Patent classifications
G06F11/3072
Framework for UI automation based on graph recognition technology and related methods
A GUI testing device may be configured to execute a testing state machine for interacting with a software application to generate an initial screen of a GUI. The GUI testing device may be configured to determine a current state in the testing state machine based upon a matching trigger target in the initial screen to a given state. The current state may include an operation, and the operation may associate with a trigger target to operate on. The trigger may include a source state, a destination state, and a trigger target. The operation may include a user input operation, and an operation trigger target. The GUI testing device may be configured to perform the operation on the matching trigger target in the initial screen to generate a next screen of the GUI, and advance from the current state to a next state based upon the trigger.
Prevention of Malicious End Point Behavior Through Stateful Rules
Provided are methods and systems for preventing malicious behavior of an end point. An example method commences with monitoring a stream of events associated with the end point. The method further includes processing the stream to record a set of events to a memory. Processing an event of the stream includes determining that the event satisfies at least one rule in a sequence of rules and, in response to the determination, adding the event to the set of events in the memory. The method further includes determining that the set of events includes a sequence of events. Each state in the sequence of events corresponds to at least one rule in the sequence of rules. The method continues with executing at least one action on the end point in response to the determination that the set of events includes the sequence of events.
Information processing device and information processing method
An information processing device capable of reducing an amount of data to be monitored in an onboard system is provided. The information processing device obtains a first log including, per unit time, some communication data flowing through the onboard system. The information processing device determines whether an abnormality is included in the communication data, using the first log. In a case where the abnormality is included in the communication data, the information processing device outputs first detection results to the onboard system. The first detection results cause transmission of a second log from the onboard system. The second log includes, per the unit time, more of the communication data than the first log.
Method and apparatus for testing map service
A method and apparatus for testing a map service are provided. The method may include: determining a to-be-screened service request based on a service request of an electronic map recorded in advance at a preset sampling frequency; screening the to-be-screened service request by using a static rule, to obtain a first valid service request set; screening the to-be-screened service request by using a dynamic test step, to obtain a second valid service request set; and testing a service of the electronic map based on the first valid service request set and the second valid service request set.
Event Prioritization for an Ordered Event Stream
Event prioritization for an ordered event stream (OES) is disclosed. Unlike conventional prioritization techniques, the disclosed subject matter can be performed by an OES data storage system to provide direct, rather than indirect, control of prioritization. In an embodiment, a prioritized hashed key (PHK) can be determined from an event characteristic and an indicated event priority value based on a selectable priority-sensitive hashing function. As such, events with a same key characteristic but different indicated priorities can have different PHKs, events with different key characteristics but the same indicated priority can have different PHKs, and events with the same key characteristic and the same priority can have a same PHK. An event priority can be inherently comprised in the PHK without needing to explicitly store the priority value with a written event in the OES. Moreover, the disclosed prioritization for the OES can be compatible with OES scaling techniques.
System and device for data recovery for ephemeral storage
In various embodiments, a method for page cache management is described. The method can include: identifying a storage device fault associated with a fault-resilient storage device; determining that a first region associated with the fault-resilient storage device comprises an inaccessible space and that a second region associated with the fault-resilient storage device comprises an accessible space; identifying a read command at the second storage device for the data and determine, based on the read command, first data requested by a read operation from a local memory of the second storage device; determining, based on the read command, second data requested by the read operation from the second region; retrieving the second data from the second region; and scheduling a transmission of the second data from the fault-resilient storage device to the second storage device.
Analysis of time series sensor measurements in physical systems
A method for analyzing time series sensor data of a physical system represented by a process graph retrieves sensor data streams from stored sensor time series data. Each of the sensor data streams comprises a sequence of time-value pairs and is associated with a sensor identifier, a time offset, and a sampling period. A metric data stream is produced from the retrieved sensor data streams in accordance with a stored physics model of the physical system. Producing the metric data stream includes i) synchronizing the sensor data streams by adjusting time offsets of the sensor data streams and adding interpolated values and times to the sensor data streams to produce synchronized streams with equal sampling periods; and ii) performing a point-wise computation over values of the sensor data streams in accordance with the physics model.
User interfaces for indicating battery information on an electronic device
In some embodiments, an electronic device displays one or more representations of power usage of the electronic device, including across various periods of time and subperiods of time within those periods. In some embodiments, the displayed information reflects power usage both for periods of the display being on and periods of the display being off. In some embodiments, the displayed information includes power usage attributed to various mobile applications running on the electronic device. In some embodiments, the electronic device displays recommendations to reduce the usage of power by the electronic device, which a user has the option of applying. In some embodiments, the electronic device displays prose insight into power usage, indicating causes of the power usage.
Anomalous behavior detection
A training dataset is used to train an unsupervised machine learning trained model. Corresponding gradient values are determined for a plurality of entries included in the training dataset using the trained unsupervised machine learning model. A first subset of the training dataset is selected based on the determined corresponding gradient values and a first threshold value selected from a set of threshold values. A labeled version of the selected first subset is used to train a first supervised machine learning model to detect one or more anomalies.
String pattern matching for multi-string pattern rules in intrusion detection
In some embodiments, a method stores a plurality of identifiers for a plurality of rules. The plurality of rules each include a set of patterns, and a rule and a pattern combination is associated with an identifier in the plurality of identifiers. Information being sent on a network is scanned and the method determines when a pattern in the information matches a pattern for a rule. The method identifies an identifier for the pattern where the identifier identifies a rule and a pattern combination. Then, the method identifies the rule and the pattern combination based on the identifier. The set of patterns for the rule is found in the information based on determining that the rule and the pattern combinations for the rule have been found in the information.