H04L67/50

ABNORMAL BEHAVIOR DETECTION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM
20230004979 · 2023-01-05 ·

This application provides an abnormal online operational behavior detection method performed by an electronic device. The method includes: obtaining a first target sub-model corresponding to a first target object from a first preset object model; determining an abnormal data volume from the first target sub-model based on a preset model parameter and a first detection result by comparing a target data volume and the abnormal data volume; obtaining a second target sub-model corresponding to a second target object and having a highest similarity with the first target sub-model from a second preset object model; obtaining a target maximum data volume corresponding to the second target sub-model, and determining a second detection result by comparing the target data volume and the target maximum data volume; and determining a target detection result of the online operation behavior information in accordance with the first detection result and the second detection result.

Method and apparatus for providing contextual services

Provided are systems and methods for contextually providing services via a portable computer at a selected location. According to some embodiments, the systems and methods include processes for determining location-specific information about the selected location, determining status information about a user of the portable computer interface, and displaying an available service to the user on a display screen of the portable computer, the available service being selected based on the location-specific information and the status information.

Electric vehicle (EV) charge unit reservations

A computer implemented method for managing charge availability of a charge unit (CU) to obtain charge for a battery of an electric vehicle (EV) is provided. The CU includes a computer for processing at least part of the method and for communicating with a server over a network. The method includes receiving, by the server, status information from the computer of the CU. The method includes sending to the computer of the CU instructions to make a reservation for the CU. The reservation is for a user account that has requested a desire to charge the battery of the electric vehicle of the user at the CU or another CU. The method includes sending, by the server, a confirmation for the reservation to the user account. The confirmation is viewable via a device having access to the server via the user account. The method includes sending, by the server, a data regarding a time of availability of the CU to the user account for the reservation. The computer of the CU is configured to display a visual indicator regarding the reservation of the CU.

Risk assessment using social networking data

Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and other organizations from identity theft and fraud. Risks associated with various entities can be analyzed and assessed based on analysis of social network data, professional network data, or other networking connections, among other data sources. In various embodiments, the risk assessment may include calculating an authenticity score based on the collected network data.

Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices

Various embodiments of the present technology generally relate to data delivery. More specifically, some embodiments of the present technology relate to systems and methods for using spatial and temporal analysis to associate data sources with mobile devices. The delivery of data to support a wide variety of services for and about mobile devices that are based on data stored in corporate, commercial, and government databases which is not currently linked to individual mobile devices. Some embodiments allow advertisers to better target their ads to relevant target audience with greater accuracy.

System for prefetching digital tags
11570273 · 2023-01-31 · ·

Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.

On-line session trace system
11568474 · 2023-01-31 · ·

In various example embodiments, a system and method for enhancing a user's on-line experience by utilizing a computer-implemented on-line session trace system is provided. The on-line session trace system is provided in connection with an on-line trading platform. The on-line session trace system records and stores a state of an on-line session associated with a user identification and permits a user associated with the user identification to commence a further on-line session from a state corresponding to the saved state of a previous on-line session.

Cloud intelligence data model and framework

A network-accessible service provides an enterprise with a view of all identity and data activity in the enterprise's cloud accounts. The service enables distinct cloud provider management models to be normalized with centralized analytics and views across large numbers of cloud accounts. The service enables an enterprise to model all activity and relationships across cloud vendors, accounts and third party stores. Display views of this information preferably can pivot on cloud provider, country, cloud accounts, application or data store. Using a domain-specific query language, the system enables rapid interrogation of a complete and centralized data model of all data and identity relationships. User reports may be generated showing all privileges and data to which a particular identity has access. Similarly, data reports shown all entities having access to an asset can be generated. Using the display views, a user can pivot all functions across teams, applications and data, geography, provider and compliance mandates, and the like.

COMPLEX COMPUTING NETWORK FOR USING DATA FROM DIGITAL TRACKING AND RELAYING SYSTEMS
20230237086 · 2023-07-27 ·

This disclosure is directed to a complex computing network for obtaining and using data from a transmitting system and a digital tracking and relaying system. An exemplary method comprises: receiving, from a transmitting system, a first input data associated with a registered user account; receiving, from a digital tracking and relaying system, a second input data associated with the registered user account and captured by a sensor comprised in the digital tracking and relaying system; associating at least one of the first input data or the second input data with the registered user account; associating task data with the registered user account; executing an update to the registered user account based on the first input data, second input data, or the task data; and enabling usage of the output data on a data processing platform.

Distributed resource management by improving cluster diversity

A method of distributed resource management in a distributed computing system includes determining usage of respective hardware resources by an application and generating usage metrics for the application, and assigning the application to a cluster of hardware resources to optimize diversity of usage of hardware resources in the cluster and to enhance utilization of the hardware resources by applications running in that cluster. The diversity of usage of the hardware resources is determined from respective usage metrics of the respective applications running in that cluster. The diversity of usage of the hardware resources in the cluster is optimized by assigning the application to a diversity pool of hardware resources adapted to minimize interference when applications assigned to the diversity pool of hardware resources access the hardware resources in the diversity pool and assigning applications from different diversity pools to the cluster of hardware resources.