2270 patents
Page 5 of 114
Utility
Stage-specific pipeline view using prediction engine
28 Nov 23
Techniques for displaying a stage-specific pipeline view with a prediction engine are disclosed.
Mark Pearson, Jinwon Lee, Gregory Nerpouni, Charles Wardin Stabb
Filed: 10 Sep 20
Utility
Managing hybrid graph data storage and retrieval for efficient graph query execution
28 Nov 23
A system for loading graph data from an external store in response to a graph query is disclosed.
Iraklis Psaroudakis, Mhd Yamen Haddad, Martin Sevenich
Filed: 14 May 22
Utility
Scalable specification and self-governance for autonomous databases, cluster databases and multi-tenant databases in cloud and on-prem environment
28 Nov 23
A computer program product, system, and computer implemented method for scalable specification and self-governance for autonomous databases, cluster databases, and multi-tenant databases in cloud and on-prem environments.
Rohan Ankalikar, Nagarajan Muthukrishnan, Ravi Shankar Thammaiah, Sandeep Kumar Samudrala
Filed: 1 Jul 21
Utility
Summarized logical forms for controlled question answering
28 Nov 23
Systems, devices, and methods discussed herein provide improved autonomous agent applications that are configured to generate automated answers to a question using summarized logical forms (SLFs).
Boris Galitsky
Filed: 9 Sep 20
Utility
Full server recovery architecture for cloud bare metal instances
28 Nov 23
Systems, methods, and other embodiments associated with secure firmware update in a bare metal cloud environment are described.
Jaime Ismael Rangel-Martinez, Paul McMillan, Matthew L King
Filed: 21 May 19
Utility
Methods, systems, and computer readable media for mitigating spoofing attacks on security edge protection proxy (SEPP) inter-public land mobile network (inter-PLMN) forwarding interface
28 Nov 23
A method for mitigating spoofing attacks on an SEPP inter-PLMN forwarding interface includes obtaining, by a responding SEPP, a first SEPP identifier and/or a first PLMN identifier from at least one message received over an inter-PLMN control interface.
Jay Rajput, Shashikiran Bhalachandra Mahalank, Iyappan Chellasamy
Filed: 21 Dec 20
Utility
Providing selective peer-to-peer monitoring using MBeans
28 Nov 23
Providing selective peer-to-peer monitoring using MBeans by providing a federation of peer-to-peer network servers based on the MBeans, and enabling each of the peer-to-peer networks servers to selectively monitor data associated with at least a subset of the peer-to-peer network servers using at least one of the MBeans.
Philippe Le Mouel
Filed: 20 Jan 21
Utility
Techniques for dynamic configuration generation
28 Nov 23
A configuration helper system (CHS) is described that simplifies the task of generating configuration information for a customer premises equipment (CPE) in a customer's on-premise network to enable the CPE to communicate with the customer's cloud network over a particular communication channel.
Peter John Hill, Jincheng Liu, Zhao Wang, Pingbo Zhang
Filed: 30 Nov 20
Utility
Methods, systems, and computer readable media for generating, conveying, and using attempted producer network function (NF) instance communication information
28 Nov 23
A method for generating, conveying, and using attempted producer network function (NF) instance communication information includes, at a first service communication proxy (SCP), receiving, from a sender, a first service based interface (SBI) request message.
Virendra Singh, Jay Rajput, Ankit Srivastava
Filed: 11 Nov 21
Utility
Virtual layer-2 network
28 Nov 23
Systems and methods for a virtual layer-2 network are described herein.
Lucas Michael Kreger-Stickles, Shane Baker, Bryce Eugene Bockman, Peter Croft Jones, Jagwinder Singh Brar
Filed: 14 Jul 21
Utility
Automated function category detection
21 Nov 23
A method may include extracting, from a function included in code, sub-tokens and program analysis features, generating sub-token vectors from the sub-tokens and a program analysis vector from the program analysis features, combining, by a machine learning model, the sub-token vectors to obtain a combined sub-token vector, combining the combined sub-token vector and the program analysis vector to obtain a function vector, and classifying, using the function vector, the function as a function category.
Mahinthan Chandramohan, Cristina Cifuentes
Filed: 25 May 21
Utility
Integrated transition control center
21 Nov 23
Systems, methods, and machine-readable media to migrate data from source databases to target databases are disclosed.
Stephan Buehne, Elmar Spiegelberg
Filed: 20 Jan 22
Utility
Systems and methods of transaction identification generation for transaction-based environment
21 Nov 23
Described herein are systems and methods for transaction identification (ID) generation in transaction-based environments.
Baohua Yang
Filed: 5 Nov 20
Utility
Method and system for using auxiliary tables for RDF data stored in a relational database
21 Nov 23
Disclosed is an improved approach to represent RDF data in a database system, where one or more auxiliary tables are maintained for the RDF data.
Souripriya Das, Matthew Steven Perry, Eugene Inseok Chong
Filed: 7 Dec 21
Utility
Collaborative analysis system for analyzing logs
21 Nov 23
Plugins that are independently written are executed in a collaborative manner to analysis a log.
Nagarajan Muthukrishnan, Ravi Shankar Thammaiah, Sumanta Kumar Chatterjee, Binoy Sukumaran
Filed: 24 Mar 22
Utility
Smart physical payment cards
21 Nov 23
One or more embodiments include obtaining information from a physical payment card.
Girish Anantharaju
Filed: 6 Jul 20
Utility
Associating voting sessions with tabulation machines in electronic voting
21 Nov 23
An electronic voting machine obtains session information in an encrypted state for conducting a voting session.
Thomas Underhill, Adam Erickson
Filed: 18 Aug 17
Utility
Network operation based on domain specific language
21 Nov 23
A network validation system is described which may perform operations such as generating, analyzing, verifying, correcting, recommending, and deploying language, symbols, etc., such as domain specific language, configured to allow users to express their intent on the configuration and operation of a network, such as a cloud-based network.
Peter J. Hill, Jagwinder Brar, Yogesh Sreenivasan
Filed: 29 Apr 22
Utility
Pseudo labelling for key-value extraction from documents
21 Nov 23
A computing device may access visually rich documents comprising an image and metadata.
Amit Agarwal, Kulbhushan Pachauri
Filed: 6 Apr 22
Utility
Adaptive authentication in spreadsheet interface integrated with web service
21 Nov 23
An example method facilitates authenticating a client-side program, such as a spreadsheet, for access to and use of protected server-side data and/or functionality provided via a web service, such as a REpresentational State Transfer (REST) service or Application Programming Interface (API).
Edmund A. Davis, Shaun Logan
Filed: 4 Sep 19