09 - Scientific and electric apparatus and instruments
Goods & Services
Computer hardware; computer network server; computer
hardware used in connection with software for collecting,
analyzing and monitoring of network traffic for maintenance
of network security, enforcement of business policies, rules
and procedures and prevention of intellectual property theft
or loss, computer-based fraud and crime, and other incidents
of network intrusion and misuse.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software used in collection, analysis and
monitoring of network traffic for maintenance of network
security, enforcement of business policies, rules and
procedures and prevention of intellectual property theft or
loss, computer-based fraud and crime, and other incidents of
network intrusion and misuse. Software as a service for collecting, analyzing and
monitoring of network traffic for maintenance of network
security, enforcement of business policies, rules and
procedures and prevention of intellectual property theft or
loss, computer-based fraud and crime, and other incidents of
network intrusion and misuse.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Downloadable computer software using artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; downloadable user authentication, identity theft detection, and fraud detection computer software using behavioral biometrics Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network; Providing online non-downloadable software featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Providing online non-downloadable user authentication, identity theft detection, and fraud detection software featuring behavioral biometrics; Software as a service (saas) services featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Software as a service (saas) services featuring software for user authentication, identity theft detection, and fraud detection using behavioral biometrics Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data
Machine learning models for fraud detection. The method includes receiving a schedule of weights, the schedule comprising a plurality of entries, each entry comprising a transaction value weight, a transaction volume weight, and a range of intervention rates; testing the at least one machine learning model using a holdout data set, resulting in a ranked transactions data set; and evaluating the performance of the at least one machine learning model by computing the weighted harmonic mean of the ranked transactions data set using the schedule of weights.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Machine learning models for fraud detection. The method includes receiving a schedule of weights, the schedule comprising a plurality of entries, each entry comprising a transaction value weight, a transaction volume weight, and a range of intervention rates; testing the at least one machine learning model using a holdout data set, resulting in a ranked transactions data set; and evaluating the performance of the at least one machine learning model by computing the weighted harmonic mean of the ranked transactions data set using the schedule of weights.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
In general, in one aspect, the invention relates to a method for servicing requests. The method includes receiving, from a client system, a request comprising a query, where the query includes a first plurality of terms. The method further includes generating, using a thesaurus library, a related query including a second plurality of terms, where at least one term in the second plurality of terms is present in the first plurality of terms. The method further includes issuing the query to a content repository to obtain a first result, issuing the related query to the content repository to obtain a second result, processing the first result and the second result to generate a final result, and providing the final result to the client system.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable software; downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting. Educational services; educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; arranging and conducting of conferences; arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing online, non-downloadable software; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Computer forensic services; IT consultancy; Computer security consultancy; software as a service [SaaS]; Cloud computing; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Authentication services; Authentication services for computer security; Authentication services (control) of data transmitted via telecommunications; providing user authentication services in e-commerce transactions; providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud; IT security, protection and restoration; providing a website with blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing authentication of personal identification information [identification verification services]; Identification verification services, namely, providing authentication of personal identification information; Consultation in the fields of fraud, data theft and identity theft.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable software; downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting. Educational services; educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; arranging and conducting of conferences; arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing online, non-downloadable software; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Computer forensic services; IT consultancy; Computer security consultancy; software as a service [SaaS]; Cloud computing; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Authentication services; Authentication services for computer security; Authentication services (control) of data transmitted via telecommunications; providing user authentication services in e-commerce transactions; providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud; IT security, protection and restoration; providing a website with blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing authentication of personal identification information [identification verification services]; Identification verification services, namely, providing authentication of personal identification information; Consultation in the fields of fraud, data theft and identity theft.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; (1) Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; Providing information in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention via blogs, non-downloadable videos, podcasts and websites via the internet; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention;
(2) Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; digital forensic investigations in the field of computer crimes; Computer security consultancy; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; providing user authentication services in e-commerce transactions; Providing online non-downloadable downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud;
(3) Identification verification services, namely, providing authentication of personal identification information; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consultation in the fields of fraud, data theft and identity theft.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; (1) Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention;
(2) Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention
(3) Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Computer forensic services; Computer security consultancy; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; providing user authentication services in e-commerce transactions; providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing online non-downloadable downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud;
(4) Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consultation in the fields of fraud, data theft and identity theft
11.
Performance improvement recommendations for machine learning models
Techniques are provided for generating performance improvement recommendations for machine learning models. One method comprises evaluating performance metrics for multiple implementations of a machine learning model; computing a performance score that aggregates the performance metrics for a given machine learning model implementation; and recommending a modification to the given machine learning model implementation based on the performance score by evaluating one or more performance metrics for the given implementation relative to at least one additional performance metric for the given implementation, wherein the recommended modification is based on a performance with the recommended modification for another implementation. A given performance metric may be weighted based on an expected improvement from modifying a factor related to the given performance metric. The recommended modification to the given machine learning model implementation may comprise an indication of the expected improvement for the modification.
Techniques for generating dynamic challenge questions for use in an authentication process are provided herein. An example computer-implemented method can include outputting a first prompt to a user via a user device interface, wherein the first prompt comprises a first set of information-gathering questions; generating dynamic challenge questions for use in an authentication process, wherein the dynamic challenge questions are generated based on user responses to the first set of information-gathering questions; generating a second prompt in connection with an authentication request, wherein the second prompt is based at least in part on at least one of the dynamic challenge questions; processing a user response to the at least one dynamic challenge question, wherein said processing comprises determining a likelihood that the user response matches an automatically estimated response; and resolving the authentication request based on the processing.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data
Inter-zone network traffic generated during deletion of a data chunk that has been replicated by employing geographically distributed (GEO) erasure coding is reduced. In one aspect, if a data chunk is to be deleted, partial coding chunks are generated by a source zone and provided to destination zones that store complete coding chunks for updating the complete coding chunks based on combining them with the received partial coding chunks. In another aspect, if a first data chunk is to be deleted and a second data chunk is to be replicated, partial coding chunks are generated by the source zone for each data chunk. Further, the partial coding chunks created for different data chunks can be combined to generate transforming chunks, which can then be transferred to the destination zones. The destination zones can then update the complete coding chunks based on combining them with the received transforming chunks.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 3/06 - Digital input from, or digital output to, record carriers
H03M 13/25 - Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
H03M 13/29 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
H03M 13/00 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes
18.
Combining explicit and implicit feedback in self-learning fraud detection systems
An improved technique involves including implicit feedback inferred from a fraud analyst's actions into a fraud detection model tuning process. Along these lines, as part of a tuning process, an authentication server sends electronic transactions carrying a certain amount of risk to a case management center in which fraud analysts investigate the electronic transactions to verify whether the transactions are fraudulent or non-fraudulent. In addition to receiving this explicit feedback from the case management center, however, the authentication server also receives implicit feedback indicative of attributes of the fraud analysts themselves. The authentication server then inputs these implicit feedback parameter values into a fraud detection model tuning engine that tunes the fraud detection model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Server selection for optimized malware scanning on network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a load determination component that determines respective available capacities of anti-malware servers based on loading information obtained from the anti-malware servers and a task assignment component that assigns a malware scan task to a selected anti-malware server of the anti-malware servers based on the respective available capacities of the anti-malware servers.
A processing device in an illustrative embodiment includes a processor coupled to a memory and is configured to receive user credentials from a user device in conjunction with an access request, to apply one or more automated tests in order to determine one or more device identifiers of the user device, to generate a risk score for the access request based at least in part on the received user credentials and the one or more determined device identifiers, and to grant or deny the access request based at least in part on the risk score.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A partitioned Bloom filter is disclosed. In various embodiments, a representation of an item is received. The representation is used to determine a partition with which the item is associated. A partition-specific Bloom filter is used to determine at least in part whether the item may be an element of a set with which the partition is associated.
Techniques to determine an execution path in a distributed environment are disclosed. A call to a method or function of a component of the distributed system is received, in connection with a request from a user of the distributed system. A unique correlation identifier that includes data that identifies the component, the request, and the method of function called is generated for the call.
Techniques are provided for scheduling computational tasks among multiple classes of storage resources based on a job classification. A job to be executed is classified into one of a plurality of predefined job classes. Each predefined job class is associated with a corresponding one of a plurality of predefined storage classes. The job is then assigned based on the classification to one of the storage resources of the predefined storage class associated with the classified predefined job class. Exemplary predefined storage classes include a performance class, a capacity class, a key-value storage class, and a shingled disk drive class. Exemplary predefined job classes include a CPU Intensive job class, an IO Intensive job class and a Small IO job class. Data required for a job is optionally prefetched before the job is assigned to a storage device. Data objects to be evicted from a storage device are optionally selected based on an anticipated future access.
Aggregate socket resource management is presented herein. A system can comprise a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: determining a present aggregate amount of data associated with processing requests from a socket; setting a defined aggregate data limit on the present aggregate amount of data; and in response to determining changes in a difference between the defined aggregate data limit and the present aggregate amount of data, modifying a defined data capacity limit on a data capacity of a receive buffer of the socket. In an example, the determining of the changes in the difference between the defined aggregate data limit and the present aggregate amount of data comprises reducing/increasing the defined data capacity limit in response to the difference being determined to be decreasing/increasing.
Methods and apparatus are provided for domain-tailored detection of outliers, patterns, and/or events in data streams. An exemplary method comprises obtaining a domain-dependent definition of (i) data outliers based on predefined outlier criteria; (ii) data patterns based on predefined pattern criteria; and/or (iii) data events based on predefined event criteria; obtaining time series measurement data from a plurality of sensors; determining, substantially simultaneously with the obtaining, whether individual samples satisfy the domain-dependent definitions of the data outliers, data patterns and/or data events; and storing the individual samples with an indication of whether the individual samples satisfy the domain-dependent definitions of the data outliers, data patterns and/or data events. The domain-dependent definitions are optionally specified using a declarative command language. Query are optionally processed comprising one or more declarative statements that reference and/or manipulate the data outliers, data patterns and/or data events.
Methods and apparatus are provided for automatic combination of sub-process simulation results and heterogeneous data sources. An exemplary method comprises obtaining, for a process comprised of a sequence of a plurality of sub-processes, an identification of relevant input and output features for each sub-process; obtaining an execution map for each sub-process, wherein each execution map stores results of an execution of a given sub-process; and, in response to a user query regarding a target feature and a user-provided initial scenario: composing a probability distribution function for the target feature representing a simulation of the process based on a sequence of the execution maps, by matching input features of each execution map with features from the initial scenario or the output of previous execution maps; and processing the probability distribution function to answer the user query. Execution maps are optionally stored as distributed tables that use relevant input features to hash data related to multiple executions across multiple nodes. The composition process optionally occurs in parallel across multiple nodes.
A DRM system is provided wherein when a protected content unit is provided to an access device, the access information associated with the protected content unit is retrieved from the DRM server and provided to the access device in the same transaction in which the protected content unit is provided. Therefore, when the user seeks to access the protected content unit, the access request can be handled locally without the need to rely upon potentially constrained connectivity to the DRM server. The techniques described herein enable an access device to access content protected by a DRM system. When a protected content unit and access information is received at the access device, in one transaction, the protected content unit can be decrypted on the access device using the access information, and/or the access information can be used to enforce a DRM policy associated with the protected content unit.
Inter-zone network traffic generated during deletion of a data chunk that has been replicated by employing geographically distributed (GEO) erasure coding is reduced. In one aspect, if a data chunk is to be deleted, partial coding chunks are generated by a source zone and provided to destination zones that store complete coding chunks for updating the complete coding chunks based on combining them with the received partial coding chunks. In another aspect, if a first data chunk is to be deleted and a second data chunk is to be replicated, partial coding chunks are generated by the source zone for each data chunk. Further, the partial coding chunks created for different data chunks can be combined to generate transforming chunks, which can then be transferred to the destination zones. The destination zones can then update the complete coding chunks based on combining them with the received transforming chunks.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 3/06 - Digital input from, or digital output to, record carriers
H03M 13/25 - Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
H03M 13/29 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
H03M 13/00 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes
29.
Parallel storage system with burst buffer appliance for storage of partitioned key-value store across a plurality of storage tiers
Parallel storage systems are provided with a burst buffer appliance for storage of a partitioned key-value store across a plurality of storage tiers. The burst buffer appliance is configured to store key-value data on first and second storage tiers comprising respective disjoint subsets of storage. One or more servers in the partitioned key-value store provide (i) an interface between one or more local key-value stores and one or more additional storage architectures, and/or (ii) a key value interface that provides access to at least one hardware key-value store. The local key-values are optionally sorted both locally by the local store and globally by the overall MDHIM framework. The local and global sorting can be leveraged to provide batch input/output (IO) operations that aggregate multiple requests into batch operations on one or more sorted ranges.
Improved multi-tier storage techniques are provided for storing data, such as checkpoints or other bursty data, in parallel computing environments. A burst buffer appliance is provided for use in a first storage tier of a multi-tier storage system comprising at least the first storage tier and a second storage tier. The exemplary burst buffer appliance comprises a memory for storing data; and at least one processing device to transform at least a portion of the data for storage on the second storage tier based on one or more performance characteristics of the second storage tier. In at least one embodiment, the at least one processing device is further configured to perform at least one function on the at least the portion of the data on behalf of the second storage tier. The performance characteristics of the second storage tier comprise, for example, a stripe size and/or network topology information.
Pattern queries are evaluated in parallel over large N-dimensional datasets to identify features of interest. Similarity-based pattern matching tasks are executed over N-dimensional input datasets comprised of numeric values by providing data representations for the N-dimensional input datasets, a pattern query and one or more candidate solutions for the pattern query, such that the pattern query specifies a pattern of an N-dimensional body that is compared to at least one candidate solution corresponding to an N-dimensional body extracted from the N-dimensional input datasets; defining a distance metric that compares the N-dimensional body formed by the candidate solution extracted from the N-dimensional input datasets and the N-dimensional body formed by the pattern query, taking into account one or more of the following criteria: differences between mapped values, differences in scale and differences in shape; and executing, in parallel, a plurality of independent instances of at least one algebraic operator to generate and score the candidate solutions based on the distance metric. The exemplary algebraic operators comprise a Trace Match operator, a Ranking operator, a Candidate Solution operator, and a Query Clustering operator.
Methods and apparatus are provided for performing massively parallel processing (MPP) large-scale combinations of time series data. A given working compute node in a distributed computing environment obtains a given group of time series data of a plurality of groups of time series data; generates a measurement matrix for the given group based on a plurality of selected time series and a plurality of time lags of the selected time series; processes the measurement matrix to generate a first linear model with a predefined number of first independent selected variables; assigns a score to each first independent selected variable; and provides the first independent selected variables and assigned scores to a master compute node that ranks the first independent selected variables for all groups from all working computing nodes according to assigned scores; selects a predefined number of second independent selected variables based on a final rank to create a final group of time series; and processes the final group of time series to generate a final linear model.
A hiccup management scheme for use within a storage system can maintain low latency on client I/O when a storage device is temporarily unavailable. In some embodiments, a storage using uses double parity data protection can tolerate concurrent hiccups by up to two storage devices within a storage array.
Partitioned key-value stores with one-sided communications are provided for secondary global key lookup by range-knowledgeable clients. A secondary global lookups is performed in a partitioned key-value store by receiving a request from an application for a secondary global key; accessing metadata to identify a first server storing the secondary global key; instructing the identified first server to store a first value corresponding to the requested secondary global key into a memory address of the client; and returning program control to the application, wherein the first server identifies a primary key corresponding to the requested secondary global key and instructs a second server storing the corresponding primary key to store a second value corresponding to the primary key into the memory address of the client. The second server stores the second value corresponding to the primary key into the first memory address of the client.
Methods and apparatus are provided for integrating heterogeneous multi-channel data using ontologies. An exemplary method for integrating multi-channel heterogeneous data comprises obtaining a domain-specific mediator ontology; identifying a plurality of target channels; identifying entities pertinent to each of the plurality of channels; describing the entities pertinent to each of the plurality of channels using an ontology description language to generate a plurality of channel specific ontologies; aligning the channel specific ontologies with the domain-specific mediator ontology to generate aligned channel specific and domain-specific mediator ontologies; extracting a plurality of user identities from the plurality of channels; aligning the plurality of extracted user identities across the plurality of channels to link common user identities; generating at least one user profile for at least one of the aligned user identities; and correlating at least one user profile with the aligned channel specific and domain-specific mediator ontologies to generate an omni-channel ontology that integrates the multi-channel heterogeneous data.
A method for testing communication within a computing platform is provided. The method includes selecting a system-level message configured for device level communication within the computing platform; incorporating false data into a data field of the message; sending the message containing false data to a destination device; and, monitoring behavior of the destination device. A computer program product and a system are described.
Aggregate socket resource management is presented herein. A system can comprise a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: determining a present aggregate amount of data associated with processing requests from a socket; setting a defined aggregate data limit on the present aggregate amount of data; and in response to determining changes in a difference between the defined aggregate data limit and the present aggregate amount of data, modifying a defined data capacity limit on a data capacity of a receive buffer of the socket. In an example, the determining of the changes in the difference between the defined aggregate data limit and the present aggregate amount of data comprises reducing/increasing the defined data capacity limit in response to the difference being determined to be decreasing/increasing.
This disclosure relates to a system for defining enterprise applications operating in virtual datacenter. Application templates may be created containing the necessary information for provisioning and securing virtual applications in a tenant's virtual datacenter. The templates may define roles, service accounts, and scripts necessary for the datacenter to operate.
Techniques are provided for globally appending data from a group of distributed processes to a shared file using a log-structured file system. Data generated by a plurality of processes in a parallel computing system are appended to a shared file by storing the data to the shared file using a log-structured file system (such as a Parallel Log-Structured File System (PLFS)); and generating an index entry for the data, the index entry comprising a logical offset entry and a timestamp entry indicating a time of the storage, wherein the logical offset entry is resolved at read time. The logical offset entry can be populated with an append placeholder that is resolved when the shared file is read. At read time, a plurality of the index entries associated with the shared file can be sorted using the timestamp entry to deliver the requested shared file to a requesting application.
Example embodiments of the present invention relate to a method, an apparatus, and a computer program product for directing I/Os for a chunk of data to a data storage system on which the chunk of data is stored. The host method includes receiving an I/O for a chunk of data, identifying to which data storage system the I/O should be sent to access the chunk of data, and sending the I/O for the chunk of data to the identified data storage system. Other example embodiments of the present invention relate to a method, an apparatus, and a computer program product for handling received I/Os during a migration of the chunk of data. The data storage system method includes migrating the chunk of data, queuing an I/O for the chunk of data received from a host during the migration, and rejecting the queued I/O as a result of the migration.
Methods and apparatus for computer systems having first and second memory tier having regions, physical memory having page caches that are shareable with multiple ones of the regions in the first memory tier and the regions in the second memory tier, and virtual memory having mmaps of ones of the regions in the first memory tier and ones of the regions in the second memory tier, wherein the mmaps are associated with multiple ones of the pages caches.
A method for providing load balancing for a server cluster using a server dormant mode. Client devices are allowed to conduct transactions with servers when the servers are active. However, the servers are not allowed to accept new transactions in a dormant mode. Thus, an overloaded server can be placed into the dormant mode until the server is no longer overloaded. Loads will be redistributed among other active servers in the cluster while a server is in the dormant mode.
Techniques to provide access to repository content, via a file sharing service, are disclosed. In various embodiments, a revised content associated with a repository content object, reflecting a modification made to the repository content in the context of a file sharing service to which the repository content object was published in connection with a synchronized share of the repository object, is received. It is determined whether the revised content is to be stored in the repository and, if so, the revised content is stored in the repository.
A system for automatic setting of system security comprises an input interface and a processor. The input interface is configured to receive an indication to set a secure mode. The processor is configured to: determine whether the indication to set the secure mode comprises an indication to set a certificate mode; in the event that the indication to set the secure mode comprises an indication to set a certificate mode: 1) detect one or more connected systems for which to set the certificate mode; 2) select one or more certificates for the certificate mode; 3) update initialization files for the certificate mode; and 4) reinitialize local and one or more connected systems.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
Techniques to reduce database fragmentation are disclosed. In various embodiments, an indication is received to store an attribute value for an entity that has a row or other entry in a first database table, wherein the first database table does not have a column for the attribute. It is determined that the value corresponds to a mapped value that is associated with not having an entry in a separate, second database table configured to store the attribute. Entries are made in the second database table only for values of the attribute other than the mapped value. Application level software code is configured to associate absence of a row in the second database table with the mapped value for the attribute.
In one embodiment, a method includes intercepting a write command to write to a volume at a production site, saving data from the write command to a cache, sending metadata from the write command to a data protection appliance (DPA), writing the data to the volume, receiving a request for the data in the cache, sending the data from cache to a data protection appliance (DPA) at the production site and sending the data from the DPA to the replication site.
A system and method is illustrated for platform-independent rendering of a document in a web browser supporting a two-dimensional (2D) canvas. The system and method includes obtaining the document, wherein the document includes text characters, text elements, and associated style information including at least one font, determining that font metrics do not exist, and obtaining the font metrics for the at least one font, using the font metrics and the text elements to determine how the document is divided into page criteria, determining a font file does not exist, and obtaining the font file for the at least one font, and rendering the document by drawing glyphs associated with the text characters in the 2D canvas, using the font file and the page criteria, so that the at least one font and the page criteria are platform-independent.
Offloaded data protection based on virtual machine snapshots is described. A system identifies a virtual machine associated with a backup application. The system identifies a storage identifier associated with a virtual machine storage management tool and the virtual machine. The system creates a snapshot of the virtual machine and an identifier of the snapshot by prompting a storage array, which is associated with the virtual machine storage management tool, with the storage identifier. The system mounts the snapshot to a proxy server. The system creates a backup based on the snapshot by prompting the backup application with the identifier of the snapshot.
Disclosed are systems and methods for ordering scripting language source code. A request for a first scripting language resource may be received. The first scripting language resource may provide one or more functionalities for a web application. A second scripting language resource may be identified based on dependency information. In some implementations, the dependency information identifies a dependency between the first scripting language resource and the second scripting language resource. A response including the first and second scripting language resources may be generated. In some implementations, the first and second scripting language resources may be ordered based on the dependency information. In various implementations, the response may be capable of being transmitted to a web browser.
Epoch-based management of file system data is disclosed. In various embodiments, for each of a plurality of snapshots, data that associates with the snapshot a corresponding last chunk identifier assigned as of a time at which the snapshot is or was created is stored a in a first data structure. For each of a plurality of chunks of file system data no longer referenced by any live file system object, an epoch identifier associated with an epoch in which the chunk became no longer referenced by any live file system object is stored in a second data structure. A chunk identifier and associated epoch comprising an entry in the second data structure are compared with one or more entries in the first data structure to determine whether a chunk associated with the chunk identifier is associated with a snapshot that continues to be retained.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 17/30 - Information retrieval; Database structures therefor
Described herein are embodiments of a process that can be used to balance the allocation of primary memory between different types of information. In some embodiments, the memory allocation is balanced dynamically based on observed I/O patterns. Related system embodiments are also described.
In one embodiment, a method of updating a list of available scratchfiles at a node accessing a filesystem includes determining whether the node should update the list of available scratchfiles on the filesystem. If the node should update the list of available scratchfiles of the filesystem, the method updates the list of available scratchfiles on the filesystem. In one embodiment, the method may determine whether the list of available scratchfiles on the filesystem should be updated by determining whether another node is currently updating its scratch list for the filesystem. If it is not, then the method may further determine whether the filesystem has added a scratch volume since a previous update of the list of available scratchfiles at the node.
A method, article of manufacture, and apparatus for managing a cloud computing environment. In some embodiments, this includes modifying an object or a component of an object at runtime and storing the modified object or modified component of an object in a storage device. In some embodiments, components of an object such as data structures are modified. In some embodiments, objects may have more than one version.
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
54.
Method, apparatus and computer program product for verifying caller identification in voice communications
Techniques are disclosed for verifying caller identification in voice communications. In one embodiment, there is disclosed a method comprising receiving a request to establish a voice call between communications devices. The request comprising encrypted information and an identifier identifying a caller associated with the request to establish the voice call. The method further comprises retrieving, in response to receiving the request, a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the identifier. The method further comprises utilizing the decryption key to decrypt the encrypted information and produce decrypted information as well as comparing the decrypted information and the identifier to determine a similarity therebetween. The method further comprises providing, based on the comparison, an indication of whether or not the request is deemed associated with fraud.
H04M 1/00 - Substation equipment, e.g. for use by subscribers
H04M 15/00 - Arrangements for metering, time-control or time-indication
H04M 3/436 - Arrangements for screening incoming calls
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04M 3/22 - Arrangements for supervision, monitoring or testing
Techniques to provide access to file system information are disclosed. In various embodiments, an indication that a user input associated with creating a local copy of a file system object has been received is received at a file system client. The file system client determines that a user-driven pre-fetch option has been set with respect to the file system object. The file system client pre-fetches content data associated with the file system object, based at least in part on the determination that the pre-fetch option has been set with respect to the file system object.
De-duplicating results of queries of data repositories is described. A system associates each data object of the first set of duplicate data objects stored by multiple data repositories with a first unique duplicate set identifier, and each data object of the second set of duplicate data objects stored by the multiple data repositories with a second unique duplicate set identifier. The system identifies a first data object of the first set of duplicate data objects and a second data object of the first set of duplicate data objects in response to a query. The system determines that the first data object is associated with the first unique duplicate set identifier, and that the second data object is also associated with the first unique duplicate set identifier. The system outputs a query result that includes only the first data object.
A method and system for connecting a content repository and file sharing service for sharing and synchronizing content. An application server includes a connector engine and a connector agent. The connector engine with is configured with a plurality of threads and queues designed to listen for changes at either the file sharing service or the repository, to process those changes in parallel, and to coordinate synchronization of uploads to the file sharing service and downloads to the content repository.
Synchronizing catalogs of virtual machine copies is described. A system determines the number of copies of a virtual machine in a catalog associated with a virtual machine storage management tool. The system determines the number of copies of the virtual machine in a catalog associated with a backup application. The system creates a copy of the virtual machine, which is associated with the backup application, if the number of copies of the virtual machine in the catalog associated with the virtual machine storage management tool is greater than zero and if the number of copies of the virtual machine in the catalog associated with the backup application is zero.
A method for provisioning a virtual datacenter application is discussed. A request may be received from a tenant for a virtual datacenter application. An application template may be identified and associated with the virtual datacenter application, wherein the application template can comprise a role, a service account, a script, and a workload. The role and the service account can be added to an active directory organization associated with the tenant. The workload can be cloned into a virtual datacenter, wherein the virtual datacenter belongs to the tenant. A script can be executed on the workload according to an execution order organized over multiple additional workloads, wherein a first script can be executed on a first workload before a second script is executed on a second workload, wherein the first script can be different from the second script, wherein the first workload can be different from the second workload.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Example embodiments of the present invention relate to a method, a system, and a computer program product for data storage tiering. The method includes maintaining data in a data storage system having a plurality of tiers, determining a subset of the data stored in a first, more-durable tier should be stored in a second, less-durable tier, and tiering the subset of the data from the first, more-durable tier to the second, less-durable tier.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
G06F 3/06 - Digital input from, or digital output to, record carriers
61.
Extent-based tiering for virtual storage using full LUNs
Example embodiments of the present invention relate a method, a system, and a computer program product for extent-based tiering for virtual storage using full LUNs. The method includes exposing a virtual LUN comprising a first LUN in a first tier of storage having a first latency and a second LUN in a second tier of storage having a second latency and managing the virtual LUN according to properties of the first LUN, properties of the second LUN, and a policy.
A method, article of manufacture, and apparatus for managing a computing environment, such as a cloud data repository. In some embodiments, this includes providing a data archive, and relegating data items to a second, long-term data archive. In some embodiments, data items may be converted to an archive format prior to being relegated.
Example embodiments of the present invention relate to a method, a system, and a computer program product for controlling conditions of an input air stream. The method includes detecting air quality conditions as environmental input variables of an input air stream and determining whether to take corrective action on the air quality conditions of the input air stream according to the environmental input variables. An output variable then may be controlled to affect the air quality conditions of the input air stream.
A service to invoke a companion application or service is disclosed. In various embodiments, an indication to invoke a companion application is received in the context of a display page of a calling application. A service a call comprising a filtered set of data values derived from the display page is sent to an external service. A request associated with the companion application is received from the external service and used to invoke the companion application.
Techniques to provide access to file system information are disclosed. In various embodiments, an indication that a user input associated with creating a local copy of a file system object has been received is received at a file system client. The file system client determines that a user-driven pre-fetch option has been set with respect to the file system object. The file system client pre-fetches content data associated with the file system object, based at least in part on the determination that the pre-fetch option has been set with respect to the file system object.
Projecting resource allocations to achieve specified application operation times in a virtually provisioned environment is described. A system identifies a time period associated with an average of application operation times. The system calculates a resource ratio based on a resource allocated to a number of application operations associated with the time period divided by the number of application operations associated with the time period. The system calculates a projected resource allocation based on a projected number of application operations multiplied by the resource ratio. The system outputs the projected resource allocation to assist in resource management.
A multi-tier storage system is provided that employs a burst buffer middleware appliance for batch messaging. An exemplary multi-tier storage system comprises at least first and second storage tiers comprising storage for storing data; and at least one burst buffer appliance, wherein the at least one burst buffer appliance comprises an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device in at least one of the first and second storage tiers, wherein the at least one persistent storage device provides a list application programming interface, wherein the software interface module provides a batch operation comprised of a plurality of individual operations to the at least one persistent storage device using an aggregated message. The batch operation optionally comprises a batch operation for processing metadata. A burst buffer appliance is also provided for implementing the batch messaging techniques described herein.
Systems and methods are disclosed that advertise and expose a SCSI disk device type to a client computer or virtual machine, the disk device type acting as a transport for SCSI commands to/from a storage appliance over a Fiber Channel network. Each SCSI command is transported in one or more Fiber Channel frames. A virtual machine can write data to the storage appliance using through a disk opened with the disk device type. Data written through the disk can be deduplicated and/or compressed before storage on the storage appliance. The SCSI disk device type can support SCSI pass-through mode, virtual RDM, or physical RDM.
Techniques are provided for content-aware storage tiering techniques within a job scheduling system. A data node in a job scheduling environment receives at least one job to be executed for a portion of a larger logical file, and notifies one or more sibling data nodes to prefetch one or more related portions of the larger logical file. A write operation performed by an application client to store data on the data node is optionally intercepted at the data node and the associated data is stored in a performance storage tier of the data node. The data is optionally moved from the performance storage tier to a capacity storage tier if one or more predefined eviction criteria are satisfied. Data objects to be evicted are selected based on an anticipated future access of the data objects. The eviction selection is optionally based on grey box knowledge of the application client and/or information obtained from the application client.
G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
G06F 12/0831 - Cache consistency protocols using a bus scheme, e.g. with bus monitoring or watching means
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
70.
Security alerting system with dynamic buffer size adaptation
A Security Alerting System is provided with dynamic buffer size adaptation. An alert message from a Security Alerting System indicating a potential compromise of a protected resource is transmitted by obtaining the alert message from the Security Alerting System; authenticating the alert message using a secret key known by a server, wherein the secret key evolves in a forward-secure manner; storing the authenticated alert message in a buffer, wherein a size of the buffer is based on a connection history of the Security Alerting System; and transmitting the buffer to the server. The alert message can optionally be encrypted. The buffer can be increased in proportion to a duration of a disruption of a connection. The size of the buffer can be increased by adding buffer slots at a location of a current write pointer index. Techniques are also disclosed for detecting truncation attacks and alert message gaps. The alert messages can have a variable size by writing alert message into consecutive buffer slots.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Composable action flows are disclosed. In various embodiments, a definition of one or more processing steps comprising an action flow is received. A definition of one or more transitions between processing steps comprising the action flow is received. The processing step and transition definitions are used to generate programmatically application code to implement the action flow.
Improved techniques are provided for storing bursty data, such as checkpoints, in parallel computing environments. A parallel file system is provided comprising at least first and second storage tiers comprising respective disjoint subsets of storage; and at least one processing device configured to store burst data from a plurality of distributed processes for a given burst operation during the given burst operation on both of the at least first and second storage tiers. The given burst operation comprises a multi-phase input/output (IO) task, such as a checkpoint, having alternating periods of idle time and bursts of write and/or storage activity. A method is also provided for provisioning a parallel file system by obtaining a specification of burst data requirements for the parallel file system and determining an amount of storage required for at least first and second storage tiers comprising respective disjoint subsets of storage to satisfy the burst data requirements.
Example embodiments of the present invention relate to a method, a system, and a computer program product for leveraging secondary storage for primary storage snapshots. The method includes creating a current first snapshot of a volume at a current first time in a primary storage. The method then may determine differences between the current first snapshot at the current first time and a previous second snapshot created at a previous second time. The differences then may be sent to a secondary storage.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
G06F 3/06 - Digital input from, or digital output to, record carriers
74.
Scalable alerter for security information and event management
A methodology and related system operable to store a plurality of complex event processing (CEP) rules, the CEP rules being based on a plurality of events that are to be monitored. The CEP rules are pre-processed by, e.g., generating and storing a de-duplicated list of events from the plurality of events that are to be monitored. A received event from a received event stream is compared to events in the de-duplicated list of events and when a match between the received event (e.g., an event instance) and any one of the events in the de-duplicated list of events is detected, the received event (the event instance) is stored in an input repository. The plurality of CEP rules are then applied to the received event in the input repository, and any other previously stored events in the input repository.
Example embodiments of the present invention provide a method, an apparatus, and a computer program product for message based security audit logging. The method includes receiving an event notification related to an event in a storage resource management service, processing the event notification according to a messaging fabric and an ontology model, and, according to the processed event notification, persisting an audit log entry corresponding to the event.
A processing device comprises a processor coupled to a memory and implements a secure container for accessing data over a network. The secure container is configured to interact with backend infrastructure of an enterprise in order to provide secure access to enterprise data at the processing device. The secure container may be configured in accordance with an access model that implements multiple-factor authentication in combination with active directory authentication. The backend infrastructure may comprise, for example, a threat management gateway and an application control engine coupled to the threat management gateway and configured to support the multi-factor authentication, as well as additional components such as an active directory, a data loss prevention engine adapted to process communications between the backend infrastructure and the secure container, and a proxy server providing access to a content adaptation server configured to filter communications received from the processing device.
Techniques to reduce database fragmentation are disclosed. In various embodiments, an indication is received to store an attribute value for an entity that has a row or other entry in a first database table, wherein the first database table does not have a column for the attribute. It is determined that the value corresponds to a mapped value that is associated with not having an entry in a separate, second database table configured to store the attribute. Entries are made in the second database table only for values of the attribute other than the mapped value. Application level software code is configured to associate absence of a row in the second database table with the mapped value for the attribute.
A method and system for recovering a corrupt storage system is discussed. A request to recover the system may be received. A backup snapshot for the last point-in-time the system was stable may be synthesized. A difference may be identified between that backup snapshot and the current system. The difference may be transmitted to the corrupt system to recover the data.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
79.
Integration engine for communications between source and target applications
An integration engine is provided for communications between source and target applications. A message is sent from a source application to a target application, by processing a header element to route the message to the target application; transforming a message format of the message to a different message format; storing the message payload using a Claim-Check Enterprise Application Integration (EAI) pattern; and providing the transformed message to the target application. Transport adapters optionally transform a message format of the message to a different message format, such as a message format of the source application being transformed to a message format of the target application. The header element is optionally updated using a channel interceptor to update a next endpoint in a flow based on one or more business rules applied to the message payload. The header element can be processed by a header-based router that routes the message to a next endpoint in a flow. The exemplary integration engine is based on a Spring Integration Framework.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
80.
TECHNIQUES FOR ACCURATELY APPRISING A USER OF PROGRESS IN BOOTING A VIRTUAL APPLIANCE
A method, performed by a computing device, includes (a) building a data structure that describes dependence relationships between components of a virtual appliance, the components comprising respective computational processes which may be invoked during booting, a dependence relationship indicating that one component must complete before a second component may be invoked, (b) identifying, with reference to the data structure and an essential set of components which were pre-defined to be essential to the virtual appliance, a set of components that must complete for booting to be considered finished, and, after identifying the required set of components, repeatedly (c) querying each required component for its respective completion status, (d) calculating an estimated completion percentage for booting the virtual appliance with reference to the respective completion statuses of each required component versus all required components, and (e) displaying an indication of the completion percentage to a user via a user interface.
A technique for managing SSDs in a data storage system generates an endurance value for each of multiple SSDs and arranges the SSDs in RAID groups based at least in part on the generated endurance values. As a result of such arranging, some RAID groups may include only SSDs with higher endurance values while other RAID groups may include only SSDs with lower endurance values. The data storage system may then run RAID groups with higher endurance values at higher speeds and may run RAID groups with lower endurance values at lower speeds.
Improved multi-tier data storage is provided using inclusive/exclusive burst buffer caching techniques based on reference counts. An exemplary multi-tier storage system comprises at least first and second storage tiers for storing data, wherein at least one of the first and second storage tiers comprises at least one cache, and wherein the data is retained in the at least one cache as a given cached data item based on a reference count indicating a number of expected requests for the given cached data item. The number of expected requests for the given cached data item in a given cache is based, for example, on a number of nodes serviced by the given cache. A burst buffer appliance is also provided for implementing the cache retention policies described herein.
A service to invoke a companion application or service is disclosed. In various embodiments, an indication to invoke a companion application is received in the context of a display page of a calling application. A service a call comprising a filtered set of data values derived from the display page is sent to an external service. A request associated with the companion application is received from the external service and used to invoke the companion application.
Composable action flows are disclosed. In various embodiments, a definition of one or more processing steps comprising an action flow is received. A definition of one or more transitions between processing steps comprising the action flow is received. The processing step and transition definitions are used to generate programmatically application code to implement the action flow.
A System, Computer Program Product, and Computer-executable method for managing cache de-staging on a data storage system wherein the data storage system provides a Logical Unit (LU), the System, Computer Program Product, and Computer-executable method including dividing the LU into two or more extents, analyzing each of the two or more extents, creating a cache de-staging policy based on the analysis, and managing cache de-staging of the LU based the cache de-staging policy.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 12/128 - Replacement control using replacement algorithms adapted to multidimensional cache systems, e.g. set-associative, multicache, multiset or multilevel
A system method and program product for data replication comprising based on metadata, creating a mapping of pending IO to a logical storage medium and changing a mapping of the logical storage medium to tiered storage mediums to optimize the pending IO to the logical storage medium.
Techniques of backing up data stored on host computing devices involve selecting a backup server from among multiple servers on which to back up host data based on a measure of commonality between the host data and data stored in the backup servers. Prior to sending data for backup, a host sends a set of host data representations to a backup system. Each host data representation is based on a respective hash value computed from a respective block of the host data. The backup system compares the set of host data representations with server data representations for each backup server and computes a commonality score for each backup server. The backup system then selects a backup server on which to place the host data based at least in part on the commonality scores. Host data are then directed to the selected backup server for backup.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 17/30 - Information retrieval; Database structures therefor
Embodiments are directed to a method performed by a computing device. The method includes (a) receiving, by the computing device, a stream of storage management commands directed at logical disks hosted by a DSS, the logical disks being accessible to VMs running on a remote host, each storage management command having a command type of a plurality of command types, each command type of the plurality of command types having a respective timeout period, (b) placing the storage management commands of the stream into a VM storage management queue stored on the computing device, and (c) selectively dequeueing storage management commands stored in the VM storage management queue to be performed by the DSS, wherein selectively dequeueing includes applying a set of dequeueing criteria, the set of dequeueing criteria including a criterion that selects storage management commands from the VM storage management queue according to their respective command types.
Containerized security is disclosed. An indication is received that a content item included in a body of managed content is associated with a container. A security measure is associated with the content item, based at least in part on the association of the content item with the container, that causes access to the content item by a user who is not associated with the container but who otherwise would have access to the content item within the body of managed content to be denied.
A system for automatic setting of system security comprises an input interface and a processor. The input interface is configured to receive an indication to set a secure mode. The processor is configured to: determine whether the indication to set the secure mode comprises an indication to set a certificate mode; in the event that the indication to set the secure mode comprises an indication to set a certificate mode: 1) detect one or more connected systems for which to set the certificate mode; 2) select one or more certificates for the certificate mode; 3) update initialization files for the certificate mode; and 4) reinitialize local and one or more connected systems.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
A method, system, and computer program product for intercepting communication between a virtual machine and an encrypted replication data stored on a storage medium and redirecting the communication to a remote replication appliance and using a key stored on the remote replication appliance to enable the virtual machine to facilitate communication with the encrypted replication data stored on the storage medium, wherein facilitating communication enables the virtual machine to interact with the encrypted replication data as unencrypted data.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/73 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
92.
Non-disruptive load-balancing of virtual machines between data centers
A method, system and program product for enabling migration of Virtual Machines with concurrent access to data across two geographically disperse sites to enable load balancing across the two geographically disperse sites, by presenting over a network a read writable logical volume at a first site, presenting over a network a read writable logical volume at a second geographically disparate site; wherein the first volume and the second volume are configured to contain the same information, and enabling read write access to the volume at the first site or the volume at the second site for a first virtual machine while keeping the data consistent between the two sites to enable transparent migration of the virtual machine to load balancing across the two sites according to at least one load balancing metric.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 15/167 - Interprocessor communication using a common memory, e.g. mailbox
G06F 15/177 - Initialisation or configuration control
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
Systems and methods for efficient deduplication and/or provisioning of LUNs are disclosed. A first unique data block pool for a first LUN of a plurality of deduplicated LUNs is accessed, the first unique data block pool comprising a first plurality of unique data blocks for representing data stored on the first LUN. A second unique data block pool for a second LUN of the plurality of LUNs is accessed, the second unique data block pool comprising a second plurality of unique data blocks for representing data stored on the second LUN. It is determined a correspondence metric for the first unique data block pool and the second unique data block pool exceeds a predetermined threshold. The first LUN and the second LUN are joined to form a first combined LUN. The first unique data block pool and the second unique data block pool are joined.
A computer-implemented method, computer program product, and computing system for receiving a unique identifier on a client electronic device. The unique identifier is associated with at least one IT component. Status information is obtained concerning the at least one IT component. A visual representation of the at least one IT component is generated on a display screen of the client electronic device. A graphical representation of the status information is superimposed onto the visual representation of the at least one IT component.
G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
G06F 3/06 - Digital input from, or digital output to, record carriers
G09G 5/397 - Arrangements specially adapted for transferring the contents of two or more bit-mapped memories to the screen simultaneously, e.g. for mixing or overlay
G06T 19/00 - Manipulating 3D models or images for computer graphics
95.
Capacity exhaustion prevention for distributed storage
Systems and processes to prevent storage capacity exhaustion within distributed storage systems using chunk-based storage. The systems and processes control capacity by classifying various types of storage chunks into groups and impose used capacity thresholds on chunk groups.
Methods, systems, and computer readable mediums for optimizing a system configuration are disclosed. In some examples, a method includes determining whether a system configuration for executing a workload using a distributed computer system is optimizable and in response to determining that the system configuration is optimizable, modifying the system configuration such that at least one storage resource for storing workload data is located at a server node that is executing the workload in the distributed computer system.
In one aspect, a method includes receiving a read or write command from a requester to read data from or write data to a database, inserting in a status message on a status of the read or write command an identifier to identify technology of storage for the data and providing the status message associated with the read or write command to the requester.
Developer-composed custom application session parameters are disclosed. In various embodiments, a definition of a custom application session parameter is received via a software development tool user interface. Application code to store and manage the custom application session parameter, including by making the custom application parameter available across a plurality of application user interface pages, is generated programmatically based at least in part on the definition.
G06F 8/35 - Creation or generation of source code model driven
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
99.
Dynamically switching between synchronous and asynchronous replication
In a system comprising a production environment and a replication environment, a method and program product for dynamically switching from an asynchronous replication policy to a synchronous replication policy. In a system comprising a production environment and a replication environment, a method for dynamically switching from a synchronous replication policy to an asynchronous replication policy.
Synchronization stateless process execution is disclosed. In various embodiments, an indication is received that an instance of a process with respect to which stateless execution is being performed is to enter a block of the process with respect to which synchronization with one or more other instances of the process is to be provided. A current turn to perform the block with respect to which synchronization is to be provided is secured on behalf of the process instance. The block with respect to which synchronization is to be provided is allowed to be performed by the process instance.
G06F 9/44 - Arrangements for executing specific programs
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs