3707 patents
Page 35 of 186
Utility
Method, Equipment and Computer Program Product for Storage Management
28 Jul 22
Hongpo Gao, Jian Gao, Shaoqin Gong, Baote Zhuo
Filed: 8 Sep 21
Utility
Method, Electronic Device and Computer Program Product for Managing Storage System
28 Jul 22
Techniques for managing a storage system involve flushing a target page in a cache device to a persistent storage device of the storage system.
Geng Han, Jian Gao, Xinlei Xu, Yousheng Liu, Jianbin Kang
Filed: 8 Sep 21
Utility
Method, Electronic Device, and Computer Program Product for Data Processing
28 Jul 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data processing.
Tao Chen, Geng Han
Filed: 24 Feb 21
Utility
Method, Device, and Program Product for Managing Index of Storage System
28 Jul 22
An index of a storage system is managed.
Pengfei Su, Julius Jian Zhu, Lingling Yao
Filed: 29 Apr 21
Utility
Signal of Risk Access Control
28 Jul 22
One example method includes signal of risk access control.
Nicole Reineke, Hanna Yehuda, Stephen J. Todd
Filed: 26 Jan 21
Utility
Automated Failover Backup Reconfiguration Management for Storage Systems
28 Jul 22
Techniques for managing backup plans in information processing systems are disclosed.
Sunil Kumar
Filed: 22 Jan 21
Utility
Online Heuristic Sequentiality Detection Over Input/output Streams for Cache Systems In Large Address Spaces
28 Jul 22
A method and system for assessing sequentiality of a data stream is disclosed.
Vinicius Michel Gottin, Tiago Salviano Calmon, Paulo Abelha Ferreira, Hugo de Oliveira Barbalho, RĂ´mulo Teixeira de Abreu Pinho
Filed: 28 Jan 21
Utility
System and Method for Object Detection
28 Jul 22
An information handling system for managing detection of objects includes a storage and a processor.
Vinicius Michel Gottin, Tiago Salviano Calmon, Paulo Abelha Ferreira
Filed: 28 Jan 21
Utility
Forecasting Technology Phase Using Unsupervised Clustering with Wardley Maps
28 Jul 22
One example method includes identifying datasets known to contain data relating to different technologies, extracting the data from the data sources, performing preprocessing on the data, clustering the data after the data has been preprocessed, and the clustering comprises generating data clusters, and mapping each of the data clusters to a phase of a Wardley Map.
Mohamed Abouzeid, Amr Abdel Aziz, Abdul Rahman Diaa, Marianne Toma, Mohamed Elsawy, Seif Helal, Stephen J. Todd, Osama Taha Mohamed, Yaseen Moussa
Filed: 28 Jan 21
Utility
Method, Device, and Computer Program Product for Updating Machine Learning Model
28 Jul 22
Embodiments of the present disclosure provide a method, a device, and a computer program product for updating a machine learning model.
Jinpeng Liu, Jin Li, Jiacheng Ni, Qiang Chen, Zhen Jia
Filed: 2 Mar 21
Utility
Method, Electronic Device, and Computer Program Product for Training and Deploying Neural Network
28 Jul 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for training and deploying a neural network.
Wenbin Yang, Jinpeng Liu, Jiacheng Ni, Zhen Jia
Filed: 3 Mar 21
Utility
Secure, Low-cost, Privacy-preserving Biometric Card
28 Jul 22
One example method includes generating a biometric of a user, requesting, and receiving, biometric data from a card, comparing the biometric data with the biometric, and when the biometric data matches data of the biometric, authorizing a transaction requested by a user using the card.
Radia J. Perlman, Charles W. Kaufman
Filed: 27 Jan 21
Utility
Rank-correlated Patterns for Guiding Hardware Design
28 Jul 22
A system and method for implementing design cycles for developing a hardware component including receiving sets of experimental data, each of set experimental data resulting from an application of a set of variables to the hardware component during a common or a different design cycle of the hardware component, where each variable represents an aspect of the hardware component, determining discretized classes of the experimental data based on one or more quality metrics, and obtaining statistical measurements of the variables to determine correlations between the discretized classes of the quality metrics and the statistical measurements of variables for determining a pattern of the quality metrics to reduce the number of design cycles implemented on the hardware component during the developing of the hardware component.
Paulo Abelha Ferreira, Adriana Bechara Prado, Jonas Furtado Dias
Filed: 28 Jan 21
Utility
Workload Generator and Simulator for Storage Caching Systems
28 Jul 22
A method and system for calibrating a simulator instance is disclosed.
Jaumir Valenca Da Silveira Juior, Vinicius Michel Gottin
Filed: 28 Jan 21
Utility
Data Processing Method, Electronic Device and Computer Program Product
28 Jul 22
A method, an electronic device, and a computer program product for processing data is disclosed.
Yuting Zhang, Kaikai Jia
Filed: 31 Mar 21
Utility
Storing Digital Data In Dna Storage Using Blockchain and Destination-side Deduplication Using Smart Contracts
28 Jul 22
Embodiments include a method of storing digital data in DNA storage by receiving the digital data from a user, deduplicating the data in a deduplication system of the user to form deduplicated data, and encoding the deduplicated data into a DNA string into a format for storage on a blockchain.
Rahul Vishwakarma, Bing Liu, Parmeshwr Prasad, Parminder Singh Sethi
Filed: 22 Jan 21
Utility
Secure Password Log In on Insecure Devices
28 Jul 22
One example method includes logging into websites through devices including insecure devices.
Seth Jacob Rothschild, Benjamin Santaus, Orlando Xavier Nieves, Radia J. Perlman
Filed: 28 Jan 21
Utility
Method and System for Verifying Secret Decryption Capability of Escrow Agents
28 Jul 22
A method for verifying a secret decryption of an escrow agent by a client operatively connected to the escrow agent includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, after encrypting the secret, encrypting, based on a verification trigger, a verification value using the public key to obtain an encrypted verification value, sending the encrypted verification value to the escrow agent, obtaining a secret decryption response from the escrow agent, making a determination, based on the secret decryption response, that the escrow agent is not capable of decrypting the secret, and based on the determination, performing a remediation action.
Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
Filed: 28 Jan 21
Utility
Ai/ml Approach for Ddos Prevention on 5G CBRS Networks
28 Jul 22
One example method includes collecting, in a closed network, raw network traffic from one or more devices in the closed network, extracting metadata from the raw network traffic, processing the metadata, analyzing the metadata after the metadata has been processed, and based on the analyzing, determining whether or not an actual attack or attack threat is present in the closed network.
Ohad Arnon, Dany Shapiro, Shiri Gaber
Filed: 27 Jan 21
Utility
Method, Device, and Program Product for Managing Computer System
28 Jul 22
The present disclosure relates to a method, a device, and a program product for managing a computer system.
Jiacheng Ni, Min Gong, Zijia Wang, Zhen Jia, Bin He
Filed: 25 Feb 21