241 patents
Page 5 of 13
Utility
Secure Remote Support of Systems Deployed In a Private Network
23 Mar 23
A computer-implemented method includes: connecting, by a computing device, to a database using an outbound connection, wherein the computing device is an information technology (IT) product in a private network and the database is outside the private network; receiving, by the computing device, a response from the database, the response including a command; executing, by the computing device, the command; and sending, by the computing device, result data to the database, wherein the result data is data that results from executing the command on the computing device.
Grzegorz Piotr Szczepanik, Tiberiu Suto, Nadiya Kochura, Nicolo' Sgobba, Erik Rueger
Filed: 17 Sep 21
Utility
Smart Data Protection
16 Mar 23
When a system receives sensitive data, it can request an encryption key from an encryption/decryption unit.
Vinod A. Valecha, Krzysztof Rudek, Grzegorz Piotr Szczepanik, Lukasz Jakub Palus
Filed: 31 Oct 22
Utility
Testing and Remediating Compliance Controls
16 Mar 23
Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices.
Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai ZENG, Guan Qun Zhang, Bhavna Agrawal
Filed: 18 Nov 22
Utility
Feature Generation for Asset Classification
9 Mar 23
An embodiment includes generating an input document that includes a plurality of text fields of attribute data.
Omar Odibat, Jean Xu Yu, Emrah Zarifoglu, llyas Mohamed lyoob
Filed: 8 Nov 22
Utility
Digital Twin Simulation of Equilibrium State
2 Mar 23
A processor may receive object data associated with a position and an orientation of a first object in an environment from IoT sensors.
Sarbajit K. Rakshit, Pritpal S. Arora, Laxmikantha Sai Nanduru
Filed: 26 Aug 21
Utility
Reducing Toil In Chat Environments
2 Mar 23
A computer-implemented method reduces toil in chat systems.
Mauro Marzorati, Gary Francis Diamanti, Raghuram Srinivasan, Jeremy R. Fox
Filed: 25 Aug 21
Utility
Virtual Shopping Assistant
2 Mar 23
In an approach to provide contact-less shopping assistance to a user, a computer implements a method for receiving customer authentication data from a user and associating the customer authentication data with a tagged wearable device and a tagged mobility device with the user.
Kenneth Gambon, Hasibe Göçülü, Saravanan Shanmugam
Filed: 31 Aug 21
Utility
Computer Analysis of Routing Data Enabled for Autonomous Operation and Control
2 Mar 23
A system, method, and computer program product for implementing autonomous operation optimization and control is provided.
Prasanna Kumar Dixit J, Sharat K. Tripathy, Mohammed Amjed Ali
Filed: 25 Aug 21
Utility
Data Exhaust Logging
2 Mar 23
A machine learning model repeatedly scans data exhaust for workstations (for which there are retention requirements regarding data exhaust) over a period of time.
Michael Seth Silverstein, Martin G. Keen, Jeremy R. Fox, Zachary A. Silverstein
Filed: 30 Aug 21
Utility
Unique Password Policy Creation
2 Mar 23
A random password policy for a specific user associated with an entity is generated based on a global password requirement.
Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, John Richard Feezell, Faraz Ahmad, Anto Ajay Raj John
Filed: 25 Aug 21
Utility
Augmented Reality Physical Storage Validation
2 Mar 23
One or more computer processors detect a physical storage device within a visual proximity to a user within an augmented reality (AR) environment.
RESHMA REDDY RAMIREDDY, CARLOS DANIEL TREJO MARTINEZ, Zachary A. Silverstein, Jennifer M. Hatfield, Al Chakra
Filed: 30 Aug 21
Utility
Asset Error Remediation for Continuous Operations in a Heterogeneous Distributed Computing Environment
23 Feb 23
Asset error remediation is provided.
Prasanna Kumar Dixit J, Sharat K. Tripathy, Mohammed Amjed Ali
Filed: 17 Aug 21
Utility
Machine Learning and Optimization Techniques for Job Scheduling
23 Feb 23
A method includes training a recurrent neural network by monitoring data in a memory of a first server as the first server executes jobs and by determining an amount of computing resources used by the first server while executing the jobs and applying the recurrent neural network to data in the memory to predict an amount of computing resources that the first server will use when executing a first future job.
Robert Bradley DESAULNIERS, Clea Anne ZOLOTOW, Mihai CRIVETI, Ana Maria BEZERRA MAIMONI
Filed: 20 Aug 21
Utility
Hardware and Software Configuration Management and Deployment
23 Feb 23
A system, method, and computer program product for implementing configuration solution service management is provided.
Joseph Reyes, Andrew S. Kronstadt, Rennad Murugan, Marci Devorah Formato, Jennifer L. Szkatulski, Bernhard Julius Klingenberg
Filed: 18 Aug 21
Utility
Carbon Footprint Reduction Via Cetacean Protection
23 Feb 23
A system may include a memory and a processor in communication with the memory.
Laxmikantha Sai Nanduru, Pritpal S. Arora, Sarbajit K. Rakshit, Reena Nagrale
Filed: 19 Aug 21
Utility
Identifying Root Causes of Software Defects
23 Feb 23
Root cause identification of a software defect includes identifying, in program code of a software feature, hedge code of the software feature based on errors induced from temporarily substituting program code of the software feature with substitute program code and obtaining an error graph for the hedge code, obtaining error logs of an application that incorporates the software feature, the error logs indicating errors with the software feature of the application, automatically generating an application error graph reflective of the errors with the software feature of the application, mapping the application error graph to the error graph for the hedge code, and based on the mapping aligning one of more errors reflected in the application error graph to error(s) reflected in the error graph for the hedge code, identifying the hedge code as inducing a root error identified in the application error graph.
Siddalinga ARADHYA, Manu SHIVANNA, Rajesh GANJI, Abdul Kareem A. LAKKUNDI, Abdul Karimulla Shakhadari MOHAMMED
Filed: 13 Aug 21
Utility
Enhanced Content Submissions for Support Chats
23 Feb 23
A computer-implemented method, a computer system and a computer program product enhance content submissions of support chats.
Mauro Marzorati, Todd Russell Whitman, Jeremy R. Fox, Sarbajit K. Rakshit
Filed: 20 Aug 21
Utility
Damage-prevention Fastening Tool for Manufacturing
23 Feb 23
An operator uses a handheld fastening tool to fasten a surface-mount technology printed-circuit board (PCB) to an adjacent object by installing a fastener at a target location on the PCB.
Cesar Augusto Rodriguez Bravo, Carolina Garcia Delgado, Desilda Toska, Narayana Aditya Madineni
Filed: 23 Aug 21
Utility
System and Method for Siem Rule Sorting and Conditional Execution
16 Feb 23
A method for processing security events by applying a rule-based alarm scheme may be provided.
Tim Uwe Scheideler, Ivan James Reedman, Arjun Udupi Raghavendra, Matthias Seul
Filed: 25 Oct 22
Utility
Software Application Deployment
16 Feb 23
Methods, computer program products, and systems can include obtaining a first computing environment specific application deployment software code instance associated to a first computing environment, the first computing environment specific application deployment software code instance for deployment of a certain application on the first computing environment; parsing the first computing environment specific application deployment software code instance, wherein the parsing includes determining attributes of the first computing environment specific application deployment software code instance and generating, using the determined attributes of the first computing environment specific application deployment software code instance, a computing environment agnostic semantic tree data structure that expresses a workflow pattern for deployment of the certain application; and composing, with use of the computing environment agnostic semantic tree data structure, a second computing environment specific application deployment software code instance associated to a second computing environment for deployment of the certain application on the second computing environment.
Dinesh TRIPATHI, Sarin Kumar THAYYILSUBRAMANIAN, John KURIAN, Ramesh S. PALAKODETI
Filed: 29 Jul 21