03rd week of 2022 patent applcation highlights part 65 |
Patent application number | Title | Published |
20220021691 | CREATION OF GENERALIZED CODE TEMPLATES TO PROTECT WEB APPLICATION COMPONENTS - Techniques to facilitate protection of web application components are disclosed herein. In at least one implementation, a plurality of web resources associated with a web applications is received. The plurality of web resources is processed to generate individual generalized code templates for each of the web resources by removing data constants and code formatting elements from the web resources. A set of the individual generalized code templates for each of the web resources is stored in a probabilistic data structure. A security web module comprising the probabilistic data structure having the set of the individual generalized code templates for each of the web resources stored therein is deployed to protect the web application. | 2022-01-20 |
20220021692 | SYSTEM AND METHOD FOR GENERATING HEURISTIC RULES FOR IDENTIFYING SPAM EMAILS - Disclosed herein are systems and methods for generating heuristic rules for identifying spam emails based on fields in headers of emails. In one aspect, an exemplary method comprises, collecting statistical data on contents of a plurality of emails; analyzing the statistical data to identify different types of content, including headers or hyperlinks in said emails; grouping the emails into clusters based on types of content identified in said emails, wherein at least one cluster group being based on fields in headers of said emails; generating a hash from the most frequent combination of group of data in each cluster; formulating regular expressions based on analysis of hyperlinks of emails corresponding to the generated hashes; and generating heuristic rule for identifying spam emails by combining the hashes and the corresponding regular expressions, wherein the hash is generated based on fields in the headers of said emails. | 2022-01-20 |
20220021693 | TRUSTED TRAVEL DEVICES EQUIPPED WITH ON-THE-FLY MONITORING - A method for enhancing travel security features associated with a mobile device is provided. The method may include operating a time clock on the mobile device to determine a start device confiscation time in the memory and to determine an end device confiscation time in the memory. The method may also include monitoring the operation of the mobile device between the start device confiscation time and the end device confiscation time to determine the existence of an anomalous device condition. The monitoring may include using a network traffic monitor device, a bandwidth usage monitor device, a battery performance monitor device, a website presentation monitor device, and/or central processing usage monitor device. The monitoring may record a device activity between the start time and the end time and flag the anomalous device condition that occurred between the start time and the end time. | 2022-01-20 |
20220021694 | DETECTING INJECTION ATTACKS USING PASSIVE NETWORK MONITORING - Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). NMCs may determine requests provided to a server based on a first portion of network traffic. NMCs may determine suspicious requests based on characteristics of the provided requests. NMCs may employ the characteristics of the suspicious requests to provide correlation information that is associated with the suspicious requests. NMCs may determine dependent actions associated with the server based on a second portion of the network traffic and the correlation information. And, in response to determining anomalous activity associated with the evaluation of the dependent actions, NMCs may provide reports associated with the anomalous activity. | 2022-01-20 |
20220021695 | METHOD AND SYSTEM FOR ADAPTIVE NETWORK INTRUSION DETECTION - A method adapts network intrusion detection. The method includes: a) deploying a network traffic capture system and collecting network packet traces; b) using a network audit tool, extracting features from the collected network packet traces; c) feeding the extracted features as unlabeled data into a representation function, and, utilizing the representation function as an unsupervised feature learning algorithm, learning a new representation of the unlabeled data; d) providing a labeled training set capturing examples of malicious network traffic, and, using the learned new representation of the unlabeled data, modifying the labeled training set to obtain a new training set; and e) using the new training set, training a traffic classification machine learning model. | 2022-01-20 |
20220021696 | Minimizing Production Disruption Through A Scan Rule Engine - This technology is directed to a rules based engine for managing network-based scanning of devices on a network to minimize disruptions to the network. One or more processors may identify an initial group of network devices from a set of network devices, the initial group of network devices being identified in accordance with a rule set, and initiate a scan of the initial group of network devices. The one or more processors may determine, in accordance with the rule set, an additional group of network devices from the set of network devices to be scanned and initiate a scan of the additional group of network devices. The steps may be repeated until all network devices in the set of network devices are scanned in accordance with the rule set. | 2022-01-20 |
20220021697 | NETWORK ASSET RISK ANALYSIS - Apparatuses, methods, systems, and program products are disclosed for network asset risk analysis. An apparatus includes an asset module that identifies a plurality of network assets of a data network, a risk module that calculates a risk level for each of the plurality of network assets based on a plurality of factors, and an interface module that provides an interactive interface that graphically presents the data network and visually highlights each of the plurality of network assets according to their calculated risk levels. | 2022-01-20 |
20220021698 | GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS - Implementations of the present disclosure include providing a graph that is representative of an enterprise network and includes nodes and edges, a set of nodes representing assets within the enterprise network, each edge representing a lateral movement path between assets, determining, for each asset, a contribution value indicating a contribution of an asset, determining lateral movements paths between a first asset and a second asset, providing a lateral movement path value representative of a difficulty in traversing a respective lateral movement path, identifying a set of remediations based on remediations defined for one or more vulnerabilities associated with issues identified for assets, each remediation mitigating a cyber-security risk within the enterprise network, and prioritizing the two or more remediations based on contribution values of assets, lateral movement path values of paths, and one of lateral movement complexity values of respective segments of paths and costs of respective remediations. | 2022-01-20 |
20220021699 | DETECTION AND PREVENTION OF EXTERNAL FRAUD - Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed. In one example, a threat detection platform determines the likelihood that an incoming email is indicative of external fraud based on the context and content of the incoming email. To understand the risk posed by an incoming email, the threat detection platform may seek to determine not only whether the sender normally communicates with the recipient, but also whether the topic is one normally discussed by the sender and recipient. In this way, the threat detection platform can establish whether the incoming email deviates from past emails exchanged between the sender and recipient. | 2022-01-20 |
20220021700 | EMAIL SECURITY PLATFORM - A server can include a detection module for monitoring an electronic account and detecting irregular or fraudulent activities. The detection module can be a machine learning model configured to detect activities or patterns indicative of an account being compromised, hacked or accessed by unauthorized users. Upon detection of the irregular activities or patterns, the detection module can transmit a notification or signal to a trigger module which can implement remedial actions. The trigger module can receive the signal from the detection module and execute an action in accordance with a trigger plan. The trigger plan can include various information and a range of actions, which can be selected and/or executed based on the information included in the signal. | 2022-01-20 |
20220021701 | Method and System for Providing Edge Service, and Computing Device - A method for providing an edge service includes a first security agent that performs data stream transmission with a plurality of endpoint computing devices through an edge link, and each endpoint computing device obtains, using the first security agent, an edge service provided by an edge server. The first security agent determines, based on a data stream transmitted between each endpoint computing device and the first security agent, an abnormal endpoint computing device in the plurality of endpoint computing devices. The first security agent generates link abnormality information, and the link abnormality information includes an address of the abnormal endpoint computing device. The first security agent sends the link abnormality information to the security controller. The security controller receives the link abnormality information, and generates edge link information including an address of a second security agent based on the link abnormality information. | 2022-01-20 |
20220021702 | GLOBAL NAVIGATION SATELLITE SYSTEM INTERFERENCE ATTACK DETECTION - Methods, apparatus, and systems for detecting signals interfering with satellite signaling and determining a location of the interfering source are disclosed. In one example aspect, a method for detecting a signal directed at interfering with satellite signaling includes receiving, by a receiving node, a signal from a signal source, the signal produced by the signal source disguised as a satellite signal; determining an estimated position of the receiving node based on an orbital position of the satellite and a characteristic of the signal; comparing the estimated position of the receiving node with a reference position of the receiving node; determining that the signal source is a spoofing source different than the satellite; and determine a location of the spoofing source in part based on the estimated position. | 2022-01-20 |
20220021703 | PHISHING SITE DETECTION DEVICE, PHISHING SITE DETECTION METHOD AND PHISHING SITE DETECTION PROGRAM - A phishing site detection device extracts, from a phishing kit, a condition of access sources with which the access to a phishing site is blocked. Then, the phishing site detection device accesses a phishing site constructed by the phishing kit using one or more extracted conditions of access sources, and stores an access result for each condition of access sources in an access result storage module. Thereafter, the phishing site detection device sets a condition of access sources with which the access to the phishing site constructed by the phishing kit is blocked, accesses a website to be detected, and determines whether the website is a phishing site on the basis of the access result. | 2022-01-20 |
20220021704 | SYSTEMS AND METHODS FOR AIDA BASED ROLE MODELS - The present disclosure describes systems and methods for using a model for a predetermined role for simulated phishing campaigns. A campaign controller communicates simulated phishing communications to one or more devices of a user using a model that the campaign controller selects from a plurality of models in a database that have been established for predetermined roles of a company. The model is selected based on one or more attributes of the user that are identified by the campaign controller. The campaign controller identifies one or more attributes of each user of a plurality of users for the simulated phishing campaign, and the campaign controller selects a respective model for each user based on the attributes of each user, wherein the models are not all the same for all of the users. | 2022-01-20 |
20220021705 | METHODS AND SYSTEMS FOR PROCESSING CYBER INCIDENTS IN CYBER INCIDENT MANAGEMENT SYSTEMS USING DYNAMIC PROCESSING HIERARCHIES - Methods and systems are also described for an integrated cyber incident management system that may store native data corresponding to fields of cyber incident management system (or other non-integrated systems) and integration data (e.g., viewable through a user interface of the integrated cyber incident management system), which describes a relationship of the native data to the integrated cyber incident management system, at a structure node in the architecture of the integrated cyber incident management system. The structure node may correspond to the convergence of two structures in the architecture of the integrated cyber incident management system. Each structure may itself correspond to a native hierarchal relationship in a non-integrated cyber incident management system. | 2022-01-20 |
20220021706 | Network-Assisted Secure Data Access - The concepts and technologies disclosed herein provide a network-assisted secure access (“NASA”) application that is installed on a user device. The NASA application can enhance current multi-factor authentication processes to prevent unauthorized access by leveraging mobile connectivity data. The enhanced two-factor authentication process is made seamless and transparent to the user by authenticating the mobile connectivity data with data known to the mobile network that serves the user device. The mobile connectivity data can include network-determined location, cell identifier (“cell ID”), Internet protocol (“IP”) address, a globally unique temporary identifier (“GUTI”), combinations thereof, and the like. Additionally or alternatively, one or more user profiles (e.g., user-defined and/or social media profile(s)) can be used to further enhance security. The enhanced two-factor authentication process can be executed at initial access to establish a secure connection and/or at any time during an established connection to ensure the connection remains secure. | 2022-01-20 |
20220021707 | DISTRIBUTED POLICY ENFORCEMENT PROXY WITH DYNAMIC EPG SHARDING - A distributed policy proxy system offloads network policy processing from an overloaded network element to policy proxy network elements. A network controller detects that policy resources are overloaded at a network element, and selects a group of policy proxy network elements. The network controller assigns an exclusive range of endpoint groups to each policy proxy network element. Each policy proxy network element is assigned to handle policy processing for its assigned range of endpoint groups. The network controller provides instructions to the policy proxy network elements to enable each policy proxy network element to apply the network policy for its assigned range of endpoint groups. The network controller also provides instructions to the overloaded network element to redirect a packet from the first endpoint group to a first policy proxy network element based on a destination of the packet. | 2022-01-20 |
20220021708 | SYSTEMS AND METHODS FOR SECURITY PROTOCOL EXECUTION IN A HIERARCHICAL STATE MACHINE-DRIVEN EXECUTION PLAN - Methods, apparatus, systems and articles of manufacture are disclosed to facilitate information exchange using publish-subscribe with blockchain. An example apparatus includes a security manager to integrate a security service with an instruction execution flow in a distributed device environment. The security manager is to include a processor. The processor is to be configured to implement at least an executable hierarchical state machine to provide credential management and access management in conjunction with instruction execution according to an execution plan. The executable hierarchical state machine is to generate a security context for the execution plan to implement a guard condition governing a transition from a first state to a second state in accordance with the execution plan. | 2022-01-20 |
20220021709 | COMPUTER-IMPLEMENTED SECURITY METHODS AND SYSTEMS - The present disclosure relates to securing networks against attacks launched via connection of peripheral devices to networked devices. According to one aspect, there is provided a computer-implemented method of automatically updating a network security policy, the method comprising: running a machine learning algorithm to continuously update a plurality of weighting coefficients associated with a respective plurality of threat factors, the threat factors each having values defined for each of a plurality of requests for respective peripheral devices to connect to one or more networked devices which are communicably coupled to a secure network; and automatically updating a security policy associated with the secure network in respect of a particular threat factor when that threat factor's associated weighting coefficient changes by more than a predetermined amount in a predetermined period, wherein requests for peripheral devices to connect to the networked devices are automatically approved or denied in dependence on that policy. | 2022-01-20 |
20220021710 | USER INTERFACE SUPPORTING AN INTEGRATED DECISION ENGINE FOR EVOLVING DEFENSES - A decision engine includes: a genetic algorithm framework including a knowledge base of standard configurations, a candidate selector generator and a selector to select a candidate configuration from a plurality of preferred standard configurations in response to the candidate selector generator; a parallelized reasoning framework including an attack surface reasoning algorithm module to compute the security and cost tradeoffs of an attack surface associated with each candidate configuration; and a user interface framework including a web service engine where users can interact and provide feedback on direction of an evolution used in a genetic algorithm search for evolving defenses. | 2022-01-20 |
20220021711 | Security Platform and Method for Efficient Access and Discovery - A secure data fabric (SDF) can include a security platform for sharing data, access and discovery of data, and audit traceability, across disparate data stores and networks. A SDF can leverage blockchain with attribute-based access control (ABAC). A SDF platform can include an immutable data storage medium, a data sharing node, a central processing unit, and memory having software, which can be configured to implement a blockchain and an ABAC module. The immutable data storage medium can be part of a network. The immutable data storage medium can be immutable off-chain data storage for the SDF, and a multi-layered ABAC security policy can be implemented for the SDF. The SDF can have a cross-domain topology model. A multi-party workflow for account keys and digital signatures management can be further implemented. A microservices-based access control module can be configured to dynamically evaluate digital security policies for a secure data fabric. | 2022-01-20 |
20220021712 | IMS SERVICE LEASING - Embodiments of a method performed by an Interconnect Border Control Function (IBCF) in an Internet Protocol (IP) Multimedia Subsystem (IMS) network and corresponding embodiments of an IBCF are disclosed. In some embodiments, the method performed by the IBCF comprises receiving, from an IMS node in a virtual IMS network domain of a virtual IMS network operator, a Session Initiation Protocol (SIP) message that serves as a request for a leased IMS service. The SIP message comprises information that identifies the leased IMS service, information that identifies an IMS network slice, information that identifies the virtual IMS network operator, information that identifies one or more sub-services requested for the leased IMS service, and/or information that identifies an IMS network slice instance. The method further comprises making a decision as to whether to accept or reject the request based on the information comprised in the SIP message. | 2022-01-20 |
20220021713 | NETWORK NODE, ENTITY AND METHODS PERFORMED THEREIN FOR HANDLING A COMMUNICATION SESSION IN A COMMUNICATION NETWORK - A method performed by a network node for handling a communication session in a communication network using a session description protocol, SDP, for communication sessions is provided. The network node sends, on one or both established communication sessions, a request with an indication. The indication indicates a request of one or more mappings of a payload type number to a codec associated to the communication session. The network node receives a response including one or more response indications. A response indication indicates one or more mappings of a payload type number to a codec associated to the communication session. The network node further sends a request indication indicating a mapping of a payload type number to a codec suggested to use in an offer message generated by the at least one entity. The mapping is selected based on the one or more response indications in the received response. | 2022-01-20 |
20220021714 | METHODS AND APPARATUS FOR REGISTERING A DEVICE TO SERVER - An electronic device and method are provided for registering a device in a server through an application installed in an external device different from the device. The method includes providing a first user interface for inputting a user ID; causing, through the application, the external device to connect to the server using the user ID; providing a second user interface for receiving a user input to select a function to identify the device; causing the external device to connect to the device, in response to a message received from the device; obtaining, from the device, identification information of the device; controlling to transmit a registration request message, to the server, for requesting registration of the device in the server, the registration request message including the identification information of the device; and in response to registration of the device in the server, providing a third user interface including a visual indication of the device being registered in the server. The identification information of the device is stored, by the server, in association with the user ID. | 2022-01-20 |
20220021715 | LIVE STREAMING METHOD AND APPARATUS, DEVICE AND COMPUTER READABLE STORAGE MEDIUM - The present application provides a live streaming method and apparatus, a device and a computer readable medium. The method includes: receiving team forming indication information, wherein the team forming indication information includes account information of at least one object in the same team in a target application; acquiring live streaming identification information of an object corresponding to the account information of the at least one object and participating in the team live stream; and sending the acquired live streaming identification information to a client used for the team live stream and a client playing a media stream of the team live stream to make the client used for the team live stream and the client playing the media stream display part of or all of the live streaming identification information. | 2022-01-20 |
20220021716 | RATING INTERFACE FOR BEHAVIORAL IMPACT ASSESSMENT DURING INTERPERSONAL INTERACTIONS - A rating interface system and method are provided that allow human users to continuously rate the impact they or other human users and/or their avatars are having on themselves or others during interpersonal interactions, such as conversations or group discussions. The system and method provide time stamping of users' ratings data and audio and video data of an interaction, and correlate the ratings data with the audio and video data at selected time intervals for subsequent analysis. | 2022-01-20 |
20220021717 | VIDEO CAPTURE AND MANAGEMENT SYSTEM - A curation system may be used by a number of collaborative users in order to capture and manage audio and video content. Content is captured by a capture device and streamed in near real-time to a storage and management server. The management server is configured to provide interfaces to remote collaborative users via computers and other devices to allow content to be viewed as it is captured, or after it is captured. Collaborative users may also modify content by submitting metadata to be associated with content in order to add comments, keywords, clips, notes, and other organizational and classifying information to sections of the content. The server is also configured to transcribe audio and video content, and associate transcription metadata with the content to allow it to be further captioned, searched, and organized. Shared interfaces allow users to collaboratively edit and publish content while minimizing wasted effort. | 2022-01-20 |
20220021718 | SYSTEMS AND METHODS FOR DYNAMIC MEDIA CONTENT STREAMING - A method performed at a server system includes providing to a device a media content item included in a listening session. The method includes receiving from the device characteristics of the listening session corresponding to a first time and determining, based on the characteristics, a default decision as to whether to provide a media content clip after the media item. The method includes receiving characteristics of the listening session corresponding to a second time and initiating a determination of a first decision as to whether to provide the media content clip after the media item. In accordance with the first decision being reached within a latency period, the media content clip is provided in accordance with the first decision. In accordance with the latency period being lapsed without the first decision being reached, the media content clip is provided in accordance with the default decision. | 2022-01-20 |
20220021719 | METHOD FOR BROADCASTING STREAMING CONTENTS IN A PEER-TO-PEER NETWORK - The present invention relates to a method for streaming, on a player of a client device ( | 2022-01-20 |
20220021720 | Targeted Buffer Priority Management - Transmission of content items through a network may employ a variety of devices that comprise buffers for the content. The content may include buffer priority information to assist in management of the buffers of intermediate devices for the routing. For example, the buffer priority information may assist the devices in managing buffer queue priorities. | 2022-01-20 |
20220021721 | REMOTE MULTI-TARGET CLIENT MONITORING FOR STREAMING CONTENT - Remote multi-target client monitoring for streaming content is disclosed. Raw data generated within a remote client device is received from the client device. The raw data is associated with content playback. An adaptor is used to translate the raw data into a unified data model. The translating comprises determining, from the raw data, a designation of at least one of a start and an end of a monitoring session. | 2022-01-20 |
20220021722 | UHD HLS STREAMING TRUSTED CLIENT SERVER ENVIRONMENT - A video player for playing a video stream that receives a master playlist identifying at least one variant playlist identifying a video file encoded as a series of video frames that when decoded provide the video stream. The video player based upon a configuration tag in the master playlist selectively determining whether the video file is to be processed in a trusted execution environment. The trusted execution environment of the video player selectively includes at least one of (i) hack one, only hack one; (ii) output and link protection; (iii) hardware root of trust; and (iv) forensic watermarking, and decrypts and/or decodes the video stream in such an environment. | 2022-01-20 |
20220021723 | QOE METRICS REPORTING FOR RTP-BASED 360-DEGREE VIDEO DELIVERY - An apparatus and system to provide QoE metrics reporting mechanisms for RTP-based 360-degree video delivery in live immersive streaming and real-time immersive conversational service applications are described for both in-camera and network-based stitching. Initial and desired parameters for viewports used in a teleconference are exchanged, and the teleconference established using 360° media. RTP FoV reports sent during the teleconference each contain viewport orientation information, as well as information for the QoE metrics. | 2022-01-20 |
20220021724 | CALL MANAGEMENT OF 5G CONFERENCE CALLS - A 5G network conference call initiation is detected. Information associated with the conference call includes a topic, an agenda, participants, and goals, is received. The respective participants of the conference call are identified, based on a dedicate traffic channel (DTCH) of the respective participants of the conference call. An allocation threshold of conference call contribution associated with the respective participants is determined, based on the information received. Contributions of respective participants are calculated during the conference call based on a list of DTCHs of the respective participants. The contributions of the respective participants are compared to the allocation threshold and responsive to determining that the contributions of a first participant of the respective participants of the conference call exceed the allocation threshold, an action mitigating the excessive contribution in the conference call is performed. | 2022-01-20 |
20220021725 | METHOD AND APPARATUS FOR PROCESSING DATA - The present disclosure provides a method and an apparatus for processing data. The method includes: establishing a data connection between a local service and a Web client, receiving data that the Web client transmits to the local service through the data connection; and storing the received data to the designated local storage space. | 2022-01-20 |
20220021726 | SMART URL INTEGRATION USING SERVERLESS SERVICE - A cloud-based, integrated business application suite includes an add-in that enables access from a client device to a first server, but not a second server. A user accesses the first server through an interface of the integrated suite to request a webpage which launches a first local instance of a service application. The first local instance of the service application sets up a local storage location and provides this location to a URL that is used to launch a webpage that is a client of the second server. A second local instance of the service application which is aware of the storage location is launched and this instance stores data requested from the second server in the identified local storage location. The stored information is read from the storage location by the first instance of the service application and is provided to the integrated application suite. | 2022-01-20 |
20220021727 | SYSTEM AND METHOD FOR LAUNCHING AND CONNECTING TO A LOCAL SERVER FROM A WEBPAGE - A system comprising a processor and a computer readable memory coupled to the processor, the computer readable memory configured with a page processable by page processing code. The page can be configured to generate a set of random connection data usable by a local server program instance to verify that a connection request is from the page, launch the local server program instance, provide the set of random connection data to the local server program instance, create a client socket instance, send a connection request to the local server program instance to establish a connection between the client socket instance and a server socket instance of the server program instance and based on an acceptance of the connection request by the server program instance, complete the connection. The connection may be usable for bi-directional communication between the page and local server program instance. | 2022-01-20 |
20220021728 | SYSTEM AND METHOD FOR PROVIDING A SECURE NETWORK - A method and system for providing a secure network includes a dApp that can act as a compiler that relies on independent authentication via another node, dApp, or wallet. The dApp, additionally or alternatively, is an independent resource ledger and/or serves only to render, secure, or transfer content, distributed via other external databases or ledgers, and accessed via a token exchange. | 2022-01-20 |
20220021729 | EFFICIENT DATA PROCESSING IN A MESH NETWORK OF COMPUTING DEVICES - In an approach for efficient data processing in a mesh network of computing devices, a processor receives data to be processed in the mesh network. A processor distributes a set of computational units to a set of computing devices in the mesh network. A processor creates a computational plan to construct a computational pipeline of the set of computational units. The computational plan considers cost and performance trade-offs by considering limitation of hardware resources, processing speed, accuracy and application requirements. A processor executes the computational plan by sending data to assigned computational units. | 2022-01-20 |
20220021730 | SYSTEMS AND METHODS OF BALANCING NETWORK LOAD FOR ULTRA HIGH SERVER AVAILABILITY - Systems and methods for monitoring utilization rates of a plurality of network-connected databases; receiving a first data read request from a first user device for a data element stored in the plurality of network-connected databases; selecting a first target database among the plurality of network-connected databases based on the utilization rates and a load sharing ratios; generating a first data query for a copy of the data element stored in the first target database; and forwarding the copy of the data element from the first target database to the first user device in response to the first data read request. | 2022-01-20 |
20220021731 | Methods of Operating Service Control Nodes - A service controller receives an operation request for a service for a consumer node of a communication network, the operation request including a context identifier referring to a context related to the operation request. The service controller forwards the operation request to a first service instance set being identified by the service controller as handling the context related to the operation request. Responsive to determining that the first service instance set is unreachable or unavailable, the service controller selects a second service instance set as a candidate to handle the context related to the operation request. The operation request for the service is then forwarded to the second service instance set. | 2022-01-20 |
20220021732 | COMPUTER-IMPLEMENTED METHOD, COMPUTER PROGRAM AND DATA PROCESSING SYSTEM - A computer-implemented method for the random-based leader election in a distributed network of data processing devices, said distributed network including a plurality of identified asynchronous processes, wherein all said identified processes or a subset thereof are running processes participating in the leader election, including the following steps:
| 2022-01-20 |
20220021733 | ARCHIVING MAIL SERVERS VIA A SIMPLE MAIL TRANSFER PROTOCOL (SMTP) SERVER - Systems and methods for providing data storage operations, such as archiving and/or backing up of data, for mail servers, such as Exchange servers, via a Simple Mail Transfer Protocol (SMTP) interface are described. For example, the systems and methods may provide an SMTP server between one or more Exchange servers and a media agent, which is configured to performing secondary copy operations, in order to quickly and/or efficiently generate archive or other secondary copies of various mailboxes within the mail server before or during the transfer of mail data to the media agent for data storage operations. | 2022-01-20 |
20220021734 | SYSTEMS AND METHODS FOR SYNCHRONIZING CONTENT AND INFORMATION ON MULTIPLE COMPUTING DEVICES - A method for synchronizing content between a first electronic device and a second electronic device in response to an input signal, includes: (a) receiving a first synchronization signal from the first computing device that is based on the input signal being received in the first electronic device; (b) mapping the first synchronization signal to a second synchronization signal based on mapping information accessible to the second electronic device, wherein the second synchronization signal includes information not represented by the first synchronization signal; and (c) transmitting the second synchronization signal to the second electronic device for processing, wherein (i) the input signal comprises one or more sensors; (ii) the first electronic device comprises a controller that interprets the input signal to provide the first synchronization signal, and (iii) the second electronic device comprises an actuator and wherein the second synchronization signal corresponds to a command for actuation in the second electronic device. | 2022-01-20 |
20220021735 | System and Method For Displaying and Operating multi-layered Item List in Web Browser With Supporting of Concurrent Users - Remotely access computing resources had been a major challenge to many information technology (IT) vendors. For example, the traditional remote file system access products such as network file system (NFS) and message block (MSB) all cannot be used for web based accessing across global due to both of them demanding huge computing powers and network bandwidth. For other example, traditional web based remote files and folders accessing products such as Yahoo Briefcase and VMWare ESX Server 2.0 all cannot support operations such as move or copy a file from one folder into another due to both of them only can display two levels for a file system, thus only can operate files and folders within one flat level. This invention has overcome the problems had occurred in the traditional accessing of remote computing resources by introducing a method and apparatus for creating multi-layered item list to mirror computing resources. The use of the multi-layered item list has effectively reduced the requirement of computing power and network bandwidth and also provides user to operate computing resources at two or more levels by controlling displaying two more levels of the computing resources. | 2022-01-20 |
20220021736 | REUSABLE DEVICE MANAGEMENT IN MACHINE-TO-MACHINE SYSTEMS - Data is received describing a local model of a first device generated by the first device based on sensor readings at the first device and a global model is updated that is hosted remote from the first device based on the local model and modeling devices in a plurality of different asset taxonomies. A particular operating state affecting one or more of a set of devices deployed in a particular machine-to-machine network is detected and the particular machine-to-machine network is automatically reconfigured based on the global model. | 2022-01-20 |
20220021737 | MOBILE DEVICE INTERMEDIARY FOR VEHICLE ADAPTATION - A mobile device intermediary for vehicle adaptation is disclosed. A mobile device intermediary can access driver profile information and vehicle profile information from a remotely located device, determine vehicle adaptation information based on the driver profile information and vehicle profile information, and facilitate access to the vehicle adaptation information to facilitate adapting an aspect of a first vehicle. The mobile device intermediary can further receive other vehicle profile information related to a second vehicle associated with a driver profile and include the other vehicle profile information in determining the vehicle adaptation information. The vehicle adaptation information can be related to adapting a performance aspect of the first vehicle. The vehicle adaptation information can also be related to adapting an amenity aspect of the first vehicle. Vehicle adaption information can provide improved safety and driver comfort as a driver uses different vehicles, can be portable, and can be device independent. | 2022-01-20 |
20220021738 | DATA CENTER RESOURCE MONITORING WITH MANAGED MESSAGE LOAD BALANCING WITH REORDERING CONSIDERATION - Techniques for resource monitoring and managed message reordering in a data center are described. In one example, a computing system comprises an ingress engine to receive a message from a network device in a data center comprising a plurality of network devices and the computing system; and in response to receiving the message from a network device in the data center, communicate the message to an appropriate collector application corresponding to the message's protocol type in compliance with at least one requirement for data stored in a message flow communicated from one or more network devices to the computing system. | 2022-01-20 |
20220021739 | Network Connection and Maintenance - A method and apparatus for network connection and maintenance having reduced connection time, increased probability of successful connection, and increased reliability once connected. A second communication protocol is added to network devices, so that two connection-related operations are performed during overlapping periods of time, thereby reducing required connection time while increasing probability of successful connection. Once a device is connected to the network, network maintenance messages, including re-keying requests and “keep-alive” messages, may be sent via the second communication protocol during periods of network congestion, increasing network reliability. | 2022-01-20 |
20220021740 | SYSTEM AND METHOD FOR ACCESS TO CONTINUOUSLY RUNNING APPLICATION PROGRAMS BY NETWORK CONNECTED END-USER DEVICES - A system for providing access to one or more application device, such as a respective processed application program, is connected to a telecommunications network including at least one user device. The system includes a manager device connected to the respective application device, and the manager device communicatively connects to the respective user device. Each application device includes a respective processing state and a state table of each respective processing state. The manager device updates the respective processing state of the state table for each application device and respective user device. Each user device accesses the manager device to obtain the respective processing state in the state table of the particular application device for the particular user device. User devices can switch communications with the manager device and application device, providing continuing operations of the application device with same processing state. | 2022-01-20 |
20220021741 | ELECTRONIC DEVICE SUBSCRIPTION - Broadly speaking, embodiments of the present technique provide methods, apparatuses and systems for controlling device resource subscriptions by an LwM2M server, comprising receiving at said LwM2M server a registration request message from a LwM2M client device, the message comprising an enumeration of a plurality of subscribable elements of an object hierarchy of the device; storing, using the LwM2M server, an association between the device and the plurality of subscribable elements; and sending from the LwM2M server to the LwM2M client device a subscription message comprising a unitary compressed expression representing plural ones of said plurality of subscribable elements associated with said device. | 2022-01-20 |
20220021742 | CONTENT PUSH METHOD AND APPARATUS, AND DEVICE - A content push method is provided. The method is applied to a terminal, which includes a first set of cameras. The method includes: when the terminal is in a screen-locked state and an off-screen is woken up, capturing a first set of face images of a user by using the first set of cameras; determining whether the first set of face images matches a registered user; if the first set of face images matches the registered user, performing, by the terminal, an unlocking operation, and determining a facial attribute of the user based on the first set of face images; determining a to-be-pushed media resource based on the facial attribute; and pushing the media resource in an interface displayed after the terminal is unlocked. | 2022-01-20 |
20220021743 | COMMUNICATIONS METHOD, AND COMMUNICATIONS APPARATUS AND SYSTEM - A communications method and a communications apparatus and system are provided, and are applied to smart home systems. The method includes: a home device sends operation information to a server, where the operation information is used to indicate an operation performed by a user on the home device; and after receiving the operation information from the home device, the server determines a target account, where the target account is one of accounts associated with the home device, and sends a notification message to a target terminal device, where the notification message includes status information used to indicate a status of the home device, the status information is related to the operation information, and the target terminal device is a terminal device on which the target account is logged in. | 2022-01-20 |
20220021744 | SYSTEM FOR CONTINUOUS AND INTEGRATED ISOLATION THROUGH DISPARATE TECHNOLOGY IMPLEMENTATIONS OVER FTTX INFRASTRUCTURE - The present disclosure provides a continuous and integrated isolation system for providing shareable Fibre to the x (FTTx) network infrastructure across one or more tenants. The continuous and integrated isolation system identifies one or more available segmentation technologies in each of a plurality of end-to-end service paths. In addition, the continuous and integrated isolation system encapsulates a segmentation metadata of each of the plurality of end-to-end service paths. Further, the continuous and integrated isolation system establishes a chain of isolation and continuous end-to-end service path corresponding to each of the plurality of tenant services. Furthermore, the continuous and integrated isolation system enables interconnection of each of the one or more disparate technology implementations for seamless transition. Moreover, the continuous and integrated isolation system includes a segmentation capability engine unit, a segmentation meta-data unit and an isolation control function unit. | 2022-01-20 |
20220021745 | CLIENTS AGGREGATION - A proxy device may organize a set of local devices as members of a union. The proxy device may create a set of virtual peripheral devices. The set of virtual peripheral devices may represent a set of physical peripheral devices connected to the set of local devices. The proxy device may communicate the set of virtual peripheral devices to a remote device. | 2022-01-20 |
20220021746 | REMOTE EXECUTION USING A GLOBAL IDENTITY - Embodiments of the present disclosure may provide a streamlined process for performing operations, such as data sharing and data replication, using multiple accounts. A global identity (also referred to as an organization user) may be employed, where the global identity may have access to multiple accounts across the same or different deployments. The global identity may switch between accounts from its login session and perform various tasks in the context of different accounts without undergoing further authentication. | 2022-01-20 |
20220021747 | METHODS AND SYSTEMS FOR DETERMINING END DATES FOR USER PROFILE MODIFICATIONS BASED ON REAL-LIFE EVENTS - A media guidance application the media guidance application may determine end dates for user profile modifications based on real-life events. For example, as opposed to modifying a user profile for a predetermined about of time, the media guidance application may dynamically determine when to remove a user profile modification (or modify a user profile back to a previous state) based on subsequent user actions. | 2022-01-20 |
20220021748 | AUTOMATIC CORRESPONDENCE OF ENCODERS AND DECODERS TO VIDEO PORTS - Methods and systems for automatically determining correspondences between communication ports of a networked device and encoders and decoders connected to those communication ports. In some embodiments, the networked device and the encoders and decoders are connected to a video communications network provided by a switch. The networked device can query the video communications network for information related to the encoders and decoders to determine and save the port-to-device correspondences. In some embodiments, the networked device can extract device information from video signals received at its input ports to map the input ports to respectively connected decoders. In similar fashion, the networked device may transmit or embed port-specific information from its output ports to respectively connected encoders. Then, the networked device can query the video communications network for the port-specific information received at the encoders to map the output ports to respectively connected encoders. | 2022-01-20 |
20220021749 | System and Method for Selecting and Providing Available Actions from One or More Computer Applications to a User - A computing system can be configured to input model input that includes context data into a machine-learned model and receive model output that describes one or more semantic entities referenced by the context data. The computing system can be configured to provide data descriptive of the semantic entity or entities to the computer application(s) and receive application output(s) respectively from the computing application(s) in response to providing the data descriptive of semantic entity or entities to the computer application(s). The application output(s) received from each computer application can describe available action(s) of the corresponding computer application with respect to the semantic entity or entities. The computing system can be configured to provide at least one indicator to a user that describes the available action(s) of the corresponding computer applications with respect to the semantic entity or entities. | 2022-01-20 |
20220021750 | SERVER, UPDATE MANAGEMENT METHOD, NON-TRANSITORY STORAGE MEDIUM, SOFTWARE UPDATE DEVICE, AND SYSTEM INCLUDING SERVER AND SOFTWARE UPDATE DEVICE - A server includes one or more processors configured to: perform bidirectional communication with the software update device using a first communication method; transmit information to the software update device using a second communication method different from the first communication method; and determine whether the one or more processors have received a specific request from the software update device using the first communication method, wherein the one or more processors are configured to provide a notification to the software update device using the second communication method when determining that the one or more processors have not received the specific request from the software update device. | 2022-01-20 |
20220021751 | SYSTEMS AND METHODS FOR ASYNCHRONOUS API-DRIVEN EXTERNAL APPLICATION SERVICES FOR A BLOCKCHAIN - Systems and methods for asynchronous API-driven external application services for blockchain are provided. The blockchain may store profile data that permits asynchronous communications and data sharing among a plurality of trusted users, and an application server layer may act as a gateway to a blockchain system to selectively provide limited access to external application services to operate upon the blockchain data. | 2022-01-20 |
20220021752 | IMAGE ACQUISITION DEVICE VIRTUALIZATION FOR REMOTE COMPUTING - Methods and systems for image acquisition device virtualization are described herein. A user of a client computing device may access a remote operating system running on a host computing device via a client application running on a local operating system of the client computing device. An image acquisition device such as a scanner may be connected to the client computing device and the user may wish to use the image acquisition device to acquire image data (e.g., scan a photograph). In order for an image application (e.g., a photo editor) running on the remote operating system to read in the image data from the image acquisition devices, the remote operating system of the host computing device may intercept a service call from the image application at a service layer and redirect the service call, via a virtual channel, to the local operating system of the client computing device. | 2022-01-20 |
20220021753 | METHOD AND APPARATUS FOR STORING INFORMATION IN A BROWSER STORAGE AREA OF A CLIENT DEVICE - Disclosed is a method and apparatus for performing steps to cause encoded information to be stored at a client device during a first network session between a server and the client device. To cause encoded information to be stored at a client device, the server first determines a set of network resource requests that encode the information. These network resource requests may include requests for one or more specific URLs and/or requests for one or more files. The server then causes the client device to initiate the network resource requests. The server may cause this initiation by, for example, redirecting the client device to the network resources. The client device initiating the network resource requests causes data representative of the network resource requests to be stored at the client device. | 2022-01-20 |
20220021754 | NETWORK MULTI-PATH PROXY SELECTION TO ROUTE DATA PACKETS - Aspects related to selection of a network link to route data packets is described. In an example, a method for enabling selection of the network link to route the data packets includes receiving communication capabilities from a Client Connection Engine (CCE), where the CCE manages uplink and downlink data packet routing of a client device. The method further includes instantiating at least one network multi-path proxy, based on the communication capabilities, where each of the at least one network multi-path proxy is configured to aggregate and route data packets to a specific network link. In addition, the method includes sharing identification information pertaining to the at least one network multi-path proxy and corresponding network links for selection of the at least one network multi-path proxy. | 2022-01-20 |
20220021755 | ROAMING - Roaming methods and hosts are provided. In the present disclosure, a TCP/IP connection established between a host and an opposite end is modified from binding a first IP address of the host in a current first network to binding a host address within the first IP address which does not change during host roaming, so that all parameters associated with the TCP/IP connection established between the host and the opposite end do not change when the host roams from the first network to a second network. | 2022-01-20 |
20220021756 | MIPI TRANSLATION IN GMSL TUNNEL MODE - Systems and methods provide secure, end-to-end high-speed data encoding and communication. In certain embodiments, this is accomplished by modifying a header portion of a data packet received from a first device and complying with a one Mobile Industry Processor Interface (MIPI) protocol to create a modified data packet that complies with a faster MIPI protocol. The header portion of the modified data packet is validated during a tunnel mode operation using an error detection process to validate the modified data packet, which can then be securely transmitted to a second device that complies with the faster MIPI protocol. | 2022-01-20 |
20220021757 | PHYSICAL LAYER FRAME FORMAT FOR WLAN - A first communication device generates a PHY preamble of a PHY data unit to include a first orthogonal frequency division multiplexing (OFDM) symbol corresponding to a legacy signal field. The legacy signal field includes i) a length subfield, and ii) a rate subfield. The length subfield and the rate subfield indicate a duration of the PHY data unit, and the legacy signal field is formatted according to a legacy second communication protocol. The first communication device generates the PHY preamble of a PHY data unit to include a second OFDM symbol corresponding to a duplicate of the legacy signal field, and a plurality of additional OFDM symbols corresponding to a non-legacy signal field. The first communication device sets the length subfield of the legacy signal field to a length value such that a remainder value resulting from dividing the length value by three, indicates that the PHY data unit conforms to the first communication protocol. | 2022-01-20 |
20220021758 | Data Transmission Method in Flexible Ethernet and Device - A data transmission method in FlexE includes: obtaining multiple data blocks sent by L FlexE clients, where L is greater than or equal to 1; and sending a data frame including the multiple data blocks to a physical-layer device, where a transmission rate of the data frame is N*100 Gbit/s, the data frame includes T data block groups, each of the T data block groups includes M continuous data block subgroups, each of the M continuous data block subgroups includes R*N continuous data blocks, the data frame further includes T overhead block groups, a t | 2022-01-20 |
20220021759 | MOBILE TERMINAL - A mobile terminal comprises a first frame, a second frame capable of slidably moving from the first frame in a first direction or a second direction which is an opposite direction of the first direction, and a driving unit slidably moving the second frame, wherein the driving unit includes a motor coupled to the first frame, a first pinion gear rotated by a rotational force transferred from the motor, a first gear rack extended in the first direction, moving in the first direction or the second direction when the pinion gear is rotated, a second pinion gear rotated in accordance with movement of the first gear rack, and a second gear rack coupled to the second frame, moving from the first gear rack in the same direction as the moving direction of the first gear rack in accordance with rotation of the second pinion gear. A length of the gear rack may be obtained to enlarge an area of the mobile terminal when the mobile terminal is extended. | 2022-01-20 |
20220021760 | DISPLAY FRAME FOR A MOBILE DEVICE - A display frame for a mobile device includes a first display frame section and a second display frame section. A flexible hinge section couples the first display frame section and the second display frame section. The flexible hinge section enables the first and second display frame sections to bend relative to each other. A first wall is contiguous with the first display frame section, the flexible hinge section, and the second display frame section. The first wall is integral to the first display frame section, the flexible hinge section, and the second display frame section. | 2022-01-20 |
20220021761 | METHOD FOR REPRODUCING MUSIC FILE OF MOBILE COMMUNICATION TERMINAL AND MOBILE TERMINAL IMPLEMENTING THE SAME - An apparatus and method are provided. The method includes reproducing, by a portable phone, multimedia content via an external output device while the portable phone is coupled with the external output device, determining whether the portable phone is decoupled from the external output device, and terminating the reproducing of the multimedia content based at least in part on a determination that the portable phone is decoupled from the external output device. | 2022-01-20 |
20220021762 | A COMMAND BASED INTERACTIVE SYSTEM AND A METHOD THEREOF - The disclosure discloses a command based interactive system ( | 2022-01-20 |
20220021763 | Touch Operation Locking Method and Electronic Device - A method implemented by an electronic device includes steps for displaying a first user interface on a touchscreen. The first user interface includes a first display region, a first control, and a second control. The first display region displays first content. The first control is configured to change content displayed in the first display region, and the second control is configured to control exit from the first user interface. In response to receiving a first operation, it is determined that a region in which the first control is located is a region that responds to a touch operation, and a region in which the second control is located does not respond to the touch operation. A first gesture performed on the first control is received, second content is displayed in the first display region, and a second gesture performed on the second control is received without response. | 2022-01-20 |
20220021764 | ADVANCED EYESIGHT DEVICE FOR VISUALLY IMPAIRED - An eyesight device for the visually impaired comprises a case having a front, rear and side walls. An ultrasonic sensor is provided on at least the front wall although, preferably, ultrasonic sensors are provided on the front and side walls to provide a greater range of peripheral vision. A microcontroller within the case is coupled to the ultrasonic sensor. A power source energizes the microcontroller. An audible signal generating means is adapted to generate an audible signal. The microcontroller is programmed to receive the output of the ultrasonic sensor and computing the distance between the case and an obstacle spaced from the case and energize the audible signal generating means when the distance is less than a preselected threshold distance. Attaching means is provided for attaching the case to an item of clothing of the user to free the hands of the user. | 2022-01-20 |
20220021765 | METHOD FOR PLAYING MULTIMEDIA CUSTOMIZED RINGING SIGNAL AND CUSTOMIZED ALERTING TONE, AND APPLICATION SERVER - One example method for playing a multimedia customized ringing signal and customized alerting tone includes receiving, by an application server, an initial call request from a calling terminal, sending the initial call request to a called terminal, receiving a provisional response in response to the initial call request from the called terminal, determining customized ring signal media resource information based on the provisional response, sending a first media session update message that carries the customized ring signal media resource information to the called terminal; and receiving a first response from the called terminal, where the initial call request includes SDP information of the calling terminal, and the first response includes a result of a customized ringing signal media resource negotiation between the application server and the called terminal. | 2022-01-20 |
20220021766 | AI-BASED COMPLIANCE AND PREFERENCE SYSTEM - A method of providing artificial intelligence (AI) functionality to target legacy customer outreach platforms of a plurality of tenant enterprises includes storing a plurality of AI templates, each of which is associated with one or more AI routines, generating a campaign object associating one or more of the AI templates with a tenant enterprise from among the plurality of tenant enterprises, transforming a communication on a switching network associated with the tenant enterprise according to the one or more AI templates associated with the campaign object, and providing the transformed communication to a target legacy customer outreach platform of the tenant enterprise. | 2022-01-20 |
20220021767 | SMART ELECTRONIC CHIME AND MECHANICAL CHIME DEHUM BOARD - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a smart dehum circuit that powers a chime which outputs audio in response to detection of a trigger event by a video doorbell. The circuit includes a detector circuit configured to generate a power signal in response to determining that an output voltage signal of a first circuit exceeds a threshold voltage. The circuit also includes a microcontroller coupled to the detector circuit. The microcontroller is configured to generate a chime power signal based on the power signal of the detector circuit. The chime power signal is generated to power the chime in response to detection of the trigger event by the video doorbell. | 2022-01-20 |
20220021768 | CERTIFICATION AND ACTIVATION OF USED PHONES ON A WIRELESS CARRIER NETWORK - Telecommunication services systems and methods are disclosed. The telecommunication services systems and methods preferably enable a buyer to certify and activate a used wireless telecommunications device. The systems and methods may also be employed to provide the buyer with specialized pricing options and other customized services. | 2022-01-20 |
20220021769 | PAIR-THE-PLAN SYSTEM FOR DEVICES AND METHOD OF USE - A method and system are disclosed for connecting a device to subscriptions and cellular billing plans of separate users and for managing the concurrent use of the device by the separate users. A computer-implemented method comprises enrolling a device in a cellular subscription and billing plan of a user. The enrollment includes providing an identifier for the device to a cellular subscription, effectively adding the device to the cellular subscription and billing plan selected by the user. The method and system allows the user to use capabilities of the device as governed by the cellular subscription and an associated billing plan as selected by that user, while the device is also available for use by another user via another cellular billing plan, as selected by that user. | 2022-01-20 |
20220021770 | IDENTIFYING AND RESOLVING TELECOMMUNICATION NETWORK PROBLEMS USING NETWORK EXPERIENCE SCORE - The disclosed system identifies and resolves telecommunication network problems and/or problems with devices utilizing the network. The system segments the user devices into groups having similar characteristics, by grouping together devices more likely to leave the network, and devices less likely to leave the network. Each group of devices has a trained machine learning model, to predict the NEX score for each device. The system focuses on devices with a low NEX score. The system determines whether the problem is with the network and/or the problem is with the device. The system gathers information from network monitoring software and determine which tower caused, for example, the call to drop. The system determines technological capability of the device from the device TAC number. The system suggests solutions to the network problems by suggesting adding a sector, tuning an antenna, etc., or if the device has problems, adjusting phone settings. | 2022-01-20 |
20220021771 | WIRELESS TAG COMMUNICATION DEVICE AND SHEET PROCESSING APPARATUS - A wireless tag communication device for communicating with a wireless tag conveyed by a conveyance mechanism, includes radiation regions from which a radio wave is emitted. The radiation regions include a first region extending along a first direction crossing a conveyance direction of the tag and having a first length in the first direction, a second region extending along the first direction and having a second length in the first direction, a third region extending along the conveyance direction and having a third length in the conveyance direction, and a fourth region extending along the conveyance direction and having a fourth length in the conveyance direction. The device further includes a controller configured to cause at least one of the first, second, third and, fourth regions to emit a polarized wave towards the tag. Each of the first and second regions partially overlaps the third and fourth regions. | 2022-01-20 |
20220021772 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus and non-transitory computer readable medium and for processing information are provided. The information processing apparatus includes a processor configured to: receive image data; cause a display to display the received image data; and move, in response to a user instruction, a portion of the image data from a first place to a second place on the display. The portion of the image data is a partial region of an entire region of the image data. While the portion of the image data is being moved from the first place to the second place, the portion of the image data is displayed at the first place. | 2022-01-20 |
20220021773 | INFORMATION PROCESSING APPARATUS, METHOD FOR ADJUSTING OPERATION OF INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus includes: a display with a touchscreen; a vibrator configured to perform a vibration action of vibrating an operation surface of the touchscreen; a notification sound outputter configured to perform a notification-sound output action of outputting a notification sound; a storage that stores response setting information on whether the vibration action and the notification-sound action are enabled; and a hardware processor that causes the vibrator and/or the notification sound outputter to perform the vibration action and/or the notification-sound output action enabled in the response setting information in response to a touch operation on the operation surface. The hardware processor adjusts a vibration intensity of the vibration action and a sound volume of the notification-sound output action according to at least either the response setting information or an operating state of the information processing apparatus. | 2022-01-20 |
20220021774 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a memory and a processor configured to, in display of at least two display areas on a display apparatus, when superimposition of two display areas hinders an operation using an operation button in the lower display area, change the arrangement position of the operation button in the lower display area hidden by the upper display area so as to make the operation button operable without change of the display size and position of the lower display area. | 2022-01-20 |
20220021775 | IMAGE FORMING APPARATUS - An image forming apparatus includes: a folder configured to fold a medium by forming a fold such that a side of the medium is aligned with a predetermined first position on the medium; and an image forming device configured to form a first image on a region different from a region located within a predetermined range from the first position, on at least a part of the side of the medium before the medium is folded by the folder. | 2022-01-20 |
20220021776 | DOCUMENT FEEDER AND IMAGE FORMING APPARATUS - A document feeder includes a mode selector, at least two document sensors, and a feeding determiner. The mode selector receives selection of either a normal mode for feeding documents having the same size or a mixed loading mode for feeding documents having different sizes. The document sensors are arranged at an interval in a width direction of the documents, and detect the documents. The feeding determiner performs, based on results of the detection by the document sensors, a size determination to determine a size of a document being fed and a skew determination to determine whether or not the document being fed is skewed. The feeding determiner performs the skew determination when the normal mode has been selected and performs the size determination when the mixed loading mode has been selected. | 2022-01-20 |
20220021777 | DOCUMENT READING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A document reading apparatus having a display unit and a placement section on which plural documents is to be placed includes a conveyance unit and a reading unit. The conveyance unit conveys a document placed on the placement section. The reading unit reads a document conveyed by the conveyance unit and generates image data. Based on at least a reading mode being set on the document reading apparatus of reading a plurality of documents of a plurality of different sizes in a single job by the reading unit, first prompting information that prompts placement of the plurality of documents at a center of the placement section in a direction perpendicular to a document conveyance direction in which the conveyance unit conveys the plurality of documents is displayed on the display unit. | 2022-01-20 |
20220021778 | DOCUMENT FEEDER AND IMAGE FORMING APPARATUS - A document feeder includes an apparatus body to which a document feed unit is attached, a sheet feed tray that moves up and down toward the document feed unit, an open/close cover attached openably and closably to the apparatus body and opens the document transport path and the document feed unit when opened, and a unit pressing arm attached to the open/close cover. When the open/close cover is closed, the unit pressing arm presses the document feed unit toward the sheet feed tray. | 2022-01-20 |
20220021779 | IMAGE PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM - An image processing apparatus having a reading device to read an image from a sheet includes one or more controllers to perform operations. One image is read from one sheet by using the reading device. Edge detection processing is executed on the one image. At least one pair of edges is determined from among a plurality of edges based on information of the plurality of edges detected in the edge detection processing and size information of the one sheet. | 2022-01-20 |
20220021780 | PRINTING DEVICE - Disclosed is a printing device including: a finger stage which has a nail rest, having an identifier, to place a tip of a nail, the nail being a printing target, and on which a finger corresponding to the nail is placed; and at least one camera which obtains an image from a first direction and an image from a second direction. The identifier which detects a position of the nail is provided on one surface of the nail rest such that the identifier does not exist in the image from the first direction but the identifier exists in the image from the second direction. | 2022-01-20 |
20220021781 | IMAGE FORMING SYSTEM, IMAGE FORMING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An image forming system includes a user terminal that includes a terminal-side processor and an image forming apparatus that includes an apparatus-side processor. In response to receiving an instruction to transmit a print request to the image forming apparatus from a user, the terminal-side processor is configured to hold the print request instead of transmitting the print request to the image forming apparatus and is configured to transmit user information indicating the user to the image forming apparatus. The apparatus-side processor is configured to transmit a transmission-request signal to the user terminal in response to detecting, on a basis of the user information, that the user comes near the image forming apparatus. The terminal-side processor is configured to transmit the print request held by the terminal-side processor to the image forming apparatus in response to receiving the transmission-request signal. | 2022-01-20 |
20220021782 | RECORDING MATERIAL TRANSPORTING DEVICE AND IMAGE READING APPARATUS - A recording material transporting device includes a transport belt having an endless shape and having an inner peripheral surface and an outer peripheral surface having a friction coefficient smaller than a friction coefficient of the inner peripheral surface. The transport belt transports a recording material by using the outer peripheral surface toward a reader that reads an image. The recording material transporting device further includes a driving roller that rotates while being in contact with the inner peripheral surface of the transport belt and that rotatably drives the transport belt. | 2022-01-20 |
20220021783 | IMAGE CAPTURE DEVICE FOR GENERATING TIME-LAPSE VIDEOS - An image capture device continuously generates time-lapse video frames to be included within a time-lapse video using a time-lapse video frame rate, with the value of the time-lapse video frame rate changing based on activation of a trigger to change the time-lapse video frame rate. | 2022-01-20 |
20220021784 | MARKING TECHNIQUE IDENTIFICATION - The subject matter discloses examples of an identification marking system comprising a component analyzer to identify a plurality of components present within a print artwork. The identification marking system further comprises a marking technique analyzer to determine marking settings for the plurality of components based on component properties and predefined marking rules. The marking settings for a component indicates a marking technique identified for linking an identification mark with the component. The marking technique analyzer is further to communicate the print artwork and the marking settings to an identification marking engine for identification marking. | 2022-01-20 |
20220021785 | SYSTEM AND METHOD FOR SENDING, DELIVERY AND RECEIVING OF FAXES, INCLUDING DELIVERY OF FAXES WITH ADAPTIVE PROTOCOL SELECTION - Embodiments of a fax system with adaptive protocol selection, and methods for such a system, are disclosed herein. Embodiments of a fax system may be adapted to selectively configure the protocol (both the type of protocol or aspects of a particular protocol) used in association with the transmission or reception of a specific fax. The configuration of the protocol utilized can be based on one or more attributes associated with a sender or a destination. The fax can then be transmitted or received according to those configuration parameters. | 2022-01-20 |
20220021786 | BUDGET CONTROL FOR PRINTING AND COPYING - A printing and copying system is provided that includes a server configured to manage user account information related to a user, and an apparatus connected to the server, the apparatus configured to send a printing request or a copying request to the server. The user account information includes a plurality of wallets associated with the user, and the plurality of wallets each represent funds available to the user. The server is configured to determine whether to authorise the printing request or copying request based on the funds available in the plurality of wallets. | 2022-01-20 |
20220021787 | APPARATUS, METHOD, AND STORAGE MEDIUM FOR REMOVING SHADING DOTS - According to an exemplary embodiment of the present disclosure, an isolated dot is removed from an image including a shading dot, and a shading dot in contact with a character is removed from the isolated dot-removed image based on a size of the removed isolated dot. | 2022-01-20 |
20220021788 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a request reception unit configured to receive a request for executing an execution module, a first alteration detection unit configured to detect an alteration of a white list upon reception of the execution request, a second alteration detection unit configured to detect an alteration of an execution module which has issued the execution request, by using a white list determined to have no alteration by the first alteration detection unit, and an error control unit configured to, upon detection of an alteration by the second alteration detection unit, select and control whether to deactivate a system of the information processing apparatus or to inhibit only execution of the execution module which has issued the execution request, depending on a current activation mode of the information processing apparatus and an activation mode using the execution module which has issued the execution request. | 2022-01-20 |
20220021789 | NOISE SUPPRESSION IN A SAMPLING CIRCUIT - In described examples, a circuit includes an integrator. The integrator receives an input signal. A first sampling network is coupled to the integrator and generates a signal voltage. A second sampling network is coupled to the integrator and generates a pixel sampled noise voltage. The pixel sampled noise voltage generated in a previous cycle is subtracted from the signal voltage generated in a current cycle to generate a true signal voltage. | 2022-01-20 |
20220021790 | CAMERA MODULE AND MANUFACTURING METHOD THEREFOR, AND TERMINAL - Disclosed are a camera module and a method thereof, and a terminal which relates to the field of camera technology. The camera comprises a circuit board, a sensitive chip, a bracket, and a sealing member. At least one side of the bracket is an open side, and a receiving cavity is defined between a surface of the open side facing the circuit board and a first surface of the circuit board. The sealing member is filled in the receiving cavity. The camera module improves the space utilization efficiency, reduces the width of the open side, increases the screen-to-body ratio of the terminal, and improves user's perception and user experience. | 2022-01-20 |