“om Organization
`
`International Bureau
`
`2
`=
`
`TATANYAOYA
`
`(10) International Publication Number
`WO 2021/108569 Al
`
`(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`World Intellectual Propert
`>
`
`(43) International Publication Date
`03 June 2021 (03.06.2021)
`
`WIPOIPCT
`
`(51) International Patent Classification:
`HO4L 29/06 (2006.01)
`G0O6F 11/00 (2006.01)
`
`MURPHY,Brian, Philip; 777 8. Harbour Island Blvd.,
`Suite 500, Tampa, FL 33602 (US).
`
`(21) International Application Number:
`PCT/US2020/062252
`
`(74) Agent: COLANDREO,Brian,J. et al.; Ilolland & Knight
`LLP,10 St. James Avenue, Boston, MA 02116 (US).
`
`(22) International Filing Date:
`25 November 2020 (25.11.2020)
`English
`English
`
`(25) Filing Language:
`(26) Publication Language:
`(30) Priority Data:
`.
`26 November2019 (26.11.2019) US
`62/940,733
`(71) Applicant: RELIAQUEST HOLDINGS, LLC [US/US];
`777 §. UarbourIsland Blvd., Suite 500, Tampa, FL 33602
`(US).
`
`(81) Designated States (unless otherwise indicated, for every
`kind of national protection available); AE, AG, AL, AM,
`AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ,
`CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO,
`DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN,
`HR, HU, ID,IL, IN, IR, IS, IT, JO, JP, KE, KG, KH, KN,
`KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD,
`ME, MG, MK, MN, MW, MX. MY, MZ, NA. NG, NI, NO.
`NZ, OM,PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW,
`SA, SC, SD, SE, SG, SK, SL, ST, SV, SY, TH, TJ, TM, TN,
`TR, TT, TZ, UA, UG, US, UZ, VC, VN, WS, ZA, ZM, ZW.
`
`(72) Inventors: MURPHY,Brian, P.; 777 S. Harbour Island
`Blvd., Suite 500, Tampa, FL 33602 (US). PARTLOW,Joe;
`777 S. Harbour Island Blvd., Suite 500, Tampa, FL 33602
`(US). O'CONNOR,Colin; 777 S. Harbour Island Blvd.,
`Suite 500, Tampa, FL 33602 (US). PFEIFFER,Jason; 777
`S. HarbourIsland Blvd., Suite 500, Tampa, FL 33602 (US).
`
`(84) Designated States (unless otherwise indicated, for every
`kind of regional protection available); ARIPO (BW, GH,
`GM,KE, LR, LS, MW, MZ, NA, RW, SD,SL, ST, SZ, TZ,
`UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ,
`TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK,
`EE,ES, FI, FR, GB, GR, HR, HU,IE,IS, IT, LT, LU, LV,
`MC, MK,MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM,
`
`(4) Title: THREAT MITIGATION SYSTEM AND METHOD
`
`
`
`
`
`
` cellular
`
`
`
`
`
`
`mitigation
`.
`process,
`
`10
`
`
`
`
`
`
`
`
`
`10s
`threat
`
`
`mitigation
`
`
`network /
`process
`
`
`bridge
`
`
`
`
`
`
`
`wo2021/108569AINITINIINNINMICAHTATAMER (57) Abstract: A computer-implemented method, computer program product and computing system for: establishing connectivity with
`
`
`
`30 48
`
`
`
`
`
`threat
`mitigation
`process
`
`
`
`
`
`
`
`
`threat
`mitigation
`process
`
`
`
`
`
`
`
`
`
`
`
`
`
`100"
`
`FIG. 1
`
`
`threat
`mitigation
`process
`
`
`
`
`
`a plurality of security-relevant subsystems within a computing platform; and mapping one or more data fields of a unified platform to
`one or more data fields of eachofthe plurality of security-relevant subsystems.
`
`[Continued on nextpage]
`
`

`

`WO 2021/108569 A|IMTMNTIIOINTA NINN MINTOAAIAT
`
`TR), OAPI (BF, BJ, CF, CG, Cl, CM, GA, GN, GO, GW,
`KM,ML, MR, NE,SN, TD, TG).
`
`Published:
`
`— with international search report (Art. 21(3))
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`Threat Mitigation System and Method
`
`Related Application(s)
`
`[001] This application claims the benefit of U.S. Provisional Application No.-:
`
`62/040,733,
`
`filed on 26 November 2019,
`
`the entire contents of which are herein
`
`incorporated by reference
`
`Technical Field
`
`[002] This disclosure relates to threat mitigation systems and, more particularly, to
`
`threat mitigation systems that utilize a universal query language.
`
`Background
`
`[003]
`
`In the computer world, there is a constant battle occurring between bad actors
`
`that want to attack computing platforms and good actors whotry to prevent the same.
`
`Unfortunately,
`
`the complexity of such computer attacks in constantly increasing, so
`
`technology needs to be employed that understands the complexity of these attacks and is
`
`capable of addressing the same.
`
`[004] Threat mitigation systems may utilize and/or communicate with a plurality of
`
`security-relevant subsystems, wherein these security-relevant subsystems may gather
`
`information concerning such computer attacks. Unfortunately and in order to obtain such
`
`gathered information from these security-relevant subsystems,
`
`the user of the threat
`
`mitigation system would often be required to formulate a unique query for each security-
`
`relevant subsystem.
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`Summary of Disclosure
`
`Concept2
`
`[005]
`
`In one implementation, a computer-implemented method is executed on a
`
`computing device and includes: establishing connectivity with a plurality of security-
`
`relevant subsystems within a computing platform; and mapping one or more data fields
`
`of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems.
`
`[006] One or more of the following features may be included. Mapping one or more
`
`data fields of a unified platform to one or more data fields of each of the plurality of
`
`security-relevant subsystems may include: mapping one or more data fields within a
`
`query structure of the unified platform to one or more data fields within a query structure
`
`of each ofthe plurality of security-relevant subsystems. Mapping one or more data fields
`
`of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems may include: mapping one or more data fields within a result set
`
`structure of each of the plurality of security-relevant subsystems to one or more data
`
`fields within a result set structure of the unified platform. Mapping one or more data
`
`fields of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems may include: mapping one or more data fields of the unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems at a defined periodicity. Mapping one or more data fields of a unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems may include: proactively mapping one or more data fields of the unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems. Mapping one or more data fields of a unified platform to one or more data
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`fields of each of the plurality of security-relevant subsystems may include: reactively
`
`mapping one or moredata fields of the unified platform to one or more data fields of each
`
`of the plurality of security-relevant subsystems. A unified query may be defined on a
`
`unified platform concerning the plurality of security-relevant subsystems. The unified
`
`query may be denormalized to define a subsystem-specific query for each of the plurality
`
`of security-relevant subsystems, thus defining a plurality of subsystem-specific queries.
`
`The plurality of subsystem-specific queries may be provided to the plurality of security-
`
`relevant subsystems. A plurality of subsystem-specific results sets may be received from
`
`the plurality of security-relevant subsystems that were generated in response to the
`
`plurality of subsystem-specific queries. The plurality of subsystem-specific results sets
`
`received from the plurality of security-relevant subsystems may be normalized to define a
`
`unified result set. The unified result may be provided set to a third-party.
`
`[007]
`
`In another
`
`implementation,
`
`a computer program product
`
`resides on a
`
`computer readable medium and has a plurality of instructions stored on it. When
`
`executed by a processor,
`
`the instructions cause the processor to perform operations
`
`including: establishing connectivity with a plurality of security-relevant subsystems
`
`within a computing platform; and mapping one or more data fields of a unified platform
`
`to one or more data fields of each of the plurality of security-relevant subsystems.
`
`[008] One or more of the following features may be included. Mapping one or more
`
`data fields of a unified platform to one or more data fields of each of the plurality of
`
`security-relevant subsystems may include: mapping one or more data fields within a
`
`query structure of the unified platform to one or moredata fields within a query structure
`
`of each ofthe plurality of security-relevant subsystems. Mapping one or moredata fields
`
`of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems may include: mapping one or more data fields within a result set
`
`structure of each of the plurality of security-relevant subsystems to one or more data
`
`fields within a result set structure of the unified platform. Mapping one or more data
`
`wo
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`fields of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems may include: mapping one or more data fields of the unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems at a defined periodicity. Mapping one or more data fields of a unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems may include: proactively mapping one or more data fields of the unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems. Mapping one or more data fields of a unified platform to one or more data
`
`fields of each of the plurality of security-relevant subsystems may include: reactively
`
`mapping one or moredata fields of the unified platform to one or more datafields of each
`
`of the plurality of security-relevant subsystems. A unified query may be defined on a
`
`unified platform concerning the plurality of security-relevant subsystems. The unified
`
`query may be denormalized to define a subsystem-specific query for each of the plurality
`
`of security-relevant subsystems, thus defining a plurality of subsystem-specific queries.
`
`The plurality of subsystem-specific queries may be provided to the plurality of security-
`
`relevant subsystems. A plurality of subsystem-specific results sets may be received from
`
`the plurality of security-relevant subsystems that were generated in response to the
`
`plurality of subsystem-specific queries. The plurality of subsystem-specific results sets
`
`received from the plurality of security-relevant subsystems may be normalized to define a
`
`unified result set. The unified result may be provided set to a third-party.
`
`[009]
`
`In another implementation, a computing system includes a processor and
`
`memory is configured to perform operations including: establishing connectivity with a
`
`plurality of security-relevant subsystems within a computing platform; and mapping one
`
`or more data fields of a unified platform to one or more data fields of each of the plurality
`
`of security-relevant subsystems.
`
`[0010] One or more of the following features may be included. Mapping one or more
`
`data fields of a unified platform to one or more data fields of each of the plurality of
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`security-relevant subsystems may include: mapping one or more data fields within a
`
`query structure of the unified platform to one or more data fields within a query structure
`
`of each of the plurality of security-relevant subsystems. Mapping one or moredatafields
`
`of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems may include: mapping one or more data fields within a result set
`
`structure of each of the plurality of security-relevant subsystems to one or more data
`
`fields within a result set structure of the unified platform. Mapping one or more data
`
`fields of a unified platform to one or more data fields of each of the plurality of security-
`
`relevant subsystems may include: mapping one or more data fields of the unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems at a defined periodicity. Mapping one or more data fields of a unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems may include: proactively mapping one or more data fields of the unified
`
`platform to one or more data fields of each of the plurality of security-relevant
`
`subsystems. Mapping one or more data fields of a unified platform to one or more data
`
`fields of each of the plurality of security-relevant subsystems may include: reactively
`
`mapping one or moredata fields of the unified platform to one or moredatafields of each
`
`of the plurality of security-relevant subsystems. A unified query may be defined on a
`
`unified platform concerning the plurality of security-relevant subsystems. The unified
`
`query may be denormalized to define a subsystem-specific query for each of the plurality
`
`of security-relevant subsystems, thus defining a plurality of subsystem-specific queries.
`
`The plurality of subsystem-specific queries may be provided to the plurality of security-
`
`relevant subsystems. A plurality of subsystem-specific results sets may be received from
`
`the plurality of security-relevant subsystems that were generated in response to the
`
`plurality of subsystem-specific queries. The plurality of subsystem-specific results sets
`
`received from the plurality of security-relevant subsystems may be normalized to define a
`
`unified result set. The unified result may be provided set to a third-party.
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`[0011] The details of one or more implementations are set forth in the accompanying
`
`drawings and the description below. Other features and advantages will become apparent
`
`from the description, the drawings, and the claims.
`
`Brief Description of the Drawings
`
`[0012] FIG.
`
`1 is a diagrammatic view ofa distributed computing network including a
`
`computing device that executes a threat mitigation process according to an embodiment
`
`of the present disclosure;
`
`[0013] FIG, 2 is a diagrammatic view of an exemplary probabilistic model rendered
`
`by a probabilistic process of the threat mitigation process of FIG 1 according to an
`
`embodimentof the present disclosure;
`
`[0014] FIG 3 is a diagrammatic view of the computing platform of FIG. 1 according
`
`to an embodimentof the present disclosure;
`
`[0015] FIG 4 is a flowchart of an implementation of the threat mitigation process of
`
`FIG. | according to an embodimentof the present disclosure;
`
`[0016] FIGS. 5-6 are diagrammatic views of screens rendered by the threat mitigation
`
`process of FIG. 1 according to an embodimentofthe present disclosure;
`
`[0017] FIGS. 7-9 are flowcharts of other implementations of the threat mitigation
`
`process of FIG. 1 according to an embodimentof the present disclosure;
`
`[0018] FIG 10 is a diagrammatic view of a screen rendered by the threat mitigation
`
`process of FIG. 1 according to an embodimentofthe present disclosure;
`
`[0019] FIG 11 is a flowchart of another implementation of the threat mitigation
`
`process of FIG. 1 according to an embodimentof the present disclosure;
`
`[0020] FIG, 12 is a diagrammatic viewof a screen rendered by the threat mitigation
`
`process of FIG. 1 according to an embodimentofthe present disclosure;
`
`[0021] FIG. 13 is a flowchart of another implementation of the threat mitigation
`
`process of FIG. 1 according to an embodimentof the present disclosure;
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`[0022] FIG. 14 is a diagrammatic view of a screen rendered by the threat mitigation
`
`process of FIG. 1 according to an embodimentof the present disclosure;
`
`[0023] FIG. 15 is a flowchart of another implementation of the threat mitigation
`
`process of FIG. 1 according to an embodimentof the present disclosure;
`
`[0024] FIG 16 is a diagrammatic view of screens rendered by the threat mitigation
`
`process of FIG. 1 according to an embodimentofthe present disclosure;
`
`[0025] FIGS. 17-23 are flowcharts of other implementations of the threat mitigation
`
`process of FIG.
`
`| according to an embodimentof the present disclosure;
`
`[0026] FIG, 24 is a diagrammatic view of a screen rendered by the threat mitigation
`
`process of FIG. 1 according to an embodimentofthe present disclosure;
`
`[0027] FIGS. 25-31 are flowcharts of other implementations of the threat mitigation
`
`process of FIG. 1 according to an embodimentof the present disclosure; and
`
`[0028] FIG. 32 is a diagrammatic view of data field mapping according to an
`
`embodimentof the present disclosure.
`
`[0029] Like reference symbols in the various drawingsindicate like elements.
`
`Detailed Description of the Preferred Embodiments
`
`System Overview
`
`[0030] Referring to FIG 1,
`
`there is shown threat mitigation process 10. Threat
`
`mitigation process 10 may be implemented as a server-side process, a client-side process,
`
`or a hybrid server-side / client-side process. For example, threat mitigation process 10
`
`may be implemented as a purely server-side process via threat mitigation process 10s.
`
`Alternatively, threat mitigation process 10 may be implemented as a purely client-side
`
`process via one or more of threat mitigation process 10c1, threat mitigation process 10c2,
`
`threat mitigation process 10c3, and threat mitigation process 10c4. Alternatively still,
`
`threat mitigation process 10 may be implemented as a hybrid server-side / client-side
`
`process via threat mitigation process 10s in combination with one or more of threat
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`mitigation process 10c1, threat mitigation process 10c2, threat mitigation process 10c3,
`
`and threat mitigation process 10c4. Accordingly, threat mitigation process 10 as used in
`
`this disclosure may include any combination of threat mitigation process 10s, threat
`
`mitigation process 10cl, threat mitigation process 10c2, threat mitigation process, and
`
`threat mitigation process 10c4.
`
`[0031] Threat mitigation process 10s maybe a server application and may reside on
`
`and may be executed by computing device 12, which may be connected to network 14
`
`(e.g., the Internet or a local area network). Examples of computing device 12 may
`
`include, but are not limited to: a personal computer, a laptop computer, a personal digital
`
`assistant, a data-enabled cellular telephone, a notebook computer, a television with one or
`
`more processors embeddedtherein or coupled thereto, a cable / satellite receiver with one
`
`or more processors embedded therein or coupled thereto, a server computer, a series of
`
`server computers, a mini computer, a mainframe computer, or a cloud-based computing
`
`network.
`
`[0032] The instruction sets and subroutines of threat mitigation process 10s, which
`
`may be stored on storage device 16 coupled to computing device 12, may be executed by
`
`one or more processors (not shown) and one or more memory architectures (not shown)
`
`included within computing device 12. Examples of storage device 16 may include but
`
`are not limited to: a hard disk drive; a RAID device; a random-access memory (RAM); a
`
`read-only memory (ROM); andall forms of flash memory storage devices.
`
`[0033] Network 14 may be connected to one or more secondary networks(e.g.,
`
`network 18), examples of which may include but are not limited to: a local area network;
`
`a wide area network;or an intranet, for example.
`
`[0034] Examples of threat mitigation processes 10c1, 10c2, 10c3, 10c4 may include
`
`but are not limited to a client application, a web browser, a game console userinterface,
`
`or a specialized application (e.g., an application running on e.g., the Android ™ platform
`
`or the iOS '™ platform). The instruction sets and subroutines of threat mitigation
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`processes 10c1, 10c2, 10c3, 10c4, which may be stored on storage devices 20, 22, 24, 26
`
`(respectively) coupled to client electronic devices 28, 30, 32, 34 (respectively), may be
`
`executed by one or more processors (not shown) and one or more memory architectures
`
`(not shown) incorporated into client electronic devices 28, 30, 32, 34 (respectively).
`
`Examples of storage device 16 may include but are not limited to: a hard disk drive; a
`
`RAID device; a random-access memory (RAM); a read-only memory (ROM); andall
`
`forms of flash memory storage devices.
`
`[0035] Examples of client electronic devices 28, 30, 32, 34 may include, but are not
`
`limited to, data-enabled, cellular telephone 28,
`
`laptop computer 30, personal digital
`
`assistant 32, personal computer 34, a notebook computer (not shown), a server computer
`
`(not shown), a gaming console (not shown), a smart television (not shown), and a
`
`dedicated network device (not shown). Client electronic devices 28, 30, 32, 34 may each
`
`execute an operating system, examples of which may include but are not limited to
`
`Microsoft Windows "™, Android "™, WebOS ™,
`
`iOS ™, Redhat Linux ', or a custom
`
`operating system.
`
`[0036] Users 36, 38, 40, 42 may access threat mitigation process 10 directly through
`
`network 14 or through secondary network 18. Further, threat mitigation process 10 may
`
`be connected to network 14 through secondary network 18, as illustrated with link line
`
`44.
`
`[0037] The variousclient electronic devices (e.g., client electronic devices 28, 30, 32,
`
`34) maybe directly or indirectly coupled to network 14 (or network 18). For example,
`
`data-enabled, cellular telephone 28 and laptop computer 30 are shown wirelessly coupled
`
`to network 14 via wireless communication channels 46, 48 (respectively) established
`
`between data-enabled, cellular telephone 28,
`
`laptop computer 30 (respectively) and
`
`cellular network / bridge 50, which is shown directly coupled to network 14. Further,
`
`personal digital assistant 32 is shown wirelessly coupled to network 14 via wireless
`
`communication channel 52 established between personal digital assistant 32 and wireless
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`access point
`
`(i.e, WAP) 54, which is
`
`shown directly coupled to network 14.
`
`Additionally, personal computer 34 is shown directly coupled to network 18 via a
`
`hardwired network connection.
`
`[0038] WAP 54 maybe, for example, an IEEE 802.11a, 802.11b, 802.11g, 802.11n,
`
`Wi-Fi, and/or Bluetooth device that is capable of establishing wireless communication
`
`channel 52 between personal digital assistant 32 and WAP 54. As is knownintheart,
`
`TEEE 802.11x specifications may use Ethernet protocol and carrier sense multiple access
`
`with collision avoidance (i.e. CSMA/CA)
`
`for path sharing. The various 802.11x
`
`specifications may use phase-shift keying (i.e., PSK) modulation or complementary code
`
`keying (i.e., CCK) modulation, for example. As is known in the art, Bluetooth is a
`
`telecommunications industry specification that allows e.g., mobile phones, computers,
`
`and personal digital assistants to be interconnected using a short-range wireless
`
`connection.
`
`Artificial Intelligence / Machines Learning Overview:
`
`[0039] Assume for illustrative purposes that threat mitigation process 10 includes
`
`probabilistic process 56 (e.g., an artificial intelligence / machine learning process) that is
`
`configured to process information (e.g., information 58). As will be discussed below in
`
`greater detail, examples of information 58 may include but are not limited to platform
`
`information (e.g., structured or unstructured content) being scanned to detect security
`
`events (e.g., access auditing; anomalies; authentication; denial of services; exploitation;
`
`malware; phishing; spamming; reconnaissance; and/or web attack) within a monitored
`
`computing platform (e.g., computing platform 60).
`
`[0040] As is knownintheart, structured content may be content that is separated into
`
`independent portions (e.g., fields, columns, features) and, therefore, may have a pre-
`
`defined data model and/or is organized in a pre-defined manner. For example, if the
`
`structured content concerns an employeelist: a first field, column or feature may define
`
`the first name of the employee; a second field, column or feature may define the last
`
`10
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`name of the employee; a third field, column or feature may define the homeaddress of
`
`the employee; and a fourth field, column or feature may define the hire date of the
`
`employee.
`
`[0041] Further and as is knownin the art, unstructured content may be content thatis
`
`not separated into independent portions (e.g., fields, columns, features) and, therefore,
`
`may not have a pre-defined data model and/or is not organized in a pre-defined manner.
`
`For example, if the unstructured content concerns the same employeelist: the first name
`
`of the employee, the last name of the employee, the homeaddress of the employee, and
`
`the hire date of the employee mayall be combinedinto onefield, column orfeature.
`
`[0042] For
`
`the following illustrative example, assume that
`
`information 58 1s
`
`unstructured content, an example of which may include butis not limited to unstructured
`
`user feedback received by a company(e.g., text-based feedback such as text-messages,
`
`social media posts, and email messages; and transcribed voice-based feedback such as
`
`transcribed voice mail, and transcribed voice messages).
`
`[0043] When processing information 58, probabilistic process
`
`56 may use
`
`probabilistic modeling to accomplish such processing, wherein examples of such
`
`probabilistic modeling may include but are not
`
`limited to discriminative modeling,
`
`generative modeling, or combinations thereof.
`
`[0044] As is known in the art, probabilistic modeling may be used within modern
`
`artificial intelligence systems (e.g., probabilistic process 56), in that these probabilistic
`
`models may provide artificial
`
`intelligence systems with the tools
`
`required to
`
`autonomously analyze vast quantities of data (e.g., information 58).
`
`[0045] Examples of the tasks for which probabilistic modeling may be utilized may
`
`include butare not limited to:
`
`e
`
`predicting media (music, movies, books) that a user may like or enjoy based
`
`upon media that the user has liked or enjoyed in the past;
`
`e
`
`transcribing words spoken by a userinto editable text;
`
`11
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`*
`
`e
`
`e
`
`e
`
`e
`
`e
`
`grouping genesinto geneclusters;
`
`identifying recurring patterns within vast data sets;
`
`filtering email that is believed to be spam from a user’s inbox;
`
`generating clean (i.e., non-noisy) data from a noisy data set;
`
`analyzing (voice-based or text-based) customer feedback; and
`
`diagnosing various medical conditions and diseases.
`
`[0046] For each of the above-described applications of probabilistic modeling, an
`
`initial probabilistic model may be defined, wherein this initial probabilistic model may be
`
`subsequently (e.g., iteratively or continuously) modified and revised, thus allowing the
`
`probabilistic models and the artificial intelligence systems (e.g., probabilistic process 56)
`
`to “learn” so that future probabilistic models may be more precise and may explain more
`
`complex data sets.
`
`[0047] Accordingly, probabilistic process 56 may define an initial probabilistic model
`
`for accomplishing a defined task (e.g.,
`
`the analyzing of information 58).
`
`For the
`
`illustrative example, assumethat this defined task is analyzing customer feedback (e.g.,
`
`information 58) that
`
`is received from customers of e.g., store 62 via an automated
`
`feedback phone line. For this example, assume that information 58 is initially voice-
`
`based content
`
`that
`
`is processed via e.g., a speech-to-text process that
`
`results in
`
`unstructured text-based customer feedback (e.g., information 58).
`
`[0048] With respect to probabilistic process 56, a probabilistic model may be utilized
`
`to go from initial observations about information 58 (e.g., as represented by the initial
`
`branches of a probabilistic model)
`
`to conclusions about
`
`information 58 (eg., as
`
`represented by the leaves of a probabilistic model).
`
`[0049] As used in this disclosure, the term “branch” may refer to the existence (or
`
`non-existence) of a component (e.g., a sub-model) of (or included within) a model.
`
`Examples of such a branch mayinclude but are not limited to: an execution branch ofa
`
`probabilistic program or other generative model, a part (or parts) of a probabilistic
`
`12
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`graphical model, and/or a component neural network that may (or may not) have been
`
`previously trained.
`
`[0050] While the following discussion provides a detailed example of a probabilistic
`
`model, this is for illustrative purposes only and is not intended to be a limitation of this
`
`disclosure, as other configurations are possible and are considered to be within the scope
`
`of this disclosure. For example, the following discussion may concern any type of model
`
`(e.g., be it probabilistic or other) and, therefore, the below-described probabilistic model
`
`is merely intended to be oneillustrative example of a type of model andis not intended to
`
`limit this disclosure to probabilistic models.
`
`[0051] Additionally, while the following discussion concerns word-based routing of
`
`messages through a probabilistic model, this is for illustrative purposes only and is not
`
`intended to be a limitation of this disclosure, as other configurations are possible and are
`
`considered to be within the scope of this disclosure. Examples of other types of
`
`information that may be used to route messages through a probabilistic model may
`
`include:
`
`the order of the words within a message; and the punctuation interspersed
`
`throughout the message.
`
`[0052] For example and referring also to FIG 2,
`
`there is shown one simplified
`
`example of a probabilistic model (e.g., probabilistic model 100) that may be utilized to
`
`analyze information 58 (e.g., unstructured text-based customer feedback) concerning
`
`store 62. The manner in which probabilistic model 100 may be automatically-generated
`
`by probabilistic process 56 will be discussed below in detail.
`
`In this particular example,
`
`probabilistic model 100 may receive information 58 (e.g., unstructured text-based
`
`customer feedback) at branching node 102 for processing. Assume that probabilistic
`
`model 100 includes four branches off of branching node 102, namely: service branch
`
`104; selection branch 106; location branch 108; and value branch 110 that respectively
`
`lead to service node 112, selection node 114, location node 116, and value node 118.
`
`13
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`[0053] As stated above, service branch 104 may lead to service node 112, which may
`
`be configured to process the portion of information 58 (e.g., unstructured text-based
`
`customer feedback) that concerns (in whole or in part) feedback concerning the customer
`
`service of store 62. For example, service node 112 may define service word list 120 that
`
`may include e.g., the word service, as well as synonyms of (and words related to) the
`
`word service (e.g., cashier, employee, greeter and manager). Accordingly and in the
`
`event that a portion of information 58 (e.g., a text-based customer feedback message)
`
`includes the word cashier, employee, greeter and/or manager, that portion of information
`
`58 may be considered to be text-based customer feedback concerning the service received
`
`at store 62 and (therefore) may be routed to service node 112 of probabilistic model 100
`
`for further processing. Assumeforthis illustrative example that probabilistic model 100
`
`includes two branchesoff of service node 112, namely: good service branch 122 and bad
`
`service branch 124.
`
`[0054] Good service branch 122 may lead to good service node 126, which may be
`
`configured to process the portion of information 58 (e.g. unstructured text-based
`
`customer feedback) that concerns (in whole or in part) good feedback concerning the
`
`customer service of store 62. For example, good service node 126 may define good
`
`service word list 128 that may include e.g., the word good, as well as synonyms of (and
`
`words related to) the word good (e.g., courteous, friendly, lovely, happy, and smiling).
`
`Accordingly and in the event that a portion of information 58 (e.g., a text-based customer
`
`feedback message) that was routed to service node 112 includes the word good,
`
`courteous, friendly, lovely, happy, and/or smiling, that portion of information 58 may be
`
`considered to be text-based customer feedback indicative of good service received at
`
`store 62 (and, therefore, may be routed to good service node 126).
`
`[0055] Bad service branch 124 may lead to bad service node 130, which may be
`
`configured to process the portion of information 58 (e.g., unstructured text-based
`
`customer feedback) that concerns (in whole or in part) bad feedback concerning the
`
`14
`
`

`

`WO 2021/108569
`
`PCT/US2020/062252
`
`customer service of store 62. For example, bad

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

PTO Denying Access

Refresh this Document
Go to the Docket