022
Application Number:
20220346169
Embodiments discussed generally relate to cellular network gateways. In some cases, embodiments discussed relate to cellular network gateways capable of processing multiple streams of IP traffic over multiple channels.
SYSTEMS AND METHODS FOR SCALABLE ZERO TRUST SECURITY PROCESSING
Granted: October 27, 2022
Application Number:
20220345491
Various approaches for providing scalable network access processing. In some cases, approaches discussed relate to systems and methods for providing scalable zero trust network access control.
FRAMEWORK FOR DETERMINING METRICS OF AN AUTOMATION PLATFORM
Granted: October 20, 2022
Application Number:
20220337490
Systems and methods for determining an efficiency score for an automation platform are provided. According to one embodiment, a first weight for each playbook of multiple playbooks of an automation framework and a second weight for each type of error of multiple types of errors that may cause execution of one of the multiple playbooks to fail are maintained. The first weight represents a relative importance of the playbook and the second weight represents an effort required to address…
DETERMINING A RISK PROBABILITY OF A URL USING MACHINE LEARNING OF URL SEGMENTS
Granted: September 8, 2022
Application Number:
20220286483
Systems, methods, and apparatuses enable a machine learning model to determine a risk probability of a URL. A query configurator receives a URL in a query and normalizes the URL. The normalized URL is segmented into a plurality of segments. The plurality of segments is serially provided to the machine learning model trained to provide an indication of risk associated with the URL. The indication of risk associated with the URL can be a probability value based on one or more risk…
SYSTEMS AND METHODS FOR PORTABLE COMPUTING DEVICE PROTECTION
Granted: September 8, 2022
Application Number:
20220286436
Various approaches for providing intermediary threat detection. In some cases, the intermediary threat detection is performed by a communication control port that operatively couples with a portable computing device to protect the portable computing device from network based vulnerabilities and exploits.
THERMISTOR SENSOR ARRANGEMENT FOR MEASURING CHIPSET TEMPERATURE
Granted: April 14, 2022
Application Number:
20220113200
A thermistor sensor arrangement for measuring chipset temperature is provided. According to various aspects of the present disclosure, a sensor assembly is placed between a heat sink of a chipset and a PCB on which the chipset is mounted. The sensor assembly includes a thermistor sensor, an electrical connector, and a resilient pad. The thermistor sensor includes a first end having a sensing element and a second end having sensor contacts. The electrical connector has a first interface…
SECURE LINK AGGREGATION
Granted: March 31, 2022
Application Number:
20220104016
Systems and methods are for securing link aggregation are provided. According to an embodiment, a network device in a secure domain discovers device information associated with a peer network device in an untrusted domain that is connected through a first link directly connecting a first interface of the network device to a first interface of the peer network device, and authenticates the peer while allowing at least some network traffic to continue to be transmitted through the first…
ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION
Granted: March 31, 2022
Application Number:
20220103594
Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device detects whether the endpoint has moved to a new network by monitoring for changes to an IP address associated with the endpoint. When the detecting is affirmative, the agent further determines whether a trusted network determination service associated with a cloud-based security service is reachable. When the…
ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION
Granted: March 31, 2022
Application Number:
20220103569
Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the…
ESTABLISHING A SECURE INTERNET CONNECTION BETWEEN AN ENDPOINT AGENT AND A CLOUD-BASED SECURITY SERVICE
Granted: March 31, 2022
Application Number:
20220103523
Systems and methods for establishing a secure connection between an endpoint agent and a cloud-based security service are provided. According to one embodiment, a DNS request is issued by an agent running on an endpoint device to a secure Internet connection service of a cloud-based security service that includes multiple pools of geographically distributed VPN servers. A DNS response to the DNS request is received containing an IP address of a particular VPN server within a pool of the…
NETWORK TRAFFIC METERING CREDIT DISTRIBUTION IN NETWORK DEVICE HAVING MULTIPLE PROCESSING UNITS
Granted: March 31, 2022
Application Number:
20220103474
Systems and methods for network traffic metering credit distribution and packet processing in a network device having multiple processing units are provided. According to an embodiment, management of multiple meters is distributed among multiple processing units of a network device. Each meter is implemented in a form of a master entry and a slave entry. Responsive to receipt by one of the processing units of a packet subject to rate-limiting by a meter, an action to be taken on the…
SYSTEMS AND METHODS FOR CENTRALLY MANAGED HOST AND NETWORK FIREWALL SERVICES
Granted: March 24, 2022
Application Number:
20220091994
Systems and methods for a unified, cloud-managed platform for controlling enterprise network security are provided. According to one embodiment, a network of an enterprise is protected by a cloud-managed platform. An underlying architecture of the cloud-managed platform is abstracted by providing a portal through which modifications to security policies are expressed as business requirements of the enterprise. The security policies are automatically enforced regardless of location or…
REAL-TIME MINIMAL VECTOR LABELING SCHEME FOR SUPERVISED MACHINE LEARNING
Granted: March 17, 2022
Application Number:
20220083815
Systems and methods are described for training a machine learning model using intelligently selected multiclass vectors. According to an embodiment, a set of un-labeled feature vectors are received. The set of feature vectors are grouped into clusters within a vector space having fewer dimensions than the first set of feature vectors by applying a homomorphic dimensionality reduction algorithm to the set of feature vectors and performing centroid-based clustering. An optimal set of…