Patents Examined by Jason D Mitchell
-
Patent number: 12216794Abstract: A privacy-related consent extension and data processing system may be configured to automatically extend one or more privacy-related consents for a user of a first computing device to a second computing device. In various embodiments, the system is configured to provide a computer-readable indicium (indicia) on a previously unknown computing device upon initiation of a transaction between a user and an entity collecting and processing privacy data. In response to a user using a known computing device to scan the computer-readable indicium, in various embodiments, the system may provide the ability to share user consent data provided by the first known device to the second unknown device, allowing the user to provide consent without manually re-entering privacy and consent preferences.Type: GrantFiled: May 31, 2023Date of Patent: February 4, 2025Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Patrick Whitney, Alex Cash, Spencer Wyckoff, Stephanie Hanson, Pratik Doshi
-
Patent number: 12197898Abstract: In various examples disclosed herein, provided is a method and system for cross-validating files to facilitate code generation. The system can perform the cross-validation in phases of disparate files to enable the interoperability of the files. The files can include representations of tasks that are organized differently and differ in format and semantics. The method and system described herein can perform syntax and semantic validation on the files to check for errors, and then identify terms and names identified in the tasks associated with the files along with signatures (e.g., schemas for data models or function signatures for function invocations) associated with the names. After error checking is complete, and after the names and signatures are identified, the names and signatures in the respective files can be cross-validated to find matching tasks, and code is generated that utilizes the cross-validated and matching tasks.Type: GrantFiled: April 8, 2022Date of Patent: January 14, 2025Assignee: Red Hat, Inc.Inventors: Edoardo Vacchi, Paolo Antinori
-
Patent number: 12190104Abstract: A software application includes work order resources, each of which defines an atomic operation for the software application, and a construction service resource, which processes the work order resources in response to all interaction requests for the software application. Each interaction request is received from a client and identifies a corresponding work order, which the construction service processes to dynamically construct a set of deliverables, which can include a custom representation of the work order. While processing the interaction request, the construction service, as directed by the work order, can make one or more requests to context resources for context information corresponding to an activity for which the interaction was requested to construct the set of deliverables.Type: GrantFiled: November 2, 2020Date of Patent: January 7, 2025Assignee: Enterprise Web LLCInventors: Dave M. Duggal, William J. Malyk
-
Patent number: 12164461Abstract: An apparatus and method is provided for simulating a physical computer system using virtualization. The disclosed system virtualizes devices of a physical computer system by modeling hardware and software components that are physically present within the physical computer system. The system simulates changing at least one of a piece of hardware or software in the virtualized computer system and assesses an effect of the change in the virtualized computer system to determine a potential effect of the change if the change were implemented on the physical computer system.Type: GrantFiled: January 31, 2020Date of Patent: December 10, 2024Assignee: Altum Trading Company, LLCInventors: Ed Schauberger, Frank Nickel, Johnathon T. Bailey, Curtis Scott
-
Patent number: 12159129Abstract: A method for downloading an application includes, after learning that an application is downloaded by a second user equipment, sending, by a first user equipment that has an association relationship with the second user equipment, a downloading request for the application downloaded by the second user equipment to an application server, where the downloading request carries capability information of the first user equipment, and receiving, by the first user equipment, an application to be downloaded, where the application matches the capability information of the first user equipment and is sent by the application server.Type: GrantFiled: January 15, 2021Date of Patent: December 3, 2024Assignee: HUAWEI DEVICE CO., LTD.Inventors: Zhiqin He, Liu Fang, Hongjie Yao, Zheng Xu, Kewen Wu
-
Patent number: 12154804Abstract: A method includes identifying a set of wafers, wherein each wafer is associated with a respective start time of a set of start times, determining whether the set of wafers includes an idle wafer, in response to determining that the set of wafers includes an idle wafer that is idle for a duration that exceeds a predefined threshold value, generating a modified set of start times by modifying at least the start time for the idle wafer, and initiating a computer simulation forecasting processing of the set of wafers using a wafer modification chamber and a wafer movement chamber based on the modified set of start times. The computer simulation uses a machine learning model trained based on a first duration to perform a first manufacturing task using the wafer modification chamber and a second duration to perform a second manufacturing task using the wafer movement chamber.Type: GrantFiled: October 25, 2023Date of Patent: November 26, 2024Assignee: Applied Materials, Inc.Inventor: Adrian Rhee
-
Patent number: 12141707Abstract: Disclosed is a method for generating a prediction model. The model can be used in processing machine event data to predict behavior of a plurality of industrial machines under supervision. The prediction model can be configured to determine current and future states of the industrial machines. The method can include extracting event features from event codes and structuring the event features into feature vectors. A first dimension of a first feature vector corresponds to a first event feature, and a second dimension of the first feature vector corresponds to a second event feature. The method can also include generating the prediction model by clustering the feature vectors into a plurality of vector clusters, the vector clusters assigned to respective machine states. The prediction model can be constructed based on event data from a first industrial machine and be applied to control an operating state of a second industrial machine.Type: GrantFiled: October 31, 2023Date of Patent: November 12, 2024Assignee: ABB Schweiz AGInventors: Andrew Cohen, Marcel Dix
-
Patent number: 12135814Abstract: A method includes encoding a data segment into a set of encoded data slices using erasure coding; storing, in storage units of a storage network, the set of encoded data slices, in accordance with a shared key-based encryption system (SKBES) having keys shared with the storage units; retrieving, at a periodic rate and in accordance with the SKBES, the set of encoded data slices from the storage units of the storage unit to verify whether individual slices of the set of encoded data slices have been corrupted. When one of the set of encoded data slices stored in one of the storage units has been corrupted, rebuilding the one of the set of encoded data slices by: retrieving the decode threshold number of other slices of the set of encoded data slices, in accordance with the SKBES; reconstructing the one of the set of encoded data slices based on the erasure encoding, to generate a reconstructed data slice; and storing, in accordance with the SKBES, the reconstructed data slice in the one of the storage units.Type: GrantFiled: June 14, 2023Date of Patent: November 5, 2024Assignee: Pure Storage, Inc.Inventor: Jason K. Resch
-
Patent number: 12118337Abstract: Deterministic memory allocation for real-time applications. In an embodiment, bitcode is scanned to detect calls by a memory allocation function to a dummy function. Each call uses parameters comprising an identifier of a memory pool and a size of a data type to be stored in the memory pool. For each detected call, an allocation record, comprising the parameters, is generated. Then, a header file is generated based on the allocation records. The header file may comprise a definition of bucket(s) and a definition of memory pools. Each definition of a memory pool may identify at least one bucket.Type: GrantFiled: July 7, 2023Date of Patent: October 15, 2024Assignee: APEX.AI, INC.Inventor: Misha Shalem
-
Patent number: 12112150Abstract: A code repository stores application code. A code management determines, based at least in part on requested features selected in a graphical user interface, code requirements that include attributes of application code needed to achieve the requested features. The code management system determines, based at least in part on the determined code requirements and the metadata for each entry of application code stored in the code repository, one or more candidate application code entries from the code repository. The code management system presents the candidate application code entries for user selection in the graphical user interface. After receipt of a user selection of a selected application code, the selected application code is provided to a computing device associated with the user.Type: GrantFiled: October 16, 2023Date of Patent: October 8, 2024Assignee: Bank of America CorporationInventors: Madhusudhanan Krishnamoorthy, Shadab Bubere, Vaasudevan Sundaram, Samrat Bhasin
-
Patent number: 12079622Abstract: A method includes inputting at least one compressed image in a computing system. The method also includes an inplace patching process. Another image is decompressed over the compressed image by a processor. Local variables are stored periodically, receiving restored power after an interruption to the inplace patching, wherein an execution of the inplace patching is resumed at a later time interval by the processor by restoring the local variables. The method also includes completing the inplace patching process of decompressing the image over the inputted compressed image after restoring the local variables.Type: GrantFiled: January 5, 2022Date of Patent: September 3, 2024Assignee: HONEYWELL INTERNATIONAL INC.Inventor: Maximilian Waldo Schneider
-
Patent number: 12061896Abstract: The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system.Type: GrantFiled: May 30, 2023Date of Patent: August 13, 2024Assignee: SUSE LLCInventor: Peter Bowen
-
Patent number: 12045550Abstract: Disclosed herein are techniques for analyzing software delta changes based on functional line-of-code behavior and relation models. Techniques include identifying a prompt to change a first version of code on a controller to a second version of code; constructing, based on the identified prompt, a line-of-code behavior and relation model representing execution of functions of the controller based on the second version of code; performing a signature operation on the generated line-of-code behavior and relation model to produce a signature value; and sending the signature value to the controller; wherein the controller is configured to compare the signature value to a computed signature value that the controller is configured to compute based on the second version of code and determine, based on the comparison, whether to validate the second version of code.Type: GrantFiled: April 7, 2023Date of Patent: July 23, 2024Assignee: Aurora Labs Ltd.Inventors: Zohar Fox, Carmit Sahar
-
Patent number: 12039305Abstract: A method for a compilation, an electronic device and a readable storage medium are provided. The method for a compilation includes analyzing source program data to determine a target irregular branch, generating an update data flow graph according to the target irregular branch, and mapping the update data flow graph to a target hardware to complete the compilation.Type: GrantFiled: March 7, 2022Date of Patent: July 16, 2024Assignees: Beijing Superstring Academy of Memory Technology, Tsinghua UniversityInventors: Baofen Yuan, Shouyi Yin, Shaojun Wei
-
Patent number: 12032357Abstract: A system and a method for executing a work process on an object are provided, the system includes at least one work station, an acquisition device and an auditor device. The system and method can be used to log process steps of a work process.Type: GrantFiled: December 17, 2019Date of Patent: July 9, 2024Assignee: Francotyp-Postalia GmbHInventors: Clemens Heinrich, Dirk Rosenau, Stephan Gunther, Uwe Hubler
-
Patent number: 12032941Abstract: A method includes analyzing operational code to determine identifiers used within the operational code. The method further includes grouping like identifiers based a relational aspect of the identifiers. The method further includes, for one or more identifier groups, determining potential feature(s) of the identifier group(s). The method further includes testing the potential feature(s) based on a corresponding feature test suite to produce feedback regarding meaningfulness of the potential feature(s). The method further comprises, when the meaningfulness is above a threshold, adding the potential feature(s) to a feature set. The method further includes, when the meaningfulness is at or below the threshold, adjusting analysis parameter(s), grouping parameter(s), feature parameter(s), and/or testing parameter(s).Type: GrantFiled: June 6, 2021Date of Patent: July 9, 2024Assignee: Updraft, LLCInventor: Thomas J. Weigert
-
Patent number: 12019421Abstract: Robot access control and governance for robotic process automation (RPA) is disclosed. A code analyzer of an RPA designer application, such as a workflow analyzer, may read access control and governance policy rules for an RPA designer application and analyze activities of an RPA workflow of the RPA designer application against the access control and governance policy rules. When one or more analyzed activities of the RPA workflow violate the access control and governance policy rules, the code analyzer prevents generation of an RPA robot or publication of the RPA workflow until the RPA workflow satisfies the access control and governance policy rules. When the analyzed activities of the RPA workflow comply with all required access control and governance policy rules, the RPA designer application may generate an RPA robot implementing the RPA workflow or publish the RPA workflow.Type: GrantFiled: July 28, 2020Date of Patent: June 25, 2024Assignee: UiPath, Inc.Inventor: Andrew Hall
-
Patent number: 12013774Abstract: Systems and methods for implementing a verification of core file debugging resources are disclosed. A plurality of mappings are created from a core file comprising a plurality of filenames and a plurality of target build identifiers (IDs). The core file corresponds to a computer program crash event and each one of the plurality of mappings map one of the plurality of filenames to a corresponding one of the plurality of target build IDs. Responsive to creating the plurality of mappings, a first file is located that corresponds to a first filename included in a first mapping from the plurality of mappings. The first comprises a first target build ID. A processing device utilizes the first file to analyze the computer program crash event in response to determining that the first file build ID matches the first target build ID.Type: GrantFiled: July 29, 2022Date of Patent: June 18, 2024Assignee: Red Hat, Inc.Inventor: Aaron Merey
-
Patent number: 11972256Abstract: A system for determining code ancestry. The system includes: a memory; and a processor communicatively coupled to the memory. The processor is configured to perform a method comprising: receiving a source code file; parsing a plurality of functions out of the source code file; generating fuzzy fingerprints from the plurality of functions; and storing the fuzzy fingerprints in a graph database.Type: GrantFiled: February 16, 2022Date of Patent: April 30, 2024Assignee: International Business Machines CorporationInventors: Yash Kedia, Siddharth Mehta, Matthias Seul, Michael Wang
-
Patent number: 11960251Abstract: A method for testing a basic parameterization of a component in an automation system is provided. The method includes: starting a test run of the component in the automation system with the basic parameterization, measuring of a measured value data record during trial operation, access to a machine learning module comprising a pre-trained neural network, wherein the pre-trained neural network is pre-trained to calculate a target parameterization for the respective component for a measured value data set, wherein the basic parameterization is compared with the calculated target parameterization and in the event of deviation a result message for adapting the basic parameterization is provided, and receipt of the provided result message for adaptation of the basic parameterization.Type: GrantFiled: December 5, 2020Date of Patent: April 16, 2024Assignee: Festo SE & CO. KGInventors: Martin Thierauf, Thomas Ruschival, Dominic Kraus