Multi-user probabalistic array
    611.
    发明授权

    公开(公告)号:US10558634B2

    公开(公告)日:2020-02-11

    申请号:US15257216

    申请日:2016-09-06

    Inventor: Matthew Fuchs

    Abstract: A system receives an association of first item with first system user, generates first hash value by applying first hash function associated with first system user to first item identifier associated with first item, and sets a bit corresponding to first hash value in array. The system receives an association of second item with second system user, generates second hash value by applying second hash function associated with second user to second item identifier associated with second item, and sets a bit corresponding to second hash value in array. The system receives a request to determine whether third item is associated with first system user, generates third hash value by applying first hash function to third item identifier associated with third item, and outputs message that third item is not associated with first user if a bit corresponding to third hash value is not set in array.

    Client fingerprinting for information system security

    公开(公告)号:US10536439B2

    公开(公告)日:2020-01-14

    申请号:US15589220

    申请日:2017-05-08

    Abstract: Client fingerprints can be used to detect and defend against malware and hacking into information systems more effectively than using IP addresses. A unique client fingerprint can be based on data found in the client's SSL client hello packet. SSL version, cipher suites, and other fields of the packet can be utilized, preferably utilizing individual field values in the order in which they appear in the packet. The ordered values are converted to decimal values, separated by delimiters, and concatenated to form an identifier string. The identifier string may be mapped, preferably by a hash function, to form the client fingerprint. The client fingerprint may be logged, and whitelists and blacklists may be formed using client fingerprints so formed.

    Systems, methods, and apparatuses for implementing a stateless, deterministic scheduler and work discovery system with interruption recovery

    公开(公告)号:US10514951B2

    公开(公告)日:2019-12-24

    申请号:US15587161

    申请日:2017-05-04

    Abstract: In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing a stateless, deterministic scheduler and work discovery system with interruption recovery. For instance, according to one embodiment, there is disclosed a system to implement a stateless scheduler service, in which the system includes: a processor and a memory to execute instructions at the system; a compute resource discovery engine to identify one or more computing resources available to execute workload tasks; a workload discovery engine to identify a plurality of workload tasks to be scheduled for execution; a local cache to store information on behalf of the compute resource discovery engine and the workload discovery engine; a scheduler to request information from the local cache specifying the one or more computing resources available to execute workload tasks and the plurality of workload tasks to be scheduled for execution; and further in which the scheduler is to schedule at least a portion of the plurality of workload tasks for execution via the one or more computing resources based on the information requested. Other related embodiments are disclosed.

    User availability aware communication system

    公开(公告)号:US10511564B2

    公开(公告)日:2019-12-17

    申请号:US15411513

    申请日:2017-01-20

    Inventor: Shailesh Govande

    Abstract: This disclosure provides various techniques that may allow for user availability aware communication. For example, a first user may desire to send an electronic message to a second user, but may not have a way to intelligently select a messaging service to use. This disclosure provides, in one example of user availability aware messaging, that a particular messaging service may be selected based on activity information regarding the second user's activity on one or more messaging services. The electronic message may be sent to the second user via the particular messaging service.

    Hybrid code modification in intermediate language for software application

    公开(公告)号:US10481996B2

    公开(公告)日:2019-11-19

    申请号:US16271210

    申请日:2019-02-08

    Inventor: Sergey Gorbaty

    Abstract: Computer program, methods, and systems for code modification of a programming language platform and a software application in an intermediate language at different times are disclosed. The methods and system may modify a portion of the programming language platform in the intermediate language at a first time to alter a functionality of or add a new functionality to the programming language platform; and may modify the software application in the intermediate language at a second time different from the first time, where the software application may be modified based on a runtime analysis rule that uses the altered or added new functionality of the programming language platform. The modified programming language platform may be included in a first package, and the modified software application may be included in a second package, and executed on the modified programming language platform.

    Identity confirmation using private keys

    公开(公告)号:US10476855B1

    公开(公告)日:2019-11-12

    申请号:US15689098

    申请日:2017-08-29

    Abstract: Systems and methods for identify confirmation and transaction security are described. The system generates a challenge. The system transmits to a client computing system an encrypted challenge generated using the challenge and a public key of an asymmetric key pair to a client computing system. The system fragments a private key of the asymmetric key pair into a first, second and third private key fragments. The system generates a first partially decrypted challenge using the first private key fragment and the encrypted challenge. The system receives a second and a third partially decrypted challenges from the client computing system. The system generates a decrypted challenge using the first, second and third partially decrypted challenges. The system compares the decrypted challenge and the challenge for identity verification.

    Methods and systems for automating deployment of applications in a multi-tenant database environment

    公开(公告)号:US10474492B2

    公开(公告)日:2019-11-12

    申请号:US15365772

    申请日:2016-11-30

    Abstract: In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine.

    Facilitating integration of collaborative communication platform and document collaboration tool

    公开(公告)号:US10469438B2

    公开(公告)日:2019-11-05

    申请号:US15443840

    申请日:2017-02-27

    Inventor: Tarang Luthra

    Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for integrating a collaborative communication system and a document collaboration system. A document within the document collaboration system may be linked to an object within the collaborative communication system. A user post may be received in association with the object or the document. A first feed configured to be rendered in association with the object is synchronized with a second feed configured to be rendered in association with the document such that both the first feed and the second feed each includes the user post.

Patent Agency Ranking