324 patents
Page 12 of 17
Utility
User Authentication Based on Biometric Passwords
15 Apr 20
Techniques are disclosed relating to user authentication based on biometric passwords.
Anil Kumar Sutrala, Dayakar Reddy Venkivolu, Jagan Kona
Filed: 10 Oct 18
Utility
Relational Interval Tree with Distinct Borders
15 Apr 20
In one embodiment, a searchable interval associated with a database is defined, and an interval tree corresponding to the searchable interval is generated.
Rostislav Julinek
Filed: 14 Oct 18
Utility
Time-based Detail Degradation for Authorization Scopes
15 Apr 20
To limit client application access to user information in a token-based authorization framework, access scopes can be degraded with age to incrementally restrict access privileges.
Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi
Filed: 11 Oct 18
Utility
Multifactor Authentication Utilizing Issued Checks
15 Apr 20
A multifactor authentication system is implemented to enable interactive access to a secure application.
CHANDRA SEKHAR VARANASI, MURALI KRISHNA SEGU, VINAY KUMAR TIRUVAIPETA, JEETENDRA GOPAL VARANJANI
Filed: 10 Oct 18
Utility
Selective Application Updates Based on Usage Analytics
15 Apr 20
To prevent utilization of device storage space for storage of application updates affecting features which a user does not use, selective application updates are offered on a per-feature, per-user basis based on analysis of monitored application use patterns.
Vikrant Nandakumar, Rohit Pathak, Lyju Rappai Vadassery, Vijay Shashikant Kulkarni
Filed: 14 Oct 18
Utility
Dynamic Loading of a Java Agent into a Running Process Through Direct Process Memory Manipulation
15 Apr 20
A method includes performing, by a processor: instantiating a first process corresponding to a first user identification and modifying a Java Runtime Environment (JRE) associated with a second process corresponding to a second user identification that is different from the first user identification to include a loader, the loader being configured to load a Java agent into the second process.
Ales Lopata, Devasia Antony Muthalakuzhy Thomas
Filed: 11 Oct 18
Utility
Customizing JVM Native Services
15 Apr 20
Applications can invoke native services provided by an operating system via an interface library of functions.
Frederic Armand Honore Duminy, David Ryan Klopf, Gerald Joseph Kauth, Ronald James Colmone
Filed: 14 Oct 18
Utility
Statistical Deep Content Inspection of Api Traffic to Create Per-identifier Interface Contracts
15 Apr 20
Embodiments of the present disclosure relate to deep content inspection of API traffic.
KENNETH WILLIAM SCOTT MORRISON, JAY WILLIAM THORNE
Filed: 14 Oct 18
Utility
Assessing the Container-readiness of Software Applications
15 Apr 20
Techniques are disclosed relating to assessing the container-readiness of a software application.
Venkata Swamy Karukuri, Anil Kumar Sutrala, Murali Krishna Segu
Filed: 11 Oct 18
Utility
Method for Identifying Complex Textual Patterns Containing Keywords Within Data Records
15 Apr 20
Technology for the improved processing of search queries is provided.
Gregory Michael Berres
Filed: 14 Oct 18
Utility
Rest Application Programming Interface Paradigms for Big Data Analytics
15 Apr 20
Embodiments of the present disclosure provide a query paradigm that enables named function chaining and nesting to create complex query structures for advanced data analytics.
ANILA KUMAR GARIMELLA, KRUSHNA BAGDE
Filed: 10 Oct 18
Utility
Agent Injection Via Command Hijacking
15 Apr 20
Embodiments of the present disclosure relate to command modification.
DEVASIA ANTONY MUTHALAKUHY THOMAS
Filed: 10 Oct 18
Utility
Dynamic Authorization Matrix and Related Systems, Methods, and Computer Program Products
15 Apr 20
A method includes performing, by a processor, operations including: generating an approval routing matrix that is configured to associate a route with at least one a plurality of roles for accessing a record in a storage medium, the record being representative of a matter for approval, receiving a request to approve the matter, generating an assignment matrix based on the approval routing matrix, the assignment matrix being configured to specify an order in which the at least one of the plurality of roles are granted access to the record, allowing access to the record to at least one user associated with the at least one of the plurality of roles, respectively, in the order specified in the assignment matrix, and determining whether the matter is approved based on input received by the at least one user associated with the at least one of the plurality of roles, respectively.
Arijit Dey, Varunkumar Mallisetty
Filed: 11 Oct 18
Utility
Multi Contextual Clustering
8 Apr 20
Methods of processing alarm messages in a computer network administration system are provided.
Sai Eswar GARAPATI, Deepak KARUNANIDHI, Rajat Kumar MISHRA
Filed: 7 Oct 18
Utility
Storing Floating Point Values In Integer Representations for Histogram Recording
8 Apr 20
Floating point values can be efficiently captured into integer representations that preserve fidelity at a specified significant digits resolution for histogram recording.
Christopher Phillip Bonnell
Filed: 3 Oct 18
Utility
Controlling Access to Computer Resources by User Authentication Based on Unique Authentication Patterns
8 Apr 20
An account server receives from a user terminal an access request message containing an account identifier.
Vijay Shashikant Kulkarni, Lyju Vadassery, Vikrant Nandakumar, Harmeet Singh Gujral
Filed: 3 Oct 18
Utility
Detection and Elimination of Runtime Visibility Gaps In Transactions
8 Apr 20
To increase visibility into an application's performance, an application performance management system monitors transactions of an application at runtime to identify components or methods which significantly contribute to the execution of the transaction but are not instrumented.
Ramesh Mani, Anand Krishnamurthy, Vashistha Kumar Singh
Filed: 8 Oct 18
Utility
Protecting Displayed Data by Encrypting Pixels
8 Apr 20
A system for protecting displayed data by encrypting pixels can include a user interface, a communication interface, a processing circuit, and memory.
Sharath Kumar, Stephen Prasad, Ambrish Pandey, Anil Joseph, Koppula Shalem Raju
Filed: 8 Oct 18
Utility
Topology-based Presentation of Expert Triage Workflows
8 Apr 20
A topology-based triage workflow service can display expert generated workflows in conjunction with a topology.
Benoit Christian Bernard Souche, Timothy Diep
Filed: 8 Oct 18
Utility
Security Hardened Software Footprint In a Computing Environment
8 Apr 20
In an embodiment, a method includes performing a first validation procedure on an element that includes identifying a first hash value in a footprint of the element in a storage library, calculating a second hash value of the element in the storage library, and performing a first comparison of the first hash value and the second hash value.
Eoin O'Cleirigh
Filed: 3 Oct 18