Oracle Patent Applications

Predictive Analytics For Network Topology Changes

Granted: August 29, 2024
Application Number: 20240291717
Techniques for recommending plans to remediate a network topologies are disclosed. The techniques include logging network topology information identifying relationships between entities in a network topology over a number of time periods. The techniques also include, using the logged network topology information, predicting characteristics of the network at a future time period. The techniques further include computing a signature based on the predicted characteristics and, using the…

SEARCHABLE TABLE EXTRACTION

Granted: August 29, 2024
Application Number: 20240290123
Method includes extracting, from document image, tables as objects; outputting tables in an XML format; filtering tables based on keywords and a condition including one from among AND and OR, which includes: for each of tables, determining whether the table includes at least one from among a first keyword and a second keyword, for condition being AND, based on the table containing first keyword and second keyword, outputting the table, as filtered table, and, for condition being OR,…

SALES ORCHESTRATION USING ITERATIVE MACHINE LEARNING

Granted: August 29, 2024
Application Number: 20240289817
Techniques for sales orchestration using iterative machine learning are disclosed, including: obtaining, by a customer relationship management (CRM) system, opportunity-specific CRM data; generating, by the CRM system, one or more suggested sales actions applicable to the opportunity-specific CRM data, at least by applying a machine learning model to the opportunity-specific CRM data, wherein the machine learning model is configured to generate suggested sales actions based on CRM data;…

TECHNIQUES FOR OUT-OF-DOMAIN (OOD) DETECTION

Granted: August 29, 2024
Application Number: 20240289555
The present disclosure relates to techniques for identifying out-of-domain utterances. One particular technique includes receiving an utterance and a target domain of a chatbot, generating a sentence embedding for the utterance, obtaining an embedding representation for each cluster of in-domain utterances associated with the target domain, predicting, using a metric learning model, a first probability that the utterance belongs to the target domain based on a similarity or difference…

DOMAIN ADAPTING GRAPH NETWORKS FOR VISUALLY RICH DOCUMENTS

Granted: August 29, 2024
Application Number: 20240289551
In some implementations, techniques described herein may include identifying text in a visually rich document and determining a sequence for the identified text. The techniques may include selecting a language model based at least in part on the identified text and the determined sequence. Moreover, the techniques may include assigning each word of the identified text to a respective token to generate textual features corresponding to the identified text. The techniques may include…

METHOD AND SYSTEM TO EFFICIENTLY ABORT A DATABASE TRANSACTION

Granted: August 29, 2024
Application Number: 20240289318
Disclosed is an approach to autonomously abort a lower priority transaction that is blocking a higher priority transaction, where the lower priority transaction is holding a lock on a resource for which there is contention. Some approaches also provide an efficient way to implement identification of a blocker transaction, which drastically reduces the response time to abort the blocker transaction.

SYSTEM AND METHOD OF PROVIDING SYSTEM AVAILABILITY BY PREVENTING SOFTWARE CRASH DUE TO RECOVERY FAILURE

Granted: August 29, 2024
Application Number: 20240289238
Disclosed is an improved approach to handle recovery failures associated with fatal recovery processes. A software crash is prevented when a program has a failure that would typically crash the software, involving analyzing the failure in an operation, accumulating the failure information, clearing the failure (hence preventing the immediate crash), and not performing the desired operation until the root cause of the failure is fixed.

PATH MANAGEMENT TECHNIQUES FOR NETWORK CONNECTIONS

Granted: August 22, 2024
Application Number: 20240283731
The disclosed systems, methods and computer readable media relate to managing Non-Volatile Memory Express (NVMe) over Transmission Control Protocol (TCP) (NVMeOTCP) connections between a smart network interface card (smartNIC) and a block storage data plane (BSDP) of a cloud computing environment. A software agent (“agent”) executing at the smartNIC may manage a number of network paths (active and, in some cases, passive network paths). The agent may monitor the network traffic…

ROUTING OF WEB REQUESTS TO ON-PREMISE NETWORK IN A MULTI-TENANT ENVIRONMENT

Granted: August 22, 2024
Application Number: 20240283852
When a cloud services provider infrastructure (CSPI) receives a request from an administrator to perform an operation on an appliance, a load balancer may select a first server within the CSPI to process the request. If the first server does not have a connection with the appliance, the first server may generate a redirect response that includes server identification information identifying a particular server having a pre-established connection with the appliance. The first server may…

ROUTING HIGH VOLUME PACKET STREAMS IN A VIRTUAL NETWORK

Granted: August 22, 2024
Application Number: 20240283734
A computing device may receive a first packet addressed to a destination node. The device may check a packet counter to determine if the counter exceeds a threshold, the counter recording a number of packets addressed to the destination node that have been received during a first time period. The device may in response to the packet counter exceeding the threshold: send, by the computing device, a query to an intermediate node; generate, by the device, a query flag in response to sending…

TUNING-FREE UNSUPERVISED ANOMALY DETECTION BASED ON DISTANCE TO NEAREST NORMAL POINT

Granted: August 22, 2024
Application Number: 20240281455
Disclosed is an improved approach to implement anomaly detection, where an ensemble detection mechanism is provided. An improvement is provided for the KNN algorithm where scaling is applied to permit efficient detection of multiple categories of anomalies. Further extensions are used to optimize local anomaly detection.

TECHNIQUES FOR REPLICATION CHECKPOINTING DURING DISASTER RECOVERY

Granted: August 22, 2024
Application Number: 20240281413
Techniques are described for checkpointing multiple key ranges in parallel and concurrently during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, multiple range threads processing multiple key ranges, one thread per key range, create checkpoints for their respective key ranges in parallel and concurrently after processing a per-determined number of B-tree keys. In certain embodiments, upon encountering a failure event,…

DYNAMICALLY CONFIGURABLE MOTHERBOARD

Granted: August 22, 2024
Application Number: 20240281386
According to certain implementations, a motherboard is provided that enables operation as either multiple independent single-processor systems or a single multiple-processor system. In response to a request to configure the motherboard as multiple independent single-processor systems, a control block is implemented for each processor attached to the motherboard, where the control blocks configure the processors to boot and operate independently of each other, and the processors utilize…

Configurable Entity-Based Undo And Redo Operations

Granted: August 22, 2024
Application Number: 20240281336
Techniques for UNDO and REDO operations in a computer-user interface are disclosed. The techniques enables users to configure entities for UNDO and REDO operations. The techniques also enable users to roll back individual entity to an immediate previous state in one UNDO operation and subsequently to the other previous states. Other entities are not affected by the UNDO operations to the entity.

DATA RECOVERY TECHNIQUES USING CLOUD CONSISTENCY GROUPS

Granted: August 15, 2024
Application Number: 20240272834
Techniques discussed herein relate to improved data recovery techniques within cloud computing environments. The disclosed techniques utilize consistency groups that are identified for volumes corresponding to a compute instance. A plurality of resource identifiers uniquely identifying a respective cloud computing resource of the cloud computing environment can be maintained. A cloud computing instance corresponding to a resource identifier may be identified and volume metadata…

ADVANCED PERSISTENT THREAT DETECTION

Granted: August 15, 2024
Application Number: 20240273193
Techniques are described herein for advanced persistent threat detection. An example method can include a device receiving a message identifying an instruction loaded onto an instruction cache of a secure processer. The device can transmit a control instruction to configure a kernel image to collect a metric over a first time interval, the metric being generated based at least in part on the secure processor executing the instruction during the first time interval. The device can receive…

Hierarchal Data Structure Modification

Granted: August 15, 2024
Application Number: 20240273075
Techniques for modifying hierarchal-structured data of one hierarchal data structure based on a modification to another hierarchal data structure are disclosed. A system determines that a modification has been made, or is requested to be made, to a particular hierarchal data structure. The system analyzes a set of rules to determine whether the modification of the hierarchal data structure triggers another modification to an additional hierarchal data structure. The additional hierarchal…

MODELING JAVA SOURCE CODE IN A SYMBOLIC DESCRIPTION LANGUAGE

Granted: August 15, 2024
Application Number: 20240272885
Techniques for modeling Java source code in a symbolic description language are disclosed, including: obtaining a set of Java source code; determining that the set of Java source code includes a user-defined type; determining that the set of Java source code includes a loop; generating, based on the set of Java source code, a symbolic description language (SDL) model including an SDL representation of the user-defined type and an SDL representation of the loop.

TRANSFORMING A JAVA PROGRAM USING A SYMBOLIC DESCRIPTION LANGUAGE MODEL

Granted: August 15, 2024
Application Number: 20240272884
Techniques for transforming Java source code using a symbolic description language are disclosed, including: obtaining a set of Java source code corresponding to a Java program; generating a symbolic description language (SDL) model of the set of Java source code; generating, based on the SDL model, a transformed program including at least one transformation relative to the Java program.

USER INTERFACE AS A SERVICE ARCHITECTURE

Granted: August 15, 2024
Application Number: 20240272880
Large applications may access data from a number of different computing environments. Each of these computing environments may provide user interface (UI) components that are tightly coupled with the backend services providing the data. When an application is loaded in one computing environment, the main UI and local UI components from that environment may be loaded during initialization. Additionally, UI components from other computing environments may be dynamically added to the main…