19572 patents
Page 6 of 979
Utility
Systems and Methods for Determining Scores for Messages Based on Actions of Message Recipients and a Network Graph
18 Apr 24
Methods and systems cause display of email messages of a user on a screen of a computing system based on scores associated with the email messages.
Maurizio CIBELLI
Filed: 21 Dec 23
Utility
Click-to-script Reflection
18 Apr 24
A click-to-script service enables developers of big-data job scripts to quickly see the underlying script operations from optimized execution plans.
Xiangnan LI, Marc Todd FRIEDMAN, Wangchao LE, Evgueni ZABOKRITSKI
Filed: 25 Jun 21
Utility
Reduced Video Stream Resource Usage
18 Apr 24
The description relates to resource aware object detection for encoded video streams that can identify frames of the video stream that include an object of interest, such as a human, without decoding the frames.
Yichen HAO, Lihang LI, Anthony C. ROMANO, Naiteek SANGANI, Ryan S. MENEZES
Filed: 18 Oct 22
Utility
Identifying and Consenting to Permissions for Workflow and Code Execution
18 Apr 24
The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution.
Sunay VAISHNAV, Merwan Vishnu HADE, Stephen Christopher SICILIANO, David NISSIMOFF, FNU Anubhav
Filed: 26 Dec 23
Utility
Automated Remediation of Exposed Secrets
18 Apr 24
Techniques for identifying an exposed credential that, if used, would provide access to a resource are disclosed.
Michael Christopher FANNING, Nicolas Yves COURAUD, Jacek Andrzej CZERWONKA, Christopher Michael Henry FAUCON, Yingting YU, Etan Micah BASSERI, Floyd Odiwuor K'OTOHOYOH, Jacek Ernest LICHWA
Filed: 17 Oct 22
Utility
Program Accelerators with Multidimensional Nested Command Structures
18 Apr 24
Embodiments of the present disclosure include techniques for machine language processing.
Haishan ZHU, Eric S. CHUNG
Filed: 14 Oct 22
Utility
Code Radar
18 Apr 24
Using a language model attention matrix to facilitate a “code radar” source code navigation experience that highlights related source code locations.
Albert ZIEGLER, Amelia Mein-rou WATTENBERGER
Filed: 13 Feb 23
Utility
Overlay Scheme for Container Addressing In Virtual Networks
18 Apr 24
A virtual network provider system supports a virtual network including virtual machines that are each assigned to an underlay address of an underlay addressing scheme.
Neha AGGARWAL, Chandan AGGARWAL, Rishabh TEWARI, Abhijeet KUMAR, Sudhir GOEL, Trilok NUWAL, Matthew Francis LONG, Evan Alexander BAKER, Aanand RAMACHANDRAN, Alok UPADHYAY
Filed: 18 Oct 22
Utility
Enriching Exposed Credential Search Results to Make Them Actionable
18 Apr 24
Techniques for (i) using contextual information associated with an exposed credential to identify a resource that could be accessed using the exposed credential, (ii) identifying a responsible entity of that resource, and (iii) alerting the responsible entity about the exposed credential are disclosed.
Michael Christopher FANNING, Suvam MUKHERJEE, Jacek Andrzej CZERWONKA, Christopher Michael Henry FAUCON, Eddy Toshiyuki OKADA NAKAMURA, Danielle Nicole GONZALEZ, Nicolas Yves Couraud, Alison Lynne MACLELLAN
Filed: 17 Oct 22
Utility
Selectively and Intelligently Displaying Authentication Notifications to Protect Users
18 Apr 24
Authentication request notifications are selectively suppressed, reducing notification fatigue and susceptibility to social engineering attacks.
Poulomi BANDYOPADHYAY, Rajat LUTHRA, Lee Francis WALKER, Zachary Michael EDWARDS, Colin TRENT
Filed: 27 Dec 22
Utility
Identity Anonymization with Controlled Masking and Format Preserving Encryption
18 Apr 24
Systems are methods are used for facilitating identify anonymization by using controlled masking and encryption of user identifiers, such as UUIDs.
Guillermo Paul PROANO
Filed: 14 Oct 22
Utility
Systems and Methods for Improving Functionality and Remote Management of Computing Resources Deployed In a Controlled Hierarchical Network
18 Apr 24
The present disclosure relates to utilizing a hierarchical network communication system to efficiently manage and monitor a controlled hierarchical network.
Chandra Mouli Addaguduru, Phalgun Garimella, Krupesh Satishkumar Dhruva, Narasimha Rao Karumanchi
Filed: 14 Oct 22
Utility
Multitenant Sharing Anomaly Cyberattack Campaign Detection
18 Apr 24
Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies.
Yaakov GARYANI, Moshe ISRAEL, Hani Hana NEUVIRTH, Ely ABRAMOVITCH, Amir KEREN, Timothy William BURRELL
Filed: 6 Dec 23
Utility
Implementing a Target Block Command on an Unstructured Data Storage Node
18 Apr 24
The present disclosure relates to systems, methods, and computer-readable media for extending functionality of unstructured data storage function (UDSF) nodes in supporting features and functionality of services and applications that are accessible via a core network.
Shantanu Desai, Kantha Rao Dammalapati
Filed: 13 Oct 22
Utility
Blinkless and Markerless Bi-phase Display Calibration
18 Apr 24
Techniques for separating an image into a forward sweeping image and a backward sweeping image are disclosed.
Taemin KIM
Filed: 12 Oct 22
Utility
Devices, Systems, and Methods for a Cooling System
18 Apr 24
A cooling system may include a tank filled with a first cooling fluid.
Fang DONG, Meng JIN, Jigar MEHTA, Mayila BABANG, Michele Alberto Scipione TREVES, Martha Geoghegan PETERSON, Linjie XU, Naval GUPTA, Hyunjung CHO
Filed: 18 Oct 22
Utility
Mitigating Vapor Loss In a Two-phase Immersion Cooling System
18 Apr 24
Techniques for mitigating loss of vaporized working fluid in a two-phase immersion cooling system may be implemented using one or more supplemental condensers that facilitate condensation of vaporized working fluid when the immersion tank is open, and one or more vapor collection points that are in fluid communication with at least one supplemental condenser.
Nicholas Andrew KEEHN, Ioannis MANOUSAKIS, Winston Allen SAUNDERS, Husam Atallah ALISSA, Eric Clarence PETERSON
Filed: 26 Dec 23
Utility
Control system using autoencoder
16 Apr 24
A control system comprises a memory storing a sequence of sensor data received from one or more sensors.
Federica Bogo, Thomas Joseph Cashman, Andrew William Fitzgibbon, Luca Ballan, Jan Stuehmer
Filed: 4 Aug 22
Utility
Dead reckoning and latency improvement in 3D game streaming scenario
16 Apr 24
Examples described herein generally relate to systems and method for streaming a video game at a client device.
Matthew Lawrence Bronder, Ivan Nevraev
Filed: 24 May 18
Utility
Provisioning and integrating devices
16 Apr 24
A method and system for provisioning a first computing device and authenticating the provisioned first computing device are disclosed, comprising sending a request to prepare the first computing device, including providing a request identifier and an authentication token to be stored on the provisioned first computing device, receiving a unique identifier of the provisioned first computing device, storing the request identifier, the authentication token, and the received unique identifier in a provisioning data structure, and authenticating the provisioned first computing device on the network based on a determination that a unique identifier and the authentication token stored on the provisioned first computing device requesting authentication match both the authentication token and the received unique identifier of the provisioned first computing device in the provisioning data structure.
Rahul Mittal, Koji Kato, Prasad Gholve
Filed: 6 Mar 23