TRAINING DATA COLLECTION AND EVALUATION FOR FINE-TUNING A MACHINE-LEARNING MODEL FOR AUTOMATIC SOAP NOTE GENERATION
Granted: April 10, 2025
Application Number:
20250118398
Techniques are disclosed for automatically generating Subjective, Objective, Assessment and Plan (SOAP) notes. Particularly, techniques are disclosed for training data collection and evaluation for automatic SOAP note generation. Training data is accessed, and evaluation process is performed on the training data to result in evaluated training data. A fine-tuned machine-learning model is generated using the evaluated training data. The fine-tuned machine-learning model can be used to…
SYSTEM AND TECHNIQUES FOR HANDLING LONG TEXT FOR PRE-TRAINED LANGUAGE MODELS
Granted: April 10, 2025
Application Number:
20250117585
In some aspects, a computing device may receive, at a data processing system, a set of utterances for training or inferencing with a named entity recognizer to assign a label to each token piece from the set of utterances. The computing device may determine a length of each utterance in the set and when the length of the utterance exceeds a pre-determined threshold of token pieces: dividing the utterance into a plurality of overlapping chunks of token pieces; assigning a label together…
System And Method For Recording User Actions And Resubmitting User Actions For A Graphical User Interface
Granted: April 10, 2025
Application Number:
20250117230
Techniques for recording submissions of a user actions in relation to interface elements of a GUI for replay are disclosed. Data arguments generated in response to the user actions required for executing a command associated with the user actions are recorded. A system monitors execution of an application. The system detects a command or action that corresponds to submission of a user action in relation to target interface elements displayed by a GUI. When the system detects the command,…
ONBOARDING OF CUSTOMERS FROM SINGLE TENANT TO MULTI-TENANT CLOUD-NATIVE INTEGRATION SERVER
Granted: April 10, 2025
Application Number:
20250117208
Techniques are disclosed herein for onboarding users from a single tenant cloud environment to a multi-tenant cloud environment. In one aspect, a method is provided that includes in response to an eligibility status check indicating that a first cloud service instance running a first version of a cloud service in a first cloud environment is eligible for the upgrade, exporting a copy of data from the first cloud service instance to a common storage device, provisioning a second cloud…
NETWORK ENCRYPTION BASED ON TRAFFIC BETWEEN SOURCE AND DESTINATION
Granted: April 3, 2025
Application Number:
20250112898
The present disclosure relates to intelligent network encryption of traffic between a source and a destination. In an example, a network element receives, during a session between the source and the destination, first traffic exchanged between the source and the destination. The network element determines whether a traffic exchange between the source and the destination is expected to be secured by at least one of the source or the destination at any of a network layer, a transport…
INTEGRATED TRANSITION CONTROL CENTER
Granted: April 3, 2025
Application Number:
20250110933
Systems, methods, and machine-readable media to migrate data from source databases to target databases are disclosed. Data may be received, relating to the source databases and the target databases. For each source database, a migration assessment may be generated based on analyzing the data, and a migration method may be selected. A migration plan that specifies a parallel migration of a set of databases to the target databases may be created, with a first migration method to migrate a…
BINARY DETECTION IN SOFTWARE
Granted: April 3, 2025
Application Number:
20250110854
A method includes disassembling a reference binary of a library to generate a control flow graph of the referenced binary, normalizing the control flow graph to generate a normalized graph, traversing the normalized graph to generate execution traces from the normalized graph, and generating library vector embeddings. Generating library vector embeddings includes, for each execution trace of at least a subset of the execution traces, processing the execution trace by a vector embedding…
Defining And Using Reusable Modules To Generate Form Control Code
Granted: April 3, 2025
Application Number:
20250110713
Techniques for defining and using reusable modules to generate form control code are disclosed, including: displaying a form control implementation interface for applying form control functions to forms; receiving via the form control implementation interface: a first user input selecting a form control function of the form control functions; a second user input selecting one or more input parameters, for the form control function, that are to be extracted from the target form; a third…
Perspective-Preserving Seamless Application Switching
Granted: April 3, 2025
Application Number:
20250109960
Techniques for perspective-preserving seamless application switching are disclosed. A system may display a first interface using a first application. The first interface includes interface elements representing a plurality of objects. The system may detect a zoom-in command, received by the first application, requesting a particular zoom level for a first interface element, corresponding to a first object in the first plurality of objects. The system may determine that the requested zoom…
Platform-Agnostic Compute Instance Launches
Granted: March 27, 2025
Application Number:
20250106275
A technique may include receiving, by a management service a plurality of instance configurations from a client device. The technique may then include receiving, by the management service, information identifying a launch request for a compute instance. The technique may include determining, by the management service, one or more candidate shapes for the compute instance based at least in part on the plurality of instance configurations. The technique may include selecting, by the…
TECHNIQUES FOR ESTABLISHING TRUST IN A CLUSTER OF EDGE DEVICES
Granted: March 27, 2025
Application Number:
20250106006
Techniques are disclosed to establish trust in a cluster of edge devices. An edge device cloud service can associate a first cloud-computing edge device with a fleet of cloud-computing edge devices and provision the first cloud-computing edge device with a master encryption key. The edge device cloud service can associate a second cloud-computing edge device with the fleet and provision the second cloud-computing edge device with the master encryption key and the first public encryption…
Error Prediction Using Database Validation Rules and Machine Learning
Granted: March 27, 2025
Application Number:
20250103584
Embodiments predict errors using database validation rules. Validation rules can be defined that include business logic for validating transactions performed on a database with a data model. Transactions can be performed using the database, where the database is in a post-transaction state after performance of the transactions. The database can be validated in the post-transaction state by performing the defined business logic for a subset of validation rules, where at least one…
Incremental Stack Walking
Granted: March 27, 2025
Application Number:
20250103467
Techniques for incremental stack walking are disclosed, including: performing a stack walk of a runtime stack, at least by traversing the runtime stack from a current frame to a root frame, to obtain a set of stack walking results; storing a cache of the set of stack walking results; and installing, on the runtime stack, a marker frame that marks a boundary of stack frames represented by the set of stack walking results.
Script-Based Runtime Assembly Of Object Graphs Using Native Instructions Compiled By An Ahead-Of-Time Compiler
Granted: March 27, 2025
Application Number:
20250103309
Techniques for script-based runtime assembly of object graphs using native instructions compiled by an ahead-of-time compiler are disclosed, including: generating, based on a data structure that defines a business process, a script including instructions for assembling an object graph that represents relationships between objects used by the business process; obtaining, at runtime by a business process execution engine compiled to native instructions by an ahead-of-time compiler, the…
FIELD EXTRACTION OF HETEROGENEOUS LOG RECORDS WITH RECURSIVE SUB PARSING AT INGEST TIME
Granted: March 27, 2025
Application Number:
20250103307
A system and computer-implemented method for a log analytics system that can configure, collect, parse, and analyze log records in an efficient manner. Log records are accessed, each of the log records is associated with a log source. A base parser is identified for parsing a log record based on a type of the log record indicated in the log source. The log record is parsed using the base parser to extract base field values corresponding to base fields. A base-parsed log record is…
Metadata-Driven Rapid Adapter Building
Granted: March 20, 2025
Application Number:
20250094246
Techniques for metadata-driven rapid adapter building (RAB) are disclosed, including: receiving, by an RAB framework, a function call from a third-party application; obtaining, by the RAB framework, a metadata document that defines an adapter between a server-side runtime and the third-party application; determining that the metadata document includes one or more metadata fields that map the function call to one or more software development kit (SDK) functions exposed by the server-side…
Cross-Cluster Transaction Risk Assessment
Granted: March 20, 2025
Application Number:
20250094989
Techniques for providing cross-cluster transaction risk assessment are disclosed herein. In one embodiment, the system: obtains customer transaction data including a number of transaction details; clusters the customer transaction data into clusters of transactions; calculates a centroid for each cluster of transactions, corresponding to a mean value within the corresponding cluster; determines, for each transaction, a relationship score indicating the distance of the transaction from…
Virtual Card Transactions
Granted: March 20, 2025
Application Number:
20250094963
Techniques for managing secure virtual card number (VCN) transactions are disclosed. A POS terminal that processes payments receives an instruction in a secure digital communication over a network to process a payment from a customer to a supplier. Based on receiving a payment request via a network, the POS terminal identifies a VCN associated with the request. The POS terminal validates the VCN and processes the payment request. The POS terminal communicates the VCN to the supplier's…
TIME-BOUND HYPERPARAMETER TUNING
Granted: March 20, 2025
Application Number:
20250094861
Techniques for time-bound hyperparameter tuning are disclosed. The techniques enable the determination of optimized hyperparameters for a machine learning (ML) model given a specified time bound using a three-stage approach. A series of trials are executed, during each of which the ML model is trained using a distinct set of hyperparameters. In the first stage, a small number of trials are executed to initialize the algorithm. In the second and third stages, a certain number of trials…
MULTI-TASK FINE-TUNING FOR PLANNING PERFORMED BY LARGE LANGUAGE MODEL
Granted: March 20, 2025
Application Number:
20250094821
Techniques are disclosed for fine-tuning a pre-trained machine learning model to be used by a digital assistant for supporting a user's interactions. In one aspect, a method includes accessing a set of training examples, generating a set of synthesized training examples using an iterative process including accessing a dialog script and corresponding prompt template and response template for a predefined scenario, generating one or more prompts based on the dialog script and corresponding…