US 12,217,868 B2
Differential diagnosis feature engineering for machine learning applications
Douglas Graeme Brown, Hobart (AU)
Assigned to Red Hat, Inc., Raleigh, NC (US)
Filed by Red Hat, Inc., Raleigh, NC (US)
Filed on Jul. 30, 2021, as Appl. No. 17/389,583.
Prior Publication US 2023/0036102 A1, Feb. 2, 2023
Int. Cl. G16H 50/20 (2018.01); G06F 21/55 (2013.01); G06N 20/00 (2019.01); G16H 50/70 (2018.01)
CPC G16H 50/20 (2018.01) [G06F 21/554 (2013.01); G06N 20/00 (2019.01); G16H 50/70 (2018.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving an identifier of a computer system security event;
sequentially processing a plurality of inquiries, wherein subsequent inquiries in the plurality of inquiries are selected and processed based on responses to earlier inquiries in the plurality of inquiries;
storing indications of (i) the plurality of inquiries processed and (ii) responses received to the plurality of inquiries into a tensor;
determining, with a machine learning model, that the tensor identifies a potential computer system security breach; and
generating an intervention for the potential computer system security breach.