524 patents
Page 12 of 27
Utility
Queries based on ranges of hash values
31 Aug 21
A system includes a database client, and a distributed database comprising database nodes.
Rui Liu, Qiming Chen, Jeff Lefevre, Malu G. Castellanos, Meichun Hsu
Filed: 25 Sep 15
Utility
Determining pseudonym values using tweak-based encryption
31 Aug 21
A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges.
Timothy Roake, Luther Martin
Filed: 20 Mar 18
Utility
Indicating malware generated domain names using n-grams
31 Aug 21
Systems and methods for identifying, in a domain name, n-grams that do not appear in words of a given language, where n is greater than two are disclosed.
Pratyusa K. Manadhata, Kyle Williams, Barak Raz, Martin Arlitt
Filed: 31 Jan 18
Utility
Simulation of a synchronization of records
24 Aug 21
A simulation of a synchronization of records between applications may include identifying a plurality of records modified since a previous synchronization of applications.
Roee Refael, Elad Avraham, Gil Baruch
Filed: 23 Dec 14
Utility
Dynamic Contextual Menu
19 Aug 21
Content items and a dynamic menu element are displayed, Responsive to selection and dragging of the dynamic menu element over a particular content item, a menu of actions contextual to the particular content item is displayed, and the particular content item is highlighted to indicate that the displayed menu is related to the particular content item.
BING ZHANG, DA-LONG SUN, LI ZHANG, RONG-FENG CHEN
Filed: 30 Mar 18
Utility
Authentication-based on Handholding Information
19 Aug 21
An apparatus may include a processor that may be caused to access handholding information indicating a hand configuration in which the apparatus is being held and compare the handholding information with previously-stored handholding authentication data of an authentic user.
Douglas GROVER, Lloyd L. BURCH, Michael F. ANGELO
Filed: 19 Feb 20
Utility
Authentication Based on One-time Usernames
19 Aug 21
An apparatus may include a processor that may be caused to receive an authentication request to authenticate a user.
Umar ASHRAF
Filed: 18 Feb 20
Utility
Recommendation engine for resource tagging
17 Aug 21
A resource recommendation system is described to recommend and standardize resource tagging in a networked computing environment.
Vishwanath Pargaonkar, Jaspreet Singh, Chilakam Prathapa Reddy
Filed: 6 Dec 19
Utility
Data objects associated with private set intersection (PSI)
17 Aug 21
Examples disclosed herein relate to data objects associated with private set intersection (PSI).
Liqun Chen, Stuart Haber, Tomas Sander
Filed: 18 Mar 16
Utility
Ranking and De-ranking Data Strings
12 Aug 21
This document describes example methods, devices, and computing systems to rank a data string into a ranking value, and de-rank a second value representative of a variation of the ranking value (e.g., cipher value) into a second data string (e.g., cipher string), using a tree data-structure.
Thomas Wu
Filed: 11 Feb 20
Utility
Navigation menu based on crowd data
10 Aug 21
In one example in accordance with the present disclosure, a method for a navigation menu of a web technology includes collecting navigation data related to how multiple past users navigate the web technology.
Elad Levi, Avigad Mizrahi, Ran Bar Zik
Filed: 23 Feb 15
Utility
Identifying a push communication pattern
3 Aug 21
A method for identifying a push communication pattern includes creating clusters from a communication entity's response buffers.
Ofer Eliassaf, Amir Kessner, Meidan Zemer, Oded Keret, Moshe Eran Kraus
Filed: 26 Jan 12
Utility
Project Visualizations
29 Jul 21
In some examples, a system represents tasks of a project as feature nodes of a force-directed graph, and connects, in the force-directed graph, sub-feature nodes representing sub-features associated by links to the feature nodes in the force-directed graph.
ER-XIN SHANG
Filed: 11 Jun 18
Utility
Optimize query based on unique attribute
27 Jul 21
Example implementations relate to optimized queries based on unique attributes.
Kahlil Bre Oppenheimer, Jaimin M. Dave
Filed: 27 Mar 15
Utility
Automatic Selection of Request Handler Using Trained Classification Model
22 Jul 21
A computing device includes a processor and a medium storing instructions.
ZHU JING WU, XIN-YU WANG, JIN WANG, CHUN-HUA LI, ZHEN CUI
Filed: 22 May 18
Utility
Mapping data sources to storage devices based on fuzzy logic-based classifications
20 Jul 21
A technique includes, for each storage device of a plurality of storage devices, applying, by a processor, fuzzy logic to assign the plurality of storage devices to respective storage classes based on the weights that are assigned to the plurality of storage devices.
Lokesh Murthy Venkatesh, Nandan Shantharaj, Sunil Turakani
Filed: 4 Jun 19
Utility
Database column refresh via replacement
20 Jul 21
According to an example, a system may receive a refresh column command for a column-oriented database.
Michael Leuchtenburg, Yuanzhe Bei, Charles Edward Bear, Nga Tran
Filed: 28 Aug 17
Utility
Inferring topological linkages between components
13 Jul 21
In some examples, a host name that is known to correspond to a first source component may be identified.
Dmitry Feshenko, Gabriel Dayan, Avihay Mor
Filed: 30 Jan 17
Utility
Converting Database Language Statements Between Dialects
8 Jul 21
A system receives a source database language statement according to a first dialect, determines a pattern of the source database language statement, the pattern comprising an abstract representation of the source database language statement, and checks whether the determined pattern is present in a cache of translations between patterns according to the first dialect and corresponding patterns according to a second dialect different from the first dialect.
LEI SHI, QIN ZHOU, BING GU, DONG-HUI ZHU, FENG YAN, WEN ZOU
Filed: 15 Jun 18
Utility
Detecting vulnerabilities in applications during execution
6 Jul 21
In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device.
Alexander Michael Hoole, Ming Sum Sam Ng
Filed: 24 Oct 17