Splunk Inc.

United States of America

Back to Profile

1-100 of 1,239 for Splunk Inc. Sort by
Query
Aggregations
IP Type
        Patent 1,229
        Trademark 10
Jurisdiction
        United States 1,172
        World 57
        Canada 10
Date
New (last 4 weeks) 5
2025 April 5
2025 March 2
2025 February 5
2025 January 12
See more
IPC Class
G06F 16/2455 - Query execution 204
G06F 16/248 - Presentation of query results 176
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries 158
G06F 17/30 - Information retrieval; Database structures therefor 147
G06F 16/22 - IndexingData structures thereforStorage structures 142
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 9
09 - Scientific and electric apparatus and instruments 7
38 - Telecommunications services 4
35 - Advertising and business services 3
16 - Paper, cardboard and goods made from these materials 2
See more
Status
Pending 23
Registered / In Force 1,216
  1     2     3     ...     13        Next Page

1.

Trusted tunnel bridge

      
Application Number 18420166
Grant Number 12289295
Status In Force
Filing Date 2024-01-23
First Publication Date 2025-04-29
Grant Date 2025-04-29
Owner SPLUNK INC. (USA)
Inventor
  • Chor, Jesse
  • Emery, Michael

Abstract

Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/951 - IndexingWeb crawling techniques
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 12/46 - Interconnection of networks

2.

Automated generation of display layouts

      
Application Number 18164432
Grant Number 12282988
Status In Force
Filing Date 2023-02-03
First Publication Date 2025-04-22
Grant Date 2025-04-22
Owner SPLUNK INC. (USA)
Inventor
  • Tam, Simon
  • Yip, Everett

Abstract

A client device executes a display layout application that receives a size of each display item included in a set of display items. The set of display items is associated with a first frame included in a bounding box associated with a display screen. The display layout application determines a reference size based on the sizes of the set of display items. The display layout application determines a size of the first frame based on the reference size. The display layout application determines a position for a first display item included in the set of display items based on a position of the first frame within the bounding box. The display layout application generates a layout for display on the display screen, where the layout includes the first display item.

IPC Classes  ?

  • G06F 40/154 - Tree transformation for tree-structured or markup documents, e.g. XSLT, XSL-FO or stylesheets
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06F 40/106 - Display of layout of documentsPreviewing
  • G06T 3/20 - Linear translation of whole images or parts thereof, e.g. panning
  • G06T 3/40 - Scaling of whole images or parts thereof, e.g. expanding or contracting
  • G06T 11/60 - Editing figures and textCombining figures or text
  • G06F 40/197 - Version control

3.

Networked remote collaboration system

      
Application Number 18479688
Grant Number 12277659
Status In Force
Filing Date 2023-10-02
First Publication Date 2025-04-15
Grant Date 2025-04-15
Owner SPLUNK INC. (USA)
Inventor
  • Bhushan, Devin
  • Han, Seunghee
  • Jackson-King, Caelin Thomas
  • Kuppel, Jamie
  • Lee, Sammy
  • Sykes, Derek
  • Yazhenskikh, Stanislav
  • Zhu, Jim Jiaming

Abstract

Various implementations of the present application set forth a method comprising generating, based on first sensor data captured by a depth sensor on a mobile device, three-dimensional data representing a physical space that includes a real-world asset, generating, based on second sensor data captured by an image sensor on the mobile device, two-dimensional data representing the physical space, combining, based on a correlation the three-dimensional data and the two-dimensional data, the two-dimensional data and the three-dimensional data into an extended reality (XR) stream, where the XR stream includes a digital representation of the real-world asset, and transmitting, to a remote device, the XR stream for rendering at least a portion of the digital representation of the real-world asset in a remote XR environment.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06T 7/521 - Depth or shape recovery from laser ranging, e.g. using interferometryDepth or shape recovery from the projection of structured light
  • G06T 15/20 - Perspective computation
  • H04L 65/4053 - Arrangements for multi-party communication, e.g. for conferences without floor control
  • H04L 67/131 - Protocols for games, networked simulations or virtual reality

4.

Interactive chart using a data processing package

      
Application Number 17816337
Grant Number 12271428
Status In Force
Filing Date 2022-07-29
First Publication Date 2025-04-08
Grant Date 2025-04-08
Owner Splunk Inc. (USA)
Inventor
  • Bolognese, Christopher
  • Cannon, Finlay
  • Clein, Eli
  • Dinkar, Umesh
  • Haggie, Thomas
  • Janczer, Barbara
  • Li, Elizabeth
  • Mullen, Clark Eugene
  • Nguyen, Viet Quoc
  • Peng, Faya
  • Popa, Ioan
  • Salahi, Abid
  • Sheu, Keng-Ming
  • Thakur, Tulika
  • Lew, Justin
  • Ng, Jonathan
  • Stark, Jacob Sebastian

Abstract

A system generates a user interface that enables a user to interact with an interactive chart associated with a statement of a data processing package. Via one or more user interactions with the user interface, the system may receive one or more chart parameters for the chart. Using a statement from the data processing package and the one or more chart parameters, the system may generate an additional statement and append the generated statement to the data processing package to form an enriched data processing package. The system may communicate the enriched data processing package to a search service for execution. The system may display the results in the chart.

IPC Classes  ?

  • G06F 16/904 - BrowsingVisualisation therefor
  • G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
  • G06F 16/903 - Querying

5.

SWAPPABLE ONLINE ARTIFICIAL INTELLIGENCE ALGORITHMS IMPLEMENTED IN A DATA INTAKE AND QUERY SYSTEM

      
Application Number 18977777
Status Pending
Filing Date 2024-12-11
First Publication Date 2025-04-03
Owner Splunk Inc. (USA)
Inventor Sriharsha, Ram

Abstract

Systems and methods are described for processing ingested data, detecting anomalies in the ingested data, and providing explanations of a possible cause of the detected anomalies as the data is being ingested. For example, a token or field in the ingested data may have an anomalous value. Tokens or fields from another portion of the ingested data can be extracted and analyzed to determine whether there is any correlation between the values of the extracted tokens or fields and the anomalous token or field having an anomalous value. If a correlation is detected, this information can be surfaced to a user.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline or look ahead
  • G06F 9/54 - Interprogram communication
  • G06F 16/14 - Details of searching files based on file metadata
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/17 - Details of further file system functions
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/23 - Updating
  • G06F 16/242 - Query formulation
  • G06F 16/2453 - Query optimisation
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06F 17/16 - Matrix or vector computation
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • G06F 18/21 - Design or setup of recognition systems or techniquesExtraction of features in feature spaceBlind source separation
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06N 20/00 - Machine learning
  • G06N 20/20 - Ensemble learning

6.

Managing user data in a multitenant deployment

      
Application Number 18474760
Grant Number 12248804
Status In Force
Filing Date 2023-09-26
First Publication Date 2025-03-11
Grant Date 2025-03-11
Owner SPLUNK Inc. (USA)
Inventor
  • Ago, Ledio
  • Sun, Ronnie
  • Elting, Mathew

Abstract

A multitenant deployment includes a computing cluster that executes multiple containerized instances of a software application. Each containerized instance is associated with one or more datastores that can be assigned to different tenants. A registry store maintains a mapping between tenants and datastores, thereby allowing a registry manager to properly route tenant requests to the correct datastores. A capacity manager tracks tenant usage of datastores in the registry store and then scales computing resources for each tenant in proportion to usage. The capacity manager also migrates tenant resources in response to catastrophic failures or upgrades. In this fashion, the multitenant deployment can adapt a single-tenant software application for multi-tenancy in a manner that is both transparent and secure for the tenant.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/242 - Query formulation
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/60 - Protecting data
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

7.

Chart creation based on a data processing package

      
Application Number 17816357
Grant Number 12242495
Status In Force
Filing Date 2022-07-29
First Publication Date 2025-03-04
Grant Date 2025-03-04
Owner Splunk Inc. (USA)
Inventor
  • Bolognese, Christopher
  • Cannon, Finlay
  • Clein, Eli
  • Dinkar, Umesh
  • Haggie, Thomas
  • Janczer, Barbara
  • Li, Elizabeth
  • Mullen, Clark Eugene
  • Nguyen, Viet Quoc
  • Peng, Faya
  • Popa, Ioan
  • Salahi, Abid
  • Sheu, Keng-Ming
  • Thakur, Tulika
  • Lew, Justin
  • Ng, Jonathan
  • Stark, Jacob Sebastian

Abstract

A system generates a user interface that enables a user to generate a chart from one or more statements of a data processing package. Via one or more user interactions with the user interface, the system may receive one or more chart parameters for a chart. Using a statement from the data processing package and the one or more chart parameters, the system may generate an additional statement and append the generated statement to the data processing package to form an enriched data processing package. The system may communicate the enriched data processing package to a search service for execution. The system may display the results in an interactive chart.

IPC Classes  ?

  • G06F 16/248 - Presentation of query results
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials

8.

VISUALIZATIONS OF QUERY RESULTS USING GENERATED FILES

      
Application Number 18827113
Status Pending
Filing Date 2024-09-06
First Publication Date 2025-02-27
Owner Splunk Inc. (USA)
Inventor
  • Filippi, Nicholas J.
  • Puchbauer, Siegfried
  • Ge, Ruyuan

Abstract

Systems and methods are disclosed for generating one or more files to visualize query results. The systems and methods can include parsing one or more files that include one or more queries and computer-executable instructions for displaying results of the one or more queries. The one or more queries can identify a set of data to be processed and a manner of processing the set of data. The systems and methods can further include generating one or more files that include the results of the queries and computer-executable instructions for displaying one or more visualizations of the results.

IPC Classes  ?

  • G06F 16/248 - Presentation of query results
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/2455 - Query execution
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor

9.

Generating span related metric data streams by an analytic engine

      
Application Number 17974262
Grant Number 12222840
Status In Force
Filing Date 2022-10-26
First Publication Date 2025-02-11
Grant Date 2025-02-11
Owner SPLUNK Inc. (USA)
Inventor
  • Karis, Steven
  • Petazzoni, Maxime
  • Pound, Matthew William
  • Ross, Joseph Ari
  • Smith, Charles
  • Stewart, Scott

Abstract

A method of generating metrics data associated with a microservices-based application comprises ingesting a plurality of spans and mapping an ingested span of the plurality of spans to a span identity, wherein the span identity comprises a tuple of information identifying a type of span associated with the span identity, wherein the tuple of information comprises user-configured dimensions. The method further comprises grouping the ingested span by the span identity, wherein the ingested span is grouped with other spans from the plurality of spans comprising a same span identity. The method also comprises computing metrics associated with the span identity and using the metrics to generate a stream of metric data associated with the span identity.

IPC Classes  ?

10.

Hybrid execution of custom playbook codeblocks

      
Application Number 18630909
Grant Number 12224919
Status In Force
Filing Date 2024-04-09
First Publication Date 2025-02-11
Grant Date 2025-02-11
Owner SPLUNK Inc. (Canada)
Inventor
  • Sridhar, Chakravarthy
  • Qiu, Minjie
  • Mahadik, Atif

Abstract

Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.

IPC Classes  ?

  • H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
  • H04L 9/40 - Network security protocols
  • H04L 41/0681 - Configuration of triggering conditions
  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • H04L 12/46 - Interconnection of networks

11.

System and method for data ingestion, anomaly and root cause detection

      
Application Number 17583056
Grant Number 12216527
Status In Force
Filing Date 2022-01-24
First Publication Date 2025-02-04
Grant Date 2025-02-04
Owner Splunk Inc. (USA)
Inventor
  • Starosta, Abraham
  • Beckert, Francis
  • Sarkar, Chandrima

Abstract

A computerized method is disclosed for automated handling of data ingestion anomalies. The method features operations of detecting a data ingestion anomaly and determining a cause for the data ingestion anomaly. The causal determination may be conducted by at least (i) determining features of an anomalous data ingestion volume, (ii) training a second data model, after a first data model being used to detect the data ingestion anomaly, with data sets consistent with the determined features, (iii) applying the second data model to predict whether a data ingestion sub-volume is anomalous, (iv) obtaining system state information during ingestion of the anomalous data ingestion sub-volume, and (v) determining the cause of the anomalous data ingestion volume based on the system state information.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

12.

Interface for presenting performance data for hierarchical networked components represented in an expandable visualization of nodes

      
Application Number 17240878
Grant Number 12217075
Status In Force
Filing Date 2021-04-26
First Publication Date 2025-02-04
Grant Date 2025-02-04
Owner Splunk Inc. (USA)
Inventor
  • Bingham, Brian
  • Fletcher, Tristan

Abstract

Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles

13.

Anomaly Detection Through Clustering of Time-Series Data Subsequences and Determination of Adaptive Thresholding

      
Application Number 18222863
Status Pending
Filing Date 2023-07-17
First Publication Date 2025-01-23
Owner Splunk Inc. (USA)
Inventor
  • Bai, Houwu
  • Curtis, Kristal
  • Deaderick, William
  • Gilligan, Tanner
  • Yadav, Poonam
  • Rajyaguru, Om

Abstract

Computerized methodologies are disclosed that are directed to detecting anomalies within a time-series data set. An aspect of the anomaly detection process includes determining one or more seasonality patterns that correspond to a specific time-series data set by evaluating a set of candidate seasonality patterns (e.g., hourly, daily, weekly, day-start off-sets, etc.). The evaluation of a candidate seasonality pattern may include dividing the time-series data set into a collection of subsequences based on the particular candidate seasonality pattern. Further, the collection of subsequences may be divided into clusters and a silhouette score may be computed to measure the clustering quality of the candidate seasonality pattern. In some instances, the candidate seasonality pattern having the highest silhouette score is selected and utilized in anomaly detection process. In other instances, a plurality of seasonality patterns may be combined forming a time policy, where the time policy is utilized in anomaly detection process.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

14.

MACHINE LEARNING MODEL TRAINING DATA GENERATION FROM GENERATIVE ARTIFICIAL INTELLIGENCE AND USER FEEDBACK

      
Application Number US2024013614
Publication Number 2025/019037
Status In Force
Filing Date 2024-01-30
Publication Date 2025-01-23
Owner SPLUNK INC. (USA)
Inventor
  • Dharnidharka, Vedant
  • Riachi, Robert
  • Starosta, Abraham
  • Stojanovic, Alexander, Sasha
  • Veron Vialard, Julien, Didier Jean
  • Wang, Rong, Tan
  • Yadav, Poonam

Abstract

Implementations of this disclosure provide a machine learning model training system that receives user input being a natural language description of a search query, and packages and transmits the natural language description as a prompt to a plurality of large learning models (LLMs). The model training system also receives response from the plurality of LLMs being translations of the natural language descriptions to an executable search query and displays the translations to a user via a graphical user interface. The model training system receives user feedback via the graphical user interface that corresponds to indications as to whether each translation is correct, syntactically and/or semantically, and, in some examples, an indication of which response was preferred. The model training system also generates training data from the user input, translations generated by the plurality of LLMs, and user feedback, and subsequently, initiates training of a LLM using the training data.

IPC Classes  ?

15.

MODIFYING A QUERY FOR PROCESSING BY MULTIPLE DATA PROCESSING SYSTEMS

      
Application Number US2024038253
Publication Number 2025/019520
Status In Force
Filing Date 2024-07-16
Publication Date 2025-01-23
Owner SPLUNK INC. (USA)
Inventor
  • Davis, Brent
  • Dewitt, David, Johns
  • Feriancek, Derek
  • Jayaraman, Venkatasubramanian
  • Manivel, Vinay
  • Ogle, Christopher
  • Rao, Balaji

Abstract

A query coordinator can receive a query and identify a first portion of the query to be processed by a first data processing system and a second portion of the query to be processed by a second data processing system. The query coordinator can obtain a modified query based on identifying the first portion and the second portion of the query. The query coordinator can define a query processing scheme according to the modified query and provide the query processing scheme to the second data processing system. Based on providing the query processing scheme, the query coordinator can obtain an output of the second data processing system. The query coordinator can identify a second query based on the output and provide the second query to a component of the first data processing system.

IPC Classes  ?

  • G06F 16/2452 - Query translation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

16.

Anomaly Detection System and Method for Implementing a Data Regularity Check and Adaptive Thresholding

      
Application Number 18222870
Status Pending
Filing Date 2023-07-17
First Publication Date 2025-01-23
Owner Splunk Inc. (USA)
Inventor
  • Bai, Houwu
  • Curtis, Kristal
  • Deaderick, William
  • Gilligan, Tanner
  • Yadav, Poonam
  • Rajyaguru, Om

Abstract

Computerized methodologies are disclosed that are directed to detecting anomalies within a time-series data set. A first aspect of the anomaly detection process includes analyzing the regularity of the data points of the time-series data set and determining whether a data aggregation process is to be performed based on the regularity of the data points, which results in a time-series data set having data points occurring at regular intervals. A seasonality pattern may be determined for the time-series data set, where a silhouette score is computed to measure the quality of the fit of the seasonality pattern to the time-series data. The silhouette score may be compared to a threshold and based on the comparison, the seasonality pattern or a set of heuristics may be utilized in an anomaly detection process. When the seasonality pattern is utilized, the seasonality pattern may be utilized to generate thresholds indicating anomalous behavior.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/30 - Monitoring
  • G06F 16/23 - Updating
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

17.

EXTERNALLY DISTRIBUTED BUCKETS FOR EXECUTION OF QUERIES

      
Application Number US2024038251
Publication Number 2025/019518
Status In Force
Filing Date 2024-07-16
Publication Date 2025-01-23
Owner SPLUNK INC. (USA)
Inventor
  • Davis, Brent
  • Dewitt, David, Johns
  • Feriancek, Derek
  • Gyryk, Oleksandr
  • Jain, Ankit
  • Rao, Balaji
  • Rapp, Douglas
  • Sajja, Sai, Krishna

Abstract

A data intake and query system can manage the search of data stored at an external location relative to the data intake and query system using one or more indexers. The data intake and query system can receive data stored at the external location. The data intake and query system can process the data and generate an index using the one or more indexers. The data intake and query system can discard the data and store the index and a location identifier of the external location in one or more buckets. In response to a query, the data intake and query system can identify that at least a subset of the data is responsive to the query using the index and can obtain the at least the subset of the data from the external location using the location identifier.

IPC Classes  ?

  • G06F 16/22 - IndexingData structures thereforStorage structures

18.

ANOMALY DETECTION THROUGH CLUSTERING OF TIME-SERIES DATA SUBSEQUENCES AND DETERMINATION OF ADAPTIVE THRESHOLDING

      
Application Number US2024038419
Publication Number 2025/019611
Status In Force
Filing Date 2024-07-17
Publication Date 2025-01-23
Owner SPLUNK INC. (USA)
Inventor
  • Bai, Houwu
  • Curtis, Kristal
  • Deaderick, William
  • Gilligan, Tanner
  • Yadav, Poonam

Abstract

Computerized methodologies are disclosed that are directed to detecting anomalies within a time-series data set. An aspect of the anomaly detection process includes determining one or more seasonality patterns that correspond to a specific time-series data set by evaluating a set of candidate seasonality patterns (e.g., hourly, daily, weekly, day-start off-sets, etc.). The evaluation of a candidate seasonality pattern may include dividing the time-series data set into a collection of subsequences based on the particular candidate seasonality pattern. Further, the collection of subsequences may be divided into clusters and a silhouette score may be computed to measure the clustering quality of the candidate seasonality pattern. In some instances, the candidate seasonality pattern having the highest silhouette score is selected and utilized in anomaly detection process. In other instances, a plurality of seasonality patterns may be combined forming a time policy, where the time policy is utilized in anomaly detection process.

IPC Classes  ?

  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

19.

Techniques for visualizing browser test metrics

      
Application Number 18104212
Grant Number 12204437
Status In Force
Filing Date 2023-01-31
First Publication Date 2025-01-21
Grant Date 2025-01-21
Owner SPLUNK Inc. (USA)
Inventor
  • Bhandari, Aditya
  • Deen, Khawar
  • Hoffman, William Matthew
  • Pierson, Nicholas Owen
  • Sidhu, Seerut
  • Singh, Harnit

Abstract

Techniques, which may be embodied herein as systems, computing devices, methods, algorithms, software, code, computer readable media, or the like, are described herein for comparing a set of metrics generated during a simulated user interaction with a website to metrics generated by observing real user interactions with the website. Simulated user interactions with a website can be used to diagnose a website's performance issues, but it can be difficult to determine whether the simulated interactions reflect the experience of real users. In addition, the simulated user interactions can be challenging to contextualize because the number of observed real user interactions may significantly outnumber the simulated interactions. A graphical user interface can help with the interpretation of these website interactions by using the real user interactions to properly contextualize the simulated results.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

20.

Machine Learning Model Training Data Generation from Generative Artificial Intelligence and User Feedback

      
Application Number 18228654
Status Pending
Filing Date 2023-07-31
First Publication Date 2025-01-16
Owner Splunk Inc. (USA)
Inventor
  • Dharnidharka, Vedant
  • Riachi, Robert
  • Starosta, Abraham
  • Stojanovic, Alexander Sasha
  • Veron Vialard, Julien Didier Jean
  • Wang, Rong Tan
  • Yadav, Poonam
  • Rajyaguru, Om

Abstract

Implementations of this disclosure provide a machine learning model training system that receives user input being a natural language description of a search query, and packages and transmits the natural language description as a prompt to a plurality of large learning models (LLMs). The model training system also receives response from the plurality of LLMs being translations of the natural language descriptions to an executable search query and displays the translations to a user via a graphical user interface. The model training system receives user feedback via the graphical user interface that corresponds to indications as to whether each translation is correct, syntactically and/or semantically, and, in some examples, an indication of which response was preferred. The model training system also generates training data from the user input, translations generated by the plurality of LLMs, and user feedback, and subsequently, initiates training of a LLM using the training data.

IPC Classes  ?

  • G06F 40/40 - Processing or translation of natural language
  • G06F 16/9032 - Query formulation
  • G06F 40/211 - Syntactic parsing, e.g. based on context-free grammar [CFG] or unification grammars
  • G06F 40/30 - Semantic analysis

21.

Configuring detectors to detect anomalous behavior using statistical modeling procedures

      
Application Number 17513340
Grant Number 12197567
Status In Force
Filing Date 2021-10-28
First Publication Date 2025-01-14
Grant Date 2025-01-14
Owner SPLUNK INC. (USA)
Inventor
  • Dorsey, David
  • Hart, Michael Andrew

Abstract

A computer-implemented method of configuring an anomalous behavior detector includes updating a distribution used for modeling anomalous behavior in telemetry data with information associated with observed anomalous behavior to generate an updated distribution representative of the observed anomalous behavior where, prior to the updating, the distribution is representative of theoretical anomalous behavior. The method further includes computing a threshold for a detector operable to alert on anomalous activity using the updated distribution. The method also comprises computing a divergence between the live telemetry data monitored by the detector and the anomalous behavior modeled by the updated distribution. Responsive to a determination that the divergence is above a critical threshold, the method comprises enabling the detector to continue to monitor the live telemetry data in the application.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 18/22 - Matching criteria, e.g. proximity measures
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 3/088 - Non-supervised learning, e.g. competitive learning

22.

Systems and methods for detecting beaconing communications using machine learning techniques

      
Application Number 17573335
Grant Number 12199997
Status In Force
Filing Date 2022-01-11
First Publication Date 2025-01-14
Grant Date 2025-01-14
Owner Splunk Inc. (USA)
Inventor
  • Lin, Cui
  • Miskovic, Stanislav

Abstract

A computerized method is disclosed that includes operations of obtaining network traffic data between a source device and a destination device, applying a set of one or more security rules to a plurality of metrics of the network traffic data to obtain a subset of network traffic metrics, applying a first trained machine learning model to the subset of network traffic metrics to generate a feature vector through feature extraction of the subset of network traffic metrics, and evaluate the feature vector for a presence of beaconing and classify the subset of network traffic metrics, and responsive to the classifying of the subset of network traffic metrics, generating a flag for a system administrator. The plurality of metrics include at least one or more of packet size, packet transmission rate, or a ratio of (i) packet size for inbound packets and (ii) packet size for outbound packets.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

23.

Appending time ranges to distinct statements of a data processing package

      
Application Number 17816361
Grant Number 12197451
Status In Force
Filing Date 2022-07-29
First Publication Date 2025-01-14
Grant Date 2025-01-14
Owner Splunk Inc. (USA)
Inventor
  • Haggie, Thomas
  • Janczer, Barbara
  • Lew, Justin
  • Mullen, Clark Eugene
  • Popa, Ioan
  • Stark, Jacob Sebastian
  • Sheu, Keng-Ming

Abstract

A system generates a user interface that enables a user to modify time ranges associated with search-related statements of a data processing package. Via one or more user interactions with the user interface, the system may receive a modified time range for the statement. The modified time range may be appended to the data processing package to form an enriched data processing package. The system may communicate the enriched data processing package to a search service for execution. The system may display the results in the user interface.

IPC Classes  ?

  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/242 - Query formulation
  • G06F 16/248 - Presentation of query results

24.

External sensor integration at edge device for delivery of data to intake system

      
Application Number 18492619
Grant Number 12200064
Status In Force
Filing Date 2023-10-23
First Publication Date 2025-01-14
Grant Date 2025-01-14
Owner SPLUNK Inc. (USA)
Inventor
  • Quaresma, Rodrigo Paulo
  • Mehta, Neel
  • Shum, Warren
  • Huang, William
  • Yeung, Jonathan
  • Lee, Yi Chien
  • Mahmood, Masrur
  • Ng, Anthony
  • Aberg, Allyson
  • Shu, Qi
  • Kumari, Neha
  • Jacob, Joel

Abstract

Described herein are techniques for integrating external sensors to an edge device, such as for ingesting data into a data intake and query system. The edge device has an internal message broker for communicating with internal (e.g., preconfigured, recognized) sensors, and an external message broker for communicating with external (e.g., customer-configured, otherwise unrecognized) sensors. The external message broker provides access to customer configuration of external sensors, but is logically quarantined from the internal message broker to prevent unwanted customer access to internal configurations. The internal and external message brokers interface only via a bridging service that transforms external sensor data into data based on customer-configurable transformations. The transformed data can be handled by the edge device and/or downstream components (e.g., a data intake and query system) in the same manner as internal sensor data.

IPC Classes  ?

  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/63 - Routing a service request depending on the request content or context

25.

Machine-learning based prioritization of alert groupings

      
Application Number 18208879
Grant Number 12181956
Status In Force
Filing Date 2023-06-12
First Publication Date 2024-12-31
Grant Date 2024-12-31
Owner Splunk Inc. (USA)
Inventor
  • Curtis, Kristal
  • Deaderick, William
  • Gao, Wei J.
  • Gilligan, Tanner
  • Sarkar, Chandrima
  • Stojanovic, Aleksander
  • Thompson, Ralph Donald
  • Yadav, Poonam
  • Zhong, Sichen

Abstract

Systems and methods are disclosed that are directed to improving the prioritization, display, and viewing of system alerts through the use of machine learning techniques to group the alerts and further to prioritize the groupings. Additionally, a graphical user interface is generated that illustrates the prioritized listing of the plurality of groupings. Thus, a system administrator or other user receives an improved experience as the number of notifications provided to the system administrator are reduced due to the grouping of individual alerts into related groupings and further due to the prioritization of the groupings. Previously, or in current technology, system alerts may be automatically generated and provided immediately to a system administrator. In some instances, any advantage of detecting system errors or system monitoring provided by the alerts is negated by the vast number of alerts and provision of minimally important alerts in a manner that concealed more important alerts.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 18/21 - Design or setup of recognition systems or techniquesExtraction of features in feature spaceBlind source separation
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting

26.

Framework for managing dynamic configurations of data intake and query systems deployed in remote computing environments

      
Application Number 18104142
Grant Number 12182151
Status In Force
Filing Date 2023-01-31
First Publication Date 2024-12-31
Grant Date 2024-12-31
Owner Splunk Inc. (USA)
Inventor
  • Federschmidt, Daniel
  • Hoang, Ashley
  • Ling, Yuan
  • Pipaliya, Mayur Sanjaybhai
  • Stone, Nicolas
  • Yestrau, Carl

Abstract

Implementations of this disclosure provide for automated monitoring of configuration parameters of a primary data intake and query system instance operating within a distributed deployment environment. Further implementations provide for automatically generating instructions in response to a detected change in a configuration parameter of the primary data intake and query system instance and transmitting those instructions to one or more secondary data intake and query system instances. The instructions, upon execution by one or more processors, cause the configuration parameters of the one or more secondary data intake and query system instances to be updated in accordance with the detected change in the configuration parameter of the primary data intake and query system instance.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

27.

Systems and methods for machine-learning based alert grouping including temporal constraints

      
Application Number 17589600
Grant Number 12182169
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-12-31
Grant Date 2024-12-31
Owner Splunk Inc. (USA)
Inventor
  • Deaderick, William
  • Stanton, William
  • Vieth, Thomas Camp

Abstract

A computerized method is disclosed for grouping alerts through machine learning while implementing certain time constraints. The method includes receiving an alert to be assigned to any of a plurality of existing issues or to a newly created issue, the alert including a temporal field that includes a timestamp of an arrival time of the alert, wherein an issue is a grouping of one or more alerts, determining a subset of existing issues from the plurality of existing issues that each satisfy time constraints, wherein the time constraints correspond to (i) a time elapsed between a most recent alert of a first existing issue and a timestamp of the alert, or (ii) a maximum issue time length of the first existing issue, and deploying a trained machine learning model to assign the alert to either an existing issue of the subset of existing issues or a newly created issue.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/242 - Query formulation
  • G06N 20/00 - Machine learning

28.

Exploratory data analysis system for generation of wildcards within log templates through log clustering and analysis thereof

      
Application Number 18147639
Grant Number 12182174
Status In Force
Filing Date 2022-12-28
First Publication Date 2024-12-31
Grant Date 2024-12-31
Owner Splunk Inc. (USA)
Inventor
  • Beckert, Francis
  • Curtis, Kristal
  • Rajyaguru, Om
  • Starosta, Abraham
  • Yadav, Poonam

Abstract

A search assistant engine is described that integrates with a data intake and query system and provides an intuitive user interface to assist a user in searching and evaluating indexed event data. Additionally, the search assistant engine provides logic to intelligently provide data to the user through the user interface such as determining fields of events likely to be of interest based on determining a mutual information score for each field and determining groups of related fields based on determining a mutual information score for each field grouping. Some implementations utilize machine learning techniques in certain analyses such as when clustering events and determining an event templates for each cluster. Additionally, the search assistant engine may import terms or characters from user interaction into predetermined search query templates to generate tailored search query for the user.

IPC Classes  ?

  • G06F 16/24 - Querying
  • G06F 16/248 - Presentation of query results
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation

29.

Bi-directional query updates in a user interface

      
Application Number 18161792
Grant Number 12182110
Status In Force
Filing Date 2023-01-30
First Publication Date 2024-12-31
Grant Date 2024-12-31
Owner Splunk, Inc. (USA)
Inventor
  • Cannon, Finlay
  • Dinga, Jindrich
  • Haggie, Thomas
  • Mullen, Clark E.
  • Ng, Jonathan
  • Peters, Andrew John
  • Shtylla, Bardhi
  • Popa, Ioan
  • Janczer, Barbara
  • Stark, Jacob Sebastian

Abstract

A system is described that receives a query model of a query that includes one or more query commands. The query model includes a command model that corresponds to at least query command of the one or more query commands. The system uses the command model to generate an interactive action model summary and causes a user interface to display the query and the interactive action model summary in a query actions panel. A modification to the query in the user interface causes an update to the query actions panel and a modification to the action model summary causes an update to the at least one query command of the query.

IPC Classes  ?

30.

Display screen or portion thereof having a graphical user interface for a simplified visualization of a data security system

      
Application Number 29879934
Grant Number D1054444
Status In Force
Filing Date 2023-07-14
First Publication Date 2024-12-17
Grant Date 2024-12-17
Owner SPLUNK Inc. (USA)
Inventor
  • Hama, Tatsuya
  • Mullen, Clark E
  • Popa, Ioan
  • Vogler-Ivashchanka, Iryna

31.

Creating and searching tiered metric time series object storage

      
Application Number 18160250
Grant Number 12169498
Status In Force
Filing Date 2023-01-26
First Publication Date 2024-12-17
Grant Date 2024-12-17
Owner SPLUNK Inc. (USA)
Inventor
  • Shiramshetty, Uday Sagar
  • Eisenstat, Mitchell Grayer
  • Lin, Chowie Chunyan

Abstract

Metric time series (MTS) data objects stored within in-memory storage are marked as inactive in response to determining that no MTS data has been received for the MTS objects within a first predetermined time period. In response to determining that an MTS object has been inactive for longer than a second predetermined time period, the MTS data object is migrated from in-memory storage to on-disk storage. Queries directed to MTS objects are first run against MTS object data stored within in-memory storage, and then against MTS object data stored within on-disk storage. In this way, an amount of in-memory storage needed to store MTS objects may be minimized, while optimizing search performance.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/248 - Presentation of query results
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

32.

Interactive filter tokens in a GUI interface

      
Application Number 17816359
Grant Number 12169499
Status In Force
Filing Date 2022-07-29
First Publication Date 2024-12-17
Grant Date 2024-12-17
Owner Splunk Inc. (USA)
Inventor
  • Cannon, Finlay
  • Haggie, Thomas
  • Lew, Justin
  • Mullen, Clark Eugene
  • Ng, Jonathan
  • Peng, Faya
  • Popa, Ioan
  • Sheu, Keng-Ming
  • Stark, Jacob Sebastian
  • Mou, Yuchen

Abstract

A system generates a user interface that enables a user to generate a data summarization statement for a data processing package. Via one or more user interactions with the user interface, the system may receive one or more parameters for the summarization statement. Using the parameters, the system may generate a summarization statement for execution by a data service, an action model display object, a statement action model display object, and/or a filter token object for display in the user interface.

IPC Classes  ?

  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 16/248 - Presentation of query results
  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates

33.

Metric processing for streaming machine learning applications

      
Application Number 17476323
Grant Number 12164522
Status In Force
Filing Date 2021-09-15
First Publication Date 2024-12-10
Grant Date 2024-12-10
Owner Splunk Inc. (USA)
Inventor
  • Ma, Lin
  • Ye, Frank

Abstract

An interface and improved data intake and query system is described herein that allows users to define metrics and that aggregates metric values regardless of the level at which a metric is defined and/or the level at which metric values are available. The improved data intake and query system can initialize a sketch in response to a user providing one or more metric definitions. The initialized sketch includes one or more instances, where each instance produces an output and collects metric value(s), appends the metric value(s) to the output, and forwards the appended data to a process function downstream in a data processing pipeline. The process function separates the output and the metric value(s), sending the output further downstream in the data processing pipeline and sending the metric value(s) to a parallel process function that sits outside the data processing pipeline. The parallel process function can persist the metric value(s).

IPC Classes  ?

34.

Hyperparameter tuning for anomaly detection service implementing machine learning forecasting

      
Application Number 17978153
Grant Number 12158880
Status In Force
Filing Date 2022-10-31
First Publication Date 2024-12-03
Grant Date 2024-12-03
Owner Splunk Inc. (USA)
Inventor
  • Curtis, Kristal
  • Deaderick, William
  • Gilligan, Tanner
  • Ross, Joseph
  • Starosta, Abraham
  • Zhong, Sichen

Abstract

Implementations of this disclosure provide an anomaly detection system and methods of performing anomaly detection on a time-series dataset. The anomaly detection may include utilization of a forecasting machine learning algorithm to obtain a prediction of points of the dataset and comparing the predicted value of a point in the dataset with the actual value to determine an error value associated with that point. Additionally, the anomaly detection may include determination of a sensitivity threshold that impacts whether points within the dataset associated with certain error values are flagged as anomalies. The forecasting machine learning algorithm may implement a seasonality component determination process that accounts for seasonality or patterns in the dataset. A search query statement may be automatically generated through importing the sensitivity threshold into a predetermined search query statement that implements that forecasting machine learning algorithm.

IPC Classes  ?

  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/242 - Query formulation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

35.

Configuring automated workflows for application performance monitoring

      
Application Number 17589637
Grant Number 12141047
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-11-12
Grant Date 2024-11-12
Owner SPLUNK Inc. (USA)
Inventor
  • Danyi, Gergely
  • Garg, Sakshi
  • Petazzoni, Maxime
  • Sanjani, Sahinaz Safari
  • Williamson, Timothy Matthew Robin
  • Wohlstadter, Eric

Abstract

A method of computing real-time metrics for automated workflows includes aggregating a set of ingested spans into a set of traces. The method further includes executing a set of rules to determine a set of workflows associated with the set of traces, wherein each workflow of the set of workflows is associated with a respective trace of the set of traces, and wherein each workflow is operable to group together activity associated with a client process within a respective trace. The method also includes assigning a name to each workflow based on the rules and computing real-time metrics for each of the workflows.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

36.

Generating information technology incident risk score narratives

      
Application Number 17390290
Grant Number 12135788
Status In Force
Filing Date 2021-07-30
First Publication Date 2024-11-05
Grant Date 2024-11-05
Owner Splunk Inc. (USA)
Inventor
  • Sreekanta, Namratha
  • Padakanti, Nikesh

Abstract

Techniques are described for enabling an application to automatically generate text narratives explaining risk scores assigned to risk objects. The application uses natural language generation (NLG) techniques to enable the automatic create text narratives providing context and explanation for risk scores. The described approaches use data from a variety of data sources (e.g., risk event indexes, correlation search data, attack framework data, etc.) to create compelling and useful explanations of the risk analysis associated with identified risk objects. These automatically generated text narratives can be readily presented in any number of different interfaces without the need for complex visualizations or user effort to derive the same information. The automatically created text narratives enable users to better understand the risk analysis for particular risk objects, obtain storylines detailing risk objects' activity patterns over time, and to better analyze, triage, and mitigate IT environment risks based on such information.

IPC Classes  ?

  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/245 - Query processing
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 40/56 - Natural language generation

37.

DISASTER RECOVERY IN A CLUSTERED ENVIRONMENT USING GENERATION IDENTIFIERS

      
Application Number 18675896
Status Pending
Filing Date 2024-05-28
First Publication Date 2024-10-31
Owner SPLUNK INC. (USA)
Inventor
  • Xu, Da
  • Vasan, Sundar
  • Bhagi, Dhruva Kumar

Abstract

A method for performing disaster recovery in a clustered environment comprises identifying, at a master device, a first indexer from a set of indexers to serve as a primary indexer for responding to queries pertaining to a subset of data. The method also comprises assigning, at the master device, a generation identifier indicating that the first indexer is the primary indexer for the subset of data. Responsive to an event prompting a change in a primary indexer designation for the subset of data, the method comprises identifying, at the master device, a second indexer from the set of indexers to serve as the primary indexer for responding to queries pertaining to the subset of data. Further, the method comprises assigning, at the master device, a new generation identifier indicating that the second indexer is the primary indexer for the subset of data.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/30 - Monitoring
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

38.

WEB ANALYZER ENGINE FOR IDENTIFYING SECURITY-RELATED THREATS

      
Application Number 18162640
Status Pending
Filing Date 2023-01-31
First Publication Date 2024-10-31
Owner Splunk Inc. (USA)
Inventor
  • Burns, Bryan
  • Horn, Michael
  • Jackson, Steven Thomas
  • Metcalf, William
  • Williams, Jason
  • Wittel, Gregory Lee

Abstract

Techniques are described for providing a threat analysis platform capable of automating actions performed to analyze security-related threats affecting IT environments. Users or applications can submit objects (e.g., URLs, files, etc.) for analysis by the threat analysis platform. Once submitted, the threat analysis platform routes the objects to dedicated engines that can perform static and dynamic analysis processes to determine a likelihood that an object is associated with malicious activity such as phishing attacks, malware, or other types of security threats. The automated actions performed by the threat analysis platform can include, for example, navigating to submitted URLs and recording activity related to accessing the corresponding resource, analyzing files and documents by extracting text and metadata, extracting and emulating execution of embedded macro source code, performing optical character recognition (OCR) and other types of image analysis, submitting objects to third-party security services for analysis, among many other possible actions.

IPC Classes  ?

39.

Systems and methods for auto-deployment of a machine learning component within a pipelined search query

      
Application Number 17074407
Grant Number 12131233
Status In Force
Filing Date 2020-10-19
First Publication Date 2024-10-29
Grant Date 2024-10-29
Owner Splunk Inc. (USA)
Inventor
  • Kulkarni, Chinmay Madhav
  • Ma, Lin
  • Malekpour, Amir
  • Rajagopalan, Mohan
  • Reed, John C.
  • Sriharsha, Ram

Abstract

A method for deployment of machine-learning based operators within a query is described. For this embodiment, a sequence of operators associated with a query is identified, which includes at least a first operator and at least a second operator. The second operator is configured to perform operations, in accordance with a machine learning (ML) component, on data received as input from execution of the first operator. Schemas associated with the machine learning component is retrieved along with schemas associated with other operators within the sequence. Compatibility between at least an output schema associated with the first operator and an input schema associated with the second operator associated with the ML component is determined. Thereafter, a portion of the sequence of operators including at least the second operator and another operator of the sequence of operators successive to the second operator may be stored within a data store for subsequent use.

IPC Classes  ?

40.

GRAPHICAL USER INTERFACE FOR PRESENTATION OF NETWORK SECURITY RISK AND THREAT INFORMATION

      
Application Number 18761554
Status Pending
Filing Date 2024-07-02
First Publication Date 2024-10-24
Owner Splunk Inc. (USA)
Inventor
  • Apger, James
  • Drake, Allison Lindsey
  • Ebeling, James Irwin
  • Esoy, Orville
  • Kulkarni, Bhooshan
  • Montgomery, Marquis L.
  • Trenkner, Daniel

Abstract

A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

41.

System and method for identifying resource access faults based on webpage assessment

      
Application Number 17230138
Grant Number 12124324
Status In Force
Filing Date 2021-04-14
First Publication Date 2024-10-22
Grant Date 2024-10-22
Owner Splunk Inc. (USA)
Inventor Hoffman, William Matthew

Abstract

A method for identifying and indicating resource access faults associated with a webpage. The method includes receiving a machine-readable file that includes a plurality of instructions defining at least content and structure of a webpage. The method further comprises causing a browser to load the webpage based at least in part on the machine-readable file; determining resource utilization associated with the load of the webpage; identifying one or more resource access faults associated with the machine-readable file based at least in part on the determined resource utilization and a resource access instruction policy; for each of the one or more resource access faults, identifying an instruction of the plurality of instructions that corresponds to the particular resource access fault; and causing display of the one or more instructions.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

42.

Utilizing shared search queries for defining multiple key performance indicators

      
Application Number 18075970
Grant Number 12124441
Status In Force
Filing Date 2022-12-06
First Publication Date 2024-10-22
Grant Date 2024-10-22
Owner Splunk Inc. (USA)
Inventor
  • Tankersley, Nicholas Matthew
  • Hsiao, Fang I.
  • Ramani, Arun

Abstract

An example method of utilizing shared search queries for defining multiple key performance indicators (KPIs) comprises: receiving input specifying one or more service definitions, each service definition of the one or more service definitions specifying an entity definition for an entity providing a service of one or more services executing in an information technology (IT) environment, wherein the IT environment is monitored by the service monitoring system, wherein the service monitoring system uses first machine data of a first entity specified by a first service definition of the one or more service definitions to monitor a first KPI for a first service of the one or more services, and wherein the service monitoring system uses second machine data of a second entity specified by a second service definition of the one or more service definitions to monitor a second KPI for a second service of the one or more services; determining that the first machine data and the second machine data include common machine data; defining, based on the first machine data and the second machine data including common machine data, a shared base search query for the first KPI and the second KPI; executing the shared based search query to generated shared base search query results for the first KPI and the second KPI; and generating, using results from executing the shared base search query, a first value for the first KPI and a second value for the second KPI.

IPC Classes  ?

  • G06F 16/24 - Querying
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 11/30 - Monitoring
  • G06F 16/2452 - Query translation
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
  • G06Q 10/10 - Office automationTime management
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles

43.

DYNAMIC RESOLUTION ESTIMATION FOR A DETECTOR

      
Application Number 18666603
Status Pending
Filing Date 2024-05-16
First Publication Date 2024-10-17
Owner SPLUNK Inc. (USA)
Inventor
  • Agarwal, Nishant
  • Bai, Houwu
  • Patel, Darshan
  • Raman, Rajesh
  • Ross, Joseph Ari

Abstract

Described are systems, methods, and techniques for collecting, analyzing, processing, and storing time series data and for evaluating and dynamically estimating a resolution of one or more streams of data points and updating an output resolution. Responsive to receiving a stream of data points, a data resolution can be derived and an output resolution can be set to a first value. When a change to the data resolution is detected, the output resolution can be changed, modifying a frequency at which output data points are generated and/or transmitted. In some instances, a detector can be implemented to trigger an alert responsive to ingested data points corresponding with triggering parameters. An output resolution for the detector can be dynamically modified based on dynamically detecting a change to the data resolution of the stream of data.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

44.

MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATION

      
Application Number 18754090
Status Pending
Filing Date 2024-06-25
First Publication Date 2024-10-17
Owner Splunk Inc. (USA)
Inventor
  • Satish, Sourabh
  • Friedrichs, Oliver
  • Mahadik, Atif
  • Salinas, Govind

Abstract

Aspects described herein provide security actions based on a current state of a security threat. In one example, a computer-implemented method includes identifying a security threat within a computing environment comprising a plurality of computing assets. The method further includes obtaining state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment. The method further includes determining a current state for the security threat within the computing environment based on the state information. The method further includes obtaining enrichment information for the security threat that relates kill-state information to an identity of the security threat. The method further includes determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 47/2425 - Traffic characterised by specific attributes, e.g. priority or QoS for supporting services specification, e.g. SLA

45.

Display screen or portion thereof with a graphical user interface for a visualization of a system status

      
Application Number 29858422
Grant Number D1046913
Status In Force
Filing Date 2022-10-31
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner SPLUNK Inc. (USA)
Inventor
  • Vogler-Ivashchanka, Iryna
  • Yeh, Mei Chun
  • Hama, Tatsuya

46.

Display screen or portion thereof with a graphical user interface for a visualization of a system input status

      
Application Number 29858423
Grant Number D1046914
Status In Force
Filing Date 2022-10-31
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner SPLUNK Inc. (USA)
Inventor
  • Vogler-Ivashchanka, Iryna
  • Yeh, Mei Chun
  • Hama, Tatsuya

47.

Determination of schema compatibility between neighboring operators within a search query statement

      
Application Number 18063534
Grant Number 12118334
Status In Force
Filing Date 2022-12-08
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner Splunk Inc. (USA)
Inventor
  • Kulkarni, Chinmay Madhav
  • Ma, Lin
  • Malekpour, Amir
  • Rajagopalan, Mohan
  • Reed, John C.
  • Sriharsha, Ram

Abstract

Disclosed herein is a method that supports queries deploying operators based on multiple programming languages at least through determining schema compatibility between neighboring operators within a query. Upon receipt of a query, a sequence of operators of the query is identified, where the sequence of operators includes at least two neighboring operators including a first operator and a second operator representing a machine learning model. By determining schema compatibility between at least the first and second operators, the method either alerts a user to schema incompatibility before attempting to execute the query or determine that the schemas are compatible such that the query may be executed without the occurrence of errors due to schema incompatibility between neighboring operators. Advantageously, the method enables the integration of a machine learning model into the query while still ensuring schema compatibility.

IPC Classes  ?

48.

Live app testing within an app editor for an information technology and security operations application

      
Application Number 17588843
Grant Number 12120124
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner Splunk Inc. (USA)
Inventor
  • Davis, Jacob
  • Shahaff, Dekel
  • Roecks, Jeffrey
  • Flak, Sydney
  • Mehta, Navya
  • Forrest, Ian
  • Karimi, Sydney
  • Xue, Elton

Abstract

Techniques are described for providing a built-in “app” editor for an information technology (IT) and security operations application that enables users to create, modify, and test operation of apps under development within the editor. Some IT and security operations applications enable users to extend the applications by adding connectivity to third party technologies to run custom actions. For example, a user might create a custom app to enable an IT and security operations application to connect to an external service providing information about malicious Internet Protocol (IP) addresses, to connect to a relevant cloud provider service, or to interact with a firewall or other type of computing device used in a user's computing environment. Given the broad set of technologies that can be orchestrated by an IT and security operations application, apps broadly enable users to add custom functionality to interface with virtually any technology of interest.

IPC Classes  ?

  • G06F 8/20 - Software design
  • G06F 8/30 - Creation or generation of source code
  • G06F 8/33 - Intelligent editors
  • G06F 8/41 - Compilation
  • G06F 8/71 - Version control Configuration management
  • H04L 9/40 - Network security protocols
  • G06F 8/72 - Code refactoring
  • G06F 8/77 - Software metrics
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

49.

Display screen or portion thereof with a graphical user interface for a setup process in a data management application

      
Application Number 29858421
Grant Number D1046892
Status In Force
Filing Date 2022-10-31
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner SPLUNK Inc. (USA)
Inventor
  • Vogler-Ivashchanka, Iryna
  • Yeh, Mei Chun
  • Hama, Tatsuya

50.

Data stream integrity in a tiered blockchain structure

      
Application Number 17514738
Grant Number 12118127
Status In Force
Filing Date 2021-10-29
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner SPLUNK INC. (USA)
Inventor
  • Cordi, Christopher
  • Mckervey, Nathaniel G.
  • Puchbauer, Siegfried
  • Toulme, Antoine

Abstract

A machine data validation system can track and validate the integrity of machine data generated by machines. The system can generate hashes for the items and batch hashes that can be validated using an immutable data store, such one or more blockchains in a tiered blockchain structure. The system can store machine data and additional associated data in a first lightweight blockchain, and store grouped sets of the data in a second robust blockchain. The system can implement the tiered blockchain structure to efficiently store and reference the hashes to validate the machine data at different times or upon request from an end-user.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

51.

Managing event group definitions in service monitoring systems

      
Application Number 17339228
Grant Number 12120005
Status In Force
Filing Date 2021-06-04
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner Splunk Inc. (USA)
Inventor
  • Bettaiah, Vineetha
  • Bhide, Alok Anant
  • Lazerowitz, Ross Andrew

Abstract

Network connected devices are controlled via the transmission of action messages to prevent or correct conditions that impair the operation of the networked information technology (IT) assets. The service monitoring system (SMS) monitoring the IT environment groups together related notable events that are received during system operation. Automatic processes dynamically determine grouping operations that automatically correlate the events without requiring, for example, a set of declarative grouping rules. Event grouping may be performed on a by-service basis to facilitate the complex processing of predicting undesirable system conditions that may be prevented or reduced by transmission of the action messages to the appropriate assets. Event grouping operations may be directed with control information maintained via user interface.

IPC Classes  ?

  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
  • H04L 43/16 - Threshold monitoring
  • H04L 69/329 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

52.

EFFICIENTLY ANALYZING TRACE DATA

      
Application Number US2024013784
Publication Number 2024/210979
Status In Force
Filing Date 2024-01-31
Publication Date 2024-10-10
Owner SPLUNK INC. (USA)
Inventor
  • Devsharma, Nilayan
  • Lekas, Christopher Robert
  • Phan, Tiffany Vo
  • Rao, Anant
  • Sahni, Tanvi
  • Shiraishi, Cory James Toshio
  • Snyder, Jeremy Robert
  • Williamson, Timothy Matthew Robin
  • Wohlstadter, Eric Allen
  • Yadav, Neha
  • Ross, Joseph Ari
  • Veron Vialard, Julien Didier Jean

Abstract

Queries may be resolved against large quantities of collected data (such as traces) by dividing collected data into multiple time intervals and incrementally assigning multiple workers the query and the collected data over the multiple time intervals. For each time interval, these workers may conditionally update one or more summary data structures within the worker based on the query and the portion of collected data assigned to the worker. The summary data structures for each time interval may then be incrementally returned and merged with results from earlier time intervals to create a final merged query result.

IPC Classes  ?

  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

53.

AUTOMATED ATTACK CHAIN FOLLOWING BY A THREAT ANALYSIS PLATFORM

      
Application Number 18162649
Status Pending
Filing Date 2023-01-31
First Publication Date 2024-10-10
Owner Splunk Inc. (USA)
Inventor
  • Burns, Bryan
  • Horn, Michael
  • Jackson, Steven Thomas
  • Metcalf, William
  • Williams, Jason
  • Wittel, Gregory Lee

Abstract

Techniques are described for providing a threat analysis platform capable of automating actions performed to analyze security-related threats affecting IT environments. Users or applications can submit objects (e.g., URLs, files, etc.) for analysis by the threat analysis platform. Once submitted, the threat analysis platform routes the objects to dedicated engines that can perform static and dynamic analysis processes to determine a likelihood that an object is associated with malicious activity such as phishing attacks, malware, or other types of security threats. The automated actions performed by the threat analysis platform can include, for example, navigating to submitted URLs and recording activity related to accessing the corresponding resource, analyzing files and documents by extracting text and metadata, extracting and emulating execution of embedded macro source code, performing optical character recognition (OCR) and other types of image analysis, submitting objects to third-party security services for analysis, among many other possible actions.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

54.

Display screen or portion thereof with a graphical user interface for a visualization of data management

      
Application Number 29858420
Grant Number D1045904
Status In Force
Filing Date 2022-10-31
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner SPLUNK Inc. (USA)
Inventor
  • Vogler-Ivashchanka, Iryna
  • Yeh, Mei Chun
  • Hama, Tatsuya

55.

Display screen or portion thereof having a graphical user interface for showing a visualization of data in a data management application

      
Application Number 29882171
Grant Number D1045930
Status In Force
Filing Date 2023-01-11
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner SPLUNK Inc. (USA)
Inventor
  • Vogler-Ivashchanka, Iryna
  • Yuan, Xinran
  • Hama, Tatsuya

56.

Mesh updates in an extended reality environment

      
Application Number 18089416
Grant Number 12112434
Status In Force
Filing Date 2022-12-27
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner SPLUNK INC. (USA)
Inventor
  • Bhushan, Devin
  • Han, Seunghee
  • Jackson-King, Caelin Thomas
  • Kuppel, Jamie
  • Yazhenskikh, Stanislav
  • Zhu, Jim Jiaming

Abstract

Various implementations or examples set forth a method for scanning a three-dimensional (3D) environment. The method includes generating a 3D representation of the 3D environment that includes one or more 3D meshes. The method also includes determining at least a portion of the 3D environment that falls within a current frame captured by the image sensor. The method further includes generating one or more additional 3D meshes representing the at least a portion of the 3D environment and combining the one or more additional 3D meshes with the one or more 3D meshes into an update to the 3D representation of the 3D environment.

IPC Classes  ?

  • G06T 17/20 - Wire-frame description, e.g. polygonalisation or tessellation
  • G06F 3/14 - Digital output to display device

57.

Systems and methods for detecting associated webpages and initiating an automated deletion event

      
Application Number 17744412
Grant Number 12113856
Status In Force
Filing Date 2022-05-13
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner Splunk Inc. (USA)
Inventor
  • Ng, Jonathan
  • Haggie, Thomas

Abstract

A computerized method is disclosed that includes operations of detecting user input to a first webpage rendered within a web browser, the user input corresponds to closure of the first webpage, providing an indication of the user input corresponding to the closure of the first webpage to a web browser extension operating in accordance with the web browser, the indication includes an identifier, performing, by the web browser extension operating in accordance with the web browser, a search for the identifier within a URL of each webpage currently opened by the web browser in order to determine that a second webpage is associated with the first webpage based on inclusion of the identifier in a URL of the second webpage, and initiating, by the web browser extension, closure of the second webpage associated with the first webpage following the user input corresponding to closure of the first webpage.

IPC Classes  ?

  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • G06F 16/248 - Presentation of query results
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/954 - Navigation, e.g. using categorised browsing
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

58.

Exploratory data analysis system for automated generation of search queries using machine learning techniques to identify certain log fields and correlation thereof

      
Application Number 18147641
Grant Number 12111874
Status In Force
Filing Date 2022-12-28
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner Splunk Inc. (USA)
Inventor
  • Beckert, Francis
  • Curtis, Kristal
  • Rajyaguru, Om
  • Starosta, Abraham
  • Yadav, Poonam

Abstract

Implementations of this disclosure provide a search assistant engine that integrates with a data intake and query system and provides an intuitive user interface to assist a user in searching and evaluating indexed event data. Additionally, the search assistant engine provides logic to intelligently provide data to the user through the user interface such as determining fields of events likely to be of interest based on determining a mutual information score for each field and determining groups of related fields based on determining a mutual information score for each field grouping. Some implementations utilize machine learning techniques in certain analyses such as when clustering events and determining an event templates for each cluster. Additionally, the search assistant engine may import terms or characters from user interaction into predetermined search query templates to generate tailored search query for the user.

IPC Classes  ?

  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/248 - Presentation of query results

59.

Data visualization in an extended reality environment

      
Application Number 18313933
Grant Number 12112010
Status In Force
Filing Date 2023-05-08
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner SPLUNK INC. (USA)
Inventor
  • Chor, Jesse
  • Daly, Colin
  • Kong, Kelly
  • Wong, Glen

Abstract

A device that includes an extended reality application is employed by a user to access an extended reality environment. A selection of a first subset of dashboard panels included in a plurality of dashboard panels is received via an input device associated with the extended reality environment. Each dashboard panel included in the plurality of dashboard panels includes a visual representation of data. The first subset of dashboard panels is displayed in a foreground area of a workspace of the XR environment. A second subset of dashboard panels included in the plurality of dashboard panels is displayed in a background area of the workspace of the XR environment.

IPC Classes  ?

  • G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 9/451 - Execution arrangements for user interfaces

60.

Collaboration spaces in extended reality conference sessions

      
Application Number 17246434
Grant Number 12112435
Status In Force
Filing Date 2021-04-30
First Publication Date 2024-10-08
Grant Date 2024-10-08
Owner SPLUNK INC. (USA)
Inventor
  • Bhushan, Devin
  • Jackson-King, Caelin Thomas
  • Yazhenskikh, Stanislav
  • Zhu, Jim Jiaming

Abstract

Extended reality (XR) software application programs establish remote collaboration sessions in which a host device and one or more remote devices can interact. When initiating a remote collaboration session, an XR application in a host device determines a collaboration area. The collaboration area corresponds to a portion of a real-world environment that is shared by the host device with the one or more remote devices. In some embodiments, the collaboration area can be determined automatically and/or based on user input. The XR application causes sensors associated with the host device to scan the collaboration area. Then, the XR application transmits, to the one or more remote devices, a three-dimensional representation of the collaboration area for rendering in one or more remote XR environments.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06T 7/13 - Edge detection
  • G06T 17/20 - Wire-frame description, e.g. polygonalisation or tessellation
  • G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
  • H04L 65/1069 - Session establishment or de-establishment
  • H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
  • H04N 7/15 - Conference systems

61.

FILE ANALYSIS ENGINES FOR IDENTIFYING SECURITY-RELATED THREATS

      
Application Number 18162645
Status Pending
Filing Date 2023-01-31
First Publication Date 2024-10-03
Owner Splunk Inc. (USA)
Inventor
  • Burns, Bryan
  • Horn, Michael
  • Jackson, Steven Thomas
  • Metcalf, William
  • Williams, Jason
  • Wittel, Gregory Lee

Abstract

Techniques are described for providing a threat analysis platform capable of automating actions performed to analyze security-related threats affecting IT environments. Users or applications can submit objects (e.g., URLs, files, etc.) for analysis by the threat analysis platform. Once submitted, the threat analysis platform routes the objects to dedicated engines that can perform static and dynamic analysis processes to determine a likelihood that an object is associated with malicious activity such as phishing attacks, malware, or other types of security threats. The automated actions performed by the threat analysis platform can include, for example, navigating to submitted URLs and recording activity related to accessing the corresponding resource, analyzing files and documents by extracting text and metadata, extracting and emulating execution of embedded macro source code, performing optical character recognition (OCR) and other types of image analysis, submitting objects to third-party security services for analysis, among many other possible actions.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

62.

Tokenized HTTP event collector

      
Application Number 17225900
Grant Number 12105724
Status In Force
Filing Date 2021-04-08
First Publication Date 2024-10-01
Grant Date 2024-10-01
Owner Splunk Inc. (USA)
Inventor
  • Block, Glenn
  • Ogdin, Patrick Lane

Abstract

A data intake and query system receives raw machine via an internet protocol (IP) such as the hypertext transfer protocol (HTTP). The system has configurable global settings for the received raw machine data that determine properties such as the metadata that is associated with raw machine data. Each event is associated with a token, which is also configurable and provides settings such as metadata settings for the raw machine data. The raw machine data is stored as events based on the metadata. Electronic devices that generate raw machine data may transmit the raw machine data to the data intake and query system within HTTP messages. The HTTP messages may also include settings such as metadata for the raw machine data. The raw machine data is stored as events based on the global metadata settings, token metadata settings, and HTTP message metadata settings.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

63.

Display screen or portion thereof with a graphical user interface for an application login page

      
Application Number 29858419
Grant Number D1044856
Status In Force
Filing Date 2022-10-31
First Publication Date 2024-10-01
Grant Date 2024-10-01
Owner SPLUNK Inc. (USA)
Inventor
  • Hama, Tatsuya
  • Popa, Ioan
  • Hermanson, Melissa
  • Nguyen, Viet Quoc

64.

Live updates in a networked remote collaboration session

      
Application Number 17515321
Grant Number 12106419
Status In Force
Filing Date 2021-10-29
First Publication Date 2024-10-01
Grant Date 2024-10-01
Owner SPLUNK INC. (USA)
Inventor
  • Bhushan, Devin
  • Jackson-King, Caelin Thomas
  • Yazhenskikh, Stanislav
  • Zhu, Jim Jiaming

Abstract

Various implementations set forth a computer-implemented method for scanning a three-dimensional (3D) environment. The method includes generating, in a first time interval, a first extended reality (XR) stream based on a first set of meshes representing a 3D environment, transmitting, to a remote device, the first XR stream for rendering a 3D representation of a first portion of the 3D environment in a remote XR environment, determining that the 3D environment has changed based on a second set of meshes representing the 3D environment and generated subsequent to the first time interval, generating a second XR stream based on the second set of meshes, and transmitting, to the remote device, the second XR stream for rendering a 3D representation of at least a portion of the changed 3D environment in the remote XR environment.

IPC Classes  ?

65.

SWAPPABLE ONLINE ARTIFICIAL INTELLIGENCE ALGORITHMS IMPLEMENTED IN A DATA INTAKE AND QUERY SYSTEM

      
Application Number 18673114
Status Pending
Filing Date 2024-05-23
First Publication Date 2024-09-26
Owner Splunk Inc. (USA)
Inventor Sriharsha, Ram

Abstract

Systems and methods are described for processing ingested data, detecting anomalies in the ingested data, and providing explanations of a possible cause of the detected anomalies as the data is being ingested. For example, a token or field in the ingested data may have an anomalous value. Tokens or fields from another portion of the ingested data can be extracted and analyzed to determine whether there is any correlation between the values of the extracted tokens or fields and the anomalous token or field having an anomalous value. If a correlation is detected, this information can be surfaced to a user.

IPC Classes  ?

  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline or look ahead
  • G06F 9/54 - Interprogram communication
  • G06F 16/14 - Details of searching files based on file metadata
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/23 - Updating
  • G06F 16/242 - Query formulation
  • G06F 16/2453 - Query optimisation
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 17/16 - Matrix or vector computation
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • G06F 18/21 - Design or setup of recognition systems or techniquesExtraction of features in feature spaceBlind source separation
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06N 20/00 - Machine learning
  • G06N 20/20 - Ensemble learning

66.

Multiple modalities of data collection and analysis for real-time monitoring (RUM) in a microservices-based architecture

      
Application Number 17162607
Grant Number 12099428
Status In Force
Filing Date 2021-01-29
First Publication Date 2024-09-24
Grant Date 2024-09-24
Owner SPLUNK Inc. (USA)
Inventor
  • Agarwal, Mayank
  • Dillman, Jonathan
  • Gidwani, Rahul
  • Smith, Justin
  • Walters, Joshua

Abstract

A method of persisting and querying Real User Monitoring (RUM) data comprises grouping together spans associated with a user-interaction with a webpage or application that are ingested during a given time duration. The method also comprises generating one or more data sets each associated with an analysis modality using the grouped spans, wherein each analysis modality extracts a different level of detail from the spans. Further, the method comprises selecting, based on a first user query, a first analysis modality for generating a response to the first user query and accessing a data set that is associated with the first analysis modality. The method also comprises generating the response to the first user query using the data set associated with the first analysis modality, wherein the first user query requests information pertaining to a performance of the application in response to the user-interaction.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/30 - Monitoring
  • G06F 16/2455 - Query execution
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

67.

Retrieving data identifiers from queue for search of external data system

      
Application Number 17661528
Grant Number 12093272
Status In Force
Filing Date 2022-04-29
First Publication Date 2024-09-17
Grant Date 2024-09-17
Owner Splunk Inc. (USA)
Inventor
  • Batsakis, Alexandros
  • Halakatti, Nitilaksha Satyaveera
  • He, Ningxuan
  • Kumar Jayaraj, Prem
  • Martinez, Manuel Gregorio
  • Rao, Balaji
  • Zhang, Jianming
  • Zhang, Steve Yu

Abstract

A computing device can receive a query that identifies a set of data to be processed and determine that a portion of the set of data resides in an external data system. The query system can request data identifiers associated with data objects of the set of data from the external data system and communicate the data identifiers to a data queue. The computing device can instruct one or more search nodes to retrieve the identifiers from the data queue. The search nodes can use the data identifiers to retrieve data objects from the external data system and process the data objects according to instructions received from the computing device. The search nodes can provide results of the processing to the computing device.

IPC Classes  ?

  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

68.

Systems and methods for machine-learning based alert grouping

      
Application Number 17589833
Grant Number 12086045
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-09-10
Grant Date 2024-09-10
Owner Splunk Inc. (USA)
Inventor
  • Deaderick, William
  • Stanton, William
  • Vieth, Thomas Camp

Abstract

A computerized method is disclosed for grouping alerts through machine learning. The method including receiving an alert to be assigned to any of a plurality of existing issues or to a newly created issue, wherein an issue is a grouping of alerts, determining a temporal distance between the alert and each of the existing issues, determining either of (i) a numerical distance between the alert and each of the existing issues for a particular numerical field, or (ii) a categorical distance between the alert and each of the existing issues for a particular categorical field, determining an overall distance between the alert and each of the existing issues, and assigning the alert to either (i) an existing issue having a shortest overall distance to the alert that satisfies one or more time constraints, or (ii) the newly created issue.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/30 - Monitoring
  • G06F 16/242 - Query formulation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 18/21 - Design or setup of recognition systems or techniquesExtraction of features in feature spaceBlind source separation

69.

Submesh-based updates in an extended reality environment

      
Application Number 17515325
Grant Number 12086920
Status In Force
Filing Date 2021-10-29
First Publication Date 2024-09-10
Grant Date 2024-09-10
Owner SPLUNK INC. (USA)
Inventor
  • Bhushan, Devin
  • Jackson-King, Caelin Thomas
  • Yazhenskikh, Stanislav
  • Zhu, Jim Jiaming

Abstract

Various implementations set forth a computer-implemented method for scanning a three-dimensional (3D) environment. The method includes generating, in a first time interval, a first extended reality (XR) stream based on a first set of meshes representing a 3D environment, transmitting, to a remote device, the first XR stream for rendering a 3D representation of a first portion of the 3D environment in a remote XR environment, determining that the 3D environment has changed based on a second set of meshes representing the 3D environment and generated subsequent to the first time interval, generating a second XR stream based on the second set of meshes, and transmitting, to the remote device, the second XR stream for rendering a 3D representation of at least a portion of the changed 3D environment in the remote XR environment.

IPC Classes  ?

70.

Systems and methods for training a machine learning model to detect beaconing communications

      
Application Number 17573399
Grant Number 12088611
Status In Force
Filing Date 2022-01-11
First Publication Date 2024-09-10
Grant Date 2024-09-10
Owner Splunk Inc. (USA)
Inventor
  • Lin, Cui
  • Miskovic, Stanislav

Abstract

A computerized method is disclosed that includes operations of obtaining historical network traffic and preparing a training set of data by: applying security rules to the historical network traffic data to obtain a first filtered subset of network transmissions representing a first set of beaconing candidates that is labeled to form a first set of labeled results, applying a clustering logic to the historical network traffic data to obtain a second filtered subset of network transmissions representing a second set of beaconing candidates that is labeled to form a second set of labeled results, applying a machine learning model to the historical network traffic data to label the historical network traffic forming a third set of labeled results, wherein the first, second and third sets of labeled results are augmented to form an augmented labeled training set, and training a machine learning model using the augmented labeled training set.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06N 20/00 - Machine learning

71.

Systems and methods for machine-learning based alert grouping and providing remediation recommendations

      
Application Number 17589847
Grant Number 12079100
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-09-03
Grant Date 2024-09-03
Owner Splunk Inc. (USA)
Inventor
  • Deaderick, William
  • Stanton, William
  • Vieth, Thomas Camp

Abstract

A computerized method is disclosed for grouping alerts and providing remediation recommendation. The method includes receiving the alert to be assigned to an existing open issue or a newly created issue, wherein an issue is a grouping of one or more alerts, assigning the alert to either a first existing open issue or the newly created issue by determining a weighted sum of the distance between the feature vectors of the alert and each existing open issue, determining a weighted sum of the distance between the feature vectors of the alert and each closed issue, and generating a user interface that illustrates an assignment of the alert and at least one of (i) a closed issue having a shortest distance to the alert or (ii) recommended remediation efforts associated with the closed issue having the shortest distance to the alert.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/242 - Query formulation

72.

Systems and methods for updating a status indication in a system providing dynamic indexer discovery

      
Application Number 17978681
Grant Number 12079255
Status In Force
Filing Date 2022-11-01
First Publication Date 2024-09-03
Grant Date 2024-09-03
Owner SPLUNK INC. (USA)
Inventor
  • Patel, Vishal
  • Kerai, Jagannath
  • Alayli, Hasan

Abstract

The present invention is related to a method for providing dynamic indexer discovery. The method comprises receiving, from an index manager, a status indication associated with a plurality of indexers, wherein each of the plurality of indexers indexes events of raw machine-generated data received from a plurality of data collectors. The method further comprises determining a weight associated with each of the plurality of indexers and selecting an indexer from the plurality of indexers. Subsequently, the method comprises allocating data to the indexer in accordance with a respective weight assigned to the indexer and transmitting the allocated data to the indexer.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 16/17 - Details of further file system functions
  • G06F 16/31 - IndexingData structures thereforStorage structures

73.

Performing iterative entity discovery and instrumentation

      
Application Number 17973392
Grant Number 12072783
Status In Force
Filing Date 2022-10-25
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner SPLUNK Inc. (USA)
Inventor
  • Najaryan, Tigran
  • Chaudhari, Aunsh Bharat
  • Mclean, Morgan James
  • Pei, Yiqing

Abstract

Information retrieved from monitoring agents currently installed on instrumented entities within a system is analyzed to discover additional entities within the system that are connected to the instrumented entities. Each of these discovered entities is analyzed to determine whether a monitoring agent is able to be installed within the entity; if installation is possible, such installation is automatically performed (or a guided manual installation is implemented utilizing an interface). After a monitoring agent is installed within a discovered entity, information is retrieved from that monitoring agent and is used to discover additional entities within the system that are connected to that discovered entity. In this way, an iterative discovery of all entities within a system may be performed.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

74.

Accessibility controls for manipulating data visualizations

      
Application Number 18050016
Grant Number 12072859
Status In Force
Filing Date 2022-10-26
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner Splunk Inc. (USA)
Inventor O'Connor, Ryan

Abstract

A computer system displays a graphical user interface (GUI) that includes data visualizations corresponding to data having timestamps within a time interval. A first type of input signal is mapped to a second type of input signal. The first type of input signal is associated with an input device communicatively coupled to the computer system. The second type of input signal is configured to operate a graphical user control of the GUI. Before mapping, the first type of input signal is configured to perform a function that is different from operation of the graphical user control. After receiving an input signal of the first type, an input signal of the second type is applied to the graphical user control based on the mapping. The time interval is adjusted, and the data visualizations are updated automatically to correspond to updated data having timestamps within the adjusted time interval.

IPC Classes  ?

  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

75.

Graphical user interface for time-based data visualization

      
Application Number 17707226
Grant Number 12072907
Status In Force
Filing Date 2022-03-29
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner Splunk Inc. (USA)
Inventor
  • Haq, Nusair
  • O'Connor, Ryan
  • Puchbauer, Siegfried

Abstract

A graphical user interface (GUI) includes multiple data visualizations and an adjustable graphical user control. The data underlying the data visualizations are timestamped, and the graphical user control enables a user to select a time interval. When a time interval is selected or modified via the graphical user control, the multiple data visualizations update automatically in real time to reflect data that correspond to the currently selected time interval.

IPC Classes  ?

  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06F 3/0487 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

76.

Unhandled data protection for programmatic input/output routing to datasets with user-defined partitions

      
Application Number 18162639
Grant Number 12072913
Status In Force
Filing Date 2023-01-31
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner Splunk Inc. (USA)
Inventor
  • James, Alexander D.
  • Bhakta, Vinayak
  • Jayaraman, Venkatasubramanian
  • Jothikumar, Ganesh
  • Peters, Andrew John
  • Sutedja, Amy

Abstract

Systems and methods are described for implementing programmatic input/output (I/O) routing to datasets with user-defined partitions while providing unhandled data protection. As disclosed herein, a user may define a dataset as including one or more partitions, each partition including criteria for storing data objects written to the partitioned dataset in the individual partitions. Data objects written to the dataset can then be evaluated according to the criteria, and routed to an appropriate partition. To provide unhandled data protection, a dataset definition can include a default partition to which data objects are routed when the data object fails to satisfy the criteria of any of the set of user-defined partitions identified in the specification. Processing I/O operations according to a user-defined partitioning schema can enable data objects to be arranged according to any partitioning schema without tethering the partitioning to a particular underlying storage system.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/248 - Presentation of query results

77.

Security action verification in a computing network

      
Application Number 18177620
Grant Number 12074901
Status In Force
Filing Date 2023-03-02
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner Splunk Inc. (USA)
Inventor
  • Satish, Sourabh
  • Friedrichs, Oliver
  • Mahadik, Atif
  • Salinas, Govind

Abstract

Systems, methods, and software described herein provide for validating security actions before they are implemented in a computing network. In one example, a computing network may include a plurality of computing assets that provide a variety of different operations. During the operations of the network, administration systems may generate and provide security actions to prevent or mitigate the effect of a security threat on the network. However, prior to implementing the security actions within the network, computing assets may exchange security parameters with the administration systems to verify that the security actions are authentic.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

78.

Federated data enrichment objects

      
Application Number 17589712
Grant Number 12072939
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner Splunk Inc. (USA)
Inventor
  • Batsakis, Alexandros
  • Frenkel, Nir
  • Halakatti, Nitilaksha
  • Rao, Balaji
  • Shrigondekar, Anish
  • Zhang, Ruochen
  • Zhang, Steve Yu

Abstract

A data intake and query system can generate local data enrichment objects and receive federated data enrichment objects from another data intake and query system. In response to receiving a query, the data intake and query system can determine whether the query is subquery of a federated query. If the query is a subquery, the data intake and query system can use the federated data enrichment objects to execute the query.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/23 - Updating
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/903 - Querying
  • G06F 16/9032 - Query formulation

79.

Systems and methods for retraining machine-learning models to perform alert grouping

      
Application Number 17589532
Grant Number 12066915
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-08-20
Grant Date 2024-08-20
Owner Splunk Inc. (USA)
Inventor
  • Deaderick, William
  • Stanton, William
  • Vieth, Thomas Camp

Abstract

A computerized method is disclosed for retraining machine learning models based on user feedback. The method includes receiving user feedback indicating a change is to be made to an assignment of one or more alerts, wherein the one or more alerts were assigned by a machine learning model implementing a distance metric, wherein an issue is a grouping of at least one alert, constructing a convex optimization procedure to minimize an adjustment of weights of the distance metric, retraining the machine learning model by adjusting the weights of the distance metric in accordance with the convex optimization procedure, and evaluating one or more subsequently received alert using the retrained machine learning model. Changes to be made to the assignment include any of merging of two issues, splitting of two issues based on time or an alert field, or reassignment of an alert from a first issue to a second issue.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/242 - Query formulation
  • G06N 20/00 - Machine learning

80.

Display of log data and metric data from disparate data sources

      
Application Number 17589796
Grant Number 12067008
Status In Force
Filing Date 2022-01-31
First Publication Date 2024-08-20
Grant Date 2024-08-20
Owner Splunk Inc. (USA)
Inventor
  • Bigdelu, Nasim
  • Tesic, Mirjana
  • Tortell, Rebecca

Abstract

Systems and methods are described for display of metric data and log data in a graphical user interface. Metric data can be ingested from a first data source via a first ingestion path and log data can be ingested from a second data source via a second ingestion path. The first data source and the second data source may be distinct, disparate data sources and the first ingestion path and the second ingestion path may be distinct, disparate ingestion paths. The metric data can be displayed in a first area of the graphical user interface and the log data can be displayed in a second area of the graphical user interface. Input can be received identifying a selection of a portion of the metric data for display and the log data can be filtered based on the selection to identify a portion of the log data for display.

IPC Classes  ?

81.

Codeless anchor detection for detectable features in an environment

      
Application Number 17972500
Grant Number 12062234
Status In Force
Filing Date 2022-10-24
First Publication Date 2024-08-13
Grant Date 2024-08-13
Owner SPLUNK INC. (USA)
Inventor
  • Bhushan, Devin
  • Han, Seunghee
  • Jackson-King, Caelin Thomas
  • Kuppel, Jamie
  • Yazhenskikh, Stanislav
  • Zhu, Jim Jiaming

Abstract

A client device that includes a camera and an extended reality client application program is employed by a user in a physical space, such as an industrial or campus environment. The user aims the camera within the mobile device at a real-world asset, such as a computer system, classroom, or vehicle. The client device acquires a digital image via the camera and detects textual and/or pictorial content included in the acquired image that corresponds to one or more anchors. The client device queries a data intake and query system for asset content associated with the detected anchors. Upon receiving the asset content from the data intake and query system, the client device generates visualizations of the asset content and presents the visualizations via a display device.

IPC Classes  ?

  • G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 21/60 - Protecting data
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06V 10/20 - Image preprocessing

82.

WEB ANALYZER ENGINE FOR IDENTIFYING SECURITY-RELATED THREATS

      
Application Number US2024013577
Publication Number 2024/163492
Status In Force
Filing Date 2024-01-30
Publication Date 2024-08-08
Owner SPLUNK INC. (USA)
Inventor
  • Burns, Bryan
  • Horn, Michael
  • Jackson, Steven Thomas
  • Metcalf, William
  • Williams, Jason
  • Wittel, Gregory Lee

Abstract

Techniques are described for providing a threat analysis platform capable of automating actions performed to analyze security-related threats affecting IT environments. Users or applications can submit objects (e.g., URLs, files, etc.) for analysis by the threat analysis platform. Once submitted, the threat analysis platform routes the objects to dedicated engines that can perform static and dynamic analysis processes to determine a likelihood that an object is associated with malicious activity such as phishing attacks, malware, or other types of security threats. The automated actions performed by the threat analysis platform can include, for example, navigating to submitted URLs and recording activity related to accessing the corresponding resource, analyzing files and documents by extracting text and metadata, extracting and emulating execution of embedded macro source code, performing optical character recognition (OCR) and other types of image analysis, submitting objects to third-party security services for analysis, among many other possible actions.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/40 - Network security protocols

83.

Systems and methods for DNS text classification

      
Application Number 17513670
Grant Number 12056169
Status In Force
Filing Date 2021-10-28
First Publication Date 2024-08-06
Grant Date 2024-08-06
Owner Splunk Inc. (USA)
Inventor
  • Mishra, Abhinav
  • Mola, Giovanni
  • Sriharsha, Ram
  • Starosta, Abraham
  • Wang, Zhaohui

Abstract

A computerized method is disclosed that includes operations of training a machine learning model using a labeled training set of data, wherein the machine learning model is configured to classify domain name server (DNS) records, obtaining DNS record data including at least a first DNS Txt record, applying the trained machine learning model to the first DNS Txt record to classify the first DNS Txt record and responsive to the classification of the first DNS Txt record, generating a flag for a system administrator. The trained machine learning model may classify the first DNS Txt record using logistic regression. In some instances, applying the trained machine learning model to the first DNS Txt record includes performing a tokenizing operation on the first DNS Txt record to generate a tokenized first DNS Txt record.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 16/33 - Querying
  • G06F 16/35 - ClusteringClassification
  • G06N 20/00 - Machine learning

84.

Visualizing anomalous feature vectors based on data from healthcare records systems

      
Application Number 17901554
Grant Number 12057208
Status In Force
Filing Date 2022-09-01
First Publication Date 2024-08-06
Grant Date 2024-08-06
Owner Splunk Inc. (USA)
Inventor Esman, Gleb

Abstract

Medication security and healthcare privacy analytics systems are described that enable users to search for and process stored healthcare environment data. The medication security and healthcare privacy analytics systems receive and correlate data from a plurality of data sources, including medication dispensing systems, healthcare employee records, and patient records. The medication security and healthcare privacy analytics systems generate a plurality of feature vectors from processed healthcare environment data. The visualizations are created using datasets generated by clustering algorithms and can indicate those feature vectors from the plurality of feature vectors whose data indicate anomalous interactions with various systems (e.g., indicative of unexpected or non-customary events).

IPC Classes  ?

  • G16H 40/00 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G16H 20/13 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients delivered from dispensers

85.

System and method for data ingestion, anomaly detection and notification

      
Application Number 17582995
Grant Number 12050507
Status In Force
Filing Date 2022-01-24
First Publication Date 2024-07-30
Grant Date 2024-07-30
Owner Splunk Inc. (USA)
Inventor
  • Starosta, Abraham
  • Beckert, Francis
  • Sarkar, Chandrima

Abstract

A computerized method is disclosed for automated handling of data ingestion anomalies. The method features training a data model based on a first volume of data associated with a first time period. Thereafter, using the data model, a predictive analysis is conducted on a second volume of data associated with a second time period subsequent to the first time period to produce a predicted data ingestion volume. After, a correlative analysis between the predicted data ingestion volume and an actual data ingestion volume during the second time period is conducted to produce a prediction error. A notification is generated based on the prediction error.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

86.

Automatically configuring connectors of an information technology and security operations application

      
Application Number 16779463
Grant Number 12045201
Status In Force
Filing Date 2020-01-31
First Publication Date 2024-07-23
Grant Date 2024-07-23
Owner Splunk Inc. (USA)
Inventor
  • Satish, Sourabh
  • Mahadik, Atif
  • Salinas, Govind

Abstract

Techniques are described for automatically identifying and configuring IT and security application connectors relevant to users' IT environment by obtaining and analyzing data reflecting activity within an IT environment. The identification of types of assets within an IT environment may be based on analyzing a “source type” field included in events associated with the IT environment, where the source type field included in each event provides an indication of a type of device or service to which the event relates. The values stored in the source type field of events associated with a user's IT environment might indicate, for example, the presence of various types of computing devices, software applications, network devices, and so forth. Based on the identification of types of assets present in an IT environment, an IT and security operations application automatically configures corresponding connectors for those types of assets.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 9/54 - Interprogram communication
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/17 - Details of further file system functions
  • G06F 16/182 - Distributed file systems
  • G06F 16/23 - Updating
  • G06F 16/245 - Query processing
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

87.

Management of connected sensor devices

      
Application Number 17390811
Grant Number 12047450
Status In Force
Filing Date 2021-07-30
First Publication Date 2024-07-23
Grant Date 2024-07-23
Owner SPLUNK INC. (USA)
Inventor
  • Chor, Jesse
  • Mills, Tishan

Abstract

Various embodiments of the present application set forth a computer-implemented method that includes receiving a device identifier associated with a sensor device, wherein the device identifier is receivable from a location proximal to the sensor device, assigning the device identifier to a first application executing in a first network, wherein data from the sensor device is transmitted to the first application, and transmitting, to a server, an indication of the assignment of the device identifier to the first application, wherein the server stores the assignment in conjunction with a security configuration associated with the sensor device.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • G01M 99/00 - Subject matter not provided for in other groups of this subclass
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • H04L 9/40 - Network security protocols
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

88.

Intelligent search-time determination and usage of fields extracted at index-time

      
Application Number 17163220
Grant Number 12038926
Status In Force
Filing Date 2021-01-29
First Publication Date 2024-07-16
Grant Date 2024-07-16
Owner SPLUNK INC. (USA)
Inventor
  • Pathak, Jay A.
  • Zhang, Steve Yu

Abstract

A computer-implemented method of determining indexed fields at query time comprises mapping data from a first source type to indexed fields in batch form using a wildcard specifier. The method also comprises receiving a query to execute on a data set comprising data from the first source type and data from a second source type. Further, the method comprises transforming the query to execute on the data from the first source type separately from the data from the second source type. Additionally, the method comprises executing the query to operate on the data from the first source type using information associated with the indexed fields and to separately operate on the data from the second source type.

IPC Classes  ?

89.

Information technology networked entity monitoring with metric selection

      
Application Number 17445683
Grant Number 12039310
Status In Force
Filing Date 2021-08-23
First Publication Date 2024-07-16
Grant Date 2024-07-16
Owner Splunk Inc. (USA)
Inventor
  • Hsiao, Fang I.
  • Lu, Ai-Chi
  • Tankersley, Nicholas Matthew

Abstract

Data intake and query system (DIQS) instances supporting applications including lower-tier, focused, work group oriented applications may be tailored to meet the specific needs of the users. Rather than offer pre-configured options, the DIQS-based application offers the user the ability to customize data collection before deploying the collectors for specified host entities within an IT environment. Once the user selects the metrics and/or log sources for data collection at a custom interface, the lower-tier DIQS generates custom script operable to establish collection of the source data having the selected metrics and events associated with selected log sources from the specified host entities. The user can display and analyze the collected data.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 8/61 - Installation
  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 3/0483 - Interaction with page-structured environments, e.g. book metaphor
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials

90.

Techniques for showing matched URLs for a URL grouping rule

      
Application Number 18104218
Grant Number 12038993
Status In Force
Filing Date 2023-01-31
First Publication Date 2024-07-16
Grant Date 2024-07-16
Owner SPLUNK Inc. (USA)
Inventor
  • Agarwal, Umang
  • Danyi, Gergely
  • Deen, Khawar
  • Johnson, Joshua
  • Konatala, Anusha
  • Vasudevan, Rashmi Kalyani
  • Wundes, John Bennett

Abstract

A performance monitoring system (PMS 102) displays a list of example URLs that matched a URL grouping rule used to group URLs. For a rule configured for a customer of the PMS, the example matched URLs are selected by the PMS from a candidate set of URLs identified from data associated with that customer. The PMS receives information identifying a Uniform Resource Locator (URL) grouping rule displayed in a graphical user interface (GUI). The PMS identified a list of candidate URLs occurring in the stored data. The PMS then identifies, from the list of candidate URLs, a set of matched URLs, the set of matched URLs including one or more URLs from the list of candidate URLs that matched the URL grouping rule. The PMS then causes at least one URL from the set of matched URLs to be displayed on the GUI.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

91.

Generating suggested courses of actions for incidents based on previous incident handling

      
Application Number 18311799
Grant Number 12039046
Status In Force
Filing Date 2023-05-03
First Publication Date 2024-07-16
Grant Date 2024-07-16
Owner Splunk Inc. (USA)
Inventor
  • Satish, Sourabh
  • Beals, Trenton John
  • Gallien, Glenn
  • Salinas, Govind

Abstract

The technology presented herein improves incident handling in an IT environment. In a particular example, a method provides identifying a first incident in the IT environment. From incident handling information that indicates how a plurality of previous incidents were handled by one or more users, the method provides identifying first information of the incident handling information corresponding to one or more first previous incidents of the plurality of previous incidents that are similar to the first incident. The method further provides determining a suggested course of action from the first information and presenting the suggested course of action to a user of the information technology environment.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 9/40 - Network security protocols
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

92.

Dynamically changing input data streams processed by data stream language programs

      
Application Number 18331571
Grant Number 12039307
Status In Force
Filing Date 2023-06-08
First Publication Date 2024-07-16
Grant Date 2024-07-16
Owner Splunk Inc. (USA)
Inventor
  • Raman, Rajesh
  • Mukherji, Arijit
  • Grandy, Kris
  • Liu, Phillip

Abstract

An instrumentation analysis system processes data streams by executing instructions specified using a data stream language program. The data stream language allows users to specify a search condition using a find block for identifying the set of data streams processed by the data stream language program. The set of identified data streams may change dynamically. The data stream language allows users to group data streams into sets of data streams based on distinct values of one or more metadata attributes associated with the input data streams. The data stream language allows users to specify a threshold block for determining whether data values of input data streams are outside boundaries specified using low/high thresholds. The elements of the set of data streams input to the threshold block can dynamically change. The low/high threshold values can be specified as data streams and can dynamically change.

IPC Classes  ?

  • G06F 8/41 - Compilation
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/54 - Interprogram communication
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/2455 - Query execution

93.

DATA SOURCE VISUALIZATIONS

      
Application Number 18494312
Status Pending
Filing Date 2023-10-25
First Publication Date 2024-07-11
Owner Splunk Inc. (USA)
Inventor
  • Block, Glenn
  • Ogdin, Patrick

Abstract

A data intake and query system processes and stores events, which are associated with token identifiers for tokens corresponding to data sources for the messages that the events are generated from. Thus, the data intake and query system can receive a request to provide analyses and visualizations regarding stored events associated with a particular component associated with a plurality of events, such as a data source for the messages from which the plurality of events are generated from. These requests and the resulting visualizations can be customized based on selected tokens and selected components.

IPC Classes  ?

  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/248 - Presentation of query results
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/951 - IndexingWeb crawling techniques

94.

Obtaining simulated results for a course of action executed in an information technology environment

      
Application Number 17560747
Grant Number 12028222
Status In Force
Filing Date 2021-12-23
First Publication Date 2024-07-02
Grant Date 2024-07-02
Owner Splunk Inc. (USA)
Inventor
  • Mahadik, Atif
  • Means, Ryan Connor
  • Salinas, Govind
  • Satish, Sourabh

Abstract

Described herein are improvements for generating courses of action for an information technology (IT) environment. In one example, a method includes identifying a first course of action for responding to an incident type in an information technology environment and generating a simulated incident associated with the incident type. The method further includes initiating performance of the first course of action based on the generation of the simulated incident. The method also includes, upon reaching a particular step of the first course of action that prevents the performance of the first course of action from proceeding, providing a first simulated result that allows the performance of the first course of action to proceed.

IPC Classes  ?

  • H04L 41/14 - Network analysis or design
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

95.

Content pack management in service monitoring system

      
Application Number 17974011
Grant Number 12028226
Status In Force
Filing Date 2022-10-26
First Publication Date 2024-07-02
Grant Date 2024-07-02
Owner Splunk Inc. (USA)
Inventor
  • Bhave, Abhijit
  • Chen, Jiani
  • Gampaa, Ananta Krishna Vijay Kumar
  • Kotler, Everett
  • Mulla, Rehan Salman
  • Shah, Tapan Manojkumar
  • Torbett, Ian Edward
  • Yan, Bixia

Abstract

An example method of content pack management by a service monitoring system includes: receiving a plurality of object identifiers, each object identifier referencing a corresponding object installed in an instance of a service monitoring system; performing a partial backup of the instance of a service monitoring system, wherein the partial backup comprises a plurality of objects referenced by the plurality of object identifiers; converting the partial backup into a plurality of object definitions in a predefined format; and packaging the plurality of object definitions into a content pack.

IPC Classes  ?

  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

96.

Reassigning a processing node from downloading to searching a data group

      
Application Number 18123758
Grant Number 12019634
Status In Force
Filing Date 2023-03-20
First Publication Date 2024-06-25
Grant Date 2024-06-25
Owner Splunk Inc. (USA)
Inventor
  • Anwar, Tameem
  • Batsakis, Alexandros
  • Gou, Tianyi
  • Goyal, Mehul
  • Mathew, Ashish
  • Rapp, Douglas
  • Sajja, Sai Krishna
  • Shrigondekar, Anish
  • Stojanovski, Igor
  • Woo, Eric
  • Xie, Zhenghui
  • Zhang, Ruochen
  • Zhu, Sophia Rui

Abstract

A data intake and query system can manage the search of large amounts of data using one or more processing nodes. When a new processing node is added or becomes available, the node coordinator can reassign duties from one or more processing nodes to the new processing node. The node coordinator can initially assign the new processing node one or more groups of data for backup purposes. At a later time, the node coordinator can reassign the new processing node to the one or more groups of data for searching purposes.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/248 - Presentation of query results

97.

Control of a display device included in a display grid

      
Application Number 17347289
Grant Number 12019939
Status In Force
Filing Date 2021-06-14
First Publication Date 2024-06-25
Grant Date 2024-06-25
Owner SPLUNK INC. (USA)
Inventor
  • Chor, Jesse
  • Gupta, Varun
  • Rafi, Tuba
  • Weaver, Benjamin
  • Wong, Glen

Abstract

Various embodiments set forth a computer-implemented method of displaying content of a visualization environment, comprising receiving, by a display controller coupled to a display device included in a plurality of display devices, a configuration that includes a display mode and identifies a dashboard to be displayed, determining a position of the display device relative to positions of other display devices, retrieving a set of values associated with the dashboard, where the set of values is provided by a remote data source based on a query executed on raw machine data associated with the dashboard, determining, based on the position, at least a portion of the dashboard to display in the display device, and causing, by the display controller, the display device to display at least a portion of the set of values within at least the portion of the dashboard.

IPC Classes  ?

  • G09G 3/30 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix using controlled light sources using electroluminescent panels
  • G06F 3/14 - Digital output to display device
  • G06F 16/9038 - Presentation of query results
  • G09G 3/36 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix by control of light from an independent source using liquid crystals

98.

Entity retirement in service monitoring system

      
Application Number 18115822
Grant Number 12021698
Status In Force
Filing Date 2023-03-01
First Publication Date 2024-06-25
Grant Date 2024-06-25
Owner Splunk Inc. (USA)
Inventor
  • Kath, Ankur Ashok
  • Muthusami, Ayyappa
  • Shih, Jeffrey Wen-Young
  • Torbett, Ian Edward
  • Wu, Peter

Abstract

An example method of entity lifecycle management in a service monitoring system includes: receiving, by a software application of a service monitoring system, a policy definition specifying an entity lifecycle management policy, wherein the entity lifecycle management policy defines management rules for a plurality of entities in a network environment, wherein each entity of the plurality of entities is represented by one of: a device, an application, a service, or a user account; identifying, by applying the entity lifecycle management policy, one or more candidate entities for retirement; identifying, as retired entities, at least a subset of the one or more candidate entities; and excluding the retired entities from a plurality of active entities, thus preventing the retired entities from interacting with other components of the service monitoring system; and determining a value of a key performance indicator (KPI) reflecting an aspect of performance of the service, wherein the KPI is defined by a search query that derives the value of the KPI from machine data associated with one or more entities of the plurality of active entities.

IPC Classes  ?

  • H04L 41/0893 - Assignment of logical groups to network elements
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
  • H04L 43/065 - Generation of reports related to network devices
  • H04L 43/0805 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability

99.

Generating machine learning-based outlier detection models using timestamped event data

      
Application Number 18334996
Grant Number 12014255
Status In Force
Filing Date 2023-06-14
First Publication Date 2024-06-18
Grant Date 2024-06-18
Owner Splunk Inc. (USA)
Inventor
  • Vogler-Ivashchanka, Iryna
  • Makaremi, Iman

Abstract

Techniques are described for providing a machine learning (ML) data analytics application including guided ML workflows that facilitate the end-to-end training and use of various types of ML models, where such guided workflows may also be referred to as ML “experiments.” One such model is an outlier detection model to assist in the monitoring of computer network traffic and computer performance. For example, the ML data analytics application may generate an outlier detection model using user-identified data from a data source and parameter information. The generates outlier detection model can include distribution functions of distribution types selected from a plurality of distribution types by a distribution fitting algorithm.

IPC Classes  ?

100.

Unified data processing across streaming and indexed data sets

      
Application Number 18190815
Grant Number 12013852
Status In Force
Filing Date 2023-03-27
First Publication Date 2024-06-18
Grant Date 2024-06-18
Owner Splunk Inc. (USA)
Inventor
  • Echeverria, Joseph Gabriel
  • Foelsche, Arthur
  • Sammer, Eric
  • Stanger, Sarah

Abstract

Systems and methods are described for unified processing of indexed and streaming data. A system enables users to query indexed data or specify processing pipelines to be applied to streaming data. In some instances, a user may specify a query intended to be run against indexed data, but may specify criteria that includes not-yet-indexed data (e.g., a future time frame). The system may convert the query into a data processing pipeline applied to not-yet-indexed data, thus increasing the efficiency of the system. Similarly, in some instances, a user may specify a data processing pipeline to be applied to a data stream, but specify criteria including data items outside the data stream. For example, a user may wish to apply the pipeline retroactively, to data items that have already exited the data stream. The system can convert the pipeline into a query against indexed data to satisfy the users processing requirements.

IPC Classes  ?

  • G06F 16/30 - Information retrievalDatabase structures thereforFile system structures therefor of unstructured textual data
  • G05B 13/00 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
  • G06F 16/14 - Details of searching files based on file metadata
  • G06F 16/178 - Techniques for file synchronisation in file systems
  • G06F 16/24 - Querying
  • G06F 16/2453 - Query optimisation
  • G06F 16/2455 - Query execution
  • G06F 16/248 - Presentation of query results
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06N 3/00 - Computing arrangements based on biological models
  • G06N 5/00 - Computing arrangements using knowledge-based models
  1     2     3     ...     13        Next Page