Executing Digital Signature Operations In A Secure Element Platform Runtime Environment
Granted: May 8, 2025
Application Number:
20250150282
One or more embodiments perform a set of digital signature operations in a secure element (SE) platform runtime environment executing on a SE processor of a SE hardware device. A system initializes a signature generation object in an SE platform runtime environment. The system determines, via the signature generation object, a private key corresponding to a hash-based signature protocol. The system generates, via the signature generation object, a digital signature of a message digest by…
TECHNIQUES FOR COMPUTING PERFORMANCE METRICS FOR MULTIOUTPUT-MULTILABEL MACHINE LEARNING MODELS
Granted: May 8, 2025
Application Number:
20250148363
The present disclosure relates to machine learning (ML) models, and more particularly to novel techniques for computing performance metrics for Multioutput-Multilabel ML models. Novel techniques are described for computing the performance metrics in a parallel and distributed without having to store the entire dataset for which metrics are to be computed in the memory of a data processing system. Novel data structures are provided for performing the computations.
Semantically Classifying Sets Of Data Elements
Granted: May 8, 2025
Application Number:
20250148211
One or more embodiments include operations associated with semantic classification of data columns. The operations may include receiving a set of data elements corresponding to a data column to be semantically classified, applying a machine learning model to the set of data elements to predict a set of candidate semantic types for the set of data elements, selecting a particular semantic type from the set of candidate semantic types based at least in part on a semantic fit score…
TEXT SPAN PREDICTION BASED ON ENTITY TYPE
Granted: May 8, 2025
Application Number:
20250148206
Machine learning techniques directed to span prediction for textual data are disclosed. As used herein, span prediction is the process of predicting the possible spans of text that can be assigned to a given entity type of a set of predefined entity types. To this end, a machine learning model can be trained to generate values that indicate the predicted probability that a given span of an identified set of spans within text of interest is appropriate for association with a given entity…
Executing Cryptographic Operations In A Secure Element Platform Runtime Environment
Granted: May 8, 2025
Application Number:
20250148071
A system performs a set of cryptographic operations at least by utilizing an API to cause execution of a set of one or more secure element (SE) applications within the SE platform runtime environment of a first computing entity. The set of cryptographic operations include generating a first shared secret, generating a ciphertext at least by encapsulating the first shared secret with a first public key associated with a second computing entity in accordance with an encapsulation…
TECHNIQUES FOR EFFICIENT COMPUTE RESOURCE HARVESTING
Granted: May 8, 2025
Application Number:
20250147942
The present disclosure relates to a system and techniques for resolving dangling references resulting from a dependency relationship between computing resource objects uncovered during a harvesting process. The techniques include, adding a computing resource object from a catalog of computing resource objects to a computing resource collection for a client and identifying one or more dependencies for the computing resource object. The techniques further include determining at least one…
Thread-Local Garbage Collection
Granted: May 8, 2025
Application Number:
20250147881
Techniques are described herein for performing thread-local garbage collection. The techniques include automatic profiling and separation of private and shared objects, allowing for efficient reclamation of memory local to threads. In some embodiments, threads are assigned speculatively-private heaps within memory. Unless there is a prior indication that an allocation site yields shared objects, then a garbage collection system may assume and operate as if such allocations are private…
GENERATION OF SYNTHETIC DOCTOR-PATIENT CONVERSATIONS
Granted: May 1, 2025
Application Number:
20250140404
Knowledge graph guide and entity controlled techniques for generating synthetic doctor-patient conversations. In one particular aspect, a method is provided that includes obtaining an original dataset containing textual dialogue associated with a plurality of individual doctor-patient conversations for training a machine learning model, constructing input data by using named entity recognition to capture and categorize named medical entities present in the dialogue, generating prepared…
TIME-WINDOW BASED MULTI-STAGE SAMPLING WITH SAMPLE BIASING
Granted: May 1, 2025
Application Number:
20250141904
A sampling approach for time-window based multi-stage sampling. The sampling approach can determine whether received communications are of a stratum that is rare and determine a sampling mechanism for the communication based on whether the stratum is rare. The sampling system defines multiple time windows for sampling communications received by a computing system. The time windows are segmented into multiple time intervals. A portion of the multiple time intervals are randomly selected…
Authorizing Requests For Access Credentials, For Accessing Cloud Resources, Based On Successful Stateless Validation Of Digital Certificates
Granted: May 1, 2025
Application Number:
20250141696
Operations of a system may include executing a provisioning process that includes provisioning a network entity with a digital certificate for use in a stateless validation protocol. After provisioning the network entity with the digital certificate, the system may include receive a credential request from the network entity that includes the digital certificate and a request for an access credential for accessing a cloud resource. In response to the credential request, the system may…
Secure Element Enforcing A Security Policy For Device Peripherals
Granted: May 1, 2025
Application Number:
20250139255
Techniques for implementing and enforcing a security policy in a secure element are disclosed. The secure element enforces the security policy to grant and/or deny access, such as from an application processor, to configuration of the device peripheral components and access to data of the device peripheral components across one or more bus architectures, such as an I3C bus. Implementing an access control policy in a secure element allows execution of code within the isolated secure…
Application Interface Functionality Enhancement
Granted: May 1, 2025
Application Number:
20250138846
Techniques for extensions of graphical user interfaces (GUIs) are disclosed. The system executes an application that displays a GUI. The system selects one or more interface elements for displaying within the GUI at runtime while executing the application. The system identifies a primary data type corresponding to content that is to be displayed or currently being displayed by the GUI. The system determines that the primary data type is mapped to a first target data type. Responsive to…
BUILD SYSTEM FOR SECURELY BUILDING AND DEPLOYING A TARGET BUILD ARTIFACT
Granted: May 1, 2025
Application Number:
20250138796
A build system is disclosed that identifies the inputs used by a build process for securely building and deploying a piece of software to production. The build system comprises a build container and a build proxy server. The build container receives a set of initial inputs for performing a build and generates a build output (e.g., a target artifact) as a consequence of performing the build. The build proxy server monitors both internal interactions as well as external interactions (e.g.,…
DEVELOPING A PROGRAMMING LANGUAGE MODEL FOR MACHINE LEARNING TASKS
Granted: April 24, 2025
Application Number:
20250130780
A method develops a programming language model for machine learning tasks. The method includes adjusting a token list to include a language token used by a tokenizer for a pretrained language model. The pretrained language model includes a set of layers. The set of layers includes a set of initial layers, an embedding layer, and an output layer. The method further includes performing an output layer modification of the output layer to replace the output vector with the embedding vector.…
RAFT CONSENSUS VICE LEADER OPTIMIZATION
Granted: April 24, 2025
Application Number:
20250133131
Described is an improved system, method, and computer program product for performing elections in a computing system. Approaches are described for the non-leader member of a member set to self-identify to be the vice-leader. When it detects a death, rather than wait the random, bounded period, the vice-leader can immediately send its “vote for me” message to other members. This puts it ahead of the race by other members to announce their candidacies, and results in vastly more…
MERGING A NEW REGION INTO CLASSIFIED REALMS
Granted: April 24, 2025
Application Number:
20250133087
A method may include generating a first cloud network associated with a first security level and including data associated with a service. The method may include generating a second cloud network associated with the first security level and deploying the service and the data associated with the service to the second cloud network and generating a first ingress channel to permit data to be transmitted to the second cloud network. Restricted data associated with a tenant may be deployed to…
TECHNIQUES FOR ROTATING SERVICE ENDPOINTS IN PREFAB REGIONS
Granted: April 24, 2025
Application Number:
20250133056
Techniques are disclosed for rotating service endpoints following the installation of a prefab region network at a destination site. A manager service executing within a distributed computing system can send a request to a domain name system service to generate a target zone including target domain names for second service endpoints within a region network of the distributed computing system. The manager service can send an instruction to a certificate service to provide a dual-headed…
SUBNET SORTING-BASED FAILOVER OF HIGH AVAILABILITY IP ADDRESSES ACROSS BROADCAST DOMAINS
Granted: April 24, 2025
Application Number:
20250132974
Described is an improved approach to IP failover in a computing system. An approach is described which allows each node to perform its own sorted ordering of the interface devices on that node, but in a way where each node will deterministically come up with the exact same sorted order as another node. In this way, each node will select the exact same failover target as any other node, without requiring complicated coordination logic and without the need for a centralized coordinator.
Provisioning Hosts With Operator Accounts For Use By Clients To Access Target Resources
Granted: April 24, 2025
Application Number:
20250132931
A system includes a host network entity associated with a computing network. The host network entity may establish a first connection with a client network entity via a provisioner account in response to a connection request from a client network entity. The host network entity may receive a digital certificate from the client network entity via the first connection. The digital certificate may include an instruction set with a first instruction to generate an operator account for the…
COMPSITIONAL REASONING OF INFORMATION FLOW IN SCRIPTED QUERY LANGUAGE
Granted: April 24, 2025
Application Number:
20250131120
A method implements compositional reasoning of information flow in scripted query language. The method includes gating access to a database using a policy that includes a policy scope defined by a set of policy tuples extracted from a set of policy queries. The method further includes preventing execution of a runtime query requesting access to the database. The method further includes extracting a set of runtime tuples from the runtime query and comparing the set of runtime tuples to…