CPC

Business Methods & Fintech

49 patents in CPC class G06Q

15 Patents
0 Views
Updated 3/29/2026

Top Patents

Aspects of the present invention relate to computer processes adapted to identify influencers and other users interested in certain topics and uses thereof.

Disclosed herein are system, method, and computer program product embodiments for sharing of collaborative documents with users via instant messaging. In one aspect, a collaborative application is configured to display one or more user interfaces associated with a collaborative application that allows a user to engage in a real-time chat between and among one or more users. The collaborative application may also present one or more user interfaces that allow the user to select one or more references of collaborative documents stored at a remote document datastore, and then share these references of collaborative documents with one or more users in the real-time chat. In one example, these references may be represented in real-time chat as a user interface element that visually present the collaborative document title and associated collaborative document pictogram or icon.

A method for generating enterprise cyber reports through linking IP access control logic with error handler and audits compartmentalized by web application for different user groups with multiple monitoring tools data. Business logic may be defined in access control tables for multiple user groups sharing multiple different application data and programmable access control logic applied to subfolders within the website subfolders based on functional user group role permissions. A common network event field name may be used to map multiple different monitoring tools data into common field alias. The field alias mapping allows multiple networking capture tools to be included within the same cyber report. Joining multiple network events field alias with an IP location allows for groups of different IP zone reports to be created within the enterprise being monitored by different monitoring tools.

Systems and methods are provided to build a machine learned exploitability risk model that predicts, based on the characteristics of a set of machines, a normalized risk score quantifying the risk that the machines are exploitable by a set of attacks. To build the model, a training dataset is constructed by labeling characteristic data of a population of machines with exploitation test results obtained by simulating a set of attacks on the population. The model is trained using the training data to accurately predict a probability that a given set of machines is exploitable by the set of attacks. In embodiments, the model may be used to make quick assessments about how vulnerable a set of machines are to the set of attacks. In embodiments, the model may be used to compare the effectiveness of different remediation actions to protect against the set of attacks.

Methods, systems, and apparatus are described providing networking engines. Specifically, the present specification relates to a method for implementing software containers implementing network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some implementations, the containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.

A system and method measuring data, from user devices, regarding user interactions with a Software-as-a-Service (SaaS) product installed in each of the user devices, using a measurement module in the processor to generate measured data. The measured data is then modeled as a graph, using a graphing application in the processor, wherein the graph includes a plurality of varying metrics, each representing different attributes of a structure of the graph. A viral effectiveness index (VEI) as a single metric summarizing core graph attributes of the graph is determined from the plurality of the varying metrics of the graph using a viral effectiveness index (VEI) module in an analytics application in the processor.

Explore More Patents

Discover additional patents in the cpc category

Browse All Patents