Oracle International Corporation

United States of America

Back to Profile

1-100 of 1,448 for Oracle International Corporation Sort by
Query
Patent
World - WIPO
Aggregations Reset Report
Date
New (last 4 weeks) 15
2025 January (MTD) 13
2024 December 4
2024 November 16
2024 October 8
See more
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 215
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU] 198
H04L 29/06 - Communication control; Communication processing characterised by a protocol 102
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 82
H04L 9/40 - Network security protocols 54
See more
Found results for  patents
  1     2     3     ...     15        Next Page

1.

CONFIGURATION DATA MANAGEMENT

      
Application Number US2024037633
Publication Number 2025/015188
Status In Force
Filing Date 2024-07-11
Publication Date 2025-01-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Juneja, Rohit
  • Pai, Sandesh

Abstract

Various embodiments of the present technology generally relate to systems and methods for managing configuration data in a virtual or containerized software environment. A configuration data management system may enable ConfigMaps to be added to an application pod of a virtual software environment without restarting the application pod, a ConfigMap including a data object containing configuration data. The configuration data management process may monitor for creation of a first ConfigMap in the virtual software environment, append a name of the first ConfigMap to a data element name from the first ConfigMap to produce an appended data element, and store the appended data element to a super ConfigMap, the super ConfigMap including a specialized ConfigMap configured to contain data elements from multiple ConfigMaps.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/445 - Program loading or initiating

2.

CLOUD BASED NETWORK FUNCTION

      
Application Number US2024037622
Publication Number 2025/015180
Status In Force
Filing Date 2024-07-11
Publication Date 2025-01-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Juneja, Rohit
  • Munnaluru, Pardhiva Janardhana Krishna

Abstract

Systems and methods are disclosed for implementing a cloud based network function. In certain embodiments, a method may comprise operating a custom operator in a containerized software environment such as Kubernetes to manage a virtual network interface controller (Vnic) on an application pod, the Vnic being reachable directly from a network external to the containerized software environment. The method may include identifying the application pod to which to add the Vnic, determining a worker node in the containerized software environment on which the application pod is running, creating the Vnic on the worker node, and executing a job on the worker node to inject the Vnic into the application pod.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/0803 - Configuration setting

3.

VIRTUAL IP FOR A CONTAINER POD

      
Application Number US2024037641
Publication Number 2025/015193
Status In Force
Filing Date 2024-07-11
Publication Date 2025-01-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Juneja, Rohit
  • Munnaluru, Pardhiva Janardhana Krishna

Abstract

Systems and methods are disclosed for implementing a virtual IP for a container pod. In certain embodiments, a method may comprise operating a cloud based network system in a containerized software environment to assign a virtual internet protocol (VIP) address to an application pod of a containerized software environment, the VIP being directly reachable from a network external to the containerized software environment. The method may include reserving a range of internet protocol (IP) addresses for use as VIP addresses, assigning a first fixed IP address to a first application pod, assigning a first VIP address from the range of IP addresses to the first application pod, and routing traffic directed to the first VIP address to the first fixed IP address.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 61/5061 - Pools of addresses
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

4.

CLOUD NETWORK SERVICE MANAGEMENT

      
Application Number US2024037645
Publication Number 2025/015196
Status In Force
Filing Date 2024-07-11
Publication Date 2025-01-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Juneja, Rohit
  • Munnaluru, Pardhiva Janardhana Krishna

Abstract

Systems and methods are disclosed for implementing cloud network service management. In certain embodiments, a method may comprise operating a cloud native application (CnApp) custom operator in a containerized software environment to dynamically manage cloud native network service on a target application pod via a persistent network interface to an external network. The method may include obtaining a first resource definition data, for a first custom resource, to define attributes for a bundle of resources used to implement the cloud native network service, and creating the first custom resource based on the first resource definition data, including initializing the target application pod. The method may include generating a second resource definition data, derived from the first resource definition data, to define attributes for a virtual network interface to associate with the target application pod, and applying the second resource definition data to initialize creation of a second custom resource.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

5.

MACHINE LEARNING MODEL GENERATION FOR TIME DEPENDENT DATA

      
Application Number US2024013090
Publication Number 2025/010089
Status In Force
Filing Date 2024-01-26
Publication Date 2025-01-09
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Agrawal, Vikas
  • Mani, Karthik Bangalore
  • Ramanathan, Krishnan

Abstract

Embodiments generate a machine learning ("ML") model. Embodiments receive training data, the training data including time dependent data and a plurality of dates corresponding to the time dependent data. Embodiments date split the training data by two or more of the plurality of dates to generate a plurality of date split training data. For each of the plurality of date split training data, embodiments split the date split training data into a training dataset and a corresponding testing dataset using one or more different ratios to generate a plurality of train/test splits. For each of the train/test splits, embodiments determine a difference of distribution between the training dataset and the corresponding testing dataset. Embodiments then select the train/test split with a smallest difference of distribution and train and test the ML model using the selected train/test split.

IPC Classes  ?

6.

SYSTEM AND METHOD FOR PROVIDING EXTERNAL KEY MANAGEMENT FOR USE WITH A CLOUD COMPUTING INFRASTRUCTURE

      
Application Number US2024036931
Publication Number 2025/010418
Status In Force
Filing Date 2024-07-05
Publication Date 2025-01-09
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Awasthi, Apurv
  • Bosco, Frederick Anthonisamy
  • Shivram, Bharat
  • Manjunath, Madhu
  • Kumar, Deepak
  • Miglani, Raj
  • Mall, Akshay
  • Bajpai, Mayank
  • Tong, Jun
  • Shah, Mukesh
  • Mohan, Mauruthi Geetha

Abstract

A key management service (KMS) in a cloud computing environment has an internal vault for cryptographic operations by an internal cryptographic key within the cloud environment and a proxy key vault communicatively coupled to an external key manager (EKM) that stores an external cryptographic key. The KMS uses a provider-agnostic application program interface (API) that permits the cloud service customer to use the same interface request and format for cryptographic operation requests regardless of whether the request is for an operation directed to an internal vault or to an external vault and regardless of the particular vendor of the external key management service operating on the external hardware device.

IPC Classes  ?

7.

MAPPING DATA-SERIALIZATION ELEMENTS BETWEEN A SOURCE AND A DESTINATION

      
Application Number US2024032533
Publication Number 2025/006142
Status In Force
Filing Date 2024-06-05
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Alli, Sunitha
  • Hora, Thomas

Abstract

A system may display a Graphical User Interface including a source region presenting a plurality of source data-serialization elements and a destination region presenting a plurality of destination data-serialization elements. The system may receive a user input associating a first destination data-serialization element, of the plurality of destination data-serialization elements, and a first source data-serialization element of the plurality of source data-serialization elements. Responsive to receiving the user input, the system may generate and store a mapping expression that defines a mapping association between the first source data-serialization element and the first destination data-serialization element. The system may present in a mapping region of the GUI displayed concurrently with the source region and the destination region, a mapping element representing the mapping association between the first source data-serialization element and the first destination data-serialization element.

IPC Classes  ?

  • G06F 8/34 - Graphical or visual programming
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/84 - Mapping; Conversion

8.

MACHINE LEARNING TO REDUCE RESOURCES FOR GENERATING SOLUTIONS TO MULTI-NODE PROBLEMS

      
Application Number US2024035616
Publication Number 2025/006604
Status In Force
Filing Date 2024-06-26
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Oroojlooyjadid, Afshin
  • Rezaeian, Amir Hossein

Abstract

In an embodiment, a method may include accessing, by a computing system, a multi-node problem. The multi-node problem may include a plurality of nodes, each respective node having one or more node features. The method may include providing, by the computing system, each respective node with each respective node feature to a machine learning model. The method may include determining, by the computing system using the machine learning model, a subset of nodes of the plurality of nodes based at least in part on the respective node features. The method may include calculating, by the computing system, one or more solutions to the multi-node problem based at least in part on the subset of nodes. The method may include storing, by the computing system, the one or more solutions to the multi-node problem in a computer memory.

IPC Classes  ?

  • G06Q 10/08 - Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
  • G06N 3/04 - Architecture, e.g. interconnection topology

9.

EGRESS TRAFFIC POLICY ENFORCEMENT AT TARGET SERVICE ON TRAFFIC FROM SERVICE TENANCY

      
Application Number US2024036101
Publication Number 2025/006945
Status In Force
Filing Date 2024-06-28
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Nagaraja, Girish
  • Sleeman, Martin John
  • Bakita, Thomas Ray
  • Stockton, Richard Benjamin
  • Levin, Troy Ari
  • Choi, Jinsu
  • Andrews, Thomas James

Abstract

Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer tenancy, where the traffic is generated by a multi-tenancy service. The traffic can be destined to the target service. The traffic can be tagged by the multi-tenancy service with information indicating that the traffic is egressing therefrom on behalf of the customer tenancy. The customer tenancy can be associated with the egress policy. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy on the traffic that the target service is receiving.

IPC Classes  ?

10.

EGRESS TRAFFIC POLICY ENFORCEMENT AT TARGET SERVICE ON TRAFFIC FROM CUSTOMER NETWORK

      
Application Number US2024036133
Publication Number 2025/006969
Status In Force
Filing Date 2024-06-28
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Nagaraja, Girish
  • Sleeman, Martin John
  • Bakita, Thomas Ray
  • Stockton, Richard Benjamin
  • Levin, Troy Ari
  • Choi, Jinsu
  • Andrews, Thomas James

Abstract

Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network). The customer network can be associated with the egress policy. The customer can define the egress policy at different granularity levels by using different attributes. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy, based on the customer-defined attributes, on the traffic that the target service is receiving.

IPC Classes  ?

11.

TECHNIQUES FOR ROTATING NETWORK ADDRESSES IN PREFAB REGIONS

      
Application Number US2024035410
Publication Number 2025/006465
Status In Force
Filing Date 2024-06-25
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Adogla, Eden
  • Kuehnel, Thomas
  • Paladino, Zackery Vincent
  • Duffey, Laura Ann
  • Rodriguez, Kimberly A.
  • Garakahalli, Navaneeth

Abstract

Techniques are disclosed for rotating network addresses following the installation of a prefab region network at a destination site. A manager service executing within a distributed computing system can allocate a rotation network address pool to a root allocator service that may be configured to provide network addresses from network address pools to dependent nodes within the distributed computing system, with each dependent node associated with a corresponding first network address of the network address pools. The manager service can receive an indication that a second network address of the rotation network address pool is associated with a dependent node. In response, the manager service can execute a migration operation for the dependent node to redirect network traffic within the distributed computing system from the first network address to the second network address.

IPC Classes  ?

  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 61/5061 - Pools of addresses

12.

EGRESS TRAFFIC POLICY ENFORCEMENT AT TARGET SERVICE

      
Application Number US2024036119
Publication Number 2025/006956
Status In Force
Filing Date 2024-06-28
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Nagaraja, Girish
  • Sleeman, Martin John
  • Bakita, Thomas Ray
  • Stockton, Richard Benjamin
  • Levin, Troy Ari
  • Choi, Jinsu
  • Andrews, Thomas James

Abstract

Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network, or by a multi-tenancy service on behalf of the customer. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network) or by the multi-tenancy service. The customer network can be associated with the egress policy. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy on the traffic that the target service is receiving.

IPC Classes  ?

13.

EGRESS TRAFFIC POLICY DEFINITION AND ENFORCEMENT AT TARGET SERVICE

      
Application Number US2024036145
Publication Number 2025/006978
Status In Force
Filing Date 2024-06-28
Publication Date 2025-01-02
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Nagaraja, Girish
  • Sleeman, Martin John
  • Bakita, Thomas Ray
  • Stockton, Richard Benjamin
  • Levin, Troy Ari
  • Choi, Jinsu
  • Andrews, Thomas James

Abstract

Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network). The customer network can be associated with the egress policy. The customer can define the egress policy at different granularity levels by using different attributes. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy, based on the customer-defined attributes, on the traffic that the target service is receiving.

IPC Classes  ?

14.

HIGH-PRECISION LOCALIZATION OF A MOVING OBJECT ON A TRAJECTORY

      
Application Number US2024034180
Publication Number 2024/259357
Status In Force
Filing Date 2024-06-14
Publication Date 2024-12-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Shevelev, Oleg Gennadievich
  • Malhotra, Sahil
  • Aldea Lopez, Sergio
  • Rowe, Matthew Charles
  • Polleri, Alberto

Abstract

Techniques for generating high-precision localization of a moving object on a trajectory are provided. In one technique, a particular image that is associated with a moving object is identified. A set of candidate images is selected from a plurality of images that were used to train a neural network. For each candidate image in the set of candidate images: (1) output from the neural network is generated based on inputting the particular image and said each candidate image to the neural network; (2) a predicted position of the particular image is determined based on the output and a position that is associated with said each candidate image; and (3) the predicted position is added to a set of predicted positions. The set of predicted positions is aggregated to generate an aggregated position for the particular image.

IPC Classes  ?

  • G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods

15.

LAYOUT-AWARE MULTI-MODAL NETWORKS FOR DOCUMENT UNDERSTANDING

      
Application Number US2024034193
Publication Number 2024/259368
Status In Force
Filing Date 2024-06-14
Publication Date 2024-12-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Wang, Zheng
  • Sheng, Tao
  • Hu, Yazhe
  • Guo, Mengqing
  • Gong, Liyu
  • Qian, Jun
  • D'Orazio, Katharine

Abstract

Techniques for layout-aware multi-modal networks for document understanding are provided. In one technique, word data representations that were generated based on words that were extracted from an image of a document are identified. Based on the image, table features of one or more tables in the document are determined. One or more table data representations that were generated based on the table features are identified. The word data representations and the one or more table data representations are input into a machine-learned model to generate a document data representation for the document. A task is performed based on the document data representation. In a related technique, instead of the one or more table data representations, one or more layout data representations that were generated based on a set of layout features, of the document, that was determined based on the image are identified and input into the machine-learned model.

IPC Classes  ?

  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
  • G06V 10/774 - Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
  • G06V 30/10 - Character recognition
  • G06V 30/412 - Layout analysis of documents structured with printed lines or input boxes, e.g. business forms or tables

16.

MACHINE LEARNING MODEL SELECTION FOR FORECASTING ENTITY ENERGY USAGE

      
Application Number US2024029874
Publication Number 2024/249114
Status In Force
Filing Date 2024-05-17
Publication Date 2024-12-05
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Mimaroglu, Selim
  • Shen, Anqi
  • Benjamin, Oren
  • Gunel, Arhan

Abstract

Embodiments relate to generating time-series energy usage forecast predictions for energy consuming entities. Machine learning model(s) can be trained to forecast energy usage for different energy consuming entities. For example, a local coffee shop location and a large grocery store location are both considered retail locations, however their energy usage over days or weeks may differ significantly. Embodiments organize energy consuming entities into different entity segments and store trained machine learning models that forecast energy usage for each of these individual entity segments. For example, a given machine learning model that corresponds to a given entity segment can be trained using energy usage data for entities that match the given entity segment. A forecast manager can generate a forecast prediction for an energy consuming entity by matching the entity to a given entity segment and generating the forecast prediction using the entity segment's trained machine learning model.

IPC Classes  ?

  • G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
  • G06N 20/00 - Machine learning
  • G06Q 50/06 - Electricity, gas or water supply
  • G06F 113/04 - Power grid distribution networks
  • G06F 119/06 - Power analysis or power optimisation

17.

MACHINE-LEARNING BASED ARTIFICIAL INTELLIGENCE CAPABILITY

      
Application Number US2024031641
Publication Number 2024/249611
Status In Force
Filing Date 2024-05-30
Publication Date 2024-12-05
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Yalamanchi, Uday Bhaskar
  • Akshat, Fnu
  • Ramanathan, Prashanth
  • Jagarlapudi, Abhiram
  • Zhang, Ye
  • Banerjee, Aditya
  • Ballingam, Varaprasad
  • Patlola, Athinder
  • Guo, Beiwen
  • Shah, Varun Ketanbhai
  • Rahmat, Safia
  • Vinayakumar, Shreyas
  • Mody, Jigar
  • Ziklik, Elad
  • Ponnappan, Senthilkumar
  • Varia, Pranav
  • Rajaram, Denesh Krishnan
  • Balasubramanian, Hariharan

Abstract

Techniques for providing machine-learned (ML)-based artificial intelligence (AI) capabilities are described. In one technique, multiple AI capabilities are stored in a cloud environment. While the AI capabilities are stored, a request for a particular AI capability is received from a computing device of a user. Also, in response to receiving training data based on input from the user, the training data is stored in a tenancy, associated with the user, in the cloud environment. In response to receiving the request, the particular AI capability is accessed, a ML model is trained based on the particular AI capability and the training data to produce a trained ML model, and an endpoint, in the cloud environment, is generated that is associated with the trained ML model. The endpoint is provided to the tenancy associated with the user.

IPC Classes  ?

  • G06N 3/08 - Learning methods
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

18.

SYSTEM AND METHOD FOR CONCURRENTLY JOINING VOICE AND WEB CHANNELS

      
Application Number US2024025321
Publication Number 2024/242795
Status In Force
Filing Date 2024-04-19
Publication Date 2024-11-28
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Agarwal, Ashish

Abstract

Systems, methods, and other embodiments associated with concurrently joining voice channels and web channels are described. In one embodiment, a method includes establishing a voice session to communicate over an audio channel, wherein a live agent communicates audio voice signals with a user. In response to identifying an issue from the user, transmitting a navigation link wherein the navigation link, when activated, navigates a browser to a web page associated with the issue. A web session is established to communicate between the browser and the web page. The voice session and the web session associated with the user are linked together. A call controller may then communicate simultaneously with both channels since they are connected allowing a live agent to disconnect from the audio channel.

IPC Classes  ?

  • H04M 3/51 - Centralised call answering arrangements requiring operator intervention
  • H04M 7/00 - Arrangements for interconnection between switching centres

19.

TRANSITIONING NETWORK ENTITIES ASSOCIATED WITH A VIRTUAL CLOUD NETWORK THROUGH A SERIES OF PHASES OF A CERTIFICATE BUNDLE DISTRIBUTION PROCESS

      
Application Number US2024029149
Publication Number 2024/242917
Status In Force
Filing Date 2024-05-13
Publication Date 2024-11-28
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Madtha, Jivan Joseph
  • Chau, Bill
  • Balasubramanian, Suryanarayanan

Abstract

Network entities associated with a virtual cloud network are transitioned through a certificate bundle distribution process for distributing new certificate authority certificates to the network entities. Operations may include executing, in relation to each of the network entities, a first operation associated with a first phase of the process; obtaining, for each particular network entity, individual entity information associated with a progress of a particular network entity in relation to the first phase; computing, based on the individual entity information, an aggregate metric indicative of an aggregate progress of the network entities in relation to the first phase; determining, based on the aggregate metric, that one or more transition criteria are satisfied for transitioning the network entities from the first phase to a second phase of the process; and executing, in relation to each of the network entities, a second operation associated with the second phase of the process.

IPC Classes  ?

20.

SHARING SECURE USER INFORMATION USING NEAR-FIELD COMMUNICATION

      
Application Number US2024021921
Publication Number 2024/238023
Status In Force
Filing Date 2024-03-28
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ankrom, Zachary S.
  • Bajec, Jan
  • Drewette, David Allan James

Abstract

Embodiments permit secure information exchange using lightweight data and near-field communication (NFC). A user can transmit lightweight data, such as one or more indicators (e.g., user indicator, scope indicator(s), documents indicator(s), etc.), to a receiving computing system via the user's wireless device and an NFC protocol. Because NFC transmissions are performed by co-located devices, this lightweight data transmission can trigger and/or continue a sophisticated workflow. For example, the receiving computing system can be associated with a product or service provider, and the lightweight data transmission can progress a workflow related to a particular product and/or service. The workflow progression can include accessing secure user information via the indicator(s) received over the NFC transmission.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

21.

TRACKING DATA CENTER BUILD DEPENDENCIES WITH CAPABILITIES AND SKILLS

      
Application Number US2024028767
Publication Number 2024/238320
Status In Force
Filing Date 2024-05-10
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Peterson, Eric Raymond
  • Moran, William Nickolas

Abstract

A cloud-computing service (e.g., a "Puffin Service") is described. The service may maintain backward and forward compatibility between skills and capabilities. Skills may be configured to enable improved tracking of a process for building data center. There may be occasions in which an orchestrator may use both skills and capabilities to drive build operations. To enable both constructs to be utilized, the Puffin Service maintains associations between skills and capabilities. These associations enable skills to be published when published capabilities are identified and corresponding capabilities to be published for published skills, which in turn allows the Orchestrator to drive build operations based on any suitable combination of capabilities and/or skills. Previously published capabilities may be identified and system-generated skills ("shadow skills") may be used to represent the previously published capabilities, further enabling compatibility between constructs while avoiding burdensome data entry.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/0633 - Workflow analysis

22.

SERVICE PLANS AND MANIFESTS FOR DATA CENTER ORCHESTRATION

      
Application Number US2024029210
Publication Number 2024/238519
Status In Force
Filing Date 2024-05-14
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Kreger-Stickles, Lucas Michael
  • Willey, Benjamin Todd
  • Price, William Thomas
  • Cliffe, Owen Christopher
  • Black, Robert Charles Hartshorn
  • Patrichi, Ioana Madalina
  • Fox, Kenneth Richard
  • Rizvi, Syed Dilawar Ali

Abstract

A cloud infrastructure orchestration service may maintain a service plan and manifest (SPAM) corresponding to a service to be bootstrapped (e.g., provisioned and deployed) to a cloud computing environment (e.g., to a data center). The service plan may specify a deterministic order of releases for performing a process to fully bootstrap the service using one or more build milestones and one or more execution units, each execution unit specifying ordered steps for transitioning between build milestones Each step may reference one or more execution target checkpoint transitions, which in turn reference an alias of a configuration file that defines a release. A manifest may be used to identify the configuration files and artifacts to be used by the releases and to validate the service plan. A SPAM may be used to reduce/eliminate nondeterministic behavior of previous orchestration systems and to provide visualizations of the bootstrapping process at different granularities.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

23.

MANAGING DATA CENTER ORCHESTRATION USING SERVICE PLANS AND MANIFESTS

      
Application Number US2024029279
Publication Number 2024/238551
Status In Force
Filing Date 2024-05-14
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Plaisted, Rachel Ruthann
  • Price, William Thomas
  • Cliffe, Owen Christopher
  • Patrichi, Ioana Madalina

Abstract

A cloud infrastructure orchestration service (CIOS) may be used to create a service plan and manifest (SPAM) that defines a deterministic order of releases for bootstrapping a service (e.g., provisioning and deploying resources of the service) to a cloud computing environment (e.g., to a data center). A corresponding manifest may be used to identify the configuration files and artifacts to be. The manifest may be used to validate the service plan. The CIOS may be configured to validate the SPAM. If compatible, the SPAM may be added to a SPAM set. A SPAM set (a collection of SPAMs corresponding to respective services) may be used to derive a version set (identifying configuration file and artifact versions) with which a directed acyclic graph may be generated. CIOS may bootstrap various services within the data center based at least in part on traversing the directed acyclic graph.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

24.

BUILDING A DATA CENTER USING EXECUTION TARGET CHECKPOINTS

      
Application Number US2024029417
Publication Number 2024/238626
Status In Force
Filing Date 2024-05-15
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Plaisted, Rachel Ruthann
  • Fox, Kenneth Richard
  • Black, Robert Charles Hartshorn
  • Cliffe, Owen Christopher
  • Bushell, Gareth

Abstract

A cloud infrastructure orchestration service (CIOS) may track build progress. A service plan may define a first execution order of releases for bootstrapping a service (e.g., provisioning and deploying resources of the service) to an execution target (ET) (e.g., a set of devices of a data center). The first execution order may be defined using transitions between ET checkpoints, with each transition and checkpoint being associated with a corresponding release. A directed acyclic graph (DAG) may be generated from any suitable number of service plans associated with various services to define a second execution order for the releases needed to bootstrap the services. At build time, CIOS may track release execution by updating the state of an ET to correspond to an ET checkpoint when the release is successful. ET states may be used by CIOS to enforce the second execution order.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

25.

TECHNIQUES FOR REGION BUILD ORCHESTRATION

      
Application Number US2024030208
Publication Number 2024/239011
Status In Force
Filing Date 2024-05-20
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Fox, Kenneth Richard
  • Willey, Benjamin Todd
  • Rizvi, Syed Dilawar Ali
  • Black, Robert Charles Hartshorn
  • Cliffe, Owen Christopher
  • Price, William Thomas
  • Kreger-Stickles, Lucas Michael

Abstract

A cloud infrastructure orchestration service (CIOS) may track build progress made by any suitable number of regional orchestrators. An orchestrator control plane may be configured to generate a region build plan for bootstrapping a plurality of services within a data center. The orchestrator control plane may instruct a region orchestrator to execute a build according to the build plan. The region orchestrator may be configured to update an execution state corresponding to the execution of the region build plan as it executes steps of the ordered steps of the region build plan. At any suitable time (e.g., when executing one of the steps fails), intervention data may be received with which a new region build plan may be generated. The new region build plan may be used for subsequent execution of the region build. This may enable run-time corrections to be made.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

26.

TECHNIQUES FOR BUILDING A DATA CENTER USING A SKILLS SERVICE

      
Application Number US2024028744
Publication Number 2024/238314
Status In Force
Filing Date 2024-05-10
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Peterson, Eric Raymond
  • Moran, William Nickolas
  • Fox, Kenneth Richard
  • Willey, Benjamin Todd
  • Price, William Thomas

Abstract

A cloud-computing service (e.g., a "Puffin Service") is described. The service may maintain service and skill catalogs corresponding to various services to be deployed to a region (e.g., during a region build). The service may host numerous user interfaces with which various service and skill metadata may be provided. In some embodiments, such data may include one or more dependencies between skills. The data managed by the cloud-computing service may be utilized to build a dependency graph. Navigation of the dependency graph may be performed via one or more user interfaces hosted by the cloud-computing service. An orchestration service (e.g., a Multi-Flock Orchestrator) may manage bootstrapping efforts for any suitable number of services during a region build based at least in part on dependencies between skills.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/0633 - Workflow analysis

27.

TRACKING DATA CENTER BUILD HEALTH

      
Application Number US2024028788
Publication Number 2024/238330
Status In Force
Filing Date 2024-05-10
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Peterson, Eric Raymond
  • Moran, William Nickolas

Abstract

Skills and skills metadata may be used to define a process for building a data center. Skills of one service may depend on skills corresponding to the same or different service. A dependency graph may be generated based on these dependencies. The graph may specify an order by which orchestration operations are to be performed to build the services, thereby building the data center. During execution of the process for building the data center, health states corresponding to the skills may be tracked (based at least in part on alarms and/or namespaces associated with the skills). When an unhealthy skill is identified, the system may traverse the dependency graph to identify a root cause (e.g., failed operations corresponding to a skill on which the unhealthy skill directly/indirectly depends). A notification and/or various options may be provided to address the unhealthy state of one or both skills.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/0633 - Workflow analysis

28.

SOVEREIGN CLOUDS

      
Application Number US2024029088
Publication Number 2024/238465
Status In Force
Filing Date 2024-05-13
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Adogla, Eden Grail

Abstract

Techniques are described for data management. An example method can include processing a first message indicating that an intermediate computing system managed by the first data center has received data from a second data center in a second region. The method can further include transmitting first control instructions to the intermediate computing system to validate the data based at least in part on a first criteria. The method can further include processing validation results from the intermediate computing system. The method can further include processing a second message indicating to release the data from the first isolated environment of the intermediate computing system. The method can further include processing, by the computing system, a third message indicating that the second message originated from a computing device located in the first region. The method can further include causing the data to be released from the first isolated environment.

IPC Classes  ?

29.

DATA CENTER ORCHESTRATORS

      
Application Number US2024030201
Publication Number 2024/239010
Status In Force
Filing Date 2024-05-20
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Fox, Kenneth Richard
  • Willey, Benjamin Todd
  • Rizvi, Syed Dilawar Ali
  • Black, Robert Charles Hartshorn
  • Cliffe, Owen Christopher
  • Price, William Thomas

Abstract

A cloud infrastructure orchestration service (CIOS) may track build progress made by any suitable number of regional orchestrators. The cloud infrastructure orchestration system may include any suitable number of regional orchestrators, each regional orchestrator executing in an isolated hosting environment (e.g., a service cell isolated from other service cells). An orchestrator control plane may be configured to generate a build plan for bootstrapping a plurality of services within a data center, the build plan may be generated based at least in part on a service build definition of a plurality of service build definitions, the service build definition specifying a deterministic process for bootstrapping a service of the plurality of services. The orchestrator control plane may instruct a regional orchestrator to perform bootstrapping operations according to the build plan and may track the progress of the bootstrapping operations on an ongoing basis.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

30.

REGION BUILD TESTING TECHNIQUES

      
Application Number US2024030212
Publication Number 2024/239012
Status In Force
Filing Date 2024-05-20
Publication Date 2024-11-21
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Magouyrk, Clayton Matthew
  • Kreger-Stickles, Lucas Michael
  • Price, William Thomas

Abstract

A variety of testing environments and techniques are disclosed. An orchestrator control plane may generate a build plan comprising a plurality of ordered steps for bootstrapping one or more services. The build plan may be generated based at least in part on one or more service plans and manifests that individually specify a deterministic process for bootstrapping a service. The orchestrator control plan may instruct a region orchestrator executing within an isolated testing environment to execute a test build of the one or more services according to the build plan. The region orchestrator may execute, as part of executing the test build, a subset of steps from the plurality of ordered steps of the build plan utilizing resources of the isolated testing environment and in an order identified by the build plan. At any suitable time, the isolated testing environment may be reset to enable subsequent test build executions.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

31.

UBIQUITOUS SEARCH ON DATA STORED IN THE RDBMS

      
Application Number US2024024127
Publication Number 2024/233051
Status In Force
Filing Date 2024-04-11
Publication Date 2024-11-14
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Netravalkar, Saurabh Naresh
  • Czarlinska, Aleksandra
  • Liu, Zhen Hua
  • Hammerschmidt, Beda Christoph

Abstract

Techniques are provided for creating a "ubiquitous search index" which allows for full-text as well as value range-based search across all columns from multiple database tables, multiple user-defined unmaterialized views, and external sources. In one implementation, the data is indexed in a peculiarly constructed schema-based JSON format without duplicating data. The techniques maintain eventual consistency with the normalized source of truth database tables, and do not have a significant impact on the performance of transactional Data Manipulation Language (DML) operations.

32.

SCALABLE HUB AND SPOKE TOPOLOGY FOR ROUTING USING COMPUTE INSTANCES

      
Application Number US2024025977
Publication Number 2024/233125
Status In Force
Filing Date 2024-04-24
Publication Date 2024-11-14
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ignoto, Andrew
  • Chakka, Jwala Dinesh Gupta

Abstract

Techniques are described for creating a network link between a first customer virtual network in a first cloud environment and a second customer virtual network in a second cloud environment. The first customer virtual network in the first cloud environment is created to enable a user associated with a customer tenancy in the second cloud environment to access one or more services provided in the first cloud environment. The network link is created based on one or more link-enabling virtual networks that are deployed in the first cloud environment and the second cloud environment.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

33.

ARCHITECTURE OF A MULTICLOUD NETWORK LINK

      
Application Number US2024025979
Publication Number 2024/233126
Status In Force
Filing Date 2024-04-24
Publication Date 2024-11-14
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ignoto, Andrew
  • Baturin, Maxim
  • Kondratiev, Stanislav

Abstract

Techniques are described for creating a network link between a first customer virtual network in a first cloud environment and a second customer virtual network in a second cloud environment. The first customer virtual network in the first cloud environment is created to enable a user associated with a customer tenancy in the second cloud environment to access one or more services provided in the first cloud environment. The network link is created based on one or more link-enabling virtual networks that are deployed in the first cloud environment and the second cloud environment.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

34.

SERVERLESS DATA-REPRESENTATION-AS-A-SERVICE (DRAAS) TO ENABLE BUILDING GENERAL MULTI-MODAL INPUT DATA ML FLOWS

      
Application Number US2024023886
Publication Number 2024/226299
Status In Force
Filing Date 2024-04-10
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Diev, Vesselin
  • Gauthier, Jean-Rene

Abstract

Techniques for enabling the building of general input data ML flows using a serverless data-representation-as-a-servive (DRaaS) are provided. In one technique, in response to receiving a first data representation (DR) generation request from a first calling entity, first input data is retrieved based on the first DR generation request, a first set of DRs is generated (by a DR generator) based on the first input data, and the first set of DRs are made available to the first calling entity. In response to receiving a second DR generation request from a second calling entity that is different than the first calling entity, second input data is retrieved based on the second DR generation request, a second set of DRs is generated based on the second input data, and the second set of DRs are made available to the second calling entity.

IPC Classes  ?

  • G06F 16/953 - Querying, e.g. by the use of web search engines
  • G06N 20/00 - Machine learning
  • G06V 10/40 - Extraction of image or video features
  • G10L 15/02 - Feature extraction for speech recognition; Selection of recognition unit

35.

UNIVARIATE SERIES TRUNCATION POLICY USING CHANGEPOINT DETECTION

      
Application Number US2024023911
Publication Number 2024/226301
Status In Force
Filing Date 2024-04-10
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Aggarwal, Ankit
  • Ahuja, Chirag
  • Xing, Jie
  • Prussak, Michal Piotr

Abstract

Techniques described herein are directed toward univariate series truncation policy using change point detection. An example method can include a device determining a first time series comprising a first set of data points indexed over time. The device can determine a first and second change point of the first time series based on a relative position and a category of the change points. The device can generate a first and second truncated time series based on the change points. The device can generate a first and second forecasted value using a first forecasting technique. The device can compare the first forecasted value and the second forecasted value using a second time series. The device can select one of the forecasting techniques to generate a final forecasted value based on the comparison. The device can generate, using the selected first forecasting technique, the final forecasted value.

IPC Classes  ?

  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • G06N 3/00 - Computing arrangements based on biological models

36.

SYSTEM AND METHOD FOR PROVIDING MULTI-TIERED REPORTING IN A REALM OF A CLOUD ENVIRONMENT

      
Application Number US2024026346
Publication Number 2024/226855
Status In Force
Filing Date 2024-04-25
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Tolton, Christopher
  • Syal, Manan
  • Rushton, Matthew
  • Shetty, Rohit
  • Andre, Sandeep
  • Roman, Ovidiu
  • Shah, Deepalkumar

Abstract

Systems and methods provide tiered assessment of use of services in a cloud environment. An operator cloud environment running on computers including microprocessors, wherein the operator cloud environment is deployed within a first realm owned by an operator tenant of the realm, a set of software products provided to the first realm from a cloud infrastructure provider of the cloud environment for access via the first realm by a plurality of end users as vendor cloud services, and a metering service. Usage data that records usage of services in a realm includes identification data associating user entities with their usage of the services is provided to the operator tenant associated with control of the realm. A second set of data is generated by processing the usage data to remove or convert the identification data and is provided to the cloud infrastructure provider associated with control of the cloud environment.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06Q 30/04 - Billing or invoicing
  • H04L 12/14 - Charging arrangements
  • G06Q 30/0601 - Electronic shopping [e-shopping]

37.

DEPLOYMENT CONTROL OVER CLOUD RESOURCES

      
Application Number US2024026695
Publication Number 2024/227116
Status In Force
Filing Date 2024-04-27
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Bolla, Jason
  • Vogel, Daniel M.

Abstract

Techniques for controlling resource deployments in a cloud partition of a cloud environment are disclosed. A cloud service provider (CSP) operates the cloud environment where its customers can specify constraints on deployments to their respective partitions (i.e., regions or realms). A partition-specific deployment constraint is a rule that constrains the changes/updates that can be made to one or more specific partitions. A partition-specific deployment constraint applies to at least one partition but may apply to multiple partitions. For example, a partition-specific deployment constraint may apply to one or more regions in a realm. A partition-specific deployment constraint is evaluated at deployment time using the most recent state, or a curated subset thereof, for at least one specific partition. A global deployment orchestrator conditions a deployment, at least in part, on if the deployment satisfies the partition-specific constraint(s) in the target partition.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 9/40 - Network security protocols
  • G06F 8/60 - Software deployment

38.

DEPLOYMENT CONTROL OVER CLOUD RESOURCES

      
Application Number US2024026756
Publication Number 2024/227130
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Bolla, Jason
  • Vogel, Daniel M.

Abstract

Techniques for controlling resource deployments in a cloud partition of a cloud environment are disclosed. A cloud service provider (CSP) operates the cloud environment where its customers can specify two-tiered constraints on deployments to their respective partitions (i.e., regions or realms). A first deployment constraint may be a global constraint set by the CSP and a second deployment constraint may be a partition-specific deployment constraint set by a customer of the CSP. Each deployment constraint applies to the changes/updates that can be made to one or more specific partitions. A global deployment orchestrator conditions a deployment, at least in part, on whether the deployment satisfies the two-tiers of deployment constraint(s).

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/60 - Software deployment

39.

HEALTH METRICS ASSOCIATED WITH CLOUD SERVICES

      
Application Number US2024026769
Publication Number 2024/227136
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Berg, Daniel
  • Peterson, Eric
  • Fox, Kenneth Richard
  • Moran, William Nickolas
  • Leung, Wai Ho

Abstract

Techniques for monitoring the health of services of a system are disclosed. A system determines that a detected alarm is associated with a service feature, and the service feature is associated with a service of a cloud environment. The system computes a health metric for the service based at least on the detected alarm that is associated with the service feature. Additionally, the system generates a visual representation that includes the health metric for display on a service health interface.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data

40.

CONTROLLING OPERATOR ACCESS TO CUSTOMER CLOUD INFRASTRUCTURE ENVIRONMENTS

      
Application Number US2024026899
Publication Number 2024/227195
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Potlapally, Nachiketh Rao
  • Miller, Karl
  • Awasthi, Apurv
  • Gilburd, Zachary

Abstract

Techniques for enabling a customer operator of a cloud service provider (CSP) the ability to disable operator access to resources in a customer cloud environment are disclosed. Operator access may be disabled or suspended by operators of the CSP customer initiating a disable command. Disabling operator access includes (a) terminating existing sessions that provide operators access to the resources, (b) rejecting new requests for credentials to establish sessions that provide operator access, and/or (c) revoking existing credentials used to establish sessions that provide operator access. Disabling operator access may apply to resources in the customer cloud environment or to a subset of resources and/or may apply to some operators but not to other operators. The operators may be of the same or different categories of operators. At the conclusion of a designated period of time, the ability of operator to access the customer cloud environment may be restored.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

41.

ACCESSING CLOUD ENVIRONMENTS THROUGH ADMINISTRATIVE TENANCIES TO COMPLY WITH SOVEREIGNTY REQUIREMENTS

      
Application Number US2024026904
Publication Number 2024/227197
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Potlapally, Nachiketh Rao
  • Linacre, Christian A.
  • Awasthi, Apurv
  • Aseeja, Harsh
  • Luo, Qingyang

Abstract

Techniques for providing user access to cloud environments through an administrative tenancy to comply with sovereignty requirements are disclosed. The administrative tenancy is one of multiple tenancies in the cloud environment. The administrative tenancy includes tools for communicating with services running outside of the administrative tenancy. The user may only be able to access these services through the administrative tenancy. User access to the administrative tenancy requires the user to satisfy one or more sovereignty requirements. After determining that the user satisfies the sovereignty requirements for the cloud environment, the system grants the user access to the tools within the administrative tenancy to communicate with services outside the administrative tenancy.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

42.

METHOD AND SYSTEM FOR BUILDING AND MANAGING DYNAMIC RATE CARDS FOR USE WITH CLOUD SERVICE SUBSCRIPTIONS

      
Application Number US2024026344
Publication Number 2024/226853
Status In Force
Filing Date 2024-04-25
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Shetty, Rohit
  • Andre, Sandeep
  • Chatterjee, Sibashis

Abstract

Embodiments described herein are generally related to systems and methods for providing access to software products or services in a cloud computing or other computing environment. Dynamic rate card management allows organizations to optimize the number of rate cards to a manageable level wherein, for example, rate cards can be associated with the type of contract policy. In accordance with an embodiment, in order to accommodate the use of dynamic rate cards, a migration service or process can be used to convert/migrate subscriptions that were originally created under a first, legacy or former subscription pricing model, to conform instead with a subscription pricing service model, for use with the various systems, methods, and features described herein.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

43.

SYSTEM AND METHOD FOR CUSTOMIZING A CLOUD CONSOLE FOR USE WITH CLOUD ENVIRONMENTS

      
Application Number US2024026345
Publication Number 2024/226854
Status In Force
Filing Date 2024-04-25
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Mohan, Abishek Murali
  • Shaker, Alaa
  • Kumar, Amit
  • Reddy, Naveen Kumar Narayana
  • Larricart, Martin Gonzalez
  • Nandwana, Anuj

Abstract

Systems and methods described herein provide for a customizable console, for use with providing cloud environments. Cloud computing offerings enable access within the context of a cloud environment by third-party operators acting as resellers of products or services owned or managed by a cloud provider. An operator provides access to their customers via consoles that are customizable by the operators to enable greater control over their cloud-based products and services.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/38 - Creation or generation of source code for implementing user interfaces
  • G06Q 30/0601 - Electronic shopping [e-shopping]

44.

SYSTEM AND METHOD FOR ENFORCING SERVICE CONTROL POLICIES FOR SERVICES AND SERVICE FEATURES

      
Application Number US2024026347
Publication Number 2024/226856
Status In Force
Filing Date 2024-04-25
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Prica, Mihai
  • Stockton, Richard
  • Singh, Prabhjot

Abstract

Embodiments described herein are generally related to systems and methods for providing cloud environments, for use by tenants of a cloud infrastructure environment in accessing software products, services, or other offerings associated with the environment, including methods for defining and enforcing service control policies directed to services and service features. In accordance with an embodiment, the system comprises a service control repository or service catalog that provides a definition of the services and service features, together with service control policies or rules that define availability or access to the service features. A service control policy framework, comprising a feature management service, determines, by reference to a hierarchy of entities defining the service control policies, which different entities can control the availability of particular services or service features to end users.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

45.

ENHANCING SOFTWARE EXTENSIBILITY FOR CLOUD ENVIRONMENTS

      
Application Number US2024026592
Publication Number 2024/227039
Status In Force
Filing Date 2024-04-26
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Lahiri, Somnath
  • Roux, Benjamin

Abstract

Techniques for enhancing software extensibility in cloud environments are disclosed. One or more embodiments receive instructions to define services and workers within the cloud, categorize workers based on predefined types, apply corresponding predefined functionality, and instantiate corresponding cloud-based infrastructure. Additionally, one or more embodiments facilitate communication and integration with third-party services. One or more embodiments further generate canary components to help ensure service operationality. An approval processes may be used to certify compliance with cloud standards. Such techniques enhance cloud service deployment, scalability, and interoperability while maintaining security and reliability.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

46.

HEALTH METRICS ASSOCIATED WITH CLOUD SERVICES

      
Application Number US2024026800
Publication Number 2024/227151
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Berg, Daniel
  • Peterson, Eric
  • Fox, Kenneth Richard
  • Moran, William Nickolas
  • Leung, Wai Ho

Abstract

Techniques for monitoring the health of services of a system are disclosed. A system determines a health metric for a service in a cloud environment. Additionally, the system determines a first service feature of the service and a plurality of downstream service features that depend on the first service feature. The system determines an impact weight for the first service based on the plurality of downstream service features. Additionally, the system computes a weighted health metric for the service at least by applying the impact weight to the health metric. The system generates a visual representation that includes the weighted health metric for display on a service health interface.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data

47.

CONSENT-DRIVEN ACCESS MANAGEMENT FOR CLOUD RESOURCES

      
Application Number US2024026840
Publication Number 2024/227166
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Elmenshawy, Ayman Mohamed Aly Hassan
  • Vogel, Daniel M.

Abstract

Techniques for consent-driven access management include: receiving, from a requestor, a request for consent for an actor to access a target set of resources in a cloud environment; identifying a consent workflow that specifies a name and/or an attribute of a set of one or more users from which to obtain respective approvals of the consent request; traversing the consent workflow to obtain the respective approvals from the set of one or more users; determining that one or more access policies, separate from the consent workflow, permit the actor to access the target set of resources; where access by the actor to the target set of resources is conditioned on both (a) obtaining the respective approvals from the set of one or more users and (b) determining that the one or more access policies, separate from the consent workflow, permit the actor to access the target set of resources.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 9/40 - Network security protocols
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

48.

PROVIDING CUSTOMERS VISIBILITY INTO SECURITY AND COMPLIANCE OF SERVICES IN A CUSTOMER CLOUD INFRASTRUCTURE ENVIRONMENT

      
Application Number US2024026866
Publication Number 2024/227182
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Gilburd, Zachary
  • Rao, Nachiketh
  • Luo, Qingyang
  • Yurica, Kevin
  • Miller, Karl
  • Qual, Benjamin Di

Abstract

Techniques for presenting information indicating infrastructure security and compliance of services of a customer cloud environment to a customer-facing dashboard are disclosed. The information presented to the customer-facing dashboard is a subset of information available to operators associated with a cloud service provider (CSP). A tier-one dashboard service obtains information indicating infrastructure security and compliance of services in the customer cloud infrastructure environment. The tier-one dashboard service presents the information indicating infrastructure security and compliance to CSP operators on a CSP-facing dashboard. The CSP-facing dashboard is not accessible by customer operators. A tier-two dashboard service obtains the infrastructure security and compliance information from the tier-one dashboard service and filters the infrastructure security information to create a subset of information indicating the security and compliance of the services. The subset of infrastructure security and compliance information is presented to operators associated with a customer of the CSP on a customer-facing dashboard.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06Q 10/0639 - Performance analysis of employees; Performance analysis of enterprise or organisation operations
  • H04L 9/40 - Network security protocols

49.

OBTAINING DEPLOYMENT TOKENS FOR DEPLOYING ARTIFACTS TO A CLOUD ENVIRONMENT

      
Application Number US2024026885
Publication Number 2024/227188
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Shilmover, Barry

Abstract

Techniques for deploying artifacts to a computing environment are disclosed. A system includes an artifact deployment tool. The artifact deployment tool determines that an artifact is available for deployment to a target computing environment. The artifact deployment tool obtains a deployment token representing verification that a set of one or more customer designated conditions are satisfied to deploy the artifact to the target computing environment. The artifact deployment tool generates a deployment request to deploy the artifact to the target computing environment. The deployment request includes the deployment token. The artifact deployment tool directs the deployment request to a deployment service for deploying artifacts to the target computing environment. The deployment service obtains validation of the deployment token and, responsive to obtaining validation of the deployment token, deploys the artifact to the target computing environment.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/60 - Software deployment
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

50.

RESPONDING TO TRIGGER EVENTS THAT THREATEN AN OPERABILITY OF A CLOUD INFRASTRUCTURE

      
Application Number US2024026895
Publication Number 2024/227192
Status In Force
Filing Date 2024-04-29
Publication Date 2024-10-31
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Peterson, Eric
  • Moran, William Nickolas
  • Vogel, Daniel M.
  • Fox, Kenneth Richard
  • Willey, Benjamin Todd

Abstract

Techniques for responding to a trigger event that threatens an operability of at least a portion of a cloud infrastructure of a cloud environment are disclosed. In response to detecting the occurrence of the trigger event, a system executes a mitigation process for mitigating an effect of the trigger event. The mitigation process includes determining a set of candidate services as candidates for stopping execution of operations in the cloud environment. In addition, the mitigation process generates a ranking of the set of candidate services based on weighting metrics associated with respective service features of the set of candidate services. Further, based on the ranking, the mitigation process selects a service of the set of candidate services and stops execution of operations of the service to at least partially mitigate the effect of the trigger event.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

51.

SUPPORTING TWO PHASE COMMIT PROTOCOL IN BLOCKCHAIN SYSTEM

      
Application Number US2024021876
Publication Number 2024/215487
Status In Force
Filing Date 2024-03-28
Publication Date 2024-10-17
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Innocenti, Carlo
  • Mishra, Sharthak
  • Subramanian, Vignesh

Abstract

A blockchain system is enabled to participate in distributed transactions that uses a two-phase commit protocol ("2PC"). In a 2PC, a computer system, such as a DBMS or blockchain system, commits a transaction that changes data (e.g. database, world state) using two phases. To participate in a distributed transaction using 2PC, a blockchain system executes a "staged transaction". A staged transaction transitions through the 2PC phases. In the prepare phase, the new values for world state records are staged in staging records as staged values. In the second phase, if the distributed transaction is to be committed, the world staging records are set to the staged values.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 16/23 - Updating
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

52.

EXECUTING UNSUPERVISED PRE-TRAINING TASKS WITH A MACHINE LEARNING MODEL TO PREDICT DOCUMENT GRAPH ATTRIBUTES

      
Application Number US2024022369
Publication Number 2024/215503
Status In Force
Filing Date 2024-03-29
Publication Date 2024-10-17
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Zhong, Xu
  • Dharmasiri, Don
  • Duong, Thanh Long
  • Johnson, Mark
  • Gadde, Srinivasa Phani Kumar
  • Vishnoi, Vishal

Abstract

Techniques for multi-layer training of a machine learning model are disclosed. A system pre-trains a machine learning model on training data obtained from unlabeled document graph data by executing unsupervised pre-training tasks on the unlabeled document graph data to generate a labeled pre-training data set. The system modifies document graphs to change attributes of nodes in the document graphs. The system pre-trains the machine learning model with a data set including the modified document graphs and un-modified document graphs to generate prediction associated with the modifications to the document graphs. Subsequent to pre-training, the system fine-tunes the machine learning model with a set of labeled training data to generate predictions associated with a specific attribute of a document graph.

IPC Classes  ?

53.

AUTOMATIC SIGNAL CLUSTERING WITH AMBIENT SIGNALS FOR ML ANOMALY DETECTION

      
Application Number US2024023970
Publication Number 2024/215830
Status In Force
Filing Date 2024-04-11
Publication Date 2024-10-17
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ru, Keyang
  • Liao, Kuei-Da
  • Gerdes, Matthew T.
  • Gross, Kenny C.
  • Wang, Guang Chao
  • Liu, Ruixian

Abstract

Systems, methods, and other embodiments associated with automatic clustering of signals including added ambient signals are described. In one embodiment, a method includes receiving time series signals (TSSs) associated with a plurality of sensors measuring physical properties of a plurality of machines. The TSSs are automatically separated into a plurality of clusters corresponding to the plurality of the machines. A group of ambient TSSs is identified that overlaps more than one of the clusters. The group of the ambient TSSs is added into the one cluster of the clusters that corresponds to the one machine. A machine learning model is then trained to detect an anomaly of a non-nominal physical property based on the one cluster to generate a trained machine learning model that is specific to the one machine without using the TSSs not included in the one cluster.

IPC Classes  ?

  • G05B 23/00 - Testing or monitoring of control systems or parts thereof
  • G06N 20/00 - Machine learning

54.

NETWORK PATH PERFORMANCE MEASUREMENTS BY UTILIZING MULTI-LAYER TUNNELING TECHNIQUES

      
Application Number US2023024652
Publication Number 2024/210912
Status In Force
Filing Date 2023-06-07
Publication Date 2024-10-10
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor An, Yafan

Abstract

Techniques for making network path performance measurements by utilizing multi-layer tunneling are described. In a distributed environment that includes one or more nodes configured to inject network traffic (compute nodes) and one or more nodes that are not configured to inject network traffic (router nodes), techniques are disclosed that allow for the measurement of performance metrics across network segments that include at least one router node. In certain implementations, with one or more router nodes configured with a tunnel termination endpoint and/or a locally-relevant label-to-port mapping, performance metrics between router nodes or between router nodes and compute nodes can be measured. Performance metrics that may be measured using the techniques disclosed herein include network latency, packet loss, and jitter. In addition, the techniques may be used for fault isolation.

IPC Classes  ?

  • H04L 43/0852 - Delays
  • H04L 43/106 - Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps

55.

PLATFORM-AGNOSTIC COMPUTE INSTANCE LAUNCHES

      
Application Number US2024022031
Publication Number 2024/211165
Status In Force
Filing Date 2024-03-28
Publication Date 2024-10-10
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Herman, Jonathan Luke
  • Plata, Art
  • Potter, Joshua
  • Mullins, John Matthew
  • Cook, Nathan
  • Turner, Nathan
  • Wei, Tianyi
  • Vasudevan, Amit
  • Ren, Haifeng
  • Verma, Harsh
  • Yang, Jiafeng
  • Martinez, John David
  • Goldfein, Daniel Stuart
  • Tomer, Mahima

Abstract

A technique may include receiving, by a management service a plurality of instance configurations from a client device. The technique may then include receiving, by the management service, information identifying a launch request for a compute instance. The technique may include determining, by the management service, one or more candidate shapes for the compute instance based at least in part on the plurality of instance configurations. The technique may include selecting, by the management service and from the one or more candidate shapes, a launch shape for the compute instance and launching the compute instance using the launch shape. The technique may then include providing, the client device access to the compute instance, launched based on the launch shape.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

56.

PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING A BLOCKCHAIN BACKED CREDENTIAL

      
Application Number US2024021434
Publication Number 2024/206280
Status In Force
Filing Date 2024-03-26
Publication Date 2024-10-03
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ankrom, Zachary S.
  • Khaliq, Kamran

Abstract

Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a blockchain backed credential that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

57.

ACCESS MANAGER THAT LIMITS ACCESS TO USER INFORMATION USING AUTHENTICATION AND VERIFICATION

      
Application Number US2024021435
Publication Number 2024/206281
Status In Force
Filing Date 2024-03-26
Publication Date 2024-10-03
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ankrom, Zachary S.
  • Khaliq, Kamran

Abstract

Embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. Certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. In some scenarios such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. Embodiments of a secure information manager can permit a vetted entity scope and time limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. For example, in scenario(s) with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

58.

MANAGER FOR INGESTING SECURE USER INFORMATON AND PERMITTING SCOPE LIMITED ACCESS

      
Application Number US2024022166
Publication Number 2024/206772
Status In Force
Filing Date 2024-03-29
Publication Date 2024-10-03
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ankrom, Zachary S.
  • Khaliq, Kamran

Abstract

Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared. The vetted entity can scan the user's portable access point and request a credential. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential. The secure user information managed by the secure information manager can be received or retrieved from multiple sources and ingested/organized according to a multidimensional data schema.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

59.

DIGITAL TWIN FOR DISTRIBUTING DECENTRALIZED COMPUTE RESOURCES

      
Application Number US2024016196
Publication Number 2024/196523
Status In Force
Filing Date 2024-02-16
Publication Date 2024-09-26
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Canney, Jason Loring
  • Staples-Moore, Alexander
  • Traut, Hilary Joy

Abstract

The present disclosure relates to systems and methods for distributing decentralized compute resources. Compute resource metadata that identifies a set of decentralized compute resources can be received. A request to use one or more compute resources can be received. A digital twin can be generated. The digital twin can facilitate identification of a particular compute resource, and the digital twin can be representative of potential interactions between a receiver entity and a set of provider entities. An interaction can be initiated between the receiver entity and a particular provider entity. The interaction may involve allocating the particular compute resource from the particular provider entity to the receiver entity in response to the request.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

60.

MOBILE PREFAB FACTORY FOR BUILDING CLOUD REGIONS

      
Application Number US2024020255
Publication Number 2024/192397
Status In Force
Filing Date 2024-03-15
Publication Date 2024-09-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Adogla, Eden
  • Kuehnel, Thomas

Abstract

Techniques are disclosed for a mobile prefab factory for building region data centers. The mobile prefab factory can include a containment enclosure configured to mount physical computing resources of a data center, a networking device, a power supply electrically connected to the networking device, and a plurality of computing devices of the physical computing resources communicatively connected to the networking device and electrically connected to the power supply. A manager service can configure the computing devices for transmission to the destination site by implementing a seed server device of the plurality of computing devices and implementing a software resource repository at the seed server device. While the containment enclosure is in transit, the seed server device can deploy software resources to the plurality of computing devices.

IPC Classes  ?

  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • G06F 8/60 - Software deployment
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications

61.

TECHNIQUES FOR A CABLE TERMINATION PROTECTION APPARATUS IN A PREFAB FACTORY

      
Application Number US2024020258
Publication Number 2024/192399
Status In Force
Filing Date 2024-03-15
Publication Date 2024-09-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Adogla, Eden

Abstract

A cable termination protection apparatus and methods of use in a prefab factory are disclosed. The cable termination protection apparatus can include a frame having ports arranged on a face of the frame. Each of the ports can be configured to accept a cable termination connector of a networking cable of a static network fabric in a prefab factory. A computing device can generate instructions usable to disconnect a networking cable from the cable termination protection apparatus and reconnect the networking cable at a networking port of a networking device of a region data center rack. The computing device can receive a build request for the region data center request. In response, the computing device can obtain physical configuration parameters for computing devices on the data center rack and cabling specification information. The computing device can generate the instructions using the physical configuration parameters and the cabling specification information.

IPC Classes  ?

  • H05K 7/14 - Mounting supporting structure in casing or on frame or rack

62.

TECHNIQUES FOR VALIDATING CLOUD REGIONS BUILT AT A PREFAB FACTORY

      
Application Number US2024020261
Publication Number 2024/192402
Status In Force
Filing Date 2024-03-15
Publication Date 2024-09-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Adogla, Eden
  • Kuehnel, Thomas
  • Gartrell, John Ryan

Abstract

Techniques are disclosed for validating a cloud region built at a prefab factory. A computing device of the cloud region can receive a network configuration from a manager service. The network configuration can correspond to a network topology of physical resources in the cloud region and can include a first identifier associated with a computing device, a second identifier associated with a neighboring computing device, and information associating the computing device with the neighboring computing device. The computing device can be configured for transmitting to a second data center and can boot into a test mode at the second data center and receive a new identifier from a server device. The computing device can verify the new identifier and send a validation request to the neighboring computing device. The computing device can validate a network connection to the neighboring computing device based on a response to the validation request.

IPC Classes  ?

  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

63.

TECHNIQUES FOR BUILDING CLOUD REGIONS AT A PREFAB FACTORY

      
Application Number US2024020248
Publication Number 2024/192393
Status In Force
Filing Date 2024-03-15
Publication Date 2024-09-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Adogla, Eden
  • Kuehnel, Thomas
  • Gartrell, John, Ryan

Abstract

Techniques are disclosed for building a region at a prefab factory. A manager service can receive a build request. The manager service can generate, based on the build request, a physical build request for building physical resources within the prefab factory. The manager service can receive an indication that the physical resources corresponding to the physical build request have been built. In response, the manager service can implement a virtual bootstrap environment at a second data center communicatively connected to the prefab factory. The manager service can deploy software resources to the physical resources using the virtual bootstrap environment. The manager service can configure the physical resources for transmitting to a destination site by at least generating an inventory of the physical resources and generating a network configuration corresponding to a network topology of the physical resources in the prefab factory.

IPC Classes  ?

  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
  • H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks

64.

STATIC NETWORK FABRIC AT A PREFAB FACTORY

      
Application Number US2024020250
Publication Number 2024/192394
Status In Force
Filing Date 2024-03-15
Publication Date 2024-09-19
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Adogla, Eden
  • Kuehnel, Thomas, Werner

Abstract

Techniques are disclosed for a networking fabric in a data center for a prefab factory. The networking fabric can include a plurality of networking cables routed through the data center characterized by a static network fabric topology, with a set of networking cables of the plurality of networking cables configured to terminate at a location in the data center. A plurality of computing devices can be positioned at the location and configured to form a region network when communicatively connected to the set of networking cables according to a connection plan. The connection plan can be generated by a network service using a physical build request. The network service can determine the configuration of the plurality of computing devices and the static network fabric topology. The network service can generate the connection plan using the configuration and the static network fabric topology.

IPC Classes  ?

  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

65.

SYSTEM SELECTED FUNGIBLE CONFIGURABLE ATTRIBUTES FOR A COMPUTE INSTANCE

      
Application Number US2024018178
Publication Number 2024/186667
Status In Force
Filing Date 2024-03-01
Publication Date 2024-09-12
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Goldfein, Daniel S.
  • Pillai, Sanjay
  • Yekaterynenko, Max
  • Sun, Shihao
  • Sahibzada, Ali R.

Abstract

Techniques for configuring and creating a compute instance are disclosed. A system may receive a request to launch a compute instance where the compute instance defined by a configurable attribute, The request comprises one or more user-specified criteria for the configurable attribute without including a specific value for the configurable attribute. The system determines a set of candidate values for the configurable attribute. The system selects the specific value for the configurable attribute from the set of candidate values for the configurable attribute, based on the one or more user-specified criteria. The system stores the specific value in association with the configurable attribute; and launches the compute instance based on the system-selected specific value for the configurable attribute of the compute instance.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

66.

THRESHOLD TUNING FOR IMBALANCED MULTI-CLASS CLASSIFICATION MODELS

      
Application Number US2024014881
Publication Number 2024/186440
Status In Force
Filing Date 2024-02-07
Publication Date 2024-09-12
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Pushak, Yasha
  • Seyfi, Ali
  • Fathi Moghadam, Hesam
  • Hong, Sungpack
  • Chafi, Hassan

Abstract

In an embodiment, a computer generates, from an input, an inference that contains multiple probabilities respectively for multiple mutually exclusive classes that contain a first class and a second class. The probabilities contain (e.g. due to overfitting) a higher probability for the first class that is higher than a lower probability for the second class. In response to a threshold exceeding the higher probability, the input is automatically and more accurately classified as the second class. One, some, or almost all classes may have a respective distinct threshold that can be concurrently applied for acceleration. Data parallelism may simultaneously apply a threshold to a batch of multiple inputs for acceleration.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06N 5/01 - Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound
  • G06N 3/0455 - Auto-encoder networks; Encoder-decoder networks
  • G06N 3/048 - Activation functions
  • G06N 3/084 - Backpropagation, e.g. using gradient descent
  • G06N 3/088 - Non-supervised learning, e.g. competitive learning

67.

AUTOMLX COUNTERFACTUAL EXPLAINER (ACE)

      
Application Number US2024014883
Publication Number 2024/186441
Status In Force
Filing Date 2024-02-07
Publication Date 2024-09-12
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Zohrevand, Zahra
  • Soltan Aghai, Ehsan
  • Pushak, Yasha
  • Fathi Moghadam, Hesam
  • Hong, Sungpack
  • Chafi, Hassan

Abstract

A computer stores a reference corpus that consists of many reference points that each has a respective class. Later, an expected class and a subject point (i.e. instance to explain) that does not have the expected class are received. Multiple reference points that have the expected class are selected as starting points. Based on the subject point and the starting points, multiple discrete interpolated points are generated that have the expected class. Based on the subject point and the discrete interpolated points, multiple continuous interpolated points are generated that have the expected class. A counterfactual explanation of why the subject point does not have the expected class is directly generated based on continuous interpolated point(s) and, thus, indirectly generated based on the discrete interpolated points. For acceleration, neither way of interpolation (i.e. counterfactual generation) is iterative. Generated interpolated points can be reused to amortize resources consumed while generating counterfactuals.

IPC Classes  ?

  • G06N 5/01 - Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound
  • G06N 5/045 - Explanation of inference; Explainable artificial intelligence [XAI]; Interpretable artificial intelligence

68.

DOMAIN ADAPTING GRAPH NETWORKS FOR VISUALLY RICH DOCUMENTS

      
Application Number US2024016876
Publication Number 2024/182201
Status In Force
Filing Date 2024-02-22
Publication Date 2024-09-06
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Agarwal, Amit
  • Panda, Srikant
  • Karmakar, Deepak
  • Pachauri, Kulbhushan

Abstract

In some implementations, techniques described herein may include identifying text in a visually rich document and determining a sequence for the identified text. The techniques may include selecting a language model based at least in part on the identified text and the determined sequence. Moreover, the techniques may include assigning each word of the identified text to a respective token to generate textual features corresponding to the identified text. The techniques may include extracting visual features corresponding to the identified text. The techniques may include determining positional features for each word of the identified text. The techniques may include generating a graph representing the visually rich document, each node in the graph representing each of the visual features, textual features, and positional features of a respective word of the identified text. The techniques may include training a classifier on the graph to classify each respective word of the identified text.

IPC Classes  ?

69.

CLOUD ARCHITECTURE GENERATION, SIMULATION, AND OPTIMIZATION

      
Application Number US2024017908
Publication Number 2024/182631
Status In Force
Filing Date 2024-02-29
Publication Date 2024-09-06
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Lewellen, Garrett

Abstract

Techniques for generating, simulating, and optimizing one or more provider-specific cloud-based architectures from a provider-independent architecture definition are disclosed. An architecture generator maps provider-independent service definitions to provider-specific service components for one or more specific cloud service providers. An architecture simulator simulates execution of a set of operations on the provider-specific cloud-based architectures to determine one or more performance and cost metrics. An architecture optimizer varies one or more design choices or parameters of a provider-specific service component to suggest which variant is optimal with respect to an optimization objective.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

70.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROTECTING AGAINST UNAUTHORIZED USE OF CERTIFICATE MANAGEMENT PROTOCOL (CMP) CLIENT IDENTITY PRIVATE KEYS AND PUBLIC KEY CERTIFICATES ASSOCIATED WITH NETWORK FUNCTIONS

      
Application Number US2024013622
Publication Number 2024/177790
Status In Force
Filing Date 2024-01-30
Publication Date 2024-08-29
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Rajput, Jay
  • Singh, Virendra
  • Chirala, Pavani

Abstract

A method for protecting against unauthorized use of CMP client identity private keys and CMP public key certificates associated with NFs includes receiving, by a CMP CA proxy, a first CMP certificate request for renewing a security certificate associated with a first NF, the CMP certificate request including a public key certificate associated with the first NF and is protected by a CMP client identity private key associated with the first NF. The method further includes determining that the first NF is registered with the NRF, and, in response to determining that the first NF is registered with the NRF, checking, by the CMP CA proxy whether the first CMP certificate request includes an NRF-issued access token for the first NF, determining that the CMP certificate request does not include the NRF-issued access token for the first NF, and, in response to determining that the first CMP certificate request does not include the NRF-issued access token for the first NF, performing a network security action regarding the first CMP certificate request.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04W 12/069 - Authentication using certificates or pre-shared keys

71.

MODELING JAVA SOURCE CODE IN A SYMBOLIC DESCRIPTION LANGUAGE

      
Application Number US2024015368
Publication Number 2024/173232
Status In Force
Filing Date 2024-02-12
Publication Date 2024-08-22
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Sandoz, Paul D.

Abstract

Techniques for modeling Java source code in a symbolic description language are disclosed, including: obtaining a set of Java source code; determining that the set of Java source code includes a user-defined type; determining that the set of Java source code includes a loop; generating, based on the set of Java source code, a symbolic description language (SDL) model including an SDL representation of the user-defined type and an SDL representation of the loop.

IPC Classes  ?

72.

TRANSFORMING A JAVA PROGRAM USING A SYMBOLIC DESCRIPTION LANGUAGE MODEL

      
Application Number US2024015381
Publication Number 2024/173240
Status In Force
Filing Date 2024-02-12
Publication Date 2024-08-22
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Sandoz, Paul D.

Abstract

Techniques for transforming Java source code using a symbolic description language are disclosed, including: obtaining a set of Java source code corresponding to a Java program; generating a symbolic description language (SDL) model of the set of Java source code; generating, based on the SDL model, a transformed program including at least one transformation relative to the Java program.

IPC Classes  ?

73.

CIRCULAR-BUFFER FOR GENERATING MACHINE LEARNING ESTIMATES OF STREAMING OBSERVATIONS IN REAL TIME

      
Application Number US2023085959
Publication Number 2024/163099
Status In Force
Filing Date 2023-12-27
Publication Date 2024-08-08
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ding, Zejin
  • Wang, Guang, Chao
  • Gross, Kenny, C.

Abstract

Systems, methods, and other embodiments associated with generating a stream of ML estimates from a stream of observations in real-time using a circular double buffer are described. In an example method, observations are received from the stream of observations. The observations are loaded in real time into a circular buffer. The circular buffer includes a first buffer and a second buffer that are configured together in a circular configuration. Estimates of what the observations are expected to be are generated by a machine learning model from the observations that are in the circular buffer. The generation of estimates alternates between generating the estimates from observations in the first buffer in parallel with loading the second buffer, and generating the estimates from observations in the second buffer in parallel with loading the first buffer. The estimates are written to the stream of estimates in real time upon generation.

IPC Classes  ?

  • G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

74.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING OPTIMIZED TOKEN BUCKET ALGORITHM FOR INGRESS MESSAGE RATE LIMITING ACROSS DISTRIBUTED PRODUCER NETWORK FUNCTION (NF) APPLICATIONS

      
Application Number US2024013559
Publication Number 2024/163483
Status In Force
Filing Date 2024-01-30
Publication Date 2024-08-08
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Rajput, Jay
  • Mohan Raj, John, Nirmal
  • Sharma, Ashish, Jyoti
  • Gosain, Vijit

Abstract

A method for using an optimized token bucket algorithm for ingress message rate limiting across distributed producer network function (NF) applications includes implementing a producer NF instance as distributed producer NF applications and implementing distributed ingress gateways (IGWs) for performing ingress message rate limiting for the distributed producer NF applications. The method further includes maintaining, for each of the distributed IGWs, a local token bucket for rate limiting of ingress service- based interface (SBI) request messages received by each of the distributed IGWs and maintaining a distributed token bucket for refilling the local token buckets. The method further includes receiving ingress SBI request messages at the distributed IGWs and consuming, by the distributed IGWs, tokens from the local token buckets to allow processing of the ingress SBI request messages by the distributed producer NF applications and refilling the local token buckets with tokens from the distributed token bucket when numbers of tokens in the local token bucket fall below a threshold level.

IPC Classes  ?

  • H04L 47/10 - Flow control; Congestion control
  • H04L 47/215 - Flow control; Congestion control using token-bucket
  • H04L 47/783 - Distributed allocation of resources, e.g. bandwidth brokers

75.

MULTI-LAYER FORECASTING OF COMPUTATIONAL WORKLOADS

      
Application Number US2024010448
Publication Number 2024/151480
Status In Force
Filing Date 2024-01-05
Publication Date 2024-07-18
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Higginson, Antony Stephen
  • Arsene, Octavian
  • Dediu, Mihaela
  • Elders, Thomas

Abstract

Techniques for multi-layer forecasting of computational workloads are disclosed. A system identifies a level of granularity associated with a request to forecast a computational workload for a particular entity. The system obtains attribute data of computational resources at the specified level of granularity. The system determines whether computational resources, not specified in the request, should be included in a workload forecast. The system applies a time-series forecast model to time-series data obtained from computational resources associated with the request. The system presents one or more workload forecasts for computational workloads associated with the request.

IPC Classes  ?

76.

FREQUENCY DOMAIN RESAMPLING OF TIME SERIES SIGNALS

      
Application Number US2023082224
Publication Number 2024/151362
Status In Force
Filing Date 2023-12-04
Publication Date 2024-07-18
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ru, Keyang
  • Liu, Ruixian
  • Gross, Kenny, C.
  • Wang, Guang, Chao

Abstract

Systems, methods, and other embodiments associated with frequency- domain resampling of time series are described. An example method includes generating a power spectrum for a first time series signal that is sampled inconsistently with a target sampling rate. Prominent frequencies are selected from the power spectrum. Sets of first phase factors that map the prominent frequencies to a frequency domain at first time points are generated. Coefficients are identified that relate the sets of first phase factors to values of the first time series signal at the first time points. Sets of second phase factors that map the prominent frequencies to a frequency domain at second time points are generated. A second time series signal that is resampled at the target sampling rate is generated by generating new values at the second time points from the coefficients and sets of second phase factors.

IPC Classes  ?

  • G06F 17/14 - Fourier, Walsh or analogous domain transformations

77.

TASK MANAGEMENT WITH IMAGE-CAPTURE MONITORING OF USER ACTIONS

      
Application Number US2023086197
Publication Number 2024/147976
Status In Force
Filing Date 2023-12-28
Publication Date 2024-07-11
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Pierre, Robert St
  • Suri, Jai

Abstract

Techniques for presenting a user with instructions for completing tasks based on monitoring images of user actions are disclosed. A system monitors user actions to identify a next operation in a set of operations to present to a user. The system presents to the user instructions for completing the next operation. The system monitors user actions and may also monitor a manufacturing component status or operating equipment status to determine whether an operation has been completed. The system may reorder a sequence of operations for a particular task based on one or both user input and identifying a different sequence of operations associated with a superior task execution rating.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/0633 - Workflow analysis
  • G06Q 10/1091 - Recording time for administrative or management purposes
  • G06V 40/20 - Movements or behaviour, e.g. gesture recognition
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead
  • G06N 20/00 - Machine learning

78.

DISCOVERY AND INVENTORY CONTROL FOR REMOTE RESOURCE INTEGRATION WITH CLOUD SERVICES

      
Application Number US2023082312
Publication Number 2024/137177
Status In Force
Filing Date 2023-12-04
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Sabiun, Erik
  • Ding, Zheyu

Abstract

Techniques are disclosed herein for extending a cloud service's reach into on- or off-premises environments and other cloud platforms to enable migration and multi-cloud use cases. In one aspect, a computer-implemented method is provided that includes deploying a remote agent appliance with a discovery plugin in an external environment of a use creating an asset source specifying a location of the external environment from which external assets and associated asset metadata should be discovered, generating a discovery job for the purpose of retrieving the asset metadata for the external assets discovered within the asset source, executing, using the discovery plugin, the discovery job to discover and retrieve the external assets and the associated asset metadata within the asset source, and providing a collection of assets that includes the asset metadata for the external assets as at least part of an inventory to the user.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

79.

SECURE BI-DIRECTIONAL NETWORK CONNECTIVITY SYSTEM BETWEEN PRIVATE NETWORKS

      
Application Number US2023085686
Publication Number 2024/138123
Status In Force
Filing Date 2023-12-22
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Shetye, Shruti Nitin
  • Kailasa, Soumya
  • Reyes, Jesus Velazquez

Abstract

A secure private network connectivity system (SNCS) within a cloud service provider infrastructure (CSPI) is described that provides secure private network connectivity between external resources residing in a customer's on-premise environment and the customer's resources residing in the cloud. The SNCS provides secure private bi-directional network connectivity between external resources residing in a customer's external site representation and resources and services residing in the customer's VCN in the cloud without a user (e.g., an administrator) of the enterprise having to explicitly configure the external resources, advertise routes or set up site-to-site network connectivity. The SNCS provides a high performant, scalable, and highly available site-to-site network connection for processing network traffic between a customer's on-premise environment and the CSPI by implementing a robust infrastructure of network elements and computing nodes that are used to provide the secure site to site network connectivity.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/46 - Interconnection of networks
  • H04L 9/40 - Network security protocols

80.

SYSTEMS AND METHODS FOR AUTOMATED MIGRATION REPLICATION

      
Application Number US2023085769
Publication Number 2024/138168
Status In Force
Filing Date 2023-12-22
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Sandryhaila, Aliaksei
  • Reyes, Jesus Velazquez

Abstract

Techniques are provided for automated migration replication. A method can include creating a volume group including an initial snapshot of a virtual machine (VM) residing in an initial environment and in an initial configuration (VM1). The method can include generating a terraform stack based on the initial snapshot, execution of which in an environment causes replication of VM1 in that environment. The method can include providing the terraform stack to a user, generating a subsequent snapshot of the VM in a subsequent configuration (VM2), generating a delta file characterizing the difference between the initial snapshot stored in the volume group and the subsequent snapshot, generating a delta terraform stack based on the delta file, wherein execution of the delta terraform stack causes previously replicated VM1 to update to replicate VM2, and providing the delta terraform stack to the user.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

81.

MEASURING GAIT TO DETECT IMPAIRMENT

      
Application Number US2023083035
Publication Number 2024/137214
Status In Force
Filing Date 2023-12-08
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ding, Zejin
  • Gerdes, Matthew, T.
  • Wang, Guang, Chao
  • Gross, Kenny, C.
  • Vakhutinsky, Andrew

Abstract

Systems, methods, and other embodiments associated with detecting impairment using a vibration fingerprint that characterizes gait dynamics are described. An example method includes receiving measurements of a gait of a being from a sensor. The measurements of the gait are converted into a time series of observations for each frequency bin in a set of frequency bins. A time series of residuals is generated for each range of the set by pointwise subtraction between the time series of observations and a time series of references for each range of the set. An impairment metric is generated based on the time series of residuals. The impairment metric is compared to a threshold for the impairment. In response to the impairment metric satisfying the threshold, the being is indicated to be impaired.

IPC Classes  ?

  • A61B 5/11 - Measuring movement of the entire body or parts thereof, e.g. head or hand tremor or mobility of a limb

82.

VIRTUAL NETWORK DISTRIBUTED DENIAL-OF-SERVICE SCRUBBER

      
Application Number US2023084902
Publication Number 2024/137676
Status In Force
Filing Date 2023-12-19
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Tracy, Leonard Thomas
  • Kreger-Stickles, Lucas Michael

Abstract

A novel overlay network DDoS mitigation system (ONDMS) is described for performing DDoS attack mitigation in a virtual network environment. Network traffic received by network resources in overlay networks is monitored. When a potential DDoS attack is detected, ONDMS may initiate a protected mode for a network resource. This may involve creating one or more shadow VNICs for the network resource being protected. While in protected mode, as a result of the one or more shadow VNICs, packets that would otherwise be received by the network resource being protected are instead redirected to one or more alternative destinations (e.g., to a DDoS scrubber system within ONDMS) that are configured to filter and analyze the packets and take appropriate mitigation actions, as needed. This protects the network resource being protected from the potential DDoS attack.

IPC Classes  ?

83.

SYSTEMS AND METHODS FOR MIGRATION PLANNING, ASSESSMENT, AND LAUNCH

      
Application Number US2023085338
Publication Number 2024/137933
Status In Force
Filing Date 2023-12-21
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Gunin, Alexander

Abstract

Techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by one or more processors) herein for migration planning, assessment, and launch. A method includes identifying at least one asset in a source environment, adding the asset to a migration project, the migration project designating the source environment and a destination environment for replication of the asset, receiving a request for generation of a recommended shape, the recommended shape designating a shape of the replicated asset in the destination environment, and generating the recommended shape based on metadata characterizing attributes of the source environment, a replication strategy provided by a user, and rules designating compatibility requirements for the recommended shape. In some embodiments, the metadata characterizes at least a central processing unit (CPU) related attribute and a network related attribute of the source environment.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

84.

SECURE BI-DIRECTIONAL NETWORK CONNECTIVITY SYSTEM BETWEEN PRIVATE NETWORKS

      
Application Number US2023085695
Publication Number 2024/138126
Status In Force
Filing Date 2023-12-22
Publication Date 2024-06-27
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Shetye, Shruti Nitin
  • Kailasa, Soumya
  • Reyes, Jesus Velazquez

Abstract

A secure private network connectivity system (SNCS) within a cloud service provider infrastructure (CSPI) is described that provides secure private network connectivity between external resources residing in a customer's on-premise environment and the customer's resources residing in the cloud. The SNCS provides secure private bi-directional network connectivity between external resources residing in a customer's external site representation and resources and services residing in the customer's VCN in the cloud without a user (e.g., an administrator) of the enterprise having to explicitly configure the external resources, advertise routes or set up site-to-site network connectivity. The SNCS provides a high performant, scalable, and highly available site-to-site network connection for processing network traffic between a customer's on-premise environment and the CSPI by implementing a robust infrastructure of network elements and computing nodes that are used to provide the secure site to site network connectivity.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/46 - Interconnection of networks
  • H04L 9/40 - Network security protocols

85.

SYSTEMS AND METHODS FOR CREATING AN EXTENDED SMART CARD APPLICATION FILE FROM MULTIPLE SMART CARD APPLICATION FILES

      
Application Number US2023082534
Publication Number 2024/129444
Status In Force
Filing Date 2023-12-05
Publication Date 2024-06-20
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Trufas, Marius

Abstract

Techniques are described herein for merging multiple smart card application files into a single, consolidated file that may be used by a smart card runtime environment to execute multiple applications. The techniques may reduce the load size of installed application code on a smart card by bundling applications and libraries together into an optimized file. As a result, smart card platforms may have more space available to execute the applications at runtime and/or to install additional applications. Embodiments herein may further provide flexibility on defining access controls over resources for which the code is not known. When application files are merged, packages and libraries that were previously public may be made private within the merged application file to restrict external access to unknown code in the bundle.

IPC Classes  ?

86.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SECURING SENSITIVE DATA TO BE TRANSMITTED IN 5G AND SUBSEQUENT GENERATION NETWORKS

      
Application Number US2023037093
Publication Number 2024/107377
Status In Force
Filing Date 2023-11-09
Publication Date 2024-05-23
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Krishan, Rajiv
  • Shivarajapura, Anup

Abstract

According to another aspect of the subject matter described herein, includes receiving or generating a service based interface (SBI) request message. The method further includes identifying a next-hop network function (NF) of the SBI request message. The method further includes determining, from a registered profile of the next-hop NF, whether the next-hop NF supports handling of encrypted SBI request message parameters. The method further includes in response to determining that the next-hop NF supports handling of encrypted SBI request message parameters: encrypting selected SBI request message parameters; adding one or more headers to the SBI request message or updating one or more headers in the SBI request message to facilitate identification and decryption of the encrypted SBI request message parameters; and transmitting the SBI request message to the next-hop NF.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 65/40 - Support for services or applications
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
  • H04W 12/037 - Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic

87.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING STOLEN ACCESS TOKENS

      
Application Number US2023037095
Publication Number 2024/107378
Status In Force
Filing Date 2023-11-09
Publication Date 2024-05-23
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor Krishan, Rajiv

Abstract

Methods, systems, and computer readable media for detecting stolen access tokens are disclosed. One example method for detecting stolen access tokens comprises: at a network function (NF) comprising at least one processor: receiving, via a transport layer security (TLS) connection and from a sender, a service request comprising an access token, wherein the access token includes ownership information indicating a TLS parameter for verifying an owner of the access token; determining, using the ownership information of the access token and TLS information in a TLS certificate obtained from the sender, whether the ownership information and the TLS information matches; and in response to determining that the ownership information and the TLS information do not match, rejecting the service request.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04W 12/069 - Authentication using certificates or pre-shared keys

88.

TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING

      
Application Number US2023030096
Publication Number 2024/102181
Status In Force
Filing Date 2023-08-11
Publication Date 2024-05-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Zeighami, Roy Mehdi
  • Kochar, Sumeet
  • Herman, Jonathan Luke
  • Huang, Mark Lee

Abstract

Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. Power consumption of power-drawing devices (e.g., hosts, servers, etc.) may be monitored with respect to a power threshold. When the current power consumption corresponding to those devices breaches the power threshold, or at any suitable time, the system may identify a set of reduction actions configured to reduce aggregate power consumption. The power threshold may be updated dynamically based on the operational status of related systems and environmental factors. A number of response levels may be utilized, each having an association to a corresponding set of reduction actions. The impact to customers, hosts, and/or workloads can be computed at run time based on current conditions and workloads, and a particular response level can be selected based on the computed impact. These techniques enable a sufficient, but least impactful response to be employed.

IPC Classes  ?

  • G06F 1/3203 - Power management, i.e. event-based initiation of a power-saving mode
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

89.

TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING

      
Application Number US2023030106
Publication Number 2024/102183
Status In Force
Filing Date 2023-08-11
Publication Date 2024-05-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Zeighami, Roy, Mehdi
  • Kochar, Sumeet
  • Herman, Jonathan, Luke
  • Huang, Mark, Lee

Abstract

Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. A number of response levels may be utilized, each having an association to a corresponding set of reduction actions. The impact to customers, hosts, and/or workloads can be computed at run time based on current and/or predicted conditions and workloads, and a particular response level can be selected based on the computed impact. These techniques enable a sufficient, but least impactful response to be employed.

IPC Classes  ?

  • G06F 1/3203 - Power management, i.e. event-based initiation of a power-saving mode
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

90.

OPERATING DATA ANOMALY DETECTION AND REMEDIATION

      
Application Number US2023036939
Publication Number 2024/102365
Status In Force
Filing Date 2023-11-07
Publication Date 2024-05-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Mimaroglu, Selim Necdet
  • Shen, Anqi
  • Chauhan, Aniruddha

Abstract

Techniques for detecting and remediating anomalous intervals in time-series data of a monitored device are disclosed. A system trains a machine learning model on a combination of real data obtained from a monitoring device and false data generated by adding noise to the real data. The model predicts operating values for the device at individual intervals of a time-series data set. The system identifies anomalies in the time-series data based on differences between the predicted values and the real values. If the difference between a predicted value generate by the machine learning model and the real value exceeds a threshold, the system identifies a particular data point, such as a meter reading, as anomalous. The system ranks anomalies to perform remediation operations based on the ranking.

IPC Classes  ?

  • G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
  • G06N 3/09 - Supervised learning
  • G05B 23/02 - Electric testing or monitoring
  • G06F 11/30 - Monitoring
  • G06N 3/094 - Adversarial learning
  • G01D 4/00 - Tariff metering apparatus

91.

TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING

      
Application Number US2023030101
Publication Number 2024/102182
Status In Force
Filing Date 2023-08-11
Publication Date 2024-05-16
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Zeighami, Roy Mehdi
  • Kochar, Sumeet
  • Herman, Jonathan Luke
  • Huang, Mark Lee

Abstract

Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. A current value for an aggregate power threshold of a plurality of hosts may be identified. During a first time period, an aggregate power consumption of the plurality of hosts may be managed using the current value for the aggregate power threshold. A triggering event indicating a modification to the aggregate power threshold is needed may be detected. A new value for the aggregate power threshold may be determined based on the triggering event. During a second time period, the aggregate power consumption of the plurality of hosts may be managed using the new value for the aggregate power threshold.

IPC Classes  ?

  • G06F 1/20 - Cooling means
  • G06F 1/26 - Power supply means, e.g. regulation thereof
  • G06F 1/28 - Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
  • G06F 1/3203 - Power management, i.e. event-based initiation of a power-saving mode
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

92.

ROUTING IN A GPU SUPERCLUSTER

      
Application Number US2023078467
Publication Number 2024/097842
Status In Force
Filing Date 2023-11-02
Publication Date 2024-05-10
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Brar, Jagwinder Singh
  • Becker, David Dale
  • Uecker, Jacob Robert

Abstract

A plurality of GPU clusters are communicatively coupled with one another via a plurality of network devices arranged in a hierarchical structure, wherein the GPU clusters includes at least a first GPU cluster operating at a first speed and a second GPU cluster operating at a second speed that is different than the first speed. A routing policy is configured for each network device, wherein the configuring includes establishing a mapping of each incoming port-link of the network device to a unique outgoing port-link of the network device. For a packet transmitted by a GPU of a host machine and received by a first network device, an incoming port-link of the first network device is determined on which the packet was received and based on the configuring, an outgoing port-link is identified that corresponds to the incoming port-link. The packet is forwarded on the outgoing port-link of the network device.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 45/02 - Topology update or discovery
  • H04L 45/24 - Multipath
  • H04L 49/1515 - Non-blocking multistage, e.g. Clos
  • H04L 45/745 - Address table lookup; Address filtering
  • H04L 41/5051 - Service on demand, e.g. definition and deployment of services in real time

93.

ADDRESS MANAGEMENT IN A GPU SUPERCLUSTER

      
Application Number US2023078470
Publication Number 2024/097845
Status In Force
Filing Date 2023-11-02
Publication Date 2024-05-10
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Brar, Jagwinder Singh
  • Becker, David Dale
  • Uecker, Jacob Robert

Abstract

Described herein is a network fabric including a plurality of graphical processing unit (GPU) clusters that are communicatively coupled with one another via a plurality of switches arranged in a hierarchical structure including a first tier of switches, a second tier of switches, and a third tier of switches. One or more switches are selected from the third tier of switches to form a set of target switches, where each target switch receives address information of each GPU included in the plurality of GPU clusters. Each target switch generates, a plurality of sets of address information by filtering received address information based on a condition and transmits the plurality of sets of address information to each switch included in the first tier of switches, wherein the switch stores a subset of the plurality of sets of address information in accordance with the condition.

IPC Classes  ?

94.

SUPERCLUSTER NETWORK OF GRAPHICAL PROCESSING UNITS

      
Application Number US2023078464
Publication Number 2024/097839
Status In Force
Filing Date 2023-11-02
Publication Date 2024-05-10
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Brar, Jagwinder Singh
  • Becker, David Dale
  • Uecker, Jacob Robert

Abstract

Described herein is a network fabric including a plurality of graphical processing unit (GPU) clusters. The plurality of GPU clusters includes at least a first GPU cluster operating at a first speed and a second GPU cluster operating at a second speed that is different than the first speed. The network fabric includes a plurality of blocks, wherein each block includes: (a) one or more racks that host a GPU cluster, and (b) a plurality of switches arranged in a hierarchical structure that communicatively couple the block to other blocks included in the network fabric. Responsive to receiving a request to execute a workload, allocating one or more GPUs from the plurality of GPU clusters to execute the workload.

IPC Classes  ?

95.

NETWORK LOCALITY IN A GPU SUPERCLUSTER

      
Application Number US2023078465
Publication Number 2024/097840
Status In Force
Filing Date 2023-11-02
Publication Date 2024-05-10
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Brar, Jagwinder Singh
  • Becker, David Dale
  • Uecker, Jacob Robert

Abstract

Each host machine of a plurality of host machines stores hierarchical locality information for the host machine that identifies at least a rack comprising the host machine, and a block of a plurality of blocks hosting the rack. The host machine is associated with one or more graphical processing units (GPUs), and wherein GPUs included in a first block operate at a first speed and GPUs included in a second block operate at a second speed that is different than the first speed. Responsive to receiving a request requesting execution of a workload, one or more host machines are identified as being available for executing the workload, and the hierarchical locality information and linkage information of the one or more host machines is provided in response to the request.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/12 - Discovery or management of network topologies

96.

DEEPFAKE DETECTION USING SYNCHRONOUS OBSERVATIONS OF MACHINE LEARNING RESIDUALS

      
Application Number US2023033576
Publication Number 2024/086000
Status In Force
Filing Date 2023-09-25
Publication Date 2024-04-25
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Michaeli, Guy, G.
  • Bhuller, Mandip, S.
  • Cline, Timothy, D.
  • Gross, Kenny, C.

Abstract

Systems, methods, and other embodiments associated with computer deepfake detection are described. In one embodiment, a method includes converting audio-visual content of a person delivering a speech into a set of time series signals. Residual time series signals of residuals that indicate an extent to which the time series signals differ from machine learning estimates of authentic delivery of the speech by the person are generated. Residual values from one synchronous observation of the residual time series signals are placed into an array of residual values for a point in time. A sequential analysis of the residual values of the array is performed to detect an anomaly in the residual values for the point in time. In response to detection of the anomaly, an alert that deepfake content is detected in the audio-visual content is generated.

IPC Classes  ?

  • G10L 17/18 - Artificial neural networks; Connectionist approaches
  • G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectors; Recognition of animal voices
  • G06V 40/40 - Spoof detection, e.g. liveness detection
  • G10L 17/10 - Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems

97.

SELF-DISCOVERY AND CONSTRUCTION OF TYPE-SENSITIVE COLUMNAR FORMATS ON TYPE-AGNOSTIC STORAGE SERVERS TO ACCELERATE OFFLOADED QUERIES

      
Application Number US2023034432
Publication Number 2024/086025
Status In Force
Filing Date 2023-10-04
Publication Date 2024-04-25
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Issa Garcia, Jorge Luis
  • Lee, Teck Hua
  • Lewis, Sheldon Andre Kevin
  • Prashanth, Bangalore
  • Chang, Hui Joe
  • Liu, Zhen Hua
  • Mishra, Aurosish
  • Chavan, Shasank K.

Abstract

Herein is database query acceleration from dynamic discovery of whether contents of a persistent column can be stored in an accelerated representation in storage-side memory. In an embodiment, based on data type discovery, a storage server detects that column values in a persistent column have a particular data type. Based on storage-side metadata including a frequency of access of the persistent column as an offload input column for offload computation requests on a certain range of memory addresses, the storage server autonomously decides to generate and store, in storage-side memory in the storage server, an accelerated representation of the persistent column that is based on the particular data type. The storage server receives a request to perform an offload computation for the offload input column. Based on the accelerated representation of the persistent column, execution of the offload computation is accelerated.

IPC Classes  ?

  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 16/2455 - Query execution
  • G06F 16/81 - Indexing, e.g. XML tags; Data structures therefor; Storage structures

98.

PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON‑FUNGIBLE TOKENS

      
Application Number US2023032871
Publication Number 2024/085980
Status In Force
Filing Date 2023-09-15
Publication Date 2024-04-25
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ankrom, Zachary S.
  • Khaliq, Kamran

Abstract

Embodiments permit scope limited access to a user's secure information using non-fungible tokens (NFTs). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a NFT that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the NFT.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

99.

MANAGEMENT OF MULTIPLE MACHINE LEARNING MODEL PIPELINES

      
Application Number US2023033394
Publication Number 2024/085993
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Ioannou, Andrew
  • Novák, Miroslav
  • Dousa, Petr
  • Panacek, Martin
  • Natarajan, Hari Ganesh
  • Kalivoda, David
  • Janota, Vojtech
  • Pesek, Zdenek
  • Pridal, Jan

Abstract

In one or more embodiments, a software service allows software providers to implement machine learning (ML) features into products offered by the software providers. Each ML feature may be referred to as an encapsulated ML application, which may be defined and maintained in a central repository, while also being provisioned for each user of the software provider on an as-needed basis. Advantageously, embodiments allow for a central definition for an ML application that encapsulates data science and processing capabilities and routines of the software provider. This central ML application delivers a ML deployment pipeline template that may be replicated multiple times as separate, tailored runtime pipeline instances on a per-user basis. Each runtime pipeline instance accounts for differences in the specific data of each user, resulting in user-specific ML models and predictions based on the same central ML application.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06N 3/10 - Interfaces, programming languages or software development kits, e.g. for simulating neural networks

100.

LAZY COMPACTION IN GARBAGE COLLECTION

      
Application Number US2023035122
Publication Number 2024/086074
Status In Force
Filing Date 2023-10-13
Publication Date 2024-04-25
Owner ORACLE INTERNATIONAL CORPORATION (USA)
Inventor
  • Österlund, Erik
  • Karlsson, Stefan, Mats, Rikard

Abstract

Techniques for lazy compaction are disclosed, including: selecting, by a garbage collector, multiple regions of a memory for inclusion in a relocation set; populating, by the garbage collector, a lazy free list (LFL) with the multiple regions selected for inclusion in the relocation set; subsequent to populating the LFL: determining, by an allocator, that an ordinary free list managed by the garbage collector is depleted; responsive to determining that the ordinary free list is depleted: selecting a region in the LFL; executing one or more load barriers associated respectively with one or more objects marked as live in the region, each respective load barrier being configured to relocate the associated object from the region if the associated object is still live; subsequent to executing the one or more load barriers: allocating the region.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocation; Relocation
  1     2     3     ...     15        Next Page