Oracle Patent Applications

CONTROLLING PLACEMENT OF RESOURCES WITHIN A CLOUD INFRASTRUCTURE OF A FIRST CLOUD SERVICE PROVIDER FOR A CLOUD SERVICE OFFERED BY A SECOND CLOUD SERVICE PROVIDER

Granted: February 27, 2025
Application Number: 20250068482
Techniques are disclosed for dynamically managing access to cross-cloud services. Provided are access control mechanisms for controlling and/or managing access to cross-cloud services offered by and between one or more cloud service providers. The techniques include detecting that a request for a cloud service has been received by a first component of a first cloud environment of a first cloud service provider and receiving an indication that deployment of the cloud service is permitted.…

PROVIDING SERVICES BASED ON INFRASTRUCTURE DISTRIBUTED BETWEEN MULTIPLE CLOUD SERVICE PROVIDERS

Granted: February 27, 2025
Application Number: 20250071171
Techniques are disclosed for providing services based on infrastructure distributed between multiple cloud service providers. Low-latency high-bandwidth cross-cloud services can be provisioned and managed by and between private clouds of cloud service providers. The techniques include forming a cloud network between a first set of compute resources of a first infrastructure of a first cloud environment and a second set of compute resources of a second infrastructure of a second cloud…

Multi-Tenant File-Level Encryption for Index Based Database

Granted: February 27, 2025
Application Number: 20250070970
Operations include: receiving a first request for a first dataset of a plurality of datasets stored in a particular database instance; obtaining an encrypted version of the first dataset; obtaining an encrypted version of the first DEK; requesting decryption of the encrypted version of the first DEK; receiving a decrypted version of the first DEK; applying the first DEK to the encrypted version of the first dataset to obtain a decrypted version of the first dataset; and transmitting the…

AUTOMATED SEGMENTATION AND TRANSCRIPTION OF UNLABELED AUDIO SPEECH CORPUS

Granted: February 27, 2025
Application Number: 20250069600
A method includes obtaining initial transcription for input natural speech; performing segmentation of initial transcription into text portions, based on punctuation marks in initial transcription; determining segment-level timestamps for text portions based on the input natural speech; performing audio segmentation on input natural speech, by cutting input natural speech based on segment-level timestamps, to obtain audio chunks; generating transcription portions for each of the audio…

FAST AND SCALABLE MULTI-TENANT SERVE POOL FOR CHATBOTS

Granted: February 27, 2025
Application Number: 20250068980
Techniques are disclosed for providing a scalable multi-tenant serve pool for chatbot systems. A query serving system (QSS) receives a request to serve a query for a skillbot. The QSS includes: (i) a plurality of deployments in a serving pool, and (ii) a plurality of deployments in a free pool. The QSS determines whether a first deployment from the plurality of deployments in the serving pool can serve the query based on an identifier of the skillbot. In response to determining that the…

System And Method For Query Resource Caching

Granted: February 27, 2025
Application Number: 20250068631
Operations include determining whether to cache resources accessed by a query based on the execution time of the query. The system identifies a set of executions of a same query. The system determines a cumulative execution time for the set of executions of the same query. If the cumulative execution time exceeds a threshold value, then the system caches a resource used for execution of the query.

TECHNIQUES FOR TRANSFORMING NATURAL LANGUAGE CONVERSATION INTO A VISUALIZATION REPRESENTATION

Granted: February 27, 2025
Application Number: 20250068627
Techniques are disclosed herein for transforming natural language conversations into a visual output. In one aspect, a computer-implement method includes generating an input string by concatenating a natural language utterance with a schema representation comprising a set of entities for visualization actions, generating, by a first encoder of a machine learning model, one or more embeddings of the input string, encoding, by a second encoder of the machine learning model, relations…

PARTITIONING MECHANISM FOR PARALLEL PROCESSING IN DELTA GENERATION

Granted: February 27, 2025
Application Number: 20250068601
Techniques are described for partitioning B-tree keys of file systems into key ranges for parallel processing in delta generation during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, a delta generation processing for cross-region replication may utilize a key-range splitting mechanism involving a recursive algorithm that partitions B-tree keys of a source file system into roughly equal-size key ranges. All the…

CONSISTENT FILE SYSTEM SEMANTICS WITH CLOUD OBJECT STORAGE

Granted: February 27, 2025
Application Number: 20250068593
Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner…

PROVISIONING A CLOUD SERVICE OF A FIRST CLOUD SERVICE PROVIDER USING A CONTROL PLANE OF A SECOND CLOUD SERVICE PROVIDER

Granted: February 27, 2025
Application Number: 20250068483
Techniques are disclosed for provisioning a cloud service of a first cloud service provider using a control plane of a second cloud service provider. The techniques include detecting that a request for a cloud service provided by the first cloud service provider has been received from the second cloud environment of a second cloud service provider different from the first cloud service provider. The techniques further include, after detecting that the request for the cloud service has…

PROVISIONING AND MANAGING RESOURCES WITHIN A CLOUD INFRASTRUCTURE OF A FIRST CLOUD SERVICE PROVIDER FOR CLOUD SERVICES OFFERED BY A SECOND CLOUD SERVICE PROVIDER

Granted: February 27, 2025
Application Number: 20250068471
Techniques are disclosed for provisioning and managing resources within a cloud infrastructure of a first cloud service provider for cloud services offered by a second cloud service provider. Cross-cloud services can be provisioned and managed by and between private clouds of cloud service providers. The techniques include receiving a request for a cloud service by a component of a first private cloud within a first cloud environment and from a component of a second private cloud within…

TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING

Granted: February 20, 2025
Application Number: 20250062614
Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. A current value for an aggregate power threshold of a plurality of hosts may be identified. During a first time period, an aggregate power consumption of the plurality of hosts may be managed using the current value for the aggregate power threshold. A triggering event indicating a modification to the aggregate power threshold is needed may be detected. A new value for the aggregate power…

Bridging End User Customer Support and Cloud Operator Customer Support

Granted: February 20, 2025
Application Number: 20250061464
Techniques for escalating a service ticket between two service providers include receiving an initial service ticket at an initial service provider for resolution of an issue from an affected entity that is affected by the issue. The initial service ticket comprises an access-restricted set of attributes of the affected entity. Based on the initial service ticket, the system generates an escalated service ticket at the initial service provider. The escalated service ticket identifies the…

CODE VULNERABILITY DETECTION AND VALIDATION

Granted: February 20, 2025
Application Number: 20250061207
A method of code vulnerability detection includes obtaining a set of patches from at least one code repository for a vulnerability record of a vulnerability of a software component, applying the set of patches to obtain a modified set of code files modified by the set of patches, and inferring a vulnerable code section set according to the modified set of code files. The vulnerable code section set is a subset of the modified set of code files. The method further includes obtaining a…

Automatic Unit Test Generation Based On Execution Traces

Granted: February 20, 2025
Application Number: 20250061046
Techniques for automatically generating unit tests based on execution traces are disclosed. Trace data is traversed to identify a previously executed and traced target method, e.g., an initial version of the target method, and corresponding first set of input values and first return value used to invoke the initial version of the target method. Using the trace data, generating a test code for testing an updated version of the target method. Executing the test code includes invoking the…

Optimum Lap Derivation Via Track Segmentation And Prior Racing Measurements

Granted: February 20, 2025
Application Number: 20250060220
Techniques for deriving an optimal traversal path on a racetrack are disclosed. The system partitions a track into straight and curved segments. The system identifies optimal traversals through each segment from historical traversal data. The system stitches the optimal traversals together and smooths the optimal traversals at the transition points between track segments. The system verifies that the smoothed traversals meet one or more kinematic criteria before outputting the optimal…

Authenticating Certificate Bundles With Asymmetric Keys

Granted: February 13, 2025
Application Number: 20250055710
Operations of a digital signature manager may include detecting, in a certificate repository on a first virtual cloud network, set of one or more new certificate authority (CA) certificates; transmitting, to a key management service hosted on a second virtual cloud network, a CA dataset that includes the set of one or more new CA certificates; receiving, from the key management service, a digital signature of the CA dataset generated based at least on a global private key stored on the…

Application Programming Interface For Building And Transforming Symbolic Description Language Representations Of Source Code

Granted: February 6, 2025
Application Number: 20250045033
Techniques for building and transforming SDL representations of source code are disclosed, including: receiving, by an application programming interface (API), an API call including a symbolic description language (SDL) representation of a set of source code; determining, by the API based at least on the first API call, one or more transformations to perform on the SDL representation of the set of source code; generating, by the API, a transformed SDL representation at least by…

INSTRUMENTATION OF SOFT NAVIGATION ELEMENTS OF WEB PAGE APPLICATIONS

Granted: February 6, 2025
Application Number: 20250045340
Disclosed techniques relate to instrumenting applications. In an example, a method involves providing a web page application with a tracer application. The method further involves accessing a source of the web page application. The method further involves detecting a reference to an element of the web page application in the source. The method further involves detecting the user interaction with the web page application. The method further involves automatically logging a start of a span…

INSTRUMENTATION OF WEB BASED APPLICATIONS AFFECTED BY USER INACTIVITY

Granted: February 6, 2025
Application Number: 20250045186
Disclosed techniques relate to instrumenting applications. In an example, a method instantiates a tracer application based on a start of the web page application. The method automatically logs a start of a first span and executes first operations associated with the first span. The method automatically logs an end of the first span based upon a completion of the first operations. The method automatically logs a start of a second span based on an event initiated by an interaction with the…