2270 patents
Page 14 of 114
Utility
Methods, systems, and computer readable media for supporting mobile originated data multicasting in a communications network
12 Sep 23
Methods, systems, and computer readable media for supporting mobile originated data multicasting in a communications network are disclosed.
Rajiv Krishan
Filed: 29 Sep 21
Utility
Object-oriented regression-candidate filter
5 Sep 23
Methods and systems are disclosed providing an object-oriented regression-candidate filter to improve software build testing.
Changqin He
Filed: 27 Jul 18
Utility
le2k435f6lpq04jsyvbw82yz483wq1cu26qg30
5 Sep 23
System and methods discussed herein are directed to detecting the existence or modification of one or more data assets within a cloud-computing tenancy.
Gopal Srinivasa Raghavan, Sathesh Kumar Murthy
Filed: 3 Aug 21
Utility
uxhxv9e55x6kcbdmi8zktef
5 Sep 23
Techniques for using honeypots to lure attackers and gather data about attackers and attack patterns on Infrastructure-as-a-Service (IaaS) instances.
Christopher James Ries, Nikkolas Anthony Lavorato, Kevin Raymond, Jr., Philip Nathan Andrews, III, Christa Agnes Johnson Scura
Filed: 1 Sep 20
Utility
5yjfrevbo725b66i2c9xq3afg2kerxiw8yyicu uiu8gponkwcad6iesd
5 Sep 23
A method for historical 5G user equipment (UE) mobility tracking and security screening includes receiving, at a network data aggregation node including at least one processor, UE registration data from 5G network functions (NFs) as UEs connect to different network locations.
Travis Earl Russell
Filed: 31 Aug 20
Utility
3jtbtlmhff64zvm9 ypchbzuaxvyapr17ogsuw2lu5p
5 Sep 23
Systems, devices, and methods of the present invention validate argumentation in text.
Boris Galitsky
Filed: 26 Aug 20
Utility
p8dmc276na9r61r fc33t97in79rbqh0
5 Sep 23
Systems and methods are provided for supporting scalable multi-homed routing for virtual switch based host channel adapter (HCA) virtualization in a subnet.
Bartosz Bogdanski, Bjørn Dag Johnsen, Line Holen
Filed: 28 Jul 21
Utility
oid r3ev7bdrew0cdlvmbkvbwtmtwl9py7x
5 Sep 23
An access management system (AMS) is disclosed that includes SSO capabilities for providing users secure access to protected resources within an enterprise using encryption keys generated by a client application.
Nagaraj Pattar, Pruthvithej Ramesh Kumar
Filed: 7 Feb 22
Utility
y2juaujvr7y05rpdv1es4tx 2af554ulrhb4tnm3xhyc
22 Aug 23
A system and associated processes to allocate tenants to servers are disclosed.
Oleksiy Ignatyev
Filed: 15 Nov 21
Utility
jd9qg358do85if18bcmigseob0zu3gyxry7 7sjcp5aqltey5qdrnmblbyu
22 Aug 23
Implementations described here provide a chatbot system that is configurable to meet the needs of the user.
Lyudmil Valentinov Pelov
Filed: 27 Apr 21
Utility
chxvmaw70agk6z5bp9du6c3lmm59q9e330jsqcc5pbve
22 Aug 23
Techniques are described for providing session management functionalities using an access token (e.g., an Open Authorization (OAuth) access token).
Mayank Maria, Aarathi Balakrishnan, Dharmvir Singh, Madhu Martin, Vikas Pooven Chathoth, Vamsi Motukuru
Filed: 2 Mar 22
Utility
9ujhaasjfndnxuz4 2pinq
22 Aug 23
A secure private network connectivity system (SNCS) within a cloud service provider infrastructure (CSPI) is described that provides secure private network connectivity between external resources residing in a customer's on-premise environment and the customer's resources residing in the cloud.
Lucas Michael Kreger-Stickles, Abhiman Yashpala Karkera, Dhwanish Pramthesh Shah, Guanhong Pei, Clayton Matthew Magouyrk, Paul James Cainkar
Filed: 29 Oct 21
Utility
ct3cm6ok9l1wgrpion7tc5in209r2gfgja8dfx0u0i7abbrf7fw2i
22 Aug 23
Techniques are described for identifying resources within a region of a cloud-computing environment.
Erik Joseph Miller, Caleb Dockter
Filed: 9 Dec 22
Utility
txpsfzmvozsp4xzzlxw8edllun0ethuwbn88rg7s2ktlbuyu9zqrheqq
22 Aug 23
An example system and method facilitate automatically generating a software application (e.g., a micro app) to facilitate performing a task, such as collecting information.
Christian Straub, Jeff Price, Walid Abu-Hadba
Filed: 17 Dec 21
Utility
f9374ctph2756mkwfyay8gh0y 7auple86tn6rmjq
22 Aug 23
Techniques for accessing a migrated method include: identifying a request to invoke a method defined by a particular type; identifying, in the particular type: an older version of the method that is (a) associated with a method name and (b) configured to return values of a first return type, and a current version of the method that is (a) associated with the method name and (b) configured to return values of a second return type; determining that the first request specifies the first return type; responsive to determining that the first request specifies the first return type: executing the current version of the method to obtain a value of the second return type; applying one or more conversion functions to convert the value of the second return type to a value of the first return type; returning the value of the first return type responsive to the first request.
Brian Goetz, John R. Rose, Gavin Mark Bierman
Filed: 4 May 22
Utility
1fqvp9ry2451uduyh3z5a8w6gil0t27oyqbdq spdhhau607bj23j48fo
22 Aug 23
Provided are systems, methods, and computer-readable medium for a simulation platform that can generate simulated activity data for testing a security monitoring and control system.
Kamalendu Biswas, Gaurav Bhatia, Shachi Prasad, Kiran Shriniwas Doddi
Filed: 18 Apr 22
Utility
coxd8unugq6yof8ccljqgr8iq4j2b
22 Aug 23
During execution of garbage collection marking, an application thread receives a first request to overwrite a reference field of an object, the object comprising at least a first reference and the first request comprising a second reference to be written to the reference field.
Erik Österlund, Per Liden, Stefan Mats Rikard Karlsson
Filed: 3 Jun 21
Utility
m4z8kxla8phfevyz6t7jdyvco9a4ifg
22 Aug 23
In accordance with an embodiment, described herein are systems and methods that enable client-side calculation with data provided at a multidimensional or other database server.
Kumar Ramaiyer, John Xiao
Filed: 20 Jan 21
Utility
nsdvniwg6h1a0w010pyacqal292r8kc6ztb 9nfm76szxfvic6djxj2y
22 Aug 23
A method may use a minimal set of indices for an input query including identifying the input query including primitive searches that are accelerated using indices, and computing a minimal set of indices for the input query using a polynomial-time algorithm by constructing a bi-partite graph comprising a first and a second vertex set.
Bernhard F. Scholz, Pavle Subotic
Filed: 13 Sep 21
Utility
mg9a153h9q47iiiudme666
22 Aug 23
Techniques are provided for autonomous caching of hierarchical data.
Matthew Dombroski, Anne Murphy, Ekrem S.C. Soylemez, James Hartsing
Filed: 19 Mar 20