US Pat. No. 10,891,373

QUARANTINING ELECTRONIC MESSAGES BASED ON RELATIONSHIPS AMONG ASSOCIATED ADDRESSES

Micro Focus LLC, Santa C...

1. A method comprising:determining relationships between a first plurality of electronic message addresses associated with a first domain and a second plurality of electronic message addresses associated with a second domain, wherein determining the relationships between the first plurality of electronic message addresses associated with the first domain and the second plurality of electronic message addresses associated with the second domain comprises:
identifying a one-way communication between the first plurality of electronic message addresses and the second plurality of electronic message addresses;
assigning a first weight to the one-way communication;
identifying two-way communications between a first given message address of the first plurality of electronic message addresses and a second given message address of the second plurality of electronic message addresses; and
assigning a second weight to the two way communications based on a number-based criterion for the two-way communications such that the number-based criterion causes the second weight to correspond to a relatively higher strength for the two-way communications for a relatively larger number of the two-way communications and causes the second weight to correspond to a relatively lower strength for the two-way communications for a relatively smaller number of the two-way communications;
determining a relationship between the first domain and the second domain based on the first weight and the second weight; and
quarantining an electronic message originating from a sender associated with the first domain in response to the relationship between the first domain and the second domain meeting a second criterion.

US Pat. No. 10,891,372

SYSTEMS, METHODS, AND PRODUCTS FOR USER ACCOUNT AUTHENTICATION AND PROTECTION

1. A computerized system for protecting an online account of an authorized user, the system comprising:a login server having at least one hardware processor configured to:
manage the online account, wherein the authorized user has personal assets maintained in the online account;
communicate with one or more computer devices operated by the authorized user over one or more computer networks;
display, on the one or more computer devices, a graphical user interface to the authorized user, wherein the graphical user interface provides the authorized user with control over multiple different protection layers of the online account;
receive, via the graphical user interface, input from the authorized user that indicates one or more predetermined login parameters, wherein the authorized user enters or changes the one or more predetermined login parameters for the online account prior to a subsequent login;
provide a fake login access to the online account until the one or more predetermined login parameters inputted by the authorized user have been met;
provide a real login access to the online account when the one or more predetermined login parameters have been met; and
determine the login request to be invalid when a login request to the online account is received via the fake login access.

US Pat. No. 10,891,371

DETECTING MALICIOUS USER ACTIVITY

International Business Ma...

1. A computer-implemented method for detecting malicious user activity, the computer-implemented method comprising:generating, by a computer, a profile for a user that accesses a set of protected assets, the profile generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user;
applying, by the computer, a plurality of analytics on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on the applying of the plurality of analytics on the profile of the user;
generating, by the computer, a malicious user activity alert in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value;
sending, by the computer, the malicious user activity alert to an analyst for feedback;
receiving, by the computer, the feedback corresponding to the malicious user activity alert; and
applying, by the computer, the feedback to the malicious user activity alert, wherein the static information representing the organizational view and associated attributes corresponding to the user includes: information in human resource records of the user; information regarding the user in a directory of employees of an enterprise that employs the user; identity management information of the user including asset access account and privilege information, roles, and work-related groups of the user; and configuration management database information including information regarding information technology assets owned or administered by the user.

US Pat. No. 10,891,370

PATH-BASED ACCESS CONTROL FOR MESSAGE-BASED OPERATING SYSTEMS

BlackBerry Limited, Wate...

1. A system to enforce file system path-based access control in a message-based operating system, the system comprising:a processor; and
a memory storing a path manager, the path manager comprising instructions executable by the processor to configure the processor to:
receive a client message via a communication channel, corresponding to a request from a client to open a file system path, the client message having been flagged by a kernel to indicate that the client is associated with a restricted operating system environment;
evaluate the file system path against path-based access controls to determine that the client is permitted to open the file system path; and
further to a determination that the client is permitted to open the file system path, transmit a reply message to the client granting access to the file system path, the reply message including a digital signature by the path manager of a hash of the reply message, the digital signature being encrypted using a client public key, wherein the client may access the file system path by providing the encrypted digital signature to a server servicing the file system path, and wherein the server requests validation of the digital signature by the kernel, wherein the validation is by using a client private key held by the kernel and unavailable to the client.

US Pat. No. 10,891,369

DYNAMIC SWITCHING BETWEEN POINTER AUTHENTICATION REGIMES

Apple Inc., Cupertino, C...

1. A system comprising:a memory to store data and instructions; and
a processor coupled to the memory, the processor including an execution core, wherein the execution core is switchable between a first mode and a second mode, wherein in the first mode the execution core is to authenticate a memory address, via a signature associated with the memory address, before execution of an instruction associated with the memory address, in the second mode the execution core is to bypass authentication of the memory address for a process without support for pointer authentication, and the processor is to switch between the first mode and the second mode in response to execution of an instruction fetched from the memory, wherein the instruction causes the processor to disable a cryptographic key used to generate or authenticate the signature and wherein the processor is to switch to the second mode when the cryptographic key is disabled.

US Pat. No. 10,891,368

DYNAMIC EMBEDDED INTEGRATED CIRCUIT IN TRACKABLE ITEM

International Business Ma...

1. A method comprising:maintaining a database comprising first scan history data associated with a given integrated circuit associated with a given item;
receiving second scan history data associated with the given integrated circuit; and
determining an authenticity of the given item based on a comparison of the first scan history data to the second scan history data;
wherein the second scan history data is received as encrypted second scan history data, and wherein determining the authenticity of the given item further comprises decrypting the encrypted second scan history data;
wherein a key associated with the given item based on auxiliary data received with the second scan history data is generated, wherein the encrypted second scan history data is decrypted utilizing the generated key;
wherein the auxiliary data comprises a unique identifier associated with the given item; and
wherein the steps of the method are performed by at least one processing device comprising a processor coupled to a memory.

US Pat. No. 10,891,367

SYSTEM AND METHOD FOR THE DISPLAY OF RESTRICTED INFORMATION ON PRIVATE DISPLAYS

NEC CORPORATION, Tokyo (...

1. A computer-implemented method for preventing inadvertent violations of confidentiality, the method comprising:by one or more processors executing program instructions:
determining, for a dataset including patient medical information, an access restriction level of the dataset;
receiving, from a display device, a request for the dataset;
determining an access restriction level of the display device based on whether a location of the display device is fixed or variable;
comparing the access restriction level of the display device and the access restriction level of the dataset;
in response to the comparison, denying the request for the dataset that includes patient medical information to prevent the display device from displaying the dataset when the access restriction level of the display device is smaller than the access restriction level of the dataset;
receiving, from the display device, a request for an audio feature associated with the dataset;
determining an audio configuration of the display device; and
in response to determining that the audio configuration is not configured to output audio through a private audio device, denying the request for the audio feature.

US Pat. No. 10,891,366

SECURE HARDWARE SIGNATURE AND RELATED METHODS AND APPLICATIONS

JONETIX CORPORATION, Cup...

1. An integrated circuit, comprising:a circuit processor;
circuitry to measure at respective times a performance condition of an array of circuits, and to produce respective sets of bits representing the respective measurements;
circuitry to create a checkpoint, the checkpoint representing states of the bits in one of the sets at a given time, and to store in encrypted form in storage external to said integrated circuit data representing the checkpoint; and
circuitry to recover a key, the circuitry to recover the key coupled to the circuitry to measure, to receive therefrom a set of bits representing a new measurement of the performance condition;
wherein the circuitry to recover the key is to receive the data from the external storage, and is to iteratively modify the set of bits representing the new measurement until comparison with the data representing the checkpoint indicates that the modified set of bits corresponds to the states of the bits at the given time.

US Pat. No. 10,891,365

CAPTCHA GENERATION BASED ON ENVIRONMENT-SPECIFIC VOCABULARY

International Business Ma...

1. A method for restricting access to a locked computing resource in a web browser with a user-tailored Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), the method comprising:obtaining a request for a CAPTCHA from a web browser of a user attempting to access a resource;
selecting a set of terms associated with the user from a pool of terms collected from an environment of the user within a pre-determined time period;
determining a familiarity value of the selected terms indicating a recognizability of the terms by the user;
generating a CAPTCHA of the selected set of terms having a level of graphic noise corresponding to the familiarity value; and
sending the generated CAPTCHA to the web browser.

US Pat. No. 10,891,364

IDENTITY VERIFICATION METHOD AND SYSTEM, AND INTELLIGENT WEARABLE DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by an intelligent wearable device that includes an embedded algorithm chip that implements a one-time password algorithm, a request from an intelligent terminal for enabling a one-time password function;
after receiving the request from the intelligent terminal, generating, by the intelligent wearable device, a public key and a private key from the embedded algorithm chip;
transmitting, by the intelligent wearable device, the public key to the intelligent terminal;
receiving, by the intelligent wearable device and from a provisioning server, encrypted provisional data that has been encrypted by the intelligent terminal using the public key;
decrypting, by the embedded algorithm chip of the intelligent wearable device, the encrypted provisional data using the generated private key to generate decrypted provisional data;
verifying the decrypted provisional data;
after verifying the decrypted provisional data, invoking, using a micro operating system of the intelligent wearable device, the embedded algorithm chip to generate, based on the one-time password algorithm and the decrypted provisional data, a one-time password; and
providing, for output by the intelligent wearable device, the one-time password for use by a verification server in verifying the intelligent wearable device.

US Pat. No. 10,891,363

USER AUTHENTICATING METHOD AND DEVICE

SAMSUNG ELECTRONICS CO.. ...

1. An authentication method comprising:receiving an authentication request;
obtaining authentication data for authenticating a user from at least one of a plurality of external devices when the authentication request is received;
obtaining an authentication score based on the obtained authentication data and reliability information assigned to a type of the authentication data in advance;
determining an additional authentication method is necessary based on the obtained authentication score being less than or equal to a threshold score;
receiving, via a user interface of a first external device, a user input, wherein the plurality of external devices comprises the first external device, and
determining at least one external device to use for the additional authentication method,
wherein the at least one external device is determined based on the user input.

US Pat. No. 10,891,362

WEARABLE DEVICE HAVING HIGHER SECURITY AND SKIN SENSOR EQUIPPED THEREON

PIXART IMAGING INC., Hsi...

1. A wearable device, comprising:a skin sensor; and
a processor, configured to
receive an authentication data for authenticating a user when a wearing state of the wearable device determined according to a detecting result of the skin sensor is adjacent to a skin surface of the user,
execute a predetermined function in response to a request when the authentication data matches a pre-stored data and the wearing state of the wearable device is determined not leaving the skin surface after the authentication data is received, and
reject or ignore the request when the wearing state of the wearable device is determined being leaving the skin surface before the predetermined function is finished.

US Pat. No. 10,891,361

DEVICE WITH A CAMERA FOR REAL-TIME RISK DETECTION OF PASSWORD LEAKAGE

CITRIX SYSTEMS, INC., Fo...

1. A computing device comprising:a camera;
a memory having stored therein a grant list and a risk list, with the grant list including at least one authorized face ID, and with the risk list including at least one identified object that presents a risk to the user's operating environment; and
a processor coupled to said memory and said camera and configured perform the following:
execute a user application that requires sensitive information to be entered by the user,
activate said camera prior to the sensitive information being entered by the user, and
operate an analyze engine to perform the following:
analyze an image as provided by said activated camera,
validate the user based on the analyzed image and the at least one face ID in the grant list, and
in response to a validated user, alert the user of a risk for leakage of the sensitive information to be entered into the user application based on detection of at least one object in the analyzed image that is in the risk list.

US Pat. No. 10,891,360

SYSTEMS AND METHODS FOR IMPROVING KBA IDENTITY AUTHENTICATION QUESTIONS

LexisNexis Risk Solutions...

18. A non-transient computer-readable medium storing instructions, that when executed by a user device having one or more processors, cause the one or more processors to perform a method comprising:receiving a set of identity information associated with a subject;
querying one or more databases with at least a portion of the set of identity information;
receiving, in response to the querying, personally identifiable information;
determining, from the personally identifiable information, at least one subject characteristic;
ranking, by a predictive model executing on one or more computer processors, a plurality of question topics and associated pass rate metrics based on the at least one subject characteristic while suppressing false-positive question topics;
selecting, based on the ranking and the at least one subject characteristic, at least one knowledge-based authentication (KBA) proofing question for presentation to the subject, the at least one KBA proofing question having a personally identifiable correct answer;
sending, for display on a first computing device associated with the subject, the at least one KBA identity proofing question;
receiving, responsive to the sending, a response answer; and
responsive to a match between the response answer and the personally identifiable correct answer, sending, for display on the first computing device associated with the subject, a first indication of authentication.

US Pat. No. 10,891,359

MANAGEMENT SYSTEMS FOR PERSONAL IDENTIFYING DATA, AND METHODS RELATING THERETO

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for use in managing personal identifying information, the method comprising:receiving, from a requestor, a request to remove personal identifying information (PII) for at least one individual, the at least one individual associated with a service;
determining, by a computing device, whether a restriction on the PII or the at least one individual applies to the request;
in response to the request to remove the PII, transmittinq a consent notification to the at least one individual for consent of the at least one individual to remove the PII;
receiving the consent of the at least one individual to the consent notification;
in response to the request, and after receiving the consent, broadcasting, by the computing device, the request, subject to the determined restriction when the restriction is determined to apply to the request, to multiple service providers associated with the service, the multiple service providers being controllers of PII of the at least one individual, whereby in response to the request, the multiple service providers remove the PII of the at least one individual;
receiving, by the computing device, at least one response to the request, from each of the multiple service providers, the responses each including an acknowledgement of removal of the PII of the at least one individual from the respective one of the multiple service providers;
compiling, by the computing device, a reply to the request based on a response from each of the service providers, the reply including a confirmation of the removal of the PII;
transmitting the reply to the requestor; and
logging, by the computing device, the request from the requestor, the broadcast of the request to the multiple service providers, and said at least one response from each of the service providers in an audit data structure, thereby permitting compliance with PII controls to be demonstrated.

US Pat. No. 10,891,358

INDUSTRIAL CONTROL SYSTEM MANAGEMENT

NUOVO PIGNONE TECNOLOGIE ...

1. A method for enabling a software module included in a plurality of software modules of an application package installed on a computer system configured to control a turbomachine, the method comprising:receiving, via a processor of the computer system, a request for executing the software module;
via the processor of the computer system, generating a first code, encrypting the first code, and associating the first code with the software module;
via the processor of the computer system determining whether the first code matches with a second code associated with the software module, the determining including executing a verification protocol on at least one of the first code and the second code, the verification protocol including calculating a check value for at least one of the first code and the second code;
via the processor of the computer system, activating the software module automatically and without human intervention when the verification protocol indicates that the first code includes no error; and
tuning at least one function of a turbomachine train with the activated software to alter an aspect of turbomachine performance, said tuning comprising tuning a combustion mapping to control emissions of the turbomachine train.

US Pat. No. 10,891,357

MANAGING THE DISPLAY OF HIDDEN PROPRIETARY SOFTWARE CODE TO AUTHORIZED LICENSED USERS

salesforce.com, inc., Sa...

1. A method for regulating access by an independent software vendor (ISV) to proprietary source code for software of an organization, comprising:receiving a login request from the ISV, where the login request masquerades as a user of the software;
accessing a license management system in response to the login request, where the license management system is capable of controlling access to the software;
determining the presence of two session identifiers (IDs) for the login request comprising a user session ID and a masquerade session ID, where the presence of two separate session IDs identifies the ISV;
accessing to the proprietary source code by the ISV with permission from the license management system, where the license management system limits access by the ISV to only the proprietary source code; and
notifying the organization of access by the ISV to the proprietary source code.

US Pat. No. 10,891,356

CONTACTLESS AND MINIMAL-CONTACT MONITORING OF QUALITY OF LIFE PARAMETERS FOR ASSESSMENT AND INTERVENTION

ResMed Sensor Technologie...

1. A system for monitoring and enhancing a quality of life for human subjects, the system comprising:a contactless sensor configured to wirelessly receive a signal reflected from a subject and obtain measured data from the reflected signal;
an input device configured to capture subjective data from the subject, wherein the subjective data comprises sleep quality data; and
a data monitoring and analysis system configured to:
set a first target sleep quality of life index (SQOLI) for the subject;
receive, from the input device, the subjective data;
receive, from the contactless sensor, the measured data;
obtain objective data from the measured data, wherein the objective data comprises sleep quality data;
calculate a quantitative SQOLI based on the subjective data and the objective data; and
prompt a behavioral change in one or more non-environmental sleep-related activities of the subject, wherein the behavioral change comprises (a) an increase of an allowed sleep time or time in bed of the subject if the quantitative SQOLI is greater than the first target SQOLI and (b) a decrease of the allowed sleep time or time in bed of the subject if the quantitative SQOLI is less than the first target SQOLI.

US Pat. No. 10,891,355

PHARMACY AUTHENTICATION METHODS AND SYSTEMS

CVS Pharmacy, Inc., Woon...

1. A method for authenticating a first user of a first account to a second account, the method comprising:receiving at a store server over a communication network authentication information from a client device of a first user related to the first account of the first user;
authenticating at the store server the first user to the first account using the authentication information and information stored in a first account database;
electronically capturing electronic data from a prescription bottle label using a camera associated with the client device, wherein the electronic data includes information related to a pharmacy prescription, and wherein at least an encoded portion of the electronic data is electronically encoded in a format known to the store server;
responsive to authenticating the first user, receiving at the store server over the communication network the electronic data captured by the client device from the prescription bottle label and comprising the information related to the pharmacy prescription;
electronically extracting by the store server electronic information from the electronic data and electronically decoding the encoded portion, wherein the extracted information is related to the pharmacy prescription;
verifying by the store server that the extracted information related to the pharmacy prescription is valid and is associated with a particular user;
determining that the particular user associated with the information related to the pharmacy prescription is a second user;
identifying the second account associated with the second user in the pharmacy database by searching a second account database for an entry matching the extracted information related to the pharmacy prescription;
receiving, from the client device of the first user, additional authentication information including location information of the client device of the first user without interacting with the first user;
automatically creating a link between the first account of the first user in the store database and the second account of the second user in the pharmacy database based at least in part on the electronic data captured from the prescription bottle label if the additional authentication information is consistent with an expected value, wherein the link provides a permission for the first user authenticated to the first account associated with the first account database to remotely access one or more entries in the second account database associated to the second account from the client device of the first user;
responsive to creating the link between the first account of the first user in the store database and the second account of the second user in the pharmacy database, generating and transmitting a message for the first user to notify the creation of the link and to access the entries of the second account database; and
the first user accessing the second account of the second user in the pharmacy database based at least in part on the link determined using the electronic data captured from the prescription pill bottle label.

US Pat. No. 10,891,354

CATEGORIZING AND PROCESSING TIME-SERIES DATA

International Business Ma...

1. A method, executed by one or more processors, for determining and processing relevant time-series data for a categorical response variable, the method comprising:receiving, via the one or more processors, time-series data for each variable of a plurality of explanatory variables;
determining, via the one or more processors, a least common period for the plurality of explanatory variables;
forming, via the one or more processors, an explanatory variable group for each of the plurality of explanatory variables using lags less than the least common period;
receiving, via the one or more processors, categorical data for a response variable corresponding to the time-series data;
determining, via the one or more processors, a plurality of selected explanatory variable groups of the plurality of explanatory variable groups;
processing, via the one or more processors, additional time-series data for each of the plurality of selected explanatory variable groups;
producing, via the one or more processors, a categorization sequence for the additional time-series data based on the plurality selected explanatory variable groups; and
adjusting, via the one or more processors, a system or process corresponding to the additional time-series data base on the categorization sequence.

US Pat. No. 10,891,353

APPARATUS AND METHODS FOR MATRIX ADDITION AND SUBTRACTION

CAMBRICON TECHNOLOGIES CO...

1. An apparatus for matrix operations in a neural network, comprising:a controller circuit configured to receive a matrix-addition instruction that indicates a first address of a first matrix, a second address of a second matrix, a first size of the first matrix, a second size of the second matrix, and an output address;
a matrix operation circuit configured to:
retrieve the first matrix and the second matrix from a storage device based on the first address of the first matrix and the second address of the second matrix,
wherein the first matrix includes one or more first elements and the second matrix includes one or more second elements, and
wherein the one or more first elements and the one or more second elements are arranged in accordance with a two-dimensional data structure, and
respectively add each of the first elements to each of the second elements based on a correspondence in the two-dimensional data structure in accordance with the matrix-addition instruction to generate one or more third elements for a third matrix, wherein the matrix operation circuit includes multiple adders configured to parallelly add elements in a first portion of the first elements to elements in a second portion of the second elements to generate a partial result vector of the third matrix; and
an instruction register configured to store the first address of the first matrix, the first size of the first matrix, the second address of the second matrix, the second size of the second matrix, and the output address.

US Pat. No. 10,891,352

CODE VECTOR EMBEDDINGS FOR SIMILARITY METRICS

Optum, Inc., Minnetonka,...

1. A method for providing aggregate vectors in a multi-dimensional space, the method comprising:accessing, by a computing entity comprising a processor and a memory storing computer program code, a plurality of instances of medical information encoded using medical codes;
generating, by the computing entity, a plurality of medical sentences based at least in part on the plurality of instances of medical information, wherein (a) each medical sentence comprises one or more medical codes, (b) at least two medical sentences of the plurality of medical sentences are generated from the same instance of medical information of the plurality of instances of medical information, and (c) the at least two medical sentences are different from one another;
generating, by the computing entity, an embedding vector dictionary comprising a plurality of multi-dimensional vectors (a) based at least in part on a medical embedding model trained using machine learning and the plurality of medical sentences, and (b) in a multi-dimensional space having a configurable dimensionality, each multi-dimensional vector corresponding to a medical code;
generating, by the computing entity, a plurality of aggregate vectors based at least in part on the embedding vector dictionary;
analyzing, by the computing entity, at least a portion of the plurality of aggregate vectors to identify two or more aggregate vectors that are similar or different based at least in part on a distance or angle between the two or more aggregate vectors in the multi-dimensional space; and
providing, by the computing entity, an output comprising the identified two or more aggregate vectors.

US Pat. No. 10,891,351

SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING AND OPTIMIZING WEB PAGES

CAPITAL ONE SERVICES, LLC...

1. A method for generating and selecting web page layouts based on performance analytics, the method comprising:receiving, by a first device, code associated with a default web page;
parsing, by a processor associated with the first device, the code associated with the default web page by:
identifying one or more components of the default web page;
identifying attributes of the one or more components of the default web page; and
associating the one or more components with at least one pre-set component type and at least one pre-set attribute type;
receiving, from a user of the first device, a plurality of user web page preferences, wherein the plurality of user web page preferences comprise at least two factors selected from average user engagement time, unique views, click-through rate, and product purchase rate;
retrieving, by the first device, historical web site performance data, wherein the historical web site performance data represents performance data for a plurality of previous web page versions viewed by a plurality of web page visitors, each of the plurality of web page visitors associated with at least one second device of a plurality of second devices;
assigning, by the processor, an associated weight for each of the historical web site performance data, the plurality of user web page preferences, and the parsed code associated with the default web page;
generating, by the processor, based on the plurality of user web page preferences, the historical web site performance data, the parsed code associated with the default web page, and the associated weight for each of the plurality of user web page preferences, the historical web site performance data, and the parsed code associated with the default web page, a plurality of web page versions;
transmitting, by the user of the first device, the plurality of web page versions to the plurality of second devices associated with the plurality of web page visitors;
collecting performance data associated with each of the plurality of web page versions;
analyzing, by the processor, the performance data for the plurality of web page versions by executing a multi-arm bandit algorithm for each web page version of the plurality of web page versions;
storing the performance data for at least one of the plurality of web page versions amongst the historical web site performance data; and
based on the performance data and a rank of the plurality of user web page preferences, selecting one of the plurality of web page versions as the default web page.

US Pat. No. 10,891,350

METHOD AND DEVICE FOR ESTABLISHING WEBPAGE QUALITY MODEL

Guangzhou Shenma Mobile I...

1. A web page quality model establishment method, comprising:excavating, from a search engine log, selected user behavior indicators of each of respective web pages in the search engine log;
calculating, according to the excavated selected user behavior indicators of each of the respective web pages, web page qualities of each of the respective web pages;
filtering, according to the web page qualities and the selected user behavior indicators, the respective web pages;
extracting, from the search engine log, selected quality features of each of the respective filtered web pages; and
establishing a web page quality model according to:
the web page qualities; and
the selected quality features of each of the respective filtered web pages.

US Pat. No. 10,891,349

RESOURCE LOCATOR REMARKETING

Google LLC, Mountain Vie...

1. A method implemented by one or more data processing apparatus, the method comprising:receiving resource locator data generated by a script embedded in a resource, the resource locator data specifying a resource that was visited by a user device identified by a device identifier;
identifying a content feed associated with a publisher of the resource, the content feed including one or more regular expressions, each regular expression specifying a set of matching character strings and having a corresponding set of content items that are eligible to be provided to user devices that submitted resource locator data matching one of the one or more regular expressions;
identifying, from the regular expressions included in the content feed, a first matching regular expression that matches the resource locator data generated by the script;
selecting a content item from the set of content items that corresponds to the first matching regular expression; and
providing data that causes presentation of the selected content item to the user device.

US Pat. No. 10,891,348

IDENTIFYING RELEVANT MESSAGES IN A CONVERSATION GRAPH

Twitter, Inc., San Franc...

1. A method for identifying relevant messages in a conversation graph, the method comprising:transmitting, over a network, messages between a plurality of users on a messaging platform;
generating a conversation graph based on relationships between the messages, the conversation graph including a plurality of messages related to a conversation, the plurality of messages including a root message and one or more reply messages connected to the root message;
marking a subset of the plurality of messages of the conversation graph as relevant to the conversation, including:
identifying a topic based on a semantic analysis of at least one of the plurality of messages of the conversation graph;
determining that a user account of a message in the conversation graph is relevant to the topic; and
marking the message as relevant;
transmitting, over the network, digital information to render the subset of the plurality of messages on a user interface of a computing device.

US Pat. No. 10,891,347

COMPUTER-IMPLEMENTED MANAGED REFERENCES IN ELECTRONIC DOCUMENT SYSTEMS

ATLASSIAN PTY LTD., Sydn...

1. A computer-implemented method comprising:maintaining, on a digital storage device, a database that stores data associated with: a plurality of managed references that are associated with a plurality of user accounts that are authorized to use said plurality of managed references, a plurality of unmanaged references that are not associated with the plurality of user accounts, and a plurality of documents that use said plurality of managed references;
receiving, at a server computer that is coupled to said digital storage device, a request from a client computer of a plurality of client computers to use a managed reference in the database, wherein the request includes said managed reference that was typed into a client user interface and a user account associated with said client computer;
determining, by the server computer, whether said user account is authorized to use said managed reference;
transmitting a notification to other user accounts that are authorized to use said managed reference in response to determining said user account is authorized to use said managed reference;
sending an authorization request to an owner account in response to determining said user account is not authorized to use said managed reference;
receiving, by the server computer, feedback from said owner account that indicates approval or non-approval to use said managed reference by said user account;
updating the database to include said user account in notifications about documents that use the managed reference in response to receiving approval to use said managed reference from said owner account;
receiving a request to create a managed reference in the database, wherein the request includes the managed reference that was typed into the client user interface;
in response to determining that the managed reference is not in the database, generating and causing displaying a request for additional information;
in response to determining that the managed reference is in the database, determining that the user account is an owner of the managed reference and inserting the managed reference;
receiving, by the server computer, a reference search query that indicates a reference to be searched;
identifying, based on the reference search query, a particular managed reference of the plurality of managed references and a particular unmanaged reference of the plurality of unmanaged references, the particular managed reference and the particular unmanaged reference matching the reference to be searched;
generating and causing displaying a list comprising at least the particular managed reference and the particular unmanaged reference, the particular managed reference being displayed higher in the list than the particular unmanaged reference.

US Pat. No. 10,891,346

TRUST NETWORK EFFECT

1. A system, comprising:one or more processors; and
one or more memories communicatively coupled to the one or more processors when the system is operational, the one or more memories bearing computer-readable instructions that, when executed by the one or more processors, cause the system at least to:
receive a request from a device, wherein the request is associated with a user;
determine one or more first digital resources in relation to the request;
determine one or more second digital resources based on at least a relationship, wherein the relationship exists between a digital resource and one or more participants, the one or more participants are associated with the user, and said digital resource is associated with the one or more first digital resources, or the one or more second digital resources, or both the one or more first digital resources and the one or more second digital resources; and
present a response to the device, wherein the response comprises at least one digital resource from among the one or more second digital resources, or at least one indication of at least one digital resource from among the one or more second digital resources.

US Pat. No. 10,891,345

SYSTEM FOR DECOMPOSING EVENTS FROM MANAGED INFRASTRUCTURES THAT INCLUDES A REFERENCE TOOL SIGNALIZER

Moogsoft Inc., San Franc...

1. A system for clustering events, comprising:at least one engine configured to receive message data from managed infrastructure that includes managed infrastructure physical hardware that supports the flow and processing of information, the at least one engine configured to determine common characteristics of events and produce clusters of events relating to the failure of errors in the managed infrastructure, where membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information, the at least one engine is configured to create one or more situations that is a collection of one or more events or alerts representative of the actionable problem in the managed infrastructure, the at least one engine including a processor; a memory; and an input/output controller, a display, a storage device, a software system stored in the memory that directs operation of a relevant engine and an operating system;
the operating system included with the at least one engine and operating to provide at least one of: a textual, and numeric values, and if they are similar relative to the analyzed monitored events, and it is determined that a collection of events share an attribute, one or more output of clusters is created, and in response to production of the clusters one or more physical changes in a managed infrastructure physical hardware is made, membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information;
a situation room with a collaborative interface (UI) for decomposing events from managed infrastructures, in response to the production of the clusters one or more physical changes is made in a managed infrastructure hardware;
a reference tool that provides for a decomposition of events where the reference tool is a signalizer algorithmic decomposition of events implemented in code, the algorithmic decomposition of events being available in one or more files of settings that creates situations in a deterministic way; and
wherein textual and numeric values indicate a state of a hardware component of the managed infrastructure to make a change to a managed infrastructure physical hardware component.

US Pat. No. 10,891,344

CONTENT DELIVERY SYSTEM

PIKSEL, INC., Wilmington...

1. A content delivery system arranged to recommend content items to a user of the content delivery system having at least one predetermined characteristic, the content delivery system comprising:a social media analyser stored in a memory of the system and implemented by a processor, the social media analyser configured to receive and analyse social media communications from multiple consumers including users of the content delivery system and non-users of the content delivery system;
a dynamic grouping component stored in the memory of the system and implemented by the processor, the dynamic grouping component configured to dynamically group at least some of the consumers, including the non-users of the content delivery system, according to the analysed social media communications, into dynamically created respective groups;
a user matching module stored in the memory of the system and implemented by the processor, the user matching module configured to receive the at least one predetermined characteristic of the user of the content delivery system, compare it with group characteristics of the respective groups to identify a group that shares the at least one predetermined characteristic, and allocate the user of the content delivery system to one or more of the respective groups, wherein the allocating process at one time instant yields different results to the allocating process at a different time instant; and
a recommendation engine stored in the memory of the system and implemented by the processor, the recommendation engine configured to generate a recommendation of one or more selected content items for the user of the content delivery system based on the one or more respective dynamic groups to which the user of the content delivery system is instantaneously allocated, whereby the recommendation for the user of the content delivery system is based on social media communications of multiple consumers including non-users of the content delivery system; and
an interface for delivering the recommendation to the user of the content delivery system.

US Pat. No. 10,891,343

RECOMMENDING CONTACTS IN A SOCIAL NETWORK

MICROSOFT TECHNOLOGY LICE...

1. A computer-readable memory containing instructions for controlling a computing system to identify potential contacts for a target user, the instructions comprising instructions that, when executed, control the computing system to:access a plurality of contact lists of users, each contact list identifying contacts of a user;
identify, from a contact list of the target user, contact paths from the target user to candidate users that are within a maximum contact path length, a contact path being a directed path of contacts such that each contact in the directed path is in the contact list of the prior contact in the directed path;
filter the identified contact paths to remove contact paths that do not satisfy a set of recommendation criteria for a contact path, the set of recommendation criteria comprising:
a first recommendation criterion that a candidate user of the contact path is not in the contact list of the target user; and
a second recommendation criterion that there are multiple contact paths between the target user and the candidate user; and
generate, based on the filtered contact paths, a list of candidate users, the list ranked according to contact path length.

US Pat. No. 10,891,342

CONTENT DATA DETERMINATION, TRANSMISSION AND STORAGE FOR LOCAL DEVICES

Google LLC, Mountain Vie...

20. A non-transitory computer readable medium having stored thereon software instructions that, when executed by a processor, cause the processor to perform operations including:determining a first predicted event and a second predicted event for a user, wherein determining the first predicted event and the second predicted event is based on user data associated with the user;
determining a first set of content items to be accessed at the first predicted event, wherein the first set of content items is stored at a network storage and includes content data related to the first predicted event;
determining a second set of content items to be accessed at the second predicted event, wherein the second set of content items is stored at the network storage and includes content data related to the second predicted event; and
prior to a time of the predicted event:
determining at least one local device associated with the user to store the first set of content items and the second set of content items; and
in response to the at least one local device lacking sufficient storage to store the first set of content items and the second set of content items;
determining that the first predicted event has a higher priority than the second event based on an estimated lower availability of network access to the network storage by the at least one local device at the first predicted event than at the second predicted event;
in response to determining that the first predicted event has the higher priority, transmitting the first set of content items over a communication network from the network storage to the at least one local device, wherein the first set of content items are stored in local storage of the at least one local device.

US Pat. No. 10,891,341

SEARCHING OF REAL-TIME INTERNET CONTENT RESPONSIVE TO A STRUCTURED SEARCH QUERY GENERATED BASED ON USER-SPECIFIED SEARCH TERMS/PHRASES AND PRIVATE DATABASE RECORDS MATCHING INITIAL USER-SELECTED CONSTRAINTS

Onemata Corporation, Den...

1. A method comprising:receiving, by one or more processors of one or more physical or virtual servers of a Software as a Service (SaaS) based Internet search engine, a search request from an end user of a subscriber of the SaaS based Internet search engine via a browser based interface displayed on a client device being used by the end user, wherein the search request includes (i) one or more initial constraints specified by the end user that are to be used by the SaaS based Internet search engine to constrain a search of real-time Internet content to be performed responsive to the search request to a domain name space and (ii) one or more user-specified search terms or phrases;
responsive to receipt of the search request, generating, by the one or more processors, a structured search query containing a finite number of domain names defining the domain name space and one or more search terms or phrases to be applied to the real-time Internet content within the domain name space by:
identifying company records matching the one or more initial constraints by searching a company database having stored therein characteristics/attributes regarding a plurality of companies; and
incorporating into the structured search query:
a plurality of domain names each representing a website domain of a company of those of the plurality of companies associated
with the identified matching records by extracting the plurality of domain names from the identified matching company records; and
the one or more user-specified search terms or phrases;
performing, by the one or more processors, the search of real-time Internet content based on the structured search query by, for each domain name of the plurality of domain names:
retrieving a predetermined number of web pages associated with the web site domain; and
when content of the predetermined number of web pages satisfies match criteria associated with one or more user-specified search terms or phrases, adding the content to a set of search results;
causing, by the one or more processors, information regarding the set of search results, including a list of companies associated with the set of search results, to be locally stored by the SaaS based Internet search engine and presented to the end user via the browser based interface; and
facilitating, by the one or more processors, one or more of interactive filtering and interactive ranking of the locally stored set of search results based on one or more user-selected desired characteristics of companies in the list of companies or one or more user-selected desired characteristics of the content of the companies.

US Pat. No. 10,891,340

METHOD OF AND SYSTEM FOR UPDATING SEARCH INDEX DATABASE

YANDEX EUROPE AG, Lucern...

1. A computer-implemented method for dynamically updating a search index of a server, the search index being divided into a plurality of chunks, each chunk of the plurality of chunks including a respective portion of a plurality of documents, the method executable by the server, the method comprising:receiving, by the server, a request to update a set of documents in the search index, the request to update the set of documents including deletion of a first subset of documents;
computing, by the server, for each given chunk of a set of chunks from the plurality of chunks, each given chunk including at least one document of the first subset of documents:
a respective updated active size of a respective set of active documents of the respective portion of the plurality of documents in the given chunk, the respective set of active documents not including the at least one document of the first subset of documents to delete,
a respective updated total size of the respective portion of the plurality of documents in the given chunk, the respective portion of the plurality of documents not including the at least one document of the first subset of documents to delete, and
a respective ratio of the respective updated active size to the respective updated total size;
duplicating, by the server, based on the respective ratio, a subset of chunks from the set of chunks to obtain a subset of candidate chunks;
updating, by the server, at least a portion of the set of documents in the subset of candidate chunks;
replacing, by the server, the subset of chunks with the subset of candidate chunks.

US Pat. No. 10,891,339

CATEGORIZED SOCIAL OPINIONS AS ANSWERS TO QUESTIONS

INTERNATIONAL BUSINESS MA...

1. A method of computing, by a processor and a memory device, an opinion as an answer to a question, comprising:analyzing, by the processor, the question to determine a set of categories, a category corresponding to a type of possible answers responsive to the question, wherein the type of possible answers responsive to the question is determined using a Natural Language Processing analysis to identify a characteristic of the question;
extracting, from the memory device, a set of opinions from social media, wherein each opinion is from a corresponding responder on a social media platform to which the question is sent;
computing, by the processor, a responder-specific language model corresponding to a responder of the opinion, the responder-specific language model constructed using an analysis of historical social data of the responder, wherein the responder-specific language model establishes a threshold degree of sentiment used by the responder in the historical social data;
computing, by the processor, a value of a responder-specific language strength parameter for the opinion, wherein the responder-specific language strength parameter is indicative of a degree of sentiment of the opinion relative to the threshold degree of sentiment used by the responder;
computing, by the processor, a strength of the opinion using a subset of a set of strength parameters, a strength parameter in the subset comprising the responder-specific language strength parameter for the opinion;
ranking, by the processor, the opinion according to the strength of the opinion;
storing the opinion, the strength of the opinion, and the category into the memory device; and
presenting the opinion, the strength of the opinion, and the category in a filterable presentation.

US Pat. No. 10,891,338

SYSTEMS AND METHODS FOR PROVIDING INFORMATION

Palantir Technologies Inc...

1. A system comprising:one or more processors; and
a memory storing instructions that, when executed by the one or more processors, cause the system to perform:
identifying a document relating to an investigation of personally identifiable information (PII), the document indicating that an entity has a characteristic associated with the PII and comprising structured data and unstructured data;
determining connections between the document and other documents associated with another entity and an organization, based on the structured and unstructured data by identifying the other documents sharing the characteristic associated with the III;
identifying names or identifiers of the entity, the another entity, and the organization, and the PII;
determining respective locations of the entity, the another entity, and the organization;
identifying indirectly connected documents associated with the names or identifiers of the another entity and the organization; and
providing, through an interface:
links between the entity, the another entity, the organization, and data from the indirectly connected documents; and
a map showing the locations of the entity, the another entity, and the organization.

US Pat. No. 10,891,337

CONTENT ADDRESSABLE MEMORY AND SEMICONDUCTOR DEVICE

RENESAS ELECTRONICS CORPO...

1. A content addressable memory comprising:a memory to which search data is inputted and which stores multiple pieces of entry data; and
a search circuit for searching for an address in the memory which stores entry data that matches the search data,
wherein, in the memory, the multiple pieces of entry data are sorted in ascending or descending order and can be stored associated with addresses,
wherein, with whole addresses for storing the multiple pieces of entry data as an initial search area, the search circuit repeatedly performs a search operation for comparing entry data stored in a central address of the search area with the search data, outputting the central address as a search result in a case of a match, and narrowing the search area based on a magnitude comparison result in a case of a mismatch,
wherein a first content addressable memory has the same configuration as the content addressable memory, the content addressable memory further comprising:
a second content addressable memory having the same number of entries as the first content addressable memory;
a plurality of first content addressable memories; and
a transfer circuit for reading multiple pieces of entry data from the second content addressable memory, sorting the multiple pieces of entry data in ascending or descending order, and transferring the sorted multiple pieces of entry data to the first content addressable memory, and
wherein when the search data is inputted, the second content addressable memory is searched first, and in a case of no hit in the second content addressable memory, the first content addressable memories are searched in reverse chronological order of writing of entry data.

US Pat. No. 10,891,336

COLLABORATIVE LEARNED SCOPING TO EXTEND DATA REACH FOR A SEARCH REQUEST

International Business Ma...

1. A computer-implemented method, comprising operations for:from monitoring prior collaboration data of entities discussing topics, deriving the topics, access response times to data sources with content objects for the topics, and topic response content of the content objects;
building a data reach model using the topics, the access response times, the topic response content, and data sources for the topics;
determining that a topic of the topics is currently being discussed by a current group of entities;
using the data reach model to determine a new data source to be added and a duration of adding the new data source based on real time entity activity;
adding the new data source to a data reach of the current group of entities; and
in response to receiving a search request,
issuing the search request against the data sources and the new data source; and
returning results in response to the search request.

US Pat. No. 10,891,335

ENHANCED EXPLORATION OF DIMENSIONALLY REDUCED DATA

International Business Ma...

1. A method for enhanced exploration of dimensionally reduced data, the method comprising:obtaining at least one data set having a plurality of data objects, wherein each data object is characterized by a plurality of numerical features;
applying a dimensionality reduction technique to the at least one data set;
generating a two-dimensional scatter plot of the at least one data set, wherein each data object in the plurality of data objects corresponds to a data point in a plurality of data points in the two-dimensional scatter plot;
selecting a data point for a projection line in the plurality of data points in the two dimensional scatter plot;
generating a projection line for each numerical feature of the data object corresponding to the data point for the projection line, wherein a length of the projection line indicates an importance of each numerical feature on the position of the data point, and wherein generating a projection line for each numerical feature of the data object comprises:
calculating the mean, standard deviation, minimum value and maximum value for each numerical feature; and
plotting the projection line;
altering at least one numerical feature of a data object in the plurality of data objects, wherein a position of the data point for the projection line corresponding to the data object is affected in real-time,
and wherein remaining data points in the plurality of data points are unaffected.

US Pat. No. 10,891,334

LEARNING GRAPH

Hewlett-Packard Developme...

1. A method comprising:generating, by a processor, a learning graph for a plurality of documents according to a sequencing approach using machine learning, wherein generating the learning graph is based on minimizing an objective function, wherein the objective function includes a first term that includes a similarity matrix indicating similarities between documents that is multiplied with a first difference of a first topic probability matrix and a second topic probability matrix, and includes a second term that includes a second difference of the first topic probability matrix and an initial topic probability matrix, and wherein generating the learning graph comprises determining a set of the documents that are not yet represented within the learning graph by employing a clustering approach, and for each document of at least one document of the set:
creating a new node within the learning graph representing at least the document;
determining a relationship between the document and each other document already represented by a node within the learning graph by employing an entropy-based approach or a classification technique; and
from the relationships that have been determined, determine whether any edges should be created within the learning graph between the new node and any other node within the learning graph;
wherein the learning graph comprises a plurality of nodes corresponding to the documents and a plurality of edges, each edge connecting two of the nodes and indicating a sequencing relationship between at least two of the documents to which the two of the nodes correspond that specifies an order in which the two of the documents are to be reviewed in satisfaction of a learning goal,
and wherein the learning graph is a directed graph specifying a learning path through the documents to achieve the learning goal in relation to a subject.

US Pat. No. 10,891,333

TRANSFERRING PLAYBACK FROM A MOBILE DEVICE TO A PLAYBACK DEVICE

Sonos, inc., Santa Barba...

1. A mobile device comprising:a user interface;
a network interface;
a processor;
a non-transitory computer-readable medium; and
program instructions stored on the non-transitory computer-readable medium that are executable by the processor to cause the mobile device to perform functions comprising:
while the mobile device is not connected to a local area network, playing back a media item on the mobile device;
connecting, via the network interface, to the local area network;
after connecting to the local area network, receiving, from a playback device via the network interface over the local area network, an indication that the playback device is available for playback;
displaying, on the user interface, a now playing screen, a first graphical representation of an icon, and information identifying a media item;
receiving, via the user interface, a first input selecting the first graphical representation of the icon;
in response to receiving the first input, displaying, on the user interface, a list of available playback devices, the list comprising the mobile device and the playback device, wherein the user interface indicates on the list that the mobile device is selected for playback of the media item;
receiving, via the user interface on the list, a second input selecting the playback device for playback of the media item; and
in response to receiving the second input:
a) updating the list to indicate that the playback device is selected for playback of the media item by displaying the playback device;
b) transferring playback of the media item from the mobile device to the playback device; and
c) displaying, on the now playing screen, a second graphical representation of the icon indicating that the playback device is playing back the media item.

US Pat. No. 10,891,332

INSTRUMENTATION DIAGRAM DATA GENERATION DEVICE, INSTRUMENTATION DIAGRAM SEARCH SYSTEM, AND COMPUTER READABLE MEDIUM

MITSUBISHI ELECTRIC CORPO...

1. An instrumentation diagram data generation device comprising:processing circuitry
to acquire a digital instrumentation diagram, and
to acquire instrumentation apparatus information including model numbers of apparatuses that can be drawn on the instrumentation diagram and configurations of the apparatuses, to extract a model number from an apparatus table included in the instrumentation diagram and containing a correspondence relation between signs of the apparatuses on a drawing and model numbers of the apparatuses, by image-analyzing the instrumentation diagram, to identify an apparatus corresponding to the extracted model number by referring to the instrumentation apparatus information, to decide a temperature control method employed by an instrumentation indicated in the instrumentation diagram based on the identified apparatus, and to associate the decided temperature control method with the instrumentation diagram and to save the temperature control method in a case database.

US Pat. No. 10,891,331

SKIN TONE FILTER

Pinterest, Inc., San Fra...

1. A method comprising:receiving a set of images at a social media system, wherein each image includes one or more recognized features, and wherein each recognized feature is associated with one or more lightness values;
indexing each image in the set of images using the one or more recognized features and the associated range of lightness values;
receiving a query from a user device;
determining a first group of images from the set of images that is responsive to the query;
determining that the query is a query that triggers a lightness filter to be displayed on the user device;
providing the first group of images for display on a user interface of the user device, the user interface including one or more lightness filter indicators, each lightness filter indicator being associated with a range of lightness values; and
in response to a user selection of one of the one or more lightness filter indicators:
filtering the first group of images according to a range of lightness values of the selected lightness filter indicator and the one or more lightness values associated with each image of the first group of images to determine a filtered group of images, and
updating the images provided for display according to the filtered group of images.

US Pat. No. 10,891,330

PROCESSING IMAGES FROM A GAZE TRACKING DEVICE TO PROVIDE LOCATION INFORMATION FOR TRACKED ENTITIES

International Business Ma...

1. A computer program product for providing location information in communication with a gaze tracking device operated by a user, the computer program product comprising a computer readable storage medium having computer readable program code embodied therein that executes to perform operations, the operations comprising:generating a tracking database object in a database including a gazed image in a recorded image captured by the gaze tracking device and a location of the gazed image, wherein the recorded image further includes a proximate image located proximate to the gazed image in the recorded image;
determining whether there is a preexisting location database object in the database having a location image matching the proximate image;
creating a location database object in the database including a location image matching the proximate image in response to determining that there is no preexisting location database object in the database having the location image matching the proximate image;
creating a location association entry in the database associating the tracking database object with one of the preexisting location database object, in response to determining there is the preexisting location database object, and the created location database object, in response to determining there is no preexisting location database object; and
outputting a description of the location in the location database object associated by the location association entry with the tracking database object in response to a request to locate the gazed image in the tracking database object.

US Pat. No. 10,891,329

IMAGE RECOGNITION METHOD AND IMAGE RECOGNITION APPARATUS

Canon Kabushiki Kaisha, ...

1. An apparatus for processing an image including a target object, comprising:one or more processors; and
at least one memory coupled to the one or more processors, the at least one memory having stored thereon instructions which, when executed by the one or more processors, cause the apparatus to:
obtain a plurality of partial target images from a target image including the target object;
discriminate a feature of each of the plurality of partial target images;
estimate, for each of the plurality of partial target images, a class of the target object and a position of the target object in the target image, by referring to a dictionary based on the discriminated feature and a position of each of the plurality of partial target images, wherein in the dictionary, for a plurality of partial learning images obtained by dividing respective one of a plurality of learning images each including the target object, a feature of each partial learning image is registered in correspondence with a class of the target object included in a learning image which contains the partial learning image;
vote, with respect to each of the plurality of partial target images, for a combination of the estimated class of the target object and the estimated position of the target object in the target image; and
recognize the class of the target object and the position of the target object in the target image by aggregating results of the voting for the plurality of partial target images.

US Pat. No. 10,891,328

SYSTEM FOR PROVIDING LIFE LOG SERVICE AND METHOD OF PROVIDING THE SERVICE

SAMSUNG ELECTRONICS CO., ...

1. A device comprising:a display for displaying a map on a first display area; and
a processor configured to:
detect position information of the device,
control the display to display the map on the first display area based on the detected position information of the device,
obtain a piece of content generated by the device at an area surrounding the detected position information, the piece of content being generated based on a user activity according to a user input via the device,
display the piece of content with a timestamp in time series on a second display area of the display, and
to display a marker corresponding to the piece of content on the map, synchronize the map and the piece of content,
wherein the timestamp is based on a time at which the piece of content is generated.

US Pat. No. 10,891,327

COMPUTER-BASED SYSTEMS AND METHODS CONFIGURED TO UTILIZE AUTOMATING DEPLOYMENT OF PREDICTIVE MODELS FOR MACHINE LEARNING TASKS

Capital One Services, LLC...

1. A method comprising:receiving, by one or more processors, a first application program interface (API) call comprising an input data value;
determining, by the one or more processors using a model wrapper, a score relating to the input data value, wherein the model wrapper is generated by applying a model wrapper code to a feature generation, a data grouping code, and a modeling code, wherein:
the feature generation code is configured to determine features relating to input data,
the data grouping code is configured to generate training data by determining a plurality of data groupings for the features relating to the input data, and
the modeling code is derived at least in part by applying one or more machine learning algorithms to the training data; and
sending, by the one or more processors, in response to the first API call, a second API call comprising the score.

US Pat. No. 10,891,326

REPRESENTATION OF A DATA ANALYSIS USING A FLOW GRAPH

INTERNATIONAL BUSINESS MA...

1. A system comprising:a memory that stores computer executable components;
a processor that executes computer executable components stored in the memory, wherein the computer executable components comprise:a graphing component that generates a directed acyclic graph that represents an object flow during an execution of a data analysis program, wherein a node of the directed acyclic graph represents a function call to a function of a plurality of function calls to functions during the execution of the data analysis program, and wherein an edge connected to the node represents an output of the function associated with the function call;a taxonomy component that identifies a taxonomy of functions;
an annotation component that:
for respective recognized function calls of the plurality of function calls, annotates first vertices of the directed acyclic graph corresponding to the respective recognized function calls with their matching annotation labels, resulting in an annotated directed acyclic graph, wherein a recognized function call is associated with a recognized function of the functions that is determined to have a matching annotation label assigned to the recognized function in a set of annotation databases, and
for respective unrecognized function calls of the plurality of function calls, removes second vertices from the annotated directed acyclic graph corresponding to the respective unrecognized function calls and removes edges connected to the second vertices from the annotated directed acyclic graph, wherein an unrecognized function call is associated with an unrecognized function of the functions that is determined not to have the matching annotation label assigned to the unrecognized function in the set of annotation databases, wherein the taxonomy component further taxonomizes the annotated directed acyclic graph based on the taxonomy of functions and the respective recognized function calls, resulting in the respective recognized function calls being semantically grouped by concept in a semantic directed acyclic graph;
annotates the node of the directed acyclic graph with a name of the function associated with the function call;
annotates the edge with a name of the object being output by the function; andannotates first the vertices based on an annotation database of the set of annotation databases, selected based on a type of programming language of the data analysis program;a semantic labeling component that matches the semantic directed acyclic graph to a set of semantic labels in a knowledge database, resulting in a semantic directed acyclic graph; and
a tracking component that tracks semantic labels of the set of semantic labels matched by the semantic labeling component over a plurality of runs of data analysis programs.

US Pat. No. 10,891,325

DEFECT RECORD CLASSIFICATION

INTERNATIONAL BUSINESS MA...

1. A method comprising:receiving, by at least one computing device, a defect record associated with a defect;
predicting a recommended plain language phrase or word based on a user input from a user and how many times within a predetermined time period a plain language phrase or word has been previously selected in response to the user input being included in a plain language dictionary;
classifying the defect record based on the recommended plain language phrase or word;
sending the classified defect record to another computing device to analyze the defect record to find out how the defect record was determined and how the defect record was resolved; and
resolving the defect record,
wherein how the defect is resolved includes a resolution description which defines what is necessary to resolve the defect, and
the resolution description includes at least one of adding, removing, and correcting elements of a system being tested.

US Pat. No. 10,891,324

WEIGHTING OF UNOBSERVED TERMS IN A LANGUAGE MODEL FOR INFORMATION RETRIEVAL USING LEXICAL RESOURCES

International Business Ma...

1. A method of retrieving information comprising:obtaining access to a plurality of documents comprising document terms;
receiving a lexicon including a plurality of lexical terms;
receiving a query;
identifying a plurality of search terms in the query by decomposing the query;
determining at least one match of the search terms to the lexical terms;
determining a plurality of matches of the search terms to the document terms; and
scoring each of the documents based on the at least one match to the lexical terms and the matches to the document terms.

US Pat. No. 10,891,323

PROCESSING AND DELIVERY OF PRIVATE ELECTRONIC DOCUMENTS

West Corporation, Omaha,...

1. A method comprising:receiving a document comprising a plurality of pages comprising a plurality of reports, each report containing a unique identifier identifying a unique user associated with a corresponding report;
identifying at least one extraction attribute in the document that is associated with a first report, of the plurality of reports, the at least one extraction attribute comprising a first unique identifier associated with the first report and information identifying a number of pages of the document associated with the first unique;
querying the document for the at least one extraction attribute;
generating a map by identifying, on each page of the document having the first unique identifier, coordinates associated with the at least one extraction attribute based on a proximity of the first unique identifier to information associated with the unique user;
validating the at least one extraction attribute using at one additional extraction attribute to identify and remove extraneous information from the at least one extraction attribute;
extracting information from a bounding box of text from the document, which is defined by the coordinates, of each page of the document that contains the first unique identifier; and
creating a new document comprising the extracted information from the first report.

US Pat. No. 10,891,322

AUTOMATIC CONVERSATION CREATOR FOR NEWS

Microsoft Technology Lice...

1. A computing device comprising:a processor;
a display device; and
a computer-readable storage medium in communication with the processor, the computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by the processor, cause the computing device to:
identify lexical-level features for a plurality of pairs of comments and replies previously posted to one or more content item webpages, the lexical-level features including identifying a cosine similarity between two vectors, a first of the two vectors representing a comment of one of the plurality of pairs of comments and replies and a second of the two vectors representing a reply of the one of the plurality of pairs of comments and replies, the two vectors associated with a term frequency of a term in the one of the pair of the plurality of replies and comments;
receive information associated with a content item produced by a source system, the content item being accessible to other computing devices via a network;
in response to receiving the information, identify a start comment;
in response to identifying the start comment, create a reply to the start comment using at least a ranking model, the ranking model created at least in part on the identified lexical-level features; and
output the start comment and the reply.

US Pat. No. 10,891,321

SYSTEMS AND METHODS FOR PERFORMING A COMPUTER-IMPLEMENTED PRIOR ART SEARCH

American Chemical Society...

10. A computer program product comprising a non-transitory computer readable medium having a computer readable program embodied therein, wherein the computer readable program, when executed on a computing device, causes the computing device to:receive a search document, the search document comprising a set of words;
apply a first encoder to the set of words to generate a first vector;
apply a second encoder to the set of words to generate a second vector;
determine a first similarity between the first vector of the search document and the first vector of each document of the corpus of documents;
determine a second similarity between the second vector of the search document and the second vector of each document of the corpus of documents;
generate a first ranked list of documents in the corpus based on the first similarity;
generate a second ranked list of documents in the corpus based on the second similarity;
apply a voting algorithm to determine a score associated with each document based on a position of each document in its relative ranked list; and
output a third ranked list of documents based on the determined score.

US Pat. No. 10,891,320

DIGITAL CONTENT EXCERPT IDENTIFICATION

Amazon Technologies, Inc....

13. A method, comprising:determining, based at least in part on one or more first reviews of digital content of a first digital work, a first number of references to a first excerpt of the digital content, wherein the first number of references is determined using first metadata associated with one or more word locations of the first excerpt;
determining, based at least in part on one or more second reviews of the digital content, a second number of references to a second excerpt of the digital content, wherein the second number of references is determined using second metadata associated with one or more word locations of the second excerpt;
determining, based at least in part on the first number and the second number, a ranking of the first excerpt relative to the second excerpt;
selecting, based at least in part on the ranking, a first set of excerpts, the first set of excerpts corresponding to one or more excerpts from each of multiple sections of the digital content, the first set of excerpts including the first excerpt;
associating, for presentation, the first set of excerpts and the digital content;
determining related digital content of a second digital work, the related digital content corresponding to the digital content by at least one of common authorship, a common topic, or a common series;
identifying a third excerpt and a fourth excerpt of the related digital content by at least one of:
a number of interactions by readers with the third excerpt or the fourth excerpt; or
a number of reviews that reference the third excerpt or the fourth excerpt;
identifying at least one of a topic or an entity included in the first excerpt;
determining that the third excerpt and the fourth excerpt are associated with at least one of the topic or the entity; and
generating a user interface configured to display at least one of the third excerpt or the fourth excerpt in conjunction with the first set of excerpts and the digital content, wherein the user interface includes a navigational element configured to allow navigation between the third excerpt and the fourth excerpt while displaying the first set of excerpts.

US Pat. No. 10,891,319

EASY CLUSTERING OF GRAPHS OF NODES PRESERVING NODE RELATIONSHIPS

International Business Ma...

1. A computer-implemented method of real-time rendering representations of objects in a view, said objects including clusters of nodes of a graph structure and links between said clusters, wherein the graph structure comprises edges defined as pairs of the nodes, in addition to said nodes, and wherein the method comprises, at run-time:receiving user inputs in respect to a current view;
updating a data structure that associates multiple identifiers, the multiple identifiers including at least cluster identifiers, node identifiers, and link identifiers, wherein said multiple identifiers respectively identify clusters of nodes, nodes of said graph, and links between pairs of clusters, and wherein the data structure is updated by at least:
computing properties of nodes in the view to be rendered, based on the user inputs received, and selecting corresponding node identifiers,
updating cluster identifiers associated to the selected node identifiers, based on said computed properties, and
updating link identifiers associated to the updated cluster identifiers, according to edges between pair of nodes connected to the selected node identifiers; and
rendering representations of clusters and links as identified by corresponding cluster identifiers and associated link identifiers in the updated data structure.

US Pat. No. 10,891,318

TEMPORAL LOGIC FUSION OF REAL TIME DATA

United States of America ...

1. A method comprising:receiving a plurality of inputs for a plurality of behavior classes, the inputs selected from the group consisting of single- or multi-dimensional states sampled over time;
computing the distance parameter pairwise among the inputs, wherein the computing is performed using dynamic time warping;
mapping the high-dimension input signals into a 2-dimensional (2-D) space using t-distributed Stochastic Neighbor Embedding, wherein the pairwise computation is used as a distance metric required to perform said mapping for each said behavior class, respectively;
clustering the high-dimension input signals in the 2-D space via a k-means clustering algorithm;
generating a signal temporal logic (STL) expression that distinguishes between a cluster in a behavior class and all high-dimension input signals not in that behavior class; and
repeating the generating step for each cluster in that behavior class, wherein the resulting STL expressions are combined via an “or” operator in Inference Parametric Signal Temporal Logic (iPSTL).

US Pat. No. 10,891,317

COHORT SELECTION WITH PRIVACY PROTECTION

23andMe, Inc., Sunnyvale...

1. A system, comprising:one or more processors configured to:
receive genetic characteristic information and/or phenotypic characteristic information pertaining to a desired genetic characteristic and/or phenotypic characteristic;
searching one or more data stores comprising genetic information and/or phenotypic information of individuals for whom genetic information and phenotypic information have been previously obtained to identify a candidate group comprising a plurality of individuals having the desired genetic characteristic and/or phenotypic characteristic;
looking up contact information comprising address information, wherein the one or more data stores further comprise contact information of each of the individuals for whom genetic information and phenotypic information have been previously obtained and for whom the genetic information and/or phenotypic information is/are stored in the one or more data stores;
assemble a cohort of one or more individuals based at least in part on the desired genetic characteristic and/or phenotypic characteristic and the contact information of the plurality of individuals of the candidate group;
in response to a request by a first user, having a first assigned role permitting access to genetic information and/or phenotypic information of each of the individuals for whom genetic information and phenotypic information have been previously obtained and for whom the genetic information and/or phenotypic information is/are stored in the one or more data stores, to gain access to the genetic information and/or phenotypic information of the one or more individuals of the cohort, send at least some data pertaining to the genetic information and/or phenotypic information in the one or more data stores for the one or more individuals of the cohort, and prevent, pursuant to the first assigned role, the first user from accessing data pertaining to contact information of the one or more individuals of the cohort; and
in response to a request by a second user, having a second assigned role permitting access to contact information of each of the individuals for whom genetic information and phenotypic information have been previously obtained and for whom the genetic information and/or phenotypic information is/are stored in the one or more data stores, to gain access to contact information of the one or more individuals of the cohort, send data pertaining to the contact information of the one or more individuals of the cohort and prevent, pursuant to the second assigned role, the second user from accessing data pertaining to the genetic information and/or phenotypic information in the one or more data stores of the one or more individuals of the cohort.

US Pat. No. 10,891,316

IDENTIFYING HOMOGENOUS CLUSTERS

salesforce.com, inc., Sa...

1. A computer implemented method for generating homogeneous clusters from a first plurality of documents for generation of regular expressions, the method comprising:clustering the first plurality of documents into a first plurality of clusters, wherein each of the first plurality of documents is included in only one of the clusters, wherein each of the clusters includes one or more of the documents and wherein the documents in each cluster share certain characteristics more closely with each other than the documents of the other clusters in the first plurality of clusters;
for each cluster in the first plurality of clusters:
generating a word distribution for each document in the cluster;
assigning, using the word distribution, each word to a probability group;
determining features for the cluster based on a percentage of words in each probability group;
determining a homogeneity score by applying a model to the features for the cluster, wherein the model was generated using manually generated training data; and
sending those of the first plurality of clusters for which the homogeneity score exceeds a homogeneity threshold to an automatic regular expression generator.

US Pat. No. 10,891,315

LANDMARK POINT SELECTION

Ayasdi AI LLC, Redwood C...

1. A method comprising:receiving data points;
selecting a first subset of the data points from the data points to generate an initial set of landmarks and an initial subset of non-landmark data points, each of the initial set of landmarks being a landmark;
for each non-landmark data point of the initial subset of non-landmark data points,
calculating first data point distances between the non-landmark data point and each landmark of the initial set of landmarks; and
identifying a first shortest data point distance from among the first data point distances between the non-landmark data point and each landmark;
identifying a first particular non-landmark data point with the the first shortest data point distance that is longest in comparison with other first shortest data point distances of other non-landmark data points; and
adding the first particular non-landmark data point to the initial set of landmarks to generate an expanded set of landmarks.

US Pat. No. 10,891,314

DETECTION AND CREATION OF APPROPRIATE ROW CONCEPT DURING AUTOMATED MODEL GENERATION

International Business Ma...

1. A method comprising:selecting a dataset that includes a plurality of records, each record including each of a plurality of named fields;
assigning each named field to a category; and
selecting a concept, wherein selecting the concept includes:
identifying, as potential concept categories, categories with one or more named fields that, alone or when combined, provide a unique value for each record;
if only one category has been identified as a potential concept category, assigning the concept based on the named fields of the potential concept category;
if two or more categories have been identified as potential concept categories, grouping the potential concept categories and assigning the concept based on the grouped categories;
if no categories have been identified as potential concept categories, determining whether the named fields from two or more categories, when combined, provide a unique value for each record and, if the named fields from two or more categories, when combined, provide a unique value for each record, assigning the concept based on a combination of the two or more categories; and
if no categories have been identified as potential concept categories and if no combination of named fields from two or more categories provides a unique value for each record, adding a new named field, wherein adding the new named field includes associating the new named field with one of the categories, assigning a unique value in the new named field for each record, and assigning the concept based on the category of the new named field.

US Pat. No. 10,891,313

SYSTEMS AND METHODS FOR SENSORY AND COGNITIVE PROFILING

THE REGENTS OF THE UNIVER...

1. A portable system for measuring brain waves to determine cerebral ability, comprising:a wearable sensor device including a flexible substrate, electrodes on the flexible substrate, and a wireless transmitter in electrical communication with the electrodes, the wearable sensor device configured to record electrophysiological signals of a subject and transmit the recorded electrophysiological signals by the wireless transmitter to an external computing device, wherein the wearable sensor device is operable to detect the electrophysiological signals exhibited by the subject before, during, and after a presentation of a sequence of stimuli to the subject, the sequence of stimuli based on a cognitive-sensory profile category from among one or more of a cognitive performance profile, a sensory performance profile, or a cognitive and sensory performance profile;
a mobile communications device in wireless communication with the wearable sensor device, the mobile communications device including a data processing unit, including a processor and memory, and a stimulus generation unit, wherein the data processing unit is operable to process the electrophysiological signals as physiological data to generate an information set including one or more quantitative values associated with the cognitive-sensory profile category, and the stimulus generation unit is operable to produce the sequence of stimuli that is presented to the subject by a display in communication with the data processing unit; and
a brain-machine interface to produce a modified sequence of stimuli by adaptively modifying the sequence of stimuli during an on-going presentation of the stimuli to the subject, wherein the modified sequence of stimuli is based on data associated with or derived from the generated information set,
wherein the information set is generated by the data processing unit without requiring a behavioral response by the subject to the sequence of stimuli.

US Pat. No. 10,891,312

SHARING INFORMATION BETWEEN NEXUSES THAT USE DIFFERENT CLASSIFICATION SCHEMES FOR INFORMATION ACCESS CONTROL

Palantir Technologies Inc...

1. A method, comprising:exporting a first copy of data associated with an access control list and stored by a first database system to a second database system, the data stored by the first database system subject to a first classification designation, the first classification designation used by the first database system for controlling access to information stored by the first database system;
during import of the first copy of the data exported:
determining that the first copy of the data exported corresponds with a particular translation path that is the shortest among a plurality of translation paths identified in the first copy of data, the particular translation path indicating a particular origin classification associated with a particular classification designation and for updating the access control list, and, in response, mapping, using a translation map associated with the second database system, the first classification designation to a second classification designation, the second classification designation used by the second database system for controlling access to information stored by the second database system, the first classification designation being different than the second classification designation; and
causing the second database system to store a second copy of the data subject to the second classification designation.

US Pat. No. 10,891,311

METHOD FOR GENERATING SYNTHETIC DATA SETS AT SCALE WITH NON-REDUNDANT PARTITIONING

RED HAT, INC., Raleigh, ...

1. A method comprising:receiving, by a clustering module, a plurality of data sets, wherein each data set of the plurality of data sets includes a plurality of attributes;
partitioning, by the clustering module, the plurality of data sets into a plurality of clustered data sets including at least a first clustered data set and a second clustered data set, wherein each data set of the plurality of data sets is partitioned into one of the plurality of clustered data sets;
assigning, by a training module, a respective stochastic model to each respective clustered data set of the plurality of clustered data sets including:
assigning a first stochastic model to the first clustered data set, and
assigning a second stochastic model to the second clustered data set;
selecting, by a first machine including a first memory and one or more processors in communication with the first memory, the first clustered data set and the first stochastic model;
selecting, by a second machine that is different from the first machine, the second machine including a second memory and one or more processors in communication with the second memory, the second clustered data set and the second stochastic model;
generating, by the first machine with the first stochastic model, a first synthetic data set, wherein the first synthetic data set has generated data for each one of the plurality of attributes;
generating, by the second machine with the second stochastic model, a second synthetic data set, wherein the second synthetic data set has generated data for each one of the plurality of attributes; and
testing at least one of an application and a database using each of the first synthetic data set and the second synthetic data set.

US Pat. No. 10,891,310

METHOD AND APPARATUS FOR MODIFYING AN OBJECT SOCIAL NETWORK

BEULAHWORKS, LLC, Valpar...

1. A method for analyzing data, the method comprising:storing, by at least one processing device in at least one storage device of a database complex that includes a plurality of database servers each capable of storing a dataset in a different data storage format and communicatively coupled to the at least one processing device, data as a plurality of objects and relationships between the plurality of objects, wherein the relationships between the plurality of objects establish an object social network and the storing further includes determining a set of characteristics of a sample data set of the data, determining a precision and accuracy of each of a plurality of pre-processed datasets produced by executing each of a plurality of pre-processing algorithms on the sample dataset, selecting, as a function of the determined precision and accuracy, one of the pre-processing algorithms to pre-process additional data, and pre-processing the additional data using the selected pre-processing algorithm;
performing, by the at least one processing device, root cause analysis on at least a portion of the object social network stored in the database complex to identify a potential causal relationship between a first object of the plurality of objects and a second object of the plurality of objects; and
modifying, by the at least one processing device in the at least one storage device of the database complex, the object social network based on the potential causal relationship between the first object and the second object.

US Pat. No. 10,891,309

DATA DUPLICATION DETECTION IN AN IN MEMORY DATA GRID (IMDG)

International Business Ma...

1. A method for data duplication detection in an in memory data grid (IMDG), the method comprising:invoking an agent within each partition of the IMDG to create a duplication check map for the agent's partition, each duplication check map is configured to store different hash values of binary data associated with one or more keys for the binary data stored within the agent's partition;
run-time loading the binary data into corresponding nodes of the IMDG of a multiplicity of nodes, each node storing key value pairs corresponding to the binary data stored therein;
computing, by a processor of a computer, a hash value for each binary data value in a key value pair of a partition in the IMDG;
analyzing, by each agent, a collection of the different hash values of the key value pairs to determine whether the hash value computed for each binary data value is already present within the duplication check map of the agent's partition;
storing in association with one another, different of the key-value pairs corresponding to the binary data of the key value pairs that share a same one of the different hash values within the agent's partition to the duplication check map for the agent's partition;
polling each agent to determine when the duplication check map is completed for each corresponding partition;
loading each duplication check map that is completed, for each corresponding partition, into memory of the computer;
identifying only those hash values in each duplication check map with multiple keys associated therewith and bypassing the hash values comprising a single associated key;
reporting data corresponding to the multiple keys of the identified hash values as potential duplicate data in the IMDG;
removing from the nodes of the IMDG ones of the multiple keys corresponding to the potential duplicate data;
generating a report indicating identified hash values with multiple keys associated therewith and the ones of the multiple keys removed from the nodes of the IMDG.

US Pat. No. 10,891,308

AUTOMATED SELF-SCALING DATABASE SYSTEM FOR AUTOMATICALLY SCALING OUT WRITE OPERATIONS AND METHOD FOR IMPLEMENTING THE SAME IN A MULTI-TENANT, CLOUD-BASED COMPUTING ENVIRONMENT

salesforce.com, inc., Sa...

1. A method for automatically scaling out write operations in an automated self-scaling database system that process read requests and write requests from a plurality of tenants, wherein the automated self-scaling database system comprises an automated self-scaling database module, one or more application servers, a first primary database and a first standby database, the method comprising:analyzing, at the automated self-scaling database module, telemetry information from the first primary database to determine whether the first primary database has reached a maximum computation and storage capacity such that there is the need for upscaling storage capacity and computation resources of the database system for write operations;
automatically initiating a write scaling process when the automated self-scaling database module determines that upscaling is needed for write operations by:
automatically provisioning, via the automated self-scaling database module, a new primary database;
distributing, via the automated self-scaling database module after the new primary database is active, the plurality of tenants among the first primary database and the new primary database, wherein the first primary database handles read requests and write requests that originate from a first group of the tenants, and the new primary database handles read requests and write requests that originate from a second group of the tenants;
notifying, via the automated self-scaling database module after the new primary database is active, the application servers to enable read-only application mode to temporarily block the write requests that originate from the second group of the tenants on the first primary database, wherein the application servers temporarily block the write requests that originate from the second group of the tenants and apply any changes for the second group of the tenants between the time snapshot was taken and a present time to the new primary database;
determining, at the automated self-scaling database module whether data for the second group of tenants is synchronized between first primary database and the new primary database;
notifying the application servers of a new tenant-database mapping, via the automated self-scaling database module, when the data for the second group of tenants is synchronized between the first primary database and the new primary database; and
notifying the application servers, via the automated self-scaling database module, to route the read requests and write requests from the second group of tenants to the new primary database.

US Pat. No. 10,891,307

DISTRIBUTED DATA SYNCHRONIZATION IN A DISTRIBUTED COMPUTING SYSTEM

MICROSOFT TECHNOLOGY LICE...

1. A system for implementing distributed data synchronization in a distributed computing system, the system comprising:one or more processors; and
one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to execute:
accessing a first data record of a first data set;
encoding the first data record into a first distributed invertible bloom filter (DIBF) data structure, wherein encoding the first data record generates, for the first DIBF data structure, a first DIBF record based on the first data record, wherein the first DIBF record comprises a data field and a quantifier field, wherein the quantifier field includes a quantifier value that indicates a quantity of references that a plurality of server hosts use to access the first data record;
accessing the first DIBF data structure and an encoded second DIBF data structure, wherein the second DIBF data structure comprises a second DIBF record;
decoding the first DIBF data structure and the second DIBF data structure, wherein decoding the first DIBF data structure and the second DIBF data structure comprises computing a difference between at least the quantifier value of the first DIBF data structure and a quantifier value of the second DIBF data structure;
based on decoding the first DIBF data structure and the second DIBF data structure, determining that a match exists between the first data DIBF data structure and the second DIBF data structure; and
based on decoding the first DIBF data structure and the second DIBF data structure, determining that a match does not exist between the first data DIBF data structure and the second DIBF data structure.

US Pat. No. 10,891,306

QUERY PLANS FOR ANALYTIC SQL CONSTRUCTS

Snowflake Inc., San Mate...

1. A method comprising:receiving a query pertaining to a set of data stored in one or more databases;
accessing a query execution plan comprising one or more steps to be performed on a set of data pertaining to the query;
initiating, within one or more of a first set of processors, a first parallel execution process in the query execution plan to process the set of data and generate an intermediate result of a query;
providing, by the one or more of the first set of processors, during execution of the query execution plan, the intermediate result to a plurality of a second set of processors for processing a plurality of secondary parallel execution processes within the plurality of the second set of processors, wherein each of the first set of processors and the plurality of the second set of processors is decoupled from a data storage device;
initiating, by the one or more of the plurality of the second set of processors, the plurality of secondary parallel execution processes to process the intermediate result to generate a plurality of secondary results; and
storing a final result to storage within a storage platform.

US Pat. No. 10,891,305

SYNCHRONIZATION OF DATA BETWEEN SYSTEMS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method, within a controlled data system connected to a controlling data system via an event propagation processor, for synchronization of data between the controlled data system and the controlling data system, comprising:transmitting, from the controlled data system and to the event propagation processor, an event that corresponds to a change in data initiated within the controlled data system and includes a null foreign key;
receiving, from the event propagation processor, a resultant record originating from the controlled data system; and
updating the record within the controlled data system to include a foreign key included in the resultant record, wherein
the event is transmitted to the controlling data system via the event propagation processor,
the resultant record including the foreign key is transmitted to the controlled data system via the event propagating processor,
the change in the data involves a record within the controlled data system, and
the resultant record is based upon the event being received by the controlling data system.

US Pat. No. 10,891,304

DISTRIBUTED AND SCALABLE CLIENT-BASED STORAGE MANAGEMENT

Commvault Systems, Inc., ...

1. A data storage management system for using clients to manage storage operations, the system comprising:a first client comprising a first computing device, a client storage service, a client management database, and a data agent associated with data generated by the first computing device;
a second computing device comprising a storage manager and a management database that comprises information for managing storage operations at a plurality of clients in the data storage management system, including the first client;
wherein the client storage service, which executes on the first computing device is configured to:
(i) incorporate one or more portions of the management database that are received from the storage manager into the client management database at the first computing device, wherein each received portion comprises information that relates to the first client and not to other clients in the plurality of clients, and
(ii) manage storage operations for data generated by the first computing device by using the client management database at the first client to serve the data agent; and
wherein the client storage service is further configured to perform the (i) incorporate and (ii) manage operations only after determining that, for each portion of the management database received from the storage manager: a respective first hash value corresponding to each portion and supplied by the storage manager matches a respective second hash value corresponding to each portion and computed by the client storage service at the first client.

US Pat. No. 10,891,303

SYSTEM AND METHOD FOR EDITING DYNAMICALLY AGGREGATED DATA

VERIZON MEDIA INC., New ...

1. A method, comprising:receiving, by a computing device, a new edit related to one of a plurality of aggregate objects;
determining a rank for each of the plurality of aggregate objects based on a plurality of anchor points associated with the aggregate objects and data corresponding to interactions of a person corresponding to the respective aggregate object, each of the plurality of anchor points corresponding to one of the plurality of aggregate objects, each anchor point comprising a weight, the weight indicating a strength of a relationship of the new edit to the respective aggregate object;
determining, by the computing device, based on the weights of the plurality of anchor points, that the new edit corresponds to a first aggregate object by comparing a sum of weights for anchor points that point to the first aggregate object to a sum of weights for all anchor points; and
updating the first aggregate object based on the new edit.

US Pat. No. 10,891,302

SCALABLE SYNCHRONIZATION WITH CACHE AND INDEX MANAGEMENT

ACCENTURE GLOBAL SOLUTION...

1. A synchronization system for transmitting data to devices comprising:at least one processor;
a non-transitory computer readable medium storing machine-readable instructions that cause the at least one processor to:
update in a custom indexed change table, entries from a plurality of change tracking tables corresponding to individual databases of each of a plurality of applications;
generate a custom index for the custom indexed change table from unique change tracking identifiers assigned to the entries from the plurality of change tracking tables updated to the custom indexed change table;
receive from a device, a synchronization request for data associated with one of the plurality of applications, the synchronization request includes at least one synchronization parameter that is employed for retrieving the data requested by the device;
configure an index key from the at least one synchronization parameter;
access the custom index on a custom indexed change table for retrieving the data requested by the device;
determine if the custom indexed change table includes change tracking data associated with the synchronization request by employing the index key on the custom index, wherein the index key forms an entry in the custom index if the change tracking data associated with the synchronization request is included in the custom indexed change table;
if the change tracking data is included in the custom indexed change table,
transmit the data from a cache associated with the custom indexed change table to the device;
if the change tracking data requested by the device is not included in the custom indexed change table,
identify one or more databases connected to the synchronization system that include the data requested by the device;
retrieve the data requested by the device from the at least one database;
store the data retrieved from the one or more databases in a device facing database;
load the data retrieved from the device facing database into the cache associated the custom indexed change table; and
transmit the data from the cache to the device in response to the synchronization request.

US Pat. No. 10,891,301

SYNCHRONIZATION METHODS AND SYSTEMS

Apple Inc., Cupertino, C...

1. A non-transitory machine readable storage medium storing executable program instructions which when executed by a data processing system cause the data processing system to perform a method comprising:executing at least one non-synchronization processing thread that is provided by a user application which generates a user interface to allow a user to access and edit structured data of a first data class in a first database on a first device;
executing a first synchronization processing thread concurrently with execution of the at least one non-synchronization processing thread, wherein the first synchronization processing thread is provided by a first synchronization software component separate from the user application, and wherein the first synchronization software component is configured to retrieve structured data of the first data class from the first database and cause synchronization of the retrieved structured data of the first data class with structured data on a second device through a synchronization agent software component configured to maintain a data connection between the first device and a second device;
executing a second synchronization processing thread different from the first synchronization processing thread, wherein the second synchronization processing thread is provided by a second synchronization software component separate from the user application and the first synchronization software component, and wherein the second synchronization software component is configured to of the second data class from a second database on the first device different from the first database and cause synchronization of the retrieved structured data of the second data class with structured data on the second device through the synchronization agent software component.

US Pat. No. 10,891,300

SYNTACTICAL TRANSFORMATION OF DATABASE INTERACTION STATEMENTS

International Business Ma...

1. A computer-implemented method comprising:receiving a primary database interaction statement in SQL;
determining that the primary database interaction includes at least one SQL case statement portion, including a first SQL case statement portion;
determining that the primary database interaction statement includes at least one SQL case statement portion, including a first SQL case statement portion;
determining that the first SQL case statement portion is eligible for an SQL query optimization transformation based, at least in part, on comparing the first SQL case statement portion against a set of SQL transformation patterns, where a first SQL transformation pattern is an SQL case statement which evaluates an equation with a constant-returning function on one side of the equation, and a second SQL transformation pattern is an SQL case statement which evaluates an equation with a constant value on one side of the equation;
responsive to determining that the first SQL case statement portion comparison yielded a match with the first SQL transformation pattern, generating, by machine logic, a first set of intermediate SQL database interaction statements based, at least in part, on the first SQL case statement portion and a set of SQL intermediate statement guidelines corresponding to the set of SQL transformation patterns, where the set of SQL intermediate statement guidelines includes at least a first SQL intermediate statement guideline corresponding to the first SQL transformation pattern, where the first SQL intermediate statement guideline stipulates that, for each given constant in the first SQL case statement portion, generate a select case statement which returns an integer value of 1 if the given constant is equal to output of the constant-returning function and a value of 0 if they are not equal;
responsive to generating at least one SQL intermediate statement based upon the first SQL intermediate statement guideline and the first SQL case statement portion, for each given SQL intermediate statement of the first set of intermediate SQL interaction statements, determining, by machine logic, the results of the given SQL intermediate statement of the first set of intermediate SQL interaction statements;
selecting, by machine logic, a first SQL intermediate statement transformation indicator from a set of SQL intermediate statement indicators based, at least in part, on the determined results of at least one SQL intermediate statement of the first set of intermediate SQL interaction statements, where the first SQL intermediate statement transformation indicator indicates replacing the first SQL case statement portion of the primary database interaction statement with a count function multiplied by a numerical value, where the numerical value is based upon the determined results of the at least one SQL intermediate statement of the first set of intermediate SQL interaction statements; and
transforming the primary database interaction statement into a transformed database interaction statement, where the transformed database interactions statement includes replacement of the first SQL case statement portion of the primary database interaction statement with a first transformed SQL query portion that is based on the selected first SQL intermediate transformation indicator, where execution of the transformed database interaction statement requires reduced computation resources relative to the primary database interaction statement.

US Pat. No. 10,891,299

SYSTEM AND METHODS FOR SEARCHING AND COMMUNICATION

LIVEPERSON, INC., New Yo...

1. A computer-implemented method, comprising:storing topic data for a plurality of topics and profile data for a plurality of profiles, wherein topics are associated with one or more corresponding profiles;
receiving search criteria;
determining that the search criteria matches a topic associated with a set of profiles;
identifying one or more active profiles of the set of profiles;
associating one or more real-time interaction options with the set of profiles;
tracking revenue associated with the plurality of profiles, wherein a ranking for a profile is based on revenue associated with the profile, and wherein at least one device is associated with the profile;
generating status data, wherein the status data corresponds to the set of profiles, and wherein when the status data is received at a remote search engine, the status data facilitates generating an ordered listing of the set of profiles in an ordered listing of search results at the remote search engine;
transmitting the status data; and
receiving, in response to the transmitting the status data, data corresponding to a selection of an interactive element associated with the status data, wherein the selection of the interactive element facilitates a real-time interaction option among two or more devices.

US Pat. No. 10,891,298

SYSTEMS AND METHODS FOR PACKAGE COMPONENT VISUALIZATIONS

salesforce.com, inc., Sa...

1. A computing system comprising:a data storage element to maintain a code package comprising a plurality of classes, wherein for each class of the plurality of classes the data storage element maintains source code corresponding to the respective class and a compiled version of the source code; and
a server comprising a processing system coupled to the data storage element and a network to:
receive a request corresponding to a first class of the plurality of classes from the network;
retrieve the compiled version of the source code corresponding to the first class from the data storage element;
decompile the retrieved compiled version of the source code corresponding to the first class to obtain a decompiled version of the source code corresponding to the first class;
analyze the decompiled version of the source code corresponding to the first class based on a global access modifier that permits selective viewing of global source code components associated with the first class to identify non-global source code components within the first class having a public access modifier and lacking the global access modifier;
automatically filter the decompiled version of the source code corresponding to the first class to remove the non-global source code components and obtain filtered source code corresponding to the first class; and
generate a visualization of the filtered source code corresponding to the first class, wherein the visualization of the filtered source code includes graphical representations of the global source code components of the first class designated with the global access modifier that permits selective viewing while the non-global source code components having the public access modifier are hidden from presentation in the visualization of the filtered source code.

US Pat. No. 10,891,297

METHOD AND SYSTEM FOR IMPLEMENTING COLLECTION-WISE PROCESSING IN A LOG ANALYTICS SYSTEM

Oracle International Corp...

1. A method comprising:responsive to receiving log data comprising a plurality of log entries:
storing a first copy of the log data in an indexed data store including a plurality of partitions;
indexing the log data in the indexed data store based on a plurality of temporal ranges associated, respectively, with the plurality of partitions;
grouping the plurality of log entries based on parameters associated with the log data to generate a second copy of the log data, wherein the parameters comprises two or more of:
a first set of identifiers identifying respective tenants associated with the plurality of log entries;
a second set of identifiers identifying respective targets, within a computing environment, from which the plurality of log entries are obtained; and
a third set of identifiers identifying respective sources in which the respective targets store the plurality of log entries;
storing the second copy of the log data, which is grouped based on the parameters, in a historical data store;
wherein the historical data store further comprises historical log data associated with times older than the plurality of temporal ranges in the indexed data store;
wherein the indexed data store and the historical data store are separate;
executing a first log query at least by:
determining a first temporal range associated with the first log query;
responsive to determining that the first temporal range is within one or more temporal ranges of the plurality of temporal ranges:
selecting the indexed data store rather than the historical data store for executing the first log query;
applying the first log query to one or more partitions, in the plurality of partitions, that correspond to the one or more temporal ranges;
executing a second log query at least by:
determining a second temporal range associated with the second log query;
responsive to determining that at least a first portion of the second temporal range is not within the plurality of temporal ranges:
selecting the historical data store rather than the indexed data store for executing the second log query;
applying the second log query to the historical data store;
wherein the method is performed by at least one device comprising a hardware processor.

US Pat. No. 10,891,296

SEARCH ENGINE FOR INDUSTRIAL ANALYSIS DEVELOPMENT TOOLSET

ABB Schweiz AG, Baden (C...

1. A computer implemented method of analyzing and ranking compatibility of combinations of a data set and a plurality of data analysis tools operable to analyze the data sets, the method comprising:tagging the plurality of data analysis tools with one or more metadata tags selected from a plurality of metadata tags, each of the plurality of metadata tags indicating a data analysis tool characteristic or a data set characteristic, each data analysis tool characteristic indicating at least one of an attribute of an input used by a corresponding data analysis tool and an attribute of a processing operation performed by the corresponding data analysis tool;
tagging the data set with one or more metadata tags selected from the plurality of metadata tags, the selected metadata tags having a characteristic matching the data set characteristic of the data set;
receiving a request to rank combinations of the data set and the plurality of data analysis tools;
scoring a plurality of combinations of the plurality of data analysis tools and the data set according to correspondence between the metadata tags tagged to each of the plurality of data analysis tools and the metadata tags tagged to the data set; and
outputting a ranking of the plurality of combinations indicating the scoring.

US Pat. No. 10,891,295

METHODS AND SYSTEMS USING LINEAR EXPRESSIONS FOR MACHINE LEARNING MODELS TO RANK SEARCH RESULTS

Apple Inc., Cupertino, C...

1. A method for a computer comprising:generating a decision tree for ranking search results for a machine learning (ML) model;
converting the decision tree into a linear expression including Boolean terms;
transmitting the linear expression to one or more search computers, wherein the one or more search computers use the linear expression directly to rank search results;
modifying the ML model and the decision tree;
converting the modified decision tree into a modified linear expression; and
transmitting the modified linear expression to the one or more search computers, wherein the one or more search computers use the linear expression or the modified linear expression to rank search results without modifying rank algorithms at the one or more search computers.

US Pat. No. 10,891,294

AUTOMATICALLY MIGRATING COMPUTER CONTENT

AuditFile, Inc., Walnut ...

1. A method for automatically migrating computer content, comprising:identifying, using a processor, a user provided content provided via the Internet, wherein the user provided content belongs to a previous version content item of a content page accessible via the Internet;
generating, using the processor, a previous version content item identifier for the previous version content item by combining a content from a title of the previous version content item and a content from a description text of the previous version content item;
generating, using the processor, a new version content item identifier for each content item of a plurality of content items belonging to a new version of the content page, by combining a content from a title of the corresponding content item belonging to the new version and a content from a description text of the corresponding content item belonging to the new version;
calculating, using the processor, measures of similarity between the previous version content item identifier and each of the new version content item identifiers;
using the calculated measures of similarity to identify which of the new version content item identifiers most closely matches the previous version content item identifier;
determining, using the processor, whether the calculated measure of similarity corresponding to the most closely matched new version content item identifier meets a threshold, comprising:
determining whether the calculated measures indicates that there is a tie among a plurality of the new version content item identifiers for most closely matching the previous version content item identifier; and
in response to a determination that the calculated measures indicates that there is a tie among the plurality of the new version content item identifiers for most closely matching the previous version content item identifier:
calculating secondary measures of similarity between the previous version content item identifier and each of the tied new version content item identifiers;
using the calculated secondary measures of similarity to identify which of the tied new version content item identifiers most closely matches the previous version content item identifier;
determining whether a calculated secondary measure of similarity corresponding to the most closely matched tied new version content item identifier meets the threshold; and
in response to a determination that the calculated secondary measure of similarity corresponding to the most closely matched tied new version content item identifier does not meet the threshold, determining that the most closely matched new version content item identifier does not meet the threshold; and
in the event that the calculated measure of similarity corresponding to the most closely matched new version content item identifier meets the threshold, identifying, using the processor, the user provided content for automatic migration to the new version's content item corresponding to the most closely matched new version content item identifier.

US Pat. No. 10,891,293

PARAMETERIZED CONTINUOUS QUERY TEMPLATES

Oracle International Corp...

1. A system, comprising:a memory storing a plurality of instructions; and
one or more processors configured to access the memory, wherein the one or more processors are further configured to execute the plurality of instructions to at least:
present, via a first user interface, a set of one or more business logic template types for generating one or more corresponding types of continuous query language (CQL) queries for a user;
receive, via the first user interface, a selection of a business logic template type from the set of one or more business logic template types for generating a corresponding type of CQL query for a user;
generate a business logic template corresponding to the selected business logic template type by:
identifying a set of configuration parameters corresponding to the selected business logic template type;
presenting, via a second user interface, the set of one or more configuration parameters corresponding to the selected business logic template type, the set of one or more configuration parameters comprising at least a CQL query parameter and a threshold condition associated with the CQL query parameter;
identifying, via the second user interface, a selection of the CQL query parameter related to the selected business logic template type, the CQL query parameter comprising a Key Performance Indicator (KPI) measure that measures a critical metric of an organization, and the KPI measure specifying an aggregation on a column of a data object such that execution of the CQL query aggregates the column to compare against a threshold condition;
identifying, via the second user interface, a selection of the threshold condition for the KPI measure that identifies a critical threshold corresponding to the critical metric;
based at least in part on the selected threshold condition, determining an alert event to be transmitted to the user when a value associated with the KPI measure exceeds the critical threshold, the alert event comprising at least an output payload specifying a property relating to the critical metric of the organization; and
generating the business logic template based at least in part on the selected CQL query parameter, the selected threshold condition and the alert event corresponding to the selected business logic template type;
upon the generation of the business logic template, determine, from a set of input data source types, one or more compatible input data source types usable with the business logic template, the set of input data source types including a stream type data and a relation type data;
receive a user-selected input data source type of the one or more compatible input data source types and a user-selected value for the critical threshold;
generate the CQL query for retrieving business event data of the user based at least in part on the business logic template, the CQL query parameter related to the business logic template, the user-selected input data source type, and the user-selected value for the critical threshold, the CQL query configured to provide the alert event when the value associated with the KPI measure exceeds the critical threshold, and the generation of the CQL query comprising implementing a workflow based at least in part on business event parameters; and
execute the CQL query on an input data source of the user-selected input data source type to retrieve the business event data associated with the user.

US Pat. No. 10,891,292

DATABASE MANAGEMENT SYSTEM AND DATABASE MANAGEMENT METHOD

Kabushiki Kaisha Toshiba,...

1. A database management system comprising:a first node configured to receive a query for requesting data from a client terminal and to transmit the received query to any one of a plurality of second nodes in accordance with conditions; and
the plurality of second nodes configured to acquire data by performing processing based on the query received from the first node and to transmit the acquired data to the first node,
wherein the first node holds range information indicating a range of data held in each of the second nodes and does not transmit the query to the second nodes when the range of data to be retrieved for the query is not a range indicated by the range information,
wherein the range information includes temporary maximum values and temporary minimum values of data held in the second nodes,
wherein the second nodes each calculate the temporary maximum values by carrying up low-order n bits of maximum value of the data held in the second nodes, calculate the temporary minimum values by rounding down low-order n bits of minimum values of the data held in the second nodes as rounding processing using a preset number of bits n, and transmit an update request including the temporary maximum values and the temporary minimum values to the first node, and
wherein the first node sets a temporary maximum value and a temporary minimum value included in the update request in the range information when receiving the update request from the second node.

US Pat. No. 10,891,291

FACILITATING OPERATIONS ON PLUGGABLE DATABASES USING SEPARATE LOGICAL TIMESTAMP SERVICES

Oracle International Corp...

6. A computer-executed method comprising:executing a query over a read-only pluggable database in a standby container database managed by a standby container database server;
wherein the standby container database server replicates data in a primary container database to the standby container database;
wherein the standby container database comprises a replica of data in the primary container database;
wherein the query requires a write operation;
wherein executing the query further comprises:
automatically generating a particular operation that performs the write operation in a private pluggable database in the standby container database,
determining a logical timestamp (LT) for the particular operation based on a first LT service maintained for the private pluggable database,
wherein the first LT service tracks logical timestamps of changes made within the private pluggable database,
wherein the first LT service maintained for the private pluggable database is distinct from a second LT service maintained for the standby container database, and
executing the particular operation based, at least in part, on the LT determined for the particular operation;
wherein the method is performed by one or more computing devices.

US Pat. No. 10,891,290

QUERY PLAN SEARCHING AND OPTIMIZATION

Teradata US, Inc., San D...

1. A method, comprising:identifying a search space for a query, the search space including possible query execution plans for executing the query;
subdividing the possible execution plans in the search space among sub search spaces;
using resources to perform a search to obtain plan costs for the query execution plans;
maintaining a resource cost as the search is performed, wherein the resource cost is associated with the cost of using the resources to perform the search so far and the cost of continuing to utilize the resources to complete the search;
normalizing the resource cost into a same unit of measure as that which is associated with the plan costs; and
selecting an optimal execution plan from the query execution plans for which plan costs have been obtained when the resource cost reaches a threshold.

US Pat. No. 10,891,289

TAG COEXISTENCE DETECTION

Wavefront, Inc., Palo Al...

1. A method for optimizing data storage, comprising:receiving an input time series data stream comprising a plurality of data records, wherein each data record received in the time series data stream is tagged at a source of the input time series data stream with a group of one or more tags;
identifying one or more implications based on tags that have been observed together in the groups of tags of the plurality of data records, wherein an implication indicates that a query of a first tag has a response that is identical to a query of a second tag;
for each data record of data records that have been received in the time series data stream, using the group of one or more tags of the corresponding data record to update a data structure tracking coexistence implications of the tags that have been observed together in the groups of tags of the plurality of data records based on the one or more implications;
receiving a query for execution on the time series data stream;
using the data structure tracking coexistence implications of tags to optimize the query; and
executing the query on the time series data stream by performing at least one operation on the time series data stream.

US Pat. No. 10,891,288

DATA SHARING AND MATERIALIZED VIEWS IN MULTIPLE TENANT DATABASE SYSTEMS

Snowflake Inc., San Mate...

1. A method comprising:generating a materialized view over a share object, the share object including data associated with a first account;
updating the data associated with the first account subsequent to generating the materialized view;
merging the materialized view and the share object;
determining that the materialized view is stale with respect to the share object based at least in part on the merging;
generating a refreshed materialized view with respect to the share object in response to the determining; and
sharing the refreshed materialized view to a second account in response to a request from the second account.

US Pat. No. 10,891,287

AUTOMATIC CONTINUED SEARCH

GOOGLE LLC, Mountain Vie...

1. A method implemented by one or more processors, comprising:determining that a user has interest in a given entity, wherein determining that the user has interest in the given entity is based on a strength of association of the given entity to a computer-based activity, of the user, that is related to the given entity and that is performed at a first computing device;
identifying one or more attributes of the user;
selecting, from a collection of information indications related to the given entity, at least one information indication, wherein selecting the at least one information indication is based on the one or more attributes of the user;
responsive to determining that the user has interest in the given entity, and at a later time that is after cessation of the computer-based activity that is related to the given entity and that is performed at the first computing device:
providing the at least one information indication for presentation to the user via an additional computing device, of the user, that is separate from the first computing device,
wherein providing the at least one information indication for presentation causes the at least one information indication to be surfaced at the additional computing device independent of any new search query submission, by the user, that is related to the given entity.

US Pat. No. 10,891,286

TRANSACTION EXECUTION METHOD, APPARATUS, AND SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A transaction execution method, applied to a coordinator node (CN) of an online transaction processing (OLTP) cluster database, wherein the OLTP cluster database comprises n data processing nodes (PN) and one CN, wherein n is greater than or equal to 1, and the method comprises:receiving a page request message sent by a first PN, wherein the first PN is any PN in the n PNs, and the first PN has a first transaction configured, the first transaction comprising at least one operation, and the page request message comprising an identifier of a first page and an identifier of the first PN;
determining a target operation corresponding to the first page if the first page indicated by the identifier of the first page is the same as a hot page in a preset hot page set, wherein the preset hot page set comprises at least one hot page, the hot page being a page that has been processed by a PN in the n PNs a number of times that is greater than a preset processing threshold, and the target operation is an operation selected from the at least one operation according to the hot page that is the same as the first page;
executing the target operation on the first page to obtain an execution result; and
sending the execution result to the first PN indicated by the identifier of the first PN, so that the first PN submits the first transaction to the CN or rolls back the first transaction according to the execution result.

US Pat. No. 10,891,285

FACTOR BINDING DATA COORDINATION ACROSS MULTIPLE DOMAINS

ADP, LLC, Roseland, NJ (...

1. A method comprising:receiving input data for a factor through a user interface, wherein the factor binds two or more domains of human capital management services;
identifying a first domain for a first set of data for a first human capital management service, wherein the first domain is associated with the factor;
identifying a second domain for a second set of data for a second human capital management service, wherein the second domain is bound to the first domain by the factor, and wherein a relationship between the first domain and the second domain is dynamically defined in terms of the factor;
determining by the second domain whether the first set of data in the first domain has changed as a result of the input for the factor; and
creating a domain specific record by the second domain that automatically updates the second set of data, according to the relationship between the first domain and second domain, in response to determining that the first set of data in the first domain has changed,
wherein determining by the second domain whether the factor from the first domain has changed includes issuing a request, by the second domain, for such a change from the first domain.

US Pat. No. 10,891,284

COMPUTING AND REPLICATING EVENT DELTAS FOR MUTABLE EVENTS IN A DISTRIBUTED SYSTEM

Splunk Inc., San Francis...

1. A method for replicating updated data in a search environment, the method comprising:updating, by one or more processing devices corresponding to a search head of the search environment, a local instance of a key-value data structure with input data received from one or more data sources, the input data having been determined to correspond to the key-value data structure, wherein the key-value data structure comprises key-value pairs extracted from event data indexed from the input data, wherein the search head is one of a plurality of search heads in the search environment, wherein the plurality of search heads are coordinated by a search head captain of the search environment, and wherein each search head is associated with one or more indexers;
generating a delta file that comprises data inconsistencies between the updated local instance of the key-value data structure and a previous local instance of the key-value data structure, wherein the data inconsistencies represent modifications made to the key-value pairs during the updating;
distributing the delta file to the one or more indexers of the search environment;
transmitting the delta file to the search head captain of the search environment; and
replicating the delta file from the search head captain to other search heads of the plurality of search heads in the search environment.

US Pat. No. 10,891,283

SYSTEM AND METHOD FOR PRESERVING INTERDEPENDENT CORPORATE DATA CONSISTENCY IN A GLOBALLY DISTRIBUTED ENVIRONMENT

1. A system for preserving the consistency of data in a globally distributed environment, comprising:a network;
a user interface in communication with said network;
at least one local data storage in communication with said network, wherein said local data storage comprises a plurality of local data records pertaining to business entities;
a global data storage in communication with said network, wherein said global data storage comprises a plurality of global data records generated from local data records received from said at least one local data storage;
a computer comprising a processor and memory in communication with said network, wherein said processor:
(a) receives a request from a user interface via said network for an update record pertaining to a business entity;
(b) obtains said update record from said local data records stored in at least one said local data storage and compares said update record against at least one global data record stored in said global data storage, wherein said global data storage comprises data previously received from at least one of said local data storage;
(c) determines the latest update point of said update record and said global data record;
(d) if the latest date reference for said update record differs from said global data record, said computer determines which record will take precedence, thereby producing at least one precedence record element;
(e) determines that said update record and/or said global data record include interdependent data elements that have different latest date references;
(f) holds updates for said interdependent data elements in an update store until additional values are received;
(g) places a hold on formation of a final update record until latest date references for said interdependent data elements coincide; and
(h) releases said hold on formation of said final update record when latest date references for said interdependent data elements coincide;
an assembler which assembles said precedence record element together with additional record elements of said entity associated with said precedence record element retrieved from at least one other data storage repository, thereby forming said final update record, further comprising, prior to passing said precedence record element to said assembler, conducting an interdependency check of a name of said business entity stored in a linkage repository to ensure consistent use of a correct entity name for linked company names in said final update record; and
a distributor which distributes said final update record to a user.

US Pat. No. 10,891,282

MUTATIONS WITH IMMEDIATE FEEDBACK

Amazon Technologies, Inc....

1. A non-transitory machine readable storage medium having instructions embodied thereon, the instructions when executed cause a processor to perform processing, comprising:receiving a mutation at a data proxy from an application executing at a client, wherein the data proxy is in a service provider environment;
creating a topic associated with the mutation at the data proxy using a subscription field name and a subscription argument, wherein the data proxy is configured to request that a messaging service setup the topic and to provide the topic to devices;
sending the mutation to a data store via a data access resolver of the data proxy;
receiving results of the mutation from the data store via the data access resolver, wherein the data access resolver determines that the topic is associated with the mutation;
triggering a subscription, associated with the topic, using a field correlating to the results of the mutation; and
sending a message to a topic, linked to the subscription, via the messaging service, wherein the messaging service publishes the message with results of the mutation to the devices subscribed to the topic.

US Pat. No. 10,891,281

STORING EVENTS DERIVED FROM LOG DATA AND PERFORMING A SEARCH ON THE EVENTS AND DATA THAT IS NOT LOG DATA

Splunk Inc., San Francis...

1. A computer-implemented method, comprising:obtaining log data generated by at least one component in an information processing environment;
obtaining data that is not log data from a real-time monitoring environment;
storing a plurality of events in a data store, wherein each event is derived from at least a portion of the log data and is associated with a time stamp extracted from the log data;
storing the data that is not log data in the data store; and
executing a search on one or more events of the plurality of events and at least a portion of the data that is not log data in the data store.

US Pat. No. 10,891,280

CONTROLLER FOR IMPROVED TIME-SERIES DATA COLLECTION

OMRON Corporation, Kyoto...

1. A controller for controlling a control target comprising:a time-series database configured to store a record including data about the control target in chronological order; and
a processor configured with a program to perform operations comprising
operation as a processing engine configured to cyclically execute a control program in predetermined control cycles,
operation as a data generator configured to generate data to be included in the record to be stored in the time-series database in every one of the predetermined control cycles,
operation as a nonblocking queue included in a volatile main memory that is configured to sequentially store the data generated by the data generator such that a process of storing the data generated in one of the predetermined control cycles to be included in the record in the nonblocking queue is completed within the one of the predetermined control cycles, and
operation as a database manager configured to sequentially read the data stored in the nonblocking queue and write the read data into the time-series database; wherein the database manager is configured to sequentially read the data stored in the nonblocking queue and write the read data into the time-series database during an unoccupied time of the processor, independent from the predetermined control cycles.

US Pat. No. 10,891,279

CONTENT MANAGEMENT IN A TRAVEL MANAGEMENT SYSTEM

AMADEUS S.A.S., Biot (FR...

1. A method comprising:providing an extended record data structure comprising a standard data container, wherein the standard data container associated with the extended record data structure comprises at least one standard data element that is associated with a first record identifier;
receiving, at a travel management system, a non-standard data element including a first data element comprising travel content from a travel content provider and a second data element travel comprising content obtained from a source other than the travel content provider, wherein the non-standard data element includes a content attribute that is not predefined according to a data structure;
receiving, at the travel management system, a first XSD structure description file, wherein one or more first XML tags complying with the first XSD structure description file describe an attribute structure of the non-standard data element and one or more second XML, tags complying with the first XSD structure description file describe one or more auxiliary constraints associated with the non-standard data element;
creating, based at least in part on the one or more first XML tags, a first non-standard data container in the extended record data structure, wherein the first non-standard data container includes a first value corresponding to the content attribute for the non-standard data element;
applying, based at least in part on the one or more second XML tags, the one or more auxiliary constraints to the first non-standard data container;
transforming, through XSLT transformation, the first XSD structure description file into a second XSD structure description file using predefined mapping rules, wherein the XSLT transformation associated with the travel management system transforms a format of the first non-standard data container independent of the travel content contained in the first non-standard data container;
creating, based at least in part on the second XSD structure description file, a second non-standard data container for the non-standard data element, the second non-standard data container including a second value corresponding to the content attribute for the non-standard data element;
assigning a common record identifier to the first non-standard data container and the second non-standard data container, wherein the common record identifier corresponds to the first record identifier associated with the at least one standard data element from the standard data container, and the common record identifier is shared by the standard record data structure and the non-standard record data structure to provide access to the travel management system to manage each record data structure as a unique record data structure; and
identifying, by the travel management system and based on the common record identifier, the at least one standard data element from the standard data container, the non-standard data element from the first non-standard data container, and the non-standard data element from the second non-standard data container.

US Pat. No. 10,891,278

UNIVERSAL DELTA SET MANAGEMENT

The Boeing Company, Chic...

1. A system configured to create an update file by a source system in a nontransitory medium and connected to the source system by a wireless transmission system, such that the system comprises:a number of data directories in a number of computer readable storage mediums in the source system;
a transmission decision process configured, based upon a number of constraints that comprise at least time and transmission speed, to:
calculate, by one or more processors in the source system, a data file size; such that the one or more processors are in wireless communication with a target system;
determine whether there are changed files in the update file;
responsive to a determination that the changed files do not reach or exceed a size threshold, add the changed files the update file; and
determine when to transmit the update file to the target system, such that the update file comprises: a number of delta files, a number of new files, and a list of a number of unchanged files.

US Pat. No. 10,891,277

ITERATIVE WIDENING SEARCH FOR DESIGNING CHEMICAL COMPOUNDS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method, comprising:receiving, by a system operatively coupled to a processor, an input that defines a chemical compound, wherein the input specifies a constrained structure portion of a first chemical compound that is not modifiable, and a first unconstrained structure portion of the first chemical compound that is modifiable; and
determining, by the system, a second unconstrained structure portion to replace the first unconstrained structure portion of the first chemical compound based on a determination that the second unconstrained structure portion satisfies a defined condition related to a difference between the first unconstrained structure portion and the second unconstrained structure portion, and preserves a functional property of the chemical compound.

US Pat. No. 10,891,276

ENFORCING REFERENTIAL INTEGRITY FOR DATABASE COLUMNS

FMR LLC, Boston, MA (US)...

1. A system for enforcing referential integrity of database columns across a plurality of tables in a database, the system comprising:a server computing device including a memory for storing programmatic instructions and a processor for executing the programmatic instructions, and
a plurality of databases coupled to the server computing device,
the processor of the server computing device executing the programmatic instructions to:
periodically capture a database schema associated with each database in the plurality of databases, the database schema comprising one or more relationships between a primary key column in a first table in the database and a foreign key column in a second table in the database, wherein each of the primary key column in the first table and the foreign key column in the second table have been populated with data;
for each database schema:
execute a first procedure call against the database schema to determine a discrepancy between the primary key column and the foreign key column with respect to one or more of: a data length value or a data type value, the first procedure call recording a numeric value corresponding to a number of discrepancies determined during execution of the first procedure call;
execute a database query against the first table to retrieve a count of values in the primary key column that (i) have a data length value that is greater than a data length value of the foreign key column in the second table and (ii) have a data type value that is different from a data type value of the foreign key column in the second table;
execute one or more database queries against the second table to insert test values into the foreign key column, wherein at least a first one of the test values has a data length value that is greater than a data length value of the foreign key column in the second table and at least a second one of the test values has a data type value that is different from a data type value of the foreign key column in the second table; and
execute a second procedure call against the database schema to eliminate the discrepancy, wherein the second procedure call changes one or more of: (i) the data length value of the primary key column, (ii) the data length value of the foreign key column, (iii) the data type value of the primary key column, or (iv) the data type value of the foreign key column,
wherein after the second procedure call finishes, the data length value of the primary key column matches the data length value of the foreign key column, and the data type value of the primary key column matches the data type value of the foreign key column;
generate a visual representation of the changed database schema resulting from the second procedure call against each database in the plurality of databases, the visual representation including a graph comparing the numeric values corresponding to the number of discrepancies determined during execution of the first procedure call against each database in the plurality of databases; and
display the visual representation on a remote device.

US Pat. No. 10,891,275

LIMITED DATA ENRICHER

International Business Ma...

1. A method for enriching data, the method comprising:a computer receiving a limited dataset and a rich dataset, wherein the limited dataset includes one or more limited features, and wherein the rich dataset includes the one or more limited features and at least one additional feature;
the computer determining one or more first coefficients corresponding to the one or more limited features based on the limited dataset, wherein the one or more first coefficients denote an effect of the one or more first features on an output of a first model;
the computer determining one or more second coefficients corresponding to the one or more limited features and the at least one additional feature based on the richer dataset, wherein the one or more second coefficients denote an effect of the one or more second features on an output of a second model;
the computer updating the one or more first coefficients based on the one or more second coefficients;
the computer determining whether the updated one or more first coefficients improve the output of the first model; and
based on the one or more updated first coefficients improving the output of the first model, the computer providing a feature collection recommendation based on the evaluation.

US Pat. No. 10,891,274

DATA SHUFFLING WITH HIERARCHICAL TUPLE SPACES

International Business Ma...

1. A method for shuffling source data to generate a dataset, the method comprising:generating, by a first map module of a processor, first pair data from the source data;
generating, by a second map module of the processor, second pair data from the source data, wherein each pair data among the first pair data and the second pair data includes a key and a value associated with the key;
inserting, by the first map module of the processor, the first pair data into a first local tuple space accessible by the first map module, wherein the first local tuple space implements associative memory model;
inserting, by the second map module of the processor, the second pair data into a second local tuple space accessible by the second map module, wherein the second local tuple space implements associative memory model;
activating, by the processor, a shuffle module of the processor to execute a shuffle operation, on pair data that includes a particular key;
inserting, by the processor, and upon the activation of the shuffle module, the first pair data from the first local tuple space into a global tuple space accessible by the first map module and the second map module, wherein the global tuple space implements associative memory model;
inserting, by the processor, and upon the activation of the shuffle module, the second pair data from the second local tuple space into the global tuple space;
identifying, by the shuffle module of the processor, pair data including the particular key in the global tuple space;
fetching, by the shuffle module of the processor, the identified pair data from a memory; and
executing, by the shuffle module of the processor, a shuffle operation on the fetched identified pair data to generate the dataset, wherein the dataset includes the particular key and one or more values associated with the particular key.

US Pat. No. 10,891,273

DATABASE CONTAINER DELIVERY INFRASTRUCTURE

SAP SE, Walldorf (DE)

1. A cloud-based software development management system comprising:a software object database;
an application programming runtime comprising:
a database container delivery infrastructure executable by one or more processors and configured to deliver software objects of a first database type to a first schema having a first physical name and stored in the software object database, the first schema defining a set of integrity constraints imposed on the software object database;
a logic processor containing a definition for the first schema including a logical name for the first schema; and
the database container delivery infrastructure further configured to activate the first schema by replacing, at a time subsequent to the first schema being delivered to the software object database, the logical name for the first schema stored in the definition with a physical name for the first schema, the replacing including putting the physical name for the first schema in the place of the logical name for the first schema in the definition.

US Pat. No. 10,891,272

DECLARATIVE LANGUAGE AND VISUALIZATION SYSTEM FOR RECOMMENDED DATA TRANSFORMATIONS AND REPAIRS

ORACLE INTERNATIONAL CORP...

1. A method comprising:identifying, automatically by a data enrichment system comprising a processor and a memory, patterns in data from one or more data sources by parsing fields in a structure of the data;
matching, automatically by the data enrichment system, the patterns in data from the one or more data sources to entity information from a knowledge service;
generating, automatically by the data enrichment system, one or more transformation scripts for the data based on the entity information, wherein the one or more transformation scripts comprises a script for transforming the data to correspond to the patterns matching the entity information, and wherein the one or more transformation scripts are written in a declarative language;
generating, automatically by the data enrichment system based on a history of user activity, one or more transform recommendations corresponding to the one or more transformation scripts generated for the data based on the entity information;
displaying, by the data enrichment system, the one or more transform recommendations and the data to be transformed on an interactive user interface, wherein the one or more transform recommendations displayed on the interactive user interface are interactive and wherein the one or more transform recommendations that are displayed are based on the identified patterns in the data from the one or more data sources;
filtering, by the data enrichment system, the one or more transform recommendations in accordance with user input on the interactive user interface;
receiving, by the data enrichment system, transformation instructions based on a selection of the one or more transform recommendations on the interactive user interface;
transforming, automatically by the data enrichment system, the data displayed on the interactive user interface by applying the transformation instructions, corresponding to the one or more transformation scripts, to the data displayed on the interactive user interface in order to process large data sets;
displaying the transformed data and the transformation scripts applied to the transformed data on the interactive user interface; and
publishing, by the data enrichment system, the transformed data to one or more data targets based on the transformation instructions.

US Pat. No. 10,891,271

OPTIMIZED EXECUTION OF QUERIES INVOLVING EARLY TERMINABLE DATABASE OPERATORS

Oracle International Corp...

1. A method of a database management system (DBMS) performing a distributed operation for a query over two database objects comprising:generating an execution plan to execute the distributed operation for the query;
wherein the execution plan includes both (a) a table scan operator that targets a particular database object of the two database objects, and (b) a second operator that consumes results of the table scan operator;
assigning a first set of parallel execution processes, of the DBMS, to perform a first operation that corresponds to the table scan operator;
assigning a second set of parallel execution processes, of the DBMS, to perform a second operation that corresponds to the second operator;
a first process, of the first set of parallel execution processes, beginning to produce results for a second process, of the second set of parallel execution processes, for a portion of the first operation by scanning a portion of the particular database object;
determining, by the second process, that the second process does not require any rows produced by the first operation;
responsive to said determining that the second process does not require any rows produced by the first operation:
the second process sending a notification to the first process; and
in response to receiving the notification, the first process ceasing to produce results, for the second process, of the portion of the first operation.

US Pat. No. 10,891,270

SYSTEMS AND METHODS FOR MODELLING VIRTUAL SCHEMAS IN NON-RELATIONAL DATABASES

MongoDB, Inc., New York,...

1. A system comprising:at least one hardware-based processor;
a user interface component, executed by the least one hardware-based processor, operable to display at least one user interface, wherein the at least one user interface is configured to display and accept information associated with a non-relational database including documents as a base unit of data organization through information views, including:
a first view configured to accept specification of a subset of data or an entire data set of the non-relational database; and
a second view configured to:
visualize a plurality of attributes within sampled data that comprise a virtual schema, for the non-relational database or a specified portion of the non-relational database,
wherein the user interface component is configured to:
access the sampled data and analyzed attributes of the sampled data to generate the visualization;
receive user input specifying one or more new attributes not included in the virtual schema and the visualization;
update the virtual schema to include the one or more new attributes from respective documents responsive to user selection;
regenerate the second view to incorporate the new attributes;
a sample component, executed by the at least one hardware-based processor, configured to generate a sample of at least some documents responsive to selection of the subset of data or the entire data set in the first view;
an analysis component, executed by the at least one hardware-based processor, operable to:
identify the plurality of attributes from a set of attributes in the sampled of documents, wherein the set of attributes includes at least some attributes that are not common between documents within the sampled data, and wherein the plurality of attributes are identified based on a frequency of occurrence in the sample data; and
integrate user selected attributes into the set of attributes from the sampled documents; and
wherein the user interface component is further configured to generate selectable mappings in the second view between visualizations of the common attributes and the sampled data associated with the common attributes.

US Pat. No. 10,891,269

APPARATUS, SYSTEMS, AND METHODS FOR BATCH AND REALTIME DATA PROCESSING

FACTUAL, INC., New York,...

1. A computing system for generating a summary data of a set of data, the computing system comprising:one or more processors configured to run one or more modules stored in non-transitory computer readable medium, wherein the one or more modules are configured to:
receive a first set of data, wherein the first set of data includes information on web pages and the information on web pages is received from a web crawler, and format the first set of data into a first structured set of data;
generate a first summary data using the first structured set of data, the first summary data includes a first entity identifier and a first value associated with the first entity identifier, and store the first summary data in a data store;
receive a second set of data, wherein the second set of data includes data from a user to correct the information on web pages and the data is received from an electronic device of the user, and format the second set of data into a second structured set of data;
generate a second summary data using the first structured set of data and the second structured set of data, the second summary data includes a second entity identifier and a second value associated with the second entity identifier;
compare the first summary data in the data store with the second summary data;
determine that the first entity identifier and the second entity identifier are identical;
determine a difference between the first value and the second value; and
update the first summary data in the data store based on the difference between the first value and the second value.

US Pat. No. 10,891,268

METHODS AND SYSTEM FOR DETERMINING A MOST RELIABLE RECORD

Experian Health, Inc., F...

1. A method comprising:receiving a request for a most reliable demographic fields data for a selected demographic field;
receiving a plurality of records, each of the plurality of records comprising at least one demographic field;
identifying a corresponding demographic field from the at least one demographic field corresponding to the selected demographic field for each of the plurality of records;
determining a reliability score for the corresponding demographic field for each of the plurality of records that includes:
determining an aging score based on a half-life of the selected demographic field and an age of a corresponding record, including determining the half-life of the selected demographic field according to a half-life index,
determining a frequency score associated with the corresponding demographic field,
determining a quality score associated with the corresponding demographic field, and
aggregating the aging score, the frequency score, and the quality score to determine the reliability score for the corresponding demographic field; and
determining the corresponding demographic field with a highest reliability score as the most reliable demographic fields data.

US Pat. No. 10,891,267

VERSIONING OF DATABASE PARTITION MAPS

Amazon Technologies, Inc....

1. A system, comprising:a memory to store program instructions which, if performed by at least one processor, cause the at least one processor to perform a method to at least:
monitor a plurality of computing nodes that respectively store different partitions of a database as indicated in a partition map for the database to route queries to the plurality of computing nodes;
based, at least in part, on the monitoring of the computing nodes, determine a change to perform to partitioning of the database at one or more of the computing nodes and perform the determined change to partitioning of the database at the one or more computing nodes; and
create a new partition map for the database that includes the change to the partitioning of the database and that is sent to one of the plurality computing nodes; and
allow performance of queries to the database without waiting to receive an acknowledgement from the one computing node that a local partition map at the one computing node is updated to the new partition map.

US Pat. No. 10,891,266

FILE HANDLING IN A HIERARCHICAL STORAGE SYSTEM

International Business Ma...

1. A method for file handling in a hierarchical storage system comprising:implementing a user virtual file system for each a plurality of users, the user virtual file system comprising a user interface, a set of data containers, and a control unit, wherein the user virtual file system scans, reads, and analyzes data associated with a plurality of files and user behavior associated with the plurality of files to create or modify a set of rules for handling the plurality of files and to create or modify a set of metadata for handling the plurality of files;
identifying logical or temporal relationships between subsets of files in the plurality of files based on the set of rules and the set of metadata;
grouping a subset of files that are identified as having a logical or temporal relationship based on the set of rules and the set of metadata in at least one data container;
moving the at least one data container containing the subset of files to a different tier of storage based on the set of rules and the set of metadata that caused the subset of files that are identified as having the logical or temporal relationship to be grouped; and
analyzing and predicting individual user behavior and the system status, wherein the at least one data container of corresponding grouped files is moved entirely to a primary tier of storage if oncoming usage of the grouped files within a certain time range is predicted.

US Pat. No. 10,891,265

LOCAL NETWORKED STORAGE LINKED TO REMOTE NETWORKED STORAGE SYSTEM

Amazon Technologies, Inc....

1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein when executed the program causes the at least one computing device to at least:obtain a first request to read a first file stored in a remote networked storage system in association with a user account, the first request being obtained from a client computing device through a local network;
determine that the first file is stored in a local cache;
determine that the first file stored in the local cache corresponds to a latest version of the first file;
send the first file to the client computing device through the local network;
obtain a second request to read a second file stored in the remote networked storage system in association with the user account, the second request being obtained from the client computing device through the local network;
determine that the second file is not stored in the local cache;
obtain the second file from the remote networked storage system, wherein an identification of the user account is provided to the remote networked storage system; and
send the second file to the client computing device in response to the second file being obtained from the remote networked storage system.

US Pat. No. 10,891,264

DISTRIBUTED, SCALABLE KEY-VALUE STORE

VMWARE, INC., Palo Alto,...

1. A method for implementing a distributed, scalable key-value store (DSKVS) across a plurality of server nodes, the method comprising:receiving, by a server node in the plurality of server nodes, a key-value update operation from a client, the key-value update operation identifying a key-value pair comprising a key K1 and a value V1;
executing, by the server node, the key-value update operation by:
writing a transaction log record to a logical log maintained in a nonvolatile storage of the server node, wherein the transaction log record includes the key K1, the value V1, and a transaction identifier; and
creating or updating a cache entry for key K1 in a cache in a volatile memory of the server node, wherein a value of the cache entry is based on the value V1;
subsequently to writing the transaction log record and creating or updating the cache entry, transmitting, by the server node to the client, an acknowledgement indicating completion of the key-value update operation;
upon transmitting the acknowledgment,
determining that an amount of dirty data in the cache exceeds a threshold; and
executing, by the server node, a log replay subprocess that takes as input a latest transaction identifier identifying a latest transaction log record in the logical log, the log replay subprocess comprising:
determining, for each key-value pair in the cache, a bucket index identifying a bucket of a hash table maintained in the nonvolatile storage of the server node, the identified bucket being a hash table bucket in which the key-value pair should be stored;
grouping all key-value pairs in the cache according to their respective bucket indexes;
for each determined bucket index:
reading, from the hash table into the volatile memory, contents of the bucket identified by the bucket index, the contents including the bucket's key-value pairs and a bucket transaction identifier; and
determining that the bucket transaction identifier is less than the latest transaction identifier;
updating, in the volatile memory, the bucket's key-value pairs based on the key-value pairs for the bucket held in the cache;
updating, in the volatile memory, the bucket transaction identifier to be equal to the latest transaction identifier;
atomically writing the updated key-value pairs and the updated bucket transaction identifier to the hash table;
marking the key-value pairs for the bucket held in the cache as clean; and
deleting, from the logical log, transaction log records whose transaction identifier is less than or equal to the latest transaction identifier.

US Pat. No. 10,891,263

SYSTEMS AND METHODS FOR PROVIDING DATABASE UPDATES FOR DATA VISUALIZATION

SALESFORCE.COM, INC., Sa...

1. A computer program stored on one or more non-transitory computer-readable media, the computer program to be implemented by a user system, the computer program comprising instructions, wherein execution of the instructions is operable to cause the user system to:obtain a user input of a selection of a synchronization (sync) option of a set of sync options to synchronize locally stored data items of a dataset with data items of the dataset stored in a remote database system, each sync option of the set of sync options indicates a desired timing for obtaining updated data items for a visual representation of the dataset in a data analytics graphical user interface (GUI), and the set of sync options include a real-time sync option, an instant sync option, and a periodic sync option;
send, in response to the user input, a request to a cloud computing service to obtain updated data items from the database system for the visual representation of the dataset in the data analytics GUI in accordance with the selected sync option,
the request to cause the cloud computing service to implement a first framework using a plurality of agent nodes to: allocate, to an available agent node of the plurality of agent nodes, first tasks for receipt of the request message and second tasks to extract the updated data items and convert the updated data items into a format for display of the visual representation; and
receive the updated data items from the cloud computing service,
the updated data items being received in response to the request when the selected sync option is the instant sync option,
the updated data items being received as individual data items are updated at the database system when the selected sync option is the real-time sync option, and
the updated data items being received at a selected interval when the selected sync option is the periodic sync option.

US Pat. No. 10,891,262

COMPRESSION OF DATA ATTRIBUTES

QUADIENT TECHNOLOGIES FRA...

1. A method comprising steps performed by at least one processor:obtaining an initial set of origin/destination shipping location code pairs, each pair comprising an origin code indicating a geographic origin location from which a mailpiece can be shipped and a destination code indicating a geographic destination location to which a mailpiece can be delivered;
generating an ordered list of the origin/destination shipping location code pairs based upon the origin code for each pair;
based upon the ordered list, generating a translation code array that maps shipping location codes to smaller translation codes;
identifying one or more break points in the ordered list at which attributes for consecutively-ordered origin/destination shipping location code pairs change;
based upon the one or more break points and each origin shipping location code in the ordered list, generating one or more destination code arrays of destination shipping location codes and associated attributes, wherein each destination shipping location code in each destination code array is a first destination shipping location code occurring after one of the one or more break points and is represented by an associated translation code;
generating an origin code array that maps each origin shipping location code to an associated destination code array;
modifying the origin code array so that origin shipping location codes that have common origin/destination attributes map to a common destination code array; and
providing the translation code array, the origin code array, and the one or more destination code arrays to a shipping selection system.

US Pat. No. 10,891,261

METHOD AND DEVICE FOR DEDUPLICATION

EMC IP Holding Company LL...

1. A method of deduplication, comprising:obtaining a property of a file stream, the property of the file stream including a file type or a magic number identifying a format of a protocol or a file;
in response to receiving an I/O request for a data block of the file stream, assigning a deduplication level to the I/O request based on the property of the file stream at least in part by determining whether the file stream is compressed based on the property of the file stream and assigning the deduplication level based on whether the file stream is compressed, wherein assigning the deduplication level based on the determining comprises:
in response to determining that the file stream is compressed, assigning a first deduplication level to the I/O request,
in response to failing to determine whether the file stream is compressed, assigning a second deduplication level to the I/O request, and
in response to determining that the file stream is uncompressed, assigning a third deduplication level to the I/O request; and
deduplicating the data block of the file stream based on the deduplication level assigned to the I/O request at least in part by, in response to the deduplication level assigned to the I/O request being the second deduplication level, skipping deduplication of the data block of the file stream regardless of a state of an available computing resource.

US Pat. No. 10,891,260

METHODS AND SYSTEMS FOR EVENT BASED NOTIFICATIONS

RMC PHARMACEUTICAL SOLUTI...

1. A method comprising:receiving equipment data from a piece of equipment, wherein the equipment data comprises a data file comprising one or more data entries;
storing the data file in a file storage location;
monitoring, based on a profile, the file storage location for data file activity, wherein the profile defines at least one of: one or more file storage locations to monitor, one or more types of data files to monitor, one or more types of data entries within a data file to monitor, or a message type;
processing, based on data file activity in the monitored file storage location, the data file according to the profile;
determining, based on the processed data file and the profile, at least one of: an error code, an operating parameter, or a sample parameter associated with at least one of: a biomolecule, a pharmaceutical, or a bioprocess;
generating, based on the processed data file and the at least one of the error code, the operating parameter, or the sample parameter associated with the at least one of: the biomolecule, the pharmaceutical, or the bioprocess, a message according to the profile; and
transmitting the message.

US Pat. No. 10,891,259

USER DRIVEN DATA PRE-FETCH

Maginatics LLC, Mountain...

1. A method of providing access to file system information, comprising:receiving, by a file system client running on a client device an indication that a user input associated with pre-fetching at least metadata pertaining to a file system object has been received, wherein the file system object is stored in a distributed file system;
determining, by one or more processors of the client device, that one or more predefined user inputs or user actions occurred; and
pre-fetching, by the file system client, content data associated with a file system object, wherein the pre-fetching the content data associated with the file system object comprises:
in response to a determination that a user-driven pre-fetch option has been set as active with respect to the file system object recursively downloading folder metadata and content items associated with a folder based at least in part on a user-defined scope of the pre-fetching and storing the folder metadata and content items in a local cache of the client device, wherein the folder metadata and content items are downloaded in response to determining that the one or more predefined user inputs or user actions occurred, and the one or more predefined user inputs or user actions correspond to a context for which a response does not expressly require the folder metadata.

US Pat. No. 10,891,258

SYSTEMS AND METHODS FOR DE-NORMALIZED DATA STRUCTURE FILES BASED GENERATION OF INTELLIGENCE REPORTS

Tata Consultancy Services...

1. A processor-implemented method, comprising:obtaining, by a hardware processor, a plurality of files from one or more sources, wherein said one or more files comprises one or more records, and wherein said one or more records comprises one or more attributes;
parsing, by said hardware processor, said plurality of files from one or more sources to validate said one or more records and implementing a data induction platform (DIP) tool to obtain a plurality of validated files;
identifying, by said hardware processor, a set of similar files from said plurality of validated files, wherein the criteria for determining similar file is based on a pre-defined naming convention as stated and published in an input file layout format document;
appending one or more similar files together, from said set of similar files to obtain one or more consolidated files in a computing file server, wherein each of said one or more consolidated files corresponds to a specific category;
performing, by said hardware processor, a predefined logic validation on each of said one or more consolidated files to obtain a logic validated file for each of said one or more consolidated files, wherein said logic validated file comprises one or more validated records;
generating, a de-normalized data structure file by merging each of said logic validated file obtained for said one or more consolidated files, wherein said de-normalized data structure file comprises a set of de-normalized merged records;
storing said set of de-normalized merged records into a file corresponding to one or more subject areas for each single user;
querying said file to generate an aggregated data for one or more measureable key performance indicators, wherein the key performance indicators comprise measurable business key performance indicators of customer count, outstanding balances, transaction count, portfolio value over different dimensions of time, region, gender, customer segment, age band, products of bank, and channels of service, wherein a value of the key performance indicators are checked at one or more predetermined intervals based on inputs provided by users and an alert is generated when the value of the key performance indicators exceeds the user defined threshold; and
generating one or more intelligence reports using de-normalized merged records wherein the one or more intelligence reports illustrates said generated aggregated data at lowest level of granularity of entities for creating single user view.

US Pat. No. 10,891,257

STORAGE MANAGEMENT SYSTEM AND METHOD

EMC IP Holding Company, L...

1. A computer-implemented method, executed on a computing system, comprising:locally processing a plurality of data files stored on a local data storage system to identify an archivable file for storage on a remote data storage system, wherein the archivable file is initially stored on a local data storage system;
enabling a remote tiering appliance to obtain the archivable file, wherein the remote tiering appliance stores the archivable file at a defined remote address on the remote data storage system;
receiving from the remote tiering appliance an identifier that locates the archivable file at the defined remote address on the remote data storage system;
storing the identifier on the local data storage system; and
deleting the archivable file from the local data storage system, wherein deleting the archivable file from the local data storage system includes deleting the identifier that locates the archivable file at the defined remote address on the remote data storage system, wherein deleting the identifier that locates the archivable file at the defined remote address on the remote data storage system generates an orphan file, wherein the orphan file is not associated with any identifier on the local data storage system.

US Pat. No. 10,891,256

METHOD AND APPARATUS FOR A VECTOR MEMORY SUBSYSTEM FOR USE WITH A PROGRAMMABLE MIXED-RADIX DFT/IDFT PROCESSOR

Cavium, LLC, Santa Clara...

1. A programmable device configured to provide discrete Fourier transform (“DFT”) and inverse DFT (“IDFT”) operations for data processing, comprising:a vector data path pipeline configured to generate scaled vector data by scaling input data received from a vector memory bank;
a finite state machine controller coupled to the vector data pipeline and configured to generate radix engine control signals in accordance a received index value; and
a programmable vector mixed-radix engine coupled to the finite state machine and capable of being configured in accordance with the radix engine control signals for facilitating producing a radix result in response to the scaled vector data.

US Pat. No. 10,891,255

HETEROGENEOUS MULTIPROCESSOR INCLUDING SCALAR AND SIMD PROCESSORS IN A RATIO DEFINED BY EXECUTION TIME AND CONSUMED DIE AREA

Intel Corporation, Santa...

1. A processing apparatus comprising:a single instruction multiple data (SIMD) processor; and
a scalar processor coupled with the SIMD processor, wherein each processor includes circuitry to perform multi-stage compute operations, the SIMD processor to execute a first set of stages and the scalar processor to execute a second set of stages, wherein a total number of scalar processors and SIMD processors are in a ratio defined by a minimum product equal to an execution time of the multi-stage compute operations multiplied by die area consumed, wherein all of the scalar processors and SIMD processors each reside within separate processor cores.

US Pat. No. 10,891,254

SWITCHABLE TOPOLOGY PROCESSOR TILE AND COMPUTING MACHINE

Intel Corporation, Santa...

1. A processor tile on a die, comprising:a plurality of interface blocks;
a programmable interconnect coupled to the plurality of interface blocks;
a memory to store a plurality of configuration vectors representing virtual circuit (VC) segments including the processor tile, wherein a configuration vector of the plurality of configuration vectors includes an identification of a VC, a priority number of the configuration vector, an identification of a topology, a first port of the processor tile to be coupled to an entering neighbor processor tile, and a second port of the processor tile to be coupled to an exiting neighbor processor tile; and
a controller coupled to the plurality of interface blocks, the memory, and the programmable interconnect to control connections between the programmable interconnect and the plurality of interface blocks, based on the plurality of configuration vectors stored in the memory.

US Pat. No. 10,891,253

MULTICAST APPARATUSES AND METHODS FOR DISTRIBUTING DATA TO MULTIPLE RECEIVERS IN HIGH-PERFORMANCE COMPUTING AND CLOUD-BASED NETWORKS

Microsoft Technology Lice...

1. An originating host device in a distribution chain upstream from a plurality of host devices, wherein the plurality of host devices comprises an intermediary host device and a terminating host device, the originating host device comprising:a core comprising a generation application, wherein the generation application is configured such that the core of the originating host device (i) determines a plan for transferring data between the originating host device and the plurality of host devices, and (ii) generates a plurality of work queue elements (WQEs) to implement the plan, the WQEs including an operation to be performed, a memory address of the intermediary or the terminating host device to perform the operation on, and a memory address of the originating host device to access in performing the operation; and
a first remote direct memory access (RDMA) network interface card (NIC) comprising
a read application configured such that the first RDMA NIC reads the plurality of WQEs from a first memory,
a descriptor application configured such that the first RDMA NIC (i) remote direct memory accesses a second memory of the intermediary host device including writing a first portion of the WQEs directly from the first RDMA NIC to the second memory, and (ii) after writing the first portion of the WQEs, provides a signal that triggers a second RDMA NIC of the intermediary host device to process the first portion of the WQEs stored in the second memory, and
a reception application configured such that the first RDMA NIC receives an acknowledgement signal or a portion of the data from the terminating host device, wherein the acknowledgement signal indicates transfer of the data is completed.

US Pat. No. 10,891,252

METHOD AND APPARATUS FOR PUSHING ELECTRONIC BOOK

Beijing Jingdong Shangke ...

1. A method for pushing an electronic book, the method comprising:acquiring reading duration information sent by a plurality of terminals, the reading duration information comprising identity information of the terminals, identification information of an electronic book read by a user of the terminals and reading time information corresponding to the identification information;
determining reading preference information of each terminal corresponding to the identity information and an average reading duration of each electronic book corresponding to the identification information based on the reading time information; and
pushing a first electronic book to a first terminal based on the reading preference information and the average reading duration, an average reading duration of the first electronic book matching reading preference information of the first terminal;
wherein determining the average reading duration of each electronic book corresponding to the identification information based on the reading time information comprises:
determining a number of occurrence of reading completion durations of the terminals regarding same identification information, the number of occurrence of the reading completion durations referring to a number of repetition of the time values of the reading completion durations of the terminals regarding the same identification information; and
determining the average reading duration of each electronic book based on the reading completion durations of the terminals regarding the same identification information and a weight of the number of occurrence of each reading completion duration.

US Pat. No. 10,891,251

SIGNAL CONNECTOR FOR MICROWAVE CIRCUITS

INTERNATIONAL BUSINESS MA...

1. A signal connector for microwave circuits, comprising:a first high density interface in a first dilution fridge stage configured to receive a first set of transmission lines;
a second high density interface in a second dilution fridge stage configured to receive a second set of transmission lines; and
a printed circuit board configured to transfer microwave signals between the first dilution fridge stage and the second dilution fridge stage, the first high density interface and the second high density interface directly coupled to the printed circuit board.

US Pat. No. 10,891,250

APPLICATION FOR COLLATING SCATTERED SIGNALS IN A COMPUTER SYSTEM

Bank of America Corporati...

10. A central application for collating scattered signals in a computer system, the central application comprising computer-executable code stored in a non-transitory memory of the computer system, wherein the central application, when run on a processor of the computer system, is configured to:access one or more scattered signals, said scattered signals being generated by at least one of a plurality of peripheral applications of the computer system;
collate the scattered signals based at least in part on a set of predetermined rules;
store the collated signals in the memory; and
in response to a predetermined trigger, present the collated signals on a display of the computer system based at least in part on the set of predetermined rules, wherein the presenting includes presenting the signals in order of decreasing relevancy to the computer system, and said relevancy is determined at least in part based on historical data, said historical data including actions performed on the computer system, and said relevancy comprises a time-based metric, wherein the relevancy of a signal is at least in part a function of a current time of the presenting relative to a time of the actions of the historical data.

US Pat. No. 10,891,249

DYNAMIC SYSTEM MANAGEMENT BUS

Covidien LP, Mansfield, ...

1. An electrosurgical generator comprising:a dynamic communication bus interconnecting a power source and at least one instrument, the dynamic communication bus configured to generate a first signal;
an analog to digital converter (ADC) configured to sample the first signal of a dynamic bus communication apparatus to generate a second signal; and
a controller configured to:
measure a signal rise time of the second signal;
compare the signal rise time with a predetermined time; and
adjust the signal rise time to be equal to the predetermined time in response to the signal rise time being different from the predetermined time.

US Pat. No. 10,891,248

CONFIGURING WIRELESS COMMUNICATIONS ACCORDING TO MULTIPLE COMMUNICATION PROTOCOLS

NXP B.V., Eindhoven (NL)...

1. A method for communicating between a combo-endpoint device, a wireless router, and a wireless communication device, the method comprising:monitoring communication patterns of wireless data communications between a wireless router and radio-communication circuitry of a combo-endpoint device that includes an antenna, the endpoint device and the antenna to communicate across two different networks using two different protocols, one of the two different protocols including a spread spectrum (SS)-based protocol defined by the wireless router and another of the two different protocols including a frequency-hopping (FH)-based protocol;
storing data indicative of communication times of the wireless router based on the monitored communication patterns;
configuring the FH-based protocol by defining connection periods according to time windows and selected frequencies for wireless communication of data between the wireless communication device and the radio-communication circuitry, and by establishing the time windows to not substantially conflict with the communication times of the wireless router; and
monitoring communication patterns between the wireless router and other wireless devices; and
wherein configuring the FH-based protocol further includes determining the time windows and window offsets between the time windows as a multiple of the communication times of the wireless router and the radio-communication circuitry;
wherein determining the window offsets between the time windows uses a collision-free condition including:
Find offb not in ranges [(j*Dz?i*Db)?Lb, (j*Dz?i*Db)+Lz], i=[0,M], j=[0,N] If Dz=k*Db or k*Dz=Db, collision-free condition is Lz wherein Dz is a length of time for a cycle of a communication according to the SS-based protocol, Db is a length of time for a cycle of a communication according to the FH-based protocol, Lz is a length of a message according to the SS-based protocol, Lb is based on a length of a message according to the FH-based protocol, and k is a constant.

US Pat. No. 10,891,247

HARDWARE COMPONENT DETECTIONS

Hewlett-Packard Developme...

1. An apparatus, comprising:a multipurpose integrated circuit comprising an input pin;
a hardware component coupled to the input pin; and
a two-way communication bus coupled to the multipurpose integrated circuit within a connecting component that is to connect the hardware component and a base component, wherein the hardware component, the connecting component, and the base component are part of an all-in-one computer, wherein the multipurpose integrated circuit is to:
receive an interrogation signal from a processor in the base component for the hardware component coupled to the pin via the two-way communication bus;
generate a response signal that indicates that the hardware component is detected on the pin in response to the interrogation signal; and
transmit the response signal to the processor via the two-way communication bus.

US Pat. No. 10,891,246

DATA PROCESSING APPARATUS, NETWORK SYSTEM, PACKET ORDER CONTROL CIRCUIT, AND DATA PROCESSING METHOD

NIPPON TELEGRAPH AND TELE...

1. A data processing apparatus comprising:one or a plurality of input/output circuits configured to perform data communication via a communication link; and
a hardware processing unit configured to implement, by hardware, data processing for configuring a network service to be used by a user,
wherein the hardware processing unit comprises:
a data processing circuit configured to execute the data processing based on input data;
a packet transfer circuit configured to receive a packet containing data for executing the data processing, and transmit a packet containing data obtained by the data processing; and
a packet order control circuit configured to sequentially select packets received and input by the packet transfer circuit, in accordance with an order of packet IDs contained in header information of the packets, and perform a transfer process of transferring data contained in the selected packets to the data processing circuit,
the packet order control circuit comprises:
a buffer configured to temporarily store a packet;
a comparison circuit configured to compare a packet ID of an input packet with a next-selection ID indicating a packet ID of a packet to be selected next in accordance with the order; and
a control circuit configured to store the input packet in a storage position of the buffer, which corresponds to the packet ID, if a comparison result of the comparison circuit indicates that the packet ID and the next-selection ID do not match, and select the input packet as a target of the transfer process without storing the packet in the buffer, if the packet ID and the next-selection ID match,
wherein, if the next-selection ID matches a packet ID of a packet stored in the buffer, the control circuit selects the packet as a target of the transfer process.

US Pat. No. 10,891,245

VIDEO DEVICE AND METHOD FOR EMBEDDED DATA CAPTURE ON A VIRTUAL CHANNEL

NXP USA, Inc., Austin, T...

1. A video device-comprising:a host processor comprising at least one input video port configured to receive a plurality of video data signals that comprise video data and embedded data from a plurality of virtual channels in a received frame; and
a memory operably coupled to the host processor and configured to receive and store video data;
wherein the host processor is configured to segregate the video data from the embedded data in the received frame and process the embedded data individually, and
the host processor is configured to determine how many embedded data blocks are to be expected at a start of a frame and expected at an end of the frame based on a number of programmed embedded data blocks for each of the plurality of virtual channels.

US Pat. No. 10,891,244

METHOD AND APPARATUS FOR REDUNDANT ARRAY OF INDEPENDENT DRIVES PARITY QUALITY OF SERVICE IMPROVEMENTS

Dell Products, L.P., Rou...

1. An information handling system, comprising:a host configured to write a non-volatile memory express command that includes an advisory command and a non-completion command; and
a controller coupled to the host, wherein the controller is adapted to utilize the advisory command to monitor read operations, and to place on hold an execution of the monitored read operations and an issuance of an interrupt in response to the non-completion command.

US Pat. No. 10,891,243

MEMORY BUS MR REGISTER PROGRAMMING PROCESS

Intel Corporation, Santa...

15. A computing system, comprising:a plurality of processing cores;
a network interface;
a memory controller, a memory channel emanating from the memory controller;
a memory module plugged into the memory channel, the memory module comprising a rank of memory chips, a registering clock driver chip and a data buffer chip, the data buffer chip comprising the below:
an interface to couple to the registering clock driver chip;
first register space to store a local identifier;
second register space to store a target identifier;
logic circuitry to receive a program command and the local identifier and write the local identifier into the first register space in response to the program command, the logic circuitry to subsequently:
i) receive a command and the target identifier from the registering clock driver chip and write the target identifier into the second register space;
ii) compare the target identifier and the local identifier; and,
iii) perform the command because the target identifier matches the local identifier.

US Pat. No. 10,891,242

EMBEDDED USB2 (EUSB2) REPEATER OPERATION

TEXAS INSTRUMENTS INCORPO...

1. A method of operating an embedded USB2 (eUSB2) peripheral repeater, comprising:receiving a downstream packet at a USB2 port of the eUSB2 peripheral repeater;
transitioning a USB transmitter of the eUSB2 peripheral repeater from an idle state to a standby state responsive to receiving the downstream packet at the USB2 port;
transitioning the USB transmitter of the eUSB2 peripheral repeater from the standby state to an active state if an upstream packet is received at an eUSB2 port of the eUSB2 peripheral repeater within a first time period of receiving the downstream packet at the USB2 port;
transmitting the upstream packet by the USB transmitter of the eUSB2 peripheral repeater during the active state;
transitioning the USB transmitter of the eUSB2 peripheral repeater from the active state to the standby state after transmission of the upstream packet; and
transitioning the USB transmitter of the eUSB2 peripheral repeater from the standby state to the idle state if more upstream packets are not received at the eUSB2 port of the eUSB2 peripheral repeater within a second time period.

US Pat. No. 10,891,241

CACHE MEMORY THAT SUPPORTS TAGLESS ADDRESSING

Rambus Inc., Sunnyvale, ...

1. An apparatus comprising:circuitry to receive a virtual address in connection with a memory access request from a processor, and to translate the virtual address into a first address and a main memory address;
circuitry to determine whether a first memory contains, at a location given by the first address, data corresponding to the virtual address; and
circuitry to direct the main memory address to main memory in the event that the location in the first memory given by the first address does not contain the data corresponding to the virtual address.

US Pat. No. 10,891,240

APPARATUS, METHODS, AND SYSTEMS FOR LOW LATENCY COMMUNICATION IN A CONFIGURABLE SPATIAL ACCELERATOR

Intel Corporation, Santa...

1. An apparatus comprising:a spatial array of processing elements to receive an input of a dataflow graph comprising a plurality of nodes, wherein the dataflow graph is to be overlaid into the spatial array of processing elements with each node represented as a dataflow operator in the spatial array of processing elements, and the spatial array of processing elements is to perform an operation by a respective, incoming operand set arriving at each of the dataflow operators;
a plurality of request address file circuits coupled to the spatial array of processing elements and a cache memory, each request address file circuit of the plurality of request address file circuits to access data in the cache memory in response to a request for data access from the spatial array of processing elements;
a plurality of translation lookaside buffers comprising a translation lookaside buffer in each of the plurality of request address file circuits to provide an output of a physical address for an input of a virtual address; and
a function controller to receive an interrupt that includes a first field, that when set to a first value, causes a shootdown message to be broadcast to the plurality of translation lookaside buffers to cause a shootdown in the plurality of translation lookaside buffers.

US Pat. No. 10,891,239

METHOD AND SYSTEM FOR OPERATING NAND FLASH PHYSICAL SPACE TO EXTEND MEMORY CAPACITY

Alibaba Group Holding Lim...

1. A computer system for facilitating operation of non-volatile memory, the system comprising:a processor; and
a memory coupled to the processor and storing instructions, which when executed by the processor cause the processor to perform a method, the method comprising:
assigning an application in a flash storage device to a first physical zone of a plurality of separate physical zones of the flash storage device,
wherein each physical zone has a dedicated application in the flash storage device to read or write data thereto;
determining, by a flash translation layer module, a first physical block address associated with a first request which indicates data to be read,
wherein the non-volatile memory comprises the flash storage device which is divided into the plurality of separate physical zones, and wherein the first physical block address is associated with the first physical zone;
determining, by the flash translation layer module, a second physical block associated with a second request which indicates data to be written,
wherein the second physical block address is associated with a second physical zone which is distinct from the first physical zone, and
wherein the first physical zone is processing the first read request;
determining a hot page in the non-volatile memory, wherein the hot page is a page with a history of access which is greater than a predetermined threshold, and wherein the predetermined threshold is based on a number of times that the page has been accessed within a predetermined period of time; and
loading, based on a physical block address for the hot page in the non-volatile memory, data from the non-volatile memory to the volatile memory.

US Pat. No. 10,891,238

DYNAMICALLY JOINING AND SPLITTING DYNAMIC ADDRESS TRANSLATION (DAT) TABLES BASED ON OPERATIONAL CONTEXT

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:determining, via a processor, context attributes of a storage;
creating, via the processor, data address translation (DAT) tables to map virtual addresses to real addresses within the storage;
detecting, via the processor, that a context attribute of the storage has changed; and
updating, via the processor, the DAT tables based at least in part on the changed context attributes of the storage, wherein the DAT tables are dynamically separated based upon the changed context attributes of the storage.

US Pat. No. 10,891,237

APPARATUS AND METHOD FOR MEDIATE PASS THROUGH AND SHARED MEMORY PAGE MERGE

Intel Corporation, Santa...

1. A method comprising:generating a page identifier (PI) for each of a set of guest memory pages, wherein equivalent PIs indicate that the corresponding memory pages are the same;
upon detecting that a first guest memory page and a second guest memory page have PIs that are equal, merging the first and second guest memory pages into a single memory page by mapping the first and second guest memory pages to the single memory page;
detecting that the first guest memory page is to be used for a direct memory access (DMA) operation; and
responsively unmerging the first and second guest memory pages by removing the mapping and designating both the first and second guest memory pages as DMA pages.

US Pat. No. 10,891,236

DATA STORAGE DEVICE AND OPERATING METHOD THEREOF

SK hynix Inc., Gyeonggi-...

1. A method for operating a data storage device which uses a nonvolatile memory device including data memory blocks each of which includes pages and a nonvolatile buffer memory block which temporarily stores data, the method comprising:receiving an unmap request which requests that an unmap address be erased, from a host device;
periodically storing the unmap address and flag information indicating that the unmap address is unmapped, in a first empty page of the nonvolatile buffer memory block of the nonvolatile memory device; and
mapping the unmap address and flagging flag information indicating that the unmap address is unmapped, in a physical-to-logical (P2L) map of a random access memory corresponding to the first empty page of the nonvolatile buffer memory block,
wherein, when recovery is made from a sudden power-off, the P2L map is rebuilt by referring to the unmap address and the flag information stored in the nonvolatile buffer memory block,
wherein, the unmap address is erased in a logical-to-physical (L2P) map of the nonvolatile memory device, based on the P2L map wherein the P2L map and the L2P map are distinct maps.

US Pat. No. 10,891,235

CACHE LINE STATUSES

Arm Limited, Cambridge (...

1. A method of controlling cache storage comprising cache lines configured to store data entries representing data which are retrievable from the cache storage when a storage access instruction contains a storage identifier which corresponds with a tag associated with a cache line,wherein said tag associated with said cache line comprises an individual tag portion associated with a single cache line, and a shareable tag portion which is associated with a plurality of cache lines, said individual tag portion comprising a pointer to a shareable tag storage location comprising the shareable tag portion,
the method comprising:
allowing re-use of a selected shareable tag storage location and thus updating a first shareable tag portion comprised therein to a second shareable tag portion;
identifying one or more cache lines associated with individual tag portions comprising a pointer to the selected shareable tag storage location;
setting a given cache line status for each of the identified cache lines, wherein the given cache line status:
a) allows a cache line to continue to be used in relation to a storage access instruction received before said given cache line status was set; and
b) inhibits the cache line from being used in relation to a storage access instruction received after the given cache line status is set; and
setting a first intermediate cache line status for a cache line before setting said given status and after sending the storage access instruction to data storage to retrieve data for storing as part of said cache line,
wherein the first intermediate cache line status allows said selected shareable tag storage location to be re-used,
wherein the method comprises setting a second intermediate cache line status for said cache line after storing data in the cache storage as part of said cache line based on said storage access instruction to said data storage, and
wherein the second intermediate cache line status allows said selected shareable tag storage location to be re-used.

US Pat. No. 10,891,234

CACHE PARTITIONING TO ACCELERATE CONCURRENT WORKLOADS

SAP SE, Walldorf (DE)

12. An in-memory database management system (DBMS), comprising:a memory comprising a hierarchical cache having a shared n-way associative last-level cache (LLC); and
at least one processor, communicatively coupled to the memory, and configured to perform operations comprising:
store a first bitmask, via an operating-system kernel interface, wherein the first bitmask comprises n bits, wherein n is a predetermined number equal to the number of ways in the LLC;
associate the first bitmask with a first core of the at least one processor, wherein the at least one processor comprises at least one multi-core processor;
set a value of a subset of the bits of the first bitmask, wherein the subset of the bits of the first bitmask represents at least one first portion of the LLC, and wherein any part of the first bitmask excluding the subset of the bits of the first bitmask represents at least one second portion of the LLC;
disallow eviction of any cache line in the at least one second portion of the LLC by the first core of the at least one processor;
execute at least one online transactional processing (OLAP) query using the first core of the at least one processor and only the first portion of the LLC represented by the first subset of bits of the first bitmask; and
execute at least one online transactional processing (OLTP) query using any core of the at least one processor and any portion of the LLC.

US Pat. No. 10,891,233

INTELLIGENT PREFETCH DISK-CACHING TECHNOLOGY

Intel Corporation, Santa...

1. A computing system comprising:a processor including a cache;
a storage device to store a file made up of a plurality of segments; and
a memory including a set of instructions, which when executed by the processor, cause the computing system to:
create a stack instance in response to a close operation,
populate the stack instance with one or more evicted memory locations,
identify a plurality of non-volatile memory locations associated with accesses to the file in response to the close operation with respect to the file, and
conduct a prefetch from one or more of the plurality of non-volatile memory locations that were in the cache and have been most recently accessed but are no longer in the cache and do not reference cached file segments based on a segment-by-segment threshold determination based on an amount of the accesses for individual segments of the plurality of segments, wherein the prefetch is conducted in response to an open operation with respect to the file and on a per-file segment basis, and wherein the prefetch is conducted from a top of the stack instance.

US Pat. No. 10,891,232

PAGE-BASED MEMORY OPERATION WITH HARDWARE INITIATED SECURE STORAGE KEY UPDATE

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:providing a drawer comprising a plurality of clusters, each of the plurality of clusters comprising a plurality of processors, wherein each of the plurality of clusters shares a first cache memory;
providing a cluster shared cache integrated circuit to manage a second cache memory shared among the plurality of clusters;
providing a system memory associated with each of the plurality of clusters; and
receiving, by a memory controller, a memory operation request from one of the plurality of processors, wherein the memory operation includes a store command;
wherein the memory controller is configured to:
perform the memory operation; and
atomically write a secure storage key for the memory operation with the store command of the memory operation, wherein the memory operation includes a move page command;
generating, by a hardware engine, the secure storage key for the move page command; and
sending, to the memory controller, the secure storage key along with a destination page address for the move page command.

US Pat. No. 10,891,231

STREAMING ENGINE WITH FLEXIBLE STREAMING ENGINE TEMPLATE SUPPORTING DIFFERING NUMBER OF NESTED LOOPS WITH CORRESPONDING LOOP COUNTS AND LOOP OFFSETS

Texas Instruments Incorpo...

1. A data processing device comprising:a processing core;
a memory;
a register configured to store a stream definition template including a stream dimension format field; and
a streaming data unit configured to receive the stream definition template from the register, to receive a plurality of data elements from a memory using a plurality of nested loops, and to provide the plurality of data elements as a data stream to the processing core;
wherein:
the plurality of nested loops is a first number of nested loops when the stream dimension format field indicates a first coding value corresponding to a first nested loop format, the first coding value indicating a size of a loop dimension field for one or more nested loops of the first number of nested loops;
the plurality of nested loops is a second number of nested loops when the stream dimension format field indicates a second coding value corresponding to a second nested loop format, the second coding value indicating a size of a loop dimension field for one or more nested loops of the second number of nested loops; and
the first number and the second number are different.

US Pat. No. 10,891,230

APPARATUSES, METHODS, AND SYSTEMS FOR SELECTIVE LINEAR ADDRESS MASKING BASED ON PROCESSOR PRIVILEGE LEVEL AND CONTROL REGISTER BITS

Intel Corporation, Santa...

1. A hardware processor comprising:an address generation unit to generate a linear address for a memory access request to a memory;
at least one control register comprising a user mode masking bit and a supervisor mode masking bit;
a register comprising a current privilege level indication; and
a memory management unit to mask out a proper subset of bits inside an address space of the linear address for the memory access request based on the current privilege level indication and either of the user mode masking bit or the supervisor mode masking bit to produce a resultant linear address, and output the resultant linear address.

US Pat. No. 10,891,229

MULTI-LEVEL CACHING METHOD AND MULTI-LEVEL CACHING SYSTEM FOR ENHANCING GRAPH PROCESSING PERFORMANCE

CHUNGBUK NATIONAL UNIVERS...

1. A multi-level caching method comprising:receiving a query request for graph data;
searching for the graph data within a first cache memory in which data output in response to a previous query request is stored;
re-searching for the graph data within a second cache memory in which neighboring data with prior access to the data stored within the first cache memory is stored when the graph data is not found in the first cache memory;
outputting first neighboring data found by the re-searching for the graph data when a response to the query request is output;
storing the first neighboring data within the first cache memory;
selecting data with prior access to the first neighboring data as new neighboring data;
replacing previously-stored neighboring data with the new neighboring data within the second cache memory;
identifying a list of vertices constituting a subgraph, for each previous query recorded in a query history table;
extracting a query pattern including a first vertex with a high frequency of use from the subgraph based on the list; and
setting a time-to-live (TTL) value of the first vertex based on a number of first vertices in the query pattern and a pattern weight assigned to the first vertex.

US Pat. No. 10,891,228

CACHE LINE STATES IDENTIFYING MEMORY CACHE

International Business Ma...

1. A cache memory control device for controlling a first cache memory of a multi-cache memory system, the cache memory control device comprising logic circuitry operable for:storing state information assigned to an invalid copy of a cache line stored in the first cache memory, wherein the state information comprises an indication that the cache line is invalid and also comprises a cache memory identifier identifying an individual second cache memory of the multi-cache memory system that is likely, based on a determination that the individual second cache memory contained a valid copy of the cache line, to contain the valid copy of the cache line, and wherein the multi-cache memory system comprises one or more processors, and wherein each of the one or more processors comprises multiple cache memories; and
spilling a copy of a cache line stored in the first cache memory in order to free memory space in the first memory cache, wherein the copy to be spilled is, if present, an invalid copy of a cache line with state information indicating that the respective copy stored in the first cache memory is invalid, wherein the state information comprises no cache memory identifier identifying a further cache memory of the multi-cache memory system that is likely to contain a valid copy of the respective cache line.

US Pat. No. 10,891,227

DETERMINING MODIFIED TRACKS TO DESTAGE DURING A CACHE SCAN

INTERNATIONAL BUSINESS MA...

1. A computer program product for destaging modified tracks to a first storage and a second storage and configured to communicate with a host, wherein the computer program product comprises a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause operations, the operations comprising:initiating a cache scan at a time interval to determine modified tracks to destage from a cache to the first or the second storage;
processing a modified track during the cache scan;
destaging the modified track to the first storage in response to the modified track stored in the first storage;
determining whether there is an indication there was a host write to the second storage since a previous cache scan in response to the modified track stored in the second storage; and
destaging the modified track to the second storage, before considering a next modified track to destage to the first storage or the second storage, in response to determining that there is the indication that there was a host write to the second storage since the previous cache scan.

US Pat. No. 10,891,226

VIRTUAL ADDRESS SPACE DUMP IN A COMPUTER SYSTEM

International Business Ma...

1. A computer-implemented method for operating a computer system to carry out a data dump of a data image of memory contents, the method comprising:in response to receipt of a data dump request to record a data image, suspending operations of the computer system that results in the data image being corrupted;
writing to a dump storage a subset of the pages required for the data image, including contents of the data image in the volatile memory;
preparing a record of the pages in the virtualized address space whose contents is still to be written to the dump storage as part of the data image;
resuming operations of the computer system under supervision of a monitoring process;
wherein the monitoring process includes checking page requests to access non-volatile memory to trap any that relate to a page contained in the record which is still to be written to the dump storage, and upon such a trap ensuring contents of the page is written to the dump storage space before any modification occurs; and
wherein the monitoring process further includes continually updating the record to keep track of which pages are still to be written to the dump storage.

US Pat. No. 10,891,225

HOST- DIRECTED SANITIZATION OF MEMORY

Micron Technology, Inc., ...

9. An apparatus for directed sanitization of memory, comprising:a memory comprising a plurality of blocks; and
a controller coupled to the memory and configured to perform, in response to receiving a sanitization command from a host, a deterministic garbage collection operation on the memory;
wherein performing the deterministic garbage collection operation results in physical erasure of invalid data stored on the memory regardless of an amount of invalid data each of the plurality of blocks comprises; and
wherein:
the host includes a trimming queue having logical block addresses (LBAs) associated with a file targeted for deletion; and
the host is configured to provide the LBAs associated with the file targeted for deletion to the controller in association with a forced flush of the trimming queue.

US Pat. No. 10,891,224

MAINTAINING DATA CONSISTENCY IN A MEMORY SUB SYSTEM THAT USES HYBRID WEAR LEVELING OPERATIONS

MICRON TECHNOLOGY, INC., ...

1. A method comprising:determining that a source group of data management units of a memory component satisfies a threshold wear condition pertaining to a number of write operations performed on data management units of the source group of data management units;
responsive to determining that the source group of data management units satisfies the threshold wear condition, performing a wear leveling operation by copying data from a first data management unit of the source group of data management units to a second data management unit of a destination group of data management units of the memory component;
determining a logical address of the first data management unit; and
moving, by a processing device, one or more indicators in a mapping data structure from one or more entries associated with the first data management unit to another one or more entries in the mapping data structure that are subsequent to the one or more entries associated with the first data management unit, wherein the one or more entries associated with the first data management unit are preceding the one or more indicators in the mapping data structure, indicating that the first data management unit has been copied from the source group of data management units to the second data management unit of the destination group of data management units, and wherein the another one or more entries where the one or more indicators are moved are associated with a third data management unit of the source group of data management units, indicating that the third data management unit remains in the source group of data management units.

US Pat. No. 10,891,223

STORAGE CLASS MEMORY STATUS

Micron Technology, Inc., ...

1. A device comprising:a storage class memory array; and
a controller including processing circuitry to perform operations comprising:
maintaining a storage portion characteristics data structure that comprises:
an array of elements to be accessed as a circular array, each element sized to store a reference to a storage portion in the storage class memory array;
a first pointer to a first element in the array of elements, the first pointer pointing to a start of a first list of elements in the array of elements, the first list of elements storing references to clean pages in the storage portion;
a second pointer to a second element in the array of elements, the second pointer pointing to a start of a second list of elements in the array of elements, the second list of elements storing references to invalidated pages in the storage portion, the start of the second list of elements following an end of the first list of elements; and
a third pointer to a third element in the array of elements, the third pointer pointing to a start of a third list of elements in the array of elements, the third list of elements storing references to unencumbered pages in the storage portion, the start of the third list of elements following an end of the second list of elements, the storage portion characteristics data structure having a direction of pointer motion that determines whether any one of the first pointer, the second pointer, and the third pointer is incremented or decremented when advanced to another element in the array of elements.

US Pat. No. 10,891,222

MEMORY STORAGE DEVICE AND OPERATION METHOD THEREOF FOR IMPLEMENTING INNER PRODUCT OPERATION

MACRONIX INTERNATIONAL CO...

1. A memory storage device for implementing inner product operations, the memory storage device including:a memory array, for receiving an input and generating a cell current, wherein the cell current is dependent to the input and a plurality of transconductance of a plurality of memory cells of the memory array;
a memory controller for performing accumulation of the input to obtain an input-accumulated value;
a reference array coupled to the memory controller, the reference array receiving the input-accumulated value from the memory controller for generating a current being dependent to the input and a plurality of transconductance of a plurality of reference cells of the reference array; and
an analog-to-digital converter (ADC) coupled to the memory array and the reference array, the ADC performing analog-digital-conversion on the cell current from the memory array based on the current from the reference array to generate an output,
wherein the output of the ADC indicates an inner product of the input and a weight, the weight including a positive weight and a negative weight, the positive weight being implemented by the transconductance of the memory cells of the memory array, and the negative weight being implemented by the transconductance of the reference cells of the reference array.

US Pat. No. 10,891,221

MEMORY MANAGEMENT IN NON-VOLATILE MEMORY

Microsoft Technology Lice...

1. A method for allocating memory in a computing device having a non-volatile main memory, the method comprising:receiving, by a memory allocator, a request for non-volatile memory allocation of an object from a program executing on the computing device, the request comprising a requested memory size and registration data from the program;
finding an available address of one of a plurality of portions of a page of the non-volatile memory, the page being a block of allocable memory;
searching an active page table in the non-volatile main memory to find the page and if the page is not found in the active page table:
inserting the page into the active page table, the page corresponding to the available address for the block of allocable memory and being the available address for an entire block of memory; and
waiting for an at most one memory write for inserting the page into the active page table to complete when the page is not found in the active page table, thereby allocating the memory.

US Pat. No. 10,891,220

SYSTEMS AND METHODS FOR REVISING PERMANENT ROM-BASED PROGRAMMING

ABBOTT DIABETES CARE INC....

1. A method of producing an analyte monitoring device, wherein the analyte monitoring device comprises a processor adapted to execute application software, a non-volatile writable memory, and a read-only memory (ROM) having a function lookup data structure and a first function stored thereon, wherein the function lookup data structure comprises an identifier for the first function and a first address of where the first function is stored, the method comprising:inputting a replacement function for the first function into the writable memory; and
inputting a revision lookup data structure into the writable memory, wherein the revision lookup data structure includes an identifier for the first function and a second address of where the replacement function for the first function is stored.

US Pat. No. 10,891,219

CODE FAILURE PREDICTION SYSTEM

ELECTRONIC ARTS INC., Re...

1. A method for video game failure analysis comprising:as implemented by an interactive computing system configured with specific computer-executable instructions,
receiving, from two or more different devices, data about an instance of a video game where a failure occurred, including:
receiving, from a first data source device, first failure data related to the instance of the video game where the failure occurred in the video game; and
receiving, from a context data source device, context data that relates to the instance of the video game where the failure occurred in the video game;
creating a first failure signature based at least on a combination of a subset of the first failure data and a subset of the context data;
comparing the first failure signature to a cluster of failure signatures using a weighted comparison;
determining based on the weighted comparison that the first failure signature has a threshold similarity to signatures included in the cluster of failure signatures, wherein the signatures included in the cluster of failure signatures relate to failures that occurred as a result of coding errors in a code of the video game;
including the first failure signature as part of the cluster of failure signatures;
determining a first video game state and a failure path based at least in part on a plurality of signatures in the cluster, the first video game state at least partially matching one or more video game states associated with the plurality of signatures in the cluster, the failure path defining a sequence of inputs applied within the video game to arrive at a second video game state associated with the failure;
using the first video game state to configure a test instance of the video game to execute the video game in the first video game state;
executing the test instance of the video game in the first video game state; and
inputting the sequence of inputs within the test instance of the video game to arrive at the second video game state associated with the failure in the video game.

US Pat. No. 10,891,218

AUTOMATIC PRE-DETECTION OF POTENTIAL CODING ISSUES AND RECOMMENDATION FOR RESOLUTION ACTIONS

International Business Ma...

1. A method for automatic pre-detection of potential software product impact and recommendation for resolutions, the method comprising the steps of:extracting, by a computer processor, symbols from an input phrase expressed in natural language containing a description of an untested software project change;
searching, by a computer processor, using Natural Language Processing with one or more machine learning models, natural language notations in a repository of historical software project changes;
selecting, by a computer processor, in advance of testing of the untested software project change, one or more test cases to employ to regression test and validate changes to the untested software project change according to the Natural Language Processing search and one or more effects attributed to matching the historical software project changes, the input phrase extracted symbols, and the natural language notations and wherein the input phrase comprises a proposed change to the untested software project change;
predicting, by a computer processor, a software error to be induced by programming changes corresponding to the proposed change;
suggesting, by a computer processor, the one or more selected test cases to a user via at least one computer output selected from the group consisting of a user interface device, a user-readable report, and a digital record stored in computer memory, and wherein the suggesting includes the predicted software error; and
responsive to receipt of user approval of the suggested one or more test cases, updating, by a computer processor, the one or more machine learning models.

US Pat. No. 10,891,217

OPTIMIZING TEST COVERAGE BASED ON ACTUAL USE

SAP SE, Walldorf (DE)

1. A computer-implemented method for test optimization, comprising:receiving, by one or more processors, a parameter set from a monitoring system, the parameter set comprising a plurality of configuration parameters corresponding to development artifacts detected by the monitoring system, wherein the parameter set is determined by an application program interface for a first test of code coverage;
retrieving, by the one or more processors, statistical data from a central data analysis infrastructure, wherein the statistical data is retrieved from application systems executing software created out of the development artifacts;
processing, by the one or more processors, the parameter set using the statistical data to generate parameter clusters; and
providing, by the one or more processors, the parameter clusters to an integrated development environment to generate a test scope proposal based on the parameter clusters.

US Pat. No. 10,891,216

PARALLEL DATA FLOW ANALYSIS PROCESSING TO STAGE AUTOMATED VULNERABILITY RESEARCH

Raytheon Company, Waltha...

1. A method for data flow analysis, comprising:obtaining, by a processing circuitry, an execution trace of a software program;
dividing, by the processing circuitry, the execution trace into a plurality of sections, each section identifying a sequence of instructions of the software program;
generating a plurality of definition-and-usage chains, at least some of the definition-and-usage chain being generated by different processors, at least some of the definition-and-usage chains being generated based on different sections of the execution trace, at least two of the definition-and-usage chains being generated in parallel with one another;
combining, by the processing circuitry, the plurality of definition-and-usage chains to produce a data flow graph, the definition-and-usage chains being combined based on information provided by at least one of the processors that are used to generate the definition-and-usage chains, the information indicating one or more unresolved memory locations that are accessed by respective operations corresponding to one or more incomplete usage nodes in the definition-and-usage chains; and
providing, by the processing circuitry, the data flow graph for further use in detecting vulnerabilities in the software program,
wherein any of the unresolved memory locations includes a memory location that is assigned a definition that is at least one of (A) produced by a first operation identified in one of the sections of the execution trace, and retrieved by a second operation identified in another one of the sections of the execution trace or (B) produced by a first operation corresponding to a first node in one of the definition-and-usage chains and retrieved by a second operation corresponding to a second node in another one of the definition-and-usage chains.

US Pat. No. 10,891,215

SYSTEM AND METHOD FOR USING AN UNOBTRUSIVE AND DISCREET EMBEDDED BARCODE FOR DEBUGGING

PAYPAL, INC., San Jose, ...

1. A system comprisinga non-transitory memory storing instructions;
a processor configured to execute the instructions to cause the system to:
obtain an indication that an application that is in use on a user device has changed state;
in response to the indication; collect information relating to aggregate interactions between the application and a user through the user device, and generate a debug identification number based on the collected information;
convert the debug identification number into a binary pattern, wherein the binary pattern maps to a color scheme;
generate, based in part on the binary pattern and color scheme, a barcode used to represent the collected information; and
embed the barcode on a user interface of the application.

US Pat. No. 10,891,214

TRANSFERRING A DEBUG CONFIGURATION AMONGST CARRIER THREADS FOR DEBUGGING A CARRIED THREAD

Oracle International Corp...

1. One or more non-transitory machine-readable media storing instructions which, when executed by one or more processors, cause:receiving, from a debugger, a first command for an action to be performed on a first thread;
wherein the first thread is mounted on a second thread;
wherein mounting the first thread on the second thread comprises linking a first frame set of the first thread to a second frame set of the second thread;
wherein a first execution context of the first thread includes the first frame set corresponding to a first set of methods called during execution of the first thread, without including the second frame set corresponding to a second set of methods called during execution of the second thread;
wherein a second execution context of the second thread includes (a) the first frame set corresponding to the first set of methods called during execution of the first thread, and (b) the second frame set corresponding to the second set of methods called during execution of the second thread;
responsive to receiving the first command: transmitting, to a debuggee, a second command to set a particular configuration for the second thread based on the action;
responsive at least to determining that the first thread is unmounted from the second thread: transmitting, to the debuggee, a third command to reset the particular configuration for the second thread;
wherein the action is not yet complete at a time the particular configuration for the second thread is reset.

US Pat. No. 10,891,213

CONVERTING BETWEEN A CARRIED THREAD AND A CARRIER THREAD FOR DEBUGGING THE CARRIED THREAD

Oracle International Corp...

1. One or more non-transitory machine-readable media storing instructions which, when executed by one or more processors, cause:receiving, from a debuggee, a first notification that (a) indicates an event occurred in association with a first thread and (b) comprises a first identifier of the first thread;
determining that a second thread is mounted on the first thread;
wherein mounting the second thread on the first thread comprises linking a first frame set of the second thread to a second frame set of the first thread;
wherein a first execution context of the first thread includes (a) the first frame set corresponding to a first set of methods called during execution of the second thread, and (b) the second frame set corresponding to a second set of methods called during execution of the first thread;
wherein a second execution context of the second thread includes the first frame set corresponding to the first set of methods called during execution of the second thread, without including the second frame set corresponding to the second set of methods called during execution of the first thread;
determining a second identifier corresponding to the second thread;
transmitting, to a debugger, a second notification that (a) indicates the event occurred in association with the second thread and (b) comprises the second identifier of the second thread.

US Pat. No. 10,891,212

IDENTIFYING FUNCTIONS PRONE TO LOGIC ERRORS IN BINARY SOFTWARE COMPONENTS

BlackBerry Limited, Wate...

1. A method, comprising:identifying a plurality of functions defined within a binary software component, each of the plurality of functions including one or more instructions;
determining one or more complexity characteristics of the each of the plurality of functions based on the included instructions, wherein determining the one or more complexity characteristics comprises determining a conditional branch ratio for a respective function by dividing a number of instructions included in the respective function by a number of instructions that are conditional branch instructions in the respective function;
determining an average conditional branch ratio based on the conditional branch ratio for each of the plurality of functions;
determining, based on the complexity characteristics, whether each of the plurality of functions is likely to produce errors when the instructions included in the function are executed by a processor, wherein whether each of the plurality of functions is determined to be likely to produce errors based, at least in part, on the conditional branch ratio of the respective function and the average conditional branch ratio of the plurality of functions; and
in response to determining that the function is likely to contain errors, generating an indication that the function requires further review.

US Pat. No. 10,891,211

SYSTEMS AND METHODS FOR VERSION CONTROL OF PIPELINED ENTERPRISE SOFTWARE

Instabase, Inc., San Fra...

1. A system configured for version control of pipelined enterprise software, wherein the enterprise software can be used by users, wherein the users include a first user and a second user, the system comprising:electronic storage configured to store information, wherein the information includes executable code of software applications that are installed and executable by the users, wherein the executable code includes sets of interconnected individual software applications that form software pipelines, wherein the executable code of the software applications includes a first software application, an alternative first software application, a second software application, a third software application, and a fourth software application, wherein the fourth application has a current version,
wherein a first software pipeline includes the first software application followed by the second software application followed by the fourth software application such that, in the first software pipeline, output generated by the first software application is used as input for the second software application, and further such that output generated by the second software application is used as input for the fourth software application,
wherein a second software pipeline includes the first software application followed by the third software application followed by the fourth software application such that, in the second software pipeline, output generated by the first software application is used as input for the third software application, and further such that output generated by the third software application is used as input for the fourth software application; and
one or more hardware processors configured by machine-readable instructions to:
receive first user input from a first user, wherein the first user input represents selection by the first user of the first software pipeline for execution of the first software pipeline;
receive second user input from a second user, wherein the second user input represents a second selection by the second user of the second software pipeline for execution of the second software pipeline;
make a first determination whether the second software pipeline would be improved if the alternative first software application replaced the first software application during the execution of the second software pipeline;
responsive to the first determination that the second software pipeline would be improved if the alternative first software application replaced the first software application during the execution of the second software pipeline, present a notification to the second user, wherein the notification notifies the second user that the second software pipeline would be improved if the alternative first software application replaced the first software application during the execution of the second software pipeline;
make a second determination that the second software pipeline would be improved if an older version of the fourth software application replaced the current version of the fourth software application, wherein the older version and the current version of the fourth software application perform different versions of similar tasks and are both included in the executable code;
responsive to the second determination that the second software pipeline would be improved if the older version of the fourth software application replaced the current version of the fourth software application, modify the second software pipeline by replacing the current version of the fourth software application with the older version of the fourth software application, prior to the execution of the second software pipeline for the second user;
facilitate the execution, through the executable code, of the first software pipeline for the first user; and
facilitate the execution, through the executable code, of the second software pipeline for the second user.

US Pat. No. 10,891,210

DATAFLOW ANALYSIS TO REDUCE THE OVERHEAD OF ON STACK REPLACEMENT

International Business Ma...

1. A method comprising:selecting an assumption point in a software program corresponding to a compile-time assumption made by a compiler;
selecting an assumption violation point corresponding to a location in the software program at which the compile-time assumption can be violated at runtime;
in response to propagating backwards in the software program from the assumption point and reaching the assumption violation point:
determining that the assumption point corresponds to a first method and the assumption violation point corresponds a second method that is different from the first method; and
inserting a conditional transition in the software program at the assumption violation point in response to the determining; and
executing a compiled version of the software program that comprises the conditional transition.

US Pat. No. 10,891,209

SYSTEM AND METHOD FOR STATISTICAL APPLICATION-AGNOSTIC FAULT DETECTION

OPEN INVENTION NETWORK LL...

1. A system, comprising:one or more memory locations configured to store one or more fault detectors and one or more applications;
one or more Central Processing Units operatively connected to said one or more memory locations and configured to execute said one or more applications on a host with a host operating system;
one or more event transformations configured to transform one or more event samples; and
one or more fault detectors configured to create one or more distributions for said one or more events and said transformed events, update said distribution based on new event samples and new transformed event samples, and configured to detect faults via a detection of significant deviation of recent events from the one or more distributions;
wherein said event transformations include at least one of a temporal event transformation comprised of event samples subject to a temporal filter, a spatial event transformation comprised of event samples subject to a spatial filter, and a raw event transformation comprised of a number of event samples.

US Pat. No. 10,891,208

ISSUING AN ALERT BASED ON MOBILE USER DEVICE LOCATION

MyOmega Systems GmbH, Nu...

1. A method of issuing an alert with respect to a first physical area, comprising:determining a location of a mobile user device of a user with respect to the first physical area controlled by a first entity;
following determining the current location, remotely configuring the mobile user device to detect when the mobile user device is within a predefined proximity to one or more second physical areas within the first physical area;
determining a safety classification of the user;
determining a safety classification of the one or more second physical areas; and
issuing the alert to one or more parties based on detecting that the user device is within the predefined proximity and based on a comparison of the safety classification of the user and the safety classification of the one or more second physical areas.

US Pat. No. 10,891,207

PROCESSOR WITH DEBUG PIPELINE

Texas Instruments Incorpo...

1. An electronic device comprising:an input/output (I/O) port;
a processor that includes:
an execution sub-system that includes an execution pipeline; and
a debug sub-system that includes a debug pipeline;
power circuitry that includes:
a first power domain to supply power to the execution pipeline; and
a second power domain to supply power to the debug sub-system; and
detection circuitry to:
detect a connection of an external debug tool to the I/O port; and
in response to detection of the connection of the external debug tool, provide a signal to the power circuitry indicating the connection of the external debug tool;
wherein the power circuitry, in response to the signal indicating connection of the external debug tool, causes the second power domain to supply power to the debug sub-system upon detection of the connection of the external debug tool to the I/O port and to otherwise prevent the second power domain from supplying power to the debug sub-system.

US Pat. No. 10,891,206

DISASTER RECOVERY ORCHESTRATION AND CAPACITY PLANNING IN DISAGGREGATED DATACENTERS

INTERNATIONAL BUSINESS MA...

1. A method for disaster recovery in a disaggregated computing system, by a processor, comprising:allocating a memory pool, wherein the memory pool includes allocated memory elements at a secondary, disaster recovery site for data received from memory pool elements within the memory pool at a primary site;
continuously replicating data from the memory pool elements at the primary site to the allocated memory elements at the disaster recovery site, wherein compute resources are physically disconnected from the allocated memory elements during the replicating;
using an orchestration mechanism to regulate an available amount of resources to be assigned to the allocated memory elements at the disaster recovery site during a failover operation for performing failover workloads associated with the replicated data upon the primary site becoming inoperable, wherein the failover workloads comprise workloads having a disaster recovery service level agreement (SLA); and
during the failover operation, dynamically connecting and assigning the compute resources at the disaster recovery site, in real-time, to the allocated memory elements to resume execution of the workloads having the disaster recovery SLA failed over from the primary site.

US Pat. No. 10,891,205

GEOGRAPHICALLY DISPERSED DISASTER RESTART MULTITENANCY SYSTEMS

EMC IP Holding Company LL...

1. A geographically dispersed disaster restart (“GDDR”) multitenancy system comprising a first GDDR complex and a second GDDR complex, wherein;the first GDDR complex comprises:
a first primary data storage device and a first secondary data storage device, wherein the first primary storage and the first secondary storage devices are geographically separated from one another; and
a first primary control instance and a first secondary control instance; and
the second GDDR complex comprises:
a second primary data storage device and a second secondary data storage device, wherein the second primary storage and the second secondary storage devices are geographically separated from one another; and
a second primary control instance and a second secondary control instance; the first GDDR complex and the second GDDR complex are run as a single instance of an operating system;
a third GDDR complex communicatively coupled to the first and second GDDR complexes, wherein the third GDDR further comprises:
a first tertiary data storage device; and
a first tertiary control instance, wherein the first tertiary control instance is located on the single logical partition.

US Pat. No. 10,891,204

MEMORY SYSTEM, A METHOD OF DETERMINING AN ERROR OF THE MEMORY SYSTEM AND AN ELECTRONIC APPARATUS HAVING THE MEMORY SYSTEM

SAMSUNG ELECTRONICS CO., ...

1. A memory system, comprising:a memory apparatus comprising a buffer die, a plurality of core dies disposed on the buffer die, a plurality of channels and a through silicon via configured to transmit a signal between the buffer die and at least one of the core dies;
a memory controller configured to output a command signal and an address signal to the memory apparatus, to output a data signal to the memory apparatus and to receive the data signal from the memory apparatus; and
an interposer comprising a plurality of channel paths for connecting the memory controller and the channels,
wherein the memory apparatus further comprises a path selector for changing a connection state between the channels and channel paths, wherein the path selector includes a multiplexer connected to at least two of the channels and at least two of the channel paths, and
wherein when an error of the memory system is detected in a first connection state between the channels and the channel paths, the path selector changes the first connection state to a second connection state between the channels and the channel paths,
wherein the buffer die is connected to the channel paths,
wherein the buffer die comprises a plurality of buffers, and
wherein the buffers are configured to output the data signal transmitted through at least one of the channel paths to at least one of the channels.

US Pat. No. 10,891,203

PREDICTIVE ANALYSIS, SCHEDULING AND OBSERVATION SYSTEM FOR USE WITH LOADING MULTIPLE FILES

Bank of America Corporati...

1. An apparatus for monitoring loading of multiple files, the apparatus comprising:a server comprising:
a receiver, said receiver being configured to receive a plurality of files, each of said files being associated with a specific data load job;
an observing engine configured to analyze the files, the analysis comprising deriving and/or otherwise determining the size and type of the files and deriving a timestamp reflecting the arrival time of each of the files at the server;
a comparison engine configured to compare the derived information with expected or anticipated information, said expected or anticipated information corresponding to information assigned to the files prior to receipt thereof;
a processor configured to:
use the comparison to create a profile for each of the plurality of files; and
gather a list of problematic file names and store the problematic file names and a problematic status code in the associated profile; and
a predictive analysis module configured to:
receive each profile; and
use the received profiles to provide to the server duration times for future file load jobs.

US Pat. No. 10,891,202

RECOVERY OF IN-MEMORY DATABASES USING A BACKWARD SCAN OF THE DATABASE TRANSACTION LOG

SAP SE, Walldorf (DE)

1. A method for data recovery in a database, the method comprising:accessing a transaction log having stored therein a plurality of transaction blocks, each transaction block associated with a database transaction and corresponding operations that comprise the database transaction, the plurality of transaction blocks ordered according to when their corresponding database transactions were completed, the plurality of log records in each transaction block ordered according to when their corresponding operations were performed on the database;
accessing a range of transaction blocks in the transaction log in reverse chronological order, starting from a latest transaction block and ending with an earliest transaction block that occurs earlier in time than the latest transaction block; and
recovering data in the database from each of the transaction blocks accessed in reverse chronological order by recovering database rows in the database that were acted on by database transactions associated with the accessed transaction blocks,
wherein the transaction log is a first transaction log segment, the method further comprising processing a plurality of subsequent transaction log segments to recover data in the database, including for each of the subsequent transaction log segments:
accessing a range of transaction blocks in the subsequent transaction log segment in reverse chronological order, starting from a latest transaction block and ending with an earliest transaction block that occurs earlier in time than the latest transaction block; and
recovering data in the database from each of the transaction blocks accessed in reverse chronological order by recovering database rows in the database that were acted on by database transactions associated with the accessed transaction blocks.

US Pat. No. 10,891,201

DYNAMIC RULE BASED MODEL FOR LONG TERM RETENTION

EMC IP Holding Company LL...

1. A method for restoring data on a multi-tiered storage system comprising:providing a server, which uses the data, coupled to a backup storage device and the multi-tiered storage system having a first storage device and a second storage device, wherein the first storage device has a higher performance than the second storage device;
storing a first group of the data on the first storage device and a second group of the data on the second storage device, wherein the first group of the data is accessed by the server more frequently than the second group of data;
writing by the multi-tiered storage system, storage device information as metadata for each of the first group of the data and the second group of the data;
backing up the first group of the data and the second group of the data on the backup storage device;
creating a data block map which includes a storage tier categorization that is based upon an access frequency for each of the first group of data and the second group of data, wherein the data block map comprises an identifier, an access frequency, a tiering policy, and a last categorization for each data chunk for each of the first group of data and the second group of data, wherein the last categorization is used to optimize migration of the data in case of loss of present categorization information for each data chunk;
recovering the first group of the data and the second group of the data on the backup storage device when a data restore is required;
identifying physical locations of the data, corresponding to a backup time, for each of the first group of the data and the second group of the data based upon the storage tier categorization for each of the first group of data and the second group of data recorded on the data block map; and
restoring a first group of the data on the first storage device and a second group of the data on the second storage device.

US Pat. No. 10,891,200

DATA PROTECTION AUTOMATIC OPTIMIZATION SYSTEM AND METHOD

Colbalt Iron, Inc., Lawr...

1. A system comprising:a memory; and
at least one processor to:
continually analyze at least one of metrics, events, and conditions in a computer network;
under normal operating conditions in the computer network, obtain a first level of data from at least one hardware device in the computer network;
detect that one of a condition and an event has occurred in the computer network;
automatically transmit an instruction to modify the first level of data obtained from the at least one hardware device to a second level of data more robust than the first level of data when one of the condition and the event has occurred, the second level of data collected from the at least one hardware device at a higher frequency than the first level of data and a higher fidelity than the first level of data;
collect the second level of data from the at least one hardware device for a data custody policy determined length period of time; and
store the second level of data obtained from the at least one hardware device.

US Pat. No. 10,891,199

OBJECT-LEVEL DATABASE RESTORE

Commvault Systems, Inc., ...

1. A system for backing up and restoring database data, the system comprising:a computing device comprising computer hardware, the computing device having a data agent executing thereon configured to:
intercept a first request from a database application executing on the computing device to read a portion of a database file,
wherein a secondary copy of the database file resides on one or more secondary storage devices in a secondary storage subsystem and is organized on the one or more secondary storage devices as a plurality of first blocks,
wherein the database file is organized by the database application as a plurality of application-level blocks, and each block of the plurality of first blocks includes multiple application-level blocks,
wherein the portion corresponds to a subset of one or more database objects of a plurality of database objects represented by the database file;
determine a subset of first blocks of the plurality of first blocks corresponding to portion of a database file included in the first request; and
issue a second request to restore the subset of first blocks from the one or more secondary storage devices; and
one or more secondary storage controller computers comprising computer hardware configured to:
in response to the second request:
access a table that maps the plurality of first blocks to one or more storage locations on the one or more secondary storage devices;
using the table, locate the subset of first blocks on the one or more secondary storage devices identified by the second request and retrieve the subset of first blocks from the one or more secondary storage devices;
forward the retrieved subset of first blocks for storage in one or more primary storage devices associated with the computing device;
extract application-level blocks corresponding to the requested portion from the retrieved subset of first blocks; and
forward the extracted application-level blocks to the database application.