Images List Premium Download Classic

Detection Engine

Detection Engine-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Network service chain construction
October 19, 2017 - N°20170302470

Example implementations relate to construction of a network service chain. For example, a system for construction of a network service chain can include a detection engine to detect a portion of a first network policy directing a subset of packets to a first service and a portion of a second network policy directing the subset of packets to a second ...
Network policy conflict detection and resolution
Hewlett Packard Enterprise Development Lp
October 05, 2017 - N°20170288952

Example implementations relate to network policy conflict detection and resolution. For example, a system for network policy conflict detection and resolution can include a policy compilation engine to compile a plurality of network policies based on an intent format, a conflict detection engine to detect a conflict between a first network policy among the plurality of network policies and a ...
Displaying an object indicator
Hewlett-packard Development Company, L.p.
August 31, 2017 - N°20170249054

Examples disclosed herein describe, among other things, a computing system. The computing system may in some examples include a touch-sensitive surface, a display, and at least one camera to capture an image representing an object disposed between the camera and the touch-sensitive surface. The computing system may also include a detection engine to determine, based at least on the image, ...
Detection Engine Patent Pack
Download + patent application PDFs
Detection Engine Patent Applications
Download + Detection Engine-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Detection Engine-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Waking network access devices based on requests for association
Aruba Networks, Inc.
August 03, 2017 - N°20170223518

In one example in accordance with the present disclosure a network access device is described. The network access device includes a radio with a transmitter and receiver to transmit and receive network signals. The device also includes a detection engine to detect a request for association with the network access device. The device further includes a wake-up engine to selectively ...
Classifying an email as malicious
Acalvio Technologies, Inc.
August 03, 2017 - N°20170223034

Provided are systems, methods, and computer-program products for classifying an email as malicious. In some implementations, a malicious detection engine may configure a decoy email address. The decoy email address may include a username that is associated with the malicious email detection engine. Email directed to the decoy email address may be received by the malicious email detection engine. The ...
Identifying logic problems in text using a statistical approach and natural language processing
International Business Machines Corporation
August 03, 2017 - N°20170220554

A mechanism is provided in a data processing system for identifying a logic problem to be solved in an input text. A parser executing in the data processing system parses the input text to identify entities in the input text. A statistical analysis component executing in the data processing system determines statistical relationships between pairs of entities in the input ...
Detection Engine Patent Pack
Download + patent application PDFs
Detection Engine Patent Applications
Download + Detection Engine-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Detection Engine-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Image system with eye protection
Pixart Imaging Inc.
December 22, 2016 - N°20160373645

An image system including a display device, an image sensor, a face detection engine, an eye detection engine and an eye protection engine is provided. The image sensor captures an image. The face detection engine recognizes a user face in the image. The eye detection engine recognizes user eyes in the image. The eye protection engine turns off the display ...
Abusive traffic detection
Microsoft Technology Licensing, Llc.
December 15, 2016 - N°20160366168

Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a pre-processing module for aggregating a data set for processing and analysis; a suspiciousness test module for identifying suspicious content owners and suspicious users; a graphing module for finding connections between suspicious content owners and suspicious ...
Managing enterprise data movement using a heuristic data movement detection engine
Bank Of America Corporation
November 17, 2016 - N°20160335569

Methods, systems, and computer-readable media for managing enterprise data movement using a heuristic data movement detection engine are presented. In some embodiments, a computer system may receive one or more data packets associated with a movement of enterprise data intercepted by a filtering engine. Subsequently, the computer system may evaluate the one or more data packets associated with the movement ...
Safe code for signature updates in an intrusion prevention system
Microsoft Technology Licensing, Llc
October 27, 2016 - N°20160315957

Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection engine detect that signature. A signature to detect is compiled into executable logic that is executed to communicate with an engine that evaluates network traffic. The signature logic provides an expression set (such as group of regular ...
Malware detection based on training using automatic feature pruning with anomaly detection of execution graphs
Threattrack Security, Inc.
September 22, 2016 - N°20160277423

A threat detection system for detecting malware can automatically decide, without manual expert-level interaction, the best set of features on which to train a classifier, which can result in the automatic creation of a signature-less malware detection engine. The system can use a combination of execution graphs, anomaly detection and automatic feature pruning. Execution graphs can provide a much richer ...
Voice recognition method, voice recognition device, and electronic device
Huawei Technologies Co., Ltd.
September 01, 2016 - N°20160253995

A voice recognition method, a voice recognition device, and an electronic device. In this method, first determining is performed by using a sample environment corresponding to a detection voice and a previous environment type, so as to output a corresponding voice correction instruction to a voice engine; then, a to-be-recognized voice is input to the voice engine and a noise ...
Systems and methods for detecting anomalies
Paypal, Inc
August 18, 2016 - N°20160239368

Apparatus and method for detecting anomalies in a computer system are disclosed herein. In some embodiments, multiple probes are executed on an evolving data set. Each probe may return a result. Property values are then derived from a respective result returned by a corresponding probe. Surprise scores corresponding to the property values are generated, where each surprise score is generated ...
Detection Engine Patent Pack
Download + patent application PDFs
Detection Engine Patent Applications
Download + Detection Engine-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Detection Engine-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Security log mining devices, methods, and systems
Honeywell International Inc.
May 26, 2016 - N°20160149941

Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control system, features of structured and non-structured data associated with system access events for a number of users into a combined data set, generating, using an anomaly detection engine of the access control system, a model of ...
System and method for enhancing user accessibility in a virtual universe
International Business Machines Corporation
May 26, 2016 - N°20160147431

A system and method to enhance user accessibility in a virtual universe and, in particular, to enhance user accessibility by providing information and/or actions to users participating in the virtual universe. The system comprises an assignment engine configured to assign an accessibility unit to an item within a virtual universe and a detection engine configured to detect a triggering ...
User action duration
Hewlett-packard Development Company, L.p.
May 05, 2016 - N°20160124622

In one implementation, a system for user action duration includes a monitor engine to monitor a number of async operations to be loaded on a user interface, a detection engine to determine a repeating async operation from the number of async operations that has a pattern of repeating timeouts, a removal engine to remove the repeating async operation from the ...
System to dispatch video decoding to dedicated hardware resources
Genetec Inc.
April 28, 2016 - N°20160119626

A system to perform processing operations of input (video) streams, including is disclosed. The system consists of an input module, a stream type detection engine, a plurality of processing resources a resource monitoring engine, an attribution module, a dispatching module, and various other optional interface modules.
System to dispatch video decoding to dedicated hardware resources
Genetec Inc.
April 28, 2016 - N°20160119572

A system to perform processing operations of input (video) streams, including is disclosed. The system consists of an input module, a stream type detection engine, a plurality of processing resources a resource monitoring engine, an attribution module, a dispatching module, and various other optional interface modules.
System and method for real time detection and prevention of segregation of duties violations in ...
Onapsis, Inc.
April 28, 2016 - N°20160119380

A system is configured for real time detection and prevention of segregation of duties violations in business-critical applications. The system includes a software application monitor, a segregation of duties (sod) conflict detection engine, a processor and a memory. The software application monitor configured to monitor an action executed by a user in the software application in real-time. The sod conflict ...
Systems and methods for computerized fraud detection using machine learning and network analysis
Insurance Services Office, Inc.
April 28, 2016 - N°20160117778

Systems and methods for computerized fraud detection using machine learning and network analysis are provided. The system includes a fraud detection computer system that executes a machine learning, network detection engine/module for detecting and visualizing insurance fraud using network analysis techniques. The system electronically obtains raw insurance claims data from a data source such as an insurance claims database, ...
Cross-view malware detection
Mcafee, Inc.
March 31, 2016 - N°20160094570

In an example, a cross-view detection engine is disclosed for detecting malware behavior. Malware may attempt to avoid detection by remaining in volatile memory for as long as possible, and writing to disk only when necessary. To avoid detection, the malware may also provide a pseudo-driver at a file system level that performs legitimate-looking dummy operations. A firmware-level driver may ...
Loading