TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

    公开(公告)号:US20250159021A1

    公开(公告)日:2025-05-15

    申请号:US19019442

    申请日:2025-01-13

    Abstract: A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor. The device generates a TEE signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the TEE signature to a second TLS endpoint within a TLS handshake message exchange between the first TLS endpoint and the second TLS endpoint.

    Framework For Configurable Per-Service Security Settings In A Forward Proxy

    公开(公告)号:US20250158966A1

    公开(公告)日:2025-05-15

    申请号:US18954756

    申请日:2024-11-21

    Abstract: Examples of the present disclosure describe systems and methods for configuring and executing per-service TLS settings in a forward proxy. In examples, a proxy device receives a connection request from a client device to access a service. The proxy device identifies service connection information included in the connection request and selects a connection scheme for connecting to the service. The service connection information is compared to a static mapping of connection data in the connection scheme. If the service connection information matches the static mapping of connection data, a TLS type is determined for the connection request. If the service connection information does not match the static mapping of connection information, the service connection information is compared to a dynamic mapping of session information. Based on the comparison of the service connection information to the dynamic mapping of session information, a TLS type is determined for the connection request.

    CYBERATTACK COUNTERMEASURE CIRCUITS AND METHODS

    公开(公告)号:US20250156534A1

    公开(公告)日:2025-05-15

    申请号:US18505865

    申请日:2023-11-09

    Abstract: Embodiments of the present disclosure include countermeasure circuit techniques for cyberattacks. In one embodiment, portions of combinational logic receive shared input bit groups and produce shared output bit groups. Shared output bit groups may be coupled between series configured combinational logic portions using control gates. Clock signals are delayed to activate the control gates after the outputs are stable. In some embodiments, a first combinational logic group and second combinational logic group operate on a clock and inverse clock.

    GHOSTING FOR MULTIMODAL DIALOGS
    14.
    发明申请

    公开(公告)号:US20250156481A1

    公开(公告)日:2025-05-15

    申请号:US18509617

    申请日:2023-11-15

    Abstract: Systems and methods for generating autocomplete text using a language model are disclosed. An image and text-prefix may be entered at an input field of a search application. The image is processed to generate an image description. The image description and the text-prefix signals may be used as input at a language model to generate an autocomplete text by the language model. A contextual history may also be included as input to the language model. The autocomplete text is an output by the language model based on the input at the language model. The auto-complete text may be a next-word ghosting.

    RECOMMENDATION GENERATION USING USER INPUT

    公开(公告)号:US20250156463A1

    公开(公告)日:2025-05-15

    申请号:US18506039

    申请日:2023-11-09

    Abstract: Methods, systems, and apparatuses include receiving text input via a user interface for an online system. An embedding is generated based on the text input. Supplemental text is generated using the embedding and a vector store including a standardized content items, the supplemental text having a standardized format. The standardized content items are generated by applying a large language model to a plurality of content items. A prompt is formulated including the supplemental text. A generative language model is applied to the prompt. A recommendation is output by the generative language model based on the prompt. The recommendation is provided to the user interface based on at least the text input.

    CONTEXT-BASED PROMPT GENERATION FOR AUTOMATED TRANSLATIONS BETWEEN NATURAL LANGUAGE AND QUERY LANGUAGE

    公开(公告)号:US20250156413A1

    公开(公告)日:2025-05-15

    申请号:US18508630

    申请日:2023-11-14

    Abstract: A disclosed method facilitates translation of natural language queries into query language statements usable to retrieve data from or write data to a particular database. The method includes obtaining a pool of shots. Each shot in the pool includes a natural language query component and a corresponding database translation component. The method further provides for vectorizing the natural language query component for each of the shots into a common vector space; receiving a natural language query from a user interface; vectorizing the natural language query within the common vector space; identifying a subset of vectorized natural language query components that satisfy a similarity metric when compared to the vectorized natural language query; and generating an LLM prompt that includes shots from the pool corresponding to the subset of the vectorized natural language query.

    SINGLE-PHASE COMMIT FOR REPLICATED CACHE DATA

    公开(公告)号:US20250156322A1

    公开(公告)日:2025-05-15

    申请号:US18587258

    申请日:2024-02-26

    Abstract: A computer system and method are disclosed for replicating logs in a distributed environment. The method includes identifying a write input/output (I/O) operation and identifying a log to be replicated based on the write I/O operation. The log is then persisted to local non-volatile memory in the computer system. Subsequently, the log is replicated to multiple remote hosts, where each remote host of the plurality of remote hosts stores the log in its corresponding local non-volatile memory without de-staging the log to a backing store. The write I/O operation is committed once the log is replicated to at least a subset of the remote hosts that forms a quorum. Finally, the log is de-staged to the backing store after the write I/O operation is successfully committed.

Patent Agency Ranking