Patents by Inventor Kave Eshghi
Kave Eshghi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240314135Abstract: Content object operations over content objects of a content management system are prioritized to be performed immediately, or at a later time. The immediate scheduling of an operation is determined by policies, rules, and/or predictive model outcomes. The determination for later time scheduling is based on analysis of a history of events on content objects. If the content object operation is deemed to be at least potentially delayable to a later time, then a scheduling model is consulted to determine an urgency of performing the content object operation on the content object. The urgency value resulting from consulting the scheduling model is combined with then-current resource availability to determine a timeframe for performance of the content object operation on the content object relative to other entries in a continuously updated list of to-be-performed operations. The performance of the content object operation on the content object is initiated in due course.Type: ApplicationFiled: February 12, 2024Publication date: September 19, 2024Applicant: Box, Inc.Inventors: Victor De Vansa Vikramaratne, Kave Eshghi, David Vengerov
-
Publication number: 20240236130Abstract: Disclosed is an improved systems, methods, and computer program products that performs user behavior analysis to identify malicious behavior in a computing system. The approach may be implemented by generating feature vectors for two time periods, performing scoring, and then performing anomaly detection.Type: ApplicationFiled: October 23, 2023Publication date: July 11, 2024Applicant: Box, Inc.Inventors: Kave Eshghi, Victor De Vansa Vikramaratne
-
Publication number: 20240184918Abstract: Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.Type: ApplicationFiled: February 13, 2024Publication date: June 6, 2024Applicant: Box, Inc.Inventors: Victor De Vansa VIKRAMARATNE, Kave ESHGHI
-
Publication number: 20240163258Abstract: Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.Type: ApplicationFiled: October 23, 2023Publication date: May 16, 2024Applicant: Box, Inc.Inventor: Kave Eshghi
-
Publication number: 20240137379Abstract: Disclosed is an improved systems, methods, and computer program products that performs user behavior analysis to identify malicious behavior in a computing system. The approach may be implemented by generating feature vectors for two time periods, performing scoring, and then performing anomaly detection.Type: ApplicationFiled: October 22, 2023Publication date: April 25, 2024Applicant: Box, Inc.Inventors: Kave Eshghi, Victor De Vansa Vikramaratne
-
Patent number: 11941147Abstract: Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.Type: GrantFiled: August 31, 2021Date of Patent: March 26, 2024Assignee: Box, Inc.Inventors: Victor De Vansa Vikramaratne, Kave Eshghi
-
Patent number: 11936656Abstract: Content object operations over content objects of a content management system are prioritized to be performed immediately, or at a later time. The immediate scheduling of an operation is determined by policies, rules, and/or predictive model outcomes. The determination for later time scheduling is based on analysis of a history of events on content objects. If the content object operation is deemed to be at least potentially delayable to a later time, then a scheduling model is consulted to determine an urgency of performing the content object operation on the content object. The urgency value resulting from consulting the scheduling model is combined with then-current resource availability to determine a timeframe for performance of the content object operation on the content object relative to other entries in a continuously updated list of to-be-performed operations. The performance of the content object operation on the content object is initiated in due course.Type: GrantFiled: January 29, 2021Date of Patent: March 19, 2024Assignee: Box, Inc.Inventors: Victor De Vansa Vikramaratne, Kave Eshghi, David Vengerov
-
Patent number: 11928425Abstract: Methods, systems and computer program products for content management systems. A content management system is configured to manage a plurality of content objects. Unsupervised learning is performed over the plurality of content objects to identify document templates associated with content objects taken from the plurality of content objects. When a document template is identified, template metadata is associated with the document template. Additional content objects that are similar to the document template can take on the template metadata. In this way, many documents can be automatically populated with template metadata that corresponds to the identified document template. All or portions of the template metadata can be applied to policies, which policies serve to marshal ongoing document handling operations. During learning, document features are extracted and analyzed so as to define feature clusters, which feature clusters are in turn are used to form document template clusters.Type: GrantFiled: October 1, 2020Date of Patent: March 12, 2024Assignee: Box, Inc.Inventors: Kave Eshghi, Victor De Vansa Vikramaratne
-
Patent number: 11799835Abstract: Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.Type: GrantFiled: May 17, 2021Date of Patent: October 24, 2023Assignee: Box, Inc.Inventor: Kave Eshghi
-
Patent number: 11799890Abstract: Disclosed is an improved systems, methods, and computer program products that performs user behavior analysis to identify malicious behavior in a computing system. The approach may be implemented by generating feature vectors for two time periods, performing scoring, and then performing anomaly detection.Type: GrantFiled: September 30, 2020Date of Patent: October 24, 2023Assignee: Box, Inc.Inventors: Kave Eshghi, Victor De Vansa Vikramaratne
-
Publication number: 20230244811Abstract: Handling user-demanded privacy controls over data of an electronic document collaboration system. A storage facility is configured to store content objects and associated metadata that pertains to the content objects. A user raises a privacy action request that comprises a demand to change how certain content objects that contain personally identifiable information (PII) of the user are handled. A plurality of content objects are classified using a PII classifier that is trained using synthetically-generated training set entries where, rather than reading actual contents from electronic documents of the collaboration system to generate training set entries, instead, the training set entries are generated using words that are randomly selected from a repository of natural language words. When PII corresponding to the user who raised the privacy action request is discovered in content objects, then the content management system modifies those content objects and/or its metadata in accordance with the demand.Type: ApplicationFiled: January 31, 2022Publication date: August 3, 2023Applicant: Box, Inc.Inventors: Victor De Vansa Vikramaratne, Kave Eshghi, Thuy Nguyen, Alok Ojha
-
Patent number: 11709798Abstract: An example method is provided in according with one implementation of the present disclosure. The method comprises generating, via a processor, a set of hashes for each of a plurality of objects. The method also comprises computing, via the processor, a high-dimensional sparse vector for each object, where the vector represents the set of hashes for each object. The method further comprises computing, via the processor, a combined high-dimensional sparse vector from the high-dimensional sparse vectors for all objects and computing a hash suppression threshold. The method also comprises determining, via the processor, a group of hashes to be suppressed by using the hash suppression threshold, and suppressing, via the processor, the group of selected hashes when performing an action.Type: GrantFiled: October 13, 2021Date of Patent: July 25, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Mehran Kafai, Kave Eshghi, Omar Aguilar Macedo
-
Patent number: 11599561Abstract: Examples disclosed herein involve data stream analytics. In examples herein, a data stream may be analyzed by computing a set of hashes of a real-valued vector, the real-valued vector corresponding to a sample data object of a data stream; generating a list of data objects from a database corresponding to the sample data object based on the set of hashes, the list of data objects ordered based on similarity of the data objects to the sample data object of the data stream; and updating a data structure representative of activity of the sample data object in the data stream based on the list of data objects, the data structure to provide incremental analysis corresponding to the sample data object.Type: GrantFiled: April 29, 2016Date of Patent: March 7, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Mehran Kafai, April Slayden Mitchell, Kave Eshghi, Omar Aguilar, Hongwei Shang
-
Publication number: 20230064482Abstract: Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.Type: ApplicationFiled: August 31, 2021Publication date: March 2, 2023Applicant: Box, Inc.Inventors: Victor De Vansa VIKRAMARATNE, Kave ESHGHI
-
Publication number: 20220245477Abstract: Methods, systems, and computer program products for content management systems. An unlabeled dataset comprising documents that at least potentially comprise personally identifiable information (PII) is used when training a PII content classifier. Such a classifier is trained by (1) determining, based on applying a PII rule to a first portion of a document selected from the unlabeled dataset, a confidence value that the first portion of the document does contain personally identifiable information, (2) selecting a second portion of the document selected from the unlabeled dataset such that the second portion does not include the first portion; and (3) assigning, based on the confidence value, a likelihood value that corresponds to whether characteristics of the second portion are indicative that the document does contain personally identifiable information. Such a PII content classifier is used over selected portions of subject content objects to determine whether the selected portions contain PII.Type: ApplicationFiled: January 29, 2021Publication date: August 4, 2022Applicant: Box, Inc.Inventors: Kave Eshghi, Victor De Vansa Vikramaratne
-
Publication number: 20220108065Abstract: Methods, systems and computer program products for content management systems. A content management system is configured to manage a plurality of content objects. Unsupervised learning is performed over the plurality of content objects to identify document templates that are associated with content objects taken from the plurality of content objects. When a document template is identified, then template metadata is associated with the document template. Additional content objects that are similar to the document template can take on the template metadata as well. In this way, many documents can be automatically populated with template metadata that corresponds to the identified document template. All or portions of the template metadata can be applied to policies, which policies serve to marshal ongoing document handling operations. During learning, document features are extracted and analyzed so as to define feature clusters, which feature clusters are in turn are used to form document template clusters.Type: ApplicationFiled: October 1, 2020Publication date: April 7, 2022Applicant: Box, Inc.Inventors: Kave Eshghi, Victor De Vansa Vikramaratne
-
Publication number: 20220086518Abstract: Content object operations over content objects of a content management system are prioritized to be performed immediately, or at a later time. The immediate scheduling of an operation is determined by policies, rules, and/or predictive model outcomes. The determination for later time scheduling is based on analysis of a history of events on content objects. If the content object operation is deemed to be at least potentially delayable to a later time, then a scheduling model is consulted to determine an urgency of performing the content object operation on the content object. The urgency value resulting from consulting the scheduling model is combined with then-current resource availability to determine a timeframe for performance of the content object operation on the content object relative to other entries in a continuously updated list of to-be-performed operations. The performance of the content object operation on the content object is initiated in due course.Type: ApplicationFiled: January 29, 2021Publication date: March 17, 2022Applicant: Box, Inc.Inventors: Victor De Vansa Vikramaratne, Kave Eshghi, David Vengerov
-
Publication number: 20220066988Abstract: An example method is provided in according with one implementation of the present disclosure. The method comprises generating, via a processor, a set of hashes for each of a plurality of objects. The method also comprises computing, via the processor, a high-dimensional sparse vector for each object, where the vector represents the set of hashes for each object. The method further comprises computing, via the processor, a combined high-dimensional sparse vector from the high-dimensional sparse vectors for all objects and computing a hash suppression threshold. The method also comprises determining, via the processor, a group of hashes to be suppressed by using the hash suppression threshold, and suppressing, via the processor, the group of selected hashes when performing an action.Type: ApplicationFiled: October 13, 2021Publication date: March 3, 2022Inventors: Mehran Kafai, Kave Eshghi, Omar Aguilar Macedo
-
Patent number: 11169964Abstract: An example method is provided in according with one implementation of the present disclosure. The method comprises generating, via a processor, a set of hashes for each of a plurality of objects. The method also comprises computing, via the processor, a high-dimensional sparse vector for each object, where the vector represents the set of hashes for each object. The method further comprises computing, via the processor, a combined high-dimensional sparse vector from the high-dimensional sparse vectors for all objects and computing a hash suppression threshold. The method also comprises determining, via the processor, a group of hashes to be suppressed by using the hash suppression threshold, and suppressing, via the processor, the group of selected hashes when performing an action.Type: GrantFiled: December 11, 2015Date of Patent: November 9, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Mehran Kafai, Kave Eshghi, Omar Aguilar Macedo
-
Publication number: 20210273908Abstract: Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.Type: ApplicationFiled: May 17, 2021Publication date: September 2, 2021Applicant: Box, Inc.Inventor: Kave Eshghi