324 patents
Page 11 of 17
Utility
Frame Formatting for Communications Within Single User, Multiple User, Multiple Access, And/or Mimo Wireless Communications
29 Apr 20
Frame formatting for communications within single user, multiple user, multiple access, and/or MIMO wireless communications.
Ron Porat
Filed: 30 Dec 19
Utility
Evaluating Environmental Information During a Transaction
29 Apr 20
A computer system includes a service terminal, a server computer system, and a mobile device and is used to facilitate a transaction between a user and the service terminal.
Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Junaid Ahmed Jamell, Yashwant Ramkishan Sawant
Filed: 24 Oct 18
Utility
Video Coding with Trade-off Between Frame Rate and Chroma Fidelity
29 Apr 20
A video decoder or encoder can be used to convert and process different video streams having different combinations of frame rate and Chroma fidelity.
Minhua Zhou
Filed: 29 Dec 19
Utility
Cloning Application Instances Deployed on Mainframe Computing Systems
22 Apr 20
According to at least one embodiment, an auto-discovery process is initiated to gather configuration information for a first instance of an application deployed on a mainframe computing system.
Pavel Zlatnik, Adrian Bastyr, Marketa Muzikova, Vitezslav Vit Vlcek
Filed: 18 Oct 18
Utility
Protection of User Authorization Code Using One-time Passwords
22 Apr 20
A method includes receiving, from a data processing system, a request for an authorization code, the authorization code comprising a sequence of a plurality of characters, generating a plurality of one-time passwords, wherein respective ones of the plurality of one-time passwords correspond to respective ones of the plurality of characters, generating a plurality of modified passwords, wherein generating the plurality of modified passwords comprises concatenating, for each of the plurality of one-time passwords and each of the plurality of characters, the one of the plurality of characters to the corresponding one of the plurality of one-time passwords, generating a plurality of hash values, wherein generating the plurality of hash values comprises performing a hash function on each of the plurality of modified passwords, and sending the plurality of hash values to the data processing system.
Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Shankar Krishnamoorthy
Filed: 18 Oct 18
Utility
Quick Identification and Retrieval of Changed Data Rows In a Data Table of a Database
22 Apr 20
An embodiment includes detecting a request for a change related to a first data row of a first table in a first database, identifying a unique record identifier of the first data row, and performing a first search of a change index for an index entry corresponding to the first data row.
Kevin P. Shuma
Filed: 18 Oct 18
Utility
Tracking Digital Certificate Usage Through Instrumentation
22 Apr 20
An embodiment of a system is disclosed in which a monitoring computer system may store instrumentation program code, and then copy the instrumentation program code into a server computer system without modifying a communication application module stored in the server computer system.
Srikanth Mandava
Filed: 17 Oct 18
Utility
Predicting Successful Completion of a Database Utility Process Within a Time Frame Having Concurrent User Access to the Database
22 Apr 20
An embodiment includes generating predicted workloads on an object within a time frame, identifying a first predicted workload on the object at a first time in the time frame, and determining, based on the first predicted workload of the object, whether a first stage of a utility process can be successfully executed for the object at the first time.
Robin Hopper, Alexander H. Kingham, Jan Svec
Filed: 18 Oct 18
Utility
Flexible Switch Logic
22 Apr 20
Flexible switch logic packet processing includes receiving a first packet associated with a particular traffic flow, generating a switching decision behavior in a first cycle of the particular traffic flow by selecting one or more processing floors of a programmable pipeline based on a received profile signal indicating a type of processing required for the first packet, and performing packet processing on the first packet using the selected one or more processing floors of the programmable pipeline.
Nitin Vinay ISLOORKAR
Filed: 18 Oct 18
Utility
Subscribing to Notifications Based on Captured Image Data
22 Apr 20
A server computer system stores a plurality of display generation objects executable to cause display of display images.
Serge Mankovskii, Maria C. Velez-Rojas, Steven L. Greenspan
Filed: 22 Oct 18
Utility
Self-learning Based Predictive Security Requirements System for Application Risk Management
22 Apr 20
Systems and methods for application development include predicting a probable set of risks (e.g., security risks, financial risks, legal risks etc.) and risk mitigations for software development or deployment risk management.
Jacek Dominiak, Smrati Gupta, Victor Muntés-Mulero, Peter Brian Matthews, Oscar Enrique Ripolles Mateu
Filed: 18 Oct 18
Utility
Generating Training Data from a Machine Learning Model to Identify Offensive Language
22 Apr 20
Provided is a process that includes: obtaining a corpus of unstructured natural language text statements and corresponding responses by responding users, wherein the corresponding responses are responsive natural language text statements or responding-user-expressed scores; obtaining demographic features associated with the responding users; scoring the corresponding responses based on whether the corresponding responses indicate offense to the unstructured natural language text statements to which the corresponding responses correspond in order to form offensiveness scores; forming a training set at least in part by: labeling the unstructured natural language text statements, or n-grams therein, with labels based on the offensiveness scores; and associating the labels with corresponding demographic features of the responding users; and causing a machine learning model to be trained based on the training set, wherein the machine learning model is configured to at least one of: classify natural language utterances as offensive or non-offensive, or generate utterances.
Ronald Doyle
Filed: 21 Oct 18
Utility
User Authentication Based on an Association of Biometric Information with a Character-based Password
22 Apr 20
A method includes obtaining a plurality of biometric indicia that are associated with a user, establishing a programmatic association between the plurality of biometric indicia and a plurality of characters, receiving, from the user, a sequence of at least a portion of the plurality of characters, and providing the sequence and the programmatic association to a biometric authentication interface of an electronic device, wherein the biometric authentication interface is configured to authenticate the user responsive to input of ones of the plurality of biometric indicia associated with the at least the portion of the plurality of characters comprising the sequence based on the programmatic association.
Mohammed Moiduddin, Shankar Krishnamoorthy
Filed: 18 Oct 18
Utility
Real-time Supervised Machine Learning by Models Configured to Classify Offensiveness of Computer-generated Natural-language Text
22 Apr 20
Ronald Doyle
Filed: 21 Oct 18
Utility
Machine Learning Model for Identifying Offensive, Computer-generated Natural-language Text or Speech
22 Apr 20
Provided is a process that includes: obtaining a training set of n-grams labeled as offensive; causing a machine learning model to be trained based on the training set of n-grams, wherein the machine learning model, when trained, is configured to classify natural language text as offensive or non-offensive; obtaining input natural language text expressing a computer-generated utterance; classifying after causing training, the computer-generated utterance as offensive or non-offensive using the machine learning model; and causing an output to be provided to a recipient, the output being based on whether the machine learning model classifies the computer-generated utterance as offensive or non-offensive.
Ronald Doyle, Stephen Tyler
Filed: 21 Oct 18
Utility
Providing a New Server Alarm Configuration Based on the Correlation of Server Alarms for Varying Metrics of Monitored Servers
15 Apr 20
A method performed by a server processing computer for a plurality of monitored servers is provided.
Balavenkata Ajay Kumar Gudipati, Rajat Kumar Mishra, Sheenam Gupta, Tribhuwan Narain Singh Yadav
Filed: 10 Oct 18
Utility
Doppler Midamble Signaling for Wireless Communications
15 Apr 20
A wireless communication device (alternatively, device, WDEV, etc.) includes at least one processing circuitry configured to support communications with other WDEV(s) and to generate and process signals for such communications.
Ron Porat
Filed: 5 Dec 19
Utility
Tracking and Securing Electronic Messages Using an Embedded Identifier
15 Apr 20
An authentication server can receive an electronic message transmitted by a sender.
Krishna Chaithanya KASIBHATLA, Satish Kumar SHARAF
Filed: 10 Oct 18
Utility
Tamper-proof Privileged User Access System Logs
15 Apr 20
One or more access events can be logged to a system log.
Richard W. Philyaw, George D. Watts, Steven Cornelis Versteeg
Filed: 14 Oct 18
Utility
Dynamic Data Movement Using Application Relationships with Encryption Keys In Different Environments
15 Apr 20
A method by a computer of a computing system to import or export data while maintaining relationships is provided.
Vasanth Krishna PG, Vipul Wadhawan
Filed: 10 Oct 18