Patent classifications
G06F16/953
INFORMATION PROCESSING METHOD AND TERMINAL, AND COMPUTER STORAGE MEDIUM
The present application discloses an information processing method performed at a computing device. The method includes: collecting first information; executing an intent identification task on the first information to obtain an intent identification processing result; executing a slot identification task on the first information according to the intent identification processing result to obtain a slot identification processing result; narrowing a search range according to the slot identification processing result; and performing a database search for the first information within the narrowed search range.
System and Method for Memetic Authentication and Identification
A method and system are described for controlling access to online applications using memetic authenticators that are de-identified and passwordless. The method includes curating, issuing ownership, and registering memetic authenticators. The method involves assembling an authenticator package including a fingerprint hash value, matched pairs of user-selected memetic authenticator records, a timer, and encrypting the package using a cipher issued and uniquely-assigned by a service provider. Ciphers may be regenerated on each authentication event providing for episodic re-verification. Fingerprints assign ownership for memetic authenticators, with such associations stored on networked nodes of a distributed database. On authenticating, the client-supplied authenticator package is decrypted and compared to ownership records on an identity network for verification and granting or denying access. The method provides for multilateral verification by retrieving ownership claims from multiple nodes during authentication events. At no time does any party to the system possess everything required to authenticate.
System and Method for Memetic Authentication and Identification
A method and system are described for controlling access to online applications using memetic authenticators that are de-identified and passwordless. The method includes curating, issuing ownership, and registering memetic authenticators. The method involves assembling an authenticator package including a fingerprint hash value, matched pairs of user-selected memetic authenticator records, a timer, and encrypting the package using a cipher issued and uniquely-assigned by a service provider. Ciphers may be regenerated on each authentication event providing for episodic re-verification. Fingerprints assign ownership for memetic authenticators, with such associations stored on networked nodes of a distributed database. On authenticating, the client-supplied authenticator package is decrypted and compared to ownership records on an identity network for verification and granting or denying access. The method provides for multilateral verification by retrieving ownership claims from multiple nodes during authentication events. At no time does any party to the system possess everything required to authenticate.
OPTIMIZING REQUEST SIZES IN A SEARCH ENGINE FANOUT
The present disclosure relates to systems and methods for implementing a distributed search that allows a search engine to retrieve the correct results for a search request even if the search engine does not request the full results from each index shard originally requested in the search request.
OPTIMIZING REQUEST SIZES IN A SEARCH ENGINE FANOUT
The present disclosure relates to systems and methods for implementing a distributed search that allows a search engine to retrieve the correct results for a search request even if the search engine does not request the full results from each index shard originally requested in the search request.
KNOWLEDGE CONTENT DISTRIBUTION METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM
Provided are a knowledge content distribution method, an electronic device, and a storage medium. The method includes the following. An acquisition request sent by a distribution waiting user for target knowledge content is received, where the acquisition request carries at least an identifier of the target knowledge content. In response to the acquisition request, the target knowledge content is acquired according to the priority of each author of the target knowledge content in terms of the target knowledge content. The target knowledge content is distributed to the distribution waiting user.
METHOD AND APPARATUS FOR TRAINING SEMANTIC RETRIEVAL NETWORK, ELECTRONIC DEVICE AND STORAGE MEDIUM
The disclosure provides a method for training a semantic retrieval network, an electronic device and a storage medium. The method includes: obtaining a training sample including a search term and n candidate files corresponding to the search term, where n is an integer greater than 1; inputting the training sample into the ranking model, to obtain n first correlation degrees output by the ranking model, in which each first correlation degree represents a correlation between a candidate document and the search term; inputting the training sample into the semantic retrieval model, to obtain n second correlation degrees output by the semantic retrieval model, wherein each second correlation degree represents a correlation between a candidate document and the search term; and training the semantic retrieval model and the ranking model jointly based on the n first correlation degrees and the n second correlation degrees.
Using frames for action dialogs
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for using frames for performing tasks. One of the methods includes receiving a first request to perform a task, the first request comprising user speech identifying the task; generating a frame associated with the task, wherein the frame comprises one or more types of values necessary to perform the task, and wherein each type of value can be satisfied by a respective value; receiving a second request to provide information related to a question, the second request comprising user speech identifying the question; providing information identifying the question to a search engine, and receiving a response identifying one or more terms; determining that at least one term can satisfy a type of value necessary to perform the task; and storing the at least one term in the frame.
Using frames for action dialogs
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for using frames for performing tasks. One of the methods includes receiving a first request to perform a task, the first request comprising user speech identifying the task; generating a frame associated with the task, wherein the frame comprises one or more types of values necessary to perform the task, and wherein each type of value can be satisfied by a respective value; receiving a second request to provide information related to a question, the second request comprising user speech identifying the question; providing information identifying the question to a search engine, and receiving a response identifying one or more terms; determining that at least one term can satisfy a type of value necessary to perform the task; and storing the at least one term in the frame.
Methods and apparatuses for vulnerability detection and maintenance prediction in industrial control systems using hash data analytics
Method, apparatus and computer program product for detecting vulnerability and predicting maintenance in an industrial control system are described herein.