324 patents
Page 14 of 17
Utility
Detecting Anomalous Transactions In Computer Log Files
25 Mar 20
A method of detecting anomalous transactions in computer network log files includes obtaining an event log file that includes a plurality of lines of log output associated with respective transactions, obtaining a log entry pattern for a transaction type, the log entry pattern including a plurality of log entries associated with normal behavior of transactions of the transaction type, identifying a plurality of log entries associated with a transaction of the transaction type, comparing the plurality of log entries to the log entry pattern, and determining that the transaction is an anomalous transaction in response to the comparison.
Sharath Bagivalu MANJAPPA, Anil JOSEPH, Sanjay RAI, Stephen PRASAD
Filed: 19 Sep 18
Utility
Managing Access to Removable Storage Media Using Artificial Intelligence
25 Mar 20
In one embodiment, a query history is accessed, wherein the query history comprises information associated with one or more past queries for data stored on a plurality of removable storage mediums.
Vlastimil Jedek
Filed: 25 Sep 18
Utility
Privileged Entity Consensus for Digital Asset Creation
25 Mar 20
Embodiments of the present invention provide techniques for generating digital tokens corresponding to determined generated real-world assets in a consensus-based authorization framework.
David Matthew Thompson
Filed: 19 Sep 18
Utility
Visual Timeline Based System to Recommend Potential Root Cause of Failure and Remediation of an Operation Using Change Management Database
25 Mar 20
A method and computing system to recommend potential root causes of failure of an operation of a computer system is provided.
Vallinayagam Pitchaimani, Praveen Chavali, Sunil Meher, Siva Datla
Filed: 24 Sep 18
Utility
Combined Threat Score for Container Images
25 Mar 20
Provided is a process for determining threat scores for container images or distributed applications that consider the results of a multitude of different scanners and other factors such as context information which may include information about a given execution environment for the container image.
Brian Hufsmith, William Mcallister, Mitchell Engel
Filed: 27 Sep 18
Utility
Panning Displayed Information to Compensate for Parkinson's Disease Induced Motion of Electronic Devices
25 Mar 20
A method of performing operations on a processor of an electronic device includes obtaining motion data from a sensor that characterizes motion of the electronic device.
Vikrant Nandakumar, Lyju Vadassery, Vijay Shashikant Kulkarni, Madhusudhan Ganda
Filed: 19 Sep 18
Utility
Depleted Fin Transistor and Method of Fabricating
25 Mar 20
A transistor includes at least one fin structure (e.g., three fin structures) and a gate.
Qing Liu
Filed: 19 Sep 18
Utility
Cross-domain Topological Alarm Suppression
25 Mar 20
A method of processing alarm messages in a computer network includes receiving an alarm message generated by a node in the computer network and determining whether the alarm message falls within a dependency chain of a previous alarm message.
Soumya Subhra Chatterjee, Sandeep Kumar Upadhyay, Govinda Pichiguntla, Saket Kumar, Rajat Bhardwaj
Filed: 25 Sep 18
Utility
Providing One or More New Virtual Keys In a Virtual Keyboard That Each Correspond to a Predicted Set of Characters
18 Mar 20
A method of operating an electronic device is provided.
Balram Reddy Kakani, STV Krishna Kanth, Vallinayagam Pitchaimani, Sri Harsha Yayi, Nageswara Rao Yeluri
Filed: 16 Sep 18
Utility
Verification and Authentication of Optical Machine-readable Codes for Payment Processing
18 Mar 20
A merchant device receives a request message from a user terminal as part of a payment processing transaction with the merchant.
Vikrant Nandakumar, Lyju Vadassery, Vijay Shashikant Kulkarni, Deepti Srikant Sharma
Filed: 17 Sep 18
Utility
Controlling Electronic Access by Portable Electronic Device Responsive to Sequence of Scanned Fingerprints Forming Pin
18 Mar 20
A processor of an electronic device receives a personal identification number (PIN) having a sequence of numeric digits.
Sharath Bagivalu Manjappa, Anil Joseph, Sharath Kumar, Stephen Prasad
Filed: 17 Sep 18
Utility
Methods and Systems for Transcoder, Fec and Interleaver Optimization
18 Mar 20
An interleaved encoder includes a number of encoders consisting of L parallel encoders, and a first switch circuit to sequentially couple an input node to an input port of one of the encoders.
Chungming Tu, Thomas V. Souvignier, Ahmad Darabiha
Filed: 17 Jul 19
Utility
Optical Power Transfer Devices with an Embedded Active Cooling Chip
18 Mar 20
An optical power transfer device with an embedded active cooling chip is disclosed.
Ercan M. Dede, Christopher Valdivia, Matthew Wilkins, Karin Hinzer, Philippe-Olivier Provost, Denis Masson, Simon Fafard
Filed: 13 Sep 18
Utility
Wireless Communication Device and Power Receiving Unit with Wireless Control Channel and Methods for Use Therewith
18 Mar 20
Aspects of the subject disclosure may include, for example, a power receiving unit having a wireless power receiver that receives a wireless power signal from a power transmitting unit.
Ryan Michael Desrosiers, Mark David Rutherford, John Stuart Walley, Vadim Bishtein, Angel Arturo Polo
Filed: 21 Nov 19
Utility
Sample Adaptive Offset (Sao) In Accordance with Video Coding
18 Mar 20
Peisong Chen, Wade K. Wan
Filed: 17 Nov 19
Utility
Integrated Video and Data System
18 Mar 20
A system for integrating video content and data provision includes an upstream signal path to process upstream data traffic received from a first transmission network for transmission to a second transmission network, and a downstream signal path to process downstream data traffic and downstream video traffic for transmission from the second transmission network to the first transmission network.
Weimin ZHANG, Yong Li, Xuemin CHEN, Charlie Lei LOU
Filed: 29 Aug 19
Utility
Using Closed Circuit Cameras for Emergency Services
11 Mar 20
Method by a computer of a computing system having a plurality of camera sensors and a camera sensor control system is provided.
Lyju Vadassery, Vijay Shashikant Kulkarni, Vikrant Nandakumar, Adila Parveen Hafeezulla, Subhashini Bysani, Sri Venkata Vijaya Lakshmi Tholeti
Filed: 5 Sep 18
Utility
Selectively Applying Heterogeneous Vulnerability Scans to Layers of Container Images
11 Mar 20
Provided is a process that includes obtaining a container image; for each of a plurality of the constituent images of the container image, determining, with one or more processors, whether the respective constituent image contains a vulnerability by: selecting a respective subset of scanners from among a set of a plurality of scanners by comparing respective scanner criteria to at least part of the respective constituent image, causing at least part of the respective constituent image to be scanned with the selected respective subset of scanners, and identifying potential vulnerabilities in the respective constituent image based on output of the scanning; and storing results based on at least some identified potential vulnerabilities in memory.
William Mcallister, Brian Hufsmith, Mitchell Engel
Filed: 10 Sep 18
Utility
Automatic Detection of Database Criticality
11 Mar 20
In one embodiment, a database object stored in a database is identified, and a transaction history associated with the database object is accessed.
Philippe Dubost, Jakub Hofman, Vikas Sinha
Filed: 5 Sep 18
Utility
Independent Development Environment Configured to Annotate Source Code of Container Images with Notifications of Security Vulnerabilities
11 Mar 20
Provided is a process that includes: obtaining a source code text document having commands that specify a container image with layers; for each command, determining whether the respective command corresponds to a layer of the container image subject to a security vulnerability; and causing a user interface to be displayed that presents commands in visual association with respective indications that respective commands are subject to the respective security vulnerabilities.
William Mcallister, Brian Hufsmith, Mitchell Engel
Filed: 10 Sep 18