Lightweight remote process execution

    公开(公告)号:US12190159B2

    公开(公告)日:2025-01-07

    申请号:US17514873

    申请日:2021-10-29

    Inventor: Lior Okman

    Abstract: The present disclosure involves systems, software, and computer implemented methods for remotely executing binaries in a containerized computing environment using a lightweight inter-process communications protocol (IPC) and UNIX domain sockets. One example method includes establishing, in a shared computing image comprising a plurality of containers, a listening UNIX domain socket, where the listening UNIX domain socket is shared between all containers in the shared computing image. A request to execute a binary in the target container is received at a target container and from a client container using the listening UNIX domain socket. A worker service is generated in the target container. The worker service executes the binary in the target container. A return exit code associated with the executed binary is received and sent to the client container using the UNIX domain socket.

    Security policy as a service
    2.
    发明授权

    公开(公告)号:US11677785B2

    公开(公告)日:2023-06-13

    申请号:US16273389

    申请日:2019-02-12

    CPC classification number: H04L63/20 H04L41/28 H04L63/102

    Abstract: According to some embodiments, a security model data store may contain a plurality of potential security policies, each accessible by multiple external applications. A security specifications data store may contain a plurality of potential security specifications, each accessible by the multiple external applications. A security policy engine computer platform may receive from an external application an indication identifying a security policy package. The security policy engine may then retrieve, based on the received indication, one of the potential security models from the security policy data store. Similarly, the security policy engine may retrieve, based on the received indication, one of the potential security specifications from the security specifications data store. The security policy engine may then arrange for a security policy package to be implemented for the external application, the security policy packing being associated with the retrieved potential security model and the retrieved potential security specification.

    ARTIFICIAL CROWD INTELLIGENCE VIA NETWORKING RECOMMENDATION ENGINES

    公开(公告)号:US20230071653A1

    公开(公告)日:2023-03-09

    申请号:US17898230

    申请日:2022-08-29

    Abstract: Techniques for implementing artificial crowd intelligence via networking of recommendation engines are disclosed. In some example embodiments, a base recommendation engine performs a computer-implemented method comprising: receiving a recommendation request; generating a first plurality of recommendations based on the recommendation request using a base recommendation model; obtaining one or more other recommendations from one or more other recommendation engines, each one of the other recommendation engines being configured to generate the other recommendations based on the recommendation request using a corresponding recommendation model; obtaining a corresponding weight for the other recommendation engine(s); selecting at least one recommendation from the first plurality of recommendations and the other recommendation(s) using the corresponding weight(s); and causing the selected recommendation(s) to be displayed.

    Automatic development of a service-specific chatbot

    公开(公告)号:US11366573B2

    公开(公告)日:2022-06-21

    申请号:US16186181

    申请日:2018-11-09

    Abstract: A service descriptor file is retrieved from a remote database by a server, where the service descriptor file describes a service corresponding to a service-specific chatbot requested by a user. The received service descriptor is parsed to obtain a capability and relevant service data associated with the service. The service-specific chatbot is generated with at least one object that is based on the obtained capability and relevant service data, where the at least one object includes intents, expressions, and skills that correspond to the service. The generated service-specific chatbot is provided to the user through at least one channel to enable an interaction with the service-specific chatbot with a graphical user interface.

    Multi-cloud object store access
    5.
    发明授权

    公开(公告)号:US11301498B2

    公开(公告)日:2022-04-12

    申请号:US16535235

    申请日:2019-08-08

    Abstract: The present disclosure involves systems, software, and computer implemented methods for accessing an object store. One example method includes providing a persistency factory object configured to provide access to multiple types of persistency adapters. Each type of persistency adapter is configured to interface with a particular object store. A persistency adapter request is received from a consumer. A type of adapter to provide is determined. A determination is made that the consumer is configured to interface with a first object store and that a first persistency adapter class is associated with the first object store. A run-time reference to an instance of the first persistency adapter class is provided to the consumer. A first object store operation request to perform a first object store operation is received. The instance of the first persistency adapter class interfaces with the first object store to fulfill the first object store operation request.

    Dynamic configurable rule representation

    公开(公告)号:US11263533B2

    公开(公告)日:2022-03-01

    申请号:US16033944

    申请日:2018-07-12

    Inventor: Pablo Roisman

    Abstract: A rule is received at a client application from an input text control. The received rule includes a sequence of characters and is parsed into a plurality of tokens. For each of the tokens, a plurality of behaviors associated with that token are configured to generate a behavior configuration. Each of the generated behavior configurations can be modified by an authorized user. A user interface (UI) control is generated based on the behavior configurations.

    Lightweight remote process execution

    公开(公告)号:US11188386B2

    公开(公告)日:2021-11-30

    申请号:US16671269

    申请日:2019-11-01

    Inventor: Lior Okman

    Abstract: The present disclosure involves systems, software, and computer implemented methods for remotely executing binaries in a containerized computing environment using a lightweight inter-process communications protocol (IPC) and UNIX domain sockets. One example method includes establishing, in a shared computing image comprising a plurality of containers, a listening UNIX domain socket, where the listening UNIX domain socket is shared between all containers in the shared computing image. A request to execute a binary in the target container is received at a target container and from a client container using the listening UNIX domain socket. A worker service is generated in the target container. The worker service executes the binary in the target container. A return exit code associated with the executed binary is received and sent to the client container using the UNIX domain socket.

    Synchronizing user interface controls

    公开(公告)号:US10754671B2

    公开(公告)日:2020-08-25

    申请号:US16048889

    申请日:2018-07-30

    Abstract: Implementations of the present disclosure disclose synchronizing UI controls. At each user interface (UI) control associated with an application, a corresponding plugin is created, where the created plugin is associated with a technology and a UI view, and where the application includes a plurality of UI controls. Each UI control associated with the application is registered to a database, where each UI control is registered as a subscriber associated with a tag. An event is sent from at least one UI control to the database according to a change that occurred on that UI control. Each of the registered UI controls associated with the tag are updated.

    Event log analyzer
    10.
    发明授权

    公开(公告)号:US10587555B2

    公开(公告)日:2020-03-10

    申请号:US14841965

    申请日:2015-09-01

    Abstract: The present disclosure involves systems, software, and computer implemented methods for correlating critical events to identified log data. An example event log analyzer can identify a set of log messages. One or more occurrences of a first critical event and a time of each of the occurrences are identified. One or more candidate subsets of log messages are identified. Each log message in each candidate subset is associated with a timestamp that is within a predefined time window prior to the time of an occurrence of the first critical event. A candidate subset of log messages is selected as a correlator of the first critical event. A rule is defined using the selected candidate subset of log messages. The rule defines a second critical event that correlates to the first critical event. The rule is associated with one or more actions to perform when the second critical event occurs.

Patent Agency Ranking