Follow us on Twitter
twitter icon@FreshPatents


Cloud Computing patents

      

This page is updated frequently with new Cloud Computing-related patent applications.




 Gaze-directed content delivery patent thumbnailGaze-directed content delivery
Methods and systems may provide for associating content in a cloud computing infrastructure with geo-panes and sending it to a location aware device based on user gaze. The content may be restricted by rules, including distance from user to the geo-pane.
Intel Corporation


 System and  managing heterogeneous data for cloud computing applications patent thumbnailSystem and managing heterogeneous data for cloud computing applications
A method, system, and computer-readable storage medium for managing heterogeneous data for cloud computing applications are disclosed. For example, a method involves identifying data to be used by an application.
Nimbix, Inc.


 Method and device for managing resources with an external account patent thumbnailMethod and device for managing resources with an external account
Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account..
Alibaba Group Holding Limited


 Automatic determination of device specific interoperability patent thumbnailAutomatic determination of device specific interoperability
Device specific interoperability is provided automatically utilizing remote service and/or cloud computing. Functionality of devices like mobile phones is tested to ensure that the device is properly configured to work with infotainment systems by using the phone to connect with the cloud services..
Microsoft Technology Licensing, Llc


 Data backup and transfer across multiple cloud computing providers patent thumbnailData backup and transfer across multiple cloud computing providers
Data may be stored across the clouds of multiple cloud computing providers to improve data security. Software infrastructure components of an original cloud computing provider storing data via a first virtual machine (vm) may be identified.
Whp Workflow Solutions, Llc


 Dynamic provisioning of a virtual storage appliance patent thumbnailDynamic provisioning of a virtual storage appliance
Systems, methods, and apparatus for facilitating dynamic provisioning of a virtual storage appliance in a cloud computing environment are presented herein. A storage system management component can provision storage from a storage medium to facilitate access of at least a portion of the storage by a virtual storage appliance (vsa) based on a request for at least one resource associated with the vsa.
Os Nexus, Inc.


 System and  key management and user authentication patent thumbnailSystem and key management and user authentication
A system and method are presented for key management and user authentication. Secure ssh access may be performed through a public/private set of ssh keys where a user uploads a public ssh key to a key management application.
Interactive Intelligence Group, Inc.


 Secure comparison of information patent thumbnailSecure comparison of information
The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption.
Openeye Scientific Software, Inc.


 Smart shift selection in a cloud video service patent thumbnailSmart shift selection in a cloud video service
A cloud-based network service provides intelligent access to surveillance camera views across multiple locations and environments. A cloud computing server maintains a database of time periods of interest captured by the cameras connected to the network.
Pelco, Inc.


 System and  remote fax interconnect technology patent thumbnailSystem and remote fax interconnect technology
The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The remote fax interconnect known as etherfax® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using internet/web based communication protocols such as http(s) as the transport between a facsimile capable application or hardware and the remotely accessible etherfax® services..
Etherfax, Llc


Method and configuring redundancy solution in cloud computing architecture

The present invention relates to the field of communications and information technologies, and in particular, to a method and an apparatus for configuring a redundancy solution in a cloud computing architecture, so as to solve a problem that a manner of manually planning a redundancy solution has poor flexibility and is unfavorable to overall management of a system. The method in the present invention includes: receiving a redundancy solution configuration request; determining, according to the redundancy solution configuration request, redundancy capability information and redundancy constraint requirement information of an application object to be configured; and determining, according to infrastructure information, infrastructure manager information, and application object information in an established redundancy capability information base, and the redundancy capability information and the redundancy constraint requirement information of the application object to be configured..
Huawei Technologies Co., Ltd.

Virtual zones for open systems interconnection layer 4 through layer 7 services in a cloud computing system

Concepts and technologies disclosed herein are directed to virtual zones for open systems interconnection (“osi”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone.
At&t Intellectual Property I, L.p.

Fast provisioning service for cloud computing

A cloud-based system and method for provisioning it infrastructure systems is disclosed. The system and method provided constructs an infrastructure generally comprised of a processing component supplying the computational capacity for a platform element, comprising one or more processing elements, memory and i/o subsystems, a storage component utilizing commodity disk drives and comprised of one or more physical storage devices, and a network component providing a high speed connection among processing elements and the processing component to storage components.
Digital River, Inc.

Mechanism for resource utilization metering in a computer system

Systems, apparatuses, and methods for tracking system resource utilization of guest virtual machines (vms). Counters may be maintained to track resource utilization of different system resources by different guest vms executing on the system.
Advanced Micro Devices, Inc.

Data suppression for faster migration

The subject technology addresses the need in the art for improving intra-cloud migration of virtual machines in a cloud computing environment. A hash database may be prepopulated with key-value pairs corresponding to hash ids and associated data chunks of a virtual machine image.
Cisco Technology, Inc.

Optimizing virtual machines placement in cloud computing environments

Placement of instances of virtual machine (vm) images in a cloud computing environment is optimized. A request is received to deploy a new vm image instance.
International Business Machines Corporation

Method and configuring redundancy data center in cloud computing architecture

The present disclosure relates to a method and an apparatus for configuring a redundancy data center in a cloud computing architecture. The method includes receiving a request for configuring a redundancy data center dc for a specified network service ns; acquiring, from an affinity relationship information bank of application objects according to the request for configuring a redundancy dc, information about an affinity and/or anti-affinity relationship among application objects that support the specified network service, where application objects having an affinity relationship rare deployed in a same dc, and application objects having an anti-affinity relationship are deployed in different dcs; and selecting, from deployed dcs, a redundancy dc for the specified network service according to redundancy resource information of the deployed dcs and the acquired information about an affinity and/or anti-affinity relationship..
Huawei Technologies Co., Ltd.

Wireless network cloud computing resource management

A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers..
Cellco Partnership (d/b/a Verizon Wireless)

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
International Business Machines Corporation

Microapplications software marketplace for digital systems and use

Disclosed is a system and method for provisioning and deploying digital systems using microapplications running natively and securely on top of cloud computing providers. The system includes a software marketplace that allows users to purchase microapplications on a subscription basis in order to build, deploy, and manage the microapplications as a custom digital system in their accounts from the cloud-computing providers..
Mitoc Group Inc.

Dynamic snapshots for sharing network boot volumes

The subject technology addresses the need in the art for improving provisioning and booting of virtual machines in a cloud computing environment. Different versions of boot volume images may be shared in a storage repository accessible by one or more host computers.
Cisco Technology, Inc.

Frictionless interface for virtual collaboration, communication and cloud computing

Described herein are systems and methods for a virtual communication and collaboration application platform which automates the setup and operation of a virtual collaboration session, senses and reacts to user activity and contextual cues, and provides real-time intuitive interaction steps to enable users to easily interact in a simple and user-friendly manner. The virtual collaboration and computing platform provides a shared application window visible to multiple users on different displays for which users can easily share multiple types of data and applications through basic drag-and-drop interactions..
Coscreen, Inc.

Online advancing information organization sharing and collective action

Methods and systems and mobile device interfaces for creating, joining, organizing and managing via mobile devices affinity groups in a cloud computing environment for social and business purposes.. .

Data-driven semi-global alignment technique for masquerade detection in stand-alone and cloud computing systems

Systems and methods are provided for intrusion detection, specifically, identifying masquerade attacks in large scale, multiuser systems, which improves the scoring systems over conventional masquerade detection systems by adopting distinct alignment parameters for each user. For example, the use of ddsga may result in a masquerade intrusion detection hit ratio of approximately 88.4% with a small false positive rate of approximately 1.7%.
Qatar University, Office Of Academic Research

A generic model to implement a cloud computing service

Example implementations relate to using a generic model to provision a computing resource to implement a cloud computing service. For example, a computing device may include a processor.
Hewlett Packard Enterprise Development Lp

Methods and systems relating to optical networks

Data center interconnections, which encompass wscs as well as traditional data centers, have become both a bottleneck and a cost/power issue for cloud computing providers, cloud service providers and the users of the cloud generally. Fiber optic technologies already play critical roles in data center operations and will increasingly in the future.
Aeponyx Inc.

Method and system for intelligent cloud planning and decommissioning

A method for decommissioning an application operating on a computer system or a computer system includes receiving, at a decommissioning system, information that specifies a server to analyze. The decommissioning system determines one or more applications operating on the server, one or more instruction code libraries that are being utilized by the one or more applications, and hardware dependencies of the one or more instruction code libraries.
Accenture Global Solutions Limited

3d virtual reality model sharing and monetization electronic platform system

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Holoportal and holocloud system and operation

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Integrated configuration engine for interference mitigation in cloud computing

A cloud computing system which is configured to monitor operating status of a plurality of virtual computing machines running on a physical computing machine, wherein said monitoring includes monitoring a cycles per instruction (cpi) parameter and a cache miss rate (cmr) parameter of at least one of the plurality of virtual computing machines. The system detects interference in the operation of the at least one virtual machine, with the detection including determining when at least one of the cpi and cmr values exceed a predetermined threshold.
Purdue Research Foundation

Real-time 3d virtual or physical model generating holoportal and holocloud system

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Cloud computing system and method based on distributed consumer electronic devices

In accordance with a method a plurality of subscriber systems are provided, the systems being coupled via a wide area network (wan) and comprising a first subscriber system. The first subscriber system has processing and non-volatile storage and is suitably programmed for providing a subscriber service to a first subscriber.
Leonovus Usa

Data encryption service

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Image vulnerability repair in a networked computing environment

Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities.
International Business Machines Corporation

Automatically preventing and remediating network abuse

Various embodiments described herein are directed to optimizing cloud computing infrastructures functionality based on an abuse prevention and remediation platform. A tenant profile may have a tenant confidence score for a tenant, the tenant confidence score being an indicator of the reputation of the tenant usage of cloud computing resources.
Microsoft Technology Licensing Llc

Methods and apparatus to grant access to cloud computing resources

An example method to grant authorization to a user for accessing a cloud computing resource involves receiving a first message from a user via a social media interface. The first message includes a request to access a cloud computing resource.
Vmware, Inc.

Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Methods and apparatus to generate knowledge base articles

An example method to generate knowledge base articles involves analyzing user-satisfaction indicators of a plurality of user response messages in a forum message board of a cloud computing system. The user response messages are posted in response to a first message requesting assistance related to a computing resource.
Vmware, Inc.

Systems and methods to create highly scalable network services

Various embodiments of the invention provide for an unparalleled scalable and reliable load distribution design for use in a large class of network applications, including cloud computing in modern data center networks and similar services, which can benefit from the invention by taking advantage of commonly available network components and systems. In particular, various embodiments of the invention extend a logical load distributor model to include distributed clusters of loosely coupled components.
Dell Products L.p.

Cloud system order and configuration using customized templates

The present disclosure relates to brokering requests for cloud computing resources between a user and multiple infrastructure providers. According to one embodiment, an infrastructure manager acting as a broker receives a template including configuration information for one or more servers.
International Business Machines Corporation

Cloud system order and configuration using customized templates

The present disclosure relates to brokering requests for cloud computing resources between a user and multiple infrastructure providers. According to one embodiment, an infrastructure manager acting as a broker receives a template including configuration information for one or more servers.
International Business Machines Corporation

Cloud computing systems

A multi-tier cloud-metering framework for metering cloud resources is presented. The proposed framework is capable of relating metering indicator of distributed resources contributing to the same application and located at different architectural levels.
The American University In Cairo

Data encryption service and customized encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Monitoring and alert services and data encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

System and monitoring changes in databases and websites

A system and method is described for constructing a differential web in which information including objects, numbers, or text in databases and web pages may be selected using pointing device movements. Once selected, objects may be designated to be monitored for changes, said changes being captured and made browsable on web-like constructs.
Tksn Holdings, Llc

Allocating, configuring and maintaining cloud computing resources using social media

An example method involves receiving an electronic message from a user via a social media interface. The electronic message includes a query associated with a resource of a cloud computing system.
Vmware, Inc.

Cloud virtual machine customization using extension framework

In various embodiments, methods and systems for remotely customizing a virtual machine in a cloud computing infrastructure are provided. A vm agent component provided on a virtual machine, while in communication with a vm deployment service associated therewith, can be configured to detect an incoming configuration payload that corresponds to a selected one or more extension packages cataloged on a vm marketplace component in communication with the vm deployment service component.
Microsoft Technology Licensing, Llc

System and automatic porting of software applications into a cloud computing environment

In accordance with an embodiment, described herein is a system and method for automatic porting of software applications into a cloud computing environment (cloud environment, cloud). A cloud service enables software developers to deploy user applications to run within the cloud environment.
Oracle International Corporation

Dynamically generating solution stacks

Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received.
International Business Machines Corporation

Dynamically generating solution stacks

Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received.
International Business Machines Corporation

Transactional orchestration of resource management and system topology in a cloud environment

Mechanisms are provided, in a cloud computing data processing system comprising a plurality of components, hosted on one or more hardware computing devices of the cloud computing data processing system, for transactional resource and topology management. A cloud service system is instantiated that comprises component instances having allocated resources.
International Business Machines Corporation

Resource prediction for cloud computing

The invention relates to a method for predicting an allocation of processing resources provided by a cloud computing module (230) to process a data set based on a predefined processing task. Input parameters are detected, the input parameters containing information about at least the data set to be processed by the cloud computing module and the processing task to be carried out on the data set.
Telefonaktiebolaget Lm Ericsson (publ)

Methods and systems to evaluate data center resource allocation costs

This disclosure is directed to methods and systems to evaluate resource allocation costs of a data center. Methods and systems compute resource allocation costs of a cloud computing industry to obtain industry benchmarks that are compared with the resource allocation costs of the data center.
Vmware, Inc.

Data synchronization using redundancy detection

Managing data in a cloud computing environment, including data transfers. File level and block level similarities are identified, including for archive and nested archive files, residing on datacenters and regional repositories.
International Business Machines Corporation

Transactional orchestration of resource management and system topology in a cloud environment

Mechanisms are provided, in a cloud computing data processing system comprising a plurality of components, hosted on one or more hardware computing devices of the cloud computing data processing system, for transactional resource and topology management. A cloud service system is instantiated that comprises component instances having allocated resources.
International Business Machines Corporation



Cloud Computing topics:
  • Cloud Computing
  • Communications
  • Short Message Service
  • Internet Of Things
  • Data Processing
  • Data Storage
  • Mobile Phone
  • Addressing
  • Network Device
  • Virtualization
  • Distributed
  • Instruments
  • Executable
  • Database Server
  • Third Party


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Cloud Computing for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cloud Computing with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.8959

    file did exist - 2802

    0 - 1 - 55