524 patents
Page 13 of 27
Utility
Confirmation message determinations
6 Jul 21
An example technique involves sending, from a user device associated with a particular user, a request for a confirmation message setting.
Daniel Shmaya, Eliraz Busi, Itay Ben-Yehuda
Filed: 25 Jan 16
Utility
Monitoring for authentication information
6 Jul 21
Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored.
Ming Sum Sam Ng, Ronald Joseph Sechman, Matias Madou
Filed: 24 Mar 14
Utility
Analyze code that uses web framework using local parameter model
6 Jul 21
Example embodiments disclosed herein relate to analyze code of a web application associated with a framework.
Lu Zhao
Filed: 19 Dec 13
Utility
Applying a degree of transparency
29 Jun 21
Implementations disclosed herein relate to a device for applying a degree of transparency.
Eli Revach, Elad Levi, Amos Nesher
Filed: 12 Feb 15
Utility
Updating ground truth data in a security management platform
29 Jun 21
Updating ground truth data in a security management platform is disclosed.
Pratyusa K. Manadhata, Sandeep Bhatt, Tomas Sander
Filed: 20 Mar 17
Utility
Table-Based Hash Function
24 Jun 21
A computing device includes a processor and a machine-readable storage storing instructions.
Thomas Wu
Filed: 20 Dec 19
Utility
Generating Hash Values For Input Strings
24 Jun 21
A computing device includes a processor and a machine-readable storage storing instructions.
TImothy Roake, Luther Martin
Filed: 19 Dec 19
Utility
Flexible schema table
22 Jun 21
In an example, a flexible schema table may be schematized.
Benjamin M Vandiver, Lyric Pankaj Doshi, James George Fraumeni
Filed: 6 Dec 13
Utility
Application updates
22 Jun 21
Described herein are example systems and computer-implemented methods for monitoring changes to an application.
Joern Schimmelpfeng, Harald Pfaender, Artiona Bogo
Filed: 29 Jan 15
Utility
Scan adaptation during scan execution
22 Jun 21
In some examples, a system includes a scan execution engine and a scan adaptation engine.
Sasi Siddharth Muthurajan, Ming Sum Sam Ng, Jeremy C. Brooks
Filed: 26 Feb 16
Utility
Managing Containers Using Attribute/value Pairs
17 Jun 21
A computer implemented method includes: accessing from a configuration management database, by a virtualization manager, configuration data for a first computing node of a computing system; generating, by the virtualization manager, a set of attribute/value pairs for the first computing node using the configuration data; and managing, by the virtualization manager, a first container on the first computing node using the set of attribute/value pairs for the first computing node.
KE-KE QI
Filed: 31 Aug 17
Utility
Asymmetric Quorum Protocol Based Distributed Transaction Database Consistency Control
17 Jun 21
In some examples, asymmetric quorum protocol based distributed transaction database consistency control may include determining, by a set of primary participants of a cluster, whether a cluster-wide quorum has been reached to commit a transaction associated with a distributed transactional database.
Niccolo MENEGHETTI, Yuanzhe BEI
Filed: 12 Dec 19
Utility
Candidate Projection Enumeration Based Query Response Generation
17 Jun 21
In some examples, candidate projection enumeration based query response generation may include obtaining a query, and identifying, based on the query, a plurality of candidate columns from at least one table to respond to the query.
Chi Zhang, Zhibo Peng, Yuanzhe Bei, Olga Papaemmanouil
Filed: 17 Dec 19
Utility
Identification of Input Object In a Graphical User Interface
17 Jun 21
A computing device includes a processor and a medium storing instructions.
Er-Xin Shang, Hao-Bin Cui, Wen-Jie Qian
Filed: 12 Dec 19
Utility
Classifying Domain Names Based on Character Embedding and Deep Learning
10 Jun 21
An apparatus may include a processor that may be caused to access a plurality of known domain names.
Pratyusa K. MANADHATA, Martin ARLITT
Filed: 10 Dec 19
Utility
Malware Management Using I/O Correlation Coefficients
10 Jun 21
A malware attack is detected in a computing system by monitoring file I/O and coordinated network I/O traffic and referencing criteria including a correlation coefficient calculated relative to the I/O.
Manoj Dahal
Filed: 10 Dec 19
Utility
Recommendation Engine for Resource Tagging
10 Jun 21
A resource recommendation system is described to recommend and standardize resource tagging in a networked computing environment.
Vishwanath Pargaonkar, Jaspreet Singh, Chilakam Prathapa Reddy
Filed: 6 Dec 19
Utility
System and method for making a recommendation based on user data
8 Jun 21
There is described a system and computer-implemented method for providing a recommendation based on a sparse pattern of data.
Martin B. Scholz, Rajan Lukose, Rong Pan
Filed: 20 Mar 17
Utility
Identification of a set of objects based on a focal object
1 Jun 21
In one implementation, a system for managing data includes a tag engine to maintain associations among objects of a data set, an associates engine to identify a first set of objects having a tag that matches a tag coupled to a focal object, a filter engine to identify a second set of objects based on the filter evaluated on the first set of objects, and a load engine to cause the second set of objects to load for display in a window of a UI.
Klaus Baumecker, Stefan Bergstein, Timo Schneller
Filed: 16 Dec 14
Utility
Automated Noise Attenuation In Frequency Domains
27 May 21
In some examples, an apparatus for automated removal of noise in a frequency domain receives an image captured by an image sensor, converts at least a portion of the image into a frequency domain image, identifies a position in the frequency domain image, the position indicating a boundary between target content in the frequency domain image and noise in the frequency domain image, and removes content in the frequency domain image outside the boundary, to produce a noise-attenuated image.
Jin Wang, Zhu Jing Wu, Jun Lu, Gang Chen, Zhen Cui
Filed: 31 Jul 17