Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Dell Software Inc patents


Recent patent applications related to Dell Software Inc. Dell Software Inc is listed as an Agent/Assignee. Note: Dell Software Inc may have other listings under different names/spellings. We're not affiliated with Dell Software Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "D" | Dell Software Inc-related inventors


System for managing effective self-service analytic workflows

A system, method, and computer-readable medium for performing an analytics workflow generation operation. The analytics workflow generation operation enables generation of targeted analytics workflows (e.g., via a data scientist (i.e., an expert in data modeling)) that are then published to a workflow storage repository so that the targeted analytics workflows... Dell Software Inc

Blind cloud data leak protection

Systems and methods for blind data leak prevention are provided. A first computer can determine if encrypted data matches a rule even without the encryption key used to encrypt the data. The first computer may encrypt the rule with a second encryption key and send the encrypted rule to a... Dell Software Inc

Reducing transmission pathway lengths within a distributed network

A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a TCP socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new... Dell Software Inc

Detecting important variables and their interactions in big data

A system, method, and computer-readable medium for performing a variable and interaction detection operation. In certain embodiments, the variable and interaction detection operation detects important variables and as well as interactions among certain important variables in big data. In certain embodiments, the variable and interaction detection operation includes a robust... Dell Software Inc

Method for effective pmtu discovery in vpn environment

Methods are directed towards initializing a path maximum transmission unit value for two gateways in communication via a network tunnel (e.g., VPN environment). The initialized path maximum transmission unit value is used in establishing the network tunnel of the two gateways. Methods are also directed towards synchronizing path maximum transmission... Dell Software Inc

Prototype management system

A prototype management system to provide cross team tools, frameworks, prototype management, and prototype tracking capabilities to improve the overall timeliness and quality of application and web-based product development. In an example, the prototype management system may be configured to cause the prototype to act as a live website that... Dell Software Inc

Method for in-database feature selection for high-dimensional inputs

A system, method, and computer-readable medium for performing in-database operations, comprising: presenting an automation interface to a user, the user interface automation interface enabling a user to select one or more key performance indicators; instantiating an in-database processing operation, the in-database processing operation performing feature selection from a high dimensional... Dell Software Inc

Prioritized messaging system

Techniques and systems for prioritizing messages are described. The messages may be associated with multiple message accounts of an individual and the message accounts may be administered by different message account providers. The messages may be prioritized according to priority scores determined based on priority rules. The priority rules may... Dell Software Inc

Firewall informed by web server security policy identifying authorized resources and hosts

A user of a client device that is protected by a firewall may navigate to a website using a particular browser process (e.g., a window/tab of a browser) of the client device, sending a content request toward a web content server in the process. The firewall may intercept the content... Dell Software Inc

Optimal service provider selection

A network routing server can be configured to receive client requests from multiple client devices and route the client requests to optimal service providers to service the request. To determine which service provider is optimal to service the client request, the network routing service can analyze multiple factors, such as... Dell Software Inc

Virtual private network dead peer detection

Methods and systems are provided for detecting dead tunnels associated with a VPN. An indicator of a tunnel capability, for example, a DPD vendor ID, is received from a peer through a VPN connection. The tunnel capability is associated with one or more phase II tunnels associated with the VPN.... Dell Software Inc

Single tier routing

A single global traffic optimizer can be configured to perform the functionality of a global and local traffic manager. For example, the global traffic optimizer can receive a client request from a client device and route the client request to an appropriate service provider from a set of geographically dispersed... Dell Software Inc

Resource identification through dynamic domain name system (dns) labels

A single DNS NS record can establish a zone delegation to a reverse proxy access device so that the reverse proxy access device answers DNS queries directed to it under the zone delegation. A DNS label can be designated at the reverse proxy access device for each resource served by... Dell Software Inc

Systems and methods for cloud-based device configuration management of heterogeneous devices

The present disclosure provides for information handling systems and methods to configure and manage any number of heterogeneous devices. In various embodiments, a shared device configuration is simultaneously applied to a selected group of otherwise incompatible heterogeneous devices that may use different communication protocols and operating systems. Certain embodiments create... Dell Software Inc

Printed document control with verified unique watermarks

Systems and methods are directed towards generating a verified unique watermark. More specifically, the systems and methods are directed towards generating a watermark that is as long as possible without any repetition. Such watermarks are possible by selecting characteristics of the watermark and methods for producing the watermarks (e.g., dandy... Dell Software Inc

Network optimization and client steering based on wireless data rate capabilities of mixed client devices

A wireless local area network (WLAN) access point may receive a steering policy from a WLAN controller, the steering policy matching various data rate capabilities to various quality of service (QoS) levels. When a client device attempts to connect to the access point (AP), the AP responds via a default... Dell Software Inc

Obtaining employee permission to collect data associated with employee use of corporate resources

Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. The usage data that is collected may be determined. A user interface may display a plurality of categories associated with... Dell Software Inc

Providing an employee a perk to collect data of employee usage of corporate resources

Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. Data elements included in the usage data may be... Dell Software Inc

Determining data that is collected when an employee uses corporate resources

Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. Data elements included in the usage data may be... Dell Software Inc

Auto query construction for in-database predictive analytics

A system, method, and computer-readable medium for performing an auto-query construction operation for use with a distributed analytics operation. More specifically, in certain embodiments, the auto-query construction operation provides automatically generates SQL code instructions via an auto-query construction user interface (UI) settings in a computational system, such as the Dell... Dell Software Inc

Monitoring, analyzing, and mapping of computing resources

Systems and techniques for dynamic monitoring, analysis and mapping of resources are described. Monitoring data can be obtained from a variety of different sources, such as operating systems, applications, hardware interfaces, and the like. In addition to obtaining monitoring data, health data can also be obtained for one or more... Dell Software Inc

Determining delivery dates for multiple product types

Systems and techniques to determine, substantially in real time, an estimated ship date or an estimated delivery date associated with a product are described. A commitment engine may receive, from a computing device, data associated with a product that comprises a built-to-order product. The commitment engine may determine whether the... Dell Software Inc

Generating simulation data using a linear curve simplification and reverse simplification method

Simulation data can be generated using a linear curve simplification and reverse simplification method. This method can facilitate the generation of simulation data from existing data where the simulation data will exhibit the same curve pattern as the existing data but with a degree of variation. In this way, varying... Dell Software Inc

Context-aware delegation risk system

A risk analysis system of associated with an enterprise system for determining delegation risks associated with assigning candidate individuals to perform various tasks. In some cases, the delegation risk analysis system may generate individual delegation risk scores to each candidate individual to assist in the delegation of tasks throughout an... Dell Software Inc

Deputizing agents to reduce a volume of event logs sent to a coordinator

Systems and techniques to deputize agents in a system to reduce a number of event logs received by a coordinator are described. An agent belonging to a group of agents may receive a request to select a deputized agent. The agent may determine data associated with a component hosting the... Dell Software Inc

Providing a single interface for accessing resources that are distributed among multiple platforms

A single interface can be provided for accessing resources that are distributed among multiple platforms. Resources that are stored in different platforms and to which a user should have access can be identified. A stub can be created for each identified resource and can include functionality for causing the resource... Dell Software Inc

Systems and methods for logging and categorizing performance events

In one embodiment, a method includes executing a first logging process, a second logging process and a categorization process in parallel on a computer system, wherein the first logging process identifies computer-performance events at a monitored resource. The method further includes the second logging process monitoring the first logging process... Dell Software Inc

Read-only file system for testing de-duplication

Disclosed herein are systems, methods, and devices for testing deduplication repositories. Methods may include identifying a storage location based on a request for one or more data values associated with a read-only file system, where the read-only file system is a simulated file system, and where the storage location is... Dell Software Inc

Recovering a specified set of documents from a database backup

Techniques and systems for restoring objects from a backup file without restoring a remainder of the backup file are described. For example, a plurality of object identifiers that identify a plurality of objects stored in the backup file may be determined. A selection of an object identifier of the plurality... Dell Software Inc

Categorizing captured images for subsequent search

Systems and methods are described to identify in the images text, people, landmarks, objects, or any combination thereof and to store and search for images based on extracted data. A portable computing device, such as a wireless phone or tablet computer, may capture an image, determine context data associated with... Dell Software Inc

Multidimensional synopsis generation

A multidimensional synopsis of a stream of textual data pertaining to a particular subject can be generated. To produce the multidimensional synopsis, multiple dimensions that each includes concepts can be identified. The stream of textual data can then be analyzed to identify the occurrence of the concepts within elements of... Dell Software Inc

Optimizer module in high load client/server systems

An optimizer module can function as a proxy between clients and a server that provides access to a service via a REST API. As a proxy, the optimizer module can receive requests from the clients and can combine the requests into a single bulk request that is then submitted to... Dell Software Inc

Dynamic domain name system destination selection

A user device, in trying to communicate with an internet resource knowing an associated domain name, transmits a Domain Name System (DNS) request packet to a DNS server, which responds with a DNS response packet identifying multiple Internet Protocol (IP) addresses corresponding to multiple servers associated with the identified domain... Dell Software Inc

User based stateless ipv6 ra-guard

The present disclosure relates to an apparatus, a method, and a non-transitory computer readable storage medium for filtering routing assignment (RA) messages in a computer network. Methods, non-transitory computer readable storage medium, and apparatus consistent with the present disclosure may receive an RA message, extract information included in an RA... Dell Software Inc

Delaying one or more searches to cause multiple searches to load and evaluate segments together

The performance of a server can be improved by causing multiple searches to load segments of an index and search within them together. When multiple search requests are received and executed within a minimal time difference, the first search can be delayed to allow the second search—and possibly additional searches—to... Dell Software Inc

07/13/17 / #20170201879

Temporary disposable portable identifier

A system, method, and computer-readable medium for performing a temporary disposable portable identifier operation, comprising: requesting a unique identifier from a provider; generating, via a provider, a request to generate a temporary disposable identifier corresponding to a unique identifier; and, providing the temporary disposable identifier corresponding to the unique identifier... Dell Software Inc

07/06/17 / #20170192854

Email recovery via emulation and indexing

Emails can be recovered in a quick and granular fashion by restoring an EDB within an emulated Exchange server environment and then creating a full-text index for each mailbox in the restored EDB. The full-text index could then be employed to perform searches for particular emails thereby leveraging the granular... Dell Software Inc

07/06/17 / #20170193079

Smart exchange database index

A full-text index can be created for each mailbox of an EDB to facilitate the performance of complex queries to quickly search for email data. In this way, relevant email data can be identified and retrieved quickly and efficiently from the full-text index rather than from the EDB. To create... Dell Software Inc

06/29/17 / #20170185798

Controlling content modifications by enforcing one or more constraint links

Embodiments of the present disclosure include systems and methods for controlling modification of a data file that is accessed by multiple components of an application platform. The method for controlling modification of a data file includes: preparing a link constraint data that includes information of a data file and a... Dell Software Inc

06/29/17 / #20170187753

Context-aware delegation engine

A context-aware delegation engine can enable an account owner to identify granular criteria (or context) that will be used to determine what content a delegate will have access to. The account owner can therefore leverage a wide range of information to dynamically determine whether a delegate will receive access to... Dell Software Inc

06/22/17 / #20170180230

Tcp traffic priority bandwidth management control based on tcp window adjustment

The present disclosure relates to an apparatus, a method, and a non-transitory computer readable storage medium for managing bandwidth in a computer network. The method may identify that a first received packet belongs to a first traffic class and a second received packet belongs to a second traffic class where... Dell Software Inc

06/15/17 / #20170171222

Reassembly free deep packet inspection for peer to peer networks

The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer... Dell Software Inc

06/15/17 / #20170171227

Automatic tunnels routing loop attack defense

The present disclosure relates to systems, methods, and non-transitory computer readable storage medium for detecting a tunnel routing loop attack on a computer network. A method of the presently claimed invention receives a packet of data over an automatic tunnel. When the received packet includes an Internet protocol version 6... Dell Software Inc

06/15/17 / #20170171424

Printed document control with verified unique watermarks

Systems and methods are directed towards generating a verified unique watermark. More specifically, the systems and methods are directed towards generating a watermark that is as long as possible without any repetition. Such watermarks are possible by selecting characteristics of the watermark and methods for producing the watermarks (e.g., dandy... Dell Software Inc

06/15/17 / #20170171831

Registering network devices using known host devices

Network devices can be registered to access a network using known host devices to thereby simplify the device registration process. The host device can be an administrator's device that is already registered and authorized to vouch for another user desiring to register his or her device. Alternatively, the host device... Dell Software Inc

06/08/17 / #20170163604

Method and apparatus to perform multiple packet payloads analysis

A method and apparatus for identifying data patterns of a file are described herein. In one embodiment, an exemplary process includes, but is not limited to, receiving a data packet of a data stream containing a file segment of a file originated from an external host and destined to a... Dell Software Inc

06/08/17 / #20170161327

Distributed database driver middleware

JDBC-X, which is distributed database driver middleware, can extend the JDBC API to facilitate integrating an application with a distributed database. JDBC-X functions as an intermediary between the JDBC API and the JDBC drivers and provides a number of components that adapt JDBC SQL queries and corresponding result sets in... Dell Software Inc

06/08/17 / #20170161503

Determining a risk indicator based on classifying documents using a classifier

Systems and techniques for determining and displaying risk indicators are described. A set of event logs occurring in a time interval and associated with a user account retrieving may be retrieved from an event log database. For individual event logs in the set of event logs, a context may be... Dell Software Inc

06/08/17 / #20170163650

Usage-based modification of user privileges

Systems and techniques to identify and modify unused (or seldom used) access privileges are described. Group membership data may be correlated with access map data to create a user-resource access map identifying privilege levels associated with individual user accounts to access computing resources in a computing system. User activity event... Dell Software Inc

06/01/17 / #20170155622

Category-based data loss prevention for network-connected devices

A network-connected device (such as an “internet of things” device) that periodically transmits data to recipient devices (e.g., smartphones, tablets, laptops) may be protected by a firewall that include software firewall elements, hardware firewall elements, or some combination thereof. The firewall may intercept datasets sent by the network-connected device, inspect... Dell Software Inc

06/01/17 / #20170155670

Time zero classification of messages

Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious, determining whether a similar message has been noted previously in the event that the message is determined to be suspicious, classifying the message according to its individual characteristics and its similarity... Dell Software Inc

05/25/17 / #20170147565

Efficient string search

Some embodiments of an efficient string search have been presented. In one embodiment, a string of bytes representing content written in a non-delimited language is received, wherein the content has been classified into a predetermined category. In a single pass through the string of bytes, a set of N-grams is... Dell Software Inc

05/18/17 / #20170139613

Continuous data backup using real time delta storage

A continuous data backup using real time delta storage has been presented. A backup appliance receives a backup request from a backup agent running on a computing machine to backup data on the computing machine. The computing machine is communicatively coupled to the backup appliance. Then the backup appliance performs... Dell Software Inc

05/18/17 / #20170142050

Identification of content by metadata

Systems and methods for identifying content in electronic messages are provided. An electronic message may include certain content. The content is detected and analyzed to identify any metadata. The metadata may include a numerical signature characterizing the content. A thumbprint is generated based on the numerical signature. The thumbprint may... Dell Software Inc

05/18/17 / #20170142070

Method to enable deep packet inspection (dpi) in openflow-based software defined network (sdn)

The present invention relates to a method and system for performing deep packet inspection of messages transmitted through a network switch in a Software Defined Network (SDN). Embodiments of the invention include a network switch, a controller, and a firewall in a software defined networking environment. In the present invention,... Dell Software Inc

05/18/17 / #20170142139

Cloud-based gateway security scanning

Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an... Dell Software Inc

05/11/17 / #20170134409

Method and an apparatus to perform multiple packet payloads analysis

A method and an apparatus to perform multiple packet payload analysis have been disclosed. In one embodiment, the method includes receiving a plurality of data packets, each of the plurality of data packets containing a portion of a data pattern, determining whether each of the plurality of data packets is... Dell Software Inc

05/11/17 / #20170134428

Firewall informed by web server security policy identifying authorized resources and hosts

A user of a client device that is protected by a firewall may navigate to a website using a particular browser process (e.g., a window/tab of a browser) of the client device, sending a content request toward a web content server in the process. The firewall may intercept the content... Dell Software Inc

05/11/17 / #20170132222

Document link migration

Techniques and systems for migrating links in documents are described. For example, during a migration process, a first document may be selected to be migrated from a source document database. A determination may be made that the first document includes a link to a second document. The first document may... Dell Software Inc

05/11/17 / #20170132366

Platform for administration of personal health information

A system, method, and computer-readable medium are disclosed for performing personal healthcare administration, comprising: receiving health information from a consumer to a business intelligence suite via a portal; receiving a query regarding a healthcare study from a buyer, the healthcare study including a request for health information from the consumer;... Dell Software Inc

05/04/17 / #20170126601

Image based spam blocking

A fingerprint of an image identified within a received message is generated following analysis of the message. A spam detection engine identifies an image within a message and converts the image into a grey scale image. The spam detection engine analyzes the grey scale image and assigns a score. A... Dell Software Inc

04/27/17 / #20170116057

Packet processing on a multi-core processor

A method for packet processing on a multi-core processor. According to one embodiment of the invention, a first set of one or more processing cores are configured to include the capability to process packets belonging to a first set of one or more packet types, and a second set of... Dell Software Inc

04/27/17 / #20170118027

Secure neighbor discovery (send) using pre-shared key

An extension is provided to the SEND protocol without requiring a CGA or third party trust anchor. A shared key is provided to both a sender and receiver of a neighbor discovery (ND) message. A digital signature option is contained in the ND message. A digital signature field is determined... Dell Software Inc

04/27/17 / #20170118181

Securing internet of things communications across multiple vendors

A secure connection between a user mobile device and a “Internet-of-Things” network-connected device (e.g. a home appliance or a vehicle) may be provided using an internet gateway residing in the public internet and a local gateway residing in a private network behind a firewall. The user device may receive an... Dell Software Inc

04/27/17 / #20170118221

Query interface to policy server

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to... Dell Software Inc

Patent Packs
04/27/17 / #20170116205

Email and identity migration based on multifactor relationship data provided by users and systems

Methods, systems, and apparatuses for creating collections of associated accounts for a migration process. An example system includes a processing device and memory that stores accounts in accordance with at least one domain. The processing device may create a collection of related accounts stored in accordance with the at least... Dell Software Inc

04/13/17 / #20170103120

Using distinguishing properties to classify messages

A system and method are disclosed for classifying a message. The method includes receiving the message, identifying in the message a distinguishing property; generating a signature using the distinguishing property; and comparing the signature to a database of signatures generated by previously classified messages.... Dell Software Inc

04/13/17 / #20170104687

Managing persistent cookies on a corporate web portal

Systems and methods for management of persistent cookies in a corporate web portal are described. A plurality of zones may be defined and stored in memory. Each zone may be associated with a zone property indicative of whether cookies are allowed. A resource request may be received from a user... Dell Software Inc

04/13/17 / #20170104761

Identity authentication using multiple devices

A system, method, and computer-readable medium for performing an authentication operation comprising: identifying a plurality of user devices associated with a user of an information handling system; determining when at least some of the plurality of user devices are within a predetermined range of the information handling system; and, authenticating... Dell Software Inc

04/06/17 / #20170099283

Single login authentication for users with multiple ipv4/ipv6 addresses

Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information. Authentication and authorization of a client device to access a plurality of resources after an initial set of login... Dell Software Inc

04/06/17 / #20170097864

Collecting and transmitting diagnostics information from problematic devices

A system, method, and computer-readable medium are disclosed for collecting and transmitting diagnostics information via a diagnostic information operation. The diagnostic information operation begins with a system periodically writing diagnostic information such as diagnostic errors and warnings to non-volatile local storage contained within the system. Upon detection of a failure,... Dell Software Inc

04/06/17 / #20170099247

Folders that employ dynamic user training rules to organize content

Dynamic user training rules can be employed to organize content within a folder. Each folder can be associated with a dynamic rule that defines a number of attribute and weighting factor associations and a folder threshold. Each attribute and weighting factor association can identify an attribute that is common among... Dell Software Inc

03/30/17 / #20170093894

Notification for reassembly-free file scanning

Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of... Dell Software Inc

03/30/17 / #20170093863

Combining a set of risk factors to produce a total risk score within a risk engine

A risk engine can be configured to produce a total risk score by combining a set of risk factors. A risk policy can define a percentage that is to be assigned to each risk factor that is present in a request to access a web-accessible application. The percentage can represent... Dell Software Inc

03/09/17 / #20170070464

Automatically applying data loss prevention rules during migration

Data loss prevention (“DLP”) rules can be automatically applied to items during a migration. When a migration is performed, a migration engine may be configured with migration configuration settings which define the items to be migrated from the source system to the target system. The migration engine may also be... Dell Software Inc

03/09/17 / #20170070505

Providing controlled access to admin credentials during a migration

Access to admin credentials can be controlled during a migration. By controlling access to the admin credentials, a consultant can be allowed to perform migration tasks without the consultant being exposed to the administrative-level access necessary to perform such tasks. Accordingly, an organization can maintain complete control and visibility over... Dell Software Inc

03/09/17 / #20170070536

Governance policy framework for cloud resources

A system, method, and computer-readable medium are disclosed for performing a cloud environment governance policy operation which provides a governance policy framework for use within cloud environments. In various embodiments, the cloud environment governance policy operation expands identify access management (IAM) systems to understand not only users but also resources.... Dell Software Inc

03/02/17 / #20170060957

Optimized and consistent replication of file overwrites

In general, certain embodiments of the present disclosure provide techniques or mechanisms for creating efficient and consistent replication of file overwrites. According to various embodiments, a file map with a sequence file number is created for a data file on a source. The file map includes one or more nodes... Dell Software Inc

03/02/17 / #20170063764

During an email migration, converting distribution list messages into single-instanced content within a collaboration platform group

During an email migration, a migration engine can identify which emails in the source system are associated with distribution lists. The migration engine can convert any emails that are associated with a distribution list into group content of an appropriate group in the target system. In contrast, for any email... Dell Software Inc

02/16/17 / #20170046344

Method for performing in-database distributed advanced predictive analytics modeling via common queries

A system, method, and computer-readable medium for performing a distributed analytics operation. The distributed analytics operation uses interface technologies to de-couple an actual data storage technology from an implementation of distributed analytics. Such a distributed analytics operation obviates requirements to deploy specific computer code onto a data storage platform to... Dell Software Inc

Patent Packs
02/09/17 / #20170039069

Adaptive core grouping

The present invention relates to a system, method, and non-transitory storage medium executable by one or more processors at a multi-processor system that improves load monitoring and processor-core assignments as compared to conventional approaches. A method consistent with the present invention includes a first data packet being received at a... Dell Software Inc

02/09/17 / #20170041297

Unified source user checking of tcp data packets for network data leakage prevention

Systems and methods are directed towards network data leakage prevention (DLP). More specifically, the systems and methods are directed towards using TCP (Transmission Control Protocol) data packets in conjunction with the DLP monitor. The network DLP utilizes TCP data packets to carry source user identity. With the source user identity,... Dell Software Inc

02/09/17 / #20170041431

Read-ahead on signed connections with unsigning, inline, transparent proxies

Innovative technologies for reducing network request response times over a server-signed connection are disclosed. The technologies may involve dynamically computing synchronized compression dictionaries using server responses to speculative or “read-ahead” client requests. The technologies operate even when the client is unable to accept the server responses due to server-signing constraints.... Dell Software Inc

02/02/17 / #20170034179

Social media login and interaction management

A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login interface of a social media platform. The firewall then checks that the first set of login credentials are correct against a first set of... Dell Software Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Dell Software Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Dell Software Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###