524 patents
Page 3 of 27
Utility
Methods and systems to automatically deduce relationships among test steps
31 Jan 23
Embodiments of the disclosure provide systems and methods for executing a functional test on an application.
Hua-Ming Zhai, Er-Xin Shang, Kai Zhou
Filed: 18 Mar 21
Utility
Web application login macro generation and verification
31 Jan 23
A login macro to automatically log into a web application running on a server computing device is generated from a provided username, a provided password, and a provided network address of the web application.
Thomas Christopher Swedlund, Constantine Adarchenko
Filed: 11 Jun 19
Utility
Automatic zoom on device screen to improve artificial intelligence identification rate
24 Jan 23
An image of a user interface of a device is captured.
Er-Xin Shang, Shuhui Fu, Yun Yuan
Filed: 28 Oct 21
Utility
Detection of entities in unstructured data
24 Jan 23
Examples herein involve detection of entities in unstructured data.
Samuel Roy Carter
Filed: 25 Oct 16
Utility
Key splitting
24 Jan 23
According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.
Stuart Haber, Liqun Chen
Filed: 27 Oct 14
Utility
Cyber attack prediction based on dark IP address space network traffic to plural client networks
24 Jan 23
A service receives, from client computing devices of client networks, information regarding incoming network traffic addressed to dark Internet Protocol (IP) address spaces the of client networks.
Pratyusa K. Manadhata, Martin Arlitt
Filed: 25 Feb 19
Utility
Low Cost Defense Against Denial-of-service Attacks
19 Jan 23
A first message is received from a first communication device.
VAMSI KRISHNA
Filed: 15 Jul 21
Utility
Dynamic Tokenization Table Exchange
19 Jan 23
A first network device nonce is computed.
Douglas Max Grover, VAMSI KRISHNA
Filed: 9 Jul 21
Utility
Installation and Authentication of Applications Using Blockchain
12 Jan 23
A request to install a first version of a software application is received.
Michael F. Angelo, Douglas Max Grover
Filed: 9 Jul 21
Utility
User interaction logic classification
10 Jan 23
Back end calls triggered by a user interaction with a client user interface may be identified.
Christopher Byrd
Filed: 29 Oct 15
Utility
Anomaly Identification Within Software Project Under Development
5 Jan 23
Quality indicators regarding a software project under development that has a plurality of functional areas are collected.
Ilan Shufer, Tom Vaingart, Sigal Ishay
Filed: 30 Jun 21
Utility
Application Tuning Based on Performance Characteristics
5 Jan 23
According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to receive information regarding a performance characteristic of an application during predetermined time periods.
Harish Kumar SOMISETTY
Filed: 1 Jul 21
Utility
Reregistration of Client Device with Server Device Using User Device
5 Jan 23
Subsequent to registration of a client device with a server device such that credentials by which the client device is authenticated are securely stored at the client device, the client device provides a user device and a server device a recovery identifier and a recovery secret key associated with the client device.
Vamsi Krishna, Jason Blackett, Harinath Jarugula
Filed: 30 Jun 21
Utility
System and method for dynamic driven context management
3 Jan 23
Context information associated with a network node is determined.
Madan Gopal Devadoss, Cherian Sebastian
Filed: 6 Nov 20
Utility
Adaptive user interface based on device context as well as user context
3 Jan 23
A device context of a device is identified based on device data including a current state of the device, and a user context of a user is identified based on user data including user interaction with a user interface for the device.
Krishna Mahadevan Ramakrishnan, Sumit Kumar, Dipankaj Medhi, Shileen Upadhyay, Shiva Prakash S M
Filed: 25 Oct 19
Utility
Authentication-based on handholding information
3 Jan 23
An apparatus may include a processor that may be caused to access handholding information indicating a hand configuration in which the apparatus is being held and compare the handholding information with previously-stored handholding authentication data of an authentic user.
Douglas Grover, Lloyd L. Burch, Michael F. Angelo
Filed: 19 Feb 20
Utility
Machine learning-based security threat investigation guidance
3 Jan 23
A technique includes accessing data representing a state of a given investigation of a potential security threat to a computer system by a security analyst.
Tamir Mitelman
Filed: 7 May 18
Utility
Secure Execution Environment for Applications Using Blockchain
29 Dec 22
A request to load an application into memory for execution is received.
Douglas Max Grover, Michael A. Angelo, Stephan F. Jou
Filed: 23 Jun 21
Utility
Blockchain Malware Protection
29 Dec 22
A request to add a new block to a blockchain is received.
Douglas Max Grover, Michael F. Angelo
Filed: 23 Jun 21
Utility
Supporting Record and Replay for Infinite Scroll Elements
8 Dec 22
Embodiments provide for automated testing of an Application Under Test (AUT) that utilizes an infinite scroll element.
Er-Xin Shang, Yun-Sheng Liu, Shuhui Fu, Yi-Bin Guo, Yun Yuan, Hua-Ming Zhai
Filed: 8 Jun 21