G06F16/245

Systems and methods for generation of secure indexes for cryptographically-secure queries

Systems and methods are disclosed for generation of a representative data structure. A computing device can receive data including various data items. The computing device can generate logical rows that include the data items. The computing device can convert the logical rows into nodes and store the nodes into logical rows of a first logical table. The computing device can generate logical rows for a second logical table including row identifiers and a link to one of the logical rows from the first logical table.

Systems and methods for generation of secure indexes for cryptographically-secure queries

Systems and methods are disclosed for generation of a representative data structure. A computing device can receive data including various data items. The computing device can generate logical rows that include the data items. The computing device can convert the logical rows into nodes and store the nodes into logical rows of a first logical table. The computing device can generate logical rows for a second logical table including row identifiers and a link to one of the logical rows from the first logical table.

PROVISIONING FOR SMART NAVIGATION SERVICES

Techniques for provisioning a smart navigation service are presented. The provisioning can be performed by a name owner, by the smart navigation service itself, or by a third-party keyword service. The provisioned information can include an entity name, a keyword, and possibly other data correlated to at least one network locator. The navigation service electronically stores in navigation service persistent memory a rule correlating the entity name, the keyword, and, if used, the other data, to the at least one network locator, such that when the navigation service receives, from a client computer communicatively coupled to the navigation service, command data that includes the entity name, the keyword, and possibly other data, the navigation service responds to the client computer with the at least one network locator.

RECORD LEVEL DATA SECURITY
20180012035 · 2018-01-11 ·

A database security system protects a data table at both the column level and the individual data record level. Access to data records within the data table is governed by categories assigned to data records, by user roles assigned to users, and by a set of security access tables. A first access table maps data record identifiers to data record categories, data record protection schemes, and corresponding scheme keys. A second access table maps user roles to data record categories. A third access table maps column identifiers to column protection schemes and corresponding scheme keys. A fourth access table maps user roles to column identifiers. If a user requests access to a data record, the security access tables are queried using the data record identifier, the associated column identifier, and the user roles associated with the user to determine if the user can access the requested data record.

System and method for incremental training of machine learning models in artificial intelligence systems, including incremental training using analysis of network identity graphs

Systems and methods for embodiments of incremental training of machine learning model in artificial intelligence systems are disclosed. Specifically, embodiments of incremental training of machine learning models using drift detection models are disclosed, including embodiments that utilize drift detection models to determine drift based on identity graphs in artificial intelligence identity management systems.

System and method for incremental training of machine learning models in artificial intelligence systems, including incremental training using analysis of network identity graphs

Systems and methods for embodiments of incremental training of machine learning model in artificial intelligence systems are disclosed. Specifically, embodiments of incremental training of machine learning models using drift detection models are disclosed, including embodiments that utilize drift detection models to determine drift based on identity graphs in artificial intelligence identity management systems.

METHOD AND APPARATUS OF NON-VOLATILE MEMORY SYSTEM HAVING CAPABILITY OF KEY-VALUE STORE DATABASE
20180012033 · 2018-01-11 ·

A computer system is coupled to one or more servers which run one or more applications. The computer system comprises: a memory storing key data, value data associated with each of the key data, and application mask data, the application mask data indicating, for each of the value data, which application is allowed to access said each value data based on the key data associated with the value data; and a processor configured to: receive a get operation which includes a first key data and a first application identifier, the first application identifier identifying a first application which issues the get operation; determine whether the first application is allowed to access a first value data associated with the first key data based on the application mask data; and return the first value data if the application mask data indicates the first application is allowed to access the first value data.

Query-based time-series data display and processing system
11709852 · 2023-07-25 · ·

Various systems and methods are described herein for an improved spreadsheet application that allows a user to generate, manipulate, and replicate data visualizations (e.g., sparklines, graphs, charts, etc.) using functions without importing data into cells of the application. For example, data is stored in one or more remote or local data stores accessible to the improved spreadsheet application. A user enters a function into a cell of the improved spreadsheet application. The improved spreadsheet application generates a query using the function, the query identifying a portion of a dataset to retrieve from the data store(s). The improved spreadsheet application then transmits the query to the data store(s) and retrieves the requested data. A renderer of the improved spreadsheet application then renders a sparkline using the retrieved data. The improved spreadsheet application displays the rendered sparkline in the cell in which the function was entered, or at another designated location.

Query-based time-series data display and processing system
11709852 · 2023-07-25 · ·

Various systems and methods are described herein for an improved spreadsheet application that allows a user to generate, manipulate, and replicate data visualizations (e.g., sparklines, graphs, charts, etc.) using functions without importing data into cells of the application. For example, data is stored in one or more remote or local data stores accessible to the improved spreadsheet application. A user enters a function into a cell of the improved spreadsheet application. The improved spreadsheet application generates a query using the function, the query identifying a portion of a dataset to retrieve from the data store(s). The improved spreadsheet application then transmits the query to the data store(s) and retrieves the requested data. A renderer of the improved spreadsheet application then renders a sparkline using the retrieved data. The improved spreadsheet application displays the rendered sparkline in the cell in which the function was entered, or at another designated location.

Systems and methods for managing a highly available distributed hybrid transactional and analytical database

Systems and methods for managing a highly available distributed hybrid database comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: receive a query from a user device to retrieve data from a distributed database comprising a source node, a first plurality of replica nodes, and a second plurality of replica nodes, wherein the source node and the first plurality of replica nodes form a transactional cluster, and wherein the second plurality of replica nodes forms an analytical cluster; determine whether to process the query using the transactional cluster or the analytical cluster based on one or more rules; translate the query into a first protocol that the determined cluster comprehends; select a replica node corresponding to the determined cluster; process the query using the selected replica node; and send data associated with results from processing the query to the user device.