查看更多>>摘要:News editors obtained the following quote from the background information supplied by the inventors: “In recent years, the use of artificial intelligence, including, but not limited to, machine learning, deep learning, etc. (referred to collectively herein as artificial intelligence models, machine learning models, or simply models) has exponentially increased. Broadly described, artificial intelligence refers to a wideranging branch of computer science concerned with building smart machines capable of performing tasks that typically require human intelligence. Key benefits of artificial intelligence are its ability to process data , find underlying patterns, and/or perform real-time determinations. However, despite these benefits and despite the wide-ranging number of potential applications, practical implementations of artificial intelligence have been hindered by several technical problems. First, artificial intelligence may rely on large amounts of high-quality data. The process for obtaining this data and ensuring it is high-quality can be complex and time-consuming. Additionally, data that is obtained may need to be categorized and labeled accurately, which can be difficult, time-consuming, and a manual task. Second, despite the mainstream popularity of artificial intelligence, practical implementations of artificial intelligence ma y require specialized knowledge to design, program, and integrate artificial intelligence-based solutions, which can limit the number of people and resources available to create these practical implementations. Finally, results based on artificial intelligence can be difficult to review as the process by which the results are made may be unknown or obscured. This obscurity can create hurdles for identifying errors in the results, as well as improving the models providing the results. These technical problems may present an inherent problem with attempting to use an artificial intelligence-based solution in generating a ranking of vu lnerabilities based on the risk score and corresponding compensation amount to incentivize individuals to find patches for vulnerabilities and in determining the value of patching a vulnerability within a computing environment.”