Preventing Errors By Testing Or Debugging Software (epo) Patents (Class 714/E11.207)
  • Patent number: 11917000
    Abstract: A message queue routing system may be implemented into a message queue gateway to route data to Software component designed and deployed into MQ Gateway to route the data to the MQ cluster. A central processing unit (CPU) node analyzer reads real time health statistics of each of a plurality of MQ cluster processing nodes. Based the computation, the CPU node analyzer routes the message to a specified node of the cluster having a minimum of CPU load at that time. The CPU node analyzer analyzes information comprising at least CPU performance information and system idleness information. Each processing node enables dynamic message routing computations utilizing an artificial intelligence/machine learning framework and a plurality of trained predictive models. The predictive model is trained using a trained data set using text classification.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: February 27, 2024
    Assignee: Bank of America Corporation
    Inventors: Anurajam Rajagopalan, Sathyanarayana Rajendran, Sunil Kumar Sriperambudur
  • Patent number: 11915026
    Abstract: In accordance with input received via a programmatic interface, a level of isolation at which a software container is to be executed is determined. Based on the level of isolation, a category of virtual machines of a virtualized computing service is selected for executing the software containers. The selected category differs from other categories in at least the number of devices emulated for virtual machines of the categories. The software container is run within a virtual machine of the selected category.
    Type: Grant
    Filed: September 14, 2020
    Date of Patent: February 27, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Samartha Chandrashekar, Archana Srikanta
  • Patent number: 11871329
    Abstract: In a first participant in a network—such as an ad hoc wireless network—a facility performs peer regulation of the network. The facility monitors behavior of a second participant in the network that has appointed itself a routing participant for the network. Among the monitored behavior, the facility identifies behavior of the second participant that is inconsistent with its routing participant status. In response to this identifying, the facility sends a message to participants of the network including a third participant indicating that the second participant is no longer a routing participant.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: January 9, 2024
    Assignee: QUIXOTIC HOLDINGS, LLC
    Inventors: Ryan Scott Luther, Anthony Samuel Jacobs, Charles Robert Gorectke, Christopher Michael Garman
  • Patent number: 11803366
    Abstract: A firmware updating system and method are provided. The firmware updating method includes configuring a host to digitally sign a firmware to be updated, and configuring an electronic device to perform an authorization verification on an update tool, and only the update tool that passes the verification has an update permission. The update tool uses an encryption algorithm to encrypt the firmware to be updated that includes a digital signature. After the encryption is completed, the host sends the update tool to the electronic device through the update tool. The electronic device then uses a decryption algorithm to decrypt the received firmware to obtain the firmware to be updated including the digital signature, and write the firmware to be updated into a firmware storage area to be updated. The electronic device then verifies the digital signature in the firmware to be updated.
    Type: Grant
    Filed: April 15, 2021
    Date of Patent: October 31, 2023
    Assignee: REALTEK SEMICONDUCTOR CORP.
    Inventors: Dong-Yu He, Meng-Yao Gu, Jian Sun
  • Patent number: 11790246
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: obtaining prediction data that are indicative of media use behaviors of a user over a period of time. Prediction on a pattern of media use behaviors of the user including media content, hours spent on the media content, and the period of time is made. Base on the predicted media use pattern corresponding to a current stage in the period of time, a media use control rule for the user on a controlled device is generated.
    Type: Grant
    Filed: February 19, 2019
    Date of Patent: October 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Craig M. Trim, Victor Povar, Gandhi Sivakumar, Sarbajit K. Rakshit
  • Patent number: 11782773
    Abstract: A system and method for automated application programming interface (API) importation that includes receiving a selection of at least one API provider service of a set of API provider services with API integration support for a platform, retrieving a listing of APIs provided by the selected at least one API provider service, receiving a selection of at least one API from the listing of APIs, and enabling the selected at least one API for a user of the platform, in response to the selection of the at least one API.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: October 10, 2023
    Assignee: Salesforce, Inc.
    Inventors: Kirkland Spector, Philip Issler, Jr., Barkha Keni, Paul Anthony Mason, Alexander Victor Edelstein, Brian Jaffery Tajuddin
  • Patent number: 11733983
    Abstract: A method includes receiving a high-level function in a high-level code of an application; identifying resources in a hardware to execute a set of low-level instructions that is generated from the high-level function in the high-level code; compiling the high-level function in the high-level code of the application into the set of low-level instructions to be executed on the hardware; and generating a plurality of structured metadata associated with allocation of resources in the hardware to execute the set of low-level instructions.
    Type: Grant
    Filed: September 8, 2022
    Date of Patent: August 22, 2023
    Assignee: Marvell Asia Pte Ltd
    Inventors: Senad Durakovic, Chien-Chun Chou, Ulf Hanebutte, Harri Hakkarainen
  • Patent number: 11734159
    Abstract: Technologies are described for ranking test cases related to changes in a software code base using at least a portion of a call graph that is generated from the software code base. The at least a portion of the call graph comprises method nodes corresponding to methods in the software code base. The method nodes represent control flow relationships between the methods in the software code base. The at least a portion of the call graph also comprises test case nodes. Each test case node is connected to one or more method nodes corresponding to coverage of the one or more method nodes by the test case node. Using the at least a portion of the call graph, the test case nodes are automatically ranked. Ranking of the test case nodes is performed by evaluating various criteria associated with the at least a portion of the call graph.
    Type: Grant
    Filed: August 19, 2021
    Date of Patent: August 22, 2023
    Assignee: SAP SE
    Inventors: Amrit Shankar Dutta, Amitabh Goswami
  • Patent number: 11700274
    Abstract: In one embodiment, a method includes generating, by a pod deployment tool, a security context profile, associating, by the pod deployment tool, the security context profile with a deployment rule, and associating, by the pod deployment tool, a vulnerability level with the deployment rule. The method also includes identifying, by the pod deployment tool, pod policies associated with a pod located within a cluster of a network and analyzing, by the pod deployment tool, conditions of the deployment rule using the pod policies. The conditions may be associated with the security context profile and the vulnerability level. The method further includes determining, by the pod deployment tool, whether to allow deployment of the pod within the network in response to analyzing the conditions of the deployment rule.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: July 11, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Alexei Kravtsov, Idan Frimark, Erez Fishhimer
  • Patent number: 11627004
    Abstract: An apparatus converts incoming Power over Ethernet signals into power and data communications under the USB type C protocol standards for use with USB type C connections. Embodiments include a control circuit with programmed processes that facilitate negotiation when a USB-C device connector is attempting to communicate with for example, an Ethernet power source. The control circuit identifies the power delivery and communication profiles associated with a USB type C connected device and controls the Power over Ethernet source signal for compatibility with the device's charging profile and compliance under different IEEE standards.
    Type: Grant
    Filed: July 15, 2020
    Date of Patent: April 11, 2023
    Inventors: Tyler Andrews, Jacky Deng
  • Patent number: 11627034
    Abstract: Automated computer-implemented processes and systems are directed to troubleshooting a network used by an application in a data center. The processes and system execute a framework for automated network troubleshooting of an application. The framework performs automated fault localization by traversing a dependency graph that models the network from the observed performance problem, guided by the causality relationships, and for each edge of the graph, performs a test to determine problem causality, terminates at a set of well-defined criteria, and outputs at least one potential root cause for the application performance problem.
    Type: Grant
    Filed: February 21, 2022
    Date of Patent: April 11, 2023
    Assignee: VMware, Inc.
    Inventors: Rahul Ajit Chawathe, Amarjit Kumar Gupta, Gyan Sagar Sinha, Wenxuan Zhou
  • Patent number: 11537494
    Abstract: Example implementations relate to predicted usage based on monitored usage. For example, a system comprising a monitor engine can monitor usage of a plurality of applications used by a user during a first time period, during a heartbeat event, and predict usage of the plurality of applications, using a predictor engine, by the user during a second time period based on the analyzed monitored usage of the plurality of applications during the first time period. Additionally, the predictor engine can generate content during the second time period based on the predicated usage of the plurality of applications during the first time period.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: December 27, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Rafael Zotto
  • Patent number: 11483382
    Abstract: A method, apparatus and system for transmitting data. The system includes: the load balance gate wall translating a virtual MAC address of the virtual server in a destination address of a data packet from a client to a real MAC address of the real server according to a pre-configured address mapping relationship between a real server and a virtual server; the load balance gate wall sending a modified data packet to the virtual switch; the virtual switch determining a data packet flowing into the real server after receiving the data packet from the load balance gate wall, then translating a virtual IP and a virtual port of the virtual server in the destination address in the determined data packet to a real IP and a real port of the real server; and the virtual switch sending the modified data packet to the real server.
    Type: Grant
    Filed: June 4, 2020
    Date of Patent: October 25, 2022
    Inventors: Changqing Sun, Guang Yang, Lin Jiang, Yannan Hu
  • Patent number: 11481326
    Abstract: Methods and systems for a networked storage system are provided. One method includes: utilizing, by a first node, a storage location cache to determine if an entry associated with a first read request for data stored using a logical object owned by a second node configured as a failover partner node of the first node exists; transmitting, by the first node, the first read request to the second node; receiving, by the first node, a response to the first read request from the second node with requested data; inserting, by the first node, an entry in the storage location cache indicating the storage location information for the data; and utilizing, by the first node, the inserted entry in the storage location cache to determine storage location of data requested by a second read request received by the first node.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: October 25, 2022
    Assignee: NETAPP, INC.
    Inventors: Sumith Makam, Rahul Thapliyal, Kartik R, Roopesh Chuggani, Abhisar Lnu, Maria Josephine Priyanka S
  • Patent number: 11467811
    Abstract: A method includes receiving a high-level function in a high-level code of an application is received. The method also include identifying resources in a hardware to execute a set of low-level instructions that is generated from the high-level function in the high-level code. One or more processing operations are determined to be performed that is associated with the high-level function in the high-level code. The determining of the one or more processing operations occurs based on architecture of the hardware. The high-level function in the high-level code of the application is compiled into the set of low-level instructions to be executed on the hardware. A plurality of structured metadata is generated and includes information associated with the determining resources in the hardware and further includes information associated with the determining one or more processing operations.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: October 11, 2022
    Assignee: Marvell Asia Pte Ltd
    Inventors: Senad Durakovic, Chien-Chun Chou, Ulf Hanebutte, Harri Hakkarainen
  • Patent number: 11436125
    Abstract: Disclosed is a game test automation device capable of automating a game test. The game test automation device can comprise: a database for storing test procedure information, which is a combination of game scripts to be tested in a game service; and a testing unit for testing game build of the game service on the basis of the test procedure information, and creating game state information derived in the testing process and a test report on the test.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: September 6, 2022
    Assignee: Netmarble Corporation
    Inventors: Il Hwan Seo, Hyeon Woo Sim, Soo Man Yun, Sun Keun Shim, Dong Woo Lee, Sun Young Park, Yu Jin Han, Hye Jeong Jeong, Su Jin Park
  • Patent number: 11436072
    Abstract: Example implementations relate to method and management system for collecting contextual log files to an issue in a computing system. The method includes analyzing alert data to identify a current symptom associated with the issue in the computing system, and determining whether the current symptom exists in a first lookup table including a plurality of first symptoms and a plurality of first log categories. Each first symptom is mapped to one or more first log categories in the first lookup table. In response to determining that the current symptom exists in the first lookup table, the method includes collecting one or more log files from a plurality of log files corresponding to the one or more first log categories mapped to the current symptom, from the computing system. Further, the method includes transferring the one or more log files to an external computing system for performing diagnostics on the issue.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: September 6, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Poornachandran Sinnan Muthusamy, Bino Joseph Polackal, Haindavi Nagarajan, Rajeevalochana Kallur, Shubham Nagar
  • Patent number: 11316892
    Abstract: Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain. Systems and method are provided which enable an entity and users of an entity to identify potential harmful domains, combining search, discovery, reporting, the generation of risk indicators, end-user risk assessments, and training into a security awareness system.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: April 26, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Stu Sjouwerman, Alin Irimie, Greg Kras
  • Patent number: 11307948
    Abstract: A fault injection method and apparatus, an electronic device and a storage medium are provided, which are related to the technical fields of computers and cloud computing, in particular to the field of testing. The fault injection method includes: acquiring a fault injection task, which includes at least one target service identification and a fault scenario corresponding to the target service identification; determining a target service according to each target service identification, and acquiring a state of the target service; and injecting the fault scenario corresponding to the target service identification into the target service in a case that the state of the target service is a normal state. The application is beneficial to reduction of labor cost.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: April 19, 2022
    Assignee: Beijing Baidu Netcom Science and Technology Co., Ltd.
    Inventor: Yu Guan
  • Patent number: 11295013
    Abstract: An apparatus, a computer program product and a method for dimensionality reduction comprising: obtaining a set of Application Programming Interface (API) functions of a system invocable by a program, and a set of artifacts. Each artifact is associated with at least one API function and indicative of a functionality thereof. The method further comprising: clustering the API functions based on an analysis of the artifacts to create a set of clusters smaller than the set of API functions, such that each cluster comprises API functions having a similar functionality; and performing a dimensionality reduction to a feature vector using the set of clusters.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: April 5, 2022
    Assignee: International Business Machines Corporation
    Inventors: Fady Copty, Ayman Jarrous, Tamer Salman, Maksim Shudrak
  • Patent number: 11294682
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: April 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
  • Patent number: 11263033
    Abstract: A system may include an application server and one or more tenants served by the application server. The application server may host a virtual machine with multiple isolated sub-environments. Each tenant of the application server may request to run a program in a tenant-specific sub-environment of the virtual machine. The sub-environments may be configured so the execution of one tenant's code does not affect execution of another tenant's code or the hosting virtual machine, for example, by considering the resources used to execute the code. The application server may implement techniques to securely execute “untrusted” code, programmed using one or more different programming languages, in the sub-environments by enforcing resource restrictions and restricting the sub-environments from accessing the host's local file system. In this way, one tenant's code does not negatively impact execution of another tenant's code by using too many resources of the virtual machine.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: March 1, 2022
    Assignee: salesforce.com, inc.
    Inventors: Michael Goldberg Boilen, James Bock Wunderlich, Nathan Edward Lipke
  • Patent number: 11263070
    Abstract: Generating targeted analysis results in a support system is disclosed. Computing device information about a supported computing device in which a problem was encountered is received. Identification of a designated subset of tags of a plurality of tags is received. A plurality of analyzers is initiated to analyze the computing device information. The plurality of analyzers is configured to generate a plurality of results based on the computing device information. Tags of the plurality of tags are associated with the plurality of results. A subset of results are generated by discarding each result from the plurality of results that have no associated tags that match a tag in the designated subset of tags. The subset of results is output.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: March 1, 2022
    Assignee: Red Hat, Inc.
    Inventors: Wesley H. Duffee-Braun, Jonathan F. Newton, Jesse H. Jaggars
  • Patent number: 11237889
    Abstract: An infrastructure management system automatically determines a configuration of infrastructure services for the execution of applications that best satisfies predefined target criteria based on receiving annotated application programming interface (API) schemas associated with the applications. The system extracts information from customized annotations in a received API schema, sets up an API gateway with an existing configuration of infrastructure services, and logs requests received at this existing configuration via the gateway. The system generates a set of alternate configurations based on the extracted information, simulates execution of a set of logged requests to determine a set of valid configurations, and subsequently selects a new configuration that satisfies threshold predefined target criteria. The system may update the existing configuration to the new configuration without interrupting application services.
    Type: Grant
    Filed: January 8, 2021
    Date of Patent: February 1, 2022
    Assignee: salesforce.com, inc.
    Inventor: Billy Ma
  • Patent number: 11151268
    Abstract: An access control method for a restricted resource in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and permitting access by the software component to the restricted resource based on a comparison of the baseline profile and the runtime profile such that the software component exhibiting undesirable performance is precluded from accessing the restrict
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Fadi El-Moussa
  • Patent number: 11151244
    Abstract: A method in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining one or more characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and flagging the software component in execution based on a comparison of the baseline profile and the runtime profile so as to identify an undesirable performance of the software component.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Fadi El-Moussa
  • Patent number: 11134084
    Abstract: The invention provides for an improved and diversified system, apparatus and method for authenticating and/or authorizing an identity of an action requester within a secure environment. The invention provides for human and non-human agents as authentication factors that can be communicated with in real time via a communications network, such as via the Internet. The invention also provides for facilitating authorization of action requests that are received from non-human action requesters.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: September 28, 2021
    Assignee: HID Global Corporation
    Inventors: Darren Tuadleng Koh, Arun Suresh Prabhu
  • Patent number: 11076022
    Abstract: Systems, methods, and non-transitory computer-readable media can initiate a robotics framework configured to enable inter-process communications between a plurality of services implemented on the robotics framework, the plurality of services configured to operate at least some features of a vehicle. A function call is received from a first service of the plurality of services. The function call instructs the robotics framework to generate a network socket. A virtual network socket configured to receive data from a data log is generated based on the function call. The virtual network socket simulates data transmission with a hardware device over a real network socket.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: July 27, 2021
    Assignee: Lyft, Inc.
    Inventors: Tirthkumar Nilaykumar Pandya, Siliang Li, Jonathan Nichols
  • Patent number: 11003575
    Abstract: In one embodiment, a method for continuous integration automated testing in a distributed computing environment may include receiving data for a computer application into an automated testing schema; at least one computer processor executing a baseline test run and storing baseline test run results; receiving new code for the computer application at a test environment; the at least one computer processor executing a test run and storing test run results; the at least one computer processor comparing the test run results to the baseline test run results; and the at least one computer processor generating at least one report based on the comparing.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: May 11, 2021
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Vladimir Knajtner, Michel Victor, Shahin Mahmoud Shahin
  • Patent number: 10996947
    Abstract: A debugging and diagnostics system allow for dynamic code generation that inserts code into a production application to identify snappoints that cause snapshots to be taken if predefined conditionals are satisfied. The snappoints are associated with locations in source code for the production application and include conditional statements that must be met to create a snapshot of the production application. The snappoints are used to generate a collection plan that is provided to the server running the production application. The server rewrites the code of the production application based upon the collection plan to insert instructions that create snapshots when the conditional statements are met.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: May 4, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Jackson Davis
  • Patent number: 10963369
    Abstract: A software as a service platform employing novel means and methods to do demographic and behavioral data collection on and analysis of human UI/UX interactions. By utilizing adaptive testing, adaptive tester selection, and persistent tester pools with verified demographic data and ongoing behavioral data collection via a wide range of manual and algorithmic methods, decomposing, recomposing, and delivering optimized UI or UX data sources, collecting, integrating, delivering, and analyzing demographic and behavioral data regarding human interaction with interactive user interfaces and experiences using manual, hybrid, or algorithmic methods such as machine learning algorithms or path-finding algorithms, the present invention provides a novel framework for the extraction of comprehensive, consistent, and dynamic insights into the demographic and behavioral interactions of humans with interactive digital media sources.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: March 30, 2021
    Inventors: Ashkan Ziaee, Felix Skyler Hamilton
  • Patent number: 10915432
    Abstract: A test case management system includes an input and output (I/O) interface for receiving a first test case, a database (DB) for storing a second test case, and a controller for comparing the first test case with the second test case based on a similarity score between a string of the first test case and a string of the second test case.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: February 9, 2021
    Assignees: HYUNDAI MOTOR COMPANY, KIA MOTORS CORPORATION
    Inventors: Seok Ki Hong, Yon-Soo Jong, Kyung-Hwa Choi, Hyun-Seop Bae, Seung-Uk Oh
  • Patent number: 10896196
    Abstract: Various example embodiments for supporting data retrieval flexibility are presented. Various example embodiments for supporting data retrieval flexibility may include supporting data retrieval flexibility for retrieval of data from a device that does not maintain that data using a relational database data format by supporting operation of the device as a device that supports retrieval of that data in a relational database data format using a structured query language. Various example embodiments for supporting data retrieval flexibility may include supporting data retrieval flexibility for retrieval of data from a device by supporting retrieval of data maintained at the device based on a first data format based on generation of a database storing that data in a second data format different than the first data format and using a structured query language configured to support retrieval of the data in the second data format from the database.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: January 19, 2021
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Jayant Kotalwar, Suresh Kannan Durai Samy, Kendall Harvey
  • Patent number: 10867037
    Abstract: Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security mitigation action for a device based on information related to usage of the device and associated usage limitations associated with the selected security mitigation action. The processor may output information related to the selected security mitigation action.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: December 15, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jonathan Griffin, Adrian Baldwin
  • Patent number: 10846198
    Abstract: Automatic navigation of a user from a log statement that is selected by the user from a log to a code expression that was executed to generate the selected log statement. The computing system automatically identifies one or more code expressions as candidates for having generated the log statement, and then maps the log statement to these identified candidate code expressions in the code. In response to input from the user selecting the log expression, the computing system uses the mapping to visually provide a correlation between the log statement and the particular code expression, where the one or more mapped code expressions includes the particular code expression that actually generated the log statement.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: November 24, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Jackson Michael Davis, Andrew R. Sterland, Patrick Fenelon, Esteban Herrera
  • Patent number: 10817408
    Abstract: Systems and techniques are described for generating test cases. In one example, a manual test of code is performed. The manual test uses proxy code to detect at least one input to the code and a data transfer between the code and other code. The data transfer includes an input to the other code and an output from the other code. A file is generated that includes the at least one input to the code, the input to the other code, the output from the other code, and data that specifies that the manual test of the code resulted in an expected output. A mock test automates the manual test of the code based at least in part on the file.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: October 27, 2020
    Assignee: VMWARE, INC.
    Inventors: Dattathreya Sathyamurthy, Akhil Sadashiv Hingane, Piyush Bharat Masrani, Amarnath Palavalli, Hemanth Kumar Pannem
  • Patent number: 10779165
    Abstract: A method for pre-authenticating a user on the user's mobile device is provided. The method may be implemented on the device. The method may include tracking commonly accessed applications over a pre-determined amount of time. The method may include tracking and storing on the mobile device, application data associated with each commonly accessed application. When a determined current time of day is a pre-determined amount of time prior to the tracked start time of access to a one or more commonly accessed applications, the method may include capturing, autonomously, via each of a plurality of sensors, an attribute associated with the user. The method may further include comparing a value of the attribute captured to a historically stored attribute value. The method may further include verifying and pre-authenticating the user based on the comparing. The method may also include pre-loading the user's mobile device with the commonly accessed application.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: September 15, 2020
    Assignee: Bank of America Corporation
    Inventors: Brandon Sloane, Monika Kapur, Crystal M. Sundaramoorthy, Ryan Davis, Kevin A. Delson
  • Patent number: 10725890
    Abstract: A device to be utilized for testing a program is connected to a device host operating in a service provider network via a peripheral bus. A network connection is established between a testing host, which might be a virtual machine, and the device host using a peripheral-bus-over-network-protocol. A secure network connection is established between the developer computing device and the testing host. A network port utilized by a debugging client application executing on the developer computing device is forwarded to the testing host over the secure network connection. Data packets generated by the debugging client application executing on the developer computing device are forwarded to a debugging server application execution on the testing host. Peripheral devices (e.g. the requested device) accessible to the testing host can then be utilized by the developer computing device for testing execution of the program as if the device were locally connected thereto.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: July 28, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Anurag Goyal, Hongda Zhao, Billy Morales, Bommasamudra Chandra Shekar, Rohan Deshpande
  • Patent number: 10679211
    Abstract: Intelligent authentication is disclosed. According to one embodiment, a system includes a transaction logic configured to receive transaction metadata associated with an attempted transaction. The transaction logic is also configured to identify a user attempting the attempted transaction. The system further includes an activity logic configured to access an activity log associated with the user. The activity log includes values corresponding to previous transactions made by the user and any additional information provided by 3rd party feeds. The activity logic is also configured to compare transaction metadata to the values. The system also includes an authentication logic configured to select an authentication level for the transaction based, at least in part, on the comparison.
    Type: Grant
    Filed: June 3, 2019
    Date of Patent: June 9, 2020
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Darrell Lee Suen, Sridhar Kotamraju, Christopher P. Clausen, Melody Su-Shin Kao, Christina Z. Ongpin, Kevin R. Cieslak
  • Patent number: 10656973
    Abstract: A method of evaluating and selecting an application programming interface (API). The method includes accessing source-code in computer programming languages from an API repository. The method includes training a machine learning classifier using generalized, extracted API-calls to learn variations of API-call programming language syntaxes through usage of the API-call programming language syntaxes in the source-code. The method includes building API-call models suitable for the computer programming languages and building a parameter relations graph based on backtracking data-flow from API-calls that are extracted from public project repositories based on the API-call model. The method includes retrieving sample parameter values from the parameter relations graph. The method includes implementing the sample parameter values in an evaluation interface to evaluate functionality of an API in a software application.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: May 19, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Junhee Park, Mehdi Bahrami, Wei-Peng Chen
  • Patent number: 10635808
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: April 28, 2020
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Patent number: 10621063
    Abstract: A system, method and computer-readable storage devices for enhancing the presentation of structured log files. A system configured according to this disclosure can track events of a computing entity. The computing entity can be a state machine, a virtual machine, a thread, a process, a software component, or a hardware component. The computing entity can be any device that generates or contributes to an event log. The events can be tracked from at least one of a structured log file and a stream of event data, for example. The system can identify event types for the events. The system can identify relationships between the events, and generate a sequence diagram of the events. The sequence diagram can include visual indications of the relationships based on the event types. The system can further select an icon for each event from an event-specific icon directory based on event type.
    Type: Grant
    Filed: July 10, 2015
    Date of Patent: April 14, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventor: Roberto Attias
  • Patent number: 10609014
    Abstract: A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications entity. At the at the first communications entity, determining a first authentication score associated with a first information exchange session between the first and second communications entities, determining a second authentication score associated with a second information exchange session between the first and second communications entities, (the second information exchange spaced apart in time from the first information exchange), combining the first and second authentication scores to create a cumulative risk analysis score, and responsive to the cumulative risk analysis score, generating a dynamic pairing code for use in governing exchange of information during subsequent communications between the first and second communications entities.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: March 31, 2020
    Assignee: NXT-ID, INC.
    Inventors: David Tunnell, Justin Mitchell, Jacob Zurasky
  • Patent number: 10585796
    Abstract: Aspects of an application program's execution which might be subject to non-determinism are performed in a deterministic manner while the application program's execution is being recorded in a virtual machine environment so that the application program's behavior, when played back in that virtual machine environment, will duplicate the behavior that the application program exhibited when originally executed and recorded. Techniques disclosed herein take advantage of the recognition that only minimal data needs to be recorded in relation to the execution of deterministic operations, which actually can be repeated “verbatim” during replay, and that more highly detailed data should be recorded only in relation to non-deterministic operations, so that those non-deterministic operations can be deterministically simulated (rather than attempting to re-execute those operations under circumstances where the outcome of the re-execution might differ) based on the detailed data during replay.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Jeffrey Daudel, Suman Cherukuri, Humberto Yeverino, Dickey Singh, Arpad Jakab, Marvin Justice, Jonathan Lindo
  • Patent number: 10567413
    Abstract: A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: February 18, 2020
    Assignee: Centripetal Networks, Inc.
    Inventors: David K. Ahn, Keith A. George, Peter P. Geremia, Pierre Mallett, III, Sean Moore, Robert T. Perry, Jonathan R. Rogers
  • Patent number: 10466970
    Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: November 5, 2019
    Assignee: SAP SE
    Inventors: Arun Subramanian, Praveenkumar Arangotte Kozhisseri, Rachit Mathur
  • Patent number: 10454968
    Abstract: Testing a system against fuzzing attacks includes negating all regular expressions used in the corresponding language, and applying those negated regular expressions to a system interface. Only expressions definitively outside the scope of protocol specification implicate vulnerabilities to fuzzing attacks. The system detects fuzzing attacks by continuously monitoring packets of data and only passing through packets that conform to regular expressions of the language.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: October 22, 2019
    Assignee: Rockwell Collins, Inc.
    Inventors: Mark A. Bortz, David S. Hardin, James N. Potts, Konrad L. Slind
  • Patent number: 10430321
    Abstract: Provided are systems, methods, and media for concurrency conflict testing for shared resources. An example method includes identifying shared resources that are to be accessed by an application. Generating a plurality of concurrency test scenarios based on the shared resources. Analyzing a plurality of concurrency test cases to detect which concurrency test cases include a reference to the shared resources. Executing a concurrency test scenario.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: October 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Li Li, Li Xiang, Chang Zhi G Z Zhang, Ting Xie, Xin Zheng, Yan Wang, Hai He, Si Bin Fan
  • Patent number: 10360094
    Abstract: Generating targeted analysis results in a support system is disclosed. Computing device information about a supported computing device in which a problem was encountered is received. Identification of a designated subset of tags of a plurality of tags is received. A plurality of analyzers is initiated to analyze the computing device information. The plurality of analyzers is configured to generate a plurality of results based on the computing device information. Tags of the plurality of tags are associated with the plurality of results. A subset of results are generated by discarding each result from the plurality of results that have no associated tags that match a tag in the designated subset of tags. The subset of results is output.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: July 23, 2019
    Assignee: Red Hat, Inc.
    Inventors: Wesley H. Duffee-Braun, Jonathan F. Newton, Jesse H. Jaggars
  • Patent number: 10346140
    Abstract: A method for model-based design of safety-critical software is disclosed. The method includes receiving natural-language software requirements, developing a specification model by implementing either semantic modeling or graphical modeling, applying formal requirements analysis to the specification model, auto generating requirements based and robustness test cases from the specification model, developing a design model based on the specification model, applying test cases to the design model, auto-generating source code using the design model, verifying the source code using both test cases and static analysis technology, and compiling executable object code from the verified source code. If a result of the analysis of the software specification or design models is not satisfactory then adjusting the specification or design model to correct any inconsistency, and repeating applying the analysis and test cases.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: July 9, 2019
    Assignee: General Electric Company
    Inventors: Timothy Lee Johnson, Andrew Walter Crapo, Michael Richard Durling, Alexander Walsch, Kit Yan Siu, Luca Parolini, Panagiotis Manolios, Meng Li, Han Yu, Scott Alan Stacey, Gregory Reed Sykes