Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and Method for Generation of a Heuristic

a heuristic and system technology, applied in the field of system and method for generating heuristics, can solve the problems of not always enough time for a threat to be found and analyzed, defeated or circumvented, and cost prohibitive to put such defenses in a typical business network at all entry points

Inactive Publication Date: 2015-08-06
SPARKCOGNITION INC
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a method and computer system for creating a heuristic that can identify data patterns. This heuristic works with a cognitive fingerprinting method to identify and respond to pre-defined goals by analyzing system data. The method involves extracting data from multiple sources, organizing the data into a geometric structure, grouping parts of the data into sub-structures, identifying trends in those sub-structures, and outputting the heuristic as a combination of unique elements and trends. This allows for the identification of data patterns and improved efficiency and accuracy in detecting abnormal events in computer systems.

Problems solved by technology

However, there is not always enough time for a threat to be found and analyzed, a signature engineered, and an update delivered to users before they are targeted.
Thus, there exists a need to detect the scenario where legitimate login credentials are being utilized by unauthorized persons, particularly when the theft of data is “subtle” and occurs over a period of time.
Multi-factor authentication schemes such as retina and fingerprint scans address the issue of validating identity, however they can be defeated or circumvented when an authorized user indulges in unauthorized removal or theft of information.
Additionally, it can be cost-prohibitive to put such defenses in a typical business network at all entry points, such as desktop computers, mobile endpoints and Thin clients.
Recently, there have been a number of high-profile incidents where an authorized user engages in behavior beyond the scope of their authorization and subsequently steals and releases confidential information.
While access control limitations such as attaching permissions to data exist, these protections do not protect widespread data theft when a user has legitimate access to the data.
But in practice, this generality can impose penalties in the form of slower learning processes and the necessity of creating “deep” structures in order to capture enough pattern information that would allow the system to deliver meaningful results and subsequent recognition.
In many instances, approaches like ILP lack flexibility because they require a lot of domain specific information, customization and may not scale to handle variations of problems from adjacent domains.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and Method for Generation of a Heuristic
  • System and Method for Generation of a Heuristic
  • System and Method for Generation of a Heuristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015]The following description is provided to assist in a comprehensive understanding of exemplary embodiments of the invention as defined by the claims and their equivalents. It includes various specific details to assist in that understanding; however these specific details are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention.

[0016]FIG. 1 is a block diagram of a heuristic generation process according to an exemplary embodiment of the present invention. Referring now to FIG. 1, data from which a heuristic will be generated is obtained at step 110. Data can be obtained from a user computer system, a wireless phone, a network server, and can arrive or be extracted from multiple data sources, implementing multiple formats, etc. The data is assessed for unique elements associated therewith ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for generating a heuristic is provided. A heuristic is capable of identifying data patterns. The method includes: extracting a data set from multiple input sources; creating a set of unique elements used across the data set; organizing the data set into a geometric structure; grouping portions of the data in the geometric structure into a plurality sub geometric structures; determining base attributes for each sub geometric structure using the set of unique elements; identifying trends in the base attributes among the sub geometric structures; and outputting the heuristic as a combination of the base attributes and the trends.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to a system and method for generating a heuristic that is capable of identifying data patterns. More particularly, the present invention relates to a system and method for automatically creating a heuristic to be used in conjunction with a cognitive fingerprinting system and method.[0003]2. Description of the Related Art[0004]In the security field, most anti-virus (AV) products rely on pre-computed signatures to identify viruses and threats. However, there is not always enough time for a threat to be found and analyzed, a signature engineered, and an update delivered to users before they are targeted.[0005]Similarly, methods are needed to prevent data theft by unauthorized users. For example, if login credentials for an individual user fall into unauthorized hands, the party possessing these credentials may be able to log into a system or network for which these credentials provide access, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06N99/00
CPCG06N99/005G06N5/025G06N5/01G06N5/047
Inventor HUSAIN, SYED MOHAMMAD AMIR
Owner SPARKCOGNITION INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products