07th week of 2022 patent applcation highlights part 62 |
Patent application number | Title | Published |
20220052953 | OPERATION OF A BROADBAND ACCESS NETWORK OF A TELECOMMUNICATIONS NETWORK COMPRISING A CENTRAL OFFICE POINT OF DELIVERY - A method for operation of a broadband access network of a telecommunications network includes: a central office point of delivery and/or a load management entity or functionality thereof detects that an increased load situation is currently happening or determines that an increased load situation is likely to happen or that a specific task is to be performed; the central office point of delivery triggers the use of additional virtualized network functions and/or additional micro services and an additional message router and load balancing entity for handling the increased load situation and/or for performing specific tasks within the telecommunications network and/or within the central office point of delivery; and upon detection of a normal load situation, the central office point of delivery releases the use of the additional virtualized network functions and/or additional micro services and the use of the additional message router and load balancing entity. | 2022-02-17 |
20220052954 | NETWORK LATENCY FAIRNESS IN MULTI-USER GAMING PLATFORMS - Aspects of the present disclosure relate to wireless communications, and more particularly, to techniques that allow for enforcement of network latency fairness in multi-user gaming platforms. An example method generally includes identifying multiple user equipments (UEs) participating in a multi-user gaming platform across one or more wide area networks (WANs); and taking one or more actions to support latency fairness in delivery of information across the multiple users via the one or more WANs. | 2022-02-17 |
20220052955 | COMMUNICATIONS METHOD, APPARATUS, AND SYSTEM - In a method for network communications, a session management network element receives an identifier of a session of a terminal device, an identifier of a port corresponding to the session, and a processing policy of a data flow for the port. The session management network element determines, according to the identifier of the port, a type of a first device corresponding to the port. The session management network element then sends, according to the determined type of the first device, processing policy information to the first device. The processing policy information comprises the identifier of the port and the processing policy of the data flow. | 2022-02-17 |
20220052956 | COMMUNICATION METHOD, APPARATUS, AND SYSTEM - A communication method, a related device, and a system. The method includes: a first network device receives first information from a terminal device, where the first information includes a first delay and a second delay, the first delay is a delay of the terminal device on a first path, the second delay is a delay of the terminal device on a second path, and data packets transmitted on the first path and the second path belong to a first data radio bearer (DRB). The first network device determines an uplink delay of the first DRB based on the first information, a fourth delay, and a fifth delay, where the fourth delay is a network-side delay on the first path, and the fifth delay is a network-side delay on the second path. | 2022-02-17 |
20220052957 | SECURE COMMUNICATION ROUTING FOR REMOTE DEVICES - A security system that provides for obfuscating the sending entities, receiving entities, and/or routings (e.g., host entities that are routing the communication and the path through which the communication is sent) without the need to encrypt the foregoing. The packets for a communication may include a datagram packet portion, an IP packet portion, and a routing packet portion and may be signed with a signature using a pre-shared key (e.g., a wheat signature or a chaff signature). Therefore, the actual datagram packet, IP packet, and/or routing packet may have the actual information or may have imitation information. Only the systems that have the pre-shared key are able to determine what are the wheat packets and what are the chaff packets such that the correct sending entity, receiving entity, and/or hosts routing the communication are able to determine the correct entities and/or the routing. | 2022-02-17 |
20220052958 | SELECTIVELY BYPASSING A ROUTING QUEUE IN A ROUTING DEVICE IN A FIFTH GENERATION (5G) OR OTHER NEXT GENERATION NETWORK - The technologies described herein are generally directed toward shedding processing loads associated with route updates. According to an embodiment, a system can comprise a processor and a memory that can enable operations facilitating performance of operations including facilitating receiving, from a second routing device via a network, a communication. The operations can further comprise, in response to a queueing delay being determined to be less than a threshold, queueing, in the queue, the communication for a third routing device selected according to a first selection process as being on a route to a destination routing device for the communication. Further, operations to, in response to the queueing delay of the queue being determined to be equal to or above the threshold, transmit the communication to a fourth routing device, with the fourth routing device being selected according to a second selection process different than the first selection process. | 2022-02-17 |
20220052959 | ADAPTIVE NETWORKING FOR RESILIENT COMMUNICATIONS - A system for establishing and maintaining a communications network includes: one or more programs including instructions for: receiving a first set of data associated with a first set of communication links, the first set of communication links configured to establish connection between devices; receiving a second set of data associated with a second set of communication links; receiving a determination of whether one or more communication links of the first set satisfy a pre-determined quality level; receiving a determination of whether one or more communication links of the second set satisfy the pre-determined quality level; receiving a selection from the one or more communication links of the second set that have been determined to satisfy the pre-determined quality level; and connecting the devices via the selected one or more communication links if one or more communication links of the first set is determined to not satisfy the pre-determined quality level. | 2022-02-17 |
20220052960 | VERIFICATION OF DATA PROCESSES IN A NETWORK OF COMPUTING RESOURCES - A method for managing data processes in a network of computing resources includes: receiving at least one child request being routed from an intermediary device to at least one corresponding destination device, the at least one child request requesting execution of at least one corresponding child data process, each of the at least one child data process for executing at least a portion of the at least one parent data process from an instructor device, and each of the at least one child request including a destination key derived at least in part from the at least one instructor key; storing the at least one child request in at least one storage device; modifying the at least one child request upon receiving a child request modification signal; and generating signals for communicating the child requests to one or more requesting devices. | 2022-02-17 |
20220052961 | RESOURCE DISCOVERY IN A MULTI-EDGE COMPUTING NETWORK - Methods and systems are disclosed for discovering resources in a multi-access computing environment. The method may include receiving application parameters for an application to be serviced using multi-access edge computing (MEC) resources. The method may also include generating network address identifiers associated with the application based on the application parameters, and storing, in a memory, the network address identifiers associated with the application to be serviced using the MEC resources. The method may include deploying an instance of the application at a MEC cluster. The deployed instance of the application may be accessible by user equipment with one of the network address identifiers. | 2022-02-17 |
20220052962 | METHOD AND SYSTEM FOR CHANGING RESOURCE STATE, TERMINAL, AND STORAGE MEDIUM - The present disclosure discloses a method and apparatus for changing a resource state, a terminal, and a storage medium, which belong to the field of smart home. A system for changing a resource state that includes a first collection resource, a first intermediate-level resource, and leaf node resources can be established. By making the first collection resource obtain link information of each leaf node resource whose resource state needs to be changed, a request that includes a default interface of the leaf node resource may be generated for the leaf node resource, such that a state of the leaf node resource can be changed accurately by the system. Therefore, the present disclosure enables the control request issued by a client to be recognized and executed by each leaf node resource, thereby increasing reliability and stability of system control. | 2022-02-17 |
20220052963 | METHODS AND SYSTEMS FOR AGGREGATING AND EXCHANGING MESSAGES IN AN IoT COMMUNICATION SYSTEM - The present disclosure relates to a pre-5th generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th generation (4G) communication system such as long term evolution (LTE). A method disclosed herein includes sending message requests, identifying at least one of a size of each of the messages associated with the message requests or a priority of each of the messages associated with the message requests, determining to aggregate the message requests, when at least one of the size of each of the messages associated with the message requests is less than a threshold segment size or the priority of each of the messages associated with the message requests is one of the low priority or the medium priority, aggregating the message requests into a single message request, and sending the single message request. | 2022-02-17 |
20220052964 | Flexible traffic control for EVPN - Systems and methods include receiving one or more Ethernet Virtual Private Network (EVPN) advertisements from one or more peer nodes with information including any of traffic characterization information and traffic control information; and providing traffic to the EVPN and to the corresponding one or more peer nodes based on the information from the corresponding one or more peer nodes. The one or more EVPN advertisements can be in an EVPN Network Layer Reachability Information (NLRI) advertisement, and the EVPN NLRI can have Route Type 1 for the information to apply to an EVPN Instance (EVI) and the EVPN NLRI can have Route Type 2 for the information to apply to a specific customer node based on a Media Access Control (MAC). | 2022-02-17 |
20220052965 | Message Transmission Method, Access Node, Access Controller, and Access System - In a message transmission method, an access controller receives a first message from an access node, and the first message includes a first identifier. The access controller obtains a line identifier according to the first identifier. The access controller obtains a second message according to the line identifier, and the second message includes the line identifier. The access controller sends the second message to a relay server. | 2022-02-17 |
20220052966 | INTEGRATED ROUTER HAVING A POWER CYCLING SWITCH - An integrated router is provided. The integrated router includes at least one network interface, a power supply input, a power supply output, and a power cycling switch. The at least one network interface is operative to place a first network device in electronical communication with a second network device. The power supply input is operative to receive electrical power from a power supply. The power supply output is operative to provide the electrical power to the second network device. The power cycling switch electrically connects the power supply input to the power supply output and is operative to be toggled by a remote network device via the at least one network interface so as to power cycle the second network device. | 2022-02-17 |
20220052967 | PRIORITY BASED ROUTE PROGRAMMING IN A NETWORK - In some embodiments, a method stores a plurality of requests for routes in a queue based on respective priorities for the routes. The plurality of requests are for programming destinations and next hops for the destinations in a route table that is used by a device in a network to route packets. The method selects a request for a route from the queue based on a respective priority for the queue. Then, the request for the route is sent to an entity to program the route in the route table. | 2022-02-17 |
20220052968 | NETWORK BUFFER CREDIT ALLOCATION - A method for dynamically allocating buffer credits between a system and a storage area network (SAN). The method includes one or more computer processors determining a forecast of a change related to a pattern of network traffic that originates from a computing system that links to a storage area network (SAN) via a network connection. The method further includes determining whether the forecast change related to the pattern of network traffic dictates a change to a buffer credit allocation associated with the network connection. The method further includes responding to determining that the forecast change related to the pattern of network traffic dictates the buffer credit allocation change by determining a value for the buffer credit allocation associated with the change. The method further includes transmitting a request to a switch of the SAN to modify a buffer credit allocation value corresponding to a port of the switch linked to the network connection. | 2022-02-17 |
20220052969 | Flexible Link Level Retry For Shared Memory Switches - Disclosure is made of a shared memory switch and methods and system for controlling such. The shared memory switch may allocate cells in a storage array to respective use cases, the use cases including input buffering, output queuing, free cell allocation, and retry buffering. A set of data packets may be stored in the cells allocated to output queuing, wherein each cell allocated to output queuing stores a respective data packet of the set of data packets. A subset of the set of data packets may be transmitted to a destination external to the shared memory switch. The cells storing the subset of data packets may be reallocated to the retry buffering use case, wherein cells allocated to retry buffering use case are a retry buffer. | 2022-02-17 |
20220052970 | DEVICES AND METHODS FOR NETWORK MESSAGE SEQUENCING - A programmable switch includes a plurality of ports for communicating with devices on a network. Circuitry of the programmable switch is configured to receive a series of related messages from a first device on the network via at least one port, and determine whether one or more messages of the series of related messages have been received out-of-order based at least in part on a sequence number included in the one or more messages. The series of related messages are sent by the programmable switch to a second device via one or more ports in an order indicated by sequence numbers included in the series of related messages by delaying at least one message. According to one aspect, a network controller selects a programmable switch between the first device and the second device to serve as a message sequencer for reordering out-of-order messages using a stored network topology. | 2022-02-17 |
20220052971 | E-MAIL TESTING AND RENDERING PLATFORM - A method for automatically modifying hyper-text markup language (HMTL) code of an e-mail within an email pre-deployment platform comprises receiving previously-created e-mail content comprising a plurality of e-mail content types, each of the e-mail content types written in HMTL code, automatically detecting, by parsing the received HTML code, one or more deficiencies in the e-mail content, identifying the one or more deficiencies in the HTML of the e-mail content types for a user by presenting a natural language explanation of the one or more deficiencies on the user interface, guiding a user of the platform to rectify the one or more deficiencies in the e-mail content by using one or more user interface tools for rectifying the one or more deficiencies; and automatically editing the HTML code based on the user's use of the one or more user interface tools. | 2022-02-17 |
20220052972 | Reactive Backpressure for East-West Messaging in an Embedded Control Cluster - According to certain embodiments, a message bus system comprises a first client and a second client. The first client is configured to publish messages associated with a message topic to a message bus, and the second client is configured to receive the messages associated with the message topic from the message bus. The message bus system is configured to unsubscribe the second client from the message topic based at least in part on determining that a demand of the second client for the messages associated with the message topic has fallen below a threshold. | 2022-02-17 |
20220052973 | MESSAGE DELIVERABILITY MONITORING - Methods, systems, and devices are provided for detecting spam filtering. According to one aspect, the system can inject, by a server, into a client email campaign a plurality of emails for transmission to a plurality of seed email addresses separate from a plurality of non-injected emails of the client email campaign for transmission to a plurality of target email addresses. The system can detect whether the one or more injected emails were categorized as spam or not spam by each of the plurality of seed email addresses and generate a first input to an analysis module. The system can monitor a plurality of sensing signals from the non-injected emails and generate a second input to the analysis module. The analysis module can predict based on the first input and second input whether the non-injected emails are categorized as spam by the target email addresses. | 2022-02-17 |
20220052974 | MULTI-MESSAGE CONVERSATION SUMMARIES AND ANNOTATIONS - The disclosure herein describes a system for generating customizable summaries of multi-message conversations in email threads and other multi-message and multi-participant messaging applications. A summary icon is displayed if the number of messages in a thread exceeds a threshold number. Message data is cleaned and analyzed by ML models to generate feature vectors representing the messages content. Multiple loglinear regression models compute similarity between message sentences. Clustering algorithm(s) to generate a multi-message conversation thread summary based on the values. If the user selects the summary icon, the multi-message conversation thread summary is displayed. The summary includes summary sentences and/or annotations describing content of the messages in the thread, participants contributing to the messages in the thread, links back to the original messages in the thread and/or a count of the number of messages contributed by each participant. | 2022-02-17 |
20220052975 | CHAT HIGHLIGHTS - Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and method for presenting chat highlights. The program and method include generating a group profile for a plurality of users that includes a plurality of conversation segments; identifying a group of consecutively exchanged messages in a first of the plurality of conversation segments for which a difference between a starting time stamp of a first message in the group of consecutive messages and an ending time stamp of a last message in the group of consecutive messages is less than a threshold time interval representing consecutively exchanged messages; generating for display an interactive visual representation of the identified group of consecutive messages; and in response to receiving a user input that selects the interactive visual representation, generating for display a portion of the identified group of consecutive messages. | 2022-02-17 |
20220052976 | ANSWER TEXT PROCESSING METHODS AND APPARATUSES, AND KEY TEXT DETERMINATION METHODS - The present specification provides answer text processing methods and apparatuses and key text determination methods. In some embodiments, based on the previously described data processing methods, a piece of answer text that corresponds to a target question is determined from a predetermined knowledge base as a piece of target answer text at first; then one or more key texts that are closely associated with the target question and corresponds to a relatively high user attention measure is recognized and determined from the piece of target answer text, and the previously described key text in the piece of target answer text is labeled; and furthermore, the previously described key text can be identified in the piece of target answer text displayed to a user. Therefore, the user can read relatively valuable key information that the user needs in the piece of target answer text conveniently and efficiently. | 2022-02-17 |
20220052977 | LOCATION RESTRICTED MESSAGE EXCHANGE SYSTEM - Systems and methods for providing location-restricted message exchange include receiving, by a system provider device over a network from a sender device, a location-restricted message that includes sender message information and first location information that is associated with a first location. The system provider device then receives, over the network from a first receiver device, second location information that is associated with a second location. The system provider device then determines that the second location is in a limited geographic message exchange area with the first location and, in response, sends at least some of the sender message information by the system provider device over the network to the first receiver device. They system provider device may use filtering criteria provided by the first or second receiver device and use that filtering criteria to determine whether to send the sender message information to the first or second receiver device. | 2022-02-17 |
20220052978 | Systems and Methods for Displaying Labels in a Clustering In-Box Environment - Systems and methods for displaying electronic messages are disclosed. In one aspect, a method is performed at a computing device. The method includes: (1) receiving a plurality of electronic messages; (2) assigning a first subset of the messages to a predefined group category based on a set of content-based clustering rules and content in respective bodies of the messages; (3) concurrently displaying a second subset of the messages and a cluster graphic corresponding to the predefined group category, where the cluster graphic includes a label that describes the predefined group category; (4) while concurrently displaying the second subset of electronic messages and the cluster graphic, receiving user selection of the cluster graphic; and (5) in response, displaying a plurality of messages in the predefined group category, including displaying at least one message from the first subset of messages. | 2022-02-17 |
20220052979 | DISCOVERABLE ELECTRONIC MESSAGES - A message sender crafts an electronic message and addresses the electronic message to at least one message recipient. The message sender can further specify one or more discoverability criteria, such as a time criterion, a geolocation criterion, etc. In some embodiments, the message sender can create the electronic message and specify the discoverability criteria utilizing an application program executing on an electronic communication device of the sender or a browser-based application. The sender submits the electronic message to a message service, which can be provided, for example, by a message server coupled to the Internet. Although the electronic message is submitted to the message service, content of the electronic message is not immediately delivered to the message recipient. Instead, the message server reveals the content of the electronic message to the message recipient when at least some, and in some cases all, of the discoverability criteria are satisfied. | 2022-02-17 |
20220052980 | METHOD OF SERVICE IDENTIFICATION IN ENUM STRUCTURE - The claimed technical solution is used in the field of electronic communications, namely it refers to methods of identification and receipt of information about the service on the basis of requests made through electronic communications networks. In particular, this technical solution applies to the E.164 NUmber Mapping system (ENUM) and the possibility of using in this system the services defined in the resource records of domain names in ENUM, if such services are not known in advance according to IANA Enumservice Registrations. It is proposed to create a service registry, which must meet the following conditions: each service has at least one original, unique identifier and mapped to this identifier internet addresses and metadata for service processing. Using this unique identifier, the Internet addresses and metadata for the corresponding service are retrieved from the service registry based on the corresponding request. | 2022-02-17 |
20220052981 | CLIENT DEVICE BASED SOLUTION FOR HANDLING MAC RANDOMIZATION - A system and method are provided for a network device for use with a client device having a hostname and a MAC address. The network device contains a memory that has a second hostname and a second MAC address stored within the memory. The second MAC address corresponds to the second hostname. The memory also contains a processor configured to execute instructions stored on the memory to cause the network device to: receive, from the client device, the hostname and the MAC address; determine whether the MAC address is randomized; provide an instruction to the client device to inform a user of the client device that the client device hostname is registered when the hostname matches the second hostname and the MAC address is randomized. | 2022-02-17 |
20220052982 | A METHOD AND DEVICE FOR TRANSFERRING ELECTRONIC INFORMATION - A method and device ( | 2022-02-17 |
20220052983 | A METHOD AND DEVICE FOR TRANSFERRING ELECTRONIC INFORMATION - A method and device ( | 2022-02-17 |
20220052984 | DYNAMIC INTENT-BASED FIREWALL - Systems and methods provide for provisioning a dynamic intent-based firewall. A network controller can generate a master route table for network segments reachable from edge network devices managed by the controller. The controller can receive zone definition information mapping the network segments into zones and Zone-based Firewall (ZFW) policies to apply to traffic between a source and destination zone specified by each ZFW policy. The controller can evaluate a ZFW policy to determine first edge network devices that can reach first network segments mapped to the source zone specified by the ZFW policy, second edge network devices that can reach second network segments mapped to the destination zone specified by the ZFW policy, and routing information (from the route table) between the first network segments, the first and second edge network devices, and the second network segments. The controller can transmit the routing information to the edge network devices. | 2022-02-17 |
20220052985 | SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR HIDING MESSAGES SENT TO THIRD PARTIES - A system can include, for example, a secure data module(s) configured to store sensitive data regarding the user(s), a synthetic dataset generating module(s) configured to generate the synthetic dataset based on the sensitive data, and a control module configured to receive a request from an application for a dataset related to the user(s), provide the request to the synthetic dataset generating module(s), receive the synthetic dataset from the synthetic dataset generating module(s), and provide the synthetic dataset to the application. The synthetic dataset generating module(s) can be configured to generate the synthetic dataset based on the dataset. | 2022-02-17 |
20220052986 | Secure Video Conferencing System For A Meeting Room - A secure video conferencing system for a meeting room is discussed. The secure video conferencing system comprising a camera for capturing video of at least one writing board in the meeting room and to provide video data thereof; and processing circuitry, connected at least with the camera to receive the video data. The processing circuitry is configured to determine a change in room occupancy of the meeting room and to detect user content on the at least one writing board using the video data. The processing circuitry is further configured to provide a security notification if upon the determination of the change in room occupancy, user content is present on the at least one writing board. | 2022-02-17 |
20220052987 | CONTROLLING ACCESS TO SECURED DATA IN MULTI-SYSTEM EXCHANGE ENVIRONMENTS - An exchange processing system may include multiple exchange components that are respectively included in multiple computing systems. A central exchange component may receive a request to enable access to secured data, the request having identity data encrypted via an identity encryption module and inquiry data encrypted via a first request encryption module. The central exchange component may decrypt the identity data via the identity encryption module, and decrypt the inquiry data via the first request encryption module. Response data may be generated from secured data that is selected based on the identity and inquiry data. The central exchange component may encrypt the response data via a second request encryption module and re-encrypt the identity data via the identity encryption module. The encrypted identity and response data may be provided to a second remote exchange module. | 2022-02-17 |
20220052988 | MANAGING PERMISSIONS TO ACCESS USER DATA IN A DISTRIBUTED LEDGER TRUST NETWORK - Mechanisms to manage permissions to access user data in a distributed ledger trust network (“DLTN”) are described. A given user can share access to user data in a fine-grained way. Access to user data can depend on the category of the user data and/or the role of another user (e.g., whether the other user is recognized as a connection). Access to user data can be limited in duration. Permissions to access user data can be set proactively or reactively. A protocol allows a potential reviewer to request access to the user data of a given user, with the given user selectively approving or rejecting access by the reviewer. In this way, a given user can control access to user data in the DLTN, selectively granting (or revoking) access to some of the user data or all of the user data, by selected other users or by all other users. | 2022-02-17 |
20220052989 | COMMUNICATION METHOD AND COMMUNICATIONS DEVICE - A communication method and a communications device are provided. The communication method may include a service communication proxy (SCP) that receives a service request from a service consumer, where the service request carries a token, and the token includes a network function (NF) set identifier of a service producer. The SCP sends the service request to a service producer selected from a NF set of the service producer. | 2022-02-17 |
20220052990 | DATA CENTER CABLE SECURITY - A system and method for providing cable security in a network is generally described. The method includes receiving a request to remove a cable, where the request includes a first password and a second password, and wherein the cable connects a first port and a second port. The method further includes determining a first authenticity of the first password. After determining the first authenticity of the first password, the method further includes suspending a data flow through the cable, virtually mapping, by a storage device configuration unit, the first port to a third port, and transmitting the data flow from the third port to the second port. The method further includes determining an authenticity of the second password. After determining the authenticity of the second password, the method includes unlocking a physical lock connected to the cable. | 2022-02-17 |
20220052991 | SYSTEMS AND METHODS FOR CONTROLLING PERSONAL INFORMATION ON ONLINE SERVICES - Systems and methods for management and configuration of personal digital privacy and security. A list of protected accounts is received, where each protected account is an online user account associated with a user. For each protected account of the list, a privacy configuration is generated, based at least in part on one or more user-specific privacy rules. A login session for the protected account is accessed, without transmitting or receiving the user's password for the protected account. Based on the accessed login session for the protected account, a plurality of current status indicators are determined for a plurality of privacy settings associated with the protected account. The current status indicators are analyzed to generate updated configuration settings for one or more of the privacy settings of the protected account, and the updated configuration settings are applied to the protected account. | 2022-02-17 |
20220052992 | IDENTITY VERIFICATION METHOD FOR NETWORK FUNCTION SERVICE AND RELATED APPARATUS - In an identity verification method for a network function service, a network element receives from a requesting network element a network function (NF) service request that includes a token, The token includes first certificate information. The network element verifies the first certificate information to determine whether an identity represented by the first certificate information is consistent with an identity of the requesting network element. When the network element determines that the identity represented by the first certificate information is inconsistent with the identity of the requesting network element, the network element rejects the NF service request. | 2022-02-17 |
20220052993 | Configuring Storage Systems In A Fleet Of Storage Systems - Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; determining one or more data storage operations corresponding to the physical storage devices to implement the one or more commands on the storage system; and extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system. | 2022-02-17 |
20220052994 | WIRELESS SIGNAL AUTHENTICATION VIA BIOMETRIC PATTERN DETECTION - One embodiment provides a method, including: identifying a biometric pattern present in a wireless signal associated with an information handling device; determining, using a processor, whether the biometric pattern corresponds to an authorized biometric pattern; and authenticating, responsive to determining that the biometric pattern corresponds to the authorized biometric pattern, a user of the information handling device. Other aspects are described and claimed. | 2022-02-17 |
20220052995 | CONTROLLING THE ACCESS TO AN ASSET BY A SINGLE DEVICE FOR DIFFERENT USERS - Access control to one or more assets by an access point device to a client device utilizing an asset control function of the access point device that determines access to one or more assets attempting to be accessed by any one or more users of a client device is provided. In addition, there is provided a centralized repository to store and/or maintain information and/or data for use by the asset control function where the centralized repository can be local to or remote from the access point device. The novel solutions according to example embodiments of inventive concepts disclosed herein provide features that enhance the network environment of, for example, a home/residential network gateway, wireless access points, Home Network Controller, wireless routers, mesh networking nodes (e.g., Wi-Fi EasyMesh systems), and the like, by providing access control to one or more assets based on the user of the client device. | 2022-02-17 |
20220052996 | METHODS FOR BIOMETRIC VERIFICATION USING A MOBILE DEVICE | 2022-02-17 |
20220052997 | AUTHENTICATION INFORMATION PROCESSING METHOD AND APPARATUS AND USER TERMINAL INCLUDING AUTHENTICATION INFORMATION PROCESSING METHOD AND APPARATUS - Disclosed are an authentication information processing method and apparatus and a user terminal including an authentication information processing method and apparatus. The authentication information processing method performed by the disclosed authentication information processing apparatus comprises the steps of: obtaining biometric information of a user; obtaining a unique key corresponding to the authentication information processing apparatus; and generating an authentication key by using at least a part of the biometric information and at least a part of the unique key. | 2022-02-17 |
20220052998 | PROXIMITY BASED DATA ACCESS RESTRICTIONS - An example method may include a processing system including at least one processor detecting an interaction of a first user and a second user, providing a temporary authorization to the second user to access a data set based upon an authorization of the first user to access the data set, wherein the providing the temporary authorization is in response to the detecting the interaction, generating a record of an access of the second user to the data set, wherein the record includes a notation of the temporary authorization of the second user to access the data set based upon the authorization of the first user, detecting an end to the interaction of the first user and the second user, and revoking the temporary authorization of the second user to access the data set in response to the detecting of the end of the interaction. | 2022-02-17 |
20220052999 | BOOTSTRAPPING WITH COMMON CREDENTIAL DATA - According to the present techniques there is provided a computer implemented method of bootstrapping a device by a bootstrap server, the method comprising: receiving, at the bootstrap server from the device as part of a bootstrap process, common credential data including a trust indicator to indicate that the common credential data is common for a group of devices; obtaining, at the bootstrap server, resource credential data based on or in response to the common credential data, the resource credential data to enable the device to authenticate with a resource; transmitting, from the bootstrap server to the device, the resource credential data. | 2022-02-17 |
20220053000 | CLIENT-SERVER SECURITY ENHANCEMENT USING INFORMATION ACCESSED FROM ACCESS TOKENS - A service computing system receives an API call in which an authorization token, that contains an identifier in the content of the authorization token, is included in a header of the API call. The identifier is also included as a parameter passed in with the API call. The service computing system parses the API call to obtain the authorization token, and the identifier included in the authorization token. It also obtains the identifier passed in as a parameter of the API call. The service computing system compares the identifier obtained from the authorization token to the identifier passed in as a parameter of the API call to determine whether they match. If they do not match, the API call is processed as an unauthorized API call. A security system in the service computing system authorizes the API call based on the comparison. | 2022-02-17 |
20220053001 | METHODS AND APPARATUS FOR AUTOMATIC CONFIGURATION OF A CONTAINERIZED COMPUTING NAMESPACE - Methods, apparatus, systems and articles of manufacture for automatic configuration of a containerized computing namespace are disclosed. An example method includes identifying, in response to creation of a containerized computing namespace, a user account that is to be granted access to a containerized computing namespace, creating a service account, the service account representing the user account for the containerized computing namespace creating a role within the containerized computing namespace, and assigning a role binding between the role and the service account. | 2022-02-17 |
20220053002 | MANAGING MEMBERSHIP RIGHTS IN A DATA EXCHANGE - Systems and methods for managing membership in a private data exchange are provided herein. In one embodiment, the method includes generating, by a first member of a data exchange a listing. The listing comprises a reference to shared data within a database controlled by the first member. The method further includes providing a second member of the data exchange with a set of rights with respect to listing. The method further includes limiting, by a processing device, access for the second member to a portion of the shared data that is less than all of the database referenced by the listing based on the set of rights of the second member with respect to the listing. | 2022-02-17 |
20220053003 | ACCESS NODE, SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO THE INTERNET AND TO TELEVISION - A client device receives, from a user, a request to connect to a medium. The client device sends a request to a server to inquire whether a sufficient amount of credits is stored in an account for the user. The client device then receives a response to the inquiry. If the user account contains at least one credit, a connection is established between the client device and the medium. The server receives, from a controlling terminal, account information for the user, and a list of activities for reporting by the user. This information is stored in the user account. Credits are also stored in the user account. A report related to a performance of an activity part of the list of activities is received from the client device of the user. In response to receiving the report, the number of credits is incremented in the user account. | 2022-02-17 |
20220053004 | SYSTEMS AND METHODS FOR VERIFIED MESSAGING VIA SHORT-RANGE TRANSCEIVER - Systems and methods for verified messaging through the interaction involving a short-range transceiver, such as a contactless card, a client device and a server are presented. Verified messaging may be provided in the context of using a client device to receive a user identifier from the user's short-range transceiver, such as a contactless card, and sending a messaging request with the user identifier to a server, which may look up client device information and compare with data about the client device accompanying the request. Matching received client device information to stored client device data based on a user identifier obtained from a short-range transceiver provides an enhanced ability to verify that the client device corresponds to the user associated with the short-range transceiver. | 2022-02-17 |
20220053005 | DETECTING TROJAN NEURAL NETWORKS - One or more computer processors generate a plurality of adversarial perturbations associated with a model, wherein the plurality of adversarial perturbations comprises a universal perturbation and one or more per-sample perturbations. The one or more computer processors identify a plurality of neuron activations associated with the model and the plurality of generated adversarial perturbations. The one or more computer processors maximize the identified plurality of neuron activations. The one or more computer processors determine the model is a Trojan model by leveraging one or more similarities associated with the maximized neuron activations and the generated adversarial perturbations. | 2022-02-17 |
20220053006 | DETECTION AND MITIGATION OF CRYPTOJACKING - A method of monitoring network traffic for cryptojacking activity is provided. A request is received from a protected host. It is determined whether the request is a cryptocurrency request based on whether the request uses a protocol specified for requests belonging to the cryptocurrency communication. In response to a determination that that the request is a cryptocurrency request for the cryptocurrency, a second request is submitted to a destination indicated by the request, wherein the second request is formatted as a cryptocurrency request for the cryptocurrency. A determination is made whether a reply to the second request from the destination is a cryptocurrency response for the cryptocurrency based on whether the response uses a protocol specified for a response that belongs to communication associated with the cryptocurrency. An intervention action is caused in response to a determination that that the reply to the second request from the destination is a cryptocurrency response for the cryptocurrency. | 2022-02-17 |
20220053007 | SYSTEM AND METHOD FOR DEVICE QUARANTINE MANAGEMENT - A network manager manages a network topology. The network manager includes storage for storing a signature of a network device of the network topology. The network manager also includes a device state manager that obtains a signature of a device that participates in the network topology, the signature indicating that the device is operating in an undesired manner; makes a determination, based on signature, that the device should be in a quarantined state; in response to making the determination: generates a quarantine state update that indicates that the device is in the quarantined state; and sends, by the network manager, the quarantine state update to the device. The quarantine state update does not indicate how the quarantined state is implemented. | 2022-02-17 |
20220053008 | THREAT PROTECTION IN DOCUMENTS - A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module. | 2022-02-17 |
20220053009 | SYSTEMS AND METHODS FOR PROTECTING AGAINST MISLEADING CLICKS ON WEBSITES - The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL. Various other methods, systems, and computer-readable media are also disclosed. | 2022-02-17 |
20220053010 | SYSTEM AND METHOD FOR DETERMINING A COMMUNICATION ANOMALY IN AT LEAST ONE NETWORK - Systems and methods of detecting communication anomalies in a computer network, including: applying a machine learning (ML) algorithm on sampled network traffic, wherein the ML algorithm is trained with a training dataset comprising vectors to identify an anomaly when the ML algorithm receives a new input vector representing sampled network traffic, normalizing a loss determined by the ML algorithm based on the output of the ML algorithm for the new input vector being different from the output of the ML algorithm for the training dataset, and applying the ML algorithm to analyze the normalized loss to identify an anomaly based on at least one communication pattern in the sampled network traffic, allowing a model trained in one installation to serve as a base model in another installation by normalizing the loss vectors of each installation. | 2022-02-17 |
20220053011 | SECURE NEIGHBORHOODS ASSESSMENT IN ENTERPRISE NETWORKS - Systems, methods, and computer-readable media for determine a neighborhood graph can include the following processes. A neighborhood graph system generates a neighborhood graph for a plurality of nodes in an enterprise network, the neighborhood graph representing a multi-hop connections between any two nodes of the plurality of nodes. A security score service determines a security score for each of the plurality of nodes to yield a plurality of scores. The neighborhood graph system updates the neighborhood graph of the plurality of nodes using the plurality of scores to provide a visual representation of securities of the plurality of nodes relative to each other. | 2022-02-17 |
20220053012 | Attack Scenario Simulation Device, Attack Scenario Generation System, and Attack Scenario Generation Method - Attack scenario information describes each state of an information processing system to be attacked and an attack scenario including a chain of actions that can be taken in the state, an action that transitions from a first state to a second state is obtained with reference to state information, action information, and attack tactics information, a reward of the action is obtained with reference to reward information, the action information, and the attack tactics information, an expected reward of the reward of the action that transitions from the first state to the second state is obtained with reference to success probability information, the highest expected reward is set as a state value of reinforcement learning of the first state among the expected rewards of the action, and the attack scenario is generated by the reinforcement learning. | 2022-02-17 |
20220053013 | USER AND ENTITY BEHAVIORAL ANALYSIS WITH NETWORK TOPOLOGY ENHANCEMENT - A system and method for network cybersecurity analysis that uses user and entity behavioral analysis combined with network topology information to provide improved cybersecurity. The system and method involve gathering network entity information, establishing baseline behaviors for each entity, and monitoring each entity for behavioral anomalies that might indicate cybersecurity concerns. Further, the system and method involve incorporating network topology information into the analysis by generating a model of the network, annotating the model with risk and criticality information for each entity in the model and with a vulnerability level between entities, and using the model to evaluate cybersecurity risks to the network. Risks and vulnerabilities associated with user entities may be represented, in part or in whole, by the behavioral analyses and monitoring of those user entities. | 2022-02-17 |
20220053014 | System and method for clustering security-related information - A system and method clusters security-related information in a network having a target system with at least one target host. A security-analysis tool is in communication with the network. A security workspace having a data store is in communication with the network. A data intake and integration module receives security information from the security analysis tool into the security workspace and enters the security information into first and second columns of a table in the data store. A weight assignment module adds a third column to the table. A partitioning module determines a smallest-cost partition of a bipartite graph represented by the table, and an electronic display displays the smallest-cost partition. | 2022-02-17 |
20220053015 | SYSTEMS FOR COMPUTER NETWORK SECURITY RISK ASSESSMENT INCLUDING USER COMPROMISE ANALYSIS ASSOCIATED WITH A NETWORK OF DEVICES - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path. | 2022-02-17 |
20220053016 | SYSTEMS AND METHODS FOR CYBER SECURITY ALERT TRIAGE - The present disclosure is directed to systems, apparatuses and methods for mitigating cyber-attacks. For example, the method includes receiving, from one or more network devices tracking activity on a network, one or more data streams associated with a respective one of the one or more network devices, identifying a security alert from the one or more data streams, the security alert including metadata context describing the network device from the one or more network devices that originated the security alert, analyzing the metadata context to generate a metadata context score. When the security alert is determined to be a security threat event, classifying a type of the security threat event based on the related activity score and the metadata context, and outputting a recommended mitigation course of action based on the classified type of the security threat event. | 2022-02-17 |
20220053017 | MODIFYING INCIDENT RESPONSE TIME PERIODS BASED ON INCIDENT VOLUME - Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one example, an advisement system identifies a rule set for a security incident based on enrichment information obtained for the security incident, wherein the rule set is associated with action recommendations to be taken against the incident. The advisement system further identifies a default SLA for the security incident based on the rule set, and obtains environmental characteristics related to the security incident. Based on the environmental characteristics, the advisement system determines a modified SLA for the security incident. | 2022-02-17 |
20220053018 | SYSTEM AND METHOD FOR DETECTION AND MITIGATION OF A DOS/DDOS ATTACK - A system and method for detecting and mitigating a Slow read DoS/DDoS attack on a server is described. Network packets from a client device in a real-time TCP connection are received and a TCP window size field (WSF) value is extracted from each packet. It is determined if the extracted WSF value is smaller than a preset WSF value. A first parameter is incremented when the WSF value of a packet is below the preset WSF value, and a second parameter is incremented when the WSF value for each successive packet is below the preset WSF value. A Slow read DoS/DDoS attack is detected when at least one of the first and the second parameters exceed the corresponding respective maximum limit. One or more actions are then carried out to mitigate the attack. | 2022-02-17 |
20220053019 | METHODS AND APPARATUS TO AUTOMATE CYBER DEFENSE DECISION PROCESS AND RESPONSE ACTIONS BY OPERATIONALIZING ADVERSARIAL TECHNIQUE FRAMEWORKS - In some embodiments, a method can include identifying detection coverage of a set of adversarial techniques based on telemetry data and a detection instance of an environment. The method can further include determining a subset of detection coverage that has a metric value below a metric value threshold and among the detection coverage for the set of adversarial techniques. The method may further include identifying at least one detection instance associated with the subset of detection coverage. The method can further include presenting, via a graphical user interface, a representation of at least one of the subset of detection coverage or the at least one detection instance associated with the subset of detection coverage. The method can further include updating the subset of detection coverage based on the telemetry data, the detection instance, or the at least one detection instance to improve the metric value. | 2022-02-17 |
20220053020 | GENERALIZED LOCALIZATION SYSTEM BASED ON PHYSICAL LAYER SUPPORTED SPOOFING DETECTION AND IDENTIFICATION VERIFICATION - A generalized localization system based on a physical layer aided spoofing signal attacks detection and an identification verification for hybrid heterogeneous networks including aerial and terrestrial communication systems is provided. The generalized localization system includes: a data preprocessing and separation block, a parameter extraction block, a local localization engine, a reliability assessment and trust management block, a location based anomaly detector block and a global fusion center. | 2022-02-17 |
20220053021 | Terminal Matching Method and Apparatus - Embodiments of this application disclose a terminal matching method and apparatus. The method includes: obtaining, by a second terminal, an interface address of a first terminal, where the interface address of the first terminal is MAC1; receiving, by the second terminal, a first message sent by the first terminal, where an interface address of the first terminal in the first message is MAC3 obtained after a change, and the first message includes first identification information; and comparing, by the second terminal, the first identification information with second identification information, and if the first identification information is consistent with the second identification information, determining, by the second terminal, that the MAC3 in the first message and the MAC1 that is obtained by the second terminal are used to identify a same device, where the same device is the first terminal. | 2022-02-17 |
20220053022 | AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION - Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Anomalous events may be classified based on the monitored network traffic and attack models such that the classification determines that targets of the anomalous events may be currently subject to attacks by entities communicating on the networks. A honeypot trap may be provided in the networks based on the classified events such that the honeypot trap mimics characteristics of the targets. The portions of the network traffic associated with the honeypot trap may be monitored. Characteristics of the attacks may be determined based on the monitored portions of network traffic. Reports that include information based on the characteristics of the attacks may be generated. | 2022-02-17 |
20220053023 | ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERS - Methods, systems, and devices supporting active fingerprinting for transport layer security (TLS) servers are described. In some systems, a client device may transmit a same set of client hello messages to each TLS server. The client device may receive a set of server hello messages in response to the standard set of client hello messages based on the contents of each client hello message. For example, a server hello message may indicate a selected cipher suite, TLS protocol version, and set of extensions in response to the specific information included in a client hello message. The client device may generate a hash value (e.g., a fuzzy hash) based on the set of server hello messages received from a TLS server. By comparing the hash values generated for different TLS servers, the client device may determine whether the TLS configurations for the different TLS servers are the same or different. | 2022-02-17 |
20220053025 | METHOD AND DEVICE FOR CONFIGURING AN ACCESS PROTECTION SYSTEM - A computer-implemented method for configuring an access protection system which is suitable for regulating a data communication link of a computer-implemented application between a first computer network and a second computer network is provided. For this purpose, the computer-implemented application is run in the first computer network in a production environment or in an image of the first computer network in a test system. A data communication link of the computer-implemented application to the second computer network is determined by a sensor and a configuration rule is derived therefrom for the access protection system for permitting the data communication link of the computer implemented application between the first computer network and the second computer network in the production system. Also provided are a device, a test system, an access protection system, a computer program product and a computer-readable data carrier. | 2022-02-17 |
20220053026 | Semi-Automatic Communication Network Microsegmentation - A technique for microsegmentation includes receiving information related to hosts and applications operating in a network where the information was obtained based on a survey of the network; identifying a plurality of microsegments utilizing the information, each microsegment includes a set of hosts similar to one another; for each of the plurality of microsegments, identifying security policies that control access to hosts in each microsegment; and providing the plurality of microsegments and corresponding security policies for approval thereof. | 2022-02-17 |
20220053027 | DIVIDING A DATA PROCESSING DEVICE INTO SEPARATE SECURITY DOMAINS - This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different environments, such as those including personal applications and corporate applications, so that both types of applications can run simultaneously while complying with all required policies. The invention enables employees to use their personal devices for work purposes, or work devices for personal purposes. The secure, policy-based separation is created by dividing the data processing device into two or more “domains,” each with its own policies. These policies may be configured by the device owner, an IT department, or other data or application owner. | 2022-02-17 |
20220053028 | DATA ACCESS POLICIES - To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed. | 2022-02-17 |
20220053029 | APPARATUS AND METHOD FOR MANAGING CONCURRENT ACTIVATION OF BUNDLE INSTALLED IN SMART SECURITY PLATFORM - The disclosure provides a method of managing a bundle installed in an SSP, the method including obtaining SSP setting information and determining a concurrent enabling limit value for each bundle family identifier based on the obtained SSP setting information. | 2022-02-17 |
20220053030 | ENHANCEMENTS FOR SECURE UPDATING IN COMMUNICATION NETWORKS - According to an example aspect of the present invention, there is provided a method comprising transmitting to a security service provider, by a firewall apparatus, a request to update firewall strategy of the firewall apparatus for a location center, wherein the request comprises at least one characteristic of the firewall apparatus, the at least one characteristic of the firewall apparatus further comprising load data of the firewall apparatus, receiving from the security service provider, by the firewall apparatus, an updated firewall strategy for the location center, wherein the updated firewall strategy comprises load data required by the updated firewall strategy and adjusting the operation of the firewall apparatus based on the updated firewall strategy by reserving resources at the firewall apparatus for updates according to the required load data. | 2022-02-17 |
20220053031 | METHODS AND DEVICES FOR CONTINUATION OF TERMINATING SERVICES IN IMS COMMUNICATION NETWORKS - A method implemented by a first network node in an IMS communication network is provided. The method may comprise: receiving a register request from a user equipment; and transmitting the register request which comprises contact information of the user equipment to a second network node. In the present disclosure, the P-CSCF may be able to route the terminating requests without UE registration bindings, which increases a successful rate of the terminating services. | 2022-02-17 |
20220053032 | RECEIVING DEVICE, RECEPTION METHOD, TRANSMITTING DEVICE, AND TRANSMISSION METHOD - The present technology relates to a receiving device, a reception method, a transmitting device, and a transmission method capable of performing an effective filtering process. There is provided a receiving device including a filtering processing unit that performs a filtering process of a packet by using filtering information arranged in a header of the packet transmitted in a first layer that is a layer upper than an IP layer in layers of a protocol of the IP transmission system in a broadcasting wave of digital broadcasting using an IP transmission system. The present technology, for example, can be applied to a television set. | 2022-02-17 |
20220053033 | METHODS AND DEVICES FOR ESTABLISHING A STREAMING SESSION IN A FRAMEWORK FOR LIVE UPLINK STREAMING - A Framework for Live Uplink Streaming (PLUS) session between a PLUS source ( | 2022-02-17 |
20220053034 | IMS NODE AND METHOD PERFORMED THEREIN - Embodiments herein relate to a method performed by an IMS node for handling data of a UE, in a communication network, wherein the communication network comprises partitioned sets of functionalities of one or more core networks wherein each set of functionalities belongs to a network slice. The IMS node receives, from the UE, a message for registering the UE to the IMS node, wherein the message comprises a slice indication indicating a network slice identity and a UE indication identifying the UE. The IMS node stores a registration of the UE in the IMS node, in addition to a previously stored registration of the UE, with the proviso that the indicated network slice identity differs from a previous network slice identity of the previously stored registration of the UE and thereby allowing parallel active communications using the registration and the previously stored registration. | 2022-02-17 |
20220053035 | APPLICATION AWARE ANNOTATIONS IN ONLINE COLLABORATIVE SESSIONS - An online collaborative session application executing on a processing device tracks a state of an application shared by the processing device over an online collaborative session. The online collaborative session application receives data indicative of an annotation made to an instance of the application as part of the online collaborative session. A first location of the annotation relative to the instance of the application is determined from the data indicative of the annotation and the state of the application. Based on the tracking, a change to the state of the application is determined. A second location of the annotation is determined based on the change of the state of the application. | 2022-02-17 |
20220053036 | Optimizing Dynamic Open Space Environments Through a Reservation Service Using Collaboration Data - The present disclosure is directed to optimizing dynamic open space environments and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including receiving a reservation request for a workspace through a user device associated with a user; deriving dynamic user information comprising collaboration data derived from a collaboration service, the collaboration data based on a collaboration history of the user; analyzing the user information to determine one or more workspace suggestions for the user; transmitting the one or more workspace suggestions to the user device; receiving, through the user device, a workspace selection from the one or more workspace suggestions; and updating a reservation of the user in accordance with the workspace selection. | 2022-02-17 |
20220053037 | DISTANCE-BASED FRAMING FOR AN ONLINE CONFERENCE SESSION - Distance-based framing includes obtaining at least a video stream during an online conference session. The video stream, an audio stream received with the video stream, or both the video stream and the audio stream are analyzed and a framing that either focuses on a speaker in the video stream or provides an overview of participants in the video stream, the framing being is composed based on the analyzing. A potential error in the framing is detected based on further analysis of at least one of the video stream, the audio stream, or distance sensor data received with the video stream. If the distance sensor data contradicts the potential error, the framing is maintained, but if the distance sensor data confirms the potential error, a new framing is generated. | 2022-02-17 |
20220053038 | ONLINE MEDIATION AND SETTLEMENT OF DISUPTES - A computer-implemented method of mediating and settling a dispute, the method comprising: establishing a video conference session between participants in a mediation of the dispute, wherein the video conference session comprises a video stream, an audio stream, and an information stream, wherein the information stream comprises one or both of: a chat stream between some or all of the participants to display and receive chat messages relating to the mediation of the dispute, a term drafting stream to display and receive user text input from one of the participants relating to draft terms of settlement of the dispute. | 2022-02-17 |
20220053039 | SYSTEM AND METHOD FOR AUGMENTED REALITY VIDEO CONFERENCING - A system includes a plurality of capturing devices and a plurality of displaying devices. The capturing devices and the displaying devices can be communicatively connected to a server. The server can receive captured data from the capturing devices and transform the data into a digitized format. At least one of the capturing devices can record a video during a meeting and the capturing device can transmit the captured video to the server as a video feed. The video feed can show an area that includes handwritten text, e.g., a whiteboard. The server can receive the video feed from the capturing device and perform various processes on the video. For example, the server can perform a voice recognition, text recognition, handwriting recognition, face recognition and/or object recognition technique on the captured video. | 2022-02-17 |
20220053040 | SYSTEMS AND METHODS FOR MULTIPLE DEVICE CONTROL AND CONTENT CURATION - Disclosed is a master electronic device configured to create a content capture session executable by a plurality of electronic devices comprising at least one client electronic device. The master electronic device may comprise: a user interface module configured to receive at least one session parameter; a processor configured to create at least one content capture session based on the at least one session parameter; and a communication means configured to communicate data between the master electronic device and at least one client electronic device, wherein the communication comprises transmission of at least one session parameter, wherein the at least one client electronic device is configured to participate in the at least one content capture session according to the at least one session parameter. | 2022-02-17 |
20220053041 | Methods for sharing private video streams with first responders under facility administrator control - A method enables video surveillance service subscribers to share image streams with individual first responder agencies in the event of emergency. Nominated agencies establish access credentials at the surveillance service data center. A customer administrator selects permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, spectrum, and epoch. Setting ranges of time controls access to video streams of present and past epochs. A responding agency presents their access credential and a handle for each shared camera of interest upon receiving an electronic notification from the administrator. Dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation customizes a notification for each responding agency and each event. Under control by a customer administrator, a virtual machine dedicated to each responding agency instantiates a video server. | 2022-02-17 |
20220053042 | METHOD AND APPARATUS FOR ADJUSTING STREAMING MEDIA CONTENT BASED ON CONTEXT - Aspects of the subject disclosure may include, for example, responsive to a viewing request associated with a media content item, for each original content segment of a plurality of content segments of the media content item determining whether content characteristic information associated with the original content segment is compatible with viewing context information associated with the viewing request, and, if not compatible, then replacing the original content segment with an alternative content segment of the plurality of content segments, and streaming the alternative content segment to a user device, and, if compatible, then responsive to determining the content characteristic information is compatible with the viewing context information, streaming the original content segment to the user device. Other embodiments are disclosed. | 2022-02-17 |
20220053043 | Parallel Execution of Request Tracking and Resource Delivery - Systems and methods of parallel uniform resource identifier resource extraction are provided. A tracking uniform resource identifier (URI) generation component can generate a first uniform resource locator (URL) that, responsive to actuation by a client computing device, causes the client computing device to send a content item identifier of a content item and a device identifier of the client computing device, via a computer network, to a records server at a first network location identified by the first URL. A resource URI generation component can generate a second URL that, responsive to actuation by the client computing device, causes the client computing device to retrieve, via the computer network, a first resource from a second network location identified by the second URL for display by the client computing device. A content item packaging component can generate the content item. | 2022-02-17 |
20220053044 | Retrieval and Playout of Media Content - An example method involves (i) accessing a playlist defining a sequence of media content items including a first media content item and a second media content item; (ii) retrieving, from one or more server devices, first data representing the media content items of the received playlist, and using the retrieved first data to play out, via a client device, the media content items in accordance with the sequence defined by the playlist; (iii) accessing second data representing user activity related to the client device, and using the accessed second data as a basis to select a media content item from a plurality of media content items; and (iv) retrieving third data representing the selected media content item, and using the retrieved third data to play out, via the client device, the selected media content item in between playing out the first and second media content items. | 2022-02-17 |
20220053045 | SYSTEMS AND METHODS FOR PROVIDING REAL-TIME STREAMING DATA PROCESSING AT EDGE SERVERS - Systems and methods provide synchronizing edge server code among a plurality of edge servers. Systems and methods provision, to a plurality of edge servers, an updated version of transform code adapted to perform real-time processing on real-time streaming data that are received by the plurality of edge servers, receive real-time transformed data from at least one of the plurality of edge servers, detect that the received real-time transformed data from the at least one of the plurality of edge servers was generated using a previous version of transform code and perform one or more transform operations corresponding to the updated version of transform code on the received real-time transformed data, until the received transformed data is in a form consistent with the updated version of provisioned transform code. | 2022-02-17 |
20220053046 | OPTIMIZATION OF FILES COMPRESSION - A device for optimizing the scheduling of files to be sent to an application server at regular time intervals, the device configured to:
| 2022-02-17 |
20220053047 | PINHOLE ACCESS FOR ELEVATED CONTAINERIZED PROCESS CAPABILITY - A system described herein may provide a technique for providing extended container capabilities via helper functions that are executed by an entity with a higher privilege level than that of the containerized process. In order to limit the opportunity for malicious or otherwise unauthorized use of such extended container capabilities, such helper functions may limit enabled arguments and/or otherwise limit utilization of functionality associated with a higher privilege level. | 2022-02-17 |
20220053048 | REMOTE LATENCY CALLS FOR LATENCY CLUSTERED COMPUTE INSTANCES - A device receives, from a first compute instance, a Remote Latency Call, that includes a target round trip time (RTT), a function, and one or more arguments for the function. The device determines, responsive to the Remote Latency Call, a first cluster of compute instances that satisfies the target RTT. The device migrates code associated with the function to a second compute instance within the first cluster of compute instances, and passes the arguments to the second compute instance for execution of the function. | 2022-02-17 |
20220053049 | SYSTEM AND METHODS FOR IDENTIFICATION OF PEER ENTITIES - In an illustrative embodiment, systems and methods for automatically identifying peer organizations of a subject organization within a transactional platform identify peer organizations of the subject organization by accessing characteristic features and transactional features of the subject organization, providing a portion of the features to similarity analysis models, and obtaining, through executing the models, predicted peer organizations. The predicted peers may be presented to a user arranged in priority order with some peer features of the respective organization and a control for selecting the respective peer. The user may select a subset of the predicted peers for use in comparison metrics. | 2022-02-17 |
20220053050 | INFORMATION PROCESSING SYSTEM, PROCESS EXECUTING SYSTEM, PROCESS EXECUTING METHOD, AND RECORDING MEDIUM - An information processing system configured to communicate with an apparatus and an external server and to perform a series of processes specified by the apparatus is provided. The information processing system includes a memory, and a processor coupled to the memory and configured to identify a program that is executed in the external server based on the series of processes specified by the apparatus, and control the operational state of the external server in which the identified program is executed. | 2022-02-17 |
20220053051 | DETECTING UNEVEN LOAD BALANCING THROUGH MULTI-LEVEL OUTLIER DETECTION - The present disclosure is directed towards systems and methods of detecting a cause of anomalous load balancing among a plurality of servers. A device intermediary to a plurality of clients and a plurality of servers collects values of a plurality of counters. The device identifies a server of the plurality of servers that is an outlier. The device can identify a counter of the plurality of counters that is an outlier based on at least a comparison of values of each of the plurality of counters for each of the plurality of servers. The device can provide, responsive to the determination, an indication that a value of the counter is a factor causing the server to have uneven load balancing during the time interval. | 2022-02-17 |
20220053052 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR UPDATING A NETWORK'S KNOWLEDGE OF THE NETWORK'S TOPOLOGY - The computer implemented invention provides a method, corresponding systems and arrangement within a network for detecting changes in the topology, ordering those changes by occurrence and constructing a new topology reflecting the changes. The invention addresses problems with keeping the knowledge of the network topology at each network node current, particularly when the network topology is dynamic, i.e. when links fail and recover at arbitrary times. The topology updating is event driven, as it is activated when some change in the network, particularly with nodes and links occurs. Events cause topology changes to be reported to other nodes in the network. Timestamping of messages allows the messages to be correctly applied as the most recent update or discarded. An algorithm is provided that allows each merchant node to maintain a correct view of the network topology despite link and node failures. | 2022-02-17 |
20220053053 | TRANSMISSION DEVICE, TRANSMISSION METHOD, RECEPTION DEVICE, RECEPTION METHOD, AND TRANSMISSION-RECEPTION DEVICE - Transmission devices and methods configured to separate signal processing of different layers are disclosed. In one example, a transmission device includes a first signal processing unit that performs, as processing of a first layer, processing of generating a packet that stores data to be transmitted and distributing the packet that has been generated to a plurality of lanes, and a second signal processing unit that performs, as processing of a second layer, processing including insertion of control information in parallel on the packet of each of the lanes output from the first signal processing unit, and processing of outputting a data stream obtained by performing the processing onto a transmission line to the reception device. | 2022-02-17 |