222 patents
Utility
Horizontal scaling of version caches in a distributed high-concurrency multi-user environment
9 Jan 24
Techniques for providing horizontally scaled caching of versioned data are provided.
Darren Lee, Christof Bornhoevd
Filed: 28 Jan 22
Utility
Environment agnostic load generation
9 Jan 24
The present application discloses a method, system, and computer system for running a test in a database system.
Sandeep Dhingra, Tara Sudarshan, Abhishek Karpate
Filed: 3 Nov 21
Utility
Distributed partitioned map reduce using a data fabric
9 Jan 24
A system for a distributed partitioned map reduce includes a plurality of nodes, a plurality of partitions, and a service node.
Jason Howes, Noah Arliss
Filed: 12 Jan 18
Utility
Split keys for wallet recovery
9 Jan 24
A system for split keys for wallet recovery includes an interface configured to receive a request to recover a user private key, and a processor configured to provide a request to a credential issuing authority for a first encrypted recovery key share, wherein the request includes a first identification credential, receive the first encrypted recovery key share from the credential issuing authority, provide a request to a trusted organization for a second encrypted recovery key share, wherein the request includes a second identification credential, receive the second encrypted recovery key share from the trusted organization, combine the first encrypted recovery key share and the second encrypted recovery key share to determine a recovered encryption key, and determine the user private key using the recovered encryption key.
Bjorn Hamel, Prakash Sundaresan
Filed: 21 May 20
Utility
Shift Design and Assignment System
21 Dec 23
A system for shift design and assignment comprises an interface configured to receive scheduling input data which includes labor demand data, worker data, and scheduling configuration data, and a processor configured to generate a set of shift candidates, determine a set of decision variables, determine a cost function, determine a set of constraints, and determine simultaneously, using a SAT, a MP solver, or a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates such that the hard constraints are fully respected, violations to the soft constraints are minimized, and the cost function is minimized.
Jin Yang
Filed: 5 Sep 23
Utility
Enabling Using External Tenant Master Keys
21 Dec 23
The present application discloses a method, system, and computer system for managing data using keys.
Miguel Leonardo Chinchilla Cartagena, Karina Si-Woon Chan, Aswani Kaushik Chimthapalli, Michael Clarke, Amol Anant Deshmukh, Subha Gopalakrishnan, Bjorn Brook Hamel, Louis James LaTouche, Atlee Glen Lyden, Marcus Anthony Sanchez, Jasmine Teresa Schladen, Devaki Ajinkya Tarkunde, Harrison Yu
Filed: 5 Sep 23
Utility
Two fold validation for hierarchical data models
7 Nov 23
A system comprises an interface and a processor.
Anand Anathanam, Ajay Sagar, Katherine Lahl, John Paul Nguafack
Filed: 13 Oct 20
Utility
Rule based access to voluntarily provided data housed in a protected region of a data storage device
7 Nov 23
Structured access to volunteered private data disclosed.
Sangar Dowlatkhah, Erie Lai Har Lau
Filed: 27 Jul 22
Utility
Amendments for transactional index
7 Nov 23
A system for indexing includes an interface and a processor.
Sergio Mendiola, Bryan Regis, Shivender Devarakonda
Filed: 20 May 20
Utility
Enabling using external tenant master keys
24 Oct 23
The present application discloses a method, system, and computer system for managing data using keys.
Miguel Leonardo Chinchilla Cartagena, Karina Si-Woon Chan, Aswani Kaushik Chimthapalli, Michael Clarke, Amol Anant Deshmukh, Subha Gopalakrishnan, Bjorn Brook Hamel, Louis James LaTouche, Atlee Glen Lyden, Marcus Anthony Sanchez, Jasmine Teresa Schladen, Devaki Ajinkya Tarkunde, Harrison Yu
Filed: 27 Sep 21
Utility
Digital credentials for visitor network access
17 Oct 23
A system for credential authentication comprises an interface configured to receive a create indication to create a visitor network credential and receive a certify indication to certify an authentication device to use a network, and a processor configured to provide the visitor network credential to the authentication device in response to the certify indication, provide a proof request to the authentication device, receive a proof response, validate the proof response using a distributed ledger, generate a network certificate, and provide the network certificate to the authentication device.
Bjorn Hamel, Jonathan David Ruggiero
Filed: 26 Mar 19
Utility
Digital credentials as guest check-in for physical building access
17 Oct 23
A system for credential authentication includes an interface and a processor.
Bjorn Hamel, Jonathan David Ruggiero, Scott Mangino
Filed: 26 Mar 19
Utility
Automated Anomaly Detection Using a Hybrid Machine Learning System
12 Oct 23
In some aspects, the techniques described herein relate to a method including receiving, by a processor, raw data representing interactions; generating, by the processor, a feature set based on the raw data, a given feature in the feature set including at least a portion of the raw data and at least one engineered feature; generating, by the processor, a first score for the feature set using a machine learning (ML) model, the first score representing an anomaly score; generating, by the processor, one or more second scores, each score in the one or more second scores generated by performing a linear operation on one or more features in the feature set; aggregating, by the processor, the first score and the one or more second scores to generate a total score; and outputting, by the processor, the total score.
Rivaz KASMANI, Daniel ALVAREZ, Monika PANDEY
Filed: 28 Mar 22
Utility
Data Access Policies
12 Oct 23
To verify compliance with a data access policy, the system compares electronic data to an electronic data access policy identified by a database; determines whether a portion of the electronic data complies with the electronic data access policy; in response to the portion of the electronic data not complying with the electronic data access policy, indicates that an access to the electronic data by a communication device is not permissible; and declines the access to the portion of the electronic data to the communication device when the access to the electronic data is not permissible.
Evgene Vahlis, Paul Giura
Filed: 13 Jun 23
Utility
Tenant security control of data for application services
10 Oct 23
A system for tenant security control includes an interface and a processor.
Emalee Ann Bottini, Barbara Marie Cosgrove, Mohan Rajagopalan, Andrew Timothy Cannon, Merethe Eidnes Hansen, Olivia Yu Gu
Filed: 21 Jan 19
Utility
Shift design and assignment system
10 Oct 23
A system for shift design and assignment comprises an interface configured to receive scheduling input data which includes labor demand data, worker data, and scheduling configuration data, and a processor configured to generate a set of shift candidates, determine a set of decision variables, determine a cost function, determine a set of constraints, and determine simultaneously, using a SAT, a MP solver, or a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates such that the hard constraints are fully respected, violations to the soft constraints are minimized, and the cost function is minimized.
Jin Yang
Filed: 14 Nov 22
Utility
Computerized Systems and Methods for Semantic Searching
5 Oct 23
Disclosed are systems and methods for a semantic search framework that operates to provide a robust search feature of database hosted data.
Joseph CAINEY, Jyoti MISHRA, Jakob NIELSEN, Bjorn ARNHOLTZ, Gary ENGELBERT
Filed: 29 Mar 22
Utility
Multiple versioning for hierarchical data models
3 Oct 23
A system includes an interface and a processor.
Anand Anathanam, Ajay Sagar, Katherine Lahl, John Paul Nguafack
Filed: 13 Oct 20
Utility
Digital credentials for user device authentication
26 Sep 23
A system for credential authentication includes an interface and a processor.
Bjorn Hamel, Jonathan David Ruggiero
Filed: 26 Mar 19
Utility
Correlating Request and Response Data Using Supervised Learning
21 Sep 23
The example embodiments relate to matching response data to request data. in an embodiment, a method includes retrieving a request and a plurality of responses; generating packed candidates based on the request and the plurality of responses, a given packed candidate in the packed candidates including the request and a subset of the plurality of responses; generating feature vectors corresponding to the packed candidates, a given feature vector in the feature vectors including at least one aggregated feature computed based on the request and one or more corresponding responses in a respective packed candidate; inputting the feature vectors into a machine learning (ML) model, the ML model configured to output predictions corresponding to the feature vectors; selecting a feature vector from the feature vectors based on the predictions; and storing responses associated with the optimal feature vector and the request in a data storage device.
Jeanette NGUYEN, Tim LEE, Hesam IZAKIAN, Dalmo CIRNE
Filed: 15 Mar 22