Various entities seek to regulate the operations of businesses and other organizations. For example, federal, state, county, and local governments enact statutes, promulgate administrative regulations, and publish regulatory directives and guidance; counterparties to contracts impose contractual obligations; standards bodies adopt standards; technology vendors publish documentation detailing how their products should be used; and organizations establish rules for their own operation.
Documents that seek to regulate the operation of an organization are sometimes called authority documents. They contain mandates, which each direct the organization to take a particular action.
Organizations often seek to comply with authority documents that are relevant to their operations, by (1) understanding their mandates, (2) taking the action needed to satisfy the mandates, and (3) documenting this action and its connection to the mandate. These compliance efforts help an organization's leaders determine whether the organization is behaving responsibly. Compliance efforts also help an organization respond promptly and successfully to auditing or enforcement actions by an external party.
The inventor has recognized that, for many organizations, compliance is difficult and burdensome. This is particularly true for organizations that are subject to numerous and/or complex authority documents, issued by multiple issuers of authority documents.
One source of difficulty recognized by the inventor is that mandates are often written in confusing ways, frustrating efforts to understand and satisfy them.
Another source of difficulty recognized by the inventor is that there can be a significant level of redundancy among the mandates to which an organization is subject. For example, a single authority document may contain three different mandates that require the same action. When this authority document is combined with five additional authority documents that relate to a particular organization's operations, this set of six authority documents may contain eleven mandates requiring the same action. The inventor has recognized that this high level of redundancy makes compliance efforts unnecessarily burdensome.
Additionally, there are groups of two or more mandates that, while they do not all require the same action, can all be satisfied by the same action. For example, a set of authority documents may contain the following mandates:
While these mandates do not all require that the AES-256 encryption technique be used to encrypt the password file, they are all satisfied by using AES-256 to encrypt the password file. Like groups of mandates that all require the same action, multiple separate mandates that can be satisfied by the same action make compliance efforts unnecessarily burdensome.
To address the high levels of difficulty and burden that attend conventional compliance processes, the inventor has conceived and reduced to practice a hardware and/or software facility for providing automatic and semi-automatic compliance tools (“the facility”). The facility processes a set of authority documents from one or more issuers, first identifying the mandates that each contains. The facility constructs a set of highly-readable common controls (“controls”) that collectively represent all of these mandates, in some cases using a single control to represent multiple mandates that are redundant across the authority document set. The facility links each control to the mandates it represents.
A person performing a compliance review for a particular organization can select the authority documents that are included in the set. Where such a person has identified evidence substantiating the organization's compliance with a particular control, the facility permits them to attach this substantiation evidence to that control. Once substantiation evidence is attached to each of the controls, the organization has demonstrated full compliance with all of the authority documents in the set. In an audit or enforcement action for a particular authority document, the facility uses the links between the authority document's mandates and the controls that represent them to identify the subset of the controls that represent the authority document, and presents the evidence attached to those controls. The evidence can be presented in the context of the controls, or in the original context of the authority document and its mandates. In some embodiments, the facility also presents, for each of the mandates, justification that the corresponding control adequately represents the mandate.
In some embodiments, the facility constructs the controls representing a set of authority documents by looping through each of the mandates contained by each authority document of the set. In some embodiments, this involves looping through each section, paragraph, or citation of the authority document to determine its applicability for mapping, then collecting the mandates present in each applicable section, paragraph, or citation of the authority document. For each mandate, the facility determines whether the mandate is represented by an existing control by looping through the controls and rating the level of similarity between the mandate and each control. If any of the controls has a level of similarity to the mandate that exceeds a similarity threshold, it is considered to represent the mandate, and the mandate is linked to it. If none of the existing controls has a level of similarity to the mandate that exceeds the threshold, the facility creates a new control from the mandate, and links the mandate to the new control.
In some embodiments, the facility performs similarity rating between a mandate and a control as follows: For each the mandate and the control, the facility identifies the primary verb, as well as the primary noun that is the object of the primary verb. The facility determines a similarity rating between the mandate and the control with reference to a semantic graph that documents relationships between terms (words or phrases). In the graph, each term is a node, connected to nodes representing directly-related terms by an edge that identifies the nature of the relationship. For example, a first node for the term “smartphone” may be connected to a second node for the term “portable electronic device” by an edge that indicates that the term of the first node is a type of the term of the second node. The length of the shortest route between the primary verbs of the mandates and the control is determined, in terms of the number of edges (or “hops”) of the semantic graph that must be traversed to reach one from the other. The graph distance between the primary nouns of the pair is similarly determined. The similarity rating for the pair of mandates is then determined such that the rating is inversely related to each verb distance and noun distance, with verb distance being weighted more heavily, such as 50% more heavily. In some embodiments, the facility uses this process to rate the similarity of two mandates.
In constructing a new control from a mandate, in some embodiments, the facility determines a readability score for the mandate by combining (a) average sentence length, (b) average number of syllables per word, (c) square root of number of words having more than two syllables, (d) average number of words per sentence, and (e) percentage of words that have more than two syllables. In various embodiments, the facility uses this score to, for example (1) filter controls to collect those whose score is either greater than or less than some threshold; (2) provide real-time feedback about readability to an author as they are writing a control; (3) declining to accept a control whose score is below a particular threshold; (4) automatically adopt a mandate whose score is above a threshold as a control; etc. As the control is changed to deviate from the phrasing of the mandate to improve the control's readability, the facility continues to assess the similarity between the mandate and the changing control to guard against clarification that comes at the expense of accuracy.
In some embodiments, the facility maintains its controls over time, substituting in controls synonyms of terms formerly used in the control that are used at a significantly higher rate.
By performing in some or all of the foregoing ways, embodiments of the facility provide greater certainty in compliance at a meaningfully lower burden.
In act 201, the facility initializes a list of controls and a list of mandates to both be empty. In some embodiments, the facility represents the initialized list of controls as a control table—such as control table 300 shown in
In acts 202-215, the facility loops through each authority document in the set of authority documents. In some embodiments, this set of authority documents is defined by an organization on whose behalf compliance is being performed.
In acts 203-214, the facility loops through each mandate in the present authority document. In some embodiments, the facility identifies each of these mandates by identifying a different verb-noun pair occurring the authority document. In some embodiments, multiple noun-verb pairs may occur in the same section, paragraph, or other portion of the facility document. In some embodiments, the facility establishes multiple mandates from a compound combination of verbs and nouns, such as a single verb with two objects, or two verbs with the same object.
In act 204, the facility normalizes the mandate. In some embodiments, normalizing the mandate involves, for example, transforming a mandate stated by the authority document as a question into a declarative, imperative statement. For example, in some embodiments, the facility normalizes the mandate “is identity information secured?” by transforming it to “secure identity information.”
In act 205, the facility extracts from the normalized mandate the primary verb, as well as the primary noun that is the object of the primary verb. To continue the above example, from the normalized mandate “secure identity information”, the facility extracts the primary verb “secure” and the primary noun “identity information”.
In acts 206-210, the facility loops through each control in a list of controls.
While
Returning to
In act 402, the facility uses the context of the control to identify definitions of the control's primary verb and primary noun. For the control shown in row 301 of control table 300, the facility identifies the following definition for the primary verb “protect”: “in computing: to limit access to or the use of data, primary storage memory, memory address, etc.”. For the control's primary noun “personally identifiable information”, the facility identifies the following definition: “information which can be used to distinguish or trace and individual's identity, such as their name, social security number, biometric records, etc., alone, or combined with other personal or identifying information which is linked or linkable to a specific individual such as date and place of birth, mother's maiden name, etc.”
In act 403, the facility determines a semantic distance vector, or “path,” from the mandate's primary verb definition to the control's primary verb definition.
Returning to
Returning to
In applying the formula shown above, the facility determines a similarity score of 87.5% between the present mandate and the present control.
In act 407, if the similarity score obtained in act 406 exceeds a similarity threshold, then the facility continues in act 408, else the facility continues in act 409. In various embodiments, the facility uses various similarity thresholds, such as 75%, 80%, 85%, or 90%. For purposes of the example, the facility applies a threshold of 85%, which is satisfied in the example. In act 408, where the threshold is satisfied, the facility determines that the mandate matches the control, and this process concludes. In act 409, where the threshold is not satisfied, the facility determines that the mandate does not match the control, and this process concludes.
Returning to
Returning to
Where the present mandate does not match the present control in act 208, the facility continues in act 210. In act 210, if additional controls remain in the list of controls to be processed, then the facility continues in act 206 to process the next control on the list, else the facility continues in act 211. In act 211, the facility creates a control from the present mandate.
In some embodiments, the facility determines a grade for the readability of a control or mandate using measures of each the minimum age or grade level needed to understand the control or mandate, and the clarity of the control or mandate, as follows:
The Flesch-Kincaid Grade Level Readability Formula
Step 1: Calculate the average number of words used per sentence.
Step 2: Calculate the average number of syllables per word.
Step 3: Multiply the average number of words by 0.39 and add it to the average number of syllables per word multiplied by 11.8.
Step 4: Subtract 15.59 from the result.
The specific mathematical formula is:
FKRA=(0.39×ASL)+(11.8×ASW)−15.59
Where,
Step 1: Count every word with three or more syllables, even if the same word appears more than once.
Step 2: Calculate the square root of the number arrived at in Step 1 and round it off to nearest 10.
Step 3: Add 3 to the figure arrived at in Step 2 to know the SMOG Grade, i.e., the reading grade that a person must have reached if he is to understand fully the text assessed.
SMOG=3+Square Root of Polysyllable Count
The Clarity index
Step 1: Count the number of sentences.
Step 2: Count the number of words.
Step 3: Divide the number of words by the number of independent clauses to get the average mandate length. (The target average is 15 words per sentence.)
Step 4: Count the number of words that have three syllables or more.
Step 5: Divide the number of long words by the total of words to determine the percentage of long words. (The target is 15 percent.)
Step 6: Add the average sentence length to the percentage of long words.
Clarity=((100−(PercentLong+AVGLength))/100)−Subject
Where,
The Mandate Readability Grade builds upon the three calculations above and creates a letter grade (A through F) that can be assigned to the text.
Step 1: Average the Flesch-Kincaid and SMOG readability scores.
Step 2: Multiply that average by the Clarity Index.
Step 3: Apply a letter grade.
In act 1003, if the readability score determined by the facility in act 1002 exceeds a readability threshold, then the facility continues in act 1004, else the facility continues in act 1005. In various embodiments, the facility uses various values of this threshold, such as a readability grade at or above A; B; or C. In act 1004, the facility revises the new control in an effort to make it more readable. In some embodiments, act 1004 involves prompting a person to revise the new control. After act 1004, the facility continues in act 1002.
In act 1005, where the readability exceeds the readability threshold, the facility extracts the primary verb and primary noun from the present version of the new control. In act 1006, the facility compares the primary verb and noun of the mandate to the primary verb and noun extracted from the new control in act 1005. In act 1007, if the mandate adequately matches the control, then this process concludes, else the facility continues in act 1004 to further revise the new control. In some embodiments, the facility uses the same matching threshold in act 1007 as in act 208. In some embodiments, the facility uses a threshold in act 1007 that is higher than the threshold it uses in act 208.
Returning to
Returning to
Returning to
Returning to
In some embodiments, the facility also updates the mandate table to reflect the change to the control. In particular,
Returning to
In some embodiments, for each control's primary noun, the facility tags the term with a particular named entity. For example, in some embodiments, the facility tags the primary noun “personal data” in the control to which row 1501 of control table 1500 shown in
In various embodiments, the facility performs various related activities as described below.
In some embodiments, the facility generates a substitute authority document from a source authority document. It may do so, for example, where the source authority document is redundant; uses complex language that makes it difficult to read; uses non-standard vocabulary; etc. In some embodiments, the facility constructs a set of controls to represent the mandates of the source authority document as described above, then generates a draft substitute authority document containing the generated controls. The draft substitute authority document can then be revised by human editors, such as to reorder or otherwise rearrange the controls it contains to be mandates of the substitute authority document; to add introductory or explanatory material; to add organization structure and/or formatting; etc. By doing this, the facility addresses the redundancy of the source authority document, by reducing groups of redundant mandates each to single control, and addresses the linguistic complexity or other unreadability of the source authority document by requiring the generated controls that will constitute the mandates of the substitute authority document to satisfy readability standards.
In some embodiments, if the goal is to make the substitute authority document internally consistent, then the facility begins this process with an empty list of controls. In some embodiments, if the goal is to make the substitute authority document consistent with a set of one or more contextual authority documents, the facility begins this process with an empty list of controls; constructs a list of controls from the contextual authority documents; then maps the source authority document using the list of controls constructed from the contextual authority documents. Using this approach, where possible the facility uses language originating from the contextual authority documents in forming the controls that form the mandates in the substitute authority document. This can be useful, for example, where particular authority document is being written to be consistent with a set of governing regulations.
In some embodiments, the facility evaluates mandates as they are being written, such as in the process of authoring an authority document. The facility determines a readability score for each mandate, such as by combining (a) average sentence length, (b) average number of syllables per word, (c) square root of number of words having more than two syllables, (d) average number of words per sentence, and (e) percentage of words that have more than two syllables. In various embodiments, the facility uses this score to, for example (1) filter mandates to collect those whose score is either greater than or less than some threshold; (2) provide real-time feedback about readability to an author as they are writing mandates; (3) declining to accept mandates whose score is below a particular threshold; (4) automatically adopt mandates whose score is above a threshold; etc. In some embodiments, as a person is editing an authority document, the facility evaluates primary nouns and primary verbs used by the person in mandates, and advises in real time when the person chooses a phrase that is not preferred in its synonym group. For example, when the user types “protect personally identifiable information” as part of a mandate, the facility displays the following notification: “personally identifiable information′ is not the preferred term. Click here to change to the preferred term ‘personal data.”’ In some embodiments, as the mandates are edited to improve their readability, the facility continues to assess the similarity between the mandates being revised and existing controls in the relevant body of reference data to guard against clarification that comes at the expense of accuracy.
In some embodiments, the facility automatically expands general controls to create a group of more specific controls. For example, where the facility has created a control where the primary verb is “securely configure” and the primary noun is “all types of portable electronic devices”, the facility uses “type-of” semantic relationships between this primary noun and other nouns in the semantic graph to create a group of controls that are inferior to the current control in the list of controls, such as those that have “securely configure” as the primary verb, and each of the following as the primary noun: “smartphones”, “laptops”, and “tablet computers”. As a result, when the facility is used to audit compliance by particular organization, it presents audit questions about securely configuring smart phones, laptops, and tablet computers, rather than only the more generic portable electronic devices. In some embodiments, the facility can be configured with a number of generations with which to perform this process. For example, if the facility is configured to perform two generations of this process, it further transforms the more-specific control “securely configure smartphones” to securely configuring iOS smartphones, Android smartphones, and Tizen smartphones. In some embodiments, the facility uses other semantic relationships in this process instead of “type-of”, or in addition to “type-of”.
In some embodiments, the facility maintains a list of named entities, such as a list of national currencies or a list of corporations, where each element of the list can have multiple expressions. For example, the national currency of Venezuela is variously referred to as “Bolivar”, “sovereign bolivar”, and “Venezuelan Bolivar”. Similarly, a single U.S. airline is referred to by each of the following: “American Airlines”, “AmericanAir”, “AA”, and “AAL”. In some embodiments, the facility accesses a set of feeds—such as social media feeds, news feeds, etc.—in which elements of the list are discussed, and uses it to construct a semantic graph-based dictionary. Use of different expressions of the same list item in the same way within the feeds (e.g., “AmericanAir dropped 26 points today”, on the same day as “AAL fell 26”) causes the dictionary to arrange them in the semantic dictionary in such a way that they are separated by short semantic distance vectors, and thus are synonyms or near-synonyms. When the facility having this semantic dictionary is exposed to an announcement about a particular company, it can transform it to use a version of the list item that is preferred based on usage rates, or based on some other criterion. For example, the facility transforms “AAL announces new routes to Maui” to “American Airlines announces new routes to Maui”. In some embodiments, where particular person is responsible for a particular list item, when the facility receives a piece of news identifying the list item via any of its known expressions, the facility uses the preferred expression of that list item to forward the piece of news to the appropriate person.
It will be appreciated by those skilled in the art that the above-described facility may be straightforwardly adapted or extended in various ways. While the foregoing description makes reference to particular embodiments, the scope of the invention is defined solely by the claims that follow and the elements recited therein.
This application is a divisional of U.S. patent application Ser. No. 16/459,429 filed Jul. 1, 2019, which is hereby incorporated by reference in its entirety. This application is also related to the following applications, each of which is hereby incorporated by reference in its entirety: U.S. patent application Ser. No. 16/459,385 filed on Jul. 1, 2019; U.S. patent application Ser. No. 16/459,412 filed on Jul. 1, 2019; U.S. Provisional Patent Application No. 61/722,759 filed on Nov. 5, 2012; U.S. patent application Ser. No. 13/723,018 filed on Dec. 20, 2012 (now U.S. Pat. No. 9,009,197); U.S. patent application Ser. No. 13/952,212 filed on Jul. 26, 2013 (now U.S. Pat. No. 8,661,059); International Application No. PCT/US2013/068341 filed on Nov. 4, 2013; U.S. patent application Ser. No. 14/685,466 filed on Apr. 13, 2015 (now U.S. Pat. No. 9,996,608); U.S. patent application Ser. No. 15/794,405 filed on Oct. 26, 2017; U.S. patent application Ser. No. 16/026,524 filed on Jul. 3, 2018; U.S. patent application Ser. No. 16/432,634 filed on Jun. 5, 2018; U.S. patent application Ser. No. 16/432,737 filed on Jun. 5, 2018; U.S. Provisional Patent Application No. 62/150,237 filed on Apr. 20, 2015; U.S. patent application Ser. No. 14/963,063 filed on Dec. 8, 2015 (now U.S. Pat. No. 9,575,954); International Application No. PCT/US2016/026787 filed on Apr. 8, 2016; U.S. patent application Ser. No. 15/404,916 filed on Jan. 12, 2017 (now U.S. Pat. No. 9,977,775); and U.S. patent application Ser. No. 15/957,764 filed on Apr. 19, 2018. In cases where the present patent application conflicts with an application or other document incorporated herein by reference, the present application controls.
Number | Name | Date | Kind |
---|---|---|---|
4847766 | McRae | Jul 1989 | A |
5715468 | Budzinkski | Feb 1998 | A |
5745776 | Sheppard | Apr 1998 | A |
5819265 | Ravin et al. | Oct 1998 | A |
5832480 | Byrd, Jr. et al. | Nov 1998 | A |
6289342 | Lawrence | Sep 2001 | B1 |
6393389 | Chanod et al. | May 2002 | B1 |
6453315 | Weissman | Sep 2002 | B1 |
6675169 | Bennett | Jan 2004 | B1 |
6738780 | Lawrence | May 2004 | B2 |
6823325 | Davies | Nov 2004 | B1 |
6966030 | Ashford | Nov 2005 | B2 |
7333927 | Lee | Feb 2008 | B2 |
7493253 | Ceusters | Feb 2009 | B1 |
7822597 | Brun et al. | Oct 2010 | B2 |
7869989 | Harvey | Jan 2011 | B1 |
8019590 | Kinder | Sep 2011 | B1 |
8019769 | Rolle | Sep 2011 | B2 |
8108207 | Harvey | Jan 2012 | B1 |
8190423 | Rehberg | May 2012 | B2 |
8219566 | Rolle | Sep 2012 | B2 |
8417693 | Lempel et al. | Apr 2013 | B2 |
8612466 | Kikuchi et al. | Dec 2013 | B2 |
8661059 | Cougias | Feb 2014 | B1 |
9009197 | Cougias | Apr 2015 | B2 |
9020808 | Branton | Apr 2015 | B2 |
9110975 | Diligenti et al. | Aug 2015 | B1 |
9575954 | Cougias et al. | Feb 2017 | B2 |
9715497 | Bhadbhade | Jul 2017 | B1 |
9760586 | Cook | Sep 2017 | B1 |
9798753 | Cook | Oct 2017 | B1 |
9798767 | Cook | Oct 2017 | B1 |
9846694 | Cook | Dec 2017 | B1 |
9923931 | Wagster | Mar 2018 | B1 |
9967285 | Rossman | May 2018 | B1 |
9977775 | Cougias et al. | May 2018 | B2 |
9996608 | Cougias | Jun 2018 | B2 |
10198491 | Semturs | Feb 2019 | B1 |
10353933 | Cougias | Jun 2019 | B2 |
10387575 | Shen | Aug 2019 | B1 |
10606945 | Cougias et al. | Mar 2020 | B2 |
10769379 | Cougias et al. | Sep 2020 | B1 |
10824817 | Cougias et al. | Nov 2020 | B1 |
10896211 | Cougias | Jan 2021 | B2 |
11120227 | Cougias et al. | Sep 2021 | B1 |
11216495 | Cougias | Jan 2022 | B2 |
20020065675 | Grainger | May 2002 | A1 |
20020169771 | Melmon et al. | Nov 2002 | A1 |
20020184068 | Krishnan et al. | Dec 2002 | A1 |
20030067498 | Parisi | Apr 2003 | A1 |
20040006466 | Zhou et al. | Jan 2004 | A1 |
20040030540 | Ovil | Feb 2004 | A1 |
20040059932 | Takeuchi et al. | Mar 2004 | A1 |
20040107124 | Sharpe et al. | Jun 2004 | A1 |
20050080776 | Colledge | Apr 2005 | A1 |
20050080780 | Colledge | Apr 2005 | A1 |
20050096914 | Williamson | May 2005 | A1 |
20050203924 | Rosenberg | Sep 2005 | A1 |
20050228799 | Farlow | Oct 2005 | A1 |
20060047656 | Dehlinger | Mar 2006 | A1 |
20060149720 | Dehlinger | Jul 2006 | A1 |
20060149800 | Egnor | Jul 2006 | A1 |
20060259475 | Dehlinger | Nov 2006 | A1 |
20070016583 | Lempel et al. | Jan 2007 | A1 |
20070088683 | Feroglia | Apr 2007 | A1 |
20070118515 | Dehlinger | May 2007 | A1 |
20070192085 | Roulland et al. | Aug 2007 | A1 |
20070282592 | Huang et al. | Dec 2007 | A1 |
20070283252 | Stuhec | Dec 2007 | A1 |
20080091408 | Roulland et al. | Apr 2008 | A1 |
20080208563 | Sumita | Aug 2008 | A1 |
20080262863 | Stickley et al. | Oct 2008 | A1 |
20080287142 | Keighran | Nov 2008 | A1 |
20090024385 | Hirsch | Jan 2009 | A1 |
20090089126 | Odubiyi | Apr 2009 | A1 |
20090089195 | Salomon et al. | Apr 2009 | A1 |
20090112859 | Dehlinger | Apr 2009 | A1 |
20090119141 | McCalmont | May 2009 | A1 |
20090187567 | Rolle | Jul 2009 | A1 |
20090265199 | Moerdler et al. | Oct 2009 | A1 |
20100114628 | Adler | May 2010 | A1 |
20100145678 | Csomai et al. | Jun 2010 | A1 |
20100250313 | Crocker et al. | Sep 2010 | A1 |
20110112973 | Sanghvi | May 2011 | A1 |
20110179075 | Kikuchi et al. | Jul 2011 | A1 |
20110208769 | Kemp | Aug 2011 | A1 |
20110225155 | Roulland et al. | Sep 2011 | A1 |
20110270603 | Ovil | Nov 2011 | A1 |
20120036157 | Rolle | Feb 2012 | A1 |
20120066135 | Garst et al. | Mar 2012 | A1 |
20120072422 | Rollins | Mar 2012 | A1 |
20120078801 | Holland et al. | Mar 2012 | A1 |
20120116984 | Hoang | May 2012 | A1 |
20120197631 | Ramani et al. | Aug 2012 | A1 |
20130047221 | Warnock et al. | Feb 2013 | A1 |
20130091486 | Gemmell | Apr 2013 | A1 |
20130226662 | LeVine et al. | Aug 2013 | A1 |
20130297477 | Overman | Nov 2013 | A1 |
20130346302 | Purves et al. | Dec 2013 | A1 |
20140032209 | Etzioni et al. | Jan 2014 | A1 |
20140046892 | Gopalakrishnan et al. | Feb 2014 | A1 |
20140052617 | Chawla et al. | Feb 2014 | A1 |
20140244524 | Bresthoff | Aug 2014 | A1 |
20140310249 | Kowalski | Oct 2014 | A1 |
20150012402 | Buck | Jan 2015 | A1 |
20150066478 | Onishi | Mar 2015 | A1 |
20150142682 | Ghaisas | May 2015 | A1 |
20150220621 | Cougias | Aug 2015 | A1 |
20150249651 | Okamoto et al. | Sep 2015 | A1 |
20160306789 | Cougias | Oct 2016 | A1 |
20160350283 | Carus et al. | Dec 2016 | A1 |
20160371618 | Leidner | Dec 2016 | A1 |
20170075877 | Lepeltier | Mar 2017 | A1 |
20170147635 | McAteer | May 2017 | A1 |
20170178028 | Cardhonha | Jun 2017 | A1 |
20170220536 | Chiba | Aug 2017 | A1 |
20170236129 | Kholkar | Aug 2017 | A1 |
20170300472 | Parikh | Oct 2017 | A1 |
20180053128 | Costas | Feb 2018 | A1 |
20180101779 | Canim | Apr 2018 | A1 |
20180314754 | Cougias | Nov 2018 | A1 |
20180357097 | Poort et al. | Dec 2018 | A1 |
20180373691 | Alba | Dec 2018 | A1 |
20190080018 | Pilkington | Mar 2019 | A1 |
20190080334 | Copeland | Mar 2019 | A1 |
20190163778 | Brown | May 2019 | A1 |
20190188400 | Vandervort | Jun 2019 | A1 |
20190260694 | Londhe et al. | Aug 2019 | A1 |
20190286642 | Cougias | Sep 2019 | A1 |
20190286643 | Cougias | Sep 2019 | A1 |
20200050620 | Clark | Feb 2020 | A1 |
20200111023 | Pondicherry Murugappan | Apr 2020 | A1 |
20200176098 | Lucas | Jun 2020 | A1 |
20200327285 | Cox et al. | Oct 2020 | A1 |
20210149932 | Cougias | May 2021 | A1 |
20210365638 | Cougias et al. | Nov 2021 | A1 |
20220067290 | Cougias et al. | Mar 2022 | A1 |
Number | Date | Country |
---|---|---|
1975837 | Oct 2008 | EP |
3404891 | Nov 2018 | EP |
2008121382 | Oct 2008 | WO |
Entry |
---|
U.S. Appl. No. 17/389,959, filed Jul. 30, 2021. |
Baldwin et al., “Chapter 1—Multiword Expressions,” Handbook of Natural Language Processing, Second Edition:1-40, 2010. |
Ferrari et al., “Detecting requirements defects with NLP patterns: an industrial experience in the railway domain,” Empirical Software Engineering 23:3684-3733, 2018. |
Final Office Action for U.S. Appl. No. 16/432,634, dated Oct. 12, 2021, 17 pages. |
Gharbieh et al., “Deep Learning Models for Multiword Expression Identification,” Proceedings of the 6th Joint Conference on Lexical and Computational Semantics, Canada, Aug. 3-4, 2017, pp. 54-64. |
International Search Report and Written Opinion for International Application No. PCT/US2021/048088, dated Feb. 9, 2022, 13 pages. |
Non-Final Office Action for U.S. Appl. No. 17/389,959, dated Dec. 7, 2021, 33 pages. |
Non-Final Office Action for U.S. Appl. No. 17/460,054, dated Nov. 15, 2021, 5 pages. |
Notice of Allowance for U.S. Appl. No. 17/460,054, dated Mar. 7, 2022, 12 pages. |
Suissas, “Verb Sense Classification,” Thesis to obtain the Master of Science Degree in Information Systems and Computer Engineering: 1-72, Oct. 2014. |
Wahl, “The Distributional Learning of Multi-Word Expressions: A Computational Approach,” Dissertation: 1-190, Jun. 2015. |
{hacek over (S)}kvorc et al., “MICE: Mining Idioms with Contextual Embeddings,” Aug. 14, 2020, pp. 1-23. |
Devlin et al., “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding,” Cornell University, 2018, 14 pages. |
Lan et al., “ALBERT: A Lite Bert for Self-Supervised Learning of Language Representations,” arXiv preprint arXiv:1909.11942, 2019, 17 pages. |
Masini, F., “Multi-Word Expressions and Morphology,” Oxford Research Encyclopedias, 2019, 30 pages. |
Mikolov et al., “Distributed Representations of Words and Phrases and their Compositionality,” Advances in neural information processing systems:3111-3119, 2013. |
Pennington et al., “GloVe: Global Vectors for Word Representation,” Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP): 1532-1543, 2014. |
Peters et al., “Deep contextualized word representations,” arXiv preprint arXiv:1802.05365v2, 2018, 15 pages. |
Radford et al., “Improving Language Understanding by Generative Pre-Training,” 2018 (Retrieved from s3-us-west-2.amazonaws.com on Sep. 14, 2021.). |
Ramshaw et al., “Text Chunking Using Transformation-Based Learning,” Natural language processing using very large corpora, Springer, 1999, 157-176. |
Ratinov et al., “Design Challenges and Misconceptions in Named Entity Recognition,” Proceedings of the Thirteenth Conference on Computational Natural Language Learning (CoNLL):147-155, 2009. |
Rohanian at al., “Bridging the Gap: Attending to Discontinuity in Identification of Multiword Expressions,” Cornell University, 2019, 7 pages. |
Schneider et al., “SemEval-2016 Task 10: Detecting Minimal Semantic Units and their Meanings (DiMSUM),” Proceedings of SemEval:546-559, 2016. |
Vaswani et al., “Attention Is All You Need,” 31st Conference on Neural Information Processing Systems, 2017, 11 pages. |
International Preliminary Report on Patentability for related PCT Application No. PCT/US2016/026787, dated Oct. 24, 2017 (10 pages). |
Non-Final Office Action for U.S. Appl. No. 13/952,212, dated Oct. 15, 2013, 7 pages. |
Non-Final Office Action for U.S. Appl. No. 16/432,634, dated Feb. 5, 2021, 7 pages. |
Final Office Action for U.S. Appl. No. 16/432,737, dated Feb. 11, 2021, 10 pages. |
Final Office Action for U.S. Appl. No. 16/459,385, dated Apr. 23, 2021, 17 pages. |
AuditScripts—About Us, <www.auditscripts.com/about-us/>, 2011. |
Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 ,” Dec. 2009, 76 pages. |
CSA Cloud Security Alliance—History, <cloudsecurityalliance.org/history/>, 2010. |
HITRUST Common Security Framework Matures with Enhancements for 2010, Feb. 1, 2010, 4 pages. <hitrustalliance.nel/hitrust-common-security-framework-matures-enhancements-2010/>. |
International Search Report and Written Opinion for counterpart PCT Application No. PCT/US2016/026787, dated Jul. 22, 2016 (15 pages). |
International Search Report and Written Opinion for International Application No. PCT/US13/68341, dated Feb. 26, 2014, 11 pages. |
ISF Information Security Forum, <securityforum.org/aboul/>, first published 2007. |
Proffitt, Tim, “Meeting Compliance Efforts with the Mother of All Control Lists (MOACL),” Sans Institute Information Security Reading Room, 2010, 56 pages. |
Wikipedia, “Frequency {statistics)”, 4 pages, downloaded Mar. 10, 2020. {Year: 2020). |
Wikipedia, “Word lists by frequency”, 10 pages, downloaded Mar. 10, 2020. (Year: 2020). |
Final Office Action for U.S. Appl. No. 17/389,959, dated May 18, 2022, 18 pages. |
International Search Report, dated Nov. 8, 2022, for International Patent Application No. PCT/US2022/037624. (3 pages). |
Number | Date | Country | |
---|---|---|---|
20210004535 A1 | Jan 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16459429 | Jul 2019 | US |
Child | 16932609 | US |