Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 54. Отображено 53.
26-07-2012 дата публикации

CONTACT RELEVANCE BASED ON CONTEXT

Номер: US20120191777A1
Принадлежит: QUALCOMM INCORPORATED

A method of determining a communications contact relevance for a user includes: analyzing stored contact information of a plurality of contacts with which the user can at least one of receive information from or transmit information to; analyzing context information relevant to likelihoods of imminent communication by the user with the contacts, the context information including information different from ones of the contacts with which the user most recently communicated, the context information further including present user context information and at least one of present context or historical context associated with each of the contacts, respectively; and determining the likelihoods of imminent communication between the user and the contacts based on the context information. 1. A method of determining a communications contact relevance for a user , the method comprising:analyzing stored contact information of a plurality of contacts with which the user can at least one of receive information from or transmit information to;analyzing context information relevant to likelihoods of imminent communication by the user with the contacts, the context information including information different from ones of the contacts with which the user most recently communicated, the context information further including present user context information and at least one of present context or historical context associated with each of the contacts, respectively; anddetermining the likelihoods of imminent communication between the user and the contacts based on the context information.2. The method of further comprising presenting a prioritized list of the contacts to the user based on the likelihoods of initiation.3. The method of wherein the prioritized list indicates combinations of contacts and communication types.4. The method of further comprising prompting the user to contact at least one of the contacts based on the context information.5. The method of wherein the prompting ...

Подробнее
30-08-2012 дата публикации

EFFICIENT KEY HIERARCHY FOR DELIVERY OF MULTIMEDIA CONTENT

Номер: US20120221853A1
Принадлежит: QUALCOMM INCORPORATED

A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely. 112-. (canceled)13. An apparatus that facilitates data rights management of multimedia content , comprising:means for generating a public key and a private key;means for communicating the public key to a subscription server with a request for a license file;means for receiving the requested license file; andmeans for decrypting a multimedia content based in part on header information contained in the license file.14. The apparatus of claim 13 , further comprising means for storing a service key contained in the license file.15. The apparatus of claim 13 , the header information includes at least one of a User Identification and an Epoch Identification.16. The apparatus of claim 13 , further comprising means for rendering a media on a display screen at substantially a same time as the multimedia content is decrypted.17. A computer-readable medium having stored thereon computer-executable instructions for digital rights management claim 13 , the instructions comprising:generating an asymmetric key pair;sending at least a first portion of the asymmetric key pair and a request for access to multimedia content to a server;receiving a license file that includes symmetric keys and access information relating to the multimedia content; anddecrypting the access information to render the multimedia content on a display.18. The computer-readable medium of claim 17 , the instructions further comprising maintaining a second portion of the asymmetric key pair in a storage media.19. The computer-readable medium of claim 17 , the first portion of the asymmetric key pair is ...

Подробнее
10-01-2013 дата публикации

Application relevance determination based on social context

Номер: US20130014040A1
Принадлежит: Qualcomm Inc

Systems, methods, devices, and computer program products are described for using context-aware recommendation techniques to facilitate content discovery on a mobile device platform. In particular, the context-aware recommendation techniques evaluate both a current device context and a social context to generate application relevance scores for each of a number of applications downloaded to a mobile device. Application representations on a graphical user interface (GUI) of the mobile device are rearranged, resized, and/or otherwise affected according to their respective application relevance scores. In certain configurations, one or more applications are pinned, thereby altering (e.g., reducing or eliminating) how changes in their respective application relevance scores affect display of their respective application representations on the GUI of the mobile device.

Подробнее
07-11-2013 дата публикации

SPEECH RECOGNITION SYSTEMS AND METHODS

Номер: US20130297318A1
Принадлежит: QUALCOMM INCORPORATED

A method of enabling speech commands in an application includes identifying, by a computer processor, a user interaction element within a resource of the application; extracting, by the computer processor, text associated with the identified user interaction element; generating, by the computer processor, a voice command corresponding to the extracted text; and adding the generated voice command to a grammar associated with the application. 1. A method of enabling speech commands in an application , comprising:identifying, by a computer processor, a user interaction element within a resource of the application;extracting, by the computer processor, text associated with the identified user interaction element;generating, by the computer processor, a voice command corresponding to the extracted text; andadding the generated voice command to a grammar associated with the application.2. The method of claim 1 , further comprising:detecting a speech input from a user;comparing the detected speech input to the grammar associated with the application; andperforming an action if the detected speech input matches the grammar;wherein the action corresponds to a generated voice command of the grammar matching the detected speech input.3. The method of claim 1 , wherein the resource of the application comprises one or more of layout files claim 1 , xml files claim 1 , and objects for the application.4. The method of claim 1 , wherein the user interaction element comprises at least one of a menu item claim 1 , button claim 1 , key claim 1 , and operator.5. The method of claim 1 , wherein the computer processor is for executing the application.6. The method of claim 1 , wherein the application is stored on a client device for execution thereon by a computer processor of the client device.7. The method of claim 1 , further comprising:transmitting the resource of the application a remote electronic device;wherein the identifying comprises: identifying, by a computer processor of the ...

Подробнее
12-12-2013 дата публикации

METHOD AND SYSTEMS HAVING IMPROVED SPEECH RECOGNITION

Номер: US20130332165A1
Принадлежит: QUALCOMM INCORPORATED

A method for improving speech recognition by a speech recognition system includes obtaining a voice sample from a speaker; storing the voice sample of the speaker as a voice model in a voice model database; identifying an area from which sound matching the voice model for the speaker is coming; providing one or more audio signals corresponding to sound received from the identified area to the speech recognition system for processing. 1. A method for improving speech recognition by a speech recognition system , comprising:obtaining a voice sample from a speaker;storing the voice sample of the speaker as a voice model in a voice model database;identifying an area from which sound matching the voice model for the speaker is coming; andproviding one or more audio signals corresponding to sound received from the identified area to the speech recognition system for processing.2. The method of claim 1 , further comprising:controlling microphones to receive sound from the identified area.3. The method of claim 2 , further comprising:controlling the microphones to not receive sound from areas other than the identified area.4. The method of claim 1 , further comprising:filtering sound received from areas other than the identified area.5. The method of claim 1 , further comprising:separating ambient noise from speech in the one or more audio signals based on the voice model stored in the voice model database to obtain a resulting speech signal; andproviding the resulting speech signal to the speech recognition system for processing.6. The method of claim 1 , receiving, from one or more microphones, one or more audio signals corresponding to sound coming from a first area of a plurality of areas; and', 'determining whether the received audio signals corresponding to the sound coming from the first area match the voice model for the speaker;, 'wherein the identifying comprises 'selectively providing audio signals corresponding to sound from the first area to the speech ...

Подробнее
30-01-2014 дата публикации

METHOD AND APPARATUS FOR ENCRYPTING/DECRYPTING MULTIMEDIA CONTENT TO ALLOW RANDOM ACCESS

Номер: US20140033247A1
Принадлежит: QUALCOMM INCORPORATED

A method is disclosed for encrypting a multimedia file including parsing the multimedia file to identify a media data portion; encrypting the media data portion; and, combining the encrypted media data portion with a non-encrypted non-media data portion. A method is also disclosed for playing a multimedia file including parsing the multimedia file to identify an unencrypted metadata portion; using the unencrypted metadata portion to locate a position of interest in the media file, the position of interest having an associated encrypted media data portion; and, decrypting the associated encrypted media data portion. An apparatus for performing the methods is also disclosed herein. 1. A method for encrypting a multimedia file , comprising:parsing the multimedia file into separate media and non-media portions to identify a media data portion;encrypting the media data portion;combining the encrypted media data portion with a non-encrypted non-media data portion; andoutputting the encrypted media data portion combined with the non-encrypted non-media data portion to a player.2. The method of claim 1 , wherein parsing the multimedia file to identify the media data portion comprises:determining a file format of the multimedia file; andbased on the determined file format, identifying the media data portions of the multimedia file.3. The method of claim 1 , wherein the media data portion includes a plurality of video frames.4. The method of claim 3 , wherein the media data portion is encrypted on a video frame-by-video frame basis.5. The method of claim 3 , wherein each of the plurality of video frames is encrypted regardless of a size of the video frame.6. The method of claim 1 , wherein the media data portion further includes a plurality of audio samples claim 1 , and the method further comprises encrypting the media data portion on an audio sample-by-audio sample basis.7. An apparatus for encrypting a multimedia file claim 1 , comprising:a memory; and parse the multimedia ...

Подробнее
24-02-2022 дата публикации

FAULT LOCALIZATION FOR CLOUD-NATIVE APPLICATIONS

Номер: US20220060371A1
Принадлежит:

Methods, systems, and computer program products for fault localization for cloud-native applications are provided herein. A computer-implemented method includes classifying an event-related alert directed to at least one system by processing one or more characteristics of the event-related alert; obtaining and processing multiple application logs based at least in part on the classification of the event-related alert; identifying error logs among the multiple application logs based at least in part on the processing of the multiple application logs; ordering the error logs using one or more prioritization techniques; and performing at least one automated action based at least in part on the ordering of the error logs. 1. A computer-implemented method comprising:classifying an event-related alert directed to at least one system by processing one or more characteristics of the event-related alert;obtaining and processing multiple application logs based at least in part on the classification of the event-related alert;identifying error logs among the multiple application logs based at least in part on the processing of the multiple application logs;ordering the error logs using one or more prioritization techniques; andperforming at least one automated action based at least in part on the ordering of the error logs;wherein the method is carried out by at least one computing device.2. The computer-implemented method of claim 1 , wherein said processing one or more characteristics of the event-related alert comprises processing temporal information pertaining to at least duration of the event-related alert.3. The computer-implemented method of claim 1 , wherein said obtaining multiple application logs comprises obtaining one or more error logs.4. The computer-implemented method of claim 3 , wherein said processing multiple application logs comprises converting at least a portion of the one or more error logs to one or more templates.5. The computer-implemented method of ...

Подробнее
12-05-2022 дата публикации

Executing actions based upon transformed inputs

Номер: US20220147136A1
Принадлежит: International Business Machines Corp

One embodiment provides a method, including: identifying, utilizing one or more sensors operatively coupled to the smart device, a user operating a smart device; inferring, based upon the identifying the user, a knowledge level of the user with respect to the smart device; determining, based in part on the knowledge level of the user, at least one input within a plurality of inputs provided by the user is anomalous with respect to a pattern of inputs utilized to execute a command; transforming, based upon the anomalous at least one input and the pattern, the plurality of inputs to a plurality of inputs matching the pattern of inputs; and executing an action based upon the transformed plurality of inputs

Подробнее
17-07-2014 дата публикации

Determining room dimensions and a relative layout using audio signals and motion detection

Номер: US20140198618A1
Принадлежит: Qualcomm Inc

Methods and apparatus are provided for determining room dimensions and layout. A method includes receiving an audio signal from at least one other detection apparatus. The method includes determining a spatial orientation of a detection apparatus along a substantially planar surface. The method includes calculating at least one dimension along the planar surface based in part on the received audio signal and the determined spatial orientation of the detection apparatus. Methods and apparatus are provided for determining room layout. The method includes detecting a mobile object in a first room. The method includes receiving an indication of detection of the mobile object in a second room subsequent to the detection in the first room. The method includes providing an indication that the first and second rooms are adjacent rooms based on the detection of the mobile object in the second room subsequent to the detection in the first room.

Подробнее
25-08-2022 дата публикации

AUTOMATICALLY GENERATING DATASETS BY PROCESSING COLLABORATION FORUMS USING ARTIFICIAL INTELLIGENCE TECHNIQUES

Номер: US20220269589A1
Принадлежит:

Methods, systems, and computer program products for automatically generating datasets by processing collaboration forums using artificial intelligence techniques are provided herein. A computer-implemented method includes obtaining conversational data from collaboration forum sources; classifying, using a first set of artificial intelligence techniques, at least a portion of the conversational data into categories based on designated applications; extracting information, pertaining to test case-related issues, from at least a portion of the classified data; verifying at least a portion of the extracted information by analyzing, using a second set of artificial intelligence techniques, portions of the conversational data attributed to multiple entities and related to the extracted information; generating, using the verified information, one or more datasets related to at least one of the test case-related issues for at least one of the designated applications; performing at least one automated action based on the one or more generated datasets. 1. A computer-implemented method comprising:obtaining conversational data from one or more collaboration forum sources;classifying, using a first set of one or more artificial intelligence techniques, at least a portion of the obtained conversational data into one or more categories based at least in part on one or more designated applications;extracting information, pertaining to one or more test case-related issues, from at least a portion of the classified conversational data;verifying at least a portion of the extracted information by analyzing, using a second set of one or more artificial intelligence techniques, portions of the conversational data attributed to multiple entities and related to the extracted information;generating, using the verified information, one or more datasets related to at least one of the one or more test case-related issues for at least one of the one or more designated applications; ...

Подробнее
17-06-2021 дата публикации

CONFIDENTIAL INFORMATION IDENTIFICATION BASED UPON COMMUNICATION RECIPIENT

Номер: US20210182420A1
Принадлежит:

One embodiment provides a method, including: receiving an indication of an addition of a new participant in a textual communication between at least two existing participants; identifying at least one confidential topic contained within the textual communication by (i) parsing the textual communication and (ii) identifying at least one topic contained within the textual communication; the identifying comprising (i) accessing a confidentiality graph comprising (a) nodes representing participants and (b) edges representing confidential concepts that are acceptable discussion topics between participants connected by a corresponding edge and (ii) determining that an edge corresponding to the at least one confidential topic does not connect the new participant with both of the existing participants; and alerting one of the existing participants that the at least one confidential topic is included in the textual communication to be sent to the new participant. 1. A method , comprising:receiving an indication of an addition of a new participant in a textual communication between at least two existing participants, wherein the indication is generated in response to one of the existing participants sending the textual communication to the new participant;identifying at least one confidential topic contained within the textual communication by (i) parsing the textual communication and (ii) identifying, from the parsing, at least one topic contained within the textual communication, wherein the at least one confidential topic is confidential with respect to the new participant;the identifying comprising (i) accessing a confidentiality graph comprising (a) nodes representing participants and (b) edges representing confidential concepts that are acceptable discussion topics between participants connected by a corresponding edge and (ii) determining that an edge corresponding to the at least one confidential topic does not connect the new participant with both of the existing ...

Подробнее
28-08-2014 дата публикации

CONTENT MANAGEMENT IN PEER-TO-PEER SYSTEMS

Номер: US20140244747A1
Принадлежит: QUALCOMM INCORPORATED

Disclosed are methods, systems, apparatus, devices, products, and other implementations, including a method that includes monitoring a plurality of messages from a plurality of mobile devices, each of at least some of the plurality of messages including at least one identifier of at least one content data record, from a plurality of content data records, stored at least on a sending device sending the respective message, and data representative of number of times the at least one content data record was used on the respective sending device. The method also includes determining popularity metrics for one or more content data records from the plurality of content data records based on the data included in each of the at least some of the plurality of messages representative of the number of times the respective at least one content data record was used on the respective sending device. 1. A method comprising:monitoring a plurality of messages from a plurality of mobile devices, each of at least some of the plurality of messages including at least one identifier of at least one content data record, from a plurality of content data records, stored at least on a sending device sending the respective message, and data representative of number of times the at least one content data record was used on the respective sending device; anddetermining popularity metrics for one or more content data records from the plurality of content data records based on the data included in each of the at least some of the plurality of messages representative of the number of times the respective at least one content data record was used on the respective sending device.2. The method of claim 1 , wherein the at least one identifier included in the each of the at least some of the plurality of messages comprises data identifying the originator of the associated at least one content data record.3. The method of claim 1 , wherein determining the popularity metrics for the one or more content ...

Подробнее
09-11-2017 дата публикации

METHOD FOR TRANSFER OF INFORMATION RELATED TO TARGETED CONTENT MESSAGES THROUGH A PROXY SERVER

Номер: US20170324831A1
Принадлежит:

Information transfer methods for exchange of information with a wireless access terminal (W-AT) includes receiving a first message from the W-AT, the first message including first information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction ID with the W-AT address, and transmitting the second response to the W-AT. 1. (canceled)2. A method of securely generating a user profile on a wireless access terminal (W-AT) , comprising:locally collecting, by the W-AT, user behavioral data associated with a user of the W-AT;locally synthesizing, by the W-AT, a set of profile attributes based on the locally collected user behavioral data;determining, by the W-AT, to refine at least one profile attribute from the set of locally synthesized profile attributes via interaction with at least one external apparatus;transmitting, by the W-AT, a request for the at least one external apparatus to refine the at least one profile attribute, wherein the transmitting transmits the request to a proxy server instead of directly to the at least one external apparatus to maintain anonymity for the W-AT with respect to the at least one external apparatus;receiving, at the W-AT from the proxy server, a response to the request that includes at least one refined profile attribute that is refined from the at least one profile attribute by the at least one external apparatus; andgenerating, by the W-AT, the user profile based at least in part upon the at least one refined profile attribute.3. The method of claim 2 , further comprising:receiving, by the W-AT from an advertisement ...

Подробнее
07-12-2017 дата публикации

Application Relevance Determination Based On Social Context

Номер: US20170353815A1
Принадлежит:

Systems, methods, devices, and computer program products are described for using context-aware recommendation techniques to facilitate content discovery on a mobile device platform. In particular, the context-aware recommendation techniques evaluate both a current device context and a social context to generate application relevance scores for each of a number of applications downloaded to a mobile device. Application representations on a graphical user interface (GUI) of the mobile device are rearranged, resized, and/or otherwise affected according to their respective application relevance scores. In certain configurations, one or more applications are pinned, thereby altering (e.g., reducing or eliminating) how changes in their respective application relevance scores affect display of their respective application representations on the GUI of the mobile device. 1. A method comprising:determining a current device context value of at least one of a plurality of device context parameters generated according to a dynamic characteristic of a mobile device of a user;receiving, at the mobile device from a social networking application accessible by the mobile device over a communications network, context information from each client device of a plurality of client devices, wherein each client device corresponds to a different social contact of a plurality of social contacts of the user, and wherein the context information received from each client device comprises information relating to at least one of a device context or a social contact context of the client device;determining, based on the context information received from each client device, a current social context value of at least one of a plurality of social context parameters;calculating an application relevance score as a function of the current device context value and the current social context value for a designated application of a plurality of applications downloaded to the mobile device;automatically ...

Подробнее
06-12-2018 дата публикации

SYSTEM ANOMALY DETECTION USING PARAMETER FLOWS

Номер: US20180351817A1
Принадлежит:

One embodiment provides a method, including: receiving a plurality of loglines from a system execution log; generating at least one control flow graph by mining (i) a plurality of templates and (ii) a sequence of the plurality of templates defined by an order encountered during execution from the system execution log, wherein the control flow graph identifies flows between templates during execution; mining (i) discriminative parameters, (ii) a position for each of the mined discriminative parameters within a template, and (iii) a value of each of the mined discriminative parameters; annotating edges of the at least one control flow graph with the values of the mined discriminative parameters within the control flow graph; identifying execution traces from the system execution log using the values of the mined discriminative parameters; and detecting system anomalies in the identified execution traces by comparing one of the execution traces to an expected execution. 1. A method , comprising:utilizing at least one processor to execute computer code that performs the steps of:receiving a plurality of loglines from a system execution log;generating at least one control flow graph of the system execution log by mining (i) a plurality of templates from the system execution log and (ii) a sequence of the plurality of templates defined by an order encountered during execution from the system execution log, wherein the control flow graph identifies flows between templates during execution;mining, from the system execution log, (i) discriminative parameters, (ii) a position for each of the mined discriminative parameters within a template corresponding to the mined discriminative parameter, and (iii) a value of each of the mined discriminative parameters, wherein the discriminative parameters comprise parameters from the plurality of loglines that identify flow from one template to another template within the control flow graph;annotating edges of the at least one control ...

Подробнее
19-02-2009 дата публикации

User profile generation architecture for targeted content distribution using external processes

Номер: US20090048977A1
Принадлежит: Qualcomm Inc

A targeting-message profile may be obtained by a wireless access terminal (W-AT) by receiving a rule for establishing a user profile, synthesizing at least one profile attribute based on user behavior, and determining a need for further information based on the at least one profile attribute. Then, the W-AT may request the further information from an apparatus external to the W-AT, such as a server containing census information, receive the further information from the apparatus, and generate the profile based on the profile attributes and the further information.

Подробнее
14-11-2002 дата публикации

Remote authentification of fingerprints over an insecure network

Номер: CA2441800A1
Принадлежит: Individual

The present invention relates to a method , system and computer program product for enabling the remote authentification of fingerprints over an insecure network using a client-server architecture by generation of a set of random queries relating to fingerprint patterns based on stored fingerprint data at the server, to which the client responds based on the observed fingerprint patterns, followed by the issuing of a randomly generates set of challenges pertaining to geometrical relationships between the fingerprint patterns for which confirm responses are received by their server, the final authentification being determined by the proportion of correct responses by the client to said challenges.

Подробнее
15-11-2016 дата публикации

Method and system for providing targeted information based on a user profile in a mobile environment

Номер: US9497286B2
Принадлежит: Qualcomm Inc

A method for providing targeted content-messages on a wireless access terminal (W-AT) includes receiving metadata concerning a pool of content-messages from a remote apparatus, filtering the metadata based on a user profile on the W-AT to select at least one specific content-message, and receiving the at least one specific content-message from the pool of content-messages.

Подробнее
15-01-2009 дата публикации

Methods and systems for providing targeted information using identity masking in a wireless communications device

Номер: WO2009009509A1
Принадлежит: QUALCOMM INCORPORATED

Methods and systems for providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of the user of the W-AT include generating an alternate user identifier for the W-AT, and providing the alternate user identifier and first information related to targeted-contentmessage information and/or user profile information to the remote apparatus.

Подробнее
22-05-2009 дата публикации

Method and system for using a cache miss state match indicator to determine user suitability of targeted content messages in a mobile environment

Номер: WO2009065064A1
Принадлежит: QUALCOMM INCORPORATED

Methods and systems for determining a suitability for a mobile client to display information are disclosed. A particular exemplary method includes maintaining on the mobile client a list of first attributes relating to message cache misses of a cache memory located on the mobile client, receiving on the mobile client a set of target attributes associated with a target message, performing on the mobile client one or more matching operations between the first attributes and the target attributes to produce a matching result, and storing the target message in a cache in the mobile client dependant upon the matching result.

Подробнее
03-07-2008 дата публикации

Methods and systems for blackout provisioning in a distribution network

Номер: WO2008019180A3

Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining one or more affected regions, and generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produce encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to determine one or more affected regions, a key generator to generate a blackout key based an original key and the affected regions, encryption logic to encrypt content with the blackout key to produce encrypted content, and a transmitter to transmit the encrypted content and an encrypted version of the original key over the distribution network.

Подробнее
04-09-2003 дата публикации

Remote authentification of fingerprints over an insecure network

Номер: WO2002091142A3
Принадлежит: Ibm, Ibm Uk

The present invention relates to a method , system and computer program product for enabling the remote authentification of fingerprints over an insecure network using a client-server architecture by generation of a set of random queries relating to fingerprint patterns based on stored fingerprint data at the server, to which the client responds based on the observed fingerprint patterns, followed by the issuing of a randomly generates set of challenges pertaining to geometrical relationships between the fingerprint patterns for which confirm responses are received by their server, the final authentification being determined by the proportion of correct responses by the client to said challenges.

Подробнее
22-05-2009 дата публикации

Method and system using keyword vectors and associated metrics for learning and prediction of user correlation of targeted content messages in a mobile environment

Номер: WO2009065071A1
Принадлежит: QUALCOMM INCORPORATED

Methods and systems for determining a suitability for a mobile client to display information are disclosed. A particular exemplary method includes receiving a plurality of sets of one or more first keywords on a mobile client, each set of first keywords associated with one or more respective first messages, monitoring user interaction of the respective first messages on the mobile client, performing learning operations on the mobile client with the first keywords based on monitored user interaction to estimate a set of keyword interest weights, receiving a set of target keywords associated with a target message, and displaying the target message on the mobile client based on the estimated keyword interest weights.

Подробнее
05-03-2009 дата публикации

Method for transfer of information related to targeted content messages through a proxy server

Номер: WO2009009510A3

Information transfer methods for exchange of information with a wireless access terminal (W-AT) includes receiving a first message from the W-AT, the first message including first information provided by the W-AT and an address of the WAT capable of identifying the W-AT, converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction ID with the W-AT address, and transmitting the second response to the W-AT.

Подробнее
07-11-2002 дата публикации

Remote authentication of fingerprints over an insecure network

Номер: US20020164058A1
Принадлежит: International Business Machines Corp

The present invention relates to a method, system and computer program product for enabling the remote authentication of fingerprints over an insecure network using a client-server architecture by generation of a set of random queries relating to fingerprint patterns based on stored fingerprint data at the server, to which the client responds based on the observed fingerprint patterns, followed by the issuing of a randomly generates set of challenges pertaining to geometrical relationships between the fingerprint patterns for which confirm responses are received by their server, the final authentication being determined by the proportion of correct responses by the client to said challenges.

Подробнее
03-03-2022 дата публикации

Fault localization for cloud-native applications

Номер: WO2022042126A1

Methods, systems, and computer program products for fault localization for cloud-native applications are provided herein. A computer-implemented method includes classifying an event-related alert directed to at least one system by processing one or more characteristics of the event-related alert; obtaining and processing multiple application logs based at least in part on the classification of the event-related alert; identifying error logs among the multiple application logs based at least in part on the processing of the multiple application logs; ordering the error logs using one or more prioritization techniques; and performing at least one automated action based at least in part on the ordering of the error logs.

Подробнее
28-12-2023 дата публикации

Closed loop verification for event grouping mechanisms

Номер: US20230419216A1
Принадлежит: International Business Machines Corp

A method and system is provided for utilizing a causal dependence graph of events in a large enterprise-related system to determine a most frequently utilized corrective action for a set of actions that the enterprise requires. Typically, with large sets of data related to actions that an enterprise system performs, it is non-trivial to correlate a set of actions (or workflows) with a set of corrective actions.

Подробнее
25-08-2022 дата публикации

Automatically generating datasets by processing collaboration forums using artificial intelligence techniques

Номер: WO2022174719A1

Methods, systems, and computer program products for automatically generating datasets by processing collaboration forums using artificial intelligence techniques are provided herein. A computer-implemented method includes obtaining conversational data from collaboration forum sources; classifying, using a first set of artificial intelligence techniques, at least a portion of the conversational data into categories based on designated applications; extracting information, pertaining to test case-related issues, from at least a portion of the classified data; verifying at least a portion of the extracted information by analyzing, using a second set of artificial intelligence techniques, portions of the conversational data attributed to multiple entities and related to the extracted information; generating, using the verified information, one or more datasets related to at least one of the test case-related issues for at least one of the designated applications; performing at least one automated action based on the one or more generated datasets.

Подробнее
14-11-2023 дата публикации

Severity computation of anomalies in information technology operations

Номер: US11816080B2
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying a plurality of data logs; generating a data model using analyzed time series data from the identified data logs; detecting anomalies within the generated data model; constructing a causal graph using the detected anomalies and retrieved domain knowledge; computing a severity value for the detected anomalies with the constructed causal graph; assigning the detected anomaly to a classification based on a function vector, wherein the computed severity value is a function vector; and automatically modifying a function of a computing device based on the function vector of the assigned, detected anomaly, wherein a modification addresses the detected anomaly located at a center of the constructed casual graph.

Подробнее
05-09-2023 дата публикации

Application event logging augmentation

Номер: US11748219B1
Принадлежит: International Business Machines Corp

Responsive to determining that a step in an interaction sequence has below a threshold similarity to any step in a set of log sequences, a first log entry is caused to be generated. The first log entry is emitted responsive to execution of the step in the interaction sequence by the software application. Responsive to determining that a starting key action lacks a corresponding ending key action, a second log entry is caused to be generated. The second log entry is emitted responsive to execution of code related to the corresponding ending key action by the software application. Responsive to determining, using a trained anomaly detection model, that a keyword related to an injected fault is not present in resulting fault log data, a third log entry is generated. The third log entry is emitted responsive to execution of code related to the keyword by the software application.

Подробнее
10-05-2023 дата публикации

Fault localization for cloud-native applications

Номер: GB2612749A
Принадлежит: International Business Machines Corp

Methods, systems, and computer program products for fault localization for cloud-native applications are provided herein. A computer-implemented method includes classifying an event-related alert directed to at least one system by processing one or more characteristics of the event-related alert; obtaining and processing multiple application logs based at least in part on the classification of the event-related alert; identifying error logs among the multiple application logs based at least in part on the processing of the multiple application logs; ordering the error logs using one or more prioritization techniques; and performing at least one automated action based at least in part on the ordering of the error logs.

Подробнее
15-02-2024 дата публикации

Dynamic window-size selection for anomaly detection

Номер: US20240054041A1
Принадлежит: International Business Machines Corp

Detecting system log anomalies by receiving multivariate time-series system log data an multivariate metric data, inferring system metrics from the system log data and metric data, receiving a metric causal graph including causal relationships between system metrics, determining a univariate variation score for the system metrics, determining a causal variation score for the multivariate time series system metric data, according to the causal graph, determining an overall activity score according to the univariate variation score, and causal variation score, and altering a review window duration according to the activity score.

Подробнее
01-06-2023 дата публикации

Identifying persistent anomalies for failure prediction

Номер: WO2023094916A1

A Computer-implemented Method And A Computer System For Identifying Persistent Anomalies For Failure Prediction. The Computer System Receives A Time Series Data Stream. The Computer System Received A Predetermined Number N And A Predetermined Number M Which Is A Fraction Of N. The Computer System Segments The Time Series Data Stream Into N Consecutive Sliding Windows. The Computer System Performs Supervised Persistent Anomaly Detection To Determine Whether Anomalies Across The N Consecutive Sliding Windows Are Persistent, By Using A Binary Classification Model. The Computer System Performs Unsupervised Persistent Anomaly Detection To Determine Whether The Anomalies Across The N Consecutive Sliding Windows Are Persistent. The Computer System Combines Results Of The Supervised Persistent Anomaly Detection And Results Of The Unsupervised Persistent Anomaly Detection To Determine Persistent Anomalies.

Подробнее
20-04-2023 дата публикации

Transformation of data from legacy architecture to updated architecture

Номер: US20230121209A1
Принадлежит: International Business Machines Corp

One or more systems, computer-implemented methods and/or computer program products to facilitate a process to transform original operational data into updated operational data. A system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a transformation component that can transform original operational data of a first architecture into updated operational data employable at a second architectures, wherein the second architectures is an updated architectures relative to the first architecture. In one or more embodiments, the transformation component further can employ machine learning to match one or more data elements of the original operational data to one or more aspects of the second architecture.

Подробнее
21-09-2023 дата публикации

Fault localization in a distributed computing system

Номер: US20230297490A1
Принадлежит: International Business Machines Corp

Localizing a faulty microservice in a microservice architecture is achieved by developing healthy execution sequence data for comparison to execution sequences during system failures. Oftentimes the faulty microservice does not emit a failure signal. Frequent sub-sequences arising from log template time series data during healthy execution facilitates localization of faulty services when there is no failure signal from the faulty service.

Подробнее
22-11-2023 дата публикации

Automatically generating datasets by processing collaboration forums using artificial intelligence techniques

Номер: GB2618953A
Принадлежит: International Business Machines Corp

Methods, systems, and computer program products for automatically generating datasets by processing collaboration forums using artificial intelligence techniques are provided herein. A computer-implemented method includes obtaining conversational data from collaboration forum sources; classifying, using a first set of artificial intelligence techniques, at least a portion of the conversational data into categories based on designated applications; extracting information, pertaining to test case-related issues, from at least a portion of the classified data; verifying at least a portion of the extracted information by analyzing, using a second set of artificial intelligence techniques, portions of the conversational data attributed to multiple entities and related to the extracted information; generating, using the verified information, one or more datasets related to at least one of the test case-related issues for at least one of the designated applications; performing at least one automated action based on the one or more generated datasets.

Подробнее
02-11-2023 дата публикации

Automatisches erzeugen von datensätzen durch verarbeiten von kollaborationsforen unter verwendung von techniken künstlicher intelligenz

Номер: DE112022000423T5
Принадлежит: International Business Machines Corp

Verfahren, Systeme und Computerprogrammprodukte zum automatischen Erzeugen von Datensätzen durch Verarbeiten von Kollaborationsforen unter Verwendung von Techniken der künstlichen Intelligenz werden hierin bereitgestellt. Ein computerumgesetztes Verfahren enthält ein Erhalten von Konversationsdaten von Kollaborationsforumsquellen; ein Klassifizieren, unter Verwendung eines ersten Satzes von Techniken der künstliche Intelligenz, mindestens eines Abschnittes der Konversationsdaten in Kategorien auf Grundlage von bezeichneten Anwendungen; ein Extrahieren von Informationen, die testfallbezogene Probleme betreffen, aus mindestens einem Abschnitt der klassifizierten Daten; ein Verifizieren mindestens eines Abschnittes der extrahierten Informationen durch Analysieren, unter Verwendung eines zweiten Satzes von Techniken der künstlichen Intelligenz, von Abschnitten der Konversationsdaten, die mehreren Entitäten zugeschrieben sind und sich auf die extrahierten Informationen beziehen, ein Erzeugen, unter Verwendung der verifizierten Informationen, von einem oder mehreren Datensätzen, die sich auf mindestens eines der testfallbezogenen Probleme für mindestens eine der bezeichneten Anwendungen beziehen; ein Durchführen der mindestens einen automatisierten Aktion auf Grundlage des einen oder der mehreren erzeugten Datensätze.

Подробнее
18-06-2024 дата публикации

Dynamic window-size selection for anomaly detection

Номер: US12013747B2
Принадлежит: International Business Machines Corp

Detecting system log anomalies by receiving multivariate time-series system log data an multivariate metric data, inferring system metrics from the system log data and metric data, receiving a metric causal graph including causal relationships between system metrics, determining a univariate variation score for the system metrics, determining a causal variation score for the multivariate time series system metric data, according to the causal graph, determining an overall activity score according to the univariate variation score, and causal variation score, and altering a review window duration according to the activity score.

Подробнее
18-04-2024 дата публикации

Generating incident explanations using spatio-temporal log clustering

Номер: US20240126630A1
Принадлежит: International Business Machines Corp

An embodiment includes detecting a set of anomalies recorded during a first predefined window of time in log entries for a computer environment. The embodiment also includes generating cluster data representative of a cluster of anomalies from among the set of anomalies, where the cluster is formed using a lattice clustering algorithm that spatially distinguishes the cluster of anomalies from other anomalies in the set of anomalies. The embodiment also includes composing an explanation using log templates generated from log entries associated with the cluster of anomalies.

Подробнее
14-05-2008 дата публикации

Efficient key hierarchy for delivery of multimedia content

Номер: EP1920378A2
Принадлежит: Qualcomm Inc

A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.

Подробнее
12-07-2012 дата публикации

マルチメディア・コンテント配信のための効率的鍵階層構造

Номер: JP2012134983A
Принадлежит: Qualcomm Inc

【課題】デジタル著作権管理(DRM)に係わり、マルチメディア・コンテント配信のための効率的鍵階層構造の創成を容易にする装置を実現する。 【解決手段】装置は、クライアントから非対称鍵対の少なくとも一部分を受信するための手段を含む。第1対称鍵及び少なくとも第2の対称鍵を創成するための手段も含む。該第2の対称鍵を暗号化するために該第1対称鍵を利用するための手段及び該非対称鍵対の少なくとも一部分を用いて該第2対称鍵を暗号化するための手段も含む。そして、適合する秘密鍵によってのみ逆暗号化されることが出来る情報を暗号化するために、非対称暗号方式が該DRMシステムによって使用されて、対称鍵を安全に配送する。 【選択図】図1

Подробнее
04-09-2014 дата публикации

Content management in peer-to-peer systems

Номер: WO2014133833A2
Принадлежит: QUALCOMM INCORPORATED

Disclosed are methods, systems, apparatus, devices, products, and other implementations, including a method that includes monitoring a plurality of messages from a plurality of mobile devices, each of at least some of the plurality of messages including at least one identifier of at least one content data record, from a plurality of content data records, stored at least on a sending device sending the respective message, and data representative of number of times the at least one content data record was used on the respective sending device. The method also includes determining popularity metrics for one or more content data records from the plurality of content data records based on the data included in each of the at least some of the plurality of messages representative of the number of times the respective at least one content data record was used on the respective sending device.

Подробнее
25-12-2013 дата публикации

Contact relevance based on context

Номер: EP2676205A2
Принадлежит: Qualcomm Inc

A method of determining a communications contact relevance for a user includes: analyzing stored contact information of a plurality of contacts with which the user can at least one of receive information from or transmit information to; analyzing context information relevant to likelihoods of imminent communication by the user with the contacts, the context information including information different from ones of the contacts with which the user most recently communicated, the context information further including present user context information and at least one of present context or historical context associated with each of the contacts, respectively; and determining the likelihoods of imminent communication between the user and the contacts based on the context information.

Подробнее
30-07-2024 дата публикации

Generating incident explanations using spatio-temporal log clustering

Номер: US12050506B2
Принадлежит: International Business Machines Corp

An embodiment includes detecting a set of anomalies recorded during a first predefined window of time in log entries for a computer environment. The embodiment also includes generating cluster data representative of a cluster of anomalies from among the set of anomalies, where the cluster is formed using a lattice clustering algorithm that spatially distinguishes the cluster of anomalies from other anomalies in the set of anomalies. The embodiment also includes composing an explanation using log templates generated from log entries associated with the cluster of anomalies.

Подробнее
25-07-2024 дата публикации

Prioritized fault remediation

Номер: US20240248790A1
Принадлежит: International Business Machines Corp

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: iteratively examining logging data; detecting multiple faults in a computer environment in dependence on the examining of the logging data; generating for respective ones of the detected multiple faults one or more candidate remediation to provide a set of candidate remediations for the computer environment; prioritizing remediations defining the set of candidate remediations from the generating and ordering the remediations in a remediation queue according to an order of the prioritizing; and deploying remediations according to the ordering of remediations in the remediation queue.

Подробнее
30-01-2018 дата публикации

Method and systems having improved speech recognition

Номер: US09881616B2
Принадлежит: Qualcomm Inc

A method for improving speech recognition by a speech recognition system includes obtaining a voice sample from a speaker; storing the voice sample of the speaker as a voice model in a voice model database; identifying an area from which sound matching the voice model for the speaker is coming; providing one or more audio signals corresponding to sound received from the identified area to the speech recognition system for processing.

Подробнее
03-10-2017 дата публикации

Application relevance determination based on social context

Номер: US09781540B2
Принадлежит: Qualcomm Inc

Systems, methods, devices, and computer program products are described for using context-aware recommendation techniques to facilitate content discovery on a mobile device platform. In particular, the context-aware recommendation techniques evaluate both a current device context and a social context to generate application relevance scores for each of a number of applications downloaded to a mobile device. Application representations on a graphical user interface (GUI) of the mobile device are rearranged, resized, and/or otherwise affected according to their respective application relevance scores. In certain configurations, one or more applications are pinned, thereby altering (e.g., reducing or eliminating) how changes in their respective application relevance scores affect display of their respective application representations on the GUI of the mobile device.

Подробнее
19-11-2024 дата публикации

Identifying persistent anomalies for failure prediction

Номер: US12149401B2
Принадлежит: International Business Machines Corp

A computer-implemented method and a computer system for identifying persistent anomalies for failure prediction. The computer system receives a time series data stream. The computer system received a predetermined number N and a predetermined number M which is a fraction of N. The computer system segments the time series data stream into N consecutive sliding windows. The computer system performs supervised persistent anomaly detection to determine whether anomalies across the N consecutive sliding windows are persistent, by using a binary classification model. The computer system performs unsupervised persistent anomaly detection to determine whether the anomalies across the N consecutive sliding windows are persistent. The computer system combines results of the supervised persistent anomaly detection and results of the unsupervised persistent anomaly detection to determine persistent anomalies.

Подробнее
14-03-2017 дата публикации

Method and system for delivery of targeted information based on a user profile in a mobile communication device

Номер: US09596317B2
Принадлежит: Qualcomm Inc

Methods and systems for receiving targeted content messages on a wireless access terminal (W-AT) are disclosed. For example, a particular method may include selecting at least one reception time based on a user profile and a targeted content message delivery schedule, and receiving a targeted content message at the selected reception time.

Подробнее
07-02-2017 дата публикации

Efficient key hierarchy for delivery of multimedia content

Номер: US09565171B2
Принадлежит: Qualcomm Inc

A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.

Подробнее
01-11-2016 дата публикации

Method and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment

Номер: US09485322B2
Принадлежит: Qualcomm Inc

Various systems and methods for of generating a user profile for use in providing targeted-content-messages to a wireless access terminal (W-AT) are disclosed. For example, a user profile with at least one profile element may be provided to the W-AT, and a profile confidence level for the profile element may be also provided.

Подробнее
19-07-2016 дата публикации

Methods and systems for providing targeted information using identity masking in a wireless communications device

Номер: US09398113B2
Принадлежит: Qualcomm Inc

Methods and systems for providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of the user of the W-AT include generating an alternate user identifier for the W-AT, and providing the alternate user identifier and first information related to targeted-content-message information and/or user profile information to the remote apparatus.

Подробнее