Compute Targets For Data Science Workload Execution And Identity And Access Management Integration
Granted: March 20, 2025
Application Number:
20250094238
A system receives a configuration request comprising an infrastructure definition that defines a set of resources, to be selected from a set of tenant-managed resources implemented on a tenant's premises, for implementing the compute target entity. The system generates a compute target entity associated with an addressable identifier. The compute target entity corresponds to the set of resources selected from the set of tenant-managed resources. The system receives an execution request…
INTELLIGENT CONTROL OF PAIRED APPLICATIONS
Granted: March 20, 2025
Application Number:
20250097292
Techniques are disclosed for assisting healthcare providers with common clinical tasks by way of a clinical software application that can be installed on and utilized from various client computing devices. The clinical software application(s) can enable a healthcare provider to record conversations with patients, dictate in natural language, generate patient notes, populate patient records, schedule tasks and generate task notifications, and perform numerous other clinical functions.…
RESOURCE ALLOCATION FOR ACCESSING CLOUD BASED SERVICES
Granted: March 20, 2025
Application Number:
20250097163
The present disclosure relates to resource allocation among a plurality of clients, for using a cloud-based service, e.g., a generative artificial intelligence (GenAI) service. A first target amount of resource and a second target amount of resource can be allocated to a first client and a second client (respectively). A first and a second client, a first target amount of resource can be allocated to a first client, and a second target amount of resource can be allocated to a second…
INTELLIGENT TASK SCHEDULING AND NOTIFICATION-INITIATED DIGITAL ASSISTANT CONVERSATIONS
Granted: March 20, 2025
Application Number:
20250095834
Techniques are disclosed for assisting healthcare providers with common clinical tasks by way of a clinical software application that can be installed on and utilized from various client computing devices. The clinical software application(s) can enable a healthcare provider to record conversations with patients, dictate in natural language, generate patient notes, populate patient records, and perform numerous other clinical functions. Task entries to schedule such tasks may be…
AUTOMATIC PROMPT ENGINEERING USING A LARGE LANGUAGE MODEL
Granted: March 20, 2025
Application Number:
20250095807
Techniques are disclosed for automatically generating prompts. A method comprises accessing first prompts, wherein each of the first prompts is a prompt for generating a portion of a SOAP note using a machine-learning model. For each respective first prompt of the first prompts: (i) using the respective first prompt to obtain a first result from a first machine-learning model, (ii) using the respective first prompt and the first result to obtain a second result from a second…
DIGITAL ASSISTANT USING GENERATIVE ARTIFICIAL INTELLIGENCE
Granted: March 20, 2025
Application Number:
20250094725
Techniques are disclosed herein for implementing digital assistants using generative artificial intelligence. An input prompt comprising a natural language utterance and candidate agents and associated actions can be constructed. An execution plan can be generated using a first generative artificial model based on the input prompt. The execution plan can be executed to perform actions included in the execution plan using agents indicated by the execution plan. A response to the natural…
PACKET LEVEL DATA CENTRIC PROTECTION ENFORCEMENT
Granted: March 20, 2025
Application Number:
20250094575
Techniques are described for performing packet level data centric protection enforcement. Instead of being restricted to perimeter-based security and defining and creating rules that are difficult to maintain, techniques described herein allow users to create data-centric, intent-based policies that are enforced at different enforcement points within one or more networks. In some examples, a method comprises receiving a packet at an enforcement point (EP) within one or more networks that…
Generating Enhanced Queries Using Machine Learning Models
Granted: March 20, 2025
Application Number:
20250094504
Techniques for generating terms to replace an initial set of search terms for a query are disclosed. A system generates a training data set for training a machine learning model. Generating the training data set includes generating search value vectors for each of a set of labels based on sets of search values associated respectively with the labels in the set of labels. The system trains a machine learning model to predict a target label for a target search vector based on the set of…
DOCUMENT PROCESSING AND RETRIEVAL FOR KNOWLEDGE-BASED QUESTION ANSWERING
Granted: March 20, 2025
Application Number:
20250094480
Techniques are disclosed herein for generating and using a knowledge base of information extracted from documents. The techniques include accessing a document comprising text and dividing the document into a plurality of chunks of text. The chunks are indexed by storing each chunk mapped to respective identifying metadata including a chunk index for each chunk. A query is received and a chunk relevant to the query is identified. A prompt is formulated including the query, the identified…
KNOWLEDGE RE-RANKING TECHNIQUES
Granted: March 20, 2025
Application Number:
20250094464
Techniques are disclosed herein for selecting document chunks that are most relevant to a query. The techniques include receiving a query and comparing a plurality of stored text passages to the query using a first similarity metric. Based on the comparison, a subset of the plurality of stored text passages that are most similar to the query are selected. A plurality of sentences from the subset of the plurality of stored text passages are identified. The identified sentences are ranked…
FRAMEWORK FOR TOKEN EXCHANGE BETWEEN DIFFERENT CLOUD ENVIRONMENTS
Granted: March 13, 2025
Application Number:
20250086000
Described herein is a token exchange framework between two different cloud services providers. A multi-cloud infrastructure included in a first cloud environment that is provided by a first cloud services provider (CSP) receives a first request from a user associated with an account in a second cloud environment that is provided by a second CSP. The first request corresponds to using of a service provided by the first cloud environment and includes a first token issued by the second CSP.…
TAINTS AND FADING TAINTS
Granted: March 13, 2025
Application Number:
20250088544
Techniques are described for using taints and assertions to protect data within one or more networks. Instead of being restricted to perimeter-based security and defining and creating rules that are difficult to maintain, techniques described herein allow users to protect data using assertions that are enforced at different enforcement points within one or more networks. According to some configurations, the assertions/policy statements defined by a user specify where data is allowed to…
Distributing Certificate Bundles According To Distribution Schedules
Granted: March 13, 2025
Application Number:
20250088499
Operations of a certificate bundle distribution service may include: detecting a trigger condition to distribute a certificate bundle that includes a set of one or more certificate authority certificates; partitioning each particular network entity of a plurality of network entities associated with a computer network into one of a plurality of certificate distribution groups based on a network address of the particular network entity, in which each particular certificate distribution…
NETWORK CONNECTIVITY AND REACHABILITY MONITORING IN A CLOUD ENVIRONMENT
Granted: March 13, 2025
Application Number:
20250088423
The present disclosure relates to network connectivity and reachability monitoring in cloud environments. In an example, a computer receives, from a device of a customer, input indicating a destination that belongs to a virtual cloud network and a set of vantage points for testing the destination. Based on the input, a first source is deployed to a first network location associated with a first vantage point and a second source is deployed to a second network location associated with a…
Certificate Revocation List Management Services
Granted: March 13, 2025
Application Number:
20250088374
Operations may include receiving, from a first network entity, a first request for a first certificate revocation list (CRL) that identifies a first CRL distribution point (CDP) corresponding to the first CRL; mapping the first CDP to a first CRL identifier of a set of available CRL identifiers; locating, in a CRL repository, a first CRL based on the first CRL identifier; and transmitting the first CRL to the first network entity.
Validating Certificate Bundles With Asymmetric Keys
Granted: March 13, 2025
Application Number:
20250088373
Operations of a certificate bundle validation service may include receiving a first certificate bundle that includes a first set of one or more digital certificates, and a digital signature, associated with the first certificate bundle; determining, using a public key of an asymmetric key pair associated with a second set of one or more digital certificates, that the digital signature is generated using a private key of the asymmetric key pair; and responsive to determining that the…
TOKEN EXCHANGE SERVICE FOR CUSTOMER WORKLOADS
Granted: March 13, 2025
Application Number:
20250088360
Described herein is a token exchange framework between two different cloud services providers. A multi-cloud infrastructure included in a first cloud environment that is provided by a first cloud services provider (CSP) receives a first request from a user associated with an account in a second cloud environment that is provided by a second CSP. The first request corresponds to using of a service provided by the first cloud environment and includes a first token issued by the second CSP.…
Large Language Machine Learning Model Query Management
Granted: March 13, 2025
Application Number:
20250086235
Techniques for filtering queries to a large language model (LLM) based on their relevance to an enterprise domain associated with the LLM involve training a machine learning model using historical LLM query data and associated relevance scores. These scores indicate how closely a query relates to the enterprise's operations. The trained model is then applied to new input queries, generating relevance scores for the input queries. Queries meeting a predetermined relevance threshold are…
AUTO RECOGNITION OF BIG DATA COMPUTATION ENGINE FOR OPTIMIZED QUERY RUNS ON CLOUD PLATFORMS
Granted: March 13, 2025
Application Number:
20250086153
A method may include receiving a request for a big data query including characteristics and user parameters and accessing a set of rules based at least in part on respective properties of one or more big data query engines, the set of rules correlating the one or more characteristics, the one or more user parameters and the respective properties. The method may include determining a candidate list including a subset of the big data query engines, determined based on the set of rules.…
TOKEN EXCHANGE SERVICE
Granted: March 13, 2025
Application Number:
20250086001
Described herein is a token exchange framework between two different cloud services providers. A multi-cloud infrastructure included in a first cloud environment that is provided by a first cloud services provider (CSP) receives a first request from a user associated with an account in a second cloud environment that is provided by a second CSP. The first request corresponds to using of a service provided by the first cloud environment and includes a first token issued by the second CSP.…