Patent application number | Description | Published |
20100169476 | METHOD AND SYSTEM FOR DETECTING AND REDUCING BOTNET ACTIVITY - A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared to a threshold value and an alert is generated if the persistence value is greater than the threshold value. Known safe destinations may be entered into a whitelist. | 07-01-2010 |
20110202997 | METHOD AND SYSTEM FOR DETECTING AND REDUCING BOTNET ACTIVITY - A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared to a threshold value and an alert is generated if the persistence value is greater than the threshold value. Known safe destinations may be entered into a whitelist. | 08-18-2011 |
20130212690 | PRIVATE DECAYED SUM ESTIMATION UNDER CONTINUAL OBSERVATION - Described herein is a method and system for providing privacy guarantees with an improved privacy-accuracy trade-off. Dynamic data can be accessed from a database. A sum model is selected from window sum, exponential decay sum, and polynomial decay sum. An algorithm is initiated that produces polylogarithmic bounded error in the range of a sum function associated with the selected sum model and independent of time steps. The data can be assembled in a dyadic tree structure. A non-linearity component can be added to nodes of the dyadic tree structure. For example, this can be a noise components or a weight applied to the update. This can be done, for example, to different nodes differently. Differential private estimators can be constructed for fixed steps of time. The differential private estimators can be applied to a query means or filtering system to enhance privacy protection from potential adversaries. | 08-15-2013 |
20140379516 | CONTEXT BASED RECOMMENDER SYSTEM - A method and system for a context based search recommendations is provided. A context based search can be facilitated for the construction of cold start recommender systems. Contextual information can be mined from review texts from sources such as websites, and analyzed for common traits per context group. From this context information the most applicable reviews for the user can be provided. One embodiment provides a method for providing recommendations. The method includes the steps of preprocessing one or more reviews based on features of the one or more reviews, obtaining context information about user; and determining score for user based on obtained user context information and features of the one or more reviews. | 12-25-2014 |
20150112812 | METHOD AND APPARATUS FOR INFERRING USER DEMOGRAPHICS - A method to determine demographic information of a new user utilizing only ratings includes training an inference engine informed with a training data set which includes ratings and demographic information from a plurality of other users. The new user inputs ratings, such as movie ratings, and an inference engine determines demographic information of the new user. The demographic information of the new user can then be used to provide recommendations or to provide targeted advertisements to the new user. | 04-23-2015 |
20150339493 | PRIVACY PROTECTION AGAINST CURIOUS RECOMMENDERS - A method and apparatus for protecting user privacy in a recommender system are described including determining what information to release to a user for a movie, transmitting the information to the user, accepting obfuscated input from the user and estimating the user's non-private feature vector. Also described are a method and apparatus for protecting user privacy in a recommender system including receiving movie information, accepting a user's movie feedback, accepting user's private information, calculating an obfuscation value and transmitting the obfuscation value. | 11-26-2015 |
20150381349 | PRIVACY-PRESERVING RIDGE REGRESSION USING MASKS - A method and system for privacy-preserving ridge regression using masks is provided. The method includes the steps of requesting a garbled circuit from a crypto service provider, collecting data from multiple users that has been formatted and encrypted using homomorphic encryption, summing the data that has been formatted and encrypted using homomorphic encryption, applying prepared masks to the summed data, receiving garbled inputs corresponding to prepared mask from the crypto service provider using oblivious transfer, and evaluating the garbled circuit from the crypto service provider using the garbled inputs and masked data. | 12-31-2015 |
20160036584 | PRIVACY-PRESERVING RIDGE REGRESSION USING PARTIALLY HOMOMORPHIC ENCRYPTION AND MASKS - A method and system for privacy-preserving ridge regression using partially homomorphic encryption and masks is provided. The method includes the steps of requesting a garbled circuit from a crypto service provider, collecting data from multiple users that has been formatted and encrypted using partially homomorphic encryption, summing the data that has been formatted and encrypted using partially homomorphic encryption, applying a prepared masks to the summed data, receiving garbled inputs corresponding to prepared mask from the crypto service provider using oblivious transfer, and evaluating the garbled circuit from the crypto service provider using the garbled inputs and masked data. | 02-04-2016 |