Systems and methods are provided herein for including supplemental content with segments based on the complexity of the segment. This may be accomplished by a system receiving complexity information related to a media asset and user information related to a viewer to determine if one or more segments of the media asset is complex for the user. If the system receives a trick play command, from the user, during a segment categorized as complex, the system can use the complexity information and user information to generate supplemental content, facilitating better user understanding of the complex segment.
G06V 20/40 - ScenesScene-specific elements in video content
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/4725 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content for requesting additional data associated with the content using interactive regions of the image, e.g. hot spots
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
A system and method for the detection and mitigation of Kerberos golden ticket, silver ticket, and related identity-based cyberattacks by passively monitoring and analyzing Kerberos and authentication operations within the network. The system and method provide real-time detections of identity attacks using time-series data and data pipelines, and by transforming the stateless Kerberos protocol into stateful protocol. A packet capturing agent is deployed on the network where captured time-series Kerberos and related event and log information is processed in distributed computational graph (DCG) stages where declarative rules determine if an attack is being carried out and what type of attack it is.
A system and method for the secure and private demonstration of cloud-based cyber-security tools. Using an advanced sandboxing design patterns, isolated instances of virtual networks allow a potential client to compare their existing cyber defense tools against a set of cloud-based tools. Capitalizing on non-persistent and secure sandboxes allow the invention to demonstrate felly functional and devastating cyber-attacks while guaranteeing strict privacy and security to both. existing customers and potential ones. Additionally, instantiating separate sandboxed observed systems in a single multi-tenant infrastructure provide each customer with the ability to rapidly create actual representations of their enterprise environment offering the most realistic and. accurate demonstration and comparison between products.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
4.
PRIVILEGE ASSURANCE OF ENTERPRISE COMPUTER NETWORK ENVIRONMENTS
A system and method for the prevention, mitigation, and detection of cyberattack attacks on computer networks by identifying weaknesses in directory access object allowances and providing professionals with centralized graph-centric tools to maintain and observe key security and performance insights into their security posture. The system uses an interrogation agent to collect Active Directory configuration parameters and activity information about a forest and the devices operating within. Cyber-physical graphs and histograms using persisted time-series data provides critical information, patterns, and alerts about configurations, attack vectors, and vulnerabilities which enable information technology and cybersecurity professionals greater leverage and control over their infrastructure.
A system and method for event-based modeling and model refinement, for natural catastrophe related risks, including but not limited to fires, floods, earthquakes, and hurricanes/tornados. The system and method feature simultaneous simulation of a plurality of industry models using a variety of risk information, including but not limited to real-time data, recent and historical event data, hypothetical data, and crowd-sourced data. Tire system and method use a variety of data sources in conjunction with machine learning to continuously and in real-time update and tune the simulated models performance and sensitivity to provide useful risk assessment, and risk management data. Based on these model assessments, the system can produce notifications that can be made to enable automated and human actions.
A system, and method that utilizes telemetric data for the dynamic pricing of insurance premiums for arbitrary and optionally multiple perils which receives telemetric data from sensors and other sources of data, analyzes the data for changes in risk associated with a parameter of an insurance policy, and dynamically adjusts policy premiums to account for individual policy risks as well as accounting for risks within the insurer's complete portfolio.
A system and method for cybersecurity reconnaissance, analysis, and scoring that uses distributed, cloud-based computing services to provide sufficient scalability for analysis of enterprise IT networks using only publicly available characterizations. The system and method comprise an in-memory associative array which manages a queue of vulnerability search tasks through a public-facing proxy network. The public-facing proxy network has search nodes configurable to present the network to search tools in a desired manner to control certain aspects of the search to obtain the desired results. A distributed data processing engine and cloud-based storage are used to provide scalable computing power and storage. Each of the cloud-based computing services is containerized and orchestrated for management and efficient scaling purposes.
A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
9.
A SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION
A system and method for self-adjusting cybersecurity analysis and score generation, wherein a reconnaissance engine gathers data about a client's computer network from the client, from devices and systems on the client's network, and from the Internet regarding various aspects of cybersecurity. Each of these aspects is evaluated independently, weighted, and cross-referenced to generate a cybersecurity score by aggregating individual vulnerability and risk factors together to provide a comprehensive characterization of cybersecurity risk using a transparent and traceable methodology. The scoring system itself can be used as a state machine with the cybersecurity score acting as a feedback mechanism, in which a cybersecurity score can be set at a level appropriate for a given organization, and data from clients or groups of clients with more extensive reporting can be used to supplement data for clients or groups of clients with less extensive reporting to enhance cybersecurity analysis and scoring.
A system and method for generating comprehensive security profiles and ratings for organizations that takes into account the organization's infrastructure and operations in generating the profile, and the context and purpose of the rating to be generated related to the profile. The system and method may further comprise gathering data about the totality of the organization's infrastructure and operations, generating a cybersecurity profile using active and passive internal and external reconnaissance of the organization to determine cybersecurity vulnerabilities and potential impacts to the business in light of the information gathered about the organization's infrastructure and operations, and generating cybersecurity scores and ratings that take into account all of the above information, plus the context and purpose of the score or rating to be generated based on the cybersecurity profile.
A system and method for crowd-sourced refinement of natural phenomenon for risk management and contract validation, comprising at least a heterogeneous mixture of sensors and data-gathering techniques, a sensor fusion suite, and a business operating system, which ingests, transforms if necessary, and analyzes received data and develops and applies models of prediction of consequences of the sensor data and future events based on such data for purposes such as insurance liability and risk assessment, emergency services planning, and financial market predictions, and comparing historical models and data with current data and models to attempt to refine and utilize a more precise predictive model for these purposes.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of on-line non-downloadable cloud
computing software-as-a-service for cybersecurity monitoring
and control of network activities on a computer, antivirus
scanning, computer virus characterization, remediation, and
elimination, malware incident forensics incident
remediation, insurance risk quantification and mitigation,
real-time financial analysis for quantitative trading, and
real-time market monitoring and market event identification
for quantitative trading.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software-as-a-service (SAAS) services featuring software for
business analytics, operational risk quantification,
mitigation, and management for business optimization,
large-scale graph-based database management, cybersecurity
monitoring and control of network activities on a computer,
antivirus scanning, computer virus characterization,
remediation, and elimination, malware incident forensics,
malware incident remediation, financial analysis, real-time
financial market monitoring, financial market event
identification, and financial analysis for quantitative
trading, insurance risk quantification and mitigation,
insurance pricing, and insurance claims management.
14.
METHOD FOR MIDSERVER FACILITATION OF LONG-HAUL TRANSPORT OF TELEMETRY FOR CLOUD-BASED SERVICES
A system and method that uses midservers located between the business enterprise computer infrastructure and the cloud-based infrastructure to collect, aggregate, analyze, transform, and securely transmit data from a multitude of computing devices and peripherals at an external network to a cloud-based service.
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing Software-As-A-Service (SAAS) services for business analytics; Providing Software-As-A-Servce (SAAS) Services for business optimization; Providing SAAS services relating to operational risk quantification, mitigation, and management for businesses; Providing SAAS services for large-scale graph-based database management; Providing SAAS services for cybersecurity monitoring and control of network activities on a computer; Providing SAAS services for antivirus scanning and computer virus characterization, remediation, and elimination; Providing SAAS services for malware incident forensics and malware incident remediation; Providing SAAS services for financial analysis, real-time financial market monitoring and financial market event identification; Providing SAAS services for financial analysis for quantitative trading, insurance risk quantification and mitigation; Providing SAAS services for insurance pricing, and insurance claims management.
16.
SYSTEM AND METHOD FOR COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATION
A system and method for complex IT process annotation and tracing, analysis, and simulation, comprising at least a generative simulation platform, optimization engine, and metric engine, which is able to simulate a variety of simulations and develop adaptive models for simulation, and can be used more specifically for IT infrastructure simulation to identify vulnerable systems and vertices in an IT infrastructure, perform load-testing and quality control tests, and determine the overall health to known attacks and interruptions as a system or network topography change and update.
A system and method for multi-model generative simulation modeling of complex adaptive systems, comprising a generative simulation platform, a multidimension time series datastore, and a directed computational graph, capable of running a multitude of simulations with complex and shifting model data, and an optimization engine which can introduce changes into a simulation to represent unforeseen or random changes and events to introduce changes and shifts in the simulation that might not otherwise occur.
A system and method to identify and prevent cybersecurity attacks on modern, highly-interconnected networks, to identify attacks before data loss occurs, using a combination of human level, device level, system level, and organizational level monitoring.