524 patents
Page 4 of 27
Utility
Machine learning anomaly detection of process-loaded DLLs
6 Dec 22
An endpoint device monitors loading of dynamically loaded libraries (DLLs) by a process, such as during execution of the process on the endpoint device.
Ron Chittaro
Filed: 26 Nov 19
Utility
Software Supply Chain Quality Control Evaluation
24 Nov 22
A primary blockchain for a software application is created that comprises a first block associated with a software component of the software application.
Michael F. Angelo, Alexander Hoole
Filed: 19 May 21
Utility
Topology-based Migration Assessment
24 Nov 22
According to examples, an apparatus may include a processor that may generate a migration assessment for resources of a computer system.
Adarsh SUPARNA, Hemant Kumar C H, Pramod Annachira VITALA
Filed: 5 Aug 22
Utility
Blockchain Structure for Efficient Searching
24 Nov 22
A determination is made that an event associated with a composite blockchain is a primary event or a secondary event.
DOUGLAS MAX GROVER, Michael F. ANGELO
Filed: 19 May 21
Utility
Stateless Password Manager
17 Nov 22
A first application name is received.
VAMSI KRISHNA, GURUPRASAD SATHYAMURTHY
Filed: 12 May 21
Utility
Blockchain Auditing System and Method
17 Nov 22
A copy of a blockchain is stored.
Douglas Max Grover, MICHAEL F. ANGELO
Filed: 11 Jan 21
Utility
Human interactions with artificial intelligence (AI)-based testing tool
15 Nov 22
Embodiments of the disclosure provide systems and methods for performing functional testing on an application using artificial intelligence.
Tsachi Ben Zur, Dror Saaroni, Eyal Luzon, Gil Nakache, Motti Lanzkron
Filed: 30 Oct 20
Utility
Generating recommended inputs
15 Nov 22
Example embodiments relate to generating sets of recommended inputs for changing predicted results of a predictive model.
Efrat Egozi-Levi, Ohad Assulin, Boaz Shor, Mor Gelberg
Filed: 8 Feb 16
Utility
Scheduling Virtual Users Based on Curve Fitting
10 Nov 22
According to examples, an apparatus may include a processor that may schedule virtual users in a load test of a system under test.
DONG-XING HUANG, ER-XIN SHANG, YAN YANG
Filed: 23 Jul 19
Utility
Clustering layers in multi-node clusters
8 Nov 22
Examples include a multi-node cluster having a node with a clustering layer.
Chiu Wai Tsang, Christopher Johnson
Filed: 21 Jun 16
Utility
Test relevancy prediction for code changes
8 Nov 22
In some examples, test relevancy prediction for code changes may include ascertaining files for a commit for a build, and for each test of a plurality of tests, determining a score based on a weight assigned to a file of the ascertained files.
Gabi Shalev, Itay Ben-Yehuda, Raz Regev, Elad Benedict
Filed: 17 Aug 17
Utility
Processing data between data stores
1 Nov 22
A non-transitory computer readable medium can store machine readable instructions that when accessed and executed by a processing resource cause a computing device to perform operations.
Alexander Kalinin, Alkis Simitsis, Kevin Wilkinson, Mahashweta Das
Filed: 4 Nov 15
Utility
Format-preserving cryptographic systems
1 Nov 22
Format-preserving encryption and decryption processes are provided.
Matthew J. Pauker, Terence Spies
Filed: 13 Jun 12
Utility
Gesture buttons
25 Oct 22
In one example, a system for gesture buttons can include a processing resource and a non-transitory computer readable medium having stored thereon instructions to cause the processing resource to perform a first function in response to a gesture provided to the user interface, display a gesture button on the user interface, and perform a second function that is different than the first function in response to the gesture provided on the gesture button displayed on the user interface.
Bing Zhang, Da-Long Sun, Li Zhang, Rong-Feng Chen
Filed: 29 Nov 17
Utility
Linking an entity relating to product development to a document portion
11 Oct 22
A hierarchical representation of entities relate to development of at least one product.
Ori Bendet
Filed: 17 Nov 14
Utility
Identification of beaconing from network communication events of network traffic log
4 Oct 22
Network communication events are filtered to remove the network communication events having a predicted unrelatedness to beaconing.
Martin Arlitt, Mijung Kim, Manish Marwah
Filed: 27 May 21
Utility
Recommending analytic tasks based on similarity of datasets
4 Oct 22
Recommending analytic tasks based on similarity of datasets is disclosed.
Mahashweta Das, Mehmet Kivanc Ozonat
Filed: 23 Jun 15
Utility
Train a machine learning model using IP addresses and connection contexts
4 Oct 22
According to examples, an apparatus may include a processor and a non-transitory computer readable medium on which is stored machine readable instructions that may cause the processor to identify Internet protocol (IP) addresses and connection attributes associated with the IP addresses.
Manish Marwah, Andrey Simanovsky
Filed: 14 Jun 19
Utility
Determinations of whether events are anomalous
27 Sep 22
According to examples, an apparatus may include a memory on which is stored instructions that when executed by a processor, cause the processor to cluster a set of data points into a hierarchy of a plurality of clusters, in which each level of the hierarchy includes a different number of the plurality of clusters.
Arshad Javeed
Filed: 26 May 20
Utility
Log analysis based on user activity volume
27 Sep 22
In one example implementation, a log analysis system can comprise an activity engine to monitor user activity of a computer system, a baseline engine to generate an expected baseline of a log, and an abnormality engine to compare the log to the expected baseline to identify an abnormality, compare the abnormality to a user activity volume based on a correlation between the user activity volume and the log activity, and classify the log.
Eran Samuni, Daniel Adrian, Yohay Golan
Filed: 14 Dec 13