4565 patents
Page 131 of 229
Utility
Detecting frame injection through web page analysis
15 Jun 21
A method includes obtaining a given web page, parsing the given web page to identify one or more frame tags for one or more inline frames of the given web page, and extracting a set of features of a given inline frame from a given one of the identified frame tags in the given web page, the extracted set of features comprising one or more style features, one or more destination features and one or more context features of the given identified frame tag.
Zhou Li, Kevin Bowers, Martin Rosa, Raymond Carney, Ke Tian
Filed: 28 Sep 18
Utility
Economic valuation of data assets
15 Jun 21
One or more data assets associated with a data repository of a given enterprise is identified.
Stephen Todd, Anand Singh, Sudhir Vijendra
Filed: 16 Dec 16
Utility
Policy-driven dynamic consensus protocol selection
15 Jun 21
A method obtains one or more transactions to be validated by a set of consensus nodes before storage on a digital ledger, and then selects, from a plurality of consensus algorithms, a consensus algorithm to be executed by the set of consensus nodes on the one or more transactions.
Stephen J. Todd
Filed: 4 Oct 18
Utility
Decentralized identity management system
15 Jun 21
A given node associated with a plurality of nodes registers a decentralized identity for the given node on a decentralized identity blockchain.
Pengfei Wu, Stephen J. Todd, Kun Wang
Filed: 29 Oct 18
Utility
Dynamic certification for configuration changes to software defined radio implemented devices
8 Jun 21
A compute node currently operating within a given computing environment and currently enabled to support at least a first communication protocol obtains one or more instructions for enabling the compute node to support a second communication protocol.
Stephen J. Todd, Jason A. Shepherd
Filed: 14 Dec 18
Utility
Host-based bandwidth control for virtual initiators
8 Jun 21
An apparatus comprises at least one processing device that is configured to control delivery of input-output operations from a host device to a storage system over selected ones of a plurality of paths through a network, wherein the paths are associated with respective initiator-target pairs, the initiators being implemented on the host device and the targets being implemented on the storage system.
Sanjib Mallick, Vinay G. Rao, Krishna Deepak Nuthakki, Arieh Don
Filed: 12 Oct 20
Utility
Offloading device maintenance to an external processor in low-latency, non-volatile memory
8 Jun 21
A set of device maintenance related data is received from each of a plurality of non-volatile memory modules.
Michael Nishimoto
Filed: 3 Apr 20
Utility
Method and system for dynamic backup policy handshaking
8 Jun 21
A method and system for dynamic backup policy handshaking.
Supriya Kannery, Rahul Deo Vishwakarma
Filed: 30 Jan 19
Utility
Affinity sensitive storage of data corresponding to a mapped redundant array of independent nodes
8 Jun 21
Affinity sensitive storage of data corresponding to a mapped redundant array of independent nodes, e.g., mapped cluster, in a real storage system, e.g., a real cluster, is disclosed.
Mikhail Danilov, Konstantin Buinov
Filed: 3 Apr 19
Utility
Methods, devices, and computer program products for processing data
8 Jun 21
A method comprises: determining whether an event triggering processing of data at a storage device occurs, the data being predetermined to be processed at a computing device associated with the storage device; in response to determining that the event occurs, determining available resources of the storage device; and in response to an amount of the available resources exceeding a first predetermined threshold, causing the storage device to process the data and provide the processed data to the computing device.
Junping Zhao, Andrew Anzhou Hou
Filed: 17 May 19
Utility
Deduplication using nearest neighbor cluster
8 Jun 21
Disclosed are techniques for data deduplication, which include methods, systems, or computer products for reducing data redundancy in a data storage system comprising searching a cluster of nearest neighbors, wherein the cluster has been created using a locality sensitive hashing algorithm, to determine if a data block has been stored in the data storage system prior to writing the data block.
Jonathan Krasner, Sweetesh Singh, Steven Chalmer
Filed: 15 May 19
Utility
Method and system for managing and using data confidence in a decentralized computing platform
8 Jun 21
A method for managing data includes obtaining, by a virtual machine (VM) executing on a computing node, a data computation request from a client, and in response to the data computation request: sending a metadata request to a catalog node based on the computation request, obtaining a plurality of data set entries from the catalog node based on the metadata request, performing a confidence score analysis on the plurality of data set entries to obtain selected data set entries, initiating, on a local data system, a data computation using a local data set associated with at least one of the selected of data set entries, obtaining, in response to the initiating, a result from the local data system, and sending a data computation result to the client based on the data computation, wherein the data computation result is based on the result.
Stephen James Todd
Filed: 27 Apr 19
Utility
Data protection using checkpoint restart for cluster shared resources
8 Jun 21
Techniques to back up a cluster resource are disclosed.
Ajith Gopinath, Sathyamoorthy Viswanathan, Kishore Kumar
Filed: 6 Sep 18
Utility
System and method for critical virtual machine protection
8 Jun 21
A backup agent for facilitating restorations of virtual machines includes a persistent storage and a backup/restoration policy updater.
Shelesh Chopra, Sunil Yadav, Manish Sharma
Filed: 6 Jul 18
Utility
Dynamic application decomposition for execution in a computing environment
8 Jun 21
Techniques for dynamic decomposition of an application executing in a computing environment are provided.
Xuebin He, Alex Robbins, James R. King, Amy Seibel, Victor Fong
Filed: 30 Oct 19
Utility
Storage system with snapshot-based detection and remediation of ransomware attacks
8 Jun 21
A storage system in one embodiment comprises a plurality of storage devices and a storage controller.
Anton Kucherov, David Meiri
Filed: 31 Jul 18
Utility
Method, medium, and system for recommending compositions of product features using regression trees
8 Jun 21
Product planning techniques are provided that recommend compositions of product features for weighted heterogeneous consumer segments using regression trees.
Adriana Bechara Prado, Victor Bursztyn, Jonas F. Dias, André de Almeida Maximo, Angelo E. M. Ciarlini
Filed: 31 Oct 16
Utility
Correction of sensor data in a multi-sensor internet of things environment
1 Jun 21
Techniques are provided for correcting sensor data in a multi-sensor environment.
Anat Parush Tzur, Oshry Ben-Harush, Amihai Savir, Assaf Natanzon
Filed: 31 Jul 18
Utility
Hybrid mapped clusters for data storage
1 Jun 21
A hybrid mapped redundant array of independent nodes (mapped RAIN) for data storage is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 30 Jul 19
Utility
Mapping storage extents into resiliency groups
1 Jun 21
Techniques for mapping large storage extents (“ubers”) into storage drive groups (“resiliency groups”) in a data storage system.
Rongrong Shang, Geng Han, Jian Gao, Xinlei Xu, Xiaobo Zhang, Shuyu Lee
Filed: 10 Oct 19