3707 patents
Page 35 of 186
Utility
Method, Electronic Device, and Computer Program Product for Data Processing
28 Jul 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data processing.
Tao Chen, Geng Han
Filed: 24 Feb 21
Utility
Method and System for Managing Changes of Records on Hosts
28 Jul 22
A system for identifying and deleting records of hosts includes a local data manager.
Asif Khan, Kenneth William Owens, Adrian Dobrean, Aneesh Kumar Gurindapalli, Vipin Kumar Kaushal, Yasemin Ugur-Ozekinci, Shelesh Chopra
Filed: 27 Jan 21
Utility
yh9qjmkws6y2bhz3q743phqcp4811oe8qc
28 Jul 22
A system for identifying and deleting records of hosts includes a local data manager.
Asif Khan, Kenneth William Owens, Adrian Dobrean, Aneesh Kumar Gurindapalli, Vipin Kumar Kaushal, Yasemin Ugur-Ozekinci, Shelesh Chopra, Gowtham Krishna Iyengar Srinivasa Rangan
Filed: 27 Jan 21
Utility
h5pfkux5vusam2mq ssqfqebv9i6ilnkvynzud
28 Jul 22
An index of a storage system is managed.
Pengfei Su, Julius Jian Zhu, Lingling Yao
Filed: 29 Apr 21
Utility
wrbh4i8a90dxkc393j4c764v yes64ol4bz4ax60he1z07yme
28 Jul 22
An information handling system for managing detection of objects includes a storage and a processor.
Vinicius Michel Gottin, Tiago Salviano Calmon, Paulo Abelha Ferreira
Filed: 28 Jan 21
Utility
iwbncokk832oyaprj0pdt3n64
28 Jul 22
One example method includes data protection operations including cyber security operations, threat detection operations, and other security operations.
Ohad Arnon, Dany Shapiro, Shiri Gaber
Filed: 26 Jan 21
Utility
8s03sodwd61ioepxokpuab66cwk9k042nr0nzvo6yyp4xbthpbc0d0lq5c
28 Jul 22
One example method includes signal of risk access control.
Nicole Reineke, Hanna Yehuda, Stephen J. Todd
Filed: 26 Jan 21
Utility
6fgp np5gue5zy09xqn30tyjgy4evvbp59tstbo
28 Jul 22
A system for managing data protection of virtual machines (VMs) hosted by hosts of data clusters includes a data protection manager.
Gururaj Kulkarni, Anand Reddy
Filed: 27 Jan 21
Utility
seascorimn25bsug2kv or3iwt0pr0y8wttw2ryj
28 Jul 22
A system and method for implementing design cycles for developing a hardware component including receiving sets of experimental data, each of set experimental data resulting from an application of a set of variables to the hardware component during a common or a different design cycle of the hardware component, where each variable represents an aspect of the hardware component, determining discretized classes of the experimental data based on one or more quality metrics, and obtaining statistical measurements of the variables to determine correlations between the discretized classes of the quality metrics and the statistical measurements of variables for determining a pattern of the quality metrics to reduce the number of design cycles implemented on the hardware component during the developing of the hardware component.
Paulo Abelha Ferreira, Adriana Bechara Prado, Jonas Furtado Dias
Filed: 28 Jan 21
Utility
baofsf 2z87escpmv3plz
28 Jul 22
A method and system for calibrating a simulator instance is disclosed.
Jaumir Valenca Da Silveira Juior, Vinicius Michel Gottin
Filed: 28 Jan 21
Utility
518g862wkmh6x0h2k89uv 8pn7ggtv20iczm9k4os7rhk
28 Jul 22
A method, an electronic device, and a computer program product for processing data is disclosed.
Yuting Zhang, Kaikai Jia
Filed: 31 Mar 21
Utility
tqihe1mj4r6vcxo2b92jd3664mwqb3agpsrqztfpwwduv1
28 Jul 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for training and deploying a neural network.
Wenbin Yang, Jinpeng Liu, Jiacheng Ni, Zhen Jia
Filed: 3 Mar 21
Utility
gkx5s6szavxvtguby1jbzieywybhwf1ebh1tn
28 Jul 22
Embodiments include a method of storing digital data in DNA storage by receiving the digital data from a user, deduplicating the data in a deduplication system of the user to form deduplicated data, and encoding the deduplicated data into a DNA string into a format for storage on a blockchain.
Rahul Vishwakarma, Bing Liu, Parmeshwr Prasad, Parminder Singh Sethi
Filed: 22 Jan 21
Utility
dnpcpc3fio21mhi1jyxs84zpidyk7cme9549nf4xmddf2
28 Jul 22
One example method includes identifying datasets known to contain data relating to different technologies, extracting the data from the data sources, performing preprocessing on the data, clustering the data after the data has been preprocessed, and the clustering comprises generating data clusters, and mapping each of the data clusters to a phase of a Wardley Map.
Mohamed Abouzeid, Amr Abdel Aziz, Abdul Rahman Diaa, Marianne Toma, Mohamed Elsawy, Seif Helal, Stephen J. Todd, Osama Taha Mohamed, Yaseen Moussa
Filed: 28 Jan 21
Utility
5cf9p8zgryfi0f uo9o2ukpt0cgnr0et4734hh6ghq7eje34epeegn
28 Jul 22
Embodiments of the present disclosure provide a method, a device, and a computer program product for updating a machine learning model.
Jinpeng Liu, Jin Li, Jiacheng Ni, Qiang Chen, Zhen Jia
Filed: 2 Mar 21
Utility
vfjkseuxc7rkenn3fx 1mu7e3k9wp
28 Jul 22
One example method includes generating a biometric of a user, requesting, and receiving, biometric data from a card, comparing the biometric data with the biometric, and when the biometric data matches data of the biometric, authorizing a transaction requested by a user using the card.
Radia J. Perlman, Charles W. Kaufman
Filed: 27 Jan 21
Utility
pxbj6d4uyyul1vkmkpmyce qawsefza0io1cpt7u9ah6eh
28 Jul 22
One example method includes continuously performing key related operations.
Jamie Pocas, Radia J. Perlman
Filed: 28 Jan 21
Utility
din2p9uulty2dea6k 8zmdagghsfizss6zp720vp9
28 Jul 22
A method for verifying a secret decryption of an escrow agent by a client operatively connected to the escrow agent includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, after encrypting the secret, encrypting, based on a verification trigger, a verification value using the public key to obtain an encrypted verification value, sending the encrypted verification value to the escrow agent, obtaining a secret decryption response from the escrow agent, making a determination, based on the secret decryption response, that the escrow agent is not capable of decrypting the secret, and based on the determination, performing a remediation action.
Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
Filed: 28 Jan 21
Utility
okec5ix7mbmvwqlq84if867v5fyc5d9pdn0t4oj3cb7t6pnknzxh05r
28 Jul 22
One example method includes collecting, in a closed network, raw network traffic from one or more devices in the closed network, extracting metadata from the raw network traffic, processing the metadata, analyzing the metadata after the metadata has been processed, and based on the analyzing, determining whether or not an actual attack or attack threat is present in the closed network.
Ohad Arnon, Dany Shapiro, Shiri Gaber
Filed: 27 Jan 21
Utility
gnteja0l5wewwfuqhbp8muhj1nr9s22bzhb9ugqzgqwsuz9
28 Jul 22
One example method includes logging into websites through devices including insecure devices.
Seth Jacob Rothschild, Benjamin Santaus, Orlando Xavier Nieves, Radia J. Perlman
Filed: 28 Jan 21