Oracle Patent Grants

Runtime-tailored security policies for applications

Granted: January 7, 2025
Patent Number: 12189759
Techniques are described herein for function-level limiting of privileges for a target application. Privileges dependencies for different functions of an application are determined based on static evaluation of the code base. A call graph with nodes representing the application functions is established, and the nodes are associated with the determined privilege dependencies. The graph is modified using iterative backward dataflow analysis to associate the nodes in the graph with…

Methods, systems, and computer readable media for identifying roaming messages

Granted: January 7, 2025
Patent Number: 12193108
Methods, systems, and computer readable media for identifying roaming messages at network functions in a home public land mobile network (PLMN). A method includes receiving, at a home security edge protection proxy (SEPP) for the home PLMN, a request message from a consumer network function in a visitor PLMN and adding, at the home SEPP, a header to the request message indicating that the request message originated in the visitor PLMN. The method includes receiving, at a producer network…

Methods, systems, and computer readable media for identifying alternate delivery endpoints for mobile originated data and monitoring reports in a communications network

Granted: January 7, 2025
Patent Number: 12192878
A method for identifying alternate delivery endpoints for mobile originated data and monitoring reports in a communications network includes establishing, by a network exposure function (NEF) in a communications network, priority rules in a priority configuration database that define routing priority indicators corresponding to a plurality of applications functions (AFs) and receiving a service request or notification request message directed to one of the plurality of AFs from a…

Methods, systems, and computer readable media for handling hacker intrusion in profile management at network function (NF) repository function (NRF)

Granted: January 7, 2025
Patent Number: 12192768
A method for handling hacker intrusion in NF profile management at an NRF includes receiving, at the NRF and from a consumer NF, an NF register request message including an NF profile of the consumer NF, setting and storing an NF profile version number for the NF profile, and communicating the NF profile version number to the consumer NF. The consumer NF stores the NF profile version number and transmits a request for initiating an NF update or NF heart-beat service operation to the NRF.…

Methods, systems, and computer readable media for delegated authorization at security edge protection proxy (SEPP)

Granted: January 7, 2025
Patent Number: 12192764
A method for delegated authorization at a security edge protection proxy (SEPP) includes intercepting, from a consumer network function (NF) that does not support access token based authorization, a service based interface (SBI) service request for accessing a service provided by a producer NF that requires access token based authorization. The method further includes operating as an access token authorization client to obtain a first access token on behalf of the consumer NF. The method…

Methods, systems, and computer readable media for sharing key identification and public certificate data for access token verification

Granted: January 7, 2025
Patent Number: 12192351
A method for sharing key identification (key ID) and public certificate data for access token verification comprises, at a network function (NF) repository function (NRF) including at least one processor, receiving, from a producer NF, an NF registration message including key ID version information. In response to detecting the key ID version information, sending, to the producer NF, an NF registration response message including a current key ID version value, at least one digital…

Chatbot for defining a machine learning (ML) solution

Granted: January 7, 2025
Patent Number: 12190254
The present disclosure relates to systems and methods for an intelligent assistant (e.g., a chatbot) that can be used to enable a user to generate a machine learning system. Techniques can be used to automatically generate a machine learning system to assist a user. In some cases, the user may not be a software developer and may have little or no experience in either machine learning techniques or software programming. In some embodiments, a user can interact with an intelligent…

Cooperative garbage collection barrier elision

Granted: January 7, 2025
Patent Number: 12190112
Techniques are disclosed for eliding load and store barriers while maintaining garbage collection invariants. Embodiments described herein include techniques for identifying an instruction, such as a safepoint poll, that checks whether to pause a thread between execution of a dominant and dominated access to the same data field. If a poll instruction is identified between the two data accesses, then a pointer for the data field may be recorded in an entry associated with the poll…

Providing operations in accordance with worksheet relationships and data object relationships

Granted: January 7, 2025
Patent Number: 12190053
A client-side spreadsheet with client-side worksheets is constructed. The constructing includes structuring worksheet relationships between the client-side worksheets of the client-side spreadsheet in accordance with data object relationships of data objects of a server-side data structure. A determination is made that an operation has been selected for performing on data of at least one of the client-side worksheets. User input operative to initiate performance of the at least one of…

Just-in-time data object permission restriction and action implementation

Granted: January 7, 2025
Patent Number: 12189796
An instruction is received to define or modify a permission constraint corresponding to one or more file. A period of time is determined, where the period is one during which the defined or modified permission constraint is to apply to the one or more files. It is determined that the one or more files are to be deleted following completion of the period of time. A permission-instruction data set representing the permission constraint and a flag indicating that the one or more files are…

Signal synthesizer data pump system

Granted: January 7, 2025
Patent Number: 12189715
The disclosed system produces synthetic signals for testing machine-learning systems. During operation, the system generates a set of N composite sinusoidal signals, wherein each of the N composite sinusoidal signals is a combination of multiple constituent sinusoidal signals with different periodicities. Next, the system adds time-varying random noise values to each of the N composite sinusoidal signals, wherein a standard deviation of the time-varying random noise values varies over…

Hybrid approach for generating recommendations

Granted: January 7, 2025
Patent Number: 12189706
A processor may receive a request for a query item may include a plurality of identifying markers, relating to data associated with the query item. A machine learning model, trained to identify similar items according to the plurality of identifying markers, may then process the plurality of identifying markers and provide a list of one or more similar items and respective similarity distances. The processor may access a respective entity profile including one or more scenario scores for…

Conversion and migration of key-value store to relational model

Granted: January 7, 2025
Patent Number: 12189665
Systems, methods, and other embodiments associated with migrating key-value data to a relational database. A method comprises retrieving a namespace from a key-value store and querying the key-value store for a kind category associated with the namespace. The key-value store is accessed and data entities are retrieved that are associated with the kind category that is defined with the namespace identifier. Property names and associated property values are identified in the data entities.…

Pattern-recognition enabled autonomous configuration optimization for data centers

Granted: December 31, 2024
Patent Number: 12181998
A model-based approach to determining an optimal configuration for a data center may use an environmental chamber to characterize the performance of various data center configurations at different combinations of temperature and altitude. Telemetry data may be recorded from different configurations as they execute a stress workload at each temperature/altitude combination, and the telemetry data may be used to train a corresponding library of models. When a new data center is being…

Fragmentation assessment for storage correction

Granted: December 31, 2024
Patent Number: 12182426
A degree of fragmentation is determined based on a number of holes present in a storage system layout or a portion of a layout. Edges between the holes and used portions of the storage system are tabulated by scanning a storage space. The occurrences of a pattern of used/available allocation units and/or the occurrences of another pattern available/used allocation units are recognized. A fragmentation value is calculated based on occurrences of the patterns in view of the total storage…

Just-in-time data object permission restriction

Granted: December 31, 2024
Patent Number: 12182278
Using a computer system, an instruction is received to define or modify a permission constraint corresponding to one or more files. A permission-instruction data set representing the permission constraint is stored in a data store. Subsequent to storing the permission-instruction data, a user request to access a particular file is intercepted. The data store is queried to determine whether any pending permission-instruction data set corresponds to the particular file. In response to the…

Dynamic performance tuning based on implied data characteristics

Granted: December 31, 2024
Patent Number: 12182123
Techniques for improving system performance based on data characteristics are disclosed. A system may receive updates to a first data set at a first frequency. The system selects a first storage configuration, from a plurality of storage configurations, for storing the first data set based on the first frequency, and stores the first data set in accordance with the first storage configuration. The system may further receive updates to a second data set at a second frequency. The system…

One-hot encoder using lazy evaluation of relational statements

Granted: December 31, 2024
Patent Number: 12182122
A method and one or more non-transitory storage media are provided to train and implement a one-hot encoder. During a training phase, computation of an encoder state is performed by executing a set of relational statements to extract unique categories in a first training data set, associate each unique category with a unique index, and generate a one-hot encoding for each unique category. The set of relational statements are executed by a query optimization engine. Execution of the set…

User-specified chains and row versions in a blockchain table

Granted: December 31, 2024
Patent Number: 12182100
A blockchain object stores multiple user blockchains, each blockchain comprising an ordered set of records in the blockchain object. The records of a user blockchain have the same blockchain key value. Users can create multiple blockchains by establishing respective blockchain key values for the blockchains. Like blocks in a blockchain, the records in a user blockchain are ordered by a sequence of numbers that is specific to the user blockchain; each user blockchain has its own sequence…

Partitioning mechanism for parallel processing in delta generation

Granted: December 31, 2024
Patent Number: 12182078
Techniques are described for partitioning B-tree keys of file systems into key ranges for parallel processing in delta generation during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, a delta generation processing for cross-region replication may utilize a key-range splitting mechanism involving a recursive algorithm that partitions B-tree keys of a source file system into roughly equal-size key ranges. All the…