Patent classifications
G06F11/32
SYSTEM AND METHOD FOR SIEM RULE SORTING AND CONDITIONAL EXECUTION
A method for processing security events by applying a rule-based alarm scheme may be provided. The method includes generating a rule index of rules and an indicator of compromise index for each of the rules. The method includes also processing the incoming security event by applying the rules, increasing a current rule counter relating to a triggered rule, and increasing a current indicator of compromise counter pertaining to the triggered rule. Furthermore, the method includes generating a pseudo security event from received data about known attacks and related indicators of compromise, processing the pseudo security events by sequentially applying the rules, increasing a current rule counter of pseudo security events, and increasing a current indicator of compromise counter for pseudo security events, and sorting the rules and sorting within each rule the indicator of compromise values in the indicator of compromise index.
SYSTEMS AND METHODS FOR A SIGNAL PROCESSING DEVICE
Methods and systems are provided for detecting artifacts in an electronic signal. In an embodiment, a method is provided comprising: connecting a first input of an electronic device to a first signal line of a signal processing device, such as an amplification device; connecting a second input of the electronic device to a second signal line of the signal processing device, the second signal line being downstream from the first signal line; establishing, based on an observed behavior of a first signal on the first signal line, an expected behavior of a second signal on the second signal line; and determining whether a difference exists between the expected behavior of the second signal and an observed behavior of the second signal. If a difference is detected, the expected behavior of a second signal and the observed behavior of the second signal may be recorded for later analysis.
ELECTRONIC DEVICE AND OPERATION METHOD THEREOF
An electronic device includes a display, a memory, and a processor operatively connected to the display and the memory. The memory stores instructions that, when executed, cause the processor to receive backup data from an external electronic device, identify characteristics of the external electronic device based on the backup data, identify characteristics of the electronic device based on the backup data, at least partially change the backup data based on the characteristics of the electronic device, and display a result of performing a restoring operation based on the at least partially changed backup data on the display.
Security tool for n-tier platforms
An apparatus includes a memory and a hardware processor. The memory stores a plurality of logging rules. Each logging rule assigned to a tier of a multi-tier platform. The processor receives source code for an application configured to execute on a plurality of tiers of the multi-tier platform and detects, within the source code, an entry point and an exit point for a tier of the plurality of tiers. The processor determines, based on the plurality of logging rules, a first attribute that is to be logged during execution in the tier and a second attribute that is not to be logged during execution in the tier and inserts, between the entry point and the exit point in the source code, logging code that, when executed, logs the first attribute and hides the second attribute.
Method for managing multiple operating systems in a terminal
The disclosure provides a method for managing multiple operating systems in a terminal. The terminal includes multiple operating systems and a management system. The management system is configured to manage the multiple operating systems. The management system includes a cross-system application database. The method includes: when a first operating system in the multiple operating systems runs in a foreground, and a second operating system in the multiple operating systems runs in a background, if the second operating system receives a first message of a first application in the second operating system, sending, by the second operating system, a notification message to the management system; storing, by the management system, the notification message into the cross-system application database; and listening, by the first operating system, on the cross-system application database, and outputting a prompt of the first message when listening and obtaining the notification message.
Data processing system with machine learning engine to provide output generating functions
Systems, methods, computer-readable media, and apparatuses for identifying and executing one or more interactive condition evaluation tests to generate an output are provided. In some examples, user information may be received by a system and one or more interactive condition evaluation tests may be identified. An instruction may be transmitted to a computing device of a user and executed on the computing device to enable functionality of one or more sensors that may be used in the identified tests. A user interface may be generated including instructions for executing the identified tests. Upon initiating a test, data may be collected from one or more sensors in the computing device. The data collected may be transmitted to the system and may be processed using one or more machine learning datasets to generate an output.
Systems and methods for routing remote application data
Described embodiments provide for routing remote application data. A device can receive a request to access an application. The application can be provided by data centers and accessible via service providers. The device can select a data center from the plurality of data centers and a service provider based at least on a metric indicative of a connection between the data center and the service provider. The device can query a database including one or more connection metrics using the application identified in the request and a location of a router transmitting the request. The device can determine the location of the router based on an internet protocol (IP) address of a client communicably coupled to the router. The device can transmit a response to the request identifying the selected data center and the selected service provider.
Information processor, information processing method, and non-transitory storage medium
An information processor includes an operation history obtaining unit configured to obtain operation histories created user operations at a terminal device; a function identifying unit configured to, based on the obtained operation histories, identify a function performed by the user operations as an operation target function; an operation extracting unit configured to, based on information about the operation target function identified by the function identifying unit, extract predetermined operation histories from the obtained operation histories; an index calculating unit configured to calculate an index which indicates a level of efficiency of the operations for the operation histories extracted by the operation extracting unit; an operation selecting unit configured to, based on the index, select the operation histories having a predetermined efficiency; and an output controller configured to output a guide information based on the operation histories selected by the operation selecting unit.
Performance monitoring systems and methods
Systems and methods for electronically creating and modifying a fitness plan are disclosed. The method may include receiving electronic user data, collecting electronic fitness data, and displaying a suggestion for a fitness activity based on the electronic user data and the electronic fitness data.
Systems and methods for performing a technical recovery in a cloud environment
A computer-implemented method for testing failover may include: determining one or more cross-regional dependencies and traffic flow of an application in a first region of a cloud environment, wherein the one or more cross-regional dependencies include a dependency of the application in the first region of the cloud environment to one or more applications in at least one other region of the cloud environment; determining a risk score associated with performing failover of the application to a second region of the cloud environment at least based on the determined one or more cross-regional dependencies and traffic flow of the application; comparing the determined risk score with a predetermined risk score; in response to determining that the determined risk score is lower than the predetermined risk score, performing failover of the application to the second region of the cloud environment; isolating the second region of the cloud environment from the first region of the cloud environment for a predetermined period of time; and monitoring operation of the application in the second region of the cloud environment during the predetermined period of time.