3707 patents
Page 39 of 186
Utility
Automatically Discovering and Securely Identifying Connected Systems
14 Jul 22
Methods, apparatus, and processor-readable storage media for automatically discovering and securely identifying connected systems are provided herein.
Anurag Sharma, Maunish A. Shah, Senthil Ponnuswamy
Filed: 14 Jan 21
Utility
Verification of Valid Client Library Binary File on Connecting to Server System
14 Jul 22
Embodiments for validating a dynamically downloaded client-side library using a kernel that downloads the library and computing a hash value of the library using a nonce value received from a server and the library code.
Andrew R. Huber
Filed: 13 Jan 21
Utility
Framework to Quantify Security In Devops Deployments
14 Jul 22
Techniques for providing a framework that quantifies security in DevOps deployments.
Mahadevan Vasudevan, Hanumesh Jojode
Filed: 12 Jan 21
Utility
Techniques for Workload Balancing Using Dynamic Path State Modifications
30 Jun 22
Rebalancing the workload of logical devices across multiple nodes may include dynamically modifying preferred paths for one or more logical devices in order to rebalance the I/O workload of the logical devices among the nodes of the data storage system.
Philippe Armangau, Anton Kucherov, Vamsi K. Vankamamidi, Vasu Subramanian
Filed: 30 Dec 20
Utility
Method, Electronic Device and Computer Program Product for Managing Data Blocks
30 Jun 22
Techniques for managing data blocks involve: generating, based on a first hash algorithm, a first fingerprint for a first block.
Geng Han, Xinlei Xu, Yousheng Liu, Ruiyong Jia
Filed: 5 May 21
Utility
Distributed Site Data Recovery In a Geographically Distributed Data Storage Environment
30 Jun 22
The described technology is generally directed towards recovering a chunk (or similar block of data) when the chunk is erasure coded into fragments, and recovery fragments need to be obtained from geographically distributed sites.
Mikhail Danilov, Konstantin Buinov
Filed: 29 Dec 20
Utility
Method, Device, and Computer Program Product for Monitoring User
30 Jun 22
Illustrative embodiments of the present disclosure relate to a method, a wearable device, an electronic device, and a computer program product for monitoring a user.
Anzhou Hou, Danqing Sha, Zhen Jia, Bin He
Filed: 1 Feb 21
Utility
Pre-emptive Container Load-balancing, Auto-scaling and Placement
30 Jun 22
A resource usage platform is disclosed.
Xuebin He, Amy N. Seibel, Himanshu Arora, Victor Fong
Filed: 31 Dec 20
Utility
Application Template for Application Consistent Backup and Restore of Database Applications In Kubernetes
30 Jun 22
Embodiments of an application template process that provides application consistent backups for a wide range of database applications and deployment configurations.
Phuong N. Hoang, Sukarna Grandhi, Antony S. Bett, Yasemin Ugur-Ozekinci
Filed: 28 Dec 20
Utility
Method, Device, and Computer Program for Storing Index Values of Monitored Objects
30 Jun 22
Index values of monitored objects are stored.
Min Gong, Yi Shang
Filed: 5 Mar 21
Utility
Signal of Trust Access Prioritization
30 Jun 22
One example method includes receiving from a user, by a trust algorithm, primary input that comprises a user query that specifies search parameters, a list of one or more trust factors, or is automatically assigned a list of trust factors based on organizational requirements, and a respective user-specified weighting for each trust factor definition, receiving secondary system inputs and, based on the search parameters, retrieving data from the secondary system inputs, running, on the data retrieved from the secondary system inputs, one or more trust factor functions, each of which generates a respective trust factor, generating a trust score by running a trust score function on the trust factors, aggregating the data with the trust score to create a result set, and storing the result set.
Nicole Reineke, Michael Estrin
Filed: 28 Dec 20
Utility
Best Outcome Aiops Modeling with Data Confidence Fabrics
30 Jun 22
One example method includes receiving a transaction at a digital twin that incorporates all transactions that have occurred at a site from which the transaction was received, and wherein the digital twin was created based in part on a data confidence fabric ledger, entering the transaction in the data confidence fabric ledger at the digital twin, receiving another transaction at the digital twin, wherein the another transaction has caused a problem to occur, entering the another transaction in the data confidence fabric ledger, replaying any transactions that have occurred in a defined time window that includes the another transaction, based on the replaying, identifying a state of a system where the problem occurred, and a time when the problem occurred, and determining a resolution to the problem.
Stephen J. Todd, Nicole Reineke
Filed: 28 Dec 20
Utility
Management of Security and Compliance Controls for Multi-cloud Workloads
30 Jun 22
An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, a specification of security and compliance controls to be implemented for workloads of a given entity running on a subset of the cloud assets.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 30 Dec 20
Utility
Generating Unified Views of Security and Compliance for Multi-cloud Workloads
30 Jun 22
An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of cloud service providers, a request to view security and compliance risk for a given entity running workloads utilizing the cloud assets.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 30 Dec 20
Utility
User-Based Data Tiering
30 Jun 22
Techniques are provided for user-based data tiering.
Shiv S. Kumar, Jai P. Gahlot
Filed: 30 Dec 20
Utility
Policy-driven Management of Security and Compliance Controls for Multi-cloud Workloads
30 Jun 22
An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, a specification of security and compliance policies of a given entity.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 30 Dec 20
Utility
Access Management for Multi-cloud Workloads
30 Jun 22
An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of multiple cloud service providers, a request by a user to access a given cloud asset on which one or more workloads of a given entity run.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 30 Dec 20
Utility
Method for Protecting Edge Device Trust Score
30 Jun 22
One example method includes correlating trust scoring with authentication levels.
Mohamed Sohail, Robert A. Lincourt, Said Tabet
Filed: 31 Dec 20
Utility
Method for Distributing Virtual Visual Content
30 Jun 22
Embodiments of the present disclosure provide a method for distributing virtual visual content, including: sending a first content portion in virtual visual content to be interacted in user equipment to a plurality of edge devices; selecting at least one edge device from the plurality of edge devices; and sending a second content portion in the virtual visual content to the selected at least one edge device, the second content portion having a higher change rate than the first content portion in the interaction.
Zhen Jia, Danqing Sha, Bin He
Filed: 27 Jan 21
Utility
Data Compression Using Dictionaries
23 Jun 22
Data units of a dataset may be compressed by clustering the data units into clusters, selecting a reference unit for each unit cluster, and compressing data units of each unit cluster using the reference unit of the unit cluster as a dictionary.
Denis Dovzhenko, Shaul Dar, Haiyun Bao
Filed: 17 Aug 21