G06F16/284

Method and system for fusing disparate industrial asset event information

There is provided a method and system for monitoring an asset. For example, there is provided a method that includes executing, by a system configured to monitor the asset, a series of operations that can include fetching, from a database communicatively coupled to the system, a data structure including information relative to one or more sources containing event data relative to the asset. The method may include generating, from the data structure, a first table including a list of sources. The method may include generating, from the data structure, a second table including a list of unique consolidated events. The method may include generating, based on a set of predetermined rules, a mapping table configured to relate the first table and the second table. The method may include associating, based on the mapping table, an event in the second table to the one or more sources in the first table.

ICS threat modeling and intelligence framework

In one embodiment, techniques are provided for improved security threat modeling and threat intelligence for infrastructure managed by ICSs. The techniques may leverage an existing model of an ICS created in a CAD application, add to the model security properties specifying configuration of respective electronic components of the ICS, and analyze the resulting combination, together with information from a threat database to automatically generate output such as a threat model diagram, threat model report or an interactive threat intelligence dashboard. A visualization of the output may be displayed together with, or include, a graphical rendering of the infrastructure managed to aid in its interpretation.

SECURE DATABASE WITH USER-DEFINED SCHEMAS
20220360570 · 2022-11-10 ·

Systems and methods are described for providing secure communications among users from different organizations. An example method includes: providing a communication service to (i) a first group of users from a first organization having a first computing environment and (ii) a second group of users from a second organization having a second computing environment; creating a data storage schema in the first computing environment; encrypting the data storage schema using an encryption key in the first computing environment; sending the encrypted data storage schema from the first computing environment to a cloud storage infrastructure; receiving the encrypted data storage schema from the cloud storage infrastructure in the second computing environment; decrypting the data storage schema using the encryption key in the second computing environment; and using the data storage schema to share data between the first group of users and the second group of users.

IDENTIFY AND EXPLAIN LIFE EVENTS THAT MAY IMPACT OUTCOME PLANS

A method, system and apparatus for identifying and explaining events, including determining at least one event from a plurality of events, determining at least one outcome defined by an outcome plan, and identifying a relationship between the at least one event and the at least one outcome.

Progressive query computation using streaming architectures

The described implementations relate to processing of electronic data. One implementation is manifest as a technique that can include obtaining a relational query that references one or more data items and associating progress intervals with the data items. The technique can also include converting the relational query into a corresponding streaming query, and providing the streaming query and the data items with the progress intervals to a stream engine that produces incremental results of the query. For example, the progress intervals can be based on row numbers of a relational database table. The progress intervals can be used to define event lifetimes of streaming events that are provided as inputs to the stream engine.

Multi-tenant knowledge graph databases with dynamic specification and enforcement of ontological data models

A system and method for a high-performance, scalable, multi-tenant, dynamically specifiable, knowledge graph information storage and utilization. The system uses an in-memory associative array for high-performance graph storage and access, with a non-volatile distributed database for scalable backup storage, a scalable, distributed graph service for graph creation, an indexing search engine to increase searching performance, and a graph crawler for graph traversal. One or more of these components may be in the form of a cloud-based service, and in some embodiments the cloud-based services may be containerized to allow for multi-tenant co-existence with no possibility of data leakage or cross-over.

Automatic enforcement of data use policy for machine learning applications
11494512 · 2022-11-08 · ·

Techniques and solutions are described for restricting data that is provided to a machine learning application. Restrictions can be based on use status information, such as use status information associated with a retention manager and indicating whether data is blocked from use. Data identifiers used by a cloud-based system can be correlated with archiving objects of a local system so that the cloud-based system can receive use status information to avoid using blocked data. Restrictions can include restricting data based on whether a data subject has provided consent that allows the data to be used by the machine learning application. A data view can be defined that filters query results to those where consent exits. The data view can join, such as an inner join, a table providing consent information with a data having data subject data.

Determining the schema of a graph dataset

A schema for a dataset is identified by identifying a dataset comprising data and relationships between data pairs. An original schema is identified for the dataset. This original schema comprises an organizational structure. An initial fit between the dataset and the original schema is determined. The initial fit quantifying a conformity of the data in the dataset to the organizational structure of the original schema. A plurality of additional schemas are identified. Each additional schema is a distinct organizational schema. The dataset is partitioned into a plurality of subsets. Each subset comprises a modified fit quantifying a modified conformity of subset data in each subset to one of the original schema and the additional schemas. The modified fit is greater than the original fit.

TENANT COPY OPERATION IN A MICROSERVICE ARCHITECTURE
20230100096 · 2023-03-30 ·

Computer-readable media, methods, and systems are disclosed for copying tenant data within a cloud-based microservice architecture including a Kubernetes cluster. Copy tasks are generated for a plurality of microservices and progress of the copy tasks is monitored by updating one or more statuses associated with the copy tasks. One or more job files may be generated for each microservice including executable code for copying the tenant data within the microservice or within a data store associated with the respective microservice.

DILATANT FLUID BASED OBJECT MOVEMENT CONTROL MECHANISM

A method for execution by a computing entity includes interpreting a magnetic response from a set of magnetic field sensors to produce a piston velocity and a piston position of a piston associated with a head unit device. The head unit device includes a chamber filled with a shear thickening fluid (STF) that includes a multitude of magnetic nanoparticles. The method further includes determining a shear force based on the piston velocity and the piston position. The method further includes determining a desired response for the STF based on the shear force, the piston velocity, and the piston position. The method further includes generating a magnetic activation based on the desired response for the STF and outputting the magnetic activation to a set of magnetic field emitters positioned proximal to the chamber.