-
1.
公开(公告)号:US20240364682A1
公开(公告)日:2024-10-31
申请号:US18765947
申请日:2024-07-08
申请人: DENSO CORPORATION
发明人: Kazuya Yamada , Masayuki Kondo
CPC分类号: H04L63/083 , G06F9/547
摘要: A vehicle utilization system includes a first server and a second server connected to each other. An authorization policy defining a vehicle function and a condition is registered in the first server. Upon receiving an authorization request for the vehicle function from an external server along with an execution condition, the first server stores the execution condition and an authorization policy, and transmits the authorization request to the second server. Upon accepting the authorization request, the second server obtains authorization for the vehicle function and issues a second access token. The first server holds the second access token and issues a first access token, and upon receiving a request for execution along with the first access token, the first server determines whether the execution condition is satisfied, and when the execution condition is satisfied, the first server requests the second server to instruct execution of the vehicle function.
-
公开(公告)号:US20240362330A1
公开(公告)日:2024-10-31
申请号:US18308274
申请日:2023-04-27
申请人: VMware LLC
发明人: Giovanni Vigna , Stefano Ortolani , Roman Vasilenko , Christopher Kruegel , Saastha Vasan , Hojjat Aghakhani
IPC分类号: G06F21/56 , G06F9/54 , G06N3/044 , G06N3/045 , G06N3/0464
CPC分类号: G06F21/566 , G06F9/54 , G06N3/044 , G06N3/045 , G06N3/0464 , G06F2221/033
摘要: A system that uses machine learning (ML) models—and in particular, deep neural networks—with features extracted from memory snapshots of malware programs to automatically recognize the presence of malicious techniques in such programs is provided. In various embodiments, this system can recognize the presence of malicious techniques that are defined by the MITRE ATT&CK framework and/or other similar frameworks/taxonomies.
-
公开(公告)号:US12132716B2
公开(公告)日:2024-10-29
申请号:US17231993
申请日:2021-04-15
申请人: Salesforce, Inc.
发明人: Charles Hart Isaacs
CPC分类号: H04L63/08 , G06F9/54 , H04L63/102
摘要: A computing platform is configurable to cause initiating a communication session with a user, the user having a user account associated with a workflow data object, the workflow data object being configured to represent a plurality of operations included in a workflow. The computing platform is also configurable to cause identifying a verified status indicator associated with at least one of the plurality of operations, the verified status indicator comprising a verified credential associated with at least one of the plurality of operations. The computing platform is also configurable to cause identifying a transfer operation associated with the verified status indicator and identifying a target entity associated with the transfer operation. The computing platform is also configurable to cause implementing the identified transfer operation based, at least in part, on identified target entity.
-
公开(公告)号:US12131294B2
公开(公告)日:2024-10-29
申请号:US17863617
申请日:2022-07-13
IPC分类号: G06Q10/109 , G06F3/0481 , G06F9/54 , G06N5/025 , G06N5/04 , G06N5/047 , G06Q10/10 , H04N7/15
CPC分类号: G06Q10/109 , G06F3/0481 , G06F9/54 , G06F9/542 , G06F9/546 , G06F9/547 , G06F9/548 , G06N5/025 , G06N5/04 , G06N5/047 , G06Q10/10 , H04N7/15
摘要: An activity stream based interaction model and systems implementing such a model are disclosed. In various embodiments, a text-based tag is recognized in a received communication stream, such as an activity stream. An action indicated by text included in the tag is determined and performed in response to receiving the tag. In some embodiments, a tag to be inserted into the communication stream may be determined automatically by a machine or a process running on a machine, for example a workflow engine.
-
公开(公告)号:US12131204B1
公开(公告)日:2024-10-29
申请号:US17900160
申请日:2022-08-31
申请人: Zoox, Inc.
发明人: Ryan Martin Cahoon , Ryder Rishel , Shao-Han Tang
CPC分类号: G06F9/546 , G06F9/44505
摘要: This disclosure describes techniques for latency mitigation during inter-process communication based on pre-allocating and managing shared memory. During the startup phase (e.g., prior to run-time), processes of vehicle computing systems may request to engage in communication with other processes within the vehicle computing system. Based on the request, a memory manager may determine an amount of shared memory to pre-allocate. In such examples, the amount of shared memory may be determined based on a maximum number of messages that may be “in-flight” at any single instance during run-time, and a maximum size of a message. The memory manager may pre-allocate shared memory consistent with the determined amount, and transmit a key to the requesting process. In such examples, the key may enable the process to access the pre-allocated shared memory. After the startup phase has ended, the process may read and/or write messages to and from the shared memory.
-
公开(公告)号:US12131186B2
公开(公告)日:2024-10-29
申请号:US17993490
申请日:2022-11-23
发明人: Anthony Gutierrez , Sooraj Puthoor
CPC分类号: G06F9/4881 , G06F9/3877 , G06F9/542 , G06F9/545 , G06F9/546
摘要: A processor core is configured to execute a parent task that is described by a data structure stored in a memory. A coprocessor is configured to dispatch a child task to the at least one processor core in response to the coprocessor receiving a request from the parent task concurrently with the parent task executing on the at least one processor core. In some cases, the parent task registers the child task in a task pool and the child task is a future task that is configured to monitor a completion object and enqueue another task associated with the future task in response to detecting the completion object. The future task is configured to self-enqueue by adding a continuation future task to a continuation queue for subsequent execution in response to the future task failing to detect the completion object.
-
公开(公告)号:US12130842B2
公开(公告)日:2024-10-29
申请号:US18178417
申请日:2023-03-03
申请人: Splunk Inc.
发明人: Michael Joseph Baum , R. David Carasso , Robin Kumar Das , Bradley Hall , Brian Philip Murphy , Stephen Phillip Sorkin , Andre David Stechert , Erik M. Swan , Rory Greene , Nicholas Christian Mealy , Christina Frances Regina Noren
CPC分类号: G06F16/285 , G06F9/54 , G06F9/541 , G06F9/542 , G06F18/21
摘要: Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have taken place and been recorded in raw data format. In one embodiment, machine data is turned into a machine data web by organizing machine data into events and then linking events together.
-
公开(公告)号:US12130784B2
公开(公告)日:2024-10-29
申请号:US18382923
申请日:2023-10-23
申请人: VJ Solutions LLC
IPC分类号: G06F16/24 , G06F8/61 , G06F9/445 , G06F9/54 , G06F16/21 , G06F16/23 , G06F16/2455 , G06F16/248 , G06F21/44
CPC分类号: G06F16/21 , G06F8/61 , G06F9/44526 , G06F9/541 , G06F16/23 , G06F16/2455 , G06F16/24556 , G06F16/248 , G06F21/44
摘要: In some aspects, a first plug-in module that is installed on a server receives an instruction to install a particular database on a first target server that is near (e.g., less than a threshold number of hops from or having less than a threshold latency communicating with) the server. The first plug-in module creates a first persistent authentication session between the server and the first target server and initiates a first installation of a first database on the first target server using the first persistent authentication session. Concurrently with the first installation, a second plug-in module that is installed on a second server initiates a second installation of a second database on a second target server using a second persistent authentication session. The second target server is near the second server.
-
公开(公告)号:US20240357010A1
公开(公告)日:2024-10-24
申请号:US18762607
申请日:2024-07-02
发明人: Hugh WILLIAMS , Antony Ian Taylor ROWSTRON , Richard BLACK , Austin DONNELLY , Serguei Anatolievitch LEGTCHENKO , Aaron OGUS , Douglas PHILLIPS
IPC分类号: H04L67/1097 , G06F3/06 , G06F9/50 , G06F9/54 , G06F11/20 , H04L49/356
CPC分类号: H04L67/1097 , G06F3/0619 , G06F3/065 , G06F3/0661 , G06F3/067 , G06F9/5061 , G06F9/54 , G06F11/2094 , H04L49/356 , G06F2201/805
摘要: A server system comprising processing devices, disks and a storage fabric, all arranged to operate according to a storage fabric protocol in order to communicate between the processing devices and the storage devices over the storage fabric, wherein the storage fabric is settable with a mapping determining which of the processing devices are allocated to use which of the storage devices in providing said services to the client systems. The system comprises a control function arranged to dynamically adapt the mapping in response to either: (i) failure or other downtime of one of the processing devices, storage devices, a component of the storage fabric or a connection in the storage fabric; or (ii) a current demand for the services from the client systems.
-
公开(公告)号:US20240354407A1
公开(公告)日:2024-10-24
申请号:US18642058
申请日:2024-04-22
申请人: Sophos Limited
发明人: Steven John Braggs , Tzu-yi Lin
CPC分类号: G06F21/56 , G06F9/542 , G06F2221/034
摘要: Malware attacks seek to exploit target computing systems and avoid detection by terminating security, antivirus, or other application process threads in the operating system. Methods and systems for detecting kernel-based thread termination activity enable the detection of thread termination events occurring at the kernel level, in order to identify and mitigate known or suspected malware activity.
-
-
-
-
-
-
-
-
-