Patents Examined by C. Wang
-
Patent number: 10289539Abstract: Methods and systems for performance testing in a software deployment pipeline are disclosed. One or more performance tests are automatically performed on a build of a software product in a test environment in response to deploying the build to the test environment. One or more performance metrics are collected based on the performance tests. Based on the performance metrics, the build of the software product is accepted or rejected.Type: GrantFiled: September 18, 2013Date of Patent: May 14, 2019Assignee: Amazon Technologies, Inc.Inventors: Carlos Alejandro Arguelles, Arthur Carre, Ramakrishnan Hariharan Chandrasekharapuram, Ayham Tannous, Jason Scott Wodicka
-
Patent number: 10289398Abstract: In one embodiment, a method includes creating an active container and a standby container for a single supervisor of an operating system at a network device, instantiating instances for active Kernel Loadable Modules (KLMs) for servicing the active container, instantiating instances for standby KLMs for servicing the standby container, wherein one or more of the standby KLMs comprise upgraded versions of the active KLMs, and switching over from the active container to the standby container to perform an in-service upgrade of the KLMs for the operating system. An apparatus and logic are also disclosed herein.Type: GrantFiled: September 26, 2015Date of Patent: May 14, 2019Assignee: Cisco Technology, Inc.Inventors: Srinivas Veereshwara, Senthilkumar Pandian, Akshya Kumar Singh, Ravinandan Arakali
-
Patent number: 10289864Abstract: Embodiments include method, systems and computer program products for a security tool to prevent data leakage. In some embodiments, it may be determine that a first application has been initiated. A focus change from the second application to the first application may be detected. Input data provided by a user may be detected. It may be determined that the input data comprises sensitive data. An action may be executed in response to determining that the input data comprises sensitive data.Type: GrantFiled: December 31, 2015Date of Patent: May 14, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander J. Kelly, Alexander D. S. Mirski-Fitton, Edwin P. J. Moffatt, Ross B. Pavitt
-
Patent number: 10277396Abstract: Methods, systems, and apparatus for ensuring data integrity are disclosed. A data container structure is obtained, the data container structure containing data and a source identifier of a first hardware component. The data container structure is modified, using a header processing device, to include a component signature and an identifier of a second hardware component.Type: GrantFiled: June 16, 2016Date of Patent: April 30, 2019Assignee: General Electric CompanyInventors: Luis Ramos, Venkatesh Sivasubramanian, Sriramakrishna Yelisetti
-
Patent number: 10255086Abstract: A computer receives at least one requirement for a new VM. The computer identifies an existing VM to be modified during the generation of the new VM. The computer determines at least one step necessary to create the new VM configuration from the existing VM. The computer presents at least one pathway to the new VM from the existing VM. The computer receives a selection of a presented pathway to create the new VM.Type: GrantFiled: June 29, 2015Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventors: Eugene Bell, Eoin Byrne, Padraig MacSeain, Adrian O'Sullivan
-
Patent number: 10255431Abstract: Disclosed are system and method for detecting one or more unwanted applications in a computing device. One exemplary method comprises: obtaining information relating to a first application installed on the computing device; detecting a first file associated with the first application; identifying a second file being related to the first file based at least upon selected conditions; identifying a second application installed on the computing device using at least one of the first and second files; determining a frequency of use for each of the first and second applications; and determining whether the first application is an unwanted application based on the frequency of use for each of the first and second applications.Type: GrantFiled: July 19, 2016Date of Patent: April 9, 2019Assignee: AO Kaspersky LabInventors: Alexander V. Amrilloev, Alexander A. Stroykov, Alexey S. Subbotin, Pavel V. Korzh, Mikhail A. Modin
-
Patent number: 10235528Abstract: A mechanism is provided for automatically determining an importance of vulnerabilities identified in an application. An identified application is scanned for a set of vulnerabilities with uncertain importance. For each vulnerability with uncertain importance in the set of vulnerabilities with uncertain importance, a set of characteristics is identified, a level of importance for the vulnerability with uncertain importance is determined utilizing the set of characteristics, and the level of importance is assigned to the vulnerability with uncertain importance thereby forming an identified vulnerability.Type: GrantFiled: November 9, 2016Date of Patent: March 19, 2019Assignee: International Business Machines CorporationInventor: Wayne Diu
-
Patent number: 10228933Abstract: Architecture that facilitates the package partitioning of application resources based on conditions, and the package applicability based on the conditions. An index is created for a unified lookup of the available resources. At build time of an application, the resources are indexed and determined to be applicable based on the conditions. The condition under which the resource is applicable is then used to automatically partition the resource into an appropriate package. Each resource package then becomes applicable under the conditions in which the resources within it are applicable, and is deployed to the user if the user merits the conditions (e.g., an English user will receive an English package of English strings, but not a French package). Before the application is run, the references to the resources are merged and can be used to do appropriate lookup of what resources are available.Type: GrantFiled: February 20, 2015Date of Patent: March 12, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Erik Fortune, Rylan Hawkins, Peter G. Constable, Sunggook Chue, Dennis Chi
-
Patent number: 10230755Abstract: In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.Type: GrantFiled: March 23, 2015Date of Patent: March 12, 2019Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Aaron Emigh, James Roskind
-
Patent number: 10223516Abstract: Disclosed is a login method for controlling user access into a restricted access environment requiring a login device, which may be a wearable device, to effectuate a login process.Type: GrantFiled: June 9, 2016Date of Patent: March 5, 2019Assignee: LENOVO (SINGAPORE) PTE. LTD.Inventor: Masaharu Itoh
-
Patent number: 10204108Abstract: The method for manufacturing a file system update package includes: file information of each source file in a file system to be updated is acquired; an operation type of a target file corresponding to each source file is determined according to the file information of each source file, the operation type including one of a dynamic type, a static type and a recently-added type; when the operation type of the target file is the dynamic type or the recently-added type, the target file is compressed to form a compressed file package, and when the operation type of a certain target file is the static type, a differential operation is executed according to a difference between the target file and the corresponding source file to form a differential file package; and all the compressed file packages and all the differential file packages are packaged to form a file system update package.Type: GrantFiled: June 5, 2014Date of Patent: February 12, 2019Assignee: XI'AN ZHONGXING NEW SOFTWARE CO., LTD.Inventors: Xi Chen, Jianping Shuang, Chong Zhang
-
Patent number: 10205803Abstract: Described are techniques for determining causes of failed connections, such as a mismatch between a protocol associated with a request and the protocol associated with a port to which the request is provided. The port may be configured to process requests having a particular protocol, while monitoring and recognizing protocols used by other ports. If the request is determined to be associated with a different protocol supported by another port, a notification of the error may be provided to the client associated with the request. Based on characteristics of the request, the client, and the port, a control action may be taken, which may include rejecting the request or processing the request at the received port using a different protocol. Commonalities between failed requests may be analyzed to determine sources of error.Type: GrantFiled: August 27, 2015Date of Patent: February 12, 2019Assignee: AMAZON TECHNOLOGIES, INC.Inventor: Nima Sharifi Mehr
-
Patent number: 10193895Abstract: A method and apparatus for authenticating a user for access to a service provider over a network is disclosed. It includes a first device configured to receive a request for a ticket, generate the ticket, send the ticket to at least one additional device, generate a first partial signature of the ticket, receive additional partial signatures of the ticket, generate a complete signature of the ticket, encrypt the ticket and the complete signature of the ticket, send the encrypted ticket and encrypted complete signature of the ticket to the service provider, receive an encrypted verification code from the service provider, decrypt the encrypted verification code, and display the decrypted verification code.Type: GrantFiled: November 16, 2016Date of Patent: January 29, 2019Inventors: Abdulrahman Alhothaily, Arwa Alrawais
-
Patent number: 10162737Abstract: Examples disclosed herein provide tools for capturing spatial gestures performed by a user and scripting the gestures for testing an application under test. Scripts may be produced by capturing movement of extremities of a skeletal body corresponding to the user, wherein the movement is captured according to a change in coordinates of the extremities from an original position. The movement of the extremities may be matched to a predefined gesture found in a gesture database. A script may be generated from the matched predefined gesture with reference to the extremities captured and coordinates of the extremities from the original position, such that the user is emulated.Type: GrantFiled: February 20, 2014Date of Patent: December 25, 2018Assignee: ENTIT SOFTWARE LLCInventors: Roy Nuriel, Pablo Retyk, Doron Levi
-
Patent number: 10152578Abstract: In accordance with one embodiment of the present invention, secure content objects are transcoded from an input format to an output format based upon identified capabilities of a receiving device. In one embodiment, a plurality of trusted processing components are identified to collectively transcode the secure content object from the identified input format to the determined output format. In one embodiment, each of the trusted processing components are authenticated prior to operating on the secure content object.Type: GrantFiled: April 11, 2016Date of Patent: December 11, 2018Assignee: Intel CorporationInventors: Joshua D. Hug, Xiaodong Fu
-
Patent number: 10148422Abstract: Methods, systems, and computer programs for using an implicit certificate are described. In some aspects, an implicit certificate is accessed. The implicit certificate is associated with an entity and generated by a certificate authority. The implicit certificate includes a public key reconstruction value of the entity. Certificate authority public key information is accessed. The certificate authority public key information is associated with the certificate authority that issued the implicit certificate. A first value is generated based on evaluating a hash function. The hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity. A public key value of the entity can be generated or otherwise used based on the first value.Type: GrantFiled: May 4, 2012Date of Patent: December 4, 2018Assignee: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz, Daniel Richard L. Brown
-
Patent number: 10140457Abstract: Embodiments of apparatus and methods for secure I/O device management are disclosed. In an embodiment, an apparatus includes a processor and an I/O controller. The processor has secure execution environment support, wherein the processor is to establish a secure execution environment using the secure execution environment support.Type: GrantFiled: January 29, 2016Date of Patent: November 27, 2018Assignee: Intel CorporationInventor: Steven B. McGowan
-
Patent number: 10142325Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.Type: GrantFiled: August 29, 2016Date of Patent: November 27, 2018Assignee: Ivanti, Inc.Inventors: Mark Tempel, Andrew Moravec
-
Patent number: 10127122Abstract: A system and method can support transaction processing in a middleware environment. A processor, such as a remote method invocation stub in the middleware environment, can be associated with a transaction, wherein the transaction is from a first cluster. Then, the processor can handle a transactional request that is associated with the transaction, wherein the transactional request is to be sent to the first cluster. Furthermore, the processor can route the transactional request to a said cluster member in the first cluster, which is an existing participant of the transaction.Type: GrantFiled: November 8, 2016Date of Patent: November 13, 2018Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Alexander Somogyi, Sindhu Subramanyam, Stephen Felts
-
Patent number: 10120781Abstract: Various embodiments are generally directed to detecting race conditions arising from uncoordinated data accesses by different portions of an application routine by detecting occurrences of a selected cache event associated with such accesses. An apparatus includes a processor component; a trigger component for execution by the processor component to configure a monitoring unit of the processor component to detect a cache event associated with a race condition between accesses to a piece of data and to capture an indication of a state of the processor component to generate monitoring data in response to an occurrence of the cache event; and a counter component for execution by the processor component to configure a counter of the monitoring unit to enable capture of the indication of the state of the processor component at a frequency less than every occurrence of the cache event. Other embodiments are described and claimed.Type: GrantFiled: December 12, 2013Date of Patent: November 6, 2018Assignee: INTEL CORPORATIONInventors: Shiliang Hu, Gilles A. Pokam, Cristiano L. Pereira, Justin E. Gottschlich