Computer Network Managing Patents (Class 709/223)
  • Patent number: 10693955
    Abstract: Improved techniques for disaster recovery of storage service accessible through storage area networks are disclosed. Embodiments include establishing peer relationships between nodes of primary and secondary computing clusters. Configuration information is replicated in near synchronous manner from a primary cluster and used to configure a secondary cluster in a similar manner. Host data is replicated in synchronous manner for all the storage devices and LUNs within them. The secondary cluster is kept updated continuously with configuration information and user data in LUNs on storage devices such that a host may be served data from the secondary cluster when the primary cluster experiences a disaster or failure. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: June 23, 2020
    Assignee: NETAPP, INC.
    Inventors: Raj Lalsangi, Pramod John Mathew, Perumal Govindan Deivapalan, Santosh Rao
  • Patent number: 10694270
    Abstract: In an embodiment, a system for accelerated monitoring of optical transceivers includes a monitoring unit included in a port interface module of a network switch. The monitoring unit is configured to receive a monitoring configuration, obtain status information from a plurality of optical transceivers connected to the port interface module at an instance based on the monitoring configuration, and store the obtained status information and at least one associated timestamp in a memory. The memory is included in the port interface module and configured to provide the stored status information to a requestor external to the port interface module.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 23, 2020
    Assignee: Facebook, Inc.
    Inventors: Xu Wang, Rongchun Zhou, Olaf Moeller
  • Patent number: 10694219
    Abstract: An improved recording device and method of recording involve a communications interface that establishes communications with a common clock reference across a network, a data storage, and a processor that controls the storing in the data storage of a metadata file with at least one of a recorded media data file or a recorded sensor data file. The metadata file includes a time sample received from the common clock reference.
    Type: Grant
    Filed: August 28, 2017
    Date of Patent: June 23, 2020
    Assignee: GITCIRRUS, LLC
    Inventors: Larry W. Fullerton, Mark D. Roberts, Dennis M. Weldy, Eric Fullerton
  • Patent number: 10693921
    Abstract: According to one aspect of the present disclosure, there is provided a method, by a virtual network function, that includes: receiving a first request from a user equipment (UE), the first request including first parameters and a first token, the first token being a vector value corresponding to a session state for the UE; determining the session state for the UE according to the first token; programming network resources according to the session state, the programming updating states of the network resources, wherein the session state for the UE is updated when the states of the network resources are updated; producing a second token corresponding to the updated session state for the UE; storing the updated session state and the second token; and transmitting the second token to the UE.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: June 23, 2020
    Assignee: Futurewei Technologies, Inc.
    Inventors: Kaippallimalil Mathew John, Ulas Can Kozat, Mazin Ali Al-Shalash, Khosrow Tony Saboorian, Tushar Chouhan
  • Patent number: 10693899
    Abstract: A system and method for traffic enforcement in containerized environments. The method includes analyzing contents of a container image to determine a type of application to be executed by a first container, wherein the first container is a runtime instance of the container image; determining, based on the type of application to be executed by the first container, a filtering profile for the first container, wherein the filtering profile defines a configuration for inspecting and filtering traffic directed to the first container; and filtering, based on the filtering profile, malicious traffic directed to the first container.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: June 23, 2020
    Assignee: TWISTLOCK, LTD.
    Inventors: Liron Levin, Dima Stopel, John Morello, Eran Yanay
  • Patent number: 10693833
    Abstract: Example methods are provided for a first host to perform address resolution suppression in a logical network. The first host may support a first virtualized computing instance located on the logical network and a first hypervisor. The method may comprise the first hypervisor broadcasting a notification message within the logical network to trigger one or more control messages, and learning protocol-to-hardware address mapping information associated with multiple second virtualized computing instances located on the logical network based on the one or more control messages. The method may also comprise: in response to the first hypervisor detecting an address resolution request message that includes a protocol address associated with one of the multiple second virtualized computing instances, the first hypervisor generating and sending an address resolution response message to a first virtualized computing instance without broadcasting the address resolution request message on the logical network.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: June 23, 2020
    Assignee: NICIRA, INC.
    Inventors: Subin Cyriac Mathew, Ankur Kumar Sharma, Alexander Tessmer, Vivek Agarwal, Ganesan Chandrashekhar
  • Patent number: 10693911
    Abstract: At least one set of enforceable policy provisions is identified within at least one defined service level policy to be enforced during runtime by a policy enforcement point (PEP). Each set of enforceable policy provisions includes a policy subject, a reference to a policy domain, and at least one assertion. Each identified set of enforceable policy provisions is transformed by the PEP into at least one runtime-executable processing rule that each includes at least one PEP processing action that each represents an atomic unit of policy enforcement level behavior executable by the PEP to enforce the respective at least one assertion against runtime objects associated with the policy subject within an area of runtime policy enforcement specified by the policy domain.
    Type: Grant
    Filed: January 6, 2016
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Thomas C. Burke, Mario E. De Armas, Oswaldo Gago, Gaurang Shah, Maria E. Smith
  • Patent number: 10691609
    Abstract: A method for concurrently erasing data on a processor and preparing the processor for removal from a computing system is disclosed. In one embodiment, such a method includes determining tasks queued to be executed on a processor and reassigning the tasks to a different processor, such as to a different processor in the same cluster as the processor. The method further prevents new tasks from being assigned to the processor. The method waits for currently executing tasks on the processor to complete. Once the currently executing tasks are complete, the method initiates a cache-hostile job on the processor to evict entries in cache of the processor. Once the cache-hostile job is complete, the method enables the processor to be removed from a computing system such as a storage system controller. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Matthew G. Borlick, Lokesh M. Gupta, Clint A. Hardy, Karl A. Nielsen
  • Patent number: 10693756
    Abstract: Monitoring packets can be sent periodically across IP network tunnels that traverse internet connections to a customer location, and the monitoring packets used to determine current packet-loss, latency, and jitter metrics in each direction for each available circuit. If monitored metrics change beyond set thresholds, a determination is made as to whether the changes are due to circuit saturation or some other cause. If saturation is the problem, logic at either or both tunnel endpoints dynamically adjusts QOS rate limits to optimum values (the highest rate that does not cause threshold violations) in near-real time.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: June 23, 2020
    Assignee: BIGLEAF NETWORKS, INC.
    Inventors: Joel Mulkey, Luke Heberling
  • Patent number: 10691700
    Abstract: A replicated storage system allocates tables to storage clusters to balance the usage of resources in the replicated storage system. The replicated storage system determines the query load of the stored tables and generates candidate table allocations based on the query loads. The candidate table allocations are generated based on table allocation criteria based on the popularity of the tables or whether the tables are related to other tables. The replicated storage system determines resource parameters for each candidate table allocation and generates a resource usage score for each candidate table allocation based on a utility function that is weighted based on priorities of the resources used by the replicated storage system. The replicated storage system selects a table allocation from the candidate table allocations based on the resource usage scores of the candidate table allocations and allocates table replicas to the storage clusters.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: June 23, 2020
    Assignee: Uber Technologies, Inc.
    Inventors: Ritesh Agrawal, Kevin Novak, Jai Ranganathan, Tristan Willy, David Nguyen
  • Patent number: 10693855
    Abstract: There are disclosed herein techniques for use in fraud detection. In one embodiment, there is disclosed a technique comprising receiving a request to authenticate an electronic transaction described by a particular value of an authentication factor. The technique also comprises analysing transaction data relating to prior electronic transactions to determine information in connection with the particular value of the authentication factor. The analysing comprising a first part and a second part that separately analyse transaction data relating to at least one prior electronic transaction such that one of the first and second parts distinguishes itself from the other of the first and second parts by the extent to which that one part discriminates against the at least one prior electronic transaction based on its age.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: June 23, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Eyal Kolman, Carmit Sahar
  • Patent number: 10693708
    Abstract: A computer-controlled method for a mobile application invoking a web service can include an application development framework (APPDF) mobile framework component creating an envelope for a request and passing the envelope to a transport component. The transport component can create a proxy for the envelope and a proxy for a connection based on an enforcement context. The transport component can stream the proxy envelope through the proxy connection to the web service.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: June 23, 2020
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventor: Jeffrey J. Bryan
  • Patent number: 10691491
    Abstract: Systems for distributed resource system management. A first computing system operates in a first computing environment. A predictive model is trained in the first computing environment to form a trained resource performance predictive model that comprises a set of trained model parameters to capture at least computing and storage IO parameters that are responsive to execution of one or more workloads that consume computing and storage resources in the first computing environment. When the trained resource performance predictive model is deployed to a second computing environment, various computing system configuration differences, and/or workload differences and/or other differences between the first computing environment and the second computing environment are detected and measured.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: June 23, 2020
    Assignee: Nutanix, Inc.
    Inventors: Abhinay Nagpal, Aditya Ramesh, Himanshu Shukla, Rahul Singh
  • Patent number: 10691478
    Abstract: An information processing system includes first data center and second data center. The first data center includes first virtual machine server including first processor that executes virtual machine using an image file, first data server including second processor and first storage that stores a plurality of chunks, and first metadata server including third processor and second storage that stores metadata of the image file. The second data center includes a second virtual machine server including fourth processor, second data server including third storage and fifth processor, and second metadata server including sixth processor and fourth storage. The second processor transmits, to the second data center, a predetermined chunk of the plurality of chunks. The first processor stops the virtual machine after the predetermined chunk is transmitted. The third processor transmits the metadata to the second metadata server. The fourth processor activates the virtual machine.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: June 23, 2020
    Assignee: FUJITSU LIMITED
    Inventor: Kazuho Fujii
  • Patent number: 10691692
    Abstract: A computer-implemented method of executing a query in a network of data centres, the method comprising a preparation stage and an execution stage; wherein the preparation stage includes: each data centre providing information relating to data centre parameters and/or proximity, allowing arrangement of the data centres in a dynamic hierarchical cluster topology of a parent data centre and child data centres, each child data centre having its own local data sequence which is to be processed by individual analysis tasks of the query, the child data centres together forming a cluster of similar and/or proximate data centres, the cluster having a single parent data centre; and the execution stage includes: the parent data centre sending the tasks to the child data centres and the child data centres sending to the parent data centre a sequence of outcomes derived from the local data sequence and the tasks; wherein both a child data centre and its parent data centre cache executed tasks executed by the child and the
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: June 23, 2020
    Assignee: FUJITSU LIMITED
    Inventor: Bo Hu
  • Patent number: 10691819
    Abstract: The present application relates to the field of communications. A method and apparatus for remotely deleting information are provided. In some embodiments, the method includes: when a user logs in to a terminal and requests enabling a remote deletion function, acquiring a permission for deleting all information; receiving an all information deletion command sent by a server after the user performs remote login; and performing, according to the command and the permission, an operation of deleting all information in the terminal. In some embodiments, the apparatus includes an acquiring module, a reception module, and a deletion module.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: June 23, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Qiang Liu, Rongjie Shao
  • Patent number: 10684802
    Abstract: An information processing apparatus according an embodiment includes: a storing unit capable of storing one or more setting information each of which is set for executing image formation processing, wherein each setting information is associated with and stored with first apparatus information indicating a first configuration of the image formation apparatus for the corresponding setting information, the storing unit further being capable of storing second apparatus information indicating a second configuration of the image formation apparatus, which is a latest configuration of the image formation apparatus; and a processing unit that, when receiving an instruction to select one of the one or more setting information as actual setting, compares the first apparatus information associated with the selected setting information and the second apparatus information, and determines, based on the comparison result, to accept or reject to reflect the selected setting information to the actual setting.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: June 16, 2020
    Assignee: Oki Data Corporation
    Inventor: Keiichi Ogata
  • Patent number: 10686775
    Abstract: Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a hosted server that an action needs to be performed by a mobile device under management. The method may further include generating a message via the hosted server, the message includes the action, and transmitting the message to the mobile device under management, and receiving a result message from the mobile device under management responsive to the transmitted message, the result message indicating that the action has been satisfied.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: June 16, 2020
    Assignee: KASEYA LIMITED
    Inventor: Allan A. Miller
  • Patent number: 10685130
    Abstract: A system and methods for context-aware and situation-aware secure, policy-based access control for computing devices. The invention enhances the previously disclosed policy-based control system by adding contextual information to the set of resources by which a policy decision point can adjudicate a query to execute a transaction or to access a secure resource. Policy information points are able to store information collected over time related to resources under the control of the system. The system can further include an analytical processing engine capable of inferring new information from existing information that also can be used by the decision points. The policy information points provide context to the decision. They are also able to consider and include information that is external to the system or detected outside the system itself.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: June 16, 2020
    Assignee: Sequitur Labs Inc.
    Inventors: Philip Attfield, Paul Chenard, Simon Curry, Julia Narvaez, Mark Reed
  • Patent number: 10686811
    Abstract: Techniques described and suggested herein include various systems and methods for using customer-initiated security tests to generate training data for use in improving detection and mitigation capabilities related network intrusion and data security attacks. Such techniques may include implementing machine learning techniques to refine security models used therewith. For example, customers of a computing resource provider may notify the computing resource provider that a security test is scheduled to occur. In response, in some embodiments, information related to the security test may be used to improve an implemented security model.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: June 16, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Braxton Chase Ehle
  • Patent number: 10686839
    Abstract: Systems and methods for implementing a cooperative security fabric (CSF) protocol are provided. According to one embodiment, a CSF of multiple network security devices (NSDs) deployed within a protected network is constructed in a form of a tree, having a root node, one or more intermediate nodes and one or more leaf nodes, based on hierarchical interconnections among the NSDs by determining a relative upstream or downstream relationship among each NSD. Backend daemons of the NSDs establish and maintain a bi-directional tunnel between each parent node within the CSF and its respective child nodes through which queries and replies are communicated and through which periodic keep-alive messages and responses are exchanged. Forward daemons of the NSDs enforce a CSF protocol that limits the issuance of query messages to those originated by an upstream node within the CSF and directed to a downstream node within the CSF.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: June 16, 2020
    Assignee: Fortinet, Inc.
    Inventors: Michael Xie, Robert A. May, Xiadong Xu, Yong Wang, Jordan E. Thompson, Shenghe Wang
  • Patent number: 10687309
    Abstract: A method of operating a mesh network is disclosed. The method includes joining a network as a child of a parent node and receiving a downlink broadcast channel from the parent node. The method further includes setting the downlink broadcast channel as an uplink broadcast channel in response to the step of receiving.
    Type: Grant
    Filed: January 28, 2016
    Date of Patent: June 16, 2020
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Ramanuja Vedantham
  • Patent number: 10686589
    Abstract: Example embodiments relate to combining hashes of data blocks. The examples disclosed herein calculate a hash value for each data block in a sequence of data blocks. The hash values are combined into a combined value, where the combined value has the same sequence as the sequence of data blocks. A master hash value is then calculated for the combined value.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: June 16, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brian Quentin Monahan, Liqun Chen
  • Patent number: 10686809
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 16, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10687227
    Abstract: System and methods for managing a Wi-Fi network of a plurality of Wi-Fi networks from a cloud-based Network Operations Control (NOC) dashboard include, subsequent to creating an account for a user of the Wi-Fi network, receiving data associated with the Wi-Fi network from the one or more access points; providing a display associated with the Wi-Fi network based on the data, wherein the display comprises a network topology and one or more tabs providing information related to operation of the Wi-Fi network; updating the display based on one or more inputs received, wherein the updating updates one or more of the network topology and the one or more tabs; and performing one or more operations via the NOC dashboard to one of manage, control, and troubleshoot the Wi-Fi network.
    Type: Grant
    Filed: October 13, 2017
    Date of Patent: June 16, 2020
    Assignee: Plume Design, Inc.
    Inventors: Evan Rusackas, Robert Miller, Patrick Li, Adam Hotchkiss, Aman Singla, William McFarland
  • Patent number: 10686837
    Abstract: The disclosure provides a method for customizing a security service and device, relates to the field of information security and solves the problem of incapability of an undiversified security service provision manner in meeting requirements of different tenants. The method includes that: a cloud computing data centre acquires at least one security service type selected by a tenant; and the cloud computing data centre executes corresponding security service according to the at least one security service type selected by the tenant. The technical solutions provided by the disclosure are applicable to a cloud computing system, and enables the cloud computing data centre to provide security service according to a requirement of the tenant.
    Type: Grant
    Filed: July 29, 2014
    Date of Patent: June 16, 2020
    Assignee: XI'AN ZHONGXING NEW SOFTWARE CO., LTD.
    Inventor: Xiaohua Chen
  • Patent number: 10678731
    Abstract: An information handling system containing a data-category switch module operating in the control plane for the exchange of data between internet of things applications, including a computer memory, a processor operatively coupled to the computer memory executing code of a data-switch module operatively coupled to the computer memory and the processor, a data zone, operatively coupled to the processor, defined by one or more data types from sensors associated with the data zone by data content categories, one or more network interfaces assigned to the data zone by data-category switch module policy provisions for receiving and transmitting data associated with the data zone, and one or more zone-labeled datasets stored in the computer memory operatively coupled to the data-category switch module and assigned to the data zone, each of the zone-labeled datasets receiving data from the data zone and configured to execute a data-zone specific application.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: June 9, 2020
    Assignee: Dell Products, LP
    Inventors: Sanjay Sane, Krishnamurthy Subramanian, Snigdhendu S. Mukhopadhyay
  • Patent number: 10680890
    Abstract: A coordinated timing network is dynamically split into a plurality of coordinated timing networks. This split occurs without taking down any of the servers. Each coordinated timing network has its own coordinated timing network identifier (CTN ID), and its own primary time server. Optionally, each coordinated timing network includes a backup time server and an arbiter.
    Type: Grant
    Filed: December 7, 2018
    Date of Patent: June 9, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donald Crabtree, John S. Houston
  • Patent number: 10678921
    Abstract: Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events. A first plurality of hash values is determined for the event stream. In response to an occurrence of a trigger event in the event stream, the first plurality of hash values for the event stream can be compared with a second plurality of hash values that represents an event stream for a known malware executable. A determination can be made if a behavior represented by the first plurality of hash values is a permitted behavior based on the comparison.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: June 9, 2020
    Assignee: Avast Software s.r.o.
    Inventor: Libor Mo{hacek over (r)}kovsk√Ĺ
  • Patent number: 10680811
    Abstract: A security key to access a geographic location is sent after one or more threshold requirements are met for an entrant. In aspects, this includes a scheduling requirement and/or a proximity requirement. The security key may be encrypted with a code. The proximity requirement may be satisfied using RFID technology.
    Type: Grant
    Filed: January 30, 2017
    Date of Patent: June 9, 2020
    Inventor: Christopher Robert Stanton
  • Patent number: 10678649
    Abstract: User interactions with a database storage system allow creation of virtual databases based on point-in-time copies associated with a source database. Multiple point-in-time copies are obtained for each source database. A point-in-time copy retrieves data changed in the source database since the retrieval of a previous point-in-time copy. A virtual database (VDB) is created by creating a set of files in the data storage system and mounting the files on a database server allowing the database server to access the files. User interactions allow the user to specify the source database, a point in time associated with the source database and a destination server to create the virtual database. User input can specify other attributes associated with the virtual database including the file paths, database parameters etc. The user can specify schedules of various actions, including making and retention of point-in-time copies.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: June 9, 2020
    Assignee: Delphix Corporation
    Inventors: Jedidiah Yueh, Xavier David Luiz, Yan Wang, Alok Srivastava
  • Patent number: 10681141
    Abstract: Techniques for suggesting accessory devices controlled by an application executing on a mobile device are disclosed. A method includes measuring one or more sensor values to determine a data point at each of a plurality of first times, associating an accessory device with each of the data points, clustering the data points within a threshold distance of each other to create a plurality of clusters. The method also includes, after clustering the data points, measuring one or more sensor values to determine one or more current data points at a second time, determining that one or more current data points at the second time corresponds to a first cluster of the plurality of clusters, identifying a first accessory device associated with one or more of the data points in the first cluster, and providing a message using the application.
    Type: Grant
    Filed: September 26, 2018
    Date of Patent: June 9, 2020
    Assignee: Apple Inc.
    Inventors: Brent M. Ledvina, Kevin P. McLaughlin, David R. Stites, Jahshan A. Bhatti, Kevin Duffy, Robert William Mayor
  • Patent number: 10678604
    Abstract: A network functions virtualization management and orchestration system with a VNF descriptor (VNFD) including a information element that allows an instance created based on the VNFD to be distinguished by name. The information element includes an information element of a VM name that describes a naming rule for a virtual machine (VM).
    Type: Grant
    Filed: January 22, 2016
    Date of Patent: June 9, 2020
    Assignee: NEC CORPORATION
    Inventors: Junichi Gokurakuji, Mayo Oohira, Hirokazu Shinozawa
  • Patent number: 10680910
    Abstract: A standalone and virtual proactive services (vPAS) implementation is described. The vPAS is entirely self-contained, encrypted, and can be hosted within the customer's network. Furthermore, data collected by the vPAS can be analyzed without the data leaving the customer's firewall, thereby providing additional assurance to the network operator's data security and privacy. Moreover, the solution is developed based on an architecture that enables the platform to run in a variety of computing environments, including cloud-based environments. The vPAS system addresses data security and privacy concerns, enables different budgeting options, enables in-line predictive analysis, provides flexible delivery options, and increases the performance of preemptive services.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: June 9, 2020
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Ricardo Rios, Jarkko Pasanen, Andrew McQuerry, Ken Guttenfelder, Stephen Gilbert, Sushil Dravekar, Long Ye
  • Patent number: 10680897
    Abstract: A system may include multiple network devices that communicate within a network domain, and a centralized control device configured to perform operations. The operations may include receive a request to modify one or more policies regarding traffic within the network domain, and in response to receiving the request, capture a snapshot of the network domain before modification of the one or more policies. The operations may also include, in response to receiving the request, generate a prediction of the network domain after modification of the one or more policies, and compare the snapshot of the network domain to the prediction of the network domain. The operations may additionally include, based on the comparison of the snapshot and the prediction, provide a predicted impact on the network domain, and, based on the predicted impact being above a threshold, provide an indication that the predicted impact is above the threshold.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: June 9, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventor: Rodney Bruce Smith
  • Patent number: 10680968
    Abstract: Systems and methods described herein may provide web access performance enhancement. A proxy server comprising a processor and a database may receive request data associated with a URL and store the request data in the database. The proxy server may receive a request for the URL from a client, identify commonly requested data in the request data, and send the commonly requested data to the client before receiving a request for the commonly requested data from the client.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: June 9, 2020
    Assignee: OPERA NORWAY AS
    Inventors: Per Hedbor, Johan Schon, Markus Johansson, Jens Widell
  • Patent number: 10681116
    Abstract: Providing services can include receiving a request for a first service provided by a resource provider and provide a reference to an instantiated first resource that the resource provider instantiated. Providing services can include receiving a request for a second service provided by the resource provider. Providing services can include partitioning the instantiated first resource to create an instantiated second resource if the instantiated first resource is capable of providing the second service. Providing services can include registering an availability of the resource provider and the instantiated first resource for further partitioning in a chain of building blocks. Providing services can include updating one of the chain of building blocks and propagate the update to the chain of building blocks.
    Type: Grant
    Filed: September 4, 2013
    Date of Patent: June 9, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Prashant Gupte, Matthew S. Newman, Stephane Herman Maes
  • Patent number: 10681144
    Abstract: Certain aspects of the present disclosure relate to a technique to configure a data source name (DSN) for use during a data source access. A driver is selected. An identifier is provided that identifies a class, and a library or an application that implements a driver interface for accessing the data source. A connection string is forwarded with the identifier from an implementation of the driver interface to the driver. The connection string is forwarded from the driver to a driver manager managing a client.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: June 9, 2020
    Assignee: OPEN INVENTION NETWORK LLC
    Inventor: Marc Todd Yaeger
  • Patent number: 10680933
    Abstract: Route information identifying servers that an e-mail message travels through, along with per-hop latency information, is aggregated. A choke point or other latency-related issue is identified and a control signal is generated to control the e-mail system based upon the identified choke point or other latency-related issue.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: June 9, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Akash Bhatia, Suneetha Dhulipalla, Hsien-chieh Cheng, Dheeraj Kumar Jain, Nagaraju Palla
  • Patent number: 10681166
    Abstract: System and techniques for network coding in an information centric network (ICN) are described herein. A request for a first portion of first named data may be received. A response to the request for the first portion of the first named data may be obtained. The first portion may be combined with a second portion for second named data to create a set of network coded responses. Names for members of the set of network coded responses may be created based on a first name for the first portion and a second name for the second portion. A response to the request may be made with the set of network coded responses using the names for members of the set of network coded responses.
    Type: Grant
    Filed: April 14, 2017
    Date of Patent: June 9, 2020
    Assignee: Intel Corporation
    Inventors: Jeffery R Foerster, Srikathyayani Srikanteswara, Hassnaa Moustafa, Vallabhajosyula S. Somayazulu, Nageen Himayat, Eve M. Schooler
  • Patent number: 10680747
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for monitoring application health via correctable errors. The method includes identifying, by a network device, a network packet associated with an application running on a node, detecting, by the network device, a correctable error associated with the network packet, and encoding, by the network device, a tag within the network packet, the tag including one or more fields for storing data associated with the correctable error.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: June 9, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Keerthi Manjunathan Swarnamanjunathan, Chih-Tsung Huang, Kelvin Chan, Wei-Jen Huang
  • Patent number: 10680908
    Abstract: A method for determining a performance trend of a software application based on performance indicators of the software application. The method receives corresponding access requests from the client computing machines from a user interface framework of the software application that includes at least one command for submitting corresponding operation requests, and estimates corresponding expected response times of the software application for serving the operation requests in response to the access requests. The expected response time of each of the operation requests is estimated according to a comparison of the operative conditions that correspond to the operation request with the performance trend. The method transmits corresponding performance artifacts that are based on the expected response times associated with the user interface framework, to the client computing machines that cause the client computing machines to provide corresponding warnings.
    Type: Grant
    Filed: May 23, 2017
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Nicola Milanese, Stefano Sidoti, Alberto Ginestroni
  • Patent number: 10671584
    Abstract: Identifying unvisited portions of visited information to visit includes receiving information to crawl, wherein the information is representative of one of web based information and non-web based information, computing a locality sensitive hash (LSH) value for the received information, and identifying a most similar information visited thus far. Identifying unvisited portions of visited information further includes determining whether the LSH of the received information is equivalent to most similar information visited thus far and, responsive to a determination that the LSH of the received information is not equivalent to most similar information visited thus far, identifying a visited portion of the received information using information for most similar information visited thus far and crawling only unvisited portions of the received information.
    Type: Grant
    Filed: September 12, 2017
    Date of Patent: June 2, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eugenia Kondratova, Obidul Islam, Paul Ionescu, Iosif Viorel Onut
  • Patent number: 10671456
    Abstract: Disclosed are a method and device for acquiring application information. The method comprises: when a mouse pointer is located on an application, monitoring an instruction for acquiring application information which is input by a user through a keyboard; matching the instruction input by the user with at least one pre-set instruction, and if the instruction input by the user is consistent with any one pre-set instruction among at least one pre-set instruction, then triggering a script program corresponding to the instruction input by the user to run in order to acquire the application information corresponding to the instruction input by the user; and converting the application information into text information, and inserting the text information into the clipboard.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: June 2, 2020
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
    Inventor: Limin Ji
  • Patent number: 10671357
    Abstract: Techniques to facilitate previewing changes to visual elements of a mobile application at different display sizes are disclosed herein. In at least one implementation, screenshot capture instructions provided by an application development and optimization platform are received that indicate at least one requested display size at which to provide a view of the mobile application. An actual screenshot of the view of the mobile application is captured, and a virtual screenshot of the view is rendered by resizing the actual screenshot to the requested display size indicated in the screenshot capture instructions. The actual screenshot of the view and the virtual screenshot of the view rendered at the requested display size are transferred for delivery to the application development and optimization platform.
    Type: Grant
    Filed: June 5, 2018
    Date of Patent: June 2, 2020
    Assignee: Apptimize LLC
    Inventor: Timothy D. Lundeen
  • Patent number: 10671443
    Abstract: Disclosed herein are computer-implemented method, system, and computer-readable storage-medium embodiments for implementing infrastructure resource monitoring and migration. An embodiment includes retrieving, via an API, a plurality of resource metrics; and ingesting, via a data-processing pipeline, the plurality of resource metrics. Some embodiments may further include queuing, via a stream-processing platform, the plurality of resource metrics. The first set of resource metrics and second set of resource metrics may be selected by at least one computer processor via an application framework. Further embodiments may include populating a time-series database with data comprising the first set of resource metrics and second set of resource metrics, using the at least one computer processor. The at least one computer processor may compute first and second indices corresponding to respective first and second values and perform comparison of the indices.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: June 2, 2020
    Assignee: Capital One Services, LLC
    Inventor: Ramesh Ramachandran
  • Patent number: 10671628
    Abstract: A system and method are disclosed for private cloud computing and for the development and deployment of cloud applications in the private cloud. The private cloud computing system and method of the present invention include as components at least a cloud controller, a cloud stack, Service Registry, and a cloud application builder.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: June 2, 2020
    Assignee: STATE STREET BANK AND TRUST COMPANY
    Inventors: Kevin Sullivan, Rajeev K. Jain, Kartikesh Herur
  • Patent number: 10673833
    Abstract: An information processing system includes a client device and a server device. The client device includes a transmitter that transmits, to the server device, a request to acquire information for connecting to an external device that provides an external service. The server device includes a storage that stores attributes of accounts of the external service, and the information for connecting to the external device by using the accounts; a receiver that receives the acquisition request from the client device; an identifier that identifies candidate accounts to be used when the client device receives the external service, the candidate accounts being identified based on information elements and the attributes, the information elements being included in the acquisition request and identifying the accounts; and a transmitter that transmits, to the client device, the information for connecting to the external device by using the identified candidate accounts.
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: June 2, 2020
    Assignee: Ricoh Company, Ltd.
    Inventors: Shigeki Kashiyama, Hiroki Ohzaki, Masato Nakajima, Yasuharu Fukuda
  • Patent number: 10673721
    Abstract: An anomaly detection apparatus for detecting data flow anomalies classes a plurality of data flows on the basis of similarity in time series changes in the data amounts of the data flows; calculates a correlation coefficient at a normal time and a correlation coefficient at a certain timing between at least two data flows belonging to the same class; and determines that at least one of the at least two data flows is anomalous when a difference between the correlation coefficient at the normal time and the correlation coefficient at the certain timing is greater than a predetermined threshold.
    Type: Grant
    Filed: March 24, 2016
    Date of Patent: June 2, 2020
    Assignee: Hitachi, Ltd.
    Inventors: Kyosuke Hashimoto, Hitoshi Yabusaki, Junji Kinoshita
  • Patent number: 10673890
    Abstract: The methods and system described herein automatically generate network router access control entities (ACEs) that are used to filter internet traffic and more specifically to block malicious traffic. The rules are generated by an ACE engine that processes incoming internet packets and examines existing ACEs and a statistical profile of the captured packets to produce one or more recommended ACEs with a quantified measure of confidence. Preferably, a recommended ACE is identified in real time of the attack, and preferably selected from a library of pre-authored ACEs. It is then deployed automatically or alternatively sent to system personnel for review and confirmation.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: June 2, 2020
    Assignee: Akamai Technologies, Inc.
    Inventors: Bonita G. Lee, Christopher Bero