524 patents
Page 7 of 27
Utility
Asymmetric quorum protocol based distributed transaction database consistency control
5 Jul 22
In some examples, asymmetric quorum protocol based distributed transaction database consistency control may include determining, by a set of primary participants of a cluster, whether a cluster-wide quorum has been reached to commit a transaction associated with a distributed transactional database.
Niccolo Meneghetti, Yuanzhe Bei
Filed: 12 Dec 19
Utility
Execution of a Synchronous Operation In an Asynchronous Operational Environment
23 Jun 22
A method for execution of a synchronous operation in an asynchronous operational environment includes receiving, by a processor, a first operation from program code executing within the asynchronous operational environment with the program code being run on an execution thread and a communication thread.
Boris Kozorovitzky, Kobi Gana, Marina Gofman
Filed: 18 Dec 20
Utility
Task execution based on whether task completion time exceeds execution window of device to which task has been assigned
21 Jun 22
Tasks of a group are respectively assigned to devices for execution.
Krishna Mahadevan Ramakrishnan, Venkatesh Ramteke, Shiva Prakash Sm
Filed: 25 Oct 19
Utility
Using Machine Learning to Assign Developers to Software Defects
9 Jun 22
A technique includes processing, by a computer, data representing a software defect report to extract features from the software defect report.
Enhui Xin, Cunyang Gong, Chunjiang Zhu
Filed: 15 Apr 19
Utility
Strength of associations among data records in a security information sharing platform
7 Jun 22
Examples disclosed herein relate to strength of associations among data records in a security information sharing platform.
Tomas Sander, Brian Frederik Hosea Che Hein, Nadav Cohen, Ted Ross
Filed: 12 Feb 16
Utility
Maximally parallel test script execution
7 Jun 22
A test script is divided into tests having a sequential order within the test script.
Jun-Chen Peng, Xiang Gao, Kai Long, Ruixiang Chen, Lingli Wu
Filed: 4 Mar 20
Utility
Purchase transaction system with encrypted payment card data
24 May 22
Online ordering systems allow a user to submit sensitive information such as payment card information to a merchant in encrypted form.
Matthew J. Pauker, Terence Spies
Filed: 30 Jul 14
Utility
Extended ciphertexts
24 May 22
Examples discussed herein disclose, among other things, an encrypting device.
Richard Minner
Filed: 5 Feb 16
Utility
End point identification
17 May 22
In some examples, a system provides an agency identifier identifying an authority relationship between a first identity and a second identity, provides a duty identifier based on the agency identifier and a first end point, identifies a second end point based on the first end point, associates authority to access the second end point with the duty identifier, and accesses the second service at the second end point, the accessing comprising an entity identified by the second identity accessing the second end point on behalf of an entity identified by the first identity based on the authority relationship.
Christopher Johnson
Filed: 24 Jul 14
Utility
Monitoring Containerized VM Application Running Within Software Container
12 May 22
A monitoring utility program into a software container in which a containerized virtual machine application is running.
JIN-FENG GAO, GUOZHU CAO, XIAOMEI QIU
Filed: 29 Mar 19
Utility
Component-based Web Performance Measurement
12 May 22
Embodiments of the disclosure provide systems and methods for measuring performance of a web page and elements of the web page.
Er-Xin Shang, Wen-Jie Qian, Jason Yu
Filed: 10 Nov 20
Utility
Using Graphical Image Analysis Dor Identifying Image Objects
12 May 22
An image of a graphical user interface is captured.
Er-Xin Shang, Hua-Ming Zhai, Yun-Sheng Liu, Tezeen Yu
Filed: 10 Nov 20
Utility
System and Method for Dynamic Driven Context Management
12 May 22
Context information associated with a network node is determined.
Madan Gopal Devadoss, Cherian Sebastian
Filed: 6 Nov 20
Utility
Complex data type encoding within columnar database
10 May 22
A complex data type is encoded over columns of a table of a columnar database by mapping fields of the complex data type to the columns.
Deepak Majeti, Natalya Aksman, James Clampffer, Stephen Gregory Walkauskas
Filed: 11 Sep 19
Utility
Dynamic localization using color
10 May 22
A text string is identified that has an associated localized text string; For example, an English text string may have an associated Chinese localized text string.
Yi-Qun Ren, Kai Hu, Le Peng
Filed: 3 Mar 21
Utility
Internationalization of Automated Test Scripts
5 May 22
According to examples, an apparatus may include a processor that may internationalize an automated test script that was generated to test a Graphical User Interface (GUI) in the first human language.
Er-Xin SHANG, Qian-Ru ZHAI, Hao-Bin CUI
Filed: 8 Mar 19
Utility
Human Interactions with Artificial Intelligence (Ai)-based Testing Tool
5 May 22
Embodiments of the disclosure provide systems and methods for performing functional testing on an application using artificial intelligence.
Tsachi Ben Zur, Dror Saaroni, Eyal Luzon, Gil Nakache, Motti Lanzkron
Filed: 30 Oct 20
Utility
Backend application load testing with respect to session between client application and service
3 May 22
Actions performed at a client application for a service during a session between the client application and the service.
Yan-Jun Yu, Wei-Wei Zhang, Dong-Xing Huang
Filed: 27 Feb 20
Utility
Generation of markup-language script representing identity management rule from natural language-based rule script defining identity management rule
3 May 22
A natural language (NL)-based rule script defines an identity management (IM) rule that governs how a driver performs data transformation among sub-systems of an IM system to coordinate user identity and data access across the sub-systems.
Sriram Priyatham Siram, Prashanth Sutrave, Amit Suresh Prabhu, Apoorv Rastogi, Akshatha Kadri
Filed: 17 Jul 20
Utility
Representation of User Interface Interactive Regions
28 Apr 22
In some examples, a system executes a program that generates a user interface (UI) screen, provides a user input event to the program during execution, and captures images of the UI screen before and after the user input event.
Er-Xin SHANG, Wen-Jie QIAN, Haiyu GAO
Filed: 25 Feb 19