Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systems and methods for managing multi-region data incidents
M Sher-Jan, A Migliore, NJ Church, R Brown… - US Patent …, 2019 - Google Patents
Abstract Systems and methods for managing a multi-region data incident are provided
herein. Example methods include receiving, via a risk assessment server, in response to an …
herein. Example methods include receiving, via a risk assessment server, in response to an …
Applying security policy based on behaviorally-derived user risk profiles
D Gibson, K Newstadt - US Patent 8,776,168, 2014 - Google Patents
Security policy changes can be implemented for a user or a user group based on
behaviorally-derived risk information. A behavior-receiving module receives information …
behaviorally-derived risk information. A behavior-receiving module receives information …
Graduated enforcement of restrictions according to an application's reputation
K Schneider, B McCorkendale - US Patent 9,495,538, 2016 - Google Patents
2005/0204162 2005/0232423 2006/0253458 2006/0253.583 2007/0O33636 2007, OO646.
17 2007, OO67844 2007/OO94260 2007/O168311 2007/02O8613 2007/0261116 …
17 2007, OO67844 2007/OO94260 2007/O168311 2007/02O8613 2007/0261116 …
Systems and methods for dynamic report generation based on automatic modeling of complex data structures
L Zhang, ML Carpenter, G Bonin, S **ong… - US Patent …, 2019 - Google Patents
Various systems and methods are disclosed for accessing and traversing disparate,
complex, and multi-dimensional data structures to dynamically and interactively generate …
complex, and multi-dimensional data structures to dynamically and interactively generate …
Systems and methods for a commodity contracts market using a secure distributed transaction ledger
DA Ford, R Narayanan - US Patent 10,592,985, 2020 - Google Patents
Aspects of the present invention provide systems and meth ods that solved the problems of
how to participate in a marketplace exchange without using a centralized interme diary. In …
how to participate in a marketplace exchange without using a centralized interme diary. In …
Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
DA Ford, IO Reyes, R Narayanan - US Patent 10,484,168, 2019 - Google Patents
Aspects of the present invention provide systems and meth ods that facilitate computations
that are publically defined while assuring the confidentiality of the input data provided, the …
that are publically defined while assuring the confidentiality of the input data provided, the …
User behavior segmentation using latent topic detection
H Shan, ML Carpenter, G Bonin, S **ong… - US Patent …, 2019 - Google Patents
The features relate to artificial intelligence directed com pression of user event data based
on complex analysis of user event data including latent feature detection and clus tering …
on complex analysis of user event data including latent feature detection and clus tering …
Reducing cybersecurity risk level of portfolio of companies using a cybersecurity risk multiplier
J Mo, L Vargas, AR Sohval - US Patent 10,614,401, 2020 - Google Patents
(57) APSTRACT A multiplier is utilized to quantify a cybersecurity risk level of a portfolio of
entities (eg, companies) and enable actions to mitigate that quantified risk. In doing so …
entities (eg, companies) and enable actions to mitigate that quantified risk. In doing so …
Authentication system and method
TA Webb, TM Pletz - US Patent 8,255,971, 2012 - Google Patents
Aspects of the invention relate to a customer authentication system for authenticating a
customer making a request related to a customer account. The customer authentication …
customer making a request related to a customer account. The customer authentication …
Determining firewall rules for an application on a client based on firewall rules and reputations of other clients
S Satish, WE Sobel - US Patent 8,353,021, 2013 - Google Patents
A security system monitors the trustworthiness and firewall configurations of a set of clients,
where a firewall configuration comprises a set of firewall rules that control access by an …
where a firewall configuration comprises a set of firewall rules that control access by an …