Entit Software LLC

United States of America

Back to Profile

1-100 of 247 for Entit Software LLC Sort by
Query
Aggregations
IP Type
        Patent 232
        Trademark 15
Jurisdiction
        World 220
        United States 16
        Canada 11
Date
2025 (YTD) 1
2024 1
2020 13
Before 2020 232
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 52
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions 27
G06F 9/44 - Arrangements for executing specific programs 26
G06F 11/36 - Prevention of errors by analysis, debugging or testing of software 22
G06F 21/60 - Protecting data 14
See more
NICE Class
09 - Scientific and electric apparatus and instruments 10
42 - Scientific, technological and industrial services, research and design 8
38 - Telecommunications services 1
39 - Transport, packaging, storage and travel services 1
41 - Education, entertainment, sporting and cultural services 1
Status
Pending 2
Registered / In Force 245
  1     2     3        Next Page

1.

MOBILE DEVICE LOCATOR

      
Application Number 19002396
Status Pending
Filing Date 2024-12-26
First Publication Date 2025-04-17
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Li, Wei
  • Zhou, Jie
  • Wang, Xiaoqiang

Abstract

Examples herein involve estimating a first position of a mobile device based on first communication signals, assigning a first set of particles to a number of respective first sampling locations within a threshold distance of the first position, adjusting the assignment of the first set of particles to second sampling locations based on movement of the mobile device, and estimating a second position of the mobile device based on the second sampling locations.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • H04W 4/029 - Location-based management or tracking services

2.

MOBILE DEVICE LOCATOR

      
Application Number 18585597
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-06-27
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Li, Wei
  • Zhou, Jie
  • Wang, Xiaoqiang

Abstract

Examples herein involve estimating a first position of a mobile device based on first communication signals, assigning a first set of particles to a number of respective first sampling locations within a threshold distance of the first position, adjusting the assignment of the first set of particles to second sampling locations based on movement of the mobile device, and estimating a second position of the mobile device based on the second sampling locations.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • H04W 4/029 - Location-based management or tracking services

3.

RECORDING TEST USAGE OF GRAPHICAL USER INTERFACE WITH BLOCKED INPUTS

      
Application Number CN2019090287
Publication Number 2020/243942
Status In Force
Filing Date 2019-06-06
Publication Date 2020-12-10
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Zhai, Hua-Ming
  • Shang, Er-Xin
  • Yin, Peng-Ji

Abstract

An apparatus may include a processor (102) that may generate automated test scripts to test graphical user interface (GUI) functions of an application under test (AUT) (235). The apparatus may generate a screen element (220) that is overlaid onto at least one or all of the GUIs (210). The screen element (220) may therefore receive user inputs directed at the GUI (210), but block such inputs from being provided to the GUI (210). The user inputs received at the screen element (220) may be recorded in an automated test script for later replay. Blocking the user input may prevent a change in appearance of a GUI element (212) that would otherwise result from the user input, facilitating automated location of the GUI element (212) during replay of the automated test script.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

4.

USING MACHINE LEARNING TO ASSIGN DEVELOPERS TO SOFTWARE DEFECTS

      
Application Number CN2019082708
Publication Number 2020/210947
Status In Force
Filing Date 2019-04-15
Publication Date 2020-10-22
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Xin, Enhui
  • Gong, Cunyang
  • Zhu, Chunjiang

Abstract

A technique includes processing, by a computer, data representing a software defect report to extract features from the software defect report. The software defect report contains information that identifies a defect in a software product. The technique includes applying, by the computer, a feedforward neural network classifier to the features to identify a developer to assign to the identified defect.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

5.

MONITORING CONTAINERIZED VM APPLICATION RUNNING WITHIN SOFTWARE CONTAINER

      
Application Number CN2019080304
Publication Number 2020/198902
Status In Force
Filing Date 2019-03-29
Publication Date 2020-10-08
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Gao, Jin-Feng
  • Cao, Guozhu
  • Qiu, Xiaomei

Abstract

A monitoring utility program into a software container in which a containerized virtual machine application is running. The monitoring utility program is to monitor the containerized virtual machine application running within the software container. Monitoring information regarding the containerized virtual machine application is periodically pulled from the monitoring utility program.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

6.

INTERNATIONALIZATION OF AUTOMATED TEST SCRIPTS

      
Application Number CN2019077496
Publication Number 2020/181417
Status In Force
Filing Date 2019-03-08
Publication Date 2020-09-17
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shang, Er-Xin
  • Zhai, Qian-Ru
  • Cui, Hao-Bin

Abstract

According to examples, an apparatus may include a processor that may internationalize an automated test script that was generated to test a Graphical User Interface (GUI) in the first human language. When the GUI is internationalized into a second human language, the automated test script may no longer function. As such, the system may employ computer vision techniques to analyze the GUI in the first human language and the GUI in the second human language to identify text and GUI elements that correlate with one another. Based on the correlation, the system may internationalize the automated test script to function on the GUI in the second human language.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/44 - Arrangements for executing specific programs

7.

WORKFLOW INITIATION BASED ON SIMULATED NETWORK ADDRESS

      
Application Number CN2019077289
Publication Number 2020/177113
Status In Force
Filing Date 2019-03-07
Publication Date 2020-09-10
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shang, Er-Xin
  • Li, Ran
  • Zhai, Hua-Ming

Abstract

An apparatus (100) may include a processor (102) that may identify and execute workflows based on simulated network addresses such as simulated uniform resource locations ("URLs" ). The system (200) may generate recorded automation scripts that automatically complete some or all of the tasks of a workflow. The system (200) may store the automation scripts in association with the workflow and a simulated URL. The simulated URL may include a string that does not literally resolve to a document on a networked resource. Rather, the simulated URL may instead identify and indicate that a corresponding workflow is to be executed. A browser extension (214) of a browser (212) may intercept URLs that are provided to a browser (212), determine that a simulated URL has been entered, and provide the simulated URL to a replay engine (302) that identifies and executes the automated script associated with the simulated URL.

IPC Classes  ?

8.

REPRESENTATION OF USER INTERFACE INTERACTIVE REGIONS

      
Application Number CN2019076040
Publication Number 2020/172765
Status In Force
Filing Date 2019-02-25
Publication Date 2020-09-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shang, Er-Xin
  • Qian, Wen-Jie
  • Gao, Haiyu

Abstract

In some examples, a system executes a program that generates a user interface (UI) screen, provides a user input event to the program during execution, and captures images of the UI screen before and after the user input event. The system determines, based on the captured images, whether a first region of the UI screen changed in response to the user input event, and indicates the first region as a user interactive region and adds an element representing the user interactive region to a representation of user interactive regions of a UI of the program.

IPC Classes  ?

  • G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements

9.

TEST SCRIPT GENERATION BASED ON EVENT DATA AND VIDEO FRAMES

      
Application Number CN2019071377
Publication Number 2020/143030
Status In Force
Filing Date 2019-01-11
Publication Date 2020-07-16
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shang, Er-Xin
  • Zhou, Bin
  • Jiang, Chao Lin

Abstract

In some examples, a system processes event data and video frames produced by a program during execution of the program, the event data representing user actions with respect to a graphical user interface (GUI) of the program. The system identifies an area of the GUI that corresponds to a respective user action of the user actions, wherein identifying the area of the GUI uses a first video frame before an event corresponding to the respective user action, and a second video frame after the event corresponding to the respective user action. The system identifies, based on the identified area, a test object representing a user interface (UI) element, and generates a test script for testing the program, the test script including the test object.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

10.

AUTOMATED IDENTIFICATION OF INPUT ELEMENTS IN GRAPHICAL USER INTERFACE

      
Application Number CN2018124812
Publication Number 2020/133201
Status In Force
Filing Date 2018-12-28
Publication Date 2020-07-02
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Yin, Peng-Ji
  • Hua, Cheng
  • Zhang, Jie

Abstract

A computing device includes a processor and a medium storing instructions. The instructions are executable by the processor to: identify, based on a blob detection analysis, a plurality of potential input elements in a graphical user interface (GUI); determine a set of rows including potential input elements that are in a horizontal alignment and in a same size range; determine a set of columns including potential input elements that are in a vertical alignment and in a same size range; determine a set of input elements comprising multiple potential input elements that are located at intersections of the identified set of rows and the identified set of columns; and perform automated testing of the GUI using the determined set of input elements.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

11.

PROJECT MANAGEMENT VISUALIZATION INTERFACE

      
Application Number CN2018120967
Publication Number 2020/118638
Status In Force
Filing Date 2018-12-13
Publication Date 2020-06-18
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Liu, Hai-Ying
  • Ding, Chen
  • Xia, Jing-Chun

Abstract

A technique includes displaying, by a computer using a graphical interface, a map of a geographical area, where the map includes political boundaries. The technique includes displaying, by the computer, graphical images on the map representing a plurality of aspects that are associated with the management of a plurality of projects as corresponding geographical features on the map. The technique includes graphically segregating, by the computer, the plurality of projects on the map using the political boundaries; receiving input, via interaction with the displayed map; and changing, by the computer, in response to the interaction, how a given aspect of the plurality of aspects of a given project of the plurality of projects is represented on the map.

IPC Classes  ?

12.

ASYMMETRIC-MAN-IN-THE-MIDDLE CAPTURE BASED APPLICATION SHARING PROTOCOL TRAFFIC RECORDATION

      
Application Number CN2018109791
Publication Number 2020/073267
Status In Force
Filing Date 2018-10-11
Publication Date 2020-04-16
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Luo, Yang
  • Zhang, Jian
  • Zhai, Qian-Ru
  • Lin, Zhenbin

Abstract

In some examples, with respect to asymmetric-man-in-the-middle capture based application sharing protocol traffic recordation, a dynamic-link library that alters application programming interface calls with respect to communication between an application sharing protocol client and an application sharing protocol server may be injected into the application sharing protocol client. Based on the injected dynamic-link library, data from the communication between the application sharing protocol client and the application sharing protocol server may be ascertained. Further, based on the ascertained data, a test script may be generated to test operation of an application associated with the communication between the application sharing protocol client and the application sharing protocol server.

IPC Classes  ?

13.

PAGE NAVIGATION WITH TREE MENU

      
Application Number CN2018109248
Publication Number 2020/069638
Status In Force
Filing Date 2018-10-05
Publication Date 2020-04-09
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Zhang, Li
  • Zhang, Bing
  • Sun, Da-Long
  • Chen, Rong-Feng

Abstract

A computing device includes a processor and a machine-readable storage medium storing instructions. The instructions are executable by the processor to: generate a graphical user interface including a first portion and a second portion, the first portion including a tree menu comprising a plurality of topic links; and in response to a user selection of a first topic link in the tree menu, present a first topic window in the second portion of the graphical user interface. The instructions are further executable by the processor to, in response to a user command to minimize the first content window: minimize the first content window; and present a snapshot window in the second portion of the graphical user interface, the snapshot window comprising a first snapshot of the first topic window.

IPC Classes  ?

  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]

14.

INTENT AND CONTEXT-AWARE DIALOGUE BASED VIRTUAL ASSISTANCE

      
Application Number CN2018108261
Publication Number 2020/062006
Status In Force
Filing Date 2018-09-28
Publication Date 2020-04-02
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Wang, Jin
  • Huang, Hao
  • Li, Ting-Kun
  • Wen, Nai-Long
  • Cui, Zhen
  • Baron, David

Abstract

In some examples, with respect to intent and context-aware dialogue based virtual assistance, an intent of an inquiry may be determined using an intent classification model. A determination may be made as to whether the determined intent matches a pre-specified intent of a plurality of pre-specified intents. Based on a determination that the determined intent does not match the pre-specified intent, a question related to the inquiry may be generated. Another intent of the inquiry may be determined by analyzing a response to the question using the intent classification model. A determination may be made as to whether the determined other intent matches another pre-specified intent of the plurality of pre-specified intents. Based on a determination that the determined other intent does not match the other pre-specified intent, a deep learning model may be utilized to predict a response to the inquiry.

IPC Classes  ?

15.

RISK CLASSIFICATION OF INFORMATION TECHNOLOGY CHANGE REQUESTS

      
Application Number CN2018109057
Publication Number 2020/062224
Status In Force
Filing Date 2018-09-30
Publication Date 2020-04-02
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Huang, Hao
  • Wang, Jin
  • Steube, Jan
  • Wen, Nai-Long
  • Cui, Zhen

Abstract

A computing device includes a processor and a machine-readable storage medium storing instructions. The instructions are executable by the processor to: receive input data defining an information technology (IT) change request; in response to a receipt of the input data, perform a first risk classification of the IT change request using a decision tree model; generate a graphical user interface based on the first risk classification, the graphical user interface indicating risk impacts for each of a plurality of request features, and the graphical user interface including a graphic representation of the decision tree model; in response to a user modification to a first request feature of the plurality of request features in the graphical user interface, automatically perform a second request analysis using the decision tree model; and automatically update the graphical user interface based on the second request analysis.

IPC Classes  ?

16.

PROJECT VISUALIZATIONS

      
Application Number CN2018090645
Publication Number 2019/237226
Status In Force
Filing Date 2018-06-11
Publication Date 2019-12-19
Owner ENTIT SOFTWARE LLC (USA)
Inventor Shang, Er-Xin

Abstract

In some examples, a system represents tasks of a project as feature nodes of a force-directed graph, and connects, in the force-directed graph, sub-feature nodes representing sub-features associated by links to the feature nodes in the force-directed graph. The system sets a size of each respective sub-feature node of the sub-feature nodes based on an amount of resource usage expended on a respective sub-feature represented by the respective sub-feature node. The system causes display of the force-directed graph, and collapses or expands a portion of the force-directed graph responsive to user interaction with the force-directed graph.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06F 8/20 - Software design

17.

CONVERTING DATABASE LANGUAGE STATEMENTS BETWEEN DIALECTS

      
Application Number CN2018091502
Publication Number 2019/237333
Status In Force
Filing Date 2018-06-15
Publication Date 2019-12-19
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shi, Lei
  • Zhou, Qin
  • Gu, Bing
  • Zhu, Dong-Hui
  • Yan, Feng
  • Zou, Wen

Abstract

A system receives a source database language statement according to a first dialect, determines a pattern of the source database language statement, the pattern comprising an abstract representation of the source database language statement, and checks whether the determined pattern is present in a cache of translations between patterns according to the first dialect and corresponding patterns according to a second dialect different from the first dialect. In response to the determined pattern being present in the cache of translations, the system converts, using a corresponding translation in the cache of translations, the source database language statement according to the first dialect to a respective target database language statement according to the second dialect.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

18.

AUTOMATIC SELECTION OF REQUEST HANDLER USING TRAINED CLASSIFICATION MODEL

      
Application Number CN2018087818
Publication Number 2019/222908
Status In Force
Filing Date 2018-05-22
Publication Date 2019-11-28
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Wu, Zhu-Jing
  • Wang, Xin-Yu
  • Wang, Jin
  • Li, Chun-Hua
  • Cui, Zhen

Abstract

A computing device includes a processor and a medium storing instructions. The instructions are executable by the processor to: in response to a receipt of an electronic request comprising one or more structured data fields and one or more unstructured data fields, identify a set of previous electronic requests using the one or more structured data fields of the received electronic request; train a probabilistic classification model using at least one structured data field of the identified set of previous electronic requests; execute the trained probabilistic classification model using the one or more unstructured data fields of the received electronic request; and automatically select a request handler using an output of the executed probabilistic classification model.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

19.

RECOMMENDING PROGRAMMATIC DESCRIPTIONS FOR TEST OBJECTS

      
Application Number CN2018085110
Publication Number 2019/205146
Status In Force
Filing Date 2018-04-28
Publication Date 2019-10-31
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Yin, Peng-Ji
  • Hua, Cheng
  • Zhang, Jie

Abstract

A technique includes receiving, by a computer, user input representing creation of a first programmatic description of a first test object of source code to be tested. The technique includes, in response to receiving the user input, determining, by the computer, based on other programmatic descriptions of other test objects, a recommendation of a parameter to be used in the first programmatic description to identify the first test object. The technique includes causing, by the computer, a display of the recommendation.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

20.

DYNAMIC CONTEXTUAL MENU

      
Application Number CN2018081345
Publication Number 2019/183926
Status In Force
Filing Date 2018-03-30
Publication Date 2019-10-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Zhang, Bing
  • Sun, Da-Long
  • Zhang, Li
  • Chen, Rong-Feng

Abstract

Content items and a dynamic menu element are displayed. Responsive to selection and dragging of the dynamic menu element over a particular content item, a menu of actions contextual to the particular content item is displayed, and the particular content item is highlighted to indicate that the displayed menu is related to the particular content item. Responsive to release of the dynamic menu element over the particular content item, the displayed menu is rendered actionable so that the actions thereof selectable; prior to release of the dynamic menu element over the particular content item, the displayed menu is non-actionable and no action is selectable. Responsive to selection of a specific action of the menu being displayed, the selected specific action is performed in relation to the particular content item.

IPC Classes  ?

  • G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/0486 - Drag-and-drop

21.

GESTURE BUTTONS

      
Application Number CN2017113506
Publication Number 2019/104519
Status In Force
Filing Date 2017-11-29
Publication Date 2019-06-06
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Zhang, Bing
  • Sun, Da-Long
  • Zhang, Li
  • Chen, Rong-Feng

Abstract

In one example, a system for gesture buttons can include a processing resource and a non-transitory computer readable medium having stored thereon instructions to cause the processing resource to perform a first function in response to a gesture provided to the user interface, display a gesture button on the user interface, and perform a second function that is different than the first function in response to the gesture provided on the gesture button displayed on the user interface.

IPC Classes  ?

  • G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus

22.

TOPIC IMAGE FLOWS

      
Application Number CN2017099559
Publication Number 2019/041149
Status In Force
Filing Date 2017-08-30
Publication Date 2019-03-07
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Zhang, Perry
  • Lin, Yu-Dan
  • Zhang, Bing
  • Gao, Jian-Min

Abstract

In one example, a system for topic image flows can include a processing resource and a non-transitory computer readable medium having stored thereon instructions to cause the processing resource to generate an image flow of a plurality of topic headers when a user scroll speed of a document including text exceeds a threshold scroll speed, receive a selection of a topic header from the plurality of topic headers, and display, on a user interface, a portion of the document that corresponds to the selected topic header from the plurality of topic headers.

IPC Classes  ?

  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]

23.

TRANSLATING TEXT IN USER INTERFACES BASED ON USER INTERFACE CONTEXTS

      
Application Number CN2017099239
Publication Number 2019/041084
Status In Force
Filing Date 2017-08-28
Publication Date 2019-03-07
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Ren, Yi-Qun
  • Hu, Kai
  • Gao, Jian-Min
  • Lustig, Uriel

Abstract

In some examples, a system receives a user interface (UI) context of a UI, the UI context identifying a relationship between UI elements of the UI, and translates, based on the identified relationship between the UI elements in the UI context, text in the UI from a first language to a second language.

IPC Classes  ?

24.

MANAGING CONTAINERS USING ATTRIBUTE/VALUE PAIRS

      
Application Number CN2017099799
Publication Number 2019/041206
Status In Force
Filing Date 2017-08-31
Publication Date 2019-03-07
Owner ENTIT SOFTWARE LLC (USA)
Inventor Qi, Ke-Ke

Abstract

A computer implemented method includes: accessing from a configuration management database, by a virtualization manager, configuration data for a first computing node of a computing system; generating, by the virtualization manager, a set of attribute/value pairs for the first computing node using the configuration data; and managing, by the virtualization manager, a first container on the first computing node using the set of attribute/value pairs for the first computing node.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

25.

AUTOMATED NOISE ATTENUATION IN FREQUENCY DOMAINS

      
Application Number CN2017095258
Publication Number 2019/023875
Status In Force
Filing Date 2017-07-31
Publication Date 2019-02-07
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Wang, Jin
  • Wu, Zhu-Jing
  • Lu, Jun
  • Chen, Gang
  • Cui, Zhen

Abstract

In some examples, an apparatus for automated removal of noise in a frequency domain receives an image captured by an image sensor, converts at least a portion of the image into a frequency domain image, identifies a position in the frequency domain image, the position indicating a boundary between target content in the frequency domain image and noise in the frequency domain image, and removes content in the frequency domain image outside the boundary, to produce a noise-attenuated image.

IPC Classes  ?

  • H04N 5/357 - Noise processing, e.g. detecting, correcting, reducing or removing noise
  • G06T 5/10 - Image enhancement or restoration using non-spatial domain filtering

26.

REPLACING A SUBSET OF DIGITS IN A SEQUENCE

      
Application Number US2016028463
Publication Number 2017/184132
Status In Force
Filing Date 2016-04-20
Publication Date 2017-10-26
Owner ENTIT SOFTWARE LLC (USA)
Inventor Minner, Richard

Abstract

In one example in accordance with the present disclosure, a method may include receiving a digit sequence including a subset of N digits encoded with semantic information and determining a set of possible combinations for the N digits in the subset. The method may also include establishing a mapping between each possible combination in the set of possible combinations and a corresponding integer sequence belonging to a set of integer sequences. Each integer sequence in the set of integer sequences is of the length of N-1. The method may also include identifying a selected integer sequence corresponding to the subset and replacing n-1 digits from the subset with the selected integer sequence. The method may also include replacing a digit of the subset with a digit value calculated to produce a valid checksum for the entire first digit sequence, wherein the first digit is not included in the n-1 digits.

IPC Classes  ?

  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens
  • H03M 13/09 - Error detection only, e.g. using cyclic redundancy check [CRC] codes or single parity bit
  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received

27.

AUTHORIZATION OF USE OF CRYPTOGRAPHIC KEYS

      
Application Number US2016028788
Publication Number 2017/184160
Status In Force
Filing Date 2016-04-22
Publication Date 2017-10-26
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Mundis, Jesse
  • Lubliner, Joshua

Abstract

Examples herein involve authorization of use of cryptographic keys based on cryptocurrency payments. An example method includes analyzing a request for a cryptographic key of a key server where the request may be received from a requesting device and the cryptographic key is used to decrypt or encrypt a message of the request, and authorizing use of the cryptographic key to decrypt or encrypt the message based on a balance in a cryptocurrency wallet associated with the request.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

28.

DETERMINING PROBABLE ROOT CAUSE OF PERFORMANCE ISSUES

      
Application Number US2016029035
Publication Number 2017/184180
Status In Force
Filing Date 2016-04-22
Publication Date 2017-10-26
Owner ENTIT SOFTWARE LLC (USA)
Inventor Ulman, Avi

Abstract

The present disclosure is to determine a probable root cause of a performance issue. For example, a method can include processing, using a processor, a set of calls for a Hypertext Transfer Protocol (HTTP) transaction wherein individual calls of the set of calls have a set of parameters; and identifying, using the processor, that the HTTP transaction has a performance issue that falls below a predetermined level of a performance metric. Further steps can include separating, using the processor, the set of calls into a first group with the performance issue and a second group without the performance issue; discovering, using the processor, a common subset of parameters among the first group; and determining that the common subset of parameters is a probable root cause of the performance issue if the common subset of parameters is not found in the second group.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06Q 50/10 - Services
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 11/30 - Monitoring

29.

APPLICATION PERFORMANCE MONITORING

      
Application Number US2016027111
Publication Number 2017/180109
Status In Force
Filing Date 2016-04-12
Publication Date 2017-10-19
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Yemini, Nevoh
  • Sela, Roy
  • Ronin, Yuri

Abstract

Examples include monitoring performance of an application. Some examples include tracing a set of transactions associated with an application, generating a transaction interface that includes an area to receive a selection of a transaction of the set of transactions, and receiving a selected transaction. Based on the selected transaction, a transaction monitor rule may be built to monitor the selected transaction. Based on the transaction monitor rule, a performance interface may be generated that includes an area having transaction performance information of the selected transaction.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 9/44 - Arrangements for executing specific programs

30.

REMOVING WILDCARD TOKENS FROM A SET OF WILDCARD TOKENS FOR A SEARCH QUERY

      
Application Number US2016027822
Publication Number 2017/180153
Status In Force
Filing Date 2016-04-15
Publication Date 2017-10-19
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chen, Qiming
  • Hsu, Meichun
  • Castellanos, Malu G.

Abstract

In one example in accordance with the present disclosure, a method may include separating a list of keywords into a set of word tokens and a set of wildcard tokens. The method may also include removing each wildcard token in the set of wildcard tokens that is inferred by at least one word token in the set of word tokens and removing each wildcard token in the set of wildcard tokens that is inferred by at least one other wildcard token in the set of wildcard tokens. The method may also include executing a search query comprising a new list of keywords that includes each wildcard token not removed from the set of wildcard tokens.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

31.

CODE COVERAGE THRESHOLDS FOR CODE SEGMENTS BASED ON USAGE FREQUENCY AND CHANGE FREQUENCY

      
Application Number US2016024480
Publication Number 2017/171708
Status In Force
Filing Date 2016-03-28
Publication Date 2017-10-05
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Zanbar, Alon
  • Elia, Lilo
  • Busi, Eliraz

Abstract

In some examples, a system includes a segment identification engine and a coverage determination engine. The segment identification engine may a code segment in application code for updating a code coverage threshold applicable to the code segment. The coverage determination engine may update the code coverage threshold for the code segment based on a usage frequency of the code segment and a change frequency of the code segment.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

32.

COMPARABLE USER INTERFACE OBJECT IDENTIFICATIONS

      
Application Number US2016023655
Publication Number 2017/164856
Status In Force
Filing Date 2016-03-23
Publication Date 2017-09-28
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shani, Inbar
  • Shufer, Ilan
  • Nitsan, Amichai

Abstract

Example implementations relate to comparable UI object identifications. Some implementations may include a data capture engine to capture data points during test executions of the application under test. The data points may include, for example, test action data and application action data. Additionally, some implementations may include a data correlation engine to correlate each of the data points with a particular test execution of the test executions, and each of the data points may be correlated based on a sequence of events that occurred during the particular test execution. Furthermore, some implementations may also automatically identify, based on the correlated data points, a set of comparable UI objects.

IPC Classes  ?

  • G06F 11/22 - Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
  • G06F 17/30 - Information retrieval; Database structures therefor

33.

ASSISTING A SCANNING SESSION

      
Application Number US2016023120
Publication Number 2017/160309
Status In Force
Filing Date 2016-03-18
Publication Date 2017-09-21
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Ng, Ming Sum Sam
  • Muthurajan, Sasi Siddharth
  • Raz, Barak

Abstract

Examples herein disclose via use of a physical processor, detecting a specific application programming interface (API) call to interact with an application running on a production server. Based on the detection of the specific API call, the examples assist, using the physical processor, a scanning session based on the specific API call. Using the physical processor, the examples identify a modification to the application based on the scanning session.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 17/30 - Information retrieval; Database structures therefor

34.

PLAINTEXTS ENCRYPTED WITH PLURALITIES OF KEYS

      
Application Number US2016023254
Publication Number 2017/160316
Status In Force
Filing Date 2016-03-18
Publication Date 2017-09-21
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Spies, Terence
  • Kappenberger, Karl Reiner

Abstract

Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a key engine to obtain a first key associated with a first access level, and a second key associated with a second access level. The encrypting device may also include a multi-key encryption engine to encrypt a first portion of the plaintext with the first key, and encrypt a second portion of the plaintext with the second key, where the first portion may include more detailed information than the second portion, and where the first access level may be higher than the second access level.

IPC Classes  ?

  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • G06F 21/60 - Protecting data

35.

DATA OBJECTS ASSOCIATED WITH PRIVATE SET INTERSECTION (PSI)

      
Application Number US2016023259
Publication Number 2017/160317
Status In Force
Filing Date 2016-03-18
Publication Date 2017-09-21
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chen, Liqun
  • Haber, Stuart
  • Sander, Tomas

Abstract

Examples disclosed herein relate to data objects associated with private set intersection (PSI). Some examples disclosed herein may enable identifying a set of server elements and a set of data objects. Each data object of the set of data objects may be associated with at least one server element of the set of server elements. Some examples further enable sending the set of server elements and the set of data objects to a client computing device that has a set of client elements. A private set intersection (PSI) between the set of server elements and the set of client elements may be inaccessible by the client computing device, and a subset of the set of data objects that are associated with the PSI may be accessible by the client computing device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

36.

SIMULATION ENVIRONMENT CREATION

      
Application Number US2016021137
Publication Number 2017/155499
Status In Force
Filing Date 2016-03-07
Publication Date 2017-09-14
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shani, Inbar
  • Taragin, Jonathan
  • Mordechai, Eli

Abstract

Example implementations relate to creating a simulation environment. For example, a system for simulation environment creation may include a system controller. The system may also include a functional agent coupled to and executed by the system controller to create a simulation environment based on input comprising real user data and sensor data continuously received from a plurality of sources, perform tests within the simulation environment, continuously react to events occurring during the tests within the simulation environment, and continuously verify results of the tests.

IPC Classes  ?

  • G06F 11/26 - Functional testing
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

37.

APPLICATION CONTENT DISPLAY AT TARGET SCREEN RESOLUTIONS

      
Application Number US2016019339
Publication Number 2017/146696
Status In Force
Filing Date 2016-02-24
Publication Date 2017-08-31
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Jakov, Eyal
  • Kraus, Moshe Eran
  • Nissim, Shlomi

Abstract

In some examples, a method includes accessing a test script configured to test an application at a target screen resolution and testing the application using the test script when a current screen resolution of the test system is different from the target screen resolution. The testing may include initializing a system web browser to run the application and overwriting a size parameter of the system web browser to cause a content window of the system web browser to display application content at the target screen resolution instead of the current screen resolution.

IPC Classes  ?

  • G06F 3/14 - Digital output to display device
  • G06F 17/30 - Information retrieval; Database structures therefor

38.

SIMILARITY SCORES OF RULES IN INFORMATION TECHNOLOGY WORKFLOWS

      
Application Number US2016019808
Publication Number 2017/146728
Status In Force
Filing Date 2016-02-26
Publication Date 2017-08-31
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chovel, Shlomi
  • Babay Adi, Hava
  • Chen, Rotem
  • Biron, Ran
  • Tubman, Olga

Abstract

In some examples, first segment of computer language text in a first rule in IT workflow data and a second segment of computer language text in a second rule in the IT workflow data may be identified. In some examples, a similarity score may be determined between the first and the second rules based on a comparison of the first segment with the second segment.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 17/27 - Automatic analysis, e.g. parsing, orthograph correction

39.

SCAN ADAPTATION DURING SCAN EXECUTION

      
Application Number US2016019809
Publication Number 2017/146729
Status In Force
Filing Date 2016-02-26
Publication Date 2017-08-31
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Muthurajan, Sasi Siddharth
  • Ng, Ming Sum Sam
  • Brooks, Jeremy C.

Abstract

In some examples, a system includes a scan execution engine and a scan adaptation engine. The scan execution engine may execute a scan of a web application hosted on a web host. During scan execution, the scan adaptation engine may adapt a subsequent scan portion for later execution based on a scan metric received from a monitoring agent that monitors the web application, the web host, or both.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

40.

DIFFERENCES IN HIERARCHICAL LEVELS OF INFORMATION TECHNOLOGY WORKFLOWS

      
Application Number US2016019831
Publication Number 2017/146731
Status In Force
Filing Date 2016-02-26
Publication Date 2017-08-31
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chen, Rotem
  • Babay Adi, Hava
  • Chovel, Shlomi
  • Tubman, Olga
  • Biron, Ran

Abstract

In some examples, a first difference may be determined across respective first and second workflow elements in a first hierarchical level of respective first and second IT workflow data. A second difference may be determined across respective third and fourth workflow elements in a second hierarchical level of the respective first and second IT workflow data. A display representing the first and second differences may be generated.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06Q 10/10 - Office automationTime management

41.

STRUCTURED DATA ARCHIVAL WITH REDUCED DOWNTIME

      
Application Number US2016026790
Publication Number 2017/146750
Status In Force
Filing Date 2016-04-08
Publication Date 2017-08-31
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Oberoi, Danny
  • Singh, Jaspreet
  • Gandhi, Ibha

Abstract

Structured data archival with reduced downtime is disclosed. One example is a system including a deployer that manages an active table (AT), and a non-active table (NAT), and creates an intermediate table (IT) to record, during data archival, changes to the data to be archived. The deployer creates triggers on the AT and the NAT to facilitate the record, by the IT, of the changes to the data to be archived. An archiver initiates the data archival by archiving the copy of the data to be archived from the NAT, merges the recorded data from the IT to the NAT upon receiving an indication that the client access to the AT is not enabled, and switches the client access from the AT to the NAT by changing a table synonym, where the client access to the NAT is enabled upon completion of the data archival.

IPC Classes  ?

  • G06F 17/40 - Data acquisition and logging
  • G06F 3/06 - Digital input from, or digital output to, record carriers

42.

CLASSIFICATION

      
Application Number US2016018024
Publication Number 2017/142510
Status In Force
Filing Date 2016-02-16
Publication Date 2017-08-24
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Forman, George
  • Nachlieli, Hila

Abstract

An example method comprises performing for each class from a plurality of classes: constructing binary training set for the class, the binary training set including labeled cases for that class from the main training set other labeled cases from the main training set; training classifier for the class on the binary training set; computing a local calibration threshold using scores of the labeled cases in the binary training set; and adjusting all scores of the label cases in the binary training set with the local calibration threshold to meet a global decision threshold. The method also comprises determining, with the processor, a global hierarchical calibration threshold by using the adjusted scores for all classes to optimize a performance measurement of all trained classifiers. The method further comprises classifying, with the processor, a new case by using a previously trained classifier, a local calibration threshold, and the global hierarchical calibration threshold.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 15/18 - in which a program is changed according to experience gained by the computer itself during a complete run; Learning machines (adaptive control systems G05B 13/00;artificial intelligence G06N)
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

43.

ENVIRONMENT SIMULATIONS

      
Application Number US2016018260
Publication Number 2017/142530
Status In Force
Filing Date 2016-02-17
Publication Date 2017-08-24
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Korn, Amitay
  • Siman-Tov, Avivi
  • Kogan, Olga

Abstract

Example implementations relate to simulating an environment. For example, a system for environment simulation may include a simulation engine to build an environment simulation to mimic portions of a real environment relevant to a detected anomaly trend, an acceleration engine to simulate, within the environment simulation, a scenario associated with the detected anomaly at a rate faster than the scenario occurs in the real environment, a abnormal behavior engine to detect a abnormal behavior associated with the scenario, and an adaptation engine to modify a device within the real environment to be adaptive to the scenario, based on the detected abnormal behavior.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06Q 50/04 - Manufacturing
  • G06Q 50/30 - Transportation; Communications

44.

VISUALIZATIONS OF COMPUTER PROGRAM TRANSACTIONS

      
Application Number US2016018382
Publication Number 2017/142535
Status In Force
Filing Date 2016-02-18
Publication Date 2017-08-24
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Amir, Jonatan
  • Landsman, Ronit
  • Kohane, Yoram

Abstract

Examples disclosed herein relate to visualizations of computer program transactions. The examples enable obtaining a transaction record of a computer program. The transaction record may include a call stack of a plurality of procedure calls and a self-time of each procedure call. The examples enable generating a graphical representation of the transaction record having a plurality of two-dimensional shapes aligned with a first axis and a second axis. Each two-dimensional shape represents a procedure call, and a first dimension of each shape represents a call-time of each procedure call while a second dimension of each shape represents the self-time of each procedure call. The shapes are positioned in the graphical representation to reflect relative positions within the call stack.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/44 - Arrangements for executing specific programs

45.

ENCRYPTION METHODS

      
Application Number US2016018780
Publication Number 2017/142563
Status In Force
Filing Date 2016-02-19
Publication Date 2017-08-24
Owner ENTIT SOFTWARE LLC (USA)
Inventor Minner, Richard

Abstract

Examples discussed herein disclose, among other things, a method. The method includes, among other things, obtaining a plaintext, obtaining a key from a plurality of keys, and determining whether the plaintext is longer than a predefined threshold length. If the plaintext is longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a first ciphertext having a length of the plaintext, where the character at a predefined position within the first ciphertext belongs to a first subset of characters. And if the plaintext is not longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a second ciphertext, which is longer than the plaintext, where the character at the same predefined position in the second ciphertext belongs to a second subset of characters.

IPC Classes  ?

  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

46.

GENERATING RECOMMENDED INPUTS

      
Application Number US2016016948
Publication Number 2017/138910
Status In Force
Filing Date 2016-02-08
Publication Date 2017-08-17
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Egozi-Levi, Efrat
  • Assulin, Ohad
  • Shor, Boaz
  • Gelberg, Mor

Abstract

Example embodiments relate to generating sets of recommended inputs for changing predicted results of a predictive model. The examples disclosed herein access, from a database, a historical set of inputs and results of a predictive model. A function is approximated based on the historical set of inputs and results, and a gradient of the function is computed using a result of the function with respect to a local maximum value of the function. A set of recommended inputs is generated based on the gradient of the function, where a recommended input produces a positive result of the function.

IPC Classes  ?

  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

47.

STRENGTH OF ASSOCIATIONS AMONG DATA RECORDS IN A SECURITY INFORMATION SHARING PLATFORM

      
Application Number US2016017835
Publication Number 2017/138958
Status In Force
Filing Date 2016-02-12
Publication Date 2017-08-17
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Sander, Tomas
  • Hein, Brian Frederik Hosea Che
  • Cohen, Nadav
  • Ross, Ted

Abstract

Examples disclosed herein relate to strength of associations among data records in a security information sharing platform. Some examples may enable creating, in the security information sharing platform, an association between a security indicator comprising an observable, and a data record. Some examples may further enable determining strength of the association between the security indicator and the data record based on at least one of: a likelihood of change in the association; a creator of the association; an aging rate of the association; or a quality of evidence that supports the association.

IPC Classes  ?

48.

VISUALIZATION OF ASSOCIATIONS AMONG DATA RECORDS IN A SECURITY INFORMATION SHARING PLATFORM

      
Application Number US2016017803
Publication Number 2017/138957
Status In Force
Filing Date 2016-02-12
Publication Date 2017-08-17
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Sander, Tomas
  • Hein, Brian Frederik Hosea Che
  • Cohen, Nadav
  • Ross, Ted

Abstract

Examples disclosed herein relate to visualization of associations among data records in a security information sharing platform. Some examples may enable creating, in the security information sharing platform, an association between a first data record comprising a security indicator, and a second data record. Some examples may further enable providing a visual representation of the first data record, the second data record, and the association, wherein the first data record represents a first node in the visual representation, the second data record represents a second node in the visual representation, and the association represents an edge that connects the first node and the second node.

IPC Classes  ?

49.

SOURCE ENTITIES OF SECURITY INDICATORS

      
Application Number US2016017862
Publication Number 2017/138961
Status In Force
Filing Date 2016-02-12
Publication Date 2017-08-17
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Sander, Tomas
  • Hein, Brian Frederik Hosea Che
  • Cohen, Nadav
  • Ross, Ted

Abstract

Examples disclosed herein relate to source entities of security indicators. Some examples disclosed herein enable identifying, in a security information sharing platform, a security indicator that is originated from a source entity where the security indicator comprises an observable. Some examples further enable determining a reliability level of the source entity based on at least one of: security events, sightings of the observable, a first set of user feedback information that is submitted for the security indicator by users of the security information sharing platform, or a second set of user feedback information that is collected from external resources that are external to the security information sharing platform.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation

50.

EXTENDED CIPHERTEXTS

      
Application Number US2016016867
Publication Number 2017/135970
Status In Force
Filing Date 2016-02-05
Publication Date 2017-08-10
Owner ENTIT SOFTWARE LLC (USA)
Inventor Minner, Richard

Abstract

Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a format preserving encryptor to obtain a plaintext, obtain a key from a plurality of keys stored in a key database, and encrypt the plaintext using the key to produce a ciphertext having a length of the plaintext. The encrypting device may also include a key reference embedder to obtain a key reference associated with the key, and generate an extended ciphertext by adding to the ciphertext a set of characters associated with the key reference, such that the key reference can be determined based on the extended ciphertext.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

51.

USER INTEREST AND RELATIONSHIP DETERMINATION

      
Application Number CN2016073690
Publication Number 2017/133007
Status In Force
Filing Date 2016-02-05
Publication Date 2017-08-10
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Yu, Xiao-Feng
  • Xie, Jun-Qing
  • Guo, Meng

Abstract

A method for user interest and relationship determination may include distributing a first and a second set of pairs to a plurality of data nodes. The method may also include calculating, on a first data node, a probability of a user's interest in a product based on an observable factor and a latent factor and calculating, on a second data node, a probability of a likelihood of a relationship between the user and a second user, based on an observable factor and a latent factor. The method may also include determining a most likely interest and a most likely relationship of the user and predicting a potential interest of the user based on the most likely interest and the most likely relationship.

IPC Classes  ?

52.

PROTECTING DATA OF A PARTICULAR TYPE

      
Application Number US2016014744
Publication Number 2017/131615
Status In Force
Filing Date 2016-01-25
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor Bradley, Matthew

Abstract

Example implementations relate to protecting data of a particular data type. For example, a system for protecting data of a particular type may include a configuration engine to receive a stream of data, where a portion of the stream of data includes data of a particular data type. The configuration engine may determine the particular data type to be protected based, at least in part, on a format associated with the stream of data. Further, the system for protecting data of a particular type may include a cryptography engine to protect the data of the particular data type, and a generation engine to output the stream of data such that at least the data of the particular data type is protected.

IPC Classes  ?

53.

CONFIRMATION MESSAGE DETERMINATIONS

      
Application Number US2016014749
Publication Number 2017/131617
Status In Force
Filing Date 2016-01-25
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shmaya, Daniel
  • Busi, Eliraz
  • Ben-Yehuda, Itay

Abstract

An example technique involves sending, from a user device associated with a particular user, a request for a confirmation message setting. The request may include an indication of an identity of the particular user. The example technique involves determining that an operation included in a predetermined set of operations has been cued. The example technique involves receiving a response comprising an indication of a confirmation message setting for the cued operation prior to performing the cued operation. The confirmation message setting may be based on data generated responsive to the sent request. The confirmation message setting for the cued operation may include an indication of whether or not to output a confirmation message. The example technique involves determining, based on the received response, whether to prompt the particular user via a user interface of the user device for a response to a confirmation message prior to performing the cued operation.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation

54.

RECOMMENDATIONS BASED ON THE IMPACT OF CODE CHANGES

      
Application Number US2016015156
Publication Number 2017/131669
Status In Force
Filing Date 2016-01-27
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor Byrd, Christopher

Abstract

According to an example, an application code graph of an application may be received and the programming structures of the application may be ranked based on a ranking model. When the information regarding code changes associated with the application are received, the ranking model may be applied to the programming structures associated with the code changes. The impact of the code changes on the application performance may be determined and corresponding recommendations may be produced based on the determined impact.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

55.

DATABASE SERVER TO PREDICT SALES

      
Application Number US2016015345
Publication Number 2017/131696
Status In Force
Filing Date 2016-01-28
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Lakshminarayan, Choudur
  • Margaglione, John
  • Pham, Tuan Anh

Abstract

In example implementations, a method executed by a processor is provided. The method collects historical sales data. The historical sales data is divided into a training data set and a testing data set. A classification model is calculated based on the training data set and validated with the testing data set. Information associated with a pending sale is received. The information comprises a plurality of factors. Based upon the classification model, a prediction is made whether the pending sale will successfully close. An action plan that includes changing at least one of the plurality of factors based on the predicting is generated.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06Q 30/02 - MarketingPrice estimation or determinationFundraising

56.

COMMUNITIES ON A SECURITY INFORMATION SHARING PLATFORM

      
Application Number US2016015636
Publication Number 2017/131739
Status In Force
Filing Date 2016-01-29
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Sander, Tomas
  • Spies, Terence
  • Langford, Susan

Abstract

Examples disclosed herein relate to generating communities on a security information sharing platform. Some examples may enable identifying a set of community attributes to be used to generate a community on the security information sharing platform that enables sharing of security information among a plurality of communities. Some examples may enable authorizing a first user to access community-based security information of the community where the first user is associated a set of user attributes that satisfy the set of community attributes. A security indicator may be obtained from the first user of the community. Information related to the security indicator may be obtained from a second user of the community. Some examples may enable including the security indicator and the information related to the security indicator in the community-based security information of the community.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

57.

LOG EVENT CLUSTER ANALYTICS MANAGEMENT

      
Application Number US2016015848
Publication Number 2017/131791
Status In Force
Filing Date 2016-01-30
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor Byrd, Christopher

Abstract

A log event cluster analytics management method may involve storing a first portion of an entire cluster dictionary in a transient memory, storing at least a second portion of the entire cluster dictionary in a persistent database and comparing a new log event message to the first portion of the overall cluster dictionary. In response to not assigning the new log event message to any cluster in the first portion of the entire cluster dictionary in the transient memory, selecting a subset of clusters of the at least second portion of the cluster dictionary in the persistent database, comparing the new log event message to a cluster of the selected subset of clusters and assigning the new log event message to the cluster of the selected subset of clusters based upon the comparison.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

58.

ERROR BLOCK DETERMINATION

      
Application Number CN2016072664
Publication Number 2017/128273
Status In Force
Filing Date 2016-01-29
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Wang, Jin
  • Wu, Zhu Jing
  • Li, Jia-Wen
  • Zhao, Bonny
  • Lu, Jun

Abstract

A method, a non-transitory computer-readable storage medium comprising instructions to implement the method, and a corresponding system to determine whether a window is an error block are disclosed. Wherein a window in an image may be identified, then at least one property of the window may be identified. Based on the at least one property, whether the window is an error block may be determined.

IPC Classes  ?

  • H04N 21/454 - Content filtering, e.g. blocking advertisements

59.

COORDINATING OPERATION OF A NUMBER OF DIFFERENT MODULES

      
Application Number US2016014711
Publication Number 2017/131609
Status In Force
Filing Date 2016-01-25
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Aronov, Svetlana
  • Alster, Asaf
  • Kraus, Moshe Eran

Abstract

A method of coordinating operation of a number of different modules in a computing system that includes: receiving, at a state machine of a module, publication of an occurrence of a number of triggering states at modules of the computing system to which a current state of the state machine is subscribed; in response to receiving publication of the occurrence the number of triggering states at modules of the computing system to which a current state of the state machine is subscribed, sending a request to a central supervisor for authorization to advance to a next state; and in response to receiving authorization from the central supervisor, advancing the state machine to the next state corresponding to the number of triggering states that have occurred.

IPC Classes  ?

60.

TEXT SEARCH OF DATABASE WITH ONE-PASS INDEXING

      
Application Number US2016015674
Publication Number 2017/131750
Status In Force
Filing Date 2016-01-29
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chen, Qiming
  • Hsu, Meichun
  • Castellanos, Malu G.

Abstract

A system and method for a text search of a database, including converting a text search expression to a query plan and implementing the text search as the query plan on the database. The implementing of the text search includes a one-pass indexing as a single scan of an inverse index table associated with the database.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

61.

TEXT SEARCH OF DATABASE WITH ONE-PASS INDEXING INCLUDING FILTERING

      
Application Number US2016015679
Publication Number 2017/131753
Status In Force
Filing Date 2016-01-29
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chen, Qiming
  • Hsu, Meichun
  • Castellanos, Malu G.

Abstract

A system and method for a text search of a database. A text search expression is converted to a query plan having multiple search tokens. A one-pass indexing of an inverted word index filters the inverted word index based on a search condition and identifies the applicable documents having the multiple search tokens.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

62.

ENCRYPTION OF COMMUNITY-BASED SECURITY INFORMATION

      
Application Number US2016015834
Publication Number 2017/131786
Status In Force
Filing Date 2016-01-29
Publication Date 2017-08-03
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Spies, Terence
  • Sander, Tomas
  • Langford, Susan K

Abstract

Examples disclosed herein relate to encryption of community-based security information. Some examples may enable authorizing a user of a community to access an encrypted data item (e.g., at least an encrypted portion of community-based security information of that community) using a decryption key. The community may be generated on a security information sharing platform based on a set of community attributes. The decryption key may comprise a private key corresponding to each user attribute of a set of user attributes that are associated with the authorized user where the set of user attributes satisfy the set of community attributes.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

63.

IMPAIRMENT IN AN APPLICATION TEST EXECUTION

      
Application Number US2016013856
Publication Number 2017/127047
Status In Force
Filing Date 2016-01-19
Publication Date 2017-07-27
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Jacobson, Shlomo
  • Shamir, Yoram
  • Moore, Don

Abstract

A method includes, in a distributed environment for a test execution of an application, measuring impairment in the distributed environment; and, during the application test execution, subtracting the measured impairment from a test impairment that is artificially introduced into the application test execution based on a test profile.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

64.

DETECTING PHYSICAL PENETRATION OF SECURE DEVICE

      
Application Number US2016014314
Publication Number 2017/127083
Status In Force
Filing Date 2016-01-21
Publication Date 2017-07-27
Owner ENTIT SOFTWARE LLC (USA)
Inventor Lewis, John Martin

Abstract

An example device in accordance with an aspect of the present disclosure includes an interleaved connector including a plurality of layers of conducting material interspersed with insulating material. A plurality of electrodes are to identify a change in capacitance of the interleaved connector to indicate a penetration of the device.

IPC Classes  ?

  • G06F 21/82 - Protecting input, output or interconnection devices
  • G06F 21/60 - Protecting data
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

65.

Cryptographic system with halting key derivation function capabilities

      
Application Number 13570128
Grant Number 09716587
Status In Force
Filing Date 2012-08-08
First Publication Date 2017-07-25
Grant Date 2017-07-25
Owner ENTIT SOFTWARE LLC (USA)
Inventor Boyen, Xavier

Abstract

A halting key derivation function is provided. A setup process scrambles a user-supplied password and a random string in a loop. When the loop is halted by user input, the setup process may generate verification information and a cryptographic key. The key may be used to encrypt data. During a subsequent password verification and key recovery process, the verification information is retrieved, a user-supplied trial password obtained, and both are used together to recover the key using a loop computation. During the loop, the verification process repeatedly tests the results produced by the looping scrambling function against the verification information. In case of match, the trial password is correct and a cryptographic key matching the key produced by the setup process may be generated and used for data decryption. As long as there is no match, the loop may continue indefinitely until interrupted exogenously, such as by user input.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

66.

POPULARITY-BASED PROMOTION OF APPLICATION FEATURES

      
Application Number US2016012863
Publication Number 2017/123195
Status In Force
Filing Date 2016-01-11
Publication Date 2017-07-20
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Busi, Eliraz
  • Ben-Yehuda, Itay
  • Shmaya, Daniel

Abstract

According to an example, usage of a plurality of features of an application by users in each of a plurality of tenants may be accessed. Popularities of the plurality of features among the users in each of the plurality of tenants may be determined and a feature of the plurality of features to be promoted to the users in the first tenant may be identified based upon the determined popularities of the features. Additionally, a visual callout to the identified feature may be caused to be displayed to the users in the first tenant to promote the identified feature to the users in the first tenant.

IPC Classes  ?

  • G06Q 30/02 - MarketingPrice estimation or determinationFundraising
  • G06F 9/44 - Arrangements for executing specific programs

67.

DETERMINING VISUAL TESTING COVERAGES

      
Application Number US2016012934
Publication Number 2017/123203
Status In Force
Filing Date 2016-01-12
Publication Date 2017-07-20
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Kogan, Olga
  • Shufer, Ilan
  • Levin, Amit

Abstract

Example implementations relate to determining visual testing coverages. Some implementations may include a principal application screen identification engine to identify, based on an image processing analysis of a set of screenshots of an application under test, principal application screens that represent a set of test executions of the application under test. Some implementations may also include a user interface element identification engine to identify user interface elements in the principal application screens. Some implementations may also include a visual testing coverage engine to automatically identify, based on an analysis of gaze data and the user interface elements, a visual testing coverage of the application under test.

IPC Classes  ?

  • G06F 3/033 - Pointing devices displaced or positioned by the userAccessories therefor
  • G06F 3/037 - Pointing devices displaced or positioned by the userAccessories therefor using the raster scan of a cathode-ray tube [CRT] for detecting the position of the member, e.g. light pens cooperating with CRT monitors
  • G06F 3/0487 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser

68.

DETERMINING A FUNCTIONAL STATE OF A SYSTEM UNDER TEST

      
Application Number US2016013229
Publication Number 2017/123218
Status In Force
Filing Date 2016-01-13
Publication Date 2017-07-20
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shani, Inbar
  • Mordechai, Eli
  • Taragin, Jonathan
  • Sasson, Iris

Abstract

Example implementations relate to determining a functional state of a system under test. For example, a system to determine a functional state of a system under test may include a system controller to execute a functional test of the system under test by invoking a subset of a plurality of functional agents to interact with the system under test. Further, the system may include an agent repository to interact with the system controller and store the plurality of functional agents. Also, the system may include a state module to determine a functional state for the system under test by querying each of the subset of functional agents and comparing aggregated results from the subset of functional agents against defined metrics for the system under test.

IPC Classes  ?

  • G06F 11/26 - Functional testing
  • G06F 11/22 - Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing

69.

TIME SERIES TRENDS

      
Application Number US2016012662
Publication Number 2017/119900
Status In Force
Filing Date 2016-01-08
Publication Date 2017-07-13
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Maor, Alina
  • Keshet, Renato
  • Vexler, Reuth

Abstract

Examples disclosed herein relate, among other things, to a method. The method may obtain a time series comprising a plurality of data points associated with a sub-segment of a segment, obtaining a plurality of weights associated with a plurality of data point pairs from the plurality of data points, and based on the plurality of weights and the plurality of data point pairs, determine whether the time series comprises a trend. Based on a determination that the time series comprises a trend, the method may calculate a trend score for the trend based on at least one characteristic of at least one of the segment and the sub-segment, and provide the trend for display.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"

70.

RESOURCE REQUESTS

      
Application Number US2016012139
Publication Number 2017/119869
Status In Force
Filing Date 2016-01-05
Publication Date 2017-07-13
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Biron, Ran
  • Ben Zeev, Lior

Abstract

Examples disclosed herein relate, among other things, to a first computing device including a server optimization module communicatively coupled to a server application. The server optimization module may receive, from a second computing device, a resource request identifying a resource, and send to the second computing device a packet list identifying a set of packets associated with the resource, where each packet describes differences between different versions of the resource. The server optimization module may also receive from the second computing device a set of packet requests, each packet request identifying a packet from the set of packets, and for each packet in the set of packets, send the packet to the second computing device based on a determination that the packet has been updated since the packet has been last sent to the second computing device.

IPC Classes  ?

  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

71.

PRIVACY RISK INFORMATION DISPLAY

      
Application Number US2015067519
Publication Number 2017/111967
Status In Force
Filing Date 2015-12-22
Publication Date 2017-06-29
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Joseph, Gabi Bar
  • Gershoni, Tomer
  • Toledano, Yaniv

Abstract

Example implementations are described that include displaying a graphical element related to privacy risk information for an application. A processor of a computing device may determine, for the application, a privacy attention score based on first privacy risk information. The processor may determine, for the application, an aggregated privacy assessment score from a plurality of privacy risk scores that are based on second privacy risk information. The processor may cause a graphical element representing a combination of the privacy attention score and the aggregated privacy assessment score to be displayed via a display device.

IPC Classes  ?

72.

TEST EXECUTION COMPARISONS

      
Application Number US2015066543
Publication Number 2017/105473
Status In Force
Filing Date 2015-12-18
Publication Date 2017-06-22
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shani, Inbar
  • Nitsan, Amichai
  • Burg, Yaron

Abstract

Example implementations relate to test execution comparisons. Some implementations may include a data capture engine to capture data points during test executions of the application under test. The data points may include, for example, test action data and application action data. Additionally, some implementations may include a data correlation engine to correlate each of the data points with a particular test execution of the test executions, and each of the data points may be correlated based on a sequence of events that occurred during the particular test execution. Furthermore, some implementations may also automatically compare the test executions, based on the correlated data points, to identify commonalities.

IPC Classes  ?

  • G06F 11/27 - Built-in tests
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

73.

SOFTWARE DEVELOPMENT MANAGEMENTS

      
Application Number US2015064667
Publication Number 2017/099744
Status In Force
Filing Date 2015-12-09
Publication Date 2017-06-15
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Shmaya, Daniel
  • Ben-Yehuda, Itay
  • Busi, Eliraz

Abstract

Examples disclosed herein relate to software development managements. Some of the examples enable identifying a set of rules related to a software development methodology. Each rule of the set of rules may be associated with a rule-specific score. Some of the examples further enable monitoring a software development process, and determining, during the monitoring, whether at least one rule of the set of rules is invoked by an action performed by a user. If determined that a particular rule of the set of rules is invoked, a software development management score may be dynamically adjusted based on the rule-specific score associated with the particular rule. Some of the examples further enable providing a recommended action to increase the software development management score.

IPC Classes  ?

74.

GENERATING APPLICATION FLOW ENTITIES

      
Application Number US2015062914
Publication Number 2017/095362
Status In Force
Filing Date 2015-11-30
Publication Date 2017-06-08
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Kogan, Olga
  • Levin, Amit
  • Shufer, Ilan

Abstract

Example implementations relate to generating application flow entities. Some implementations may include accessing a series of image frames from a test execution of an application and comparing, using an application test analysis device comprising a digital image processor, the image frames to each other to identify a subset of the image frames. The subset of image frames may be identified, for example, based on actions occurring during the test execution. Some implementations may also include automatically generating, using the application testing system, an application flow entity that represents the test. The application flow entity may be generated based on the subset of image frames.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/44 - Arrangements for executing specific programs

75.

PRODUCT RECOMMENDATIONS BASED ON SELECTED USER AND PRODUCT ATTRIBUTES

      
Application Number US2015062969
Publication Number 2017/095371
Status In Force
Filing Date 2015-11-30
Publication Date 2017-06-08
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Lakshminarayan, Choudur
  • Kosuru, Ram

Abstract

Product recommendations are based on selected subsets of user and product attributes. Stored coefficients of transformations of the user vectors composed of subsets of attributes of respective users browsing a website and stored coefficients of transformations for the product vectors composed of subsets of attributes of respective products are accessed. The maximum values of a set of inner products of the user vectors with each of the product vectors are selected. Products associated with the maximum values are recommended to the respective users.

IPC Classes  ?

76.

ALIGNMENT AND DEDUPLICATION OF TIME-SERIES DATASETS

      
Application Number US2015062991
Publication Number 2017/095374
Status In Force
Filing Date 2015-11-30
Publication Date 2017-06-08
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Danichev, Pavel
  • Medina, Lioz
  • Vizer, Fernando

Abstract

In some examples, time-series datasets received from a system may be temporally aligned. In some examples, one of the time-series datasets may be deduplicated. In some examples, whether an anomaly has occurred in the system may be determined based on a non-deduplicated time-series dataset of the time-series datasets.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

77.

PREDICTION MODELS FOR CONCURRENCY CONTROL TYPES

      
Application Number US2015061651
Publication Number 2017/086983
Status In Force
Filing Date 2015-11-19
Publication Date 2017-05-26
Owner ENTIT SOFTWARE LLC (USA)
Inventor Spiegel, Ofer

Abstract

Examples disclosed herein relate to prediction models for concurrency control types. Some of the examples enable generating a prediction model based on training data. The training data may comprise a set of access data associated with a data object. The set of access data may comprise: values for a set of attributes of the data object, and an indication whether a conflict occurred during processing of a request to access the data object.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

78.

SEGMENTS OF DATA ENTRIES

      
Application Number US2015061998
Publication Number 2017/087003
Status In Force
Filing Date 2015-11-20
Publication Date 2017-05-26
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Keshet, Renato
  • Maor, Alina
  • Maurer, Ron
  • Maydanik, Alexander
  • Vexler, Reuth
  • Shain, Olga

Abstract

Examples disclosed herein relate, among other things, to a method. The method may obtain a plurality of data entries stored in a memory, each data entry comprising a plurality of attribute values of a plurality of attributes; determine a set of segments, each segment being defined by a set of attribute values of a set of attributes; for each segment, determine a set of sub-segments, each sub-segment being defined by at least one additional attribute value of at least one additional attribute not in the set of attributes associated with the segment; for each sub-segment of each segment, compute a significance value associated with a change in the sub-segment's share within the segment; and determine a set of selected sub-segments and segments based on the significance value computed for each sub-segment of each segment.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

79.

PRIVACY RISK ASSESSMENTS

      
Application Number US2015061016
Publication Number 2017/086926
Status In Force
Filing Date 2015-11-17
Publication Date 2017-05-26
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Bar Joseph, Gabi
  • Toledano, Yaniv
  • Gershoni, Tomer

Abstract

Example implementations relate to privacy risk assessments. Some implementations may include a privacy risk identification engine to automatically identify privacy risks in an application based on an analysis of application code. Additionally, some implementations may include a privacy risk identification engine to obtain privacy risk information related to each of the privacy risks. Moreover, some implementations may include a privacy risk assessment engine to assess a severity of each of the privacy risks based on an analysis of the privacy risk information. In some examples, the analysis may include a determination of, for each of the privacy risks, a risk impact and a risk likelihood.

IPC Classes  ?

80.

AUTOMATED MULTI-CREDENTIAL ASSESSMENT

      
Application Number US2015060568
Publication Number 2017/082920
Status In Force
Filing Date 2015-11-13
Publication Date 2017-05-18
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Sullivan, Gerald
  • Muthurajan, Sasi Siddharth
  • Kejriwal, Nidhi Govindram
  • Brooks, Jeremy

Abstract

Examples relate to automated multi-credential assessment in a system. One example enables auditing an application by sending a first request for an action to be performed in the application, the first request based on a first privilege level, where the first privilege level corresponds with a first level of access to the application, and sending a second request for the action to be performed in the application, where the second request based on a second privilege level different from the first privilege level. The second privilege level may corresponds with a second level of access to the application different from the first level of access. The first request and second request may be performed, and the results of the performed first request and second request may be combined. The combined results may be made available.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/44 - Arrangements for executing specific programs

81.

DETECTING VULNERABILITIES IN A WEB APPLICATION

      
Application Number US2015060573
Publication Number 2017/082921
Status In Force
Filing Date 2015-11-13
Publication Date 2017-05-18
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Brooks, Jeremy
  • Muthurajan, Sasi Siddharth
  • Kejriwal, Nidhi Govindram

Abstract

Examples relate to detecting vulnerabilities in a web application. One example enables identifying a set of inputs in a web application input form. The set of inputs may be categorized based on a set of predetermined conditions. The set of inputs may be scored based on the categorization. A subset of the set of inputs may be determined to be a set of parameters of interest for the web application based on the scored set of inputs.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

82.

CLASSIFICATION MODELS FOR BINARY CODE DATA

      
Application Number US2015060333
Publication Number 2017/082906
Status In Force
Filing Date 2015-11-12
Publication Date 2017-05-18
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Bezalel, Amit
  • Wigelman, Amir
  • Gelfand, Roman

Abstract

Examples disclosed herein relate to classification models for binary code data. Some of the examples enable obtaining changed binary code data and unchanged binary code data, and generating, using a machine-learning algorithm, a classification model based on training data that comprises the changed binary code data and the unchanged binary code data.

IPC Classes  ?

  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass

83.

DIRECT CONNECTION LIMITATION BASED ON A PERIOD OF TIME

      
Application Number US2015058987
Publication Number 2017/078696
Status In Force
Filing Date 2015-11-04
Publication Date 2017-05-11
Owner ENTIT SOFTWARE LLC (USA)
Inventor Wang, Xiaoyi

Abstract

Examples herein disclose a facilitation of a direct connection between a source and a destination. In response to a request from the source to facilitate the direct connection, the examples identify the destination among multiple destinations based on available bandwidth from the multiple destinations. The examples transmit a security token to the identified destination for authentication of traffic from the source, wherein the source includes an indication of a period of time. Based on the indication of the period of time, the examples limit the direct connection.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links

84.

PROCESSING DATA BETWEEN DATA STORES

      
Application Number US2015059120
Publication Number 2017/078710
Status In Force
Filing Date 2015-11-04
Publication Date 2017-05-11
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Kalinin, Alexander
  • Simitsis, Alkis
  • Wilkinson, Kevin
  • Das, Mahashweta

Abstract

A non-transitory computer readable medium can store machine readable instructions that when accessed and executed by a processing resource cause a computing device to perform operations. The operations can include establishing a connection between data stores (such as a relational data store and a graph engine), wherein the connection includes a shared memory buffer storing data in a data format according to internal structures of the graph engine. The connection between the data stores is bi-directional. The connection enables data that is stored in the shared memory to be processed by either of the graph engine and the relational database. Upon receiving a query, the graph engine or the relational database can be selected to process the data based on a query. The data can be processed by the selected one of the graph engine or the relational database.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

85.

PASSWORD MODIFICATIONS

      
Application Number US2015058789
Publication Number 2017/078682
Status In Force
Filing Date 2015-11-03
Publication Date 2017-05-11
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Mordechai, Eli
  • Cohen, Karen

Abstract

Example implementations relate to determining password modifications. Some implementations may include a password confirmation engine to identify an incorrect password entered during a current user authentication session. Additionally, some implementations may include a password comparison engine to determine whether the incorrect password is the same as a number of historical incorrect passwords. For example, each of the number of historical incorrect passwords may occur during a particular historical user authentication session of a plurality of historical user authentication sessions, and may be followed by an original correct password entered during the particular historical user authentication session. Additionally, some implementations may include a password modification engine to modify the original correct password to the incorrect password if the incorrect passwords as the same as each of the number of historical incorrect passwords.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution

86.

DYNAMIC SCHEMA TYPING

      
Application Number US2015059055
Publication Number 2017/078704
Status In Force
Filing Date 2015-11-04
Publication Date 2017-05-11
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Chen, Qiming
  • Liu, Rui
  • Hsu, Meichun

Abstract

In one example in accordance with the present disclosure, a method for dynamic schema typing may include receiving a host query with a function defining data to be retrieved. The function may include a dynamically definable schema. The method may also include receiving, at function invocation time, a data type schema defining a type of the data to be retrieved and generating a query using the data type schema as a value for the dynamically definable schema. The method may also include retrieving the data, converting the retrieved data into a form defined by the data type schema and providing the transformed data to the host query.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

87.

MODELS BASED ON DATA AUGMENTED WITH CONCEIVABLE TRANSITIONS

      
Application Number US2015058109
Publication Number 2017/074398
Status In Force
Filing Date 2015-10-29
Publication Date 2017-05-04
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Lakshminarayan, Choudur
  • Kosuru, Ram

Abstract

According to an example, a model is selected from models including an augmented buyer model based on probabilities of conceivable transitions, and each conceivable transition includes a multi-step transition between a first URL and a second URL via at least one intermediate URL of the website. A user is determined to likely be a buyer or a non-buyer based on interaction data and the selected model. The user is presented with an offer that encourages the user to buy from the website upon the determination that the user is a buyer.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

88.

DETERMINING DISTANCES BETWEEN REAL-WORLD ENTITIES MODELED AS GEOMETRIC SHAPES

      
Application Number US2015058279
Publication Number 2017/074418
Status In Force
Filing Date 2015-10-30
Publication Date 2017-05-04
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Cary-Huanca, Ariel
  • Ni, Jingjie

Abstract

Distances between geographic real-world entities modeled as geometric shapes are measured. At least two shapes are positioned in a coordinate space based on their respective sets of points. A non-empty quadrant set from a plurality of non-empty quadrant sets formed of non-empty quadrants in the coordinate space is identified such that the non-empty quadrants of the identified quadrant set associated with each of the at least two shapes satisfy a predetermined condition and a distance between portions of the at least two shapes in the non-empty quadrants of the identified non-empty quadrant set is an optimal value for the requested distance. The distance between the portions of the shapes in the identified quadrant set is determined to be the requested distance.

IPC Classes  ?

  • G06T 17/20 - Wire-frame description, e.g. polygonalisation or tessellation
  • G06T 17/05 - Geographic models

89.

INFORMATION TECHNOLOGY ANALYTICS

      
Application Number US2015058391
Publication Number 2017/074438
Status In Force
Filing Date 2015-10-30
Publication Date 2017-05-04
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Prymak, Cameron Michael
  • Pancu, Andrei

Abstract

Disclosed are techniques for analyzing Information Technology (IT) trends. An example computing device includes a memory to store computer-readable instructions and a processor to execute the computer-readable instructions. The computer-readable instructions include a data collector to collect component usage data corresponding to a plurality of Information Technology (IT) components coupled to networks of a plurality of organizations, wherein the plurality of IT components comprise different types of IT components. The computer-readable instructions include an IT analytics module to analyze the component usage data to generate aggregated usage data corresponding to at least one of the different types of IT components and the plurality of organizations. The computer-readable instructions include a report generator to generate a report that includes at least a portion of the aggregated usage data and send the report to the user.

IPC Classes  ?

  • G06F 17/40 - Data acquisition and logging
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

90.

FUZZY LOGIC BASED RESENDING ORDER OF NOT SUCCESSFULLY PROCESSED REQUESTS

      
Application Number EP2015075303
Publication Number 2017/071775
Status In Force
Filing Date 2015-10-30
Publication Date 2017-05-04
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Ivanov, Plamen Valentinov
  • Lozanov, Lozan

Abstract

Provided is a process in which a plurality of requests is sent from an interface of a first device to an interface of a second device. If it is determined that at least some of the plurality of requests have not successfully been processed by the second device, an order of at least some of the not successfully processed requests is determined for resending, wherein the order is based on a fuzzy logic implementation.

IPC Classes  ?

  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G06N 7/02 - Computing arrangements based on specific mathematical models using fuzzy logic

91.

USER INTERACTION LOGIC CLASSIFICATION

      
Application Number US2015058137
Publication Number 2017/074401
Status In Force
Filing Date 2015-10-29
Publication Date 2017-05-04
Owner ENTIT SOFTWARE LLC (USA)
Inventor Byrd, Christopher

Abstract

Back end calls triggered by a user interaction with a client user interface may be identified. The user interaction may be correlated with a logic flow, and the logic flow may be associated with the back end calls. A supervised learning model may be trained using a labeled data set comprising the back end calls and their associated logic flow. Rules may be derived from the supervised learning model for classifying other back end calls. The rules may be outputted to a classifier that utilizes the rules to associate the other back end calls with the logic flow.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/30 - Monitoring
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

92.

USING MACHINE LEARNING REGRESSION TO ESTIMATE TIME FOR COMPLETING APPLICATION LIFECYCLE MANAGEMENT WORK ITEM

      
Application Number US2015056466
Publication Number 2017/069743
Status In Force
Filing Date 2015-10-20
Publication Date 2017-04-27
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Strachan, Shaul
  • Kour, George
  • Regev, Raz

Abstract

A technique includes extracting data from a historical data store representing completed work items and associated features of the work items. The work items are associated with a lifecycle stage of an application. The technique includes training a regression model to estimate a time for completing a given work item based at least in part on the features.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

93.

COMPARING SCRIPTS

      
Application Number US2015054663
Publication Number 2017/062008
Status In Force
Filing Date 2015-10-08
Publication Date 2017-04-13
Owner ENTIT SOFTWARE LLC (USA)
Inventor Gorenshtein, Gennady

Abstract

Results of a replay of multiple scripts are received, each script of the multiple scripts including information relating to activities between at least one client device and at least one server device over a network. The results are compared, and based on the comparing, a difference between the scripts is identified.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/44 - Arrangements for executing specific programs

94.

GENERATING COHORTS USING AUTOMATED WEIGHTING AND MULTI-LEVEL RANKING

      
Application Number US2015054866
Publication Number 2017/062026
Status In Force
Filing Date 2015-10-09
Publication Date 2017-04-13
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Hao, Ming C.
  • Chang, Nelson L.
  • Scaggs, Justin Aaron
  • Hamborg, Felix
  • Keim, Daniel

Abstract

Automated weighting is performed that includes transforming a behavior of each respective dimension of multiple dimensions of a selected group of events to a respective weight, the respective weight determined based on a distribution of values of the respective dimension, and where the weight determined for a first of the plurality of dimensions is greater than the weight determined for a second of the plurality of dimensions. Similarity values are computed indicating similarities between further events and the selected group of events, the similarity values based on a combination of the weights and distances between the further events and the selected group of events. Cohorts of the further events are generated by performing multi-level ranking that comprises ranking groups of the further events based on the similarity values, and applying merging to the groups to produce merged groups. The cohorts are visualized in a graphical visualization.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

95.

PERFORMANCE TRACKING IN A SECURITY INFORMATION SHARING PLATFORM

      
Application Number US2015054961
Publication Number 2017/062037
Status In Force
Filing Date 2015-10-09
Publication Date 2017-04-13
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Hailpern, Joshua
  • Sander, Tomas

Abstract

Example implementations relate to performance tracking in a security information sharing platform. For example, the security information sharing platform may enable sharing of security information among a plurality of users. A method of performance tracking in the security information sharing platform may include monitoring user behavior in the security information sharing platform, comparing the user behavior against a plurality of performance objectives in the security information sharing platform, and assigning a badge to a user among the plurality of users, for achievement of a performance objective among the plurality of performance objectives, based on the comparison.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/60 - Protecting data

96.

PRIVACY PRESERVATION

      
Application Number US2015054989
Publication Number 2017/062038
Status In Force
Filing Date 2015-10-09
Publication Date 2017-04-13
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Hailpern, Joshua
  • Sander, Tomas

Abstract

Examples of implementations relate to privacy preservation in a security information sharing platform. For example, a system of privacy preservation comprises a physical processor that executes machine-readable instructions that cause the system to compare, in a security information sharing platform that enables sharing of security information among a plurality of users, a set of profiles wherein each profile is associated with an individual user; identify, based on the comparison, a profile element of a particular profile that is predictive of an identity of a user associated with the particular profile; and provide information about the profile element to the user of the particular profile.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

97.

THREAT SCORE DETERMINATION

      
Application Number US2015052650
Publication Number 2017/058142
Status In Force
Filing Date 2015-09-28
Publication Date 2017-04-06
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Sander, Tomas
  • Hein, Brian, Frederik, Hosea, Che
  • Cohen, Nadav
  • Ross, Ted

Abstract

In one example in accordance with the present disclosure, a method for threat score determination includes detecting a change in malicious activity for a security object. The method also includes identifying an indicator that provides contextual information for the security object and determining a linked resource that is associated with a database record of the security object. The method also includes determining a first threat score associated with the security object and determining a relationship between the linked resource and the security object. The method also includes determining a second threat score associated with the linked resource based on the indicator, the threat score of the linked object and the relationship between the linked resource and the security object.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 17/30 - Information retrieval; Database structures therefor

98.

GEO-POSITIONING INFORMATION INDEXING

      
Application Number US2015053830
Publication Number 2017/058260
Status In Force
Filing Date 2015-10-02
Publication Date 2017-04-06
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Ni, Jingjie
  • Cary-Huanca, Ariel
  • Xu, Vincent

Abstract

According to an example, an index for three-dimensional geographic data stores information regarding a set of spherical polygons. The index includes position information of the vertices and edges of the set of spherical polygons in a coordinate system. At least a subset of the edges of the set of spherical polygons are represented as arcs within the index. Geo-positioning information can be determined based on the index.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06T 17/20 - Wire-frame description, e.g. polygonalisation or tessellation

99.

QUERIES BASED ON RANGES OF HASH VALUES

      
Application Number US2015052277
Publication Number 2017/052600
Status In Force
Filing Date 2015-09-25
Publication Date 2017-03-30
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Liu, Rui
  • Chen, Qiming
  • Lefevre, Jeff
  • Castellanos, Malu G.
  • Hsu, Meichun

Abstract

A system includes a database client, and a distributed database comprising database nodes. The distributed database may receive a database query from the client, determine that the query comprises a range of hash values of a table partition stored by a node of the distributed database, and determine that the range of hash values is not stored by other nodes of the distributed database. Responsive to determining that the range of hash values of the query is stored by the node and not by the other nodes, the database may generate an optimized distributed execution plan that includes the node that stores the range of hash values and excludes the nodes that do not include the range of hash values.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

100.

GRAPH DATABASE QUERY CLASSIFICATION

      
Application Number US2015051746
Publication Number 2017/052539
Status In Force
Filing Date 2015-09-23
Publication Date 2017-03-30
Owner ENTIT SOFTWARE LLC (USA)
Inventor
  • Das, Mahashweta
  • Simitsis, Alkis
  • Wilkinson, William K.

Abstract

Examples for graph database query classification include receiving a graph query and determining if the graph query matches benchmark data. In the event that the graph query does not match benchmark data, the query may be parsed, a canonical internal representation of the query may be determined, the representation may be mapped to a rule, and the query may be classified based on the rule. In the event that the confidence score for the query classification does not exceed a threshold, the query may be sent to a synthetic graph or synopsis for simulation. In some examples, the simulation may include selecting computationally expensive graph operators in the query for simulation.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  1     2     3        Next Page