01st week of 2019 patent applcation highlights part 75 |
Patent application number | Title | Published |
20190007426 | DETECTION AND MITIGATION OF TIME-DELAY BASED NETWORK ATTACKS - Systems and methods for mitigation of time-delay based network attacks are provided. According to one embodiment, an email directed to a user of an enterprise and containing a potentially malicious link is received by a mail server of the enterprise. At a first time, a file to which the potentially malicious link points is evaluated within a sandbox environment and a first hash value is generated based on contents of the file. At a second time, a file to which the potentially malicious link points is again evaluated, including downloading the file to which the potentially malicious link points to at the second time and generating a second hash value based on contents of the file. When the two hash values differ, then the file is treated by the mail server as a suspicious or high risk file or is caused to be evaluated within the sandbox environment. | 2019-01-03 |
20190007427 | DEVICE AND METHOD FOR DETECTING ATTACK IN NETWORK - An attack detection device includes: a receiver configured to receive messages that are periodically transmitted from a communication device in a network; and a processor. The processor predicts a number of messages to be received by the receiver in a specified monitor range based on a transmission cycle of the messages so as to generate a predicted value. The processor counts a number of messages received by the receiver in the specified monitor range so as to generate a count value. The processor detects an attack in the network according to a result of a comparison between the predicted value and the count value. | 2019-01-03 |
20190007428 | Detecting Compromised Credentials in a Credential Stuffing Attack - Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed. | 2019-01-03 |
20190007429 | Home-Based Physical and Cyber Integrated Security-Intrusion Detection System (PCIS-IDS) - Provided is an integrated physical security and cyber security intrusion and anomaly detection method for determining physical or electronic ingress/egress of a person/device and/or data/information from a home/facility/premise. The method includes processing data and information obtained from physical security system sensors, wired/wireless network traffic, and third-party sources, and creating sensor and network traffic profile, baselines and detecting anomalies and writing all related data to either a local database or a remotely managed database at a monitoring center. | 2019-01-03 |
20190007430 | SYSTEM AND METHOD FOR PROVIDING DATA AND DEVICE SECURITY BETWEEN EXTERNAL AND HOST DEVICES - A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request. | 2019-01-03 |
20190007431 | INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING - An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred. | 2019-01-03 |
20190007432 | COMPARING UNSUPERVISED ALGORITHMS FOR ANOMALY DETECTION - Methods, systems, and computer-readable storage media for ranking anomaly detection algorithms, including operations of receiving a set of unlabeled data from one or more sensors in a plurality of sensors of an internet of things, generating a plurality of data distributions corresponding to the set of unlabeled data by using a plurality of anomaly detection algorithms, and ranking the plurality of anomaly detection algorithms relative to the set of unlabeled data based on a distance between a first quantile and a second quantile of each of the plurality of data distributions. | 2019-01-03 |
20190007433 | SERVER-SUPPORTED MALWARE DETECTION AND PROTECTION - A method includes receiving, at a server, a first file attribute from a computing device, the first file attribute associated with a file. The method also includes determining, based on the first file attribute, that a classification for the file is unavailable. The method further includes determining the classification for the file based on a trained file classification model accessible to the server and sending the classification to the computing device. The method includes sending at least the classification to a base prediction cache associated with a second server. | 2019-01-03 |
20190007434 | AUTOMATED DETECTION OF MALWARE USING TRAINED NEURAL NETWORK-BASED FILE CLASSIFIERS AND MACHINE LEARNING - Automated malware detection for application file packages using machine learning (e.g., trained neural network-based classifiers) is described. A particular method includes generating, at a first device, a first feature vector based on occurrences of character n-grams corresponding to a first subset of files of multiple files of an application file package. The method includes generating, at the first device, a second feature vector based on occurrences of attributes in a second subset of files of the multiple files. The method includes sending the first feature vector and the second feature vector from the first device to a second device as inputs to a file classifier. The method includes receiving, at the first device from the second device, classification data associated with the application file package based on the first feature vector and the second feature vector. The classification data indicates whether the application file package includes malware. | 2019-01-03 |
20190007435 | PATTERN CREATION IN ENTERPRISE THREAT DETECTION - Search results are received from an initiated free text search of log data from one or more logs, where the free text is performed using search terms entered into a free text search graphical user interface. A set of at least one search result is selected from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern. A forensic lab application is rendered to complete an ETD pattern. An event filter is added for an event type based on normalized log data to a path. A relative ETD pattern time range is set and an ETD pattern is completed based on the added event filter. | 2019-01-03 |
20190007436 | MALWARE IDENTIFICATION VIA SECONDARY FILE ANALYSIS - A device may include one or more processors to receive a file that may be analyzed for malware; open the received file in a secure environment; determine that a secondary file in the secure environment may have been accessed based on the received file being opened; analyze the secondary file in the secure environment to identify malware; and/or perform an action associated with the received file based on the secondary file being analyzed. | 2019-01-03 |
20190007437 | Security Breach Reporting and Incident Management System - A breach reporting and incident management (BRIM) system and method are disclosed. The system and method include a network hardware and software platform through which multiple user entities can more automatically conduct and manage their relationships and exchange data. User entities include but are not limited to corporate entities. Once connections are established the connection itself is automatically archived along with all communications history, and data exchange history. Data exchanged includes data regarding security breaches affecting services provided by one of the users. | 2019-01-03 |
20190007438 | Protection from Malicious and/or Harmful Content in Cloud-Based Service Scenarios - There are provided measures for protection from malicious and/or harmful content in cloud-based service scenarios. Such measures exemplarily include detecting a transmission attempt of a file between a service cloud entity and a remote accessing entity, identifying said file, selecting between a synchronous file scanning and an asynchronous file scanning for said file based on at least one of: a file size, a file type, an extension type and predetermined security policies, and receiving security threat scan result for said file and storing said security threat scan result for said file in the scan result memory. | 2019-01-03 |
20190007439 | ANALYSIS METHOD, ANALYSIS DEVICE, AND ANALYSIS PROGRAM - A network standpoint feature value creating unit classifies access data collected at observation points into each detection target access source and creates network standpoint feature values for each of the detection target access sources. An access source detection unit detects, based on the network standpoint feature value, an access source performs a predetermined continuous access. A point standpoint feature value creating unit creates detection target standpoint feature values that are feature values for each access data collected at an observation point and training standpoint feature values that are feature values for each access data of the access source detected by the access source detection unit. An access detection unit detects access data in which the similarity between the detection target standpoint feature value and the training standpoint feature value is not less than a predetermined value as access data by the predetermined continuous access. | 2019-01-03 |
20190007440 | DARK WEB MONITORING, ANALYSIS AND ALERT SYSTEM AND METHOD - A dark web monitoring, analysis and alert system comprising a data receiving module configured to receive data collected from the dark web and structured; a Structured Data Database (SDD) connected with the data receiving module, the SDD configured to store the structured data; a Text Search and Analytic Engine (TSAE) connected with the SDD, the TSAE configured to enable advanced search and basic analysis in the structured data; a Knowledge Deduction Service (KDS) connected with the TSAE, the KDS configured to deeply analyze the collected data; the deep analysis comprises extracting insights regarding dark web surfers behavioral patterns and interactions; a Structured Knowledge Database (SKD) connected with the KDS, the SKD configured to store the deep analysis results; and an Alert Service connected with the TSAE and the SKD, the Alert Service configured to provide prioritized alerts based on the deep analysis. | 2019-01-03 |
20190007441 | NETWORK ANOMALY DETECTION - A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores. | 2019-01-03 |
20190007442 | SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION - A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system. | 2019-01-03 |
20190007443 | SECURITY POLICY ANALYZER SERVICE AND SATISFAIBILITY ENGINE - Security policies may be utilized to grant or deny permissions related to the access of computing resources. Two or more security policies may be compared to determine whether the policies are equivalent, whether one security is more permissive than another, and more. In some cases, it may be possible to identify whether there exists a security permission that is sufficient to determine two security policies lack equivalency. Propositional logics may be utilized in the evaluation of security policies. | 2019-01-03 |
20190007444 | MITIGATING SECURITY VULNERABILITIES IN WEB CONTENT - Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks. | 2019-01-03 |
20190007445 | SYSTEM AND METHOD FOR REPAIRING VULNERABILITIES OF OBJECTS CONNECTED TO A DATA NETWORK - Disclosed are systems and methods for repairing vulnerabilities of objects connected to a data network. An example method includes transmitting a request throughout the data network, obtaining responses from a plurality of accessible objects in the data network, attempting to obtain access to the plurality of accessible objects using a plurality of access methods, when access to an object is obtained, obtaining a list of resources of the accessed object, comparing the list of resources with a database of vulnerabilities to determine to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of vulnerabilities and repairing vulnerabilities associated with the accessed object by applying repairs associated with the vulnerable resource to the accessed object. | 2019-01-03 |
20190007446 | PROGRAM GENERATION METHOD AND ELECTRONIC CONTROL UNIT - A program generation method includes extracting a control flow that represents a call/return relationship between functions as well as extracting the functions themselves from a program code, determining an importance of the extracted functions; and inserting an instruction into the program code, to properly perform the control flow based on the importance of the extracted functions. Overhead that occurs during an execution of the program execution is reducible by using control flow integrity (CFI) technique that does not depend on domains. | 2019-01-03 |
20190007447 | Peer Device Protection - Examples of the present disclosure describe systems and methods for peer device protection. Peer device protection enables a first device comprising a digital security agent to remedy security issues on (or associated with) a set of devices visible to the first device. In aspects, a first device comprising a digital security agent may identify a set of devices visible to the first device. The first device may monitor the set of devices to collect data, such as types of communications and data points of interest. The digital security agent may apply threat detection to the collected data to identify anomalous network behavior. When anomalous network behavior is detected, the first device may cause an indicator of compromise (IOC) to be generated. Based on the IOC, the first device may facilitate remediation of the anomalous network behavior and/or apply security to one or more devices in the set of devices. | 2019-01-03 |
20190007448 | INCIDENT RESPONSE AUTOMATION ENGINE - Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets. | 2019-01-03 |
20190007449 | METHOD OF BLOCKING DISTRIBUTED DENIAL OF SERVICE ATTACKS AND CORRESPONDING APPARATUS - Gateways monitor communications between their LAN devices and the WAN and count the number of requests per LAN device to target IP addresses. If the number of requests for a LAN device to a target IP address exceeds a first value X, an alert message is transmitted at destination to all other gateways, the message including the target IP address. Gateways monitor the sum of request counter values based on alert messages received per target IP address. If the sum exceeds a second value VALUE_DDOS, a DDoS attack is detected. Gateways having detected a DDoS attack verify if they have a LAN device which transmitted a number of requests to the attacked IP address that exceeds value X and where appropriate puts such LAN device in quarantine by blocking data communication from the device to the WAN. | 2019-01-03 |
20190007450 | DETECTION OF NETWORK SNIFFING ACTIVITY - Methods and systems for detecting passive malicious network-mapping software on a computer network are disclosed. An expected location within a computer system for storing a received data packet may be determined. An actual storage location of the received data packet may be identified and compared to the expected storage location. In the event that the expected location does not match the actual storage location of the received data packet on the computer system, the presence of passive malicious network-mapping software such as a sniffer may be detected. | 2019-01-03 |
20190007451 | SYSTEM AND METHOD OF AUTOMATICALLY COLLECTING AND RAPIDLY AGGREGATING GLOBAL SECURITY THREAT INDICATORS TO CUSTOMER ENVIRONMENTS - A method of providing internet security is provided that includes accessing and monitoring a list of online threat exchanges or indexes, wherein accessing the list occurs in real-time and is continuously updated, storing the monitored information at a server, monitoring at least one honeypot established by an operator of the server, wherein monitoring the honeypot occurs in real-time and is continuously updated, compiling a database based on the accessed list and monitored honeypot, and implementing a security measure based on the compiled database. | 2019-01-03 |
20190007452 | SYSTEM AND METHOD FOR INTERCEPTING ENCRYPTED TRAFFIC AND INDICATING NETWORK STATUS - A computer-implemented method for notifying a client application of an event by preventing the setup of a TLS (Transport Layer Security) secure connection between the client application and a destination server is provided. The method comprises receiving a client Hello message from a client application directed to the destination server, preventing the client Hello message from reaching the destination server, constructing a server Hello message such that the message appears to originate from the destination server, constructing a dummy certificate containing the event, constructing a Certificate message that includes the dummy certificate and appears to originate from the destination server, and transmitting the server Hello message and the Certificate message to the client application. | 2019-01-03 |
20190007453 | INTENT-BASED NETWORK SECURITY POLICY MODIFICATION - A device may receive first information associated with a set of security rules. The first information may identify a set of security actions a device is to implement when the set of security rules applies to traffic. The device may determine a manner in which the set of security rules is to apply using the first information. The device may determine whether the manner in which the set of security rules is to apply and an intent of a network security policy or a manner in which a set of previously defined security rules is to apply match to determine whether the set of security rules conflicts with the network security policy or whether the set of security rules and the set of previously defined security rules are related. The device may perform an action. | 2019-01-03 |
20190007454 | DYNAMIC IMPLEMENTATION OF A SECURITY RULE - A device may receive information identifying a set of conditions related to controlling implementation of a set of security rules. The set of conditions may be associated with a set of security actions that a device is to perform based on whether the set of conditions is satisfied. The device may determine the set of security rules that is to be controlled by the set of conditions using information related to the set of security rules. The device may modify information related to the set of security rules to cause the implementation of the set of security rules to be controlled by the set of conditions. The modification to cause the device to process the set of security rules to dynamically implement the set of security actions based on satisfaction of the set of conditions. The device may perform an action after modifying the information. | 2019-01-03 |
20190007455 | MANAGEMENT OF A HOSTS FILE BY A CLIENT SECURITY APPLICATION - Systems and methods for managing a host name resolution file by a client security manager are provided. In one embodiment, a client security manager acquires a remote host name resolution file maintained by a remote server or a network security appliance and imports the remote host name resolution file into a local host name resolution file of the client computer system. The local host name resolution file is used for resolving host names to internet protocol (IP) addresses on the client computer system. | 2019-01-03 |
20190007456 | ENFORCING MICRO-SEGMENTATION POLICIES FOR PHYSICAL AND VIRTUAL APPLICATION COMPONENTS IN DATA CENTERS - A device may receive policy information associated with a first application group and a second application group. The device may receive network topology information associated with a network. The device may generate a first policy based on the policy information and the network topology information, and generate a second policy based on the policy information and the network topology information. The device may provide, to the virtual network device, information associated with the first policy to permit the virtual network device to implement the first policy in association with network traffic transferred between the first application group and the second application group. The device may provide, to the physical network device, information associated with the second policy to permit the physical network device to implement the second policy in association with network traffic transferred between the first application group and the second application group. | 2019-01-03 |
20190007457 | Access Policies Based on HDFS Extended Attributes - Systems, computer program products and methods implementing access control on a distributed file system are described. A policy engine enforces one or more policies to access a data item stored in the distributed file system by utilizing non-system extended attributes of the data item. The policy engine receives, from a client device, a request to access the data item. The policy engine determines a policy for access the data item. The policy specifies one or more conditions for accessing the data item in one or more extended attributes. The one or more extended attributes are associated with the data item in the distributed file system. The policy determines whether to grant the request to access the data item according to values of the one or more extended attributes. | 2019-01-03 |
20190007458 | METHODS FOR SECURING SERVERLESS FUNCTIONS - A system and methods for protecting a serverless function including analyzing the serverless function to identify vulnerabilities or insecure configurations and a strict set of security permissions required by the serverless function in order to interact with a computing environment as intended. | 2019-01-03 |
20190007459 | LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL - A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials. | 2019-01-03 |
20190007460 | SYSTEM AND METHOD FOR SECURE SYNCHRONIZATION OF DATA ACROSS MULTIPLE COMPUTING DEVICES - A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a plurality of different types of client computer systems in a plurality of formats. The method further comprises associating a security policy with the file, wherein the security policy includes restrictions to limit one or more actions that can be performed with the file, and synchronizing the file to a second client computing system while applying the security policy to provide controls for enforcement of the restrictions at the second client computer system. | 2019-01-03 |
20190007461 | PROVIDING SIP SIGNALING DATA FOR THIRD PARTY SURVEILLANCE - Facilitating surveillance of a targeted user participating in communication sessions over a network, such as a VoIP network, that employs SIP. The method includes receiving a subscription request from a subscriber, the subscription request identifying a targeted user to be monitored, monitoring communication sessions in which the targeted user is a participant, to detect SIP events corresponding to state transitions associated with the communication sessions. A system for facilitating surveillance of a targeted user includes an API operable to receive a subscription request from a third party subscriber, the subscription request identifying the targeted user, wherein the third party subscriber is not a participant in the one or more communication sessions, and a SIP events monitoring module operable to detect one or more predetermined SIP events associated with the communication sessions based on the subscription request and notify the third party subscriber of the detected SIP events. | 2019-01-03 |
20190007462 | MULTI-PLATFORM DIGITAL RIGHTS MANAGEMENT FOR PLACESHIFTING OF MULTIMEDIA CONTENT - Devices, methods, and program products are provided, which support multiple Digital Rights Management (DRM) schemes or platforms during the placeshifting of media content. A given placeshifting session may be initiated between a placeshifting device and a user-controlled client media receiver executing a browser player. In one embodiment, the DRM placeshifting method includes storing, in a memory associated with the placeshifting device, DRM-protected content; receiving a request from the client media receiver over a communications network to stream the DRM-protected content to the device; and obtaining a placeshifting key and initialization instructions for the DRM-protected content. The DRM-protected content is streamed to the client media receiver in an encrypted format accessible with a placeshifting decryption key. In conjunction with streaming the DRM-protected content, initialization instructions is transmitted to the client media receiver containing information utilized by the browser player to obtain the DRM license from a first license server. | 2019-01-03 |
20190007463 | MULTIMEDIA COMPOSITION IN MEETING SPACES - Functions and controls for multimedia sessions are shared amongst pluralities of electronic components, rather than run by a single control unit. A disaggregate multipoint control includes a plurality of electronic components which are, or can be, coupled over a network. The various components are configured to recognize the others and share functions and controls normally associated with a single endpoint device, in order to facilitate a multimedia session. | 2019-01-03 |
20190007464 | TERMINAL, BASE STATION, AND CODEC MODE SWITCHING METHOD - A UE includes an EUTRA-CMR reception unit that receives a codec mode request (EUTRA-CMR) including a codec mode that is determined by an eNB in accordance with a radio condition of the UE, a mode switching notification unit that notifies an encoder of switching to the codec mode included in the received codec mode request; and a mode switching acknowledgement unit that transmits a response message to the eNB when confirming that the encoder switches the codec mode. | 2019-01-03 |
20190007465 | REAL-TIME PLACESHIFTING OF MEDIA CONTENT TO PAIRED DEVICES - Methods, devices, and systems are provided for placeshifting a media program. An exemplary method involves a media device storing identification information for a client device coupled to a network and receiving a request to transfer a media program available for presentation on a primary display device in a first format via the media device. In response to the request, a peer-to-peer communication session with the client device over the network is established using the identification information and an encoded content stream corresponding to the media program is transferred to the client device via the peer-to-peer communication session. | 2019-01-03 |
20190007466 | DYNAMIC ADAPTATION TO INCREASED SFU LOAD BY DISABLING VIDEO STREAMS - A method for dynamically adapting to increased system load at a selective forwarding unit (SFU) is disclosed. In an embodiment, an SFU sends a plurality of video streams to a plurality of participant computing devices. The SFU monitors a system load value on the SFU according to any of a plurality of metrics. When the SFU determines that the monitored system load value exceeds a stored load threshold value, the SFU selects one or more of the streams being sent to participant computing devices and disables them. | 2019-01-03 |
20190007467 | FILES AUTOMATICALLY SHARED AT CONFERENCE INITIATION - The present technology automatically shares materials at the start of a videoconference without requiring a participant to find the materials or instruct the videoconferencing application to share the materials. The conference materials can be automatically shared without any conference participant involvement. The present technology automatically associates materials included in a calendar invitation to the conference or in a shared space referenced in the calendar invitation. These materials can be automatically shared when the conference launches. | 2019-01-03 |
20190007468 | APPARATUS FOR CALL MANAGEMENT AND METHOD THEREOF - An apparatus for extending during a conference call the number of telephone connections being utilized beyond strict numerical capacity is disclosed, together with a method. The method for call management comprises storing a conference table for recording information of agent endpoints that have joined a conference call and having two or more DSP channels. A call is received and the callee endpoint is identified. The number of available agent endpoints in the conference table is also identified, an agent endpoint being identified as available if the number of the DSP channels of the agent endpoint is greater than zero. If there are multiple available agent endpoints, the priority of each available agent endpoint is calculated and the call is redirected to the callee endpoint, with the high-priority agent endpoint in between. | 2019-01-03 |
20190007469 | COPY AND PASTE FOR WEB CONFERENCE CONTENT - Techniques are disclosed for providing copy/paste support for web conference content. Methods and systems allow copy/paste operations in web conference sessions with multimedia content based on data extracted from conference content transmitted during the web conference. The web conference can connect clients for live sharing of documents, audio, video, applications such as web applications, and web pages. In one embodiment, a conference application can receive content from a first client participating in the web conference. The conference application can extract data items from the content. The conference application can store the extracted data items. The conference application can also receive, from a second client participating in the web conference, a selection of a portion of the conference content. The conference application can retrieve extracted data items corresponding to the selection, and then provide, via the web conference, to the second client participating in the web conference, the retrieved data items. | 2019-01-03 |
20190007470 | COMMUNICATING MEDIA DATA - Communicating media data over a communication system in which a first communication instance for a user of the communication system is implemented at a first user terminal, and a second communication instance for the user of the communication system is implemented at a second user terminal. The user is simultaneously logged into the communication system via: (i) the first communication instance at the first user terminal, and (ii) the second communication instance at the second user terminal. A media communication session is established between the first and second communication instances, wherein the media communication session is authenticated on the basis of the same user being simultaneously logged into the communication system via both the first and second communication instances. Media data is communicated in the media communication session from the first communication instance at the first user terminal to the second communication instance at the second user terminal. | 2019-01-03 |
20190007471 | RECEPTION DEVICE, RECEPTION METHOD, TRANSMISSION DEVICE, AND TRANSMISSION METHOD - The present technology relates to a reception device, a reception method, a transmission device, and a transmission method in which a convergence service of broadcasting and communication can be realized more effectively. A FLUTE processing unit is configured to acquire one or more components constituting a specific service of a plurality of services included in broadcast waves of digital broadcasting using an IP transfer system, in accordance with a first control signal including information indicating types and a transfer system of the one or more components constituting the specific service such that the convergence service of broadcasting and communication can be realized more effectively. The present technology is applicable to, for example, a television receiver. | 2019-01-03 |
20190007472 | VEHICLE ENTERTAINMENT SYSTEM - A vehicle entertainment system including a server storing media files, and smart monitors. The system includes a server disposed in the vehicle to store media files; smart monitors disposed in the vehicle to present media selections to passengers corresponding to the media files stored by the server and receive an input from a passenger for playing one of the selections; seat boxes disposed in the vehicle, each seat box including network-attached storage and storing a subset of the media files stored by the server in said network-attached storage. Program logic executed by each smart monitor in which after a smart monitor receives an input from a passenger for one of the selections, performs tasks including: determining if a media file corresponding to the passenger's input is available from a first source, and if available, requesting streaming of the media file from the first source that may be networked attached storage. | 2019-01-03 |
20190007473 | PEER-TO-PEER NETWORK LIVE STREAMING SYSTEM AND NODE MANAGEMENT METHOD - The present disclosure provides a peer-to-peer network live streaming system, comprising at least two nodes and a first server. The first server is used to establish a connection between the nodes to enable the nodes to share node information. At least either of the nodes is configured with an evaluation module and a purging module. The evaluation module calculates and analyzes a health value for the corresponding connected node based on the node information, and feeds the result to the purging module to determine whether to continue to use or purge the evaluated node. | 2019-01-03 |
20190007474 | METHODS AND APPARATUS FOR PROACTIVE MULTI-PATH ROUTING - Methods, systems, and devices are described to proactively adapt media streaming by a number of media player clients over a network. Each media player requests segments of an adaptive media stream for playback. In implementations, some or all of the media players in the system are able to measure packet loss or other indicia of issues with the data transmission. This indicia can be used to adapt subsequent requests for additional segments of the media stream. Moreover, some implementations could provide the measured packet loss or other indicia to the server as feedback. The server, in turn, can use the feedback from the players (along with any other additional information) to formulate business rules subsequently delivered to some or all of the players in the system. The media players can therefore adapt their segment request based upon locally measured data and/or based upon business rules that reflect system-wide conditions. | 2019-01-03 |
20190007475 | Transport Layer Network Service for Live Content Broadcasting - Aspects of the subject disclosure may include, for example, a virtual processing system initiating a first streaming session with a content streaming server to receive content data, creating a first transport connection with a viewer streaming the content data in a second streaming session with the content streaming server by imitating a transport connection of the content streaming server with the viewer, creating a second transport connection with the content streaming server by imitating a transport connection of the viewer with the content streaming server, splitting the first streaming session between the content streaming server and the viewer, and streaming the content data to the viewer. Other embodiments are disclosed. | 2019-01-03 |
20190007476 | MAPPING A LOW QUALITY MEDIA FILE TO A SEGMENT OF A HIGH QUALITY MEDIA FILE - In a computer-implemented method for mapping a low quality media file to a segment of a high quality media file, the low quality media file and the high quality media file are received, where the low quality media file corresponds to a segment of the high quality media file. A plurality of perceptual hashes is generated for frames of the low quality media file. A portion of the plurality of perceptual hashes for frames of the low quality media file are compared to perceptual hashes for frames of the high quality media file. A location within the high quality media file that includes the segment corresponding to the low quality media file is determined based on the comparing the portion of the plurality of perceptual hashes for frames of the low quality media file to perceptual hashes for frames of the high quality media file. | 2019-01-03 |
20190007477 | SYSTEMS AND METHODS FOR WEB API COMMUNICATION - A method of communication between devices is provided. The method comprises receiving a connection request, establishing a connection in response to the connection request, and receiving a first web API request on the connection. The method further comprises executing a first procedure in response to the first web API request, receiving a second web API request on the connection, and executing at least one of the first procedure or a second procedure in response to the second web API request. | 2019-01-03 |
20190007478 | DELAYING PUBLICIZING, AT A SECOND SOURCE, UPLOAD OF A CONTENT ITEM TO A FIRST SOURCE UNTIL CONFIRMATION OF AVAILABILITY OF THE CONTENT ITEM AT THE FIRST SOURCE - Systems and methods are provided for delaying publicizing, at a second source, upload of a content item to a first source, until confirmation of availability of the content item at the first source. In one or more aspects, a system includes an upload component configured to upload content to a content server, a share component configured to receive selection of a sharing source to post a notification that informs users regarding availability of the content at the content server, a confirmation component configured to receive confirmation from the content server in response to the content becoming available at the content server following the upload of the content, and a notification component configured to post the notification at the sharing source in response to receipt of the confirmation. | 2019-01-03 |
20190007479 | Multimedia Data Transmission Method and Device - The present application provides a multimedia data transmission method and device, wherein the method comprises: a first transmission device located in a first network obtaining a multimedia file descriptor and a multimedia file to be transmitted which have a correspondence, wherein the multimedia file descriptor and the multimedia file are stored in different memories; the first transmission device encoding content of the multimedia file descriptor and content of the multimedia file into a multimedia transmission file in a first format according to a predetermined rule; the first transmission device sending the multimedia transmission file to a second transmission located in a second network. With the present application, the problem that multimedia data cannot be transmitted synchronously during ferrying in related arts is solved and the security and confidentiality of multimedia data transmission is ensured while the multimedia data is transmitted synchronously. | 2019-01-03 |
20190007480 | METHODS, SYSTEMS, AND MEDIA FOR STORED CONTENT DISTRIBUTION AND ACCESS - Methods for distributing and providing access to stored content from remote storage comprising: receiving a first request to access a first portion of stored content from a requestor, wherein the first request is in a file system request format; creating a placeholder for the stored content so that the placeholder has at least one parameter identical to the stored content and the placeholder can hold the first portion of the stored content and at least a second portion of the stored content; requesting the first portion of the stored content from remote storage; receiving the first portion of the stored content from the remote storage; storing the first portion of the stored content in the placeholder; and before the second portion of the stored content has been stored in the placeholder, providing the first portion of the stored content to the requestor using a file system response format. | 2019-01-03 |
20190007481 | MEDICAL IMAGE CAPTURING SYSTEM - A medical image management system includes a server apparatus, and a plurality of client terminals connected to the server apparatus to be able to communicate data. At least one client terminal includes a Web browser, an operating unit to perform input on the browser, a client terminal controller which controls transmitting of information input on the operating unit from the client terminal to the server apparatus, and a display which displays the browser. The server apparatus, a Web server apparatus, includes storage which stores information including, stored user ID and password associated with each other, the medical image, and patient information related to the medical image, and a server apparatus controller which controls transmitting of at least a portion of the stored information from the server apparatus to the client terminal, the information stored in the storage in response to the input information transmitted from the client terminal. | 2019-01-03 |
20190007482 | SYSTEMS AND METHODS FOR CROSS-CLUSTER SERVICE PROVISION - Computer-implemented methods and systems are provided for cross-cluster service provision. Consistent with disclosed embodiments, a system for cross-cluster service provision includes a first computing cluster and a second computing cluster. The first cluster includes service-providing nodes, and a first controller that collects status information concerning the service-providing nodes, the status information indicating at least one service-providing node endpoint. The second computing cluster includes service-consuming nodes, a service that receives requests for the service from the service-consuming nodes and distributes the requests among a set of specified endpoints, and a second controller that performs health checks on the specified endpoints, retrieves the status information from the first controller, and updates the set of specified endpoints based on the status information. | 2019-01-03 |
20190007483 | SERVER ARCHITECTURE HAVING DEDICATED COMPUTE RESOURCES FOR PROCESSING INFRASTRUCTURE-RELATED WORKLOADS - Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing server architectures having dedicated systems for processing infrastructure-related workloads. For example, a computing system includes a server node. The server node includes a first processor, a second processor, and a shared memory system. The first processor is configured to execute data computing functions of an application. The second processor is configured to execute input/output (I/O) functions for the application in parallel with the data computing functions of the application executed by the first processor. The shared memory system is configured to enable exchange of messages and data between the first and second processors. | 2019-01-03 |
20190007484 | SCALABLE AND SECURE VEHICLE TO EVERYTHING COMMUNICATIONS - A method for scalable and secure vehicle to everything communications may include receiving, at a communications management device, telematics data from a plurality of vehicles. The method may further include segregating the plurality of vehicles into initial clusters based on the telematics data, and dividing the initial clusters into binary space partitions having various sizes, where the size of each binary space partition is based on a maximum number of vehicles in the binary space partition. The method may include determining, for a selected vehicle within an associated binary space partition, a metric representing a suitability of communications between the selected vehicle and other vehicles in the associated binary space partition, receiving updated telematics data from the plurality of vehicles, shifting the initial clusters based on the updated telematics data, and updating the binary space partition based on the shifted clusters. | 2019-01-03 |
20190007485 | METHOD AND APPARATUS FOR EXCHANGING DATA IN WIRELESS COMMUNICATION SYSTEM - The present specification relates to a method for performing, by a NAN terminal, a data exchange in a wireless communication system. | 2019-01-03 |
20190007486 | Tapered Coax Launch Structure for a Near Field Communication System - A system is provided in which a set of modules each have a substrate on which is mounted a radio frequency (RF) transmitter and/or an RF receiver. Each module has a housing that surrounds and encloses the substrate. The housing has a port region on a surface of the housing. Each module has a tapered near field communication (NFC) field confiner located between the substrate and the port region on the housing configured to guide electromagnetic energy produced by the RF transmitter to the port region so that it can be emanated to a port region of an adjacent module. | 2019-01-03 |
20190007487 | SYSTEM AND METHOD FOR SYNCHRONIZING ONE OR MORE ALTERNATIONS IN A WORK PRODUCT - The present application discloses a method | 2019-01-03 |
20190007488 | DEVICE AND METHOD FOR PROVIDING CLOUD SERVICE - The present disclosure relates to a cloud service providing device and method. The cloud service providing device includes a body; a first connection unit formed in one face of the body, wherein a first storage unit is connectable to the first connection unit; a second connection unit formed in one face of the body, wherein a second storage unit is connectable to the second connection unit; a communication unit for performing communication with a user terminal; and a control unit for controlling the communication unit so that the first storage unit and the user terminal exchange data with each other when the first storage unit is connected to the first connection unit. In this way, data stored in an to existing storage unit into a separate storage unit according to a preset period may allow preventing data loss due to failure of the existing storage unit. | 2019-01-03 |
20190007489 | System and Methods for Running a Condition-Triggered Process Involving Movement of Objects from a Node to at least one other Node Until a Condition with a Set of Parameters Are Met By An Event - Disclosed is a system and method for at least one finite-state process for enabling an automated task flow, said method comprising the steps of: listing of necessary states significant for a data processing; determining data parameters used for designation of necessary states; assembling a data structure and a process (object) corresponding to information about at least one necessary state significant for the process; and running the process involving movement of objects from a node to at least one other node for a perpetual run until a condition with a set of parameters are met by an event. | 2019-01-03 |
20190007490 | Local Service Node Improving the User Experience - A method in a central node, for migration of data and/or application modules from a remote service node to a local service node residing in a vehicle, the method comprising determining that a first condition is met that indicates a request to migrate data and/or application modules from a remote service node to a local service node and initiating a first migration of data and/or application modules based on whether the first condition is met. | 2019-01-03 |
20190007491 | SYNCHRONIZING DATA BETWEEN PERSONAL AND TIMECODE DEVICES - A method for acquiring media of the same event from multiple devices can include synchronizing, using at least one timecode module configured to receive timecode data over a wireless network, a personal device and a professional device, acquiring media data with the synchronized devices, associating the timecode data with the acquired media, and merging acquired media data from the personal device with the acquired media data from the professional device. The merging can be based, at least in part, on the timecode data. | 2019-01-03 |
20190007492 | WEB APPLICATION SYSTEM, SERVER, TERMINAL, AND STORAGE MEDIUM - A web application system of an embodiment includes a server and a terminal. The server includes a server-side updating device, a server-side detection device, and a server-side synchronization device. The terminal includes an application execution device. The server-side updating device updates first information stored in a server-side storage device on the basis of a server-side event. The server-side detection device detects that the first information has been updated. The server-side synchronization device notifies the terminal of information indicating that the first information has been updated when it is detected that the first information has been updated. The application execution device functions by a web application being executed. Further, the application execution device starts synchronization of second information stored in a terminal-side storage device with the first information when information indicating that the first information has been updated is received from the server. Further, the application execution device executes a process based on the second information according to an operation of a user. | 2019-01-03 |
20190007493 | DATA COMPRESSION IN A DISPERSED STORAGE NETWORK - A method for execution by a dispersed storage and task (DST) processing unit includes receiving a write request that includes a data object. Characterization data is generated by determining a data type of the data object. Object constraint data is generated by determining a compressibility of the data type and a processing cost of the data type. Optimized trade-off data is generated by optimizing a plurality of trade-off constraints based on the object constraint data. A compression algorithm is selected from a plurality of compression algorithm options based on the optimized trade-off data. A compressed data object is generated by performing the selected compression algorithm on the data object. A plurality of data slices are generated for transmission to a plurality of storage units for storage by performing an information dispersal algorithm on the compressed data object. | 2019-01-03 |
20190007494 | SINGLE MULTI-INSTANCE TENANT COMPUTING SYSTEM - Directory information and content for two separate tenants are merged by identifying a first of tenants as a hub tenant and a second of the tenants as a satellite tenant. The hub tenant is modified to include two instances, or data containers, one instance for the hub tenant and another instance for the satellite tenant. Directory merger logic re-associates identity account items in the satellite instance, with the hub instance, by replacing a tenant identifier in the identity account items of the satellite instance with a tenant identifier corresponding to the hub instance. Unique identifiers for users of the satellite instance are maintained unchanged. Content merger logic re-associates content items of the satellite instance with the hub instance by setting a tenant identifier for all satellite content items to the tenant identifier corresponding to the hub instance. A tenant identifier corresponding to backend services that support the content items can be updated to the tenant identifier corresponding to the hub instance as well. | 2019-01-03 |
20190007495 | DATA PROCESSING AND DATA MOVEMENT IN CLOUD COMPUTING ENVIRONMENT - A plurality of data sets to be moved from a source site to a target site in a cloud computing platform is received at a plurality of a containerized data ingest components located at the source site. The received plurality of data sets are provided from the plurality of data ingest components to a staging cluster comprising a plurality of containerized broker components located at the source site, wherein the plurality of containerized broker components queue the plurality of data sets. The queued plurality of data sets are provided from the plurality of containerized broker components to a processing cluster comprising a plurality of containerized data processing components, wherein the plurality of containerized data processing components process the plurality of data sets. The plurality of data sets is transmitted from the plurality of containerized data processing components to the target site. | 2019-01-03 |
20190007496 | COORDINATOR FOR LOW POWER SENSOR NETWORK WITH TREE OR STAR TOPOLOGY - An embodiment of network coordinator apparatus may include a node provisioner to provision each of a plurality of low power nodes, a node associater to create a first association for each of the plurality of lower power nodes, and a node coordinator communicatively coupled to the node provisioner and the node associater to coordinate the plurality of lower power nodes. | 2019-01-03 |
20190007497 | METHOD FOR DETERMINING A TEMPORAL REFERENCE AND/OR AT LEAST ONE SPATIAL REFERENCE IN A COMMUNICATION SYSTEM - For determining a temporal reference and/or at least one spatial reference, in a communication system comprising a plurality of gathering gateways configured to transmit beacons, a device performs for each beacon: obtaining ( | 2019-01-03 |
20190007498 | DEVICE COOPERATION SUPPORT SYSTEM - A device cooperation support system includes a user apparatus configured to receive an operation result output from an external device, to output a control signal for operating the external device, and to perform device cooperation control based on a device cooperation rule, and a device cooperation support apparatus configured to support device cooperation between the user apparatus and the external device. The device cooperation support apparatus receives registration of an external device from a device registrant, creates the device cooperation rule by combining condition clause information with execution clause information created on the basis of device operation definition information of the registered external device, and delivers the device cooperation rule to the selected user apparatus based on association between the selected user apparatus and the device cooperation rule. | 2019-01-03 |
20190007499 | Communication Management Method and System for Auto-bookmark - The present disclosure relates to the field of communication management, more particularly, communication management methods and systems for session visit auto-bookmarking. In one disclosed embodiment, a communication management server is disclosed. The communication management server comprises a memory storing a set of instructions, and at least one processor configured to execute the instructions to receive communication messages from a plurality of user devices, store the communication messages in a communication content database, provide communication content for display on the user device, receive a display suspension instruction, and generate a visit bookmark indicating a last displayed message in the communication content. | 2019-01-03 |
20190007500 | METHOD FOR PROTOCOL DATA UNIT (PDU) SESSION ANCHOR RELOCATION AND 5G NETWORK REGISTRATION - Provided is a method of relocating a session and service continuity (SSC) mode 2 protocol data unit (PDU) session anchor by a session management function (SMF) device, the method including determining a relocation of a PDU session anchor; releasing a PDU session associated with an old PDU session anchor by sending, to a user equipment (UE), N1 SM information including a PDU session release command message through an access and mobility management function (AMF) device; and selecting a new PDU session anchor to establish a PDU session associated with the new PDU session anchor. | 2019-01-03 |
20190007501 | METHOD AND APPARATUS FOR DYNAMIC DESTINATION ADDRESS CONTROL IN A COMPUTER NETWORK - An arrangement to direct a packet sent out from an arbitrary apparatus connected to a network to a predetermined authentication server without changing the configuration of a computer network. A packet transmitted from apparatus, such as a personal computer, newly connected to the network, is guided to an authentication server via communication control apparatus. The communication control apparatus replaces a MAC address of the destination addresses of another server, which is included in the ARP cache of the personal computer, with the MAC address of the communication control apparatus to guide the packet from the personal computer to the communication control apparatus. The communication control apparatus further transmits the received packet to a predetermined authentication server. | 2019-01-03 |
20190007502 | Method For Providing A Service To A User Equipment Connected To A First Operator Network Via A Second Operator Network - One aspect of the disclosure relates to a method for providing a service to a user equipment connected to a first operator network. The second operator network comprises a register containing subscription information of the user equipment. The method comprises a number of steps. One of these steps is receiving from the first operator network a service request of the user equipment, the service request being associated with the service. Another step is obtaining a service-deployment-specification for the second operator network comprising at least one network function associated with the service on the basis of the service request. Yet another step is converting the service-deployment-specification for the second operator network into a generic specification, the generic specification enabling execution of the at least one network function in the first operator network for providing the service to the user equipment. Yet another step is transmitting the generic specification to the first operator network. The invention further relates to systems and nodes in the first and second operator network, and to a computer program product for performing methods for providing the service. | 2019-01-03 |
20190007503 | METHODS, SYSTEMS, AND APPARATUS FOR GEOGRAPHIC LOCATION USING TRACE ROUTES - Conventional efforts for estimating the geographic location (geolocation) of devices associated with particular Internet Protocol (IP) addresses typically yield woefully inaccurate results. In many cases, the estimated IP geolocations are on the wrong continent. Embodiments of the present technology include techniques for identifying and improving incorrect estimates based on latency measurements, Domain Name Server (DNS) information, and routing information. For example, latency measurements from multiple collectors can be used to rate the plausibility of an IP geolocation estimate and, in certain cases, to increase the accuracy of the IP geolocation estimate. DNS and routing information can be used to corroborate the estimated IP geolocation. The resulting more accurate IP geolocation estimate can be used to route Internet traffic more efficiently, to enforce rules for routing sensitive information, and to simplify troubleshooting. | 2019-01-03 |
20190007504 | CALIBRATION DATA TRANSMISSIONS - Example implementations relate to calibration data transmissions. For example, a computing device includes a storage device to store calibration data of an electronic device coupled to the computing device. The computing device also includes a network interface to establish a network connection with a second computing device. The computing device further includes a processor to automatically transmit, via the network connection, the calibration data to the second computing device based on a location of the second computing device relative to the computing device and based on an association with second computing device via a communication session. | 2019-01-03 |
20190007505 | IoT Gateway For Weakly Connected Settings - A gateway that may be implemented in a local network and that communicates with a cloud network to provide efficient services in a weakly connected setting is disclosed. The gateway may be configured to enable services that efficiently utilize resources in both of the gateway and the cloud network, and provide a desired quality of service while operating in a weakly connected setting. The gateway may provide data collection and processing, local network services, and enable cloud services that utilize data collected and processed by the gateway. The local network may include one or more sensors and/or video cameras that provide data to the gateway. In a further implementation, the gateway may determine an allocation of one or more tasks of a service between the gateway and a cloud network by determining the allocation of the one or more service tasks based on desired service latency. | 2019-01-03 |
20190007506 | ANALYZING TRACKING REQUESTS GENERATED BY CLIENT DEVICES INTERACTING WITH A WEBSITE - An online system receives tracking requests from client devices interacting with a website to analyze user interactions with the website. The website provides instructions with web pages sent to a client device that cause the client device to send tracking instructions to the online system. The tracking instructions included in web pages of the website may include deficiencies. For example, certain web pages may not include tracking instructions, the tracking instructions may identify web pages incorrectly, or may not provide significant data values with the tracking requests, and so on. The online system sends requests for web pages to the website, receives a plurality of web pages from the website, and determines a count of distinct web pages provided by the website. The online system determines a score for the web site indicating a quality of tracking instructions of the website based on various factors, including an aggregate value based on the distinct webpages of the website that include tracking instructions and the count of distinct web pages provided by the website. Based on this score, the online system generates a report describing a quality of the tracking instructions of the website. | 2019-01-03 |
20190007507 | SELECTING CONTENT FOR HIGH VELOCITY USERS - Disclosed are systems, methods, and computer-readable storage media to select content to present to a user are disclosed. In one aspect, a method includes determining a content consumption rate of the user, and selectively presenting content to the user based on the content consumption rate. The content consumption rate may be determined based on a number of media content presented to the user over a period of time. If the number is above a threshold, a first type of content may be presented, while if the number is below (or equal) to the threshold, a second type of content, or in some aspects, no content, may be presented. After the selective presentation, additional content may be presented regardless of the content consumption rate. | 2019-01-03 |
20190007508 | ANALYZING TRACKING REQUESTS GENERATED BY CLIENT DEVICES INTERACTING WITH A WEBSITE - An online system receives tracking requests from client devices interacting with a website. The online system analyzes user interactions with websites using the tracking requests. The online system predicts an accurate label for the web page that caused the tracking request to be generated. The online system uses the accurate label for generating reports describing user interactions with the website. The online system determines a quality of tracking requests generated by the website based on various factors including a number of web pages of the website that generate tracking requests, the type of information provided by the tracking requests, and so on. The online system generates reports describing the quality of the tracking requests. The online system uses a metric indicating the quality of tracking requests of the website to determine whether to use predicted labels instead of labels provided by tracking requests for generating reports of the website. | 2019-01-03 |
20190007509 | DYNAMIC RULE ALLOCATION FOR VISITOR IDENTIFICATION - Embodiments of the present invention relate to identifying website visitors. Initially, a predictor is trained with a set of data of known website visitors to identify a rule with the highest effectiveness score. To do so, each rule in a set of rules is applied to all cookies in the set of data. Based on a selected goal of identifying unknown website visitors, the rule with the highest effectiveness score is identified. To identify a cookie of an unknown website visitor, a cookie representation corresponding to the cookie is identified. The cookie representation represents the cookie as an n-dimensional vector of features and is computed using hit statistics for various aspects of the cookie. Utilizing the cookie representation, a cookie-stitching rule is selected and applied to the cookie. In this way, a website visitor associated with the cookie can be identified. | 2019-01-03 |
20190007510 | ACCUMULATION OF REAL-TIME CROWD SOURCED DATA FOR INFERRING METADATA ABOUT ENTITIES - Various technologies pertaining to crowd sourcing data about an entity, such as a business, are described. Additionally, technologies pertaining to inferring metadata about the entity based upon crowd sourced data are described. A sensor in a mobile computing device is activated responsive to a user of the mobile computing device checking in at an entity. Metadata, such as occupancy at the entity, noise at the entity, and the like is inferred using the data captured by the sensor. A search result for the entity includes the metadata. | 2019-01-03 |
20190007511 | ISSUING ALERTS FOR IoT DEVICES - In one example embodiment, a computer-implemented method and system for issuing alerts are disclosed. The method includes receiving device information for one or more mobile devices; sorting the received device information based on pre-determined criteria; evaluating the sorted device information to determine if the device information satisfies a specified condition; and issuing alert based on the determination. The system for issuing alerts includes a storage database, wherein the storage database receives device information for one or more mobile devices; an analytics engine, wherein the analytics engine sorts the received device information based on pre-determined criteria; a rules engine, wherein the rules engine evaluates the sorted device information to determine if the device information satisfies a specified condition and issues alerts based on the determination. | 2019-01-03 |
20190007512 | ANALYTICS AND DATA VISUALIZATION THROUGH FILE ATTACHMENTS - Example system and method for providing analytics and data visualization of an attached file in an attachment-enabled application are provided. An analysis system causes presentation of an option to perform analysis on a file attached to main data in an attachment-enabled application. The analysis system receives an indication of a selection of the option to perform the analysis on the attached file, whereby the analysis to be performed without user download of the attached file. The analysis system determines, based on data corresponding to the attached file, one or more data sets on which to perform the analysis and a result type for outputting of a result, and performs analysis on the one or more data sets to generate the result based on the result type. The analysis system causes presentation of the result based on the result type. | 2019-01-03 |
20190007513 | SEMANTICS BASED CONTENT SPECIFICATON OF IOT DATA - An M2M entity may retrieve data such that the representation of the data may consistently be returned in a form that can be dynamically specified in order to reduce complexity and overhead required by a requestor or consumer of the data. The semantic descriptions of the data that exist in the service layer may be used in order to provide desired results to the requestor or consumer of the data. | 2019-01-03 |
20190007514 | EXTENDING CACHING NETWORK FUNCTIONALITY TO AN EXISTING STREAMING MEDIA SERVER - A content delivery network (CDN) includes multiple cluster sites, including sites with streaming media servers, caching servers and storage devices accessible to the caching servers for storing streaming content. Interface software is configured to initiate retrieval, by a caching server, of electronic streaming resources from the one or more storage devices in response to requests for the electronic streaming resource received by the streaming media server. | 2019-01-03 |
20190007515 | REQUEST MANAGEMENT FOR HIERARCHICAL CACHE - A computer implemented cache management system and method is provided for use with a service provider configured to communicate with one or more client devices and with a content provider. The system includes a cache hierarchy comprising multiple cache levels that maintain at least some resources for the content provider, and one or more request managers for processing client requests for resources and retrieving the resources from the cache hierarchy. In response to a resource request, the request manager selects a cache level from the cache hierarchy based on a popularity associated with the requested resource, and attempts to retrieve the resource from the selected cache level while bypassing cache level(s) inferior to the selected level. | 2019-01-03 |
20190007516 | RESOURCE REQUESTS - Examples disclosed herein relate, among other things, to a first computing device including a server optimization module communicatively coupled to a server application. The server optimization module may receive, from a second computing device, a resource request identifying a resource, and send to the second computing device a packet list identifying a set of packets associated with the resource, where each packet describes differences between different versions of the resource. The server optimization module may also receive from the second computing device a set of packet requests, each packet request identifying a packet from the set of packets, and for each packet in the set of packets, send the packet to the second computing device based on a determination that the packet has been updated since the packet has been last sent to the second computing device. | 2019-01-03 |
20190007517 | SENSOR PROCESSING ENGINE FOR MOBILE DEVICES - Systems, methods and instrumentalities are disclosed for supplying information about a user of a mobile device, comprising receiving a request for a characteristic of the user, receiving criteria for one or more sensors of the mobile device to be used in determining the characteristic, selecting one or more available sensors by comparing the request and criteria to available sensors and the properties of the available sensors, acquiring data from the selected available sensors, determining a property of interest from the data, the property of interest corresponding to the characteristic of the user, and sending the determined property of interest. | 2019-01-03 |
20190007518 | METHOD FOR DEFINING NETWORK APPLICATION SECURITY BASED ON DECLARATIVE PROPERTIES - One or more embodiments provide techniques for processing a request for generating a network diagram for a multi-tier application to be deployed on a cloud computing environment. A deployment director receives a request to deploy the multi-tier application to the cloud computing environment. Deployment director receives an application blueprint of the multi-tier application from an application director. The application blueprint includes logical attributes and logical connections of each component. Deployment director receives an identification of the cloud computing environment. Deployment director generates a network diagram compatible with the cloud computing environment based on at least the application blueprint. The network diagram illustrates physical network structure of the cloud computing environment. Deployment director displays the network diagram. | 2019-01-03 |
20190007519 | SYSTEM FOR SENDING DIGITAL REQUESTS FOR RESOURCE TRANSFERS - The invention provides a gateway system for sending and coordinating digital requests for resource transfers amongst various computing systems. Typically, the various computing systems are configured to operate on different hardware and/or software platforms. Accordingly, the gateway system communicates with the various computing systems via an API, which provides an efficient way to coordinate resource transfers amongst the various computing systems while ensuring present and future compatibility with the various platforms during the resource transfer process. | 2019-01-03 |
20190007520 | ELECTRONIC DEVICE AND OPERATION METHOD THEREOF AND SERVER HOST DEVICE - An operation method of an electronic device is provided according to one embodiment. The electronic device includes an input interface, an output interface, a storage circuit and a network module, and the operation method includes: receiving an operation instruction through the input interface; generating a service request according to the operation instruction, wherein the service request includes service identification information; and if the network module is not connected to a network, extracting offline service information corresponding to the service identification information from the storage circuit, and presenting the offline service information through the output interface. | 2019-01-03 |
20190007521 | Beacon Services in a Content Delivery Framework - A computer-implemented method in a content delivery network (CDN) comprising multiple content delivery (CD) services including at least one beacon service, the method comprising: at particular CD service in the CDN: (A) obtaining and responding to at least one first request; (B) obtaining and responding to at least one second request; and (C) making a beacon request to a beacon CD service, the beacon request including particular information about: (i) the at least one first request, and (ii) the at least one second request, wherein at least some of the particular information is encoded in the beacon request, wherein the beacon request comprises an HTTP request. | 2019-01-03 |
20190007522 | METHOD OF OPTIMIZING TRAFFIC IN AN ISP NETWORK - The present invention discloses a scheme of integrating Information Centric Networking Mechanisms into a Content Distribution Network. Methods are provided respectively for an internet service provider domain name server, ISP DNS, a publisher name server, an auxiliary network node, a client node, and an edge cache. According to the present invention, in a resolution procedure, a client node asks the ISP DNS to resolve a content name, then the ISP DNS queries the publisher name server to get a first resolution result which will be then transmitted by the ISP DNS to the auxiliary network node to obtain a second resolution result. At the end of the resolution procedure, the second resolution result is transmitted back to the client. During a delivery procedure, the client node may transmit a request comprising the content name and the second resolution result to an edge cache that is indicated in the second resolution result. In case of cache miss, the edge cache will forward the request to other edge cache indicated in the second resolution results. Alternatively or additionally, the edge cache may ask an ISP DNS to resolve the content name to get neighboring edge caches holding copies of the content fragment cached from prior requests of other clients. | 2019-01-03 |
20190007523 | AUTOMATIC DETECTION OF HUMAN AND NON-HUMAN ACTIVITY - Systems, methods, and computer-readable storage media are provided for determining whether a user is a human agent or a non-human agent. A user is initially classified as a human or non-human agent based on user request properties. Sensor data is received from the user device and used to determine whether the user is to be reclassified as a human agent or non-human agent. Based on the sensor data, the user is then reclassified as a human agent or non-human agent. A service is adapted based on the classification. | 2019-01-03 |
20190007524 | Content Analysis Based Selection of User Communities or Groups of Users - A mechanism is provided in a data processing system for content analysis based automatic selection of user communities or groups of users. The mechanism receives content to be published from a user and performing content analysis on the content to identify a context of the content. The mechanism identifying a social collaboration community based on the user's associations with social collaboration communities, the context of the content, and a community registry of social collaboration communities. The mechanism publishes the content in the identified social collaboration community. | 2019-01-03 |
20190007525 | SERVICE AUTHORIZATION HANDSHAKE - The present document describes systems and methods that authorize client resources such as computers, servers, computing appliances, and virtual machines to access online services provided by an online service provider. To authorize a client resource, a client submits a registration request on behalf of the client resource to an authorization service provided by the service provider. The authorization service returns an activation code to the client. The activation code may expire after an amount of time, or upon first use. The client provides the activation code to an agent running on the client resource. The agent establishes communication with the authorization service, and upon providing the activation code to the authorization service, receives an authorization token that can be used by the client resource to access online services in accordance with security roles or permissions specified with the registration request. | 2019-01-03 |