Patents Examined by Djenane M. Bayard
-
Patent number: 12388895Abstract: In various example embodiments, a system and method for automated data reconciliation processing is presented. The system receives a data movement request with a first status indicator and appends a unique request code to the data movement request. The system causes presentation of the data movement request at a client device and receives a movement response from a second server via a network. The system modifies the first status indicator of the data movement request to a second status indicator to provisionally reflect the receipt of the movement response and verifies the indication of movement from a receiving entity.Type: GrantFiled: February 2, 2024Date of Patent: August 12, 2025Assignee: Xero LimitedInventors: Dinesh Katyal, Matthew John Vickers
-
Patent number: 12381838Abstract: A computer-implemented method includes sending email scan requests to an email scanner. The method further includes receiving, from the email scanner, a verdict of suspicion and one or more data fragments. The method further includes storing the one or more data fragments for each email of the plurality of emails in a datastore. The method further includes receiving a new email. The method further includes deriving one or more new keys for the new email. The method further includes retrieving one or more matching data fragments from the datastore by matching the one or more new keys with the one or more keys stored in the datastore. The method further includes providing, to the email scanner, the new email and the one or more matching data fragments. The method further includes receiving a new verdict of suspicion and one or more new data fragments.Type: GrantFiled: April 27, 2023Date of Patent: August 5, 2025Assignee: SOPHOS LIMITEDInventor: John Mears
-
Patent number: 12375373Abstract: Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.Type: GrantFiled: June 13, 2023Date of Patent: July 29, 2025Assignee: Gigamon Inc.Inventor: Anil Rao
-
Patent number: 12368705Abstract: In some implementations, a computer-implemented method comprises: receiving, by a proxy server, from a residential endpoint proxy, an endpoint request to confirm user credentials for authenticating a communications connection between a source host and the residential endpoint proxy; determining based on the endpoint request, whether the user credentials for authenticating a communications connection between a source host and the residential endpoint proxy are valid; in response thereto, determining communications connection properties for the communications connection between the source host and the residential endpoint proxy; transmitting the communications connection properties for the communications connection between the source host and the residential endpoint proxy to the residential endpoint proxy to cause the residential endpoint proxy to apply the communications connection properties to the communications connection between the source host and the residential endpoint proxy, and transmit, to the destType: GrantFiled: April 13, 2022Date of Patent: July 22, 2025Assignee: Webshare Software CompanyInventor: Asim Utku Zihnioglu
-
Patent number: 12368773Abstract: Systems and methods cross device application discovery and/or control. Cross device application discovery and/or control can provide for simple detection and activation of applications on remote devices. Cross device application discovery and/or control can provide for the control of remote applications in a master and slave configuration. Responsive to an activation message, an application can execute a task in an application, the task being displayed on a target device. Responsive to an activation message, an application can execute a task in an application on a target device, a task context data for the task being streamed to the source device for presentation on a display. Cross device application discovery and/or control can be enabled on a single operating system, or across a plurality of operating systems.Type: GrantFiled: October 2, 2023Date of Patent: July 22, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Arunjeet Singh, John M Sheehan, Kunal Gandhi, Sean McKenna, Akhilesh (Akhil) Kaza, Sameer Tejani
-
Patent number: 12348420Abstract: Methods and systems for parallel processing of batch communications during data validation using a plurality of independent processing streams. For example, the system may receive a plurality of communications for batch processing during a predetermined time period. The system may process, with a batch configuration file, a first alphanumeric data string of a first communication of the plurality of communications. The system may process, with the batch configuration file, a second alphanumeric data string of a second communication of the plurality of communications. The system may direct the first communication to a first micro-batch for processing within the predetermined time period based on the first metadata tag, wherein the first micro-batch is processed using a first validation and enrichment protocol and a first micro-batch configuration file, wherein the first validation and enrichment protocol and the first micro-batch configuration file are specific to the first source.Type: GrantFiled: December 19, 2023Date of Patent: July 1, 2025Assignee: Capital One Services, LLCInventor: Gokul Prabagaren
-
Patent number: 12348464Abstract: An assistance integrator provides a front-end interface to an enterprise's backend services available to customers. The assistance integrator translates between automated chat conversations with the customers that engage the enterprise over messaging platforms for initiating actions with the backend services during those conversations.Type: GrantFiled: August 27, 2021Date of Patent: July 1, 2025Assignee: NCR Voyix CorporationInventors: Yehoshua Zvi Licht, Joseph Arnold White
-
Patent number: 12348418Abstract: Disclosed are approaches for providing per-application tunnel access, such as virtual private network (VPN) access, in LINUX based systems. In response to an application requesting a network connection, a process identifier of the application and an inode identifier representing a socket for the network connection are obtained. Then, a kernel space map is updated to include the process identifier of the application and the inode identifier. In response to the application making a network connection request, the inode identifier of the application is obtained based at least in part on a source network address, a source port number, a destination network address, and a destination port number. Then, the kernel space map is queried to obtain the process identifier of the application, wherein the inode identifier is a query parameter. Then, a routing policy is identified based at least in part on the process identifier.Type: GrantFiled: July 25, 2023Date of Patent: July 1, 2025Assignee: VMware LLCInventors: Arjun Kochhar, Utkarsh Singh, Huan Wang, Amit Kumar Yadav
-
Patent number: 12341812Abstract: Aspects of the invention include techniques for correlating distinct phishing campaigns by identifying shared modus operandi. A non-limiting example method includes building, from a source code, an abstract syntax tree and building, from the abstract syntax tree, a decloaked abstract syntax tree. The method includes removing payload data from the decloaked abstract syntax tree to define an obfuscation pattern. The obfuscation pattern is compared to a plurality of predetermined obfuscation patterns. The method includes correlating, based on the comparison, the source code to one or more phishing kits.Type: GrantFiled: December 1, 2022Date of Patent: June 24, 2025Assignee: International Business Machines CorporationInventors: Iosif Viorel Onut, Julien Cassagne, Ettore Merlo, Guy Jourdan, Cheng-Ta Lee
-
Patent number: 12339976Abstract: Providing content-based encryption to content data in a data processing system by creating datasets by grouping metadata for data objects that are intended to be encrypted with a common encryption key, where each dataset spans multiple storage devices of different storage types, and defines a single data encryption unit for the data objects referenced by a respective dataset. Each dataset is tagged with an encryption tag to enable or disable use of a self-selected encryption key. Encryption keys stored in or made available to the system are accessed for encrypting the data objects using an encryption process. A key management component maps each dataset to a corresponding encryption key of the encryption keys, and an encryption component encrypts, for each dataset, referenced data objects using a corresponding mapped encryption key.Type: GrantFiled: October 27, 2022Date of Patent: June 24, 2025Assignee: Dell Products L.P.Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
-
Patent number: 12341701Abstract: Apparatus, method and non-transitory computer readable medium for bandwidth estimation for a network using traffic shaping detection are provided, including selecting periodically sampled packets from the network, bandwidth samples each having a delay jitter greater than a jitter threshold, the delay jitter of a packet determined as the difference between a delay for the packet in the network and a minimum delay for all packets sampled within a delay statistics window for the packet; updating a probability distribution of sampled bandwidth based on the selected bandwidth samples; determining whether traffic shaping is occurring in the network based on a density of the updated probability distribution of sampled bandwidth; and based on a determination that traffic shaping is occurring in the network, adjusting an upper limit of estimated bandwidth for the network based on an estimated traffic shaping rate, the estimated traffic shaping rate determined based on the updated probability distribution.Type: GrantFiled: January 19, 2024Date of Patent: June 24, 2025Assignee: Agora Lab, Inc.Inventors: Huaming Zhang, Zesen Zhuang
-
Patent number: 12335153Abstract: Systems and methods are disclosed that determine, by a client, a workload intent of a workload that is forthcoming from an application executing on the client. The workload intent corresponds to one or more characteristics of the workload over a connection between the client and a server. The systems and methods send, by the client to the server, a workload intent identifier corresponding to the workload intent. The server is configured to optimize server resources based on the workload intent identifier. The systems and methods send, by the client, one or more workload operations to the server over the connection that are consistent with the workload intent.Type: GrantFiled: March 7, 2023Date of Patent: June 17, 2025Assignee: DELL PRODUCTS L.P.Inventors: Abhidnya Joshi, Omkar Ekbote, Narendrapal Singh
-
Patent number: 12323301Abstract: A computing apparatus, including: a hardware platform; and an interworking broker function (IBF) hosted on the hardware platform, the IBF including a translation driver (TD) associated with a legacy network appliance lacking native interoperability with an orchestrator, the IBF configured to: receive from the orchestrator a network function provisioning or configuration command for the legacy network appliance; operate the TD to translate the command to a format consumable by the legacy network appliance; and forward the command to the legacy network appliance.Type: GrantFiled: September 19, 2023Date of Patent: June 3, 2025Assignee: Intel CorporationInventors: John J. Browne, Timothy Verrall, Maryam Tahhan, Michael J. McGrath, Sean Harte, Kevin Devey, Jonathan Kenny, Christopher MacNamara
-
Patent number: 12321267Abstract: An apparatus comprises a hardware processor to define a linear address (LA) region outside an established address range for a secure enclave, generate, for the linear address (LA) region, a unique encryption key accessible only to the enclave, assign a key identifier to the unique encryption key, store the linear address (LA) region and the unique encryption key in an enclave control structure, and program the key identifier and the unique encryption key into a memory encryption circuitry.Type: GrantFiled: August 15, 2022Date of Patent: June 3, 2025Assignee: Intel CorporationInventor: Krystof Zmudzinski
-
Patent number: 12316693Abstract: A request to play a media content item is received. It is determined whether the play request is ambiguous. Responsive to determining that the play request is ambiguous, then it is determined whether to play a suspended media content item or an alternate media content item. The determination can be made based on a length of time that the suspended media content item has been suspended, a media content item type, or a state, among other factors. Responsive to the determination, playback of the suspended or alternate media content item is initiated.Type: GrantFiled: October 25, 2023Date of Patent: May 27, 2025Assignee: Spotify ABInventors: Kurt Jacobson, Marcus Daniel Better, Philip Edmonds
-
Patent number: 12278746Abstract: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.Type: GrantFiled: September 19, 2023Date of Patent: April 15, 2025Assignee: Cisco Technology, Inc.Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Patent number: 12261779Abstract: In some examples, an apparatus for protocol independent deterministic transport of data in a time-sensitive network comprises a processor, a memory coupled to the processor, the memory configured to store program code executable by the processor, the program code comprising one or more instructions, whereby to cause the apparatus to receive synchronisation data from the network, the synchronisation data comprising a measure for a clock frequency supporting transport of deterministic data traffic over the network, receive multiple input packets, the input packets comprising deterministic data traffic and non-deterministic data traffic, and generate, from the multiple input packets and using the synchronisation data, a set of isochronous output packets comprising respective payloads and headers.Type: GrantFiled: December 1, 2023Date of Patent: March 25, 2025Assignee: Nokia Solutions and Networks OyInventors: Bogdan Uscumlic, Andrea Enrici
-
Patent number: 12255910Abstract: The disclosed technology relates to a process for optimizing data flow within a computer network. The technology utilizes shared memory and machine learning logic to improve the efficiency of how computing resources are used during a transmission of data packets in the computer network. The shared memory is implemented during the transmission of data packets between the data plane and the service plane so that the copying of data packets after the data packets have been received and processed by an application is not necessary. The machine learning logic is implemented during the processing of the data packets in order to adjust a frequency or extent that the data packets (and corresponding source of the data packets) need to be evaluated to ensure that malicious content is not being transmitted across the computer network.Type: GrantFiled: September 6, 2023Date of Patent: March 18, 2025Assignee: Cisco Technology, Inc.Inventors: Ramanathan Subramanian, Jeslin Antony Puthenparambil
-
Patent number: 12255831Abstract: Techniques for migrating on-premises and/or cloud-based workloads to follow a network session as it potentially migrates, due to multipathing techniques, across multiple edge and/or cloud datacenters. The techniques may include determining, by a controller of a network, that a traffic flow between an endpoint device and a workload has migrated to a different path of a multipath flow such that the traffic flow terminates at a different termination point than the workload. Based at least in part on determining that the traffic flow has migrated, the controller may cause a migration of a state of the workload to a location associated with the different termination point. That is, the controller may cause the workload to be migrated in its current state, which may be specific to the endpoint device, to follow the traffic flow.Type: GrantFiled: July 18, 2022Date of Patent: March 18, 2025Assignee: Cisco Technology, Inc.Inventors: Vincent E. Parla, Kyle Andrew Donald Mestery
-
Patent number: 12248591Abstract: Upon receiving a usage request that includes a file identifier and a version identifier from a user terminal 20, a control server 10 transmits a file request that is based on the usage request to a file management system, and transmits a permission information request that is based on the usage request to a distributed ledger system. Upon receiving the file request, the file management system acquires the file that corresponds to the combination of the file identifier and the version identifier and transmits the file to the control server 10. Upon receiving the permission information request, the distributed ledger system acquires permission information that corresponds to the combination of the file identifier and the version identifier from a distributed ledger, and transmits the permission information to the control server 10. The control server 10 transmits the file to the user terminal 20 if the user of the user terminal has viewing permission based on the permission information.Type: GrantFiled: December 20, 2019Date of Patent: March 11, 2025Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tatsuro Ishida, Shigenori Ohashi, Shigeru Fujimura, Atsushi Nakadaira, Masayoshi Chikada