Checking source code validity at time of code update

    公开(公告)号:US11675575B2

    公开(公告)日:2023-06-13

    申请号:US17931678

    申请日:2022-09-13

    CPC classification number: G06F8/447 G06F8/315 G06F8/423

    Abstract: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.

    SCALABLE AUTHENTICATION MANAGEMENT
    13.
    发明申请

    公开(公告)号:US20220417250A1

    公开(公告)日:2022-12-29

    申请号:US17361540

    申请日:2021-06-29

    Abstract: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.

    COGNITIVE PROBLEM ISOLATION IN QUICK PROVISION FAULT ANALYSIS

    公开(公告)号:US20210248022A1

    公开(公告)日:2021-08-12

    申请号:US16783652

    申请日:2020-02-06

    Abstract: An approach is provided in which a set of provision information is generated from a set of provisioners that are in process of fulfilling a client's provision request. The approach creates a set of provision events based on the set of provision information and, in response to detecting a failure of the provision request, the approach generates a provision chain from the set of provision events. The provision chain links the set of provision events based on correlation rules and identifies at least one isolation point of the failure. The approach informs the client of the at least one isolation point of the failure identified in the provision chain.

    Method of proactive object transferring management

    公开(公告)号:US10298690B2

    公开(公告)日:2019-05-21

    申请号:US15403062

    申请日:2017-01-10

    Abstract: Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A mobile device associated with a user detects a communication between that user and another user. A relationship between the users is determined from a profile. The relationship indicates that the users are authorized to transfer a file between mobile devices. Upon determining that a relationship exists between the users, the communication is sent to a network service. The network service evaluates the communication for an intention to transfer a file between the users.

    Method of proactive object transferring management

    公开(公告)号:US10249295B2

    公开(公告)日:2019-04-02

    申请号:US15403032

    申请日:2017-01-10

    Abstract: Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A cognitive service monitors a communication between a given user and another user. The communication is exchanged by a mobile device associated with the given user and a mobile device of the other user. The cognitive service determines a context of the communication. The cognitive service detects, based on the context of the communication, a request between the users to share a file maintained by the given user. Upon successfully validating the request, a transfer of the file to the second user is performed.

    Discrete Password Entry Using Keyboard with Character and Position Carriers
    17.
    发明申请
    Discrete Password Entry Using Keyboard with Character and Position Carriers 有权
    使用带有字符和位置载体的键盘进行离散密码输入

    公开(公告)号:US20160063228A1

    公开(公告)日:2016-03-03

    申请号:US14832870

    申请日:2015-08-21

    Abstract: A method and apparatus for password entry, the method comprising: displaying a password inputting keyboard on a display, the keyboard including a character carrier and a position carrier, the character carrier and the position carrier are capable of relative movement between each other so that when the position of a character in the character carrier is corresponding to a position mark on the position carrier, the position of at least one other character in the character carrier is corresponding to at least one other position mark in the position carrier; in response to a user causing relative movement between the character carrier and the position carrier, aligning a character in the character carrier with a position mark in the position carrier; and in response to a lapse of a predetermined time, recording the character and its input order and changing the layout of the password inputting keyboard.

    Abstract translation: 一种用于密码输入的方​​法和装置,所述方法包括:在显示器上显示密码输入键盘,所述键盘包括字符载体和位置载体,所述字符载体和位置载体能够相互之间相对移动, 字符载体中的字符的位置对应于位置载体上的位置标记,字符载体中的至少一个其他字符的位置对应于位置载体中的至少一个其他位置标记; 响应于用户引起字符载体和位置载体之间的相对移动,将字符载体中的字符与位置载体中的位置标记对齐; 并且响应于经过预定时间,记录字符及其输入顺序并改变密码输入键盘的布局。

    TRAINING MACHINE LEARNING MODELS TO AUTOMATICALLY DETECT AND CORRECT CONTEXTUAL AND LOGICAL ERRORS

    公开(公告)号:US20250068843A1

    公开(公告)日:2025-02-27

    申请号:US18455396

    申请日:2023-08-24

    Abstract: Provided are techniques for training Machine Learning (ML) models to automatically detect and correct contextual and logical errors. A plurality of machine learning models are trained. In response to receiving content, the content is parsed into different elements. One or more knowledge graphs are built based on the different elements. One or more machine learning models are selected from the plurality of machine learning models based on the one or more knowledge graphs and custom criteria in a user profile. The selected one or more machine learning models are used to identify at least one of a contextual error and a logical error and a correction for the at least one of the contextual error and the logical error. The correction for the at least one of the contextual error and the logical error is applied to generate corrected content. The corrected content is rendered.

Patent Agency Ranking