By Remotely Patents (Class 714/38.14)
-
Patent number: 11954006Abstract: The present disclosure relates generally to a system that includes a storage component that stores data and a processor. The processor may install an application using a portion of the storage component, partition the portion of the storage component from a remaining portion of the storage component, and execute the application via the portion of the storage component.Type: GrantFiled: May 8, 2023Date of Patent: April 9, 2024Assignee: United Services Automobile Association (USAA)Inventor: Ryan Russell
-
Patent number: 11934646Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with components across different domains in a single user interface in an online social network. The user interface includes a first component and a second component, where the first component exposes content from a first database system at a first network domain and the second component exposes content from a second database system at a second network domain. A first interaction with the first component is received at a computing device, followed by a reference being provided in the second component, where the reference includes information related to the first interaction. A second interaction with the second component regarding the reference can be received at the computing device. Interactions between the components hosted on different database systems can occur through an application programming interface (API).Type: GrantFiled: November 7, 2022Date of Patent: March 19, 2024Assignee: Salesforce, Inc.Inventors: Scott D. Beechuk, Orjan N. Kjellberg, Arvind Krishnan
-
Patent number: 11902453Abstract: The disclosed embodiments enable applying production nature to a software signature post-build (or even post-release), where the signature type is determined by the existence of a production-signed intermediate CA certificate—either hosted in the cloud (for pure release immutability), or re-ingested into the package (if certain modification are allowed). This allows a so-called deferred issuance of the product release. Even if the CA certificate is to be reinserted into the package, this modification likely affects only the delivery shell (e.g., installer) and may not require format-specific binary changes of, possibly heterogeneous, artifacts therein.Type: GrantFiled: June 25, 2021Date of Patent: February 13, 2024Assignee: Intel CorporationInventor: Mateusz Bronk
-
Patent number: 11892939Abstract: A system and method is disclosed for injecting in-process agents into processes executing self-contained, statically linked binaries that do not interact with a dynamic loader mechanism that identifies and resolves required libraries at run time. System calls directed to the execution of binaries in processes are intercepted and the targeted binary is analyzed to determine whether it is statically linked. In case a statically linked binary is identified, a proxy launcher process is started instead of the binary which starts the original binary as traceable child process. After the child process has loaded the original binary into its process memory, the memory image of the child process is copied to the launcher process and the child process is terminated. An agent is loaded into the launcher process to instruments the copied memory image.Type: GrantFiled: March 8, 2021Date of Patent: February 6, 2024Assignee: Dynatrace LLCInventors: Gernot Reisinger, Thomas Koeckerbauer, Michael Obermueller
-
Patent number: 11886794Abstract: Disclosed are methods, systems, and computer-readable medium to perform operations including: generating a font that includes a plurality of glyphs for characters of a language; generating a plurality of duplicate glyphs for the characters, wherein each duplicate glyph is associated with: (i) a respective letterform representing one of the characters, and (ii) a respective glyph code; swapping the respective letterforms of the plurality of duplicate glyphs such that the respective letterforms are mismatched with the respective glyph codes; designating the plurality of duplicate glyphs as a scrambling font style of the font; and providing a representation of the font for output on a graphical user interface (GUI) displayed on a display device.Type: GrantFiled: September 30, 2021Date of Patent: January 30, 2024Assignee: Saudi Arabian Oil CompanyInventors: Khaled Sawaf, Sheikah Alshaihah
-
Patent number: 11886283Abstract: A computer-implemented method includes: detecting, by one or more processors, an indication that suggests a node has crashed, wherein the node is included in a distributed computing environment; in response to the detecting, confirming by the one or more processors whether the node has crashed by performing a set of probes on the node; and in response to the confirming that the node has crashed, initiating by the one or more processors a remediation of the node.Type: GrantFiled: March 30, 2022Date of Patent: January 30, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin Allen Hughes, Juan Jose Alvarez, Malcolm S. Allen-Ware, Charles Lefurgy, Guillermo Jesus Silva
-
Patent number: 11853257Abstract: Devices, systems, and methods are provided for using a synthetic content model verification. A system may receive, at a front end service, inputs of a content campaign. The system may determine, based on the inputs, validation criterion. The system may determine, by the front end service, that a first input satisfies first validation criteria, and may send the inputs to a back end service. The system may receive, by the front end service from the back end service, a first indication that a second input fails to satisfy second validation criteria. The system may receive, at the front end service, a third input replacing the second input. The system may send, by the front end service to the back end service, the third input, and may receive, by the front end service from the back end service, a second indication that the third input satisfies the second validation criteria.Type: GrantFiled: September 20, 2019Date of Patent: December 26, 2023Assignee: Amazon Technologies, Inc.Inventors: Jaime Alberto Navarro, Warren Bennett, Sean Piersanti
-
Patent number: 11841937Abstract: Techniques for providing a data confidence index are presented herein. In one embodiment, a method includes setting a default confidence index for a remote computing device, the confidence index indicating trustworthiness of data provided by the remote computing device, the remote computing device operating as part of a network of cooperating devices; applying a plurality of ordered rules for the remote computing device, respective rules comprising a rule pre-condition and a confidence index adjustment, respective rules considering one of a behavior of the remote computing device and a property of the remote computing device; and adjusting the confidence index for the remote computing device responsive to results of applying the plurality of ordered rules. A system and apparatus substantially perform steps of the disclosed method.Type: GrantFiled: January 7, 2020Date of Patent: December 12, 2023Assignee: PayPal, Inc.Inventors: Suneet Nandwani, Jie Zou
-
Patent number: 11829248Abstract: An information handling system includes a memory and a baseboard management controller. The memory includes a recovery partition including a recovery kernel, a first boot partition including first firmware, and a second boot partition including backup firmware. The baseboard management controller (BMC) attempts a first boot operation of the first firmware in the first boot partition. In response to a failure of the first boot operation, the BMC attempts a second boot operation of the backup firmware in the second boot partition. In response to a failure of the second boot operation, the BMC operates a recovery kernel. During the operation of the recovery kernel, the BMC provides a firmware request to an enclosure controller, receives blocks of correct firmware from a functioning baseboard management controller, stores the blocks of correct firmware in the first boot partition, attempts and completes a third boot operation of the correct firmware.Type: GrantFiled: September 23, 2021Date of Patent: November 28, 2023Assignee: Dell Products L.P.Inventors: Prashanth Giri, Murali Somarouthu, Babu Chandrasekhar
-
Patent number: 11829230Abstract: Disclosed embodiments provide techniques for generating and using a Global Error-Code Sequence (GECS), with the role of generating, at request, a unique error identification number (ID). The scope of the unique identification number can include worldwide, company-wide, or a certain application ecosystem, such as eCommerce applications, etc. The GECS forms a strong correlation between an error condition and a known solution. While other logging signatures such as line numbers, stack traces, and addresses can change with new releases or invocations, the GECS enables a tighter coupling between an error condition and a knowledgebase document, which enables faster resolution of computer application problems and reduced downtime.Type: GrantFiled: September 23, 2021Date of Patent: November 28, 2023Assignee: International Business Machines CorporationInventors: Cristina Morariu, Faried Abrahams
-
Patent number: 11822459Abstract: A method may include extracting, from a function included in code, sub-tokens and program analysis features, generating sub-token vectors from the sub-tokens and a program analysis vector from the program analysis features, combining, by a machine learning model, the sub-token vectors to obtain a combined sub-token vector, combining the combined sub-token vector and the program analysis vector to obtain a function vector, and classifying, using the function vector, the function as a function category.Type: GrantFiled: May 25, 2021Date of Patent: November 21, 2023Assignee: Oracle International CorporationInventors: Mahinthan Chandramohan, Cristina Cifuentes
-
Patent number: 11782819Abstract: A user-annotated reference implementation identifies variable values generated by the reference implementation during its execution. A software implementation under analysis is executed. Variable values in the running memory of the program code of the software implementation under analysis, during its execution, are identified and copied. The variable values traced from the running memory of the program code are compared against the annotated variable values generated by the reference implementation, to determine a similarity between the program code under analysis, and the reference implementation. An output is generated that is indicative of whether the traced variables from the program code under analysis are the same as the annotated variable values generated by the reference implementation.Type: GrantFiled: July 31, 2020Date of Patent: October 10, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Nir Levy, Lee Stott, Ran Gilad-Bachrach
-
Patent number: 11782784Abstract: Aspects described herein may use machine learning models to predict one or more remediation actions to mitigate reoccurrence of an incident that has become restored based upon previous incidents of an entity. Historical incident data is compiled into two incident datasets: one representative of incidents that were assigned a remediation action to mitigate reoccurrence of the incident, and a second representative of incidents that were not assigned a remediation action. A machine learning model matches relationships between data in the two datasets and outputs scores representative of similarities. Based on the scores, one or more remediation actions are mapped to an incident in the second dataset and the remediation action is performed for the incident.Type: GrantFiled: October 25, 2021Date of Patent: October 10, 2023Assignee: Capital One Services, LLCInventors: Matthew Louis Nowak, Keith D. Greene, Catherine Barnes, David Walter Peters
-
Patent number: 11775290Abstract: According to an aspect of an embodiment, operations for detection of API compatibility across software versions are provided. The operations may include receiving an input associated with a software application. The operations may further include determining first information. The operations may further include extracting a set of data from one or more web-based sources based on the determined first information. The operations may further include executing a set of operations including one or more pattern searching operations on the extracted set of data to generate a compatibility result. The operations may further include controlling a display device based on the generated compatibility result. The display device may be controlled to display assistive information which informs about a compatibility of the one or more APIs or the functions used in the source code of the software application with respect to the second version of the software.Type: GrantFiled: August 6, 2021Date of Patent: October 3, 2023Assignee: FUJITSU LIMITEDInventors: Lei Liu, Wei-Peng Chen
-
Patent number: 11757933Abstract: An extended enterprise browser provides protection from ransomware attacks against SaaS and private enterprise application. In one implementation, the extended enterprise browser supports at least two different endpoint security certificates. A selection of the endpoint security certificate is made based on a ransomware risk level posture. Various factors may be used to determine the ransomware risk level posture to aid preventing ransomware attacks.Type: GrantFiled: August 15, 2022Date of Patent: September 12, 2023Assignee: AIRGAP NETWORKS INC.Inventors: Ritesh R. Agrawal, Vinay Adavi, Satish M. Mohan
-
Patent number: 11734260Abstract: In some embodiments, an apparatus includes an instance of a distributed database at a first compute device configured to be included within a set of compute devices that implement the distributed database. The apparatus also includes a processor configured to define a first event linked to a first set of events. The processor is configured to receive, from a second compute device from the set of compute devices, a signal representing a second event (1) defined by the second compute device and (2) linked to a second set of events. The processor is configured to identify an order associated with a third set of events based at least one a result of a protocol. The processor is configured to store in the instance of the distributed database the order associated with the third set of events.Type: GrantFiled: June 22, 2020Date of Patent: August 22, 2023Assignee: Hedera Hashgraph, LLCInventor: Leemon C. Baird, III
-
Patent number: 11726860Abstract: A knowledge base record can include executable language. Executing of the instructions of the record can include at least one of: a) searching for one or more terms in a log file associated with a data processing system; b) performing an API call; or c) getting or setting a field in a configuration file or database. The instructions can be executed to determine whether an issue is present with the data processing system, or to take corrective action.Type: GrantFiled: December 23, 2020Date of Patent: August 15, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Weiyang Liu, Qi Wang, James Morton, Lihui Su, Ming Zhang
-
Patent number: 11726902Abstract: In an embodiment, a method includes receiving information identifying an input bot for testing. The method also includes detecting a functionality performed by the input bot. The method also includes creating a plurality of inputs for simulation of the functionality of the input bot. The method also includes executing the input bot a plurality of times using a same sample of actions. The method also includes checking for consistency of at least one of behavior and output for the same sample of actions. The method also includes executing the input bot a plurality of times using different samples of actions. The method also includes generating an execution plan for the input bot. The method also includes automatically validating the input bot, where the validation results in an automated determination of whether the input bot is defective.Type: GrantFiled: July 9, 2021Date of Patent: August 15, 2023Assignee: NTT DATA Services, LLCInventors: Dhurai Ganesan, Sankar Chandrasekaran, Gowrishanker Pari, Harsh Vinayak
-
Patent number: 11720465Abstract: Aspects of the present invention disclose a method, computer program product, and system for determining a response to a query from a user. The method includes one or more processors receiving a query associated with a software product. The query includes an indication of an error. The method further includes one or more processors determining whether a response to the query is available in an accessible knowledge base. In response to determining that a response to the query is not available, the method further includes one or more processors identifying content in program code of the software product that corresponds to the indicated error of the received query. The method further includes one or more processors determining a response to the query based on the identified content in the program code. The determined response to the query includes diagnostic information corresponding to the indicated error.Type: GrantFiled: September 24, 2020Date of Patent: August 8, 2023Assignee: International Business Machines CorporationInventors: Grzegorz Piotr Szczepanik, Piotr Kalandyk, Pawel Tadeusz Januszek, Michał Maciej Zalas
-
Patent number: 11720471Abstract: A computer system determines stack usage. An intercept function is executed to store a stack marker in a stack, wherein the intercept function is invoked when a program enters or exits each function of a plurality of functions of the program. A plurality of stack markers are identified in the stack and a memory address is determined for each stack marker during execution of the program to obtain a plurality of memory addresses. The plurality of memory addresses are analyzed to identify a particular memory address associated with a greatest stack depth. A stack usage of the program is determined based on the greatest stack depth. Embodiments of the present invention further include a method and program product for determining stack usage in substantially the same manner described above.Type: GrantFiled: August 9, 2021Date of Patent: August 8, 2023Assignee: International Business Machines CorporationInventors: Narayana Aditya Madineni, Michael W. Gray, Matthew Green, Luvita Burgess
-
Patent number: 11714747Abstract: The present disclosure involves systems, software, and computer implemented methods for executing integration scenario regression tests in customer landscapes. One example method includes identifying a request to create a test case for an integration scenario for a cloud platform customer. The test case is created for the scenario, including enabling the test case to run in an isolated customer environment specific to the customer. An update to the cloud platform is identified. The update is provisionally applied to the cloud platform for the customer. The test case is executed in the isolated customer environment, to test the scenario for the customer. A determination is made as to whether execution of the test case succeeded. In response to determining successful test case execution, the update to the cloud platform is finalized for the customer. In response to determining unsuccessful test case execution, the update is rolled back for the customer.Type: GrantFiled: September 29, 2021Date of Patent: August 1, 2023Assignee: SAP SEInventor: VishnuPrasath Dhayanithi
-
Patent number: 11714906Abstract: The disclosed technology teaches reducing threat detection processing by applying similarity measures. The method includes recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, at least an entropy measure of the previously processed file, and calculating an entropy measure for the edited version of the file. The method applies a similarity measure to compare the entropy measures for the edited version and the previously processed file, avoiding full threat scanning of the file to detect malware except when the similarity measure reaches a scanning trigger. When any similarity measure or combination of similarity measures reaches a trigger, the technology teaches processing the file by using a threat detection module to detect malware. Further included is logging the edited version of the file for further processing when the similarity measure reaches a logging trigger.Type: GrantFiled: January 12, 2022Date of Patent: August 1, 2023Inventors: Himanshu Sharma, Abhinav Singh
-
Patent number: 11704214Abstract: A system and methods for contact center fault diagnostics, comprising a diagnostic engine and test cases used for testing components and services in a contact center, designed to operate on a contact center with a specified test campaign, allowing a contact center's various services and systems to be tested either internally or externally in an automated fashion with specified testcases being used to specify the format and expectations of a specific test, with reports of failures and points of failure being made available to system administrators.Type: GrantFiled: October 27, 2022Date of Patent: July 18, 2023Assignee: CYARA SOLUTIONS PTY LTDInventors: Mark Ryan, Chris Ryan
-
Patent number: 11693953Abstract: A pipeline for securely validating computer executable code in a third-party cloud environment is provided. The pipeline comprises an on-boarding account and a run account. The on-boarding account is configured to allow the user to access computer executable code input into the third-party cloud environment from the user and prevent the user from accessing the protected data input into the third-party cloud environment from a secure provider. The on-boarding account is also configured to transmit the computer executable code from the on-boarding account to another account in the third-party cloud environment if a first predetermined criterion is met. The run account is configured to allow the user to execute the computer executable code with the protected data and prevent the user from accessing the computer executable code. Moreover, a process for generating the pipeline and a method of securely validating computer executable code in a third-party cloud environment using the pipeline is provided.Type: GrantFiled: August 28, 2020Date of Patent: July 4, 2023Assignee: Barclays Execution Services LimitedInventor: Jeeban Panigrahi
-
Patent number: 11693739Abstract: Detecting non-callable external component APIs is provided. It is determined whether a first function call stack of a worker thread in a multi-threaded application of the computer matches a second function call stack of the worker thread. In response to determining that the first function call stack matches the second function call stack of the worker thread, an external component application programming interface (API) corresponding to the worker thread is identified from a function call stack of the worker thread. The external component API corresponding to the worker thread is marked as non-callable in an API state map. The worker thread is marked as being in a hang state. The worker thread in the hang state is terminated as a remediation action step to maintain performance.Type: GrantFiled: April 9, 2021Date of Patent: July 4, 2023Assignee: International Business Machines CorporationInventors: James Jose, Amar Shah, Nilima Srivastava, Ajay Ponnappan
-
Patent number: 11663108Abstract: The present disclosure relates generally to a system that includes a storage component that stores data and a processor. The processor may install an application using a portion of the storage component, partition the portion of the storage component from a remaining portion of the storage component, and execute the application via the portion of the storage component.Type: GrantFiled: December 8, 2021Date of Patent: May 30, 2023Assignee: United Services Automobile Association (USAA)Inventor: Ryan Russell
-
Patent number: 11663064Abstract: Disclosed herein are systems and method for generating a guest Operating System (OS) crash dump. In one aspect, an exemplary method comprises, obtaining information about a guest physical memory and a state of a guest CPU, determining guest page tables including a data structure for mapping between the guest physical memory and guest virtual pages using registers of the guest CPU, identifying an interrupt handler and determining an address of the interrupt handler using the guest page tables and the registers of guest CPU, finding a location of a kernel image in memory by scanning virtual addresses backward starting from the interrupt handler until a beginning of an executable kernel module is found, identifying and fetching debug symbols, determining system task descriptors using the debug symbols, determining debugger relevant data using the debug symbols, and generating the crash dump header using the system task descriptors and the debugger relevant data.Type: GrantFiled: December 31, 2019Date of Patent: May 30, 2023Assignee: Virtuozzo International GmbHInventors: Roman Kagan, Denis Lunev, Alexey Kobets, Victor Prutyanov
-
Patent number: 11663113Abstract: A computer-implemented method for test case priority selection includes initiating execution of a set of test cases associated with a system under test. Further, the set of test cases are executed according to a first order of execution, and during the execution, at runtime a failing test case, from the set of test cases is determined. Further, at runtime, from the set of test cases, a subset of test cases that are not yet executed is identified. Further, at runtime, a priority value is assigned to each test case from the subset of test cases, the priority value based on a similarity of the test case with the failing test case. Further, at runtime, the set of test cases is reorganized to execute the subset of test cases in a second order of execution based on priority values that are assigned.Type: GrantFiled: February 20, 2020Date of Patent: May 30, 2023Assignee: International Business Machines CorporationInventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Dale E. Blue, Brian Mo
-
Patent number: 11647055Abstract: Systems and methods include providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network; continuously collecting packets intercepted by the enterprise application over a time interval, wherein the collected packets are collected over the time interval; and responsive to an issue with functionality of the enterprise application, transmitting the collected packets to a back end server for troubleshooting of the issue. The time interval is a set amount of time, and each collected packet is deleted at the expiration of the time interval.Type: GrantFiled: April 25, 2022Date of Patent: May 9, 2023Assignee: Zscaler, Inc.Inventors: Rohit Goyal, Rishabh Gupta
-
Patent number: 11639804Abstract: Architectures or techniques are presented that can facilitate automated function testing (AFT) in connection with an HVAC system or component thereof. The architectures detailed herein can facilitate creation, modification, or duplication of quiz data (e.g., a test). This quiz data can be executed in order to automatically test the function of the HVAC system or component. Additionally, prior to execution, a verification procedure can be performed to ensure that an expected state indicated in the quiz data can in fact be exhibited by the device. Further, execution of the quiz data can include an exit condition that, when satisfied can cause termination of the execution prior to completion. Such can be useful to avoid potentially dangerous situations or to avoid undue disruption to a service provided by the HVAC system.Type: GrantFiled: December 13, 2019Date of Patent: May 2, 2023Assignee: Trane International Inc.Inventors: Christopher R. Vause, Anthony W. Bruno, Jigar Chimanlal Patel, Sudeep Uprety, Matthew Allen Faust
-
Patent number: 11632378Abstract: In some implementations, a method includes receiving, by a malware detection system, a request for a certification user interface element for a file to be served in an Internet resource, wherein the file is a file that has previously been classified as not containing malware by the malware detection system, and wherein the certification user interface element certifies that the file has been classified by the malware detection system as not containing malware, determining, based on the request, that the file is available for download from an Internet resource, and storing data that identifies the Internet resource as a location where a malware-free file is available for download.Type: GrantFiled: July 23, 2020Date of Patent: April 18, 2023Assignee: Chronicle LLCInventor: Emiliano Martinez Contreras
-
Patent number: 11620208Abstract: Systems and methods are described for verifying functionality of software. A set of code that is to be validated is identified. A first configuration is determined for the set of code that configures the code as a first build for validation. The first build is released for a first validation process. Prior to completion of validation of the first build, a second configuration is determined for the set of code that configures the code as a second build for validation. The second build is released for a second validation process prior to completion of validation of the first build. The first and second validation process are staged so that the first and second builds can be reverted independently of one another in the event of a validation issue. The first and second validation process are independently completed in the absence of a validation issue.Type: GrantFiled: June 18, 2021Date of Patent: April 4, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jeremy Haubold, Rahul Nigam, Parminder Pal Singh
-
Patent number: 11593480Abstract: Implementations are provided herein for systems, methods, and a non-transitory computer product configured to use predictive analysis of quantifiable parameters associated with individual files stored on a distributed file storage system. In some embodiments, parameters are analyzed by machine learning so that scheduled antivirus scanning can be intelligently conducted. We teach creating a sequential order for scheduled antivirus scanning such that the files most likely to be accessed or needed by users in the future will be scanned for viruses before those files less likely to be accessed. Our teachings encompass the use of heuristic data compiled and analyzed on a per-file basis. We enable system administrators to determine which parameters to prioritize and to set thresholds for antivirus scanning such as time limits.Type: GrantFiled: July 24, 2018Date of Patent: February 28, 2023Assignee: EMC IP Holding Company LLCInventors: Abhijit Toley, Sachin Bochare
-
Patent number: 11580068Abstract: Systems and methods are provided for analyzing data in one or more datasets, where the one or more datasets are embodied as local, embedded databases in a client-side application, such as a web browser or web browser tab. A client-side data analysis application or artifact may be used to interact, i.e., query, the local, embedded databases, and retrieve results to analyze data. Because the one or more datasets are localized, there is no need to access a remote database/datastore in order to analyze the data. Moreover, the client-side data analysis application or artifact can be executed as individual instances in the client-side application. The state of a local, embedded database may be stored as another file that can be used as a local, embedded database for another instance of the client-side data analysis application or artifact.Type: GrantFiled: December 15, 2017Date of Patent: February 14, 2023Assignee: Palantir Technologies Inc.Inventor: William Dwyer
-
Patent number: 11575704Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.Type: GrantFiled: May 30, 2018Date of Patent: February 7, 2023Assignee: CYEMPTIVE TECHNOLOGIES, INC.Inventors: Stewart P. MacLeod, Robert Pike
-
Patent number: 11567846Abstract: A system and methods for contact center fault diagnostics, comprising a diagnostic engine and datastore of test cases used for testing components and services in a contact center, designed to operate on a contact center with a specified test campaign, allowing a contact center's various services and systems to be tested either internally or externally in an automated fashion with specified testcases being used to specify the format and expectations of a specific test, with reports of failures and points of failure being made available to system administrators.Type: GrantFiled: October 17, 2019Date of Patent: January 31, 2023Assignee: CYARA SOLUTIONS PTY LTDInventors: Mark Ryan, Chris Ryan
-
Patent number: 11526414Abstract: In one aspect, a first device may download at least one disk image and then provide the disk image to second and third devices through a fourth device that controls connections to the second and third devices. The first device may then run computer diagnostics concurrently on the second and third devices through the fourth device and using the image provided to each of the second and third devices. In some examples, communication between the devices may occur using USB ports.Type: GrantFiled: October 6, 2020Date of Patent: December 13, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Marcelo da Costa Ferreira, Carlos Eduardo Dias Duarte, Gustavo Labbate Godoy
-
Patent number: 11520468Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with components across different domains in a single user interface in an online social network. The user interface includes a first component and a second component, where the first component exposes content from a first database system at a first network domain and the second component exposes content from a second database system at a second network domain. A first interaction with the first component is received at a computing device, followed by a reference being provided in the second component, where the reference includes information related to the first interaction. A second interaction with the second component regarding the reference can be received at the computing device. Interactions between the components hosted on different database systems can occur through an application programming interface (API).Type: GrantFiled: September 9, 2021Date of Patent: December 6, 2022Assignee: Salesforce, Inc.Inventors: Scott D. Beechuk, Orjan N. Kjellberg, Arvind Krishnan
-
Patent number: 11507392Abstract: Computing clusters can be automatically configured according to some aspects described herein. For example, a system can receive configuration datasets from instantiated objects in a management cluster. The configuration datasets can be for configuring target objects in managed clusters, where the managed clusters are separate from the management cluster. The system can then configure the target objects within each of the managed clusters based on the configuration datasets.Type: GrantFiled: February 26, 2020Date of Patent: November 22, 2022Assignee: RED HAT, INC.Inventors: Thomas Wiest, Andrew Butcher, Cesar Wong, Joel Diaz
-
Patent number: 11500751Abstract: A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing.Type: GrantFiled: March 3, 2020Date of Patent: November 15, 2022Assignee: Commvault Systems, Inc.Inventors: Paramasivam Kumarasamy, Amey Vijaykumar Karandikar, Durga Prasad Chedalavada, Suma Seshadri, Anand Vibhor
-
Patent number: 11500713Abstract: Methods and systems that automatically rank log/event messages and log/event-message transactions to facilitate analysis of log/event-messages generated within distributed-computer systems are disclosed. A base-window dataset and current-window dataset are selected for diagnosis of a particular error or failure and processed to generate a transaction sequence for each dataset corresponding to log/event-message traces identified in the datasets. Then, frequencies of occurrence of log/event-message types relative to transaction types are generated for each dataset. From these two sets of relative frequencies of occurrence, changes in the relative frequency of occurrence for each log/event-message-type/transaction-type pair are generated. Normalized scores for log/event-message-type/transaction-type pairs and scores for transaction types are then generated from the changes in the relative frequency of occurrence.Type: GrantFiled: December 23, 2020Date of Patent: November 15, 2022Assignee: VMware, Inc.Inventors: Ritesh Jha, Nikhil Jaiswal, Jobin Raju George, Vaidic Joshi, Shivam Satija
-
Patent number: 11503131Abstract: The present disclosure relates to generating performance profiles of member nodes. A plurality of electronic activities can be accessed. A subset of electronic activities from the plurality of electronic activities can be identified. The subset of electronic activities can be parsed to identify participants of the electronic activities. A second node profile can be accessed for each participant. Participant types can be identified from each second node profiles. A distribution of the subset of electronic activities can be determined. A performance profile can be generated.Type: GrantFiled: November 23, 2020Date of Patent: November 15, 2022Assignee: People.ai, Inc.Inventors: Oleg Rogynskyy, Yurii Brunets, Eric Jeske, Nicholas Dingwall
-
Patent number: 11487854Abstract: Provided is a method of protecting an application from reverse engineering. The method includes registering, in an electronic device, a handler capable of being called as a preset fault is generated in the application, after the handler is registered, executing a protection code for generating the preset fault in the application, determining whether an environment where the application is executed is an abnormal environment, based on whether the handler has been called as the protection code is executed, and performing an operation for protecting the application, based on a result of the determination.Type: GrantFiled: June 12, 2019Date of Patent: November 1, 2022Assignees: SAMSUNG ELECTRONICS CO., LTD., KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGYInventors: Kuenhwan Kwak, Donguk Kim, Byunghoon Kang, Minjoon Park, Seongman Lee, Daehee Jang, Yunjong Jeong
-
Patent number: 11487607Abstract: Automated recovery of execution roles in a distributed historian system in accordance with actions and rules customized to each execution role. A monitoring service monitors the health status of execution roles and automatically performs a corrective action in response to the health state of an execution role triggering a predetermined rule.Type: GrantFiled: December 18, 2020Date of Patent: November 1, 2022Assignee: AVEVA SOFTWARE, LLCInventors: Brian Kenneth Erickson, Arun Kumar Nattamai Ramdoss, Vinay T. Kamath, Abhijit Manushree
-
Patent number: 11481277Abstract: A method, computer program product, and computer system for performing, by a computing device, a check on an internal secondary device on a first node during a boot software stack initialization. It may be determined that the internal secondary device is corrupt based upon, at least in part, the check. The first node may access a recovery operating system and an image repository of an internal secondary device on a second node. The internal secondary device on the first node may be rebuilt based upon, at least in part, the recovery operating system and the image repository of the internal secondary device on the second node.Type: GrantFiled: July 30, 2019Date of Patent: October 25, 2022Assignee: EMC IP HOLDING COMPANY, LLCInventors: Roko Peros, Kenneth D. Lee, Helga Sonner
-
Patent number: 11474496Abstract: A computer system for controlling an industrial automation environment comprising a plurality of industrial components is provided. The computer system includes a machine interface, a user interface, a hardware memory, and a processor. The processor is configured to select an industrial component for configuration based on a user input. The processor is also configured to determine a context of the selected industrial component and display a plurality of interface modules to the user for the selected industrial component based on the context of the selected industrial component. The processor is further configured to receive a selection of an interface module by the user through the user interface, and add the selected interface module to a human-machine interface.Type: GrantFiled: September 11, 2017Date of Patent: October 18, 2022Assignee: Rockwell Automation Technologies, Inc.Inventors: Thong T. Nguyen, Paul Schmirler, Alex L. Nicoll
-
Patent number: 11461192Abstract: Systems and methods are disclosed to implement an automatic recovery technique for a detected corruption of stored data in a database system. In embodiments, the database system implements a physical replication process that replicates the contents of a primary volume to a mirror volume, with a specified mirror lag. The database system also stores a log of updates that it has received. The database system is configured to detect an error caused by a recent write operation received during the mirror lag. Upon detection, physical replication to the mirror volume is stopped, and a logical replication is performed where write operations logged during the mirror lag are replayed on the mirror volume. The mirror volume is then promoted to replace the primary volume in the database system. Advantageously, the disclosed recovery technique can be performed very quickly, and with zero loss of client requests received before initiation of the recovery.Type: GrantFiled: November 27, 2019Date of Patent: October 4, 2022Assignee: Amazon Technologies, Inc.Inventors: Murali Brahmadesam, Navaneetha Krishnan Thanka Nadar
-
Patent number: 11436133Abstract: Example implementations relate to comparable UI object identifications. Some implementations may include a data capture engine to capture data points during test executions of the application under test. The data points may include, for example, test action data and application action data. Additionally, some implementations may include a data correlation engine to correlate each of the data points with a particular test execution of the test executions, and each of the data points may be correlated based on a sequence of events that occurred during the particular test execution. Furthermore, some implementations may also automatically identify, based on the correlated data points, a set of comparable UI objects.Type: GrantFiled: March 23, 2016Date of Patent: September 6, 2022Assignee: Micro Focus LLCInventors: Inbar Shani, Ilan Shufer, Amichai Nitsan
-
Patent number: 11429362Abstract: A system, method, and computer-readable medium are disclosed for improved management of software applications used on a device of a business entity. A determination is made if software applications are needed for the device. Application program interface (API) calls are performed for needed software applications from one or more sources, including third-party providers. The needed software applications are fetched from the one or more sources through communication channels established by the API calls; and authenticating fetched software applications prior to installing on the device.Type: GrantFiled: July 26, 2019Date of Patent: August 30, 2022Assignee: Dell Products L.P.Inventors: Amy L. Buck, Mainak Roy, Rathi Babu
-
Patent number: 11403209Abstract: A graphical user interface (GUI) of an application under test (AUT) is rendered. A GUI test object of the AUT is identified within the GUI. Test information regarding the GUI test object of the AUT is retrieved. The GUI test object of the AUT is rendered within the GUI to reflect the test information.Type: GrantFiled: February 27, 2020Date of Patent: August 2, 2022Assignee: MICRO FOCUS LLCInventors: Er-Xin Shang, Bin Zhou, Bin Gao, Bin Li