G06F2221/2145

Methods and systems for configuring communication decision trees based on connected positionable elements on canvas

Embodiments relate to configuring artificial-intelligence (AI) decision nodes throughout a communication decision tree. The decision nodes can support successive iteration of AI models to dynamically define iteration data that corresponds to a trajectory through the tree.

System and method of detecting hidden processes by analyzing packet flows

A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.

TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

METHODS AND SYSTEMS FOR CONFIGURING COMMUNICATION DECISION TREES BASED ON CONNECTED POSITIONABLE ELEMENTS ON CANVAS

Embodiments relate to configuring artificial-intelligence (AI) decision nodes throughout a communication decision tree. The decision nodes can support successive iteration of AI models to dynamically define iteration data that corresponds to a trajectory through the tree.

Systems and methods for providing a collaboration work management platform that facilitates differentiation between users in an overarching group and one or more subsets of individual users
11632260 · 2023-04-18 · ·

Systems and methods for providing a collaboration work management platform that facilitates differentiation between users in an overarching group and one or more subsets of individual users within the overarching group to enable the users within the individual subsets to use the collaboration work management platform differently users within the other subsets, the method being implemented by a computer system including one or more physical processors configured by machine-readable instructions are disclosed. Exemplary implementations may: manage environment state information for maintaining a collaboration environment.

Categorization using organizational hierarchy
11663240 · 2023-05-30 · ·

Disclosed are various examples for categorization using an organizational hierarchy. In some examples, a client device receives an enterprise map comprising a plurality of user identifiers, each being associated with a hierarchy level of an enterprise hierarchy. Enterprise content is received. The enterprise content includes data associated with a user identifier from the enterprise map. The enterprise content is associated with a category based on a hierarchy level of the user identifier. A user interface is generated to include the enterprise content and a visual design element based on the category.

System and method for managing data object creation

A system and method are provided for managing creation of data objects, for example in a network or big data environment. A method comprises: receiving, at a processor, a data object creation command for creating the data object; comparing, at the processor, at least one data object creation parameter with a stored data object creation standard; and initiating creation of the data object in response to the data object creation parameter matching a corresponding parameter in the stored data object creation standard. The data object creation command can be modified to meet the stored data object creation standard, and to change an associated permission level. Embodiments of the present disclosure encapsulate standards defining how to create a data object, such that it is no longer necessary to have a person to make sure that these standards are followed, and automate management of object creation while ensuring conformity to organizational standards.

Managing storage volume in a virtual computing infrastructure

Techniques are provided for authorizations in a virtual computing infrastructure using a federation token service. The techniques may include receiving a request for a launch plan from a user for launching instances in a plurality of sites, determining object permissions required for actions to be performed to launch one or more of the instances at each site of the plurality of sites, contacting an authorization caching service to obtain authorization tokens for each of the determined object permissions required for the actions, receiving the authorization tokens for each of the determined object permissions required for the actions, and forwarding the request to each site of the plurality of sites with an authentication token and the authorization tokens for each of the determined object permissions required for the actions to be performed to launch the one or more of the instances at each site of the plurality of sites.

Structure-based access control

The present disclosure provides systems and methods that perform structure-based access control. In particular, rather than relying upon a user-specific credential scheme, which can require manual sharing of user-specific credentials and/or switching between the multiple accounts to access the particular devices, applications, or services associated with such accounts, the systems and methods of the present disclosure facilitate user credentials to be inherited by or otherwise assigned to a structure identifier associated with a structure (e.g., a home in which the user resides), thereby generating a set of structure credentials. This enables other users in the structure, who may be part of a collaborative user group, to access devices, applications, and/or services using the structure credentials.

Multi-Biometric Authentication System
20230112458 · 2023-04-13 ·

The disclosure relates to the multi-party biometric authentication of primary and secondary parties for conducting party relationships.