Movatterモバイル変換


[0]ホーム

URL:


US20220292427A1 - Alert Actioning and Machine Learning Feedback - Google Patents

Alert Actioning and Machine Learning Feedback
Download PDF

Info

Publication number
US20220292427A1
US20220292427A1US17/694,293US202217694293AUS2022292427A1US 20220292427 A1US20220292427 A1US 20220292427A1US 202217694293 AUS202217694293 AUS 202217694293AUS 2022292427 A1US2022292427 A1US 2022292427A1
Authority
US
United States
Prior art keywords
alert
scenario
user
present disclosure
violation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/694,293
Inventor
Jena Acuff
Brandon CARL
Uday KAMATH
Cory HUGHES
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Reasoning Systems Inc
Original Assignee
Digital Reasoning Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Reasoning Systems IncfiledCriticalDigital Reasoning Systems Inc
Priority to US17/694,293priorityCriticalpatent/US20220292427A1/en
Publication of US20220292427A1publicationCriticalpatent/US20220292427A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Some aspects of the present disclosure relate to systems, methods, and computer-readable media for configuring a conduct surveillance system. In one example implementation, a computer implemented method includes: receiving at least one alert from a conduct surveillance system, where the at least one alert represents a potential violation of a predetermined policy, where the predetermined policy includes a scenario, a target population, and a workflow; determining whether each of the at least one alert represents an actual violation of the predetermined policy; calculating a metric based on the actual violations and the potential violations where the metric includes a number of false positives associated with the at least one alert or the number of false negatives associated with the at least one alert; and changing at least one of the scenario, the target population, or the workflow based on the calculated metric.

Description

Claims (22)

What is claimed is:
1. A computer-implemented method, comprising:
receiving at least one alert from a conduct surveillance system, wherein the at least one alert represents a potential violation of a predetermined standard and wherein the conduct surveillance system generates the alerts in response to an electronic communication between persons matching a violation of a predetermined policy, wherein the predetermined policy comprises a scenario, a target population, and a workflow;
determining whether each of the at least one alert represents an actual violation of the predetermined policy;
calculating a metric based on the actual violations and the potential violations wherein the metric comprises a number of false positives associated with the at least one alert or the number of false negatives associated with the at least one alert; and
changing at least one of the scenario, the target population, or the workflow based on the calculated metric.
2. The computer implemented method ofclaim 1, wherein the scenario comprises a machine learning classifier, and wherein determining whether the at least one alert represents an actual violation comprises labeling the at least one alert and using the labeled at least one alert to train the machine learning classifier.
3. The computer implemented method ofclaim 1, wherein the metric is displayed to a user.
4. The computer implemented method ofclaim 1, wherein the scenario comprises a lexicon, and wherein the lexicon represents one or more terms or regular expressions.
5. The computer implemented method ofclaim 1, wherein changing the scenario comprises changing the lexicon by adding or removing terms or regular expressions from the lexicon.
6. The computer implemented method ofclaim 1, wherein, in response to determining that the at least one alert represents an actual violation, actioning the alert.
7. The computer implemented method ofclaim 6, wherein actioning the alert comprises receiving a user input from the user interface representing whether the at least one alert represents an actual violation.
8. The computer implemented method ofclaim 1, wherein the target population comprises a domain exclusion list and wherein changing the target population comprises changing the domain exclusion list.
9. The computer implemented method ofclaim 1, wherein the electronic communication comprises metadata, the scenario comprises rules for filtering the electronic communication based on the metadata, and wherein changing the scenario comprises changing the rules for filtering the electronic communications based on the metadata.
10. A system, comprising:
at least one processor;
at least one memory storing computer readable instructions configured to cause the at least one processor to perform functions for creating and/or evaluating models, scenarios, lexicons, and/or policies, wherein the functions include:
receiving data associated with at least one of text data, model training, lexicons, scenarios, and policies, wherein the functions for creating and/or evaluating models comprise creating at least one scenario based on at least one of the models, lexicons, and non-language features;
creating one or more policies mapping to the at least one scenario and a population;
upon receiving an alert that a policy match occurs, triggering an alert indicating, to a user, that a policy match has occurred which requires a user action, wherein a policy corresponds to actions that violate at least one of a combination of signals and metrics, a population, and workflow.
11. The system ofclaim 10, wherein the model training comprises training at least one model configured to analyze the text data from one or more electronic communications between at least two persons.
12. The system ofclaim 10, wherein the user action comprises review and interaction by a user via a user interface.
13. The system ofclaim 10, wherein the model training comprises evaluating the model against established datasets.
14. The system ofclaim 10, wherein the alert to the user is evaluated by the user and a corresponding user decision is made to confirm or deny accuracy of the alert.
15. The system ofclaim 14, wherein the user decision is provided into a feedback loop, and wherein the feedback loop is configured to improve the model training.
16. The system ofclaim 15, wherein the user decision is provided into the feedback loop and wherein the feedback loop is configured to improve the lexicons, scenarios, or policies.
17. The system ofclaim 16, wherein the feedback loop is configured to change a lexicon.
18. The system ofclaim 17, wherein changing the lexicon comprises configuring the lexicon so that it includes or excludes terms or regular expressions.
19. The system ofclaim 15, wherein the feedback loop is configured to measure the rate of false positives and to change one or more of the lexicons, scenarios, and policies based on the rate of false positives.
20. The system ofclaim 15, wherein the scenario includes Boolean operators, and wherein the feedback loop is configured to change one or more of the Boolean operators.
21. The system ofclaim 16, wherein the feedback loop is configured to monitor the rate of false positives over a period of time, and change one or more of the lexicons, scenarios, and policies based on the rate of false positives over the period of time.
22. A non-transitory computer-readable medium storing instructions which, when executed by at least one processor of a computer, perform functions that include:
receiving at least one alert from a conduct surveillance system, wherein the at least one alert represents a potential violation of a predetermined standard and wherein the conduct surveillance system generates the alerts in response to an electronic communication between persons matching a violation of a predetermined policy, wherein the predetermined policy comprises a scenario, a target population, and a workflow;
determining whether each of the at least one alert represents an actual violation of the predetermined policy;
calculating a metric based on the actual violations and the potential violations wherein the metric comprises a number of false positives associated with the at least one alert or the number of false negatives associated with the at least one alert; and
changing at least one of the scenario, the target population, or the workflow based on the calculated metric.
US17/694,2932021-03-132022-03-14Alert Actioning and Machine Learning FeedbackAbandonedUS20220292427A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/694,293US20220292427A1 (en)2021-03-132022-03-14Alert Actioning and Machine Learning Feedback

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US202163160780P2021-03-132021-03-13
US202163162829P2021-03-182021-03-18
US17/694,293US20220292427A1 (en)2021-03-132022-03-14Alert Actioning and Machine Learning Feedback

Publications (1)

Publication NumberPublication Date
US20220292427A1true US20220292427A1 (en)2022-09-15

Family

ID=83193774

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US17/694,283Active2044-01-18US12412143B2 (en)2021-03-132022-03-14Systems and methods for creating, training, and evaluating models, scenarios, lexicons, and policies
US17/694,293AbandonedUS20220292427A1 (en)2021-03-132022-03-14Alert Actioning and Machine Learning Feedback

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US17/694,283Active2044-01-18US12412143B2 (en)2021-03-132022-03-14Systems and methods for creating, training, and evaluating models, scenarios, lexicons, and policies

Country Status (4)

CountryLink
US (2)US12412143B2 (en)
EP (2)EP4305812A4 (en)
CA (2)CA3211911A1 (en)
WO (2)WO2022197614A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220382974A1 (en)*2021-05-272022-12-01Electronics And Telecommunications Research InstituteCrime type inference system and method based on text data
US20230418971A1 (en)*2022-06-242023-12-28Capital One Services, LlcContext-based pattern matching for sensitive data detection
US20240177094A1 (en)*2022-11-302024-05-30Bank Of America CorporationAutomatic Alert Dispositioning using Artificial Intelligence
WO2025064529A1 (en)*2023-09-182025-03-27Digital Reasoning Systems, Inc.Enhanced detection of violation conditions using large language models

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6831663B2 (en)*2001-05-242004-12-14Microsoft CorporationSystem and process for automatically explaining probabilistic predictions
US20060136419A1 (en)*2004-05-172006-06-22Antony BrydonSystem and method for enforcing privacy in social networks
US20100269175A1 (en)*2008-12-022010-10-21Stolfo Salvatore JMethods, systems, and media for masquerade attack detection by monitoring computer user behavior
US20110161069A1 (en)*2009-12-302011-06-30Aptus Technologies, Inc.Method, computer program product and apparatus for providing a threat detection system
US20120191531A1 (en)*2010-12-272012-07-26Yahoo! Inc.Selecting advertisements for placement on related web pages
US20120254333A1 (en)*2010-01-072012-10-04Rajarathnam ChandramouliAutomated detection of deception in short and multilingual electronic messages
US8407786B1 (en)*2008-06-192013-03-26Mcafee, Inc.System, method, and computer program product for displaying the rating on an electronic mail message in a user-configurable manner
US9923931B1 (en)*2016-02-052018-03-20Digital Reasoning Systems, Inc.Systems and methods for identifying violation conditions from electronic communications

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7543053B2 (en)*2003-03-032009-06-02Microsoft CorporationIntelligent quarantining for spam prevention
US8494977B1 (en)*2007-09-282013-07-23Emc CorporationIT policy violation views
US9032531B1 (en)*2012-06-282015-05-12Middlegate, Inc.Identification breach detection
US10404745B2 (en)*2013-08-302019-09-03Rakesh VermaAutomatic phishing email detection based on natural language processing techniques
US20200067861A1 (en)*2014-12-092020-02-27ZapFraud, Inc.Scam evaluation system
US20180041532A1 (en)*2016-08-032018-02-08Roblox CorporationSystem for Handling Communicated Threats
WO2018111933A1 (en)*2016-12-122018-06-21K&M Bristol Holdings, LLCElectronic device and computer application monitoring, alert, and intervention system and method
US11030184B2 (en)*2017-05-042021-06-08Jpmorgan Chase Bank, N.A.Systems and methods for database active monitoring
US10956670B2 (en)*2018-03-032021-03-23Samurai Labs Sp. Z O.O.System and method for detecting undesirable and potentially harmful online behavior

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6831663B2 (en)*2001-05-242004-12-14Microsoft CorporationSystem and process for automatically explaining probabilistic predictions
US20060136419A1 (en)*2004-05-172006-06-22Antony BrydonSystem and method for enforcing privacy in social networks
US8407786B1 (en)*2008-06-192013-03-26Mcafee, Inc.System, method, and computer program product for displaying the rating on an electronic mail message in a user-configurable manner
US20100269175A1 (en)*2008-12-022010-10-21Stolfo Salvatore JMethods, systems, and media for masquerade attack detection by monitoring computer user behavior
US20110161069A1 (en)*2009-12-302011-06-30Aptus Technologies, Inc.Method, computer program product and apparatus for providing a threat detection system
US20120254333A1 (en)*2010-01-072012-10-04Rajarathnam ChandramouliAutomated detection of deception in short and multilingual electronic messages
US20120191531A1 (en)*2010-12-272012-07-26Yahoo! Inc.Selecting advertisements for placement on related web pages
US9923931B1 (en)*2016-02-052018-03-20Digital Reasoning Systems, Inc.Systems and methods for identifying violation conditions from electronic communications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Feature selection strategies for spam e-mail filtering. Wang, Ren. Concordia University (Canada). ProQuest Dissertations Publishing, 2006. MR20756.*
Towards improving e-mail content classification for spam control: Architecture, abstraction, and strategies. Marsono, Muhammad Nadzir. University of Victoria (Canada). ProQuest Dissertations Publishing, 2007. NR37428.*

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220382974A1 (en)*2021-05-272022-12-01Electronics And Telecommunications Research InstituteCrime type inference system and method based on text data
US12169689B2 (en)*2021-05-272024-12-17Electronics And Telecommunications Research InstituteCrime type inference system and method based on text data
US20230418971A1 (en)*2022-06-242023-12-28Capital One Services, LlcContext-based pattern matching for sensitive data detection
US20240177094A1 (en)*2022-11-302024-05-30Bank Of America CorporationAutomatic Alert Dispositioning using Artificial Intelligence
WO2025064529A1 (en)*2023-09-182025-03-27Digital Reasoning Systems, Inc.Enhanced detection of violation conditions using large language models

Also Published As

Publication numberPublication date
WO2022197614A1 (en)2022-09-22
CA3211911A1 (en)2022-09-22
EP4305812A4 (en)2025-03-05
EP4305863A1 (en)2024-01-17
WO2022197606A3 (en)2022-12-29
WO2022197606A2 (en)2022-09-22
CA3211747A1 (en)2022-09-22
US20220292426A1 (en)2022-09-15
US12412143B2 (en)2025-09-09
EP4305863A4 (en)2025-02-12
EP4305812A2 (en)2024-01-17

Similar Documents

PublicationPublication DateTitle
US12299169B2 (en)Dynamic management of data with context-based processing
US11012466B2 (en)Computerized system and method for providing cybersecurity detection and response functionality
US20210150056A1 (en)System and Methods for Privacy Management
US20220292427A1 (en)Alert Actioning and Machine Learning Feedback
US11636213B1 (en)System and methods for reducing an organization's cybersecurity risk based on modeling and segmentation of employees
US11625602B2 (en)Detection of machine learning model degradation
US8161060B2 (en)Methods and systems for identifying, assessing and clearing conflicts of interest
US8966569B2 (en)Collaborative structured analysis system and method
US10884891B2 (en)Interactive detection of system anomalies
US20240121242A1 (en)Cybersecurity insider risk management
US11483322B1 (en)Proactive suspicious activity monitoring for a software application framework
US9304991B2 (en)Method and apparatus for using monitoring intent to match business processes or monitoring templates
US10700919B2 (en)System for decomposing events from managed infrastructures with semantic curvature
US20240330489A1 (en)Systems and Methods for Enforcing Data Governance Policies
HalderCrowdsourcing crisis management platforms: a privacy and data protection risk assessment and recommendations
US20200050956A1 (en)Modeling contract components and ecosystem activity
Lim et al.Social Media with Automated Moderation

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp