Patent classifications
G06F40/226
SECURE COMMUNICATION IN MOBILE DIGITAL PAGES
Secure communication in mobile digital pages is provided. The system receives an electronic document and validates the electronic document for storage in a cache server. The system receives a request for the electronic document and provides it to a viewer component on a client computing device. The viewer component loads the electronic document in an iframe. The viewer component executes a runtime component to receive, via a secure communication channel, a tag from the electronic document. The system receives the tag and selects a data value for transmission to the viewer component. The viewer components provides the data value to cause the runtime component to execute an action with the data value.
Apparatus and method for tying together a URL request with multimedia in a database
Apparatus and method are provided for tying together an URL request to a function in the database which returns media data. The invention provides for apparatus that receives a URL request for BLOB data from a web client and receives dynamic values specific to the web client from the web client. The URL is parsed to determine the function in a database and, if they exist, any parameters. A call is made to the function in the database specified in the URL and, if they exist, with parameters specified in the URL and with the dynamic values from the web client. The result can be streamed to the user.
Apparatus and method for tying together a URL request with multimedia in a database
Apparatus and method are provided for tying together an URL request to a function in the database which returns media data. The invention provides for apparatus that receives a URL request for BLOB data from a web client and receives dynamic values specific to the web client from the web client. The URL is parsed to determine the function in a database and, if they exist, any parameters. A call is made to the function in the database specified in the URL and, if they exist, with parameters specified in the URL and with the dynamic values from the web client. The result can be streamed to the user.
Entity resolution framework for data matching
Systems and methods are described for matching a corrupted database record with a record of a validated database. The system receives a corrupted record from a first database. The corrupted record is vectorized to create an input data vector. A denoised data vector is generated by applying a denoising autoencoder to the input data vector, where the denoising autoencoder is specific to the first database. The system compares the denoised data vector with each of a plurality of validated data vectors generated based on records of the validated database to determine that a first denoised data vector matches a matching vector. In response, the system trains the denoising autoencoder using a data pair that includes the input data vector and the matching vector. The system also outputs the validated record that was used to generate the first matching vector.
DYNAMICALLY CONFIGURABLE TEMPLATES TO SUPPORT VERSATILE DEPLOYMENT OF CONFIGURATIONS AT NETWORK DEVICES
Systems and methods are provided for deploying a configuration at a network device. The deployment of the configuration includes, receiving an indication that a particular configuration of a computing component is to be deployed, extracting grammar data from the computing component, the grammar data including commands used to deploy the particular configuration of the computing component and restrictions corresponding to a subset of the commands, generating a template used to deploy the particular configuration, determining, from the grammar data, a variable that is currently undetermined and included in the particular configuration, obtaining the variable, incorporating the variable into the template, and deploying the particular configuration based on the template.
DYNAMICALLY CONFIGURABLE TEMPLATES TO SUPPORT VERSATILE DEPLOYMENT OF CONFIGURATIONS AT NETWORK DEVICES
Systems and methods are provided for deploying a configuration at a network device. The deployment of the configuration includes, receiving an indication that a particular configuration of a computing component is to be deployed, extracting grammar data from the computing component, the grammar data including commands used to deploy the particular configuration of the computing component and restrictions corresponding to a subset of the commands, generating a template used to deploy the particular configuration, determining, from the grammar data, a variable that is currently undetermined and included in the particular configuration, obtaining the variable, incorporating the variable into the template, and deploying the particular configuration based on the template.
EDITOR FOR THE CREATION AND MODIFICATION OF DATA MODEL METADATA
A data model metadata editor is described that may be integrated within a customer data platform. The editor enables a user to create and/or edit data model metadata by implementing a graphical user interface (GUI) that prompts the user to provide input and make selections in a manner that accords with rules concerning what information such metadata must include and how the contents of such metadata should be organized and formatted. Furthermore, the editor may perform syntax checking, validate such input and selections against the aforementioned rules, and flag any detected errors and/or potential problems to the user. Still further, the editor may apply the data model metadata (e.g., data schemas) to actual customer data and present the results to the user within the editor GUI so that the user can visually confirm that changes made to the data model metadata accord with the customer data.
EDITOR FOR THE CREATION AND MODIFICATION OF DATA MODEL METADATA
A data model metadata editor is described that may be integrated within a customer data platform. The editor enables a user to create and/or edit data model metadata by implementing a graphical user interface (GUI) that prompts the user to provide input and make selections in a manner that accords with rules concerning what information such metadata must include and how the contents of such metadata should be organized and formatted. Furthermore, the editor may perform syntax checking, validate such input and selections against the aforementioned rules, and flag any detected errors and/or potential problems to the user. Still further, the editor may apply the data model metadata (e.g., data schemas) to actual customer data and present the results to the user within the editor GUI so that the user can visually confirm that changes made to the data model metadata accord with the customer data.
METHOD AND SYSTEM OF AUTOMATICALLY PREDICTING ANOMALIES IN ONLINE FORMS
A computer-implemented system and method for predicting and flagging an anomaly entered in a digital form. A server computing device classifies a plurality of data fields of the digital form to identify a set of non-zero value data fields; and obtains an anomaly detection model comprising a statistical tree structure associated with the data field of the digital form. The server computing device receives datasets including a target value of a data field and values of a set of cohorting data features; traverses a statistical tree structure of the anomaly detection model with the target dataset to form a set of target cohorts to determine a target statistic value for the data field; flags the data field value of the target dataset as an anomaly item; and generates one or more confidence scores for a runtime prediction based on one or more variance changes for the data field.
Text Analysis System, and Characteristic Evaluation System for Message Exchange Using the Same
[Problem(s)] To provide a text analysis system that is low cost and able to detect text with a normal expressive or structural features.
[Solution] A text analysis system 100 according to the present invention includes a text acquisition portion 110 for acquiring text data; a feature extraction portion 120 for converting the text data acquired by the text acquisition portion 110 into a time series signal to extract a feature from the converted time series signal; a feature storage portion 130 for storing the feature extracted by feature extraction portion 120; and an anomalous text detection portion 140 for detecting anomalous text based on the feature in the feature storage portion 130.