19727 patents
Page 10 of 987
Utility
Ticket Troubleshooting Support System
25 Apr 24
Systems and methods for providing ticket support using a machine learning model trained using clusters of support tickets that are clustered based on similarity of resolution commands are provided.
Udayan KUMAR, Rakesh Jayadev NAMINENI
Filed: 21 Feb 22
Utility
Three-Dimensional Object Detection
25 Apr 24
According to implementations of the subject matter described herein, a solution is proposed for three-dimensional (3D) object detection.
Zheng Zhang, Han Hu, Yue Cao, Xin TONG, Ze Liu
Filed: 8 Feb 22
Utility
Temporal and Spatial Coherence In Ray Tracing
25 Apr 24
A ray trace operation includes tracing a ray from an origin point in accordance with a ray path into a virtual environment (where the virtual environment comprises one or more virtual objects defined by one or more object components) and determining an intersected object component of the one or more object components that the ray intersects with.
Martin Jon Irwin FULLER
Filed: 16 Dec 22
Utility
Fast and Efficient Text Only Adaptation for Factorized Neural Transducer
25 Apr 24
Systems and methods are provided for accessing a factorized neural transducer comprising a first set of layers for predicting blank tokens and a second set of layers for predicting vocabulary tokens, the second set of layers comprising a language model that includes a vocabulary predictor which is a separate predictor from the blank predictor, wherein a vocabulary predictor output from the vocabulary predictor and the encoder output are used for predicting a vocabulary token.
Rui ZHAO, Jian XUE, Sarangarajan PARTHASARATHY, Jinyu LI
Filed: 9 Nov 22
Utility
Detecting and Mitigating Side Channel Attacks with Razor-flops
25 Apr 24
The techniques disclosed herein are directed to devices, circuits, systems, and techniques to mitigate the impact of side-channel attacks on a cryptography function in a target system.
Bharat S. PILLILLI, Bryan David KELLY, Vishal SONI
Filed: 24 Oct 22
Utility
Transport Layer Security Computer Devices and Methods
25 Apr 24
A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor.
Kapil VASWANI, Siddharth JAYASHANKAR, Antoine DELIGNAT-LAVAUD, Cedric Alain Marie Christophe FOURNET
Filed: 15 Dec 22
Utility
Simplified Masking for Signed Cryptography Operations
25 Apr 24
Generally discussed herein are devices, systems, and methods for secure cryptographic masking.
Emre KARABULUT, Bharat S. PILLILLI, Mojtaba BISHEH NIASAR
Filed: 13 Feb 23
Utility
Distributed Workload Reassignment Following Communication Failure
25 Apr 24
A generation identifier is employed with various systems and methods in order to identify situations where a workload has been reassigned to a new node and where a workload is still being processed by an old node during a failure between nodes.
David KRUSE, Qibo ZHU, David DION, Vladimir PETTER, Lokesh Srinivas KOPPOLU
Filed: 2 Jan 24
Utility
Metadata Enhancement for Packet Capture Using Vxlan Encapsulation
25 Apr 24
Techniques are disclosed for capturing network traffic in a computing environment comprising a plurality of computing devices.
Darshil Jashvant KHETANI, Hassan Ali Hussein BARAKAT, Salem Amin AL-DAMLUJI
Filed: 19 Oct 22
Utility
Systems and Methods for Routing Data Packet In a Unified Wide Area Network
25 Apr 24
A method and a network for routing data packet in a unified wide area network (WAN) is provided.
Paul David MATTES, Umesh KRISHNASWAMY, John Michael ABELN, Sonal KOTHARI, Paul-Andre C. BISSONNETTE, Pappula Prabhakar REDDY, Himanshu RAJ
Filed: 25 Jan 23
Utility
Autonomous Operation of Edge-based Deployments
25 Apr 24
Computing resources are managed in a computing network comprising a computing service provider and an edge computing network.
Rahul BOSE, Mark Gordon LIBBY, Anand MUTHURAJAN, Ronald Mark PARKER, Michael Anthony BROWN, Leland Douglas BENSON
Filed: 2 Jan 24
Utility
Mobile VPN Autostart Through App-only Management
25 Apr 24
Techniques for auto-starting a VPN in a MAM environment are disclosed.
James Matthew Hamilton OAKLEY, Neil Adam JACOBSON
Filed: 3 Jan 24
Utility
Detecting Suspicious Data Access by a Rogue Cloud Resource
25 Apr 24
The techniques disclosed herein prevent a rogue resource from being created within a cloud computing environment.
Evgeny BOGOKOVSKY, Ram Haim PLISKIN, Andrey KARPOVSKY
Filed: 27 Dec 22
Utility
Superposition-based Content Serving
25 Apr 24
Embodiments of the disclosed technologies receive a request including a user identifier and metadata associated with a slot available at a user system, remove the user identifier from the request to produce anonymized request data, receive, from a machine learning model, superposition data that correlates with the anonymized request data, send the superposition data for the anonymized request data to a real-time content-to-request matching process, receive, from the real-time content-to-request matching process, an identifier that identifies a content distribution selected based on the superposition data, and initiate the selected content distribution through the network to the slot in response to the request.
Tao Cai, Albert Hwang, Jianlong Zhang, Muhammad Hassan Khan
Filed: 23 Oct 22
Utility
Generating and Processing Charging Data Records Based on Predicted Record Length
25 Apr 24
The present disclosure generally relates to systems, methods, and computer-readable media for managing the generation and processing of charging data records (CDRs) in a telecommunication environment (e.g., a fourth generation (4G) a fifth generation (5G), or future generation mobile network).
Devesh VERMA, Krishnakumar VIJAYAN, Kumar ARAKERE BASAVARAJ, Girish R. NAIR, Arthur J. BARABELL, Venki Reddy PULICHERLA, Abhishek Kumar SINHA, Basant KUMAR, Pikan GHOSH
Filed: 23 Apr 23
Utility
Techniques for Adaptively Allocating Resources In a Cloud-computing Environment
25 Apr 24
Described are examples for monitoring performance metrics of one or more workloads in a cloud-computing environment and reallocating compute resources based on the monitoring.
Bozidar RADUNOVIC, Sanjeev Mehrotra, Yongguang Zhang, Paramvir Bahl, Xenofon Foukas
Filed: 19 Dec 23
Utility
Systems and Methods for Immersion Cooling with Subcooled Spray
25 Apr 24
A thermal management system for cooling electronics includes an immersion tank, a working fluid in the immersion tank, a heat exchanger, a first fluid conduit, and a second fluid conduit.
Eric C. PETERSON, Husam Atallah ALISSA, Bharath RAMAKRISHNAN
Filed: 3 Jan 24
Utility
Anti-creep anti-back-out compact fastener
23 Apr 24
An integrated fastener includes a threaded portion, a fastener head, and one or more spring fingers integrated into the fastener head, wherein the spring fingers are configured to apply a compressive load when the fastener is inserted and secured to a receiving assembly.
Navid Poulad
Filed: 22 Jul 21
Utility
Display with eye tracking and adaptive optics
23 Apr 24
This document relates to an optical device that uses adaptive optics as part of an optical system.
Andreas Georgiou, Alfonsus D. Lunardhi, Joel Steven Kollin, Bernard C. Kress, Ishan Chatterjee, Mario Possiwan
Filed: 17 Oct 22
Utility
Error testing for computers using temporary, self-terminating fault injectors
23 Apr 24
Methodologies for testing resiliency of server computer environments with greater security are disclosed.
Sushant Sood
Filed: 23 May 22