Patent classifications
G06F16/93
Auto summarization of content for use in new storage policies
A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.
Auto summarization of content for use in new storage policies
A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.
Automated honeypot creation within a network
Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.
Automated honeypot creation within a network
Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.
Document storage and management
Techniques are disclosed for content storage in a way that facilitates consistent and concurrent read/write processing of stored documents. An example methodology implementing the techniques includes segmenting the contents of a document into a plurality of content segments and storing the plurality of content segments within a data structure, the data structure including storage blocks having storage portions and buffer portions. The storage of the plurality of content segments includes storage of content segments within a storage portions of the storage blocks of the data structure. The method also includes receiving at least one change to the content and utilizing a buffer portion of at least one storage block to store the at least one change to the content.
Contact creation and utilization
Non-limiting examples of the present disclosure describe creation and management of a contact associated with a document. A contact for a document in a first application may be created. The contact may be used to add content, from a second application, to the document. The contact may be stored. Contact data for the contact may be transmitted to one or more processing devices. An exemplary created contact may be used to transfer content from one or more applications to a document of another application. Other examples are also described.
Contact creation and utilization
Non-limiting examples of the present disclosure describe creation and management of a contact associated with a document. A contact for a document in a first application may be created. The contact may be used to add content, from a second application, to the document. The contact may be stored. Contact data for the contact may be transmitted to one or more processing devices. An exemplary created contact may be used to transfer content from one or more applications to a document of another application. Other examples are also described.
Ambiguous date resolution for electronic communication documents
A computer-implemented method for resolving date ambiguities in electronic communication documents includes identifying, within the documents, date field values each associated with a different instance of a communication segment. The method also includes resolving a candidate date for each different communication segment instance, with each candidate date being associated with a respective priority level indicative of a level of certainty with which the candidate date was resolved, and determining a final date from among the candidate dates at least by comparing the respective priority levels. The method further includes determining, based on the final date, an ordered relationship between the electronic communication documents, and storing metadata indicating the ordered relationship between the electronic communication documents.
Ambiguous date resolution for electronic communication documents
A computer-implemented method for resolving date ambiguities in electronic communication documents includes identifying, within the documents, date field values each associated with a different instance of a communication segment. The method also includes resolving a candidate date for each different communication segment instance, with each candidate date being associated with a respective priority level indicative of a level of certainty with which the candidate date was resolved, and determining a final date from among the candidate dates at least by comparing the respective priority levels. The method further includes determining, based on the final date, an ordered relationship between the electronic communication documents, and storing metadata indicating the ordered relationship between the electronic communication documents.
Secure credentialing systems and methods
A method for preparing a credential package includes providing access to a credential record of a plurality of credential records stored in a database system. The credential record includes information identifying a credential candidate and credential information associated with the credential candidate. The method further comprising receiving a credential document associated with the credential information, receiving credential document information associated with the credential document, and storing the credential document in a distributed ledger system comprising a plurality of nodes.