G06F21/00

Methods and apparatus for unknown sample classification using agglomerative clustering
11580220 · 2023-02-14 · ·

Methods, apparatus, systems and articles of manufacture are disclosed for classification of unknown samples using agglomerative clustering. An apparatus includes an extractor to extract a feature from a sample source code, the feature including at least one of a register, a variable, or a library based on a threshold of occurrence in a corpus of samples, the corpus of samples including malware samples, a dendrogram generator to generate a dendrogram based on features extracted from the sample source code, the dendrogram representing a collection of samples clustered based on similarity among the samples, the samples including sample clusters belonging to known malware families, and an anchor point identifier to traverse the dendrogram to identify similarity of an unknown sample to the sample clusters based on a confidence score, and identify anchor point samples from the sample clusters identified as similar to the unknown sample, the anchor point samples to provide metadata for use in extrapolating information to classify the unknown sample.

Authentication translation
11556617 · 2023-01-17 · ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

Security schemes for multiple trusted-execution-environments (TEEs) and multiple rich-execution-environments (REEs)
11556654 · 2023-01-17 · ·

A system is provided to perform secure operations. The system includes an I/O subsystem, a memory subsystem and processors. The processors are operative to execute processes in trusted execution environments (TEEs) and rich execution environments (REEs). Each of the TEEs and the REEs is identified by a corresponding access identifier (AID) and protected by a corresponding system resource protection unit (SRPU). The corresponding SRPU of a TEE includes instructions, when executed by a corresponding processor, cause the corresponding processor to control access to the TEE using a data structure including allowed AIDs and pointers to memory locations accessible by the allowed AIDs.

Operator authentication with a vehicle using different pathways

In accordance with one or more embodiments described herein, a method is provided. The method includes receiving a request to assume control of a vehicle generated by a candidate operator via a first communication pathway. The method obtains a key from an onboard controller of the vehicle and communicates the key to the candidate operator via a second communication pathway that is different from the first communication pathway. The method determines the candidate operator to be a confirmed operator based at least in part on obtaining the key from the candidate operator via the first communication pathway.

Triage engine for document authentication

Computer systems and methods are provided for receiving a first authentication request that includes an image of an identification document. A risk value is determined using one or more information factors that correspond to the authentication request. A validation user interface that includes the image of the identification document is displayed. A risk category that corresponds to the risk value is determined using at least a first risk threshold. In accordance with a determination that the risk value corresponds to a first risk category, a visual indication that corresponds to the first risk category is displayed. In accordance with a determination that the risk value corresponds to a second risk category, a visual indication that corresponds to the second risk category is displayed.

Auditing system for machine learning decision system

Computer systems and associated methods are disclosed to implement a decision model auditing system that allows clients of a machine learning decision system to audit the decision-making process the decision system. In embodiments, the decision system is instrumented with reporting code to collect internal decision data of the decision system and send the data to a decision auditing service. In embodiments, the auditing service provides the client with an obfuscated token, which may be used to anonymize the client requests to the decision system. As client requests are handled by the decision system, the reporting code generates audit messages to the auditing service. The auditing service stores the audit information, which may later be provided to the client or used generate an audit report. In embodiments, the audit report may indicate whether the decision system contains any undesired bias.

Dynamic updating of query result displays

Described are methods, systems and computer readable media for dynamic updating of query result displays.

Dynamic updating of query result displays

Described are methods, systems and computer readable media for dynamic updating of query result displays.

System, method, and program product for generating and providing simulated user absorption information
11551803 · 2023-01-10 · ·

The present disclosure relates to a computer-implemented process for generating and providing simulated user absorption information pertaining to users and based on target profiles and target situations, thereby providing user targeted and situationally targeted content recommendations. It is an object of the present disclosure to provide a technological solution to the long felt need in small scale content recommendation systems caused by the technical problem of generating situationally targeted and user profile targeted content recommendations for users of an interactive electronic system.

Providing notifications to authorized users

A method and system for initiating message listening and routing message content to authorized user devices is disclosed. For a second user device to receive notifications regarding records of a first user, the second user device provides information identifying the first user to a notification service. The notification service verifies the identifying information. The notification service initiates one or more listeners to listen for messages flowing over a messaging bus that are relating to the first user. Once a message is identified, at least a portion of the message is used to generate a notification that may be sent to the second user device.