14th week of 2019 patent applcation highlights part 54 |
Patent application number | Title | Published |
20190104137 | PLAYBOOK-BASED SECURITY INVESTIGATIONS USING A CARD SYSTEM FRAMEWORK - Examples disclosed herein relate to playbook-based security investigations using a card system framework. Some of the examples enable receiving an indication that a playbook is selected for investigating a security alert object, the playbook comprising a plurality of cards, wherein a first object definition associated with the security alert object comprises a parameter, and wherein the playbook inherits a value of the parameter from the first object definition; causing a first card from the playbook to be displayed on a user interface, the first card comprising a first content tile that describes the security alert object; and causing a second card from the playbook to be displayed on the user interface, the second card comprising a second content tile that describes a second object, wherein a second object definition associated with the second object comprises the parameter inherited from the first object definition. | 2019-04-04 |
20190104138 | AUTONOMOUS EDGE DEVICE FOR MONITORING AND THREAT DETECTION - Techniques are described for monitoring an operational technology environment (OTE) to detect threats, and performing actions to respond to detected threats. Edge device(s) are arranged to monitor and/or control the operations of component(s) within an OTE. An edge device stores threat profiles, each including a set of physical indicators that would, if exhibited by sensor data collected from the component, indicate the presence of a particular threat in the OTE. The edge device may collect sensor data from sensor devices situated in or near the monitored component. By comparing the sensor data to the threat profile(s), the edge device determines whether any of the threats described by the threat profiles are currently active. If a threat is detected, the edge device sends an alert message to server computing device(s). In some instances, the edge device can also autonomously perform response or remediation action(s) in response to detecting a threat. | 2019-04-04 |
20190104139 | GENERATION OF MALWARE TRAFFIC SIGNATURES USING NATURAL LANGUAGE PROCESSING BY A NEURAL NETWORK - The technology disclosed herein enables the generation of malware traffic signatures by performing natural language processing on known malware traffic using a neural network. In a particular embodiment, a method provides generating sentences comprising first information obtained from a plurality of fields in each of a plurality of known malware data packets in a first malware family. The method further provides inputting the sentences into a first neural network for natural language processing of the sentences and generating one or more signatures for the first malware family from results of the natural language processing of the sentences. | 2019-04-04 |
20190104140 | SYSTEM AND METHOD OF CLOUD DETECTION, INVESTIGATION AND ELIMINATION OF TARGETED ATTACKS - Disclosed are systems and methods for cloud detection, investigation and elimination of targeted attacks. In one exemplary aspect, the system comprises a computer protection module configured to: gather information on an object in a computer in a network; and save a security notification with the object in an object database in the network; and a module for protection against targeted attacks configured to: search for the object in a threat database in the network; add one or more tags to the object when the object is found in the threat database and adding a correspondence between a record in the object database and the threat database; and determine that a computer attack has occurred when the one or more tags correspond to signatures in a database of computer attacks. | 2019-04-04 |
20190104141 | System and Method for Providing and Facilitating an Information Security Marketplace - Malware detection is provided via a marketplace for the analyzing and remediating of cyber-related threats and disseminating related resolution templates. An information security marketplace facilitates the ability to monetize the information obtained through and generated by an incoming attack on an organization. Actionable reports are sold to other organizations in the same market segment or region (e.g. one carrier will buy from other carriers in the same region), or AV vendors, or companies that are interested to buy such threat intelligence information, indicators, etc. | 2019-04-04 |
20190104142 | SECURING SERVICES IN A NETWORKED COMPUTING ENVIRONMENT - A computer-implemented method includes: detecting, by a user device, an event that indicates a potential security compromise of the user device; determining, by the user device, a service accessible on the user device; sending, by the user device, a breach notification to a service provider corresponding to the service accessible on the user device; receiving, by the user device, a security profile from the service provider; and restricting, by the user device, access to the service provider by a client of the service provider on the user device until the security profile is satisfied by a user completing a security challenge defined in the security profile. | 2019-04-04 |
20190104143 | METHOD FOR SENSING FRAUDULENT FRAMES TRANSMITTED TO IN-VEHICLE NETWORK - A fraud sensing method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network includes detecting that a state of a vehicle satisfies a predetermined condition, and switching, upon detecting that the state of the vehicle satisfies the predetermined condition, an operation mode of a fraud-sensing electronic control unit connected to the network between a first mode in which a first type of sensing process for sensing a fraudulent message in the network is performed and a second mode in which the first type of sensing process is not performed. | 2019-04-04 |
20190104144 | ENHANCED FLOW-BASED COMPUTER NETWORK THREAT DETECTION - In one example embodiment, a threat detection server receives metadata of a network flow in a network; a zone definition that correlates the metadata of the network flow with a first zone of network devices in the network and a second zone of network devices in the network, where the network flow was transmitted from the first zone to the second zone; and a security policy for the network flow, where the security policy is enforced on the basis of the first zone and the second zone. Based on the zone definition, the threat detection server annotates a flow record that includes the metadata with an indication of the first zone and the second zone. Based on the annotated flow record and the security policy, the threat detection server determines whether to generate a notification associated with a detection of a security threat associated with the network flow. | 2019-04-04 |
20190104145 | SYSTEMS AND METHODS FOR NETWORK TRAFFIC ANALYSIS - Systems and methods are disclosed for identifying malicious traffic associated with a website. One method includes receiving website traffic metadata comprising a plurality of variables, the website traffic metadata being associated with a plurality of website visitors to the website; determining a total number of occurrences associated with at least two of the plurality of variables of the website traffic metadata; generating a plurality of pairs comprising combinations of the plurality of variables of the website traffic metadata; determining a total number of occurrences associated with each pair of the plurality of pairs of combinations of the plurality of variables of the website traffic metadata; determining a plurality of visitor actions associated with the plurality of variables of the website traffic metadata; clustering each of the plurality of pairs and the plurality of visitor actions associated with the plurality of variables of the website traffic metadata into groups; and determining, based on the clustering of the plurality of pairs and the plurality of visitor actions, whether each of the plurality of website visitors are malicious visitors. | 2019-04-04 |
20190104146 | Retrieving Network Packets Corresponding to Detected Abnormal Application Activity - A system and computer program product for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding to information associated with the abnormal application activity in a data processing system. The packets are analyzed to identify content of the network packets causing the abnormal application activity. Network packets containing the content causing the abnormal application activity in the data processing system are blocked. | 2019-04-04 |
20190104147 | INTRUSION INVESTIGATION - A process to investigate intrusions with an investigation system is disclosed. The process receives forensic facts from a set of forensic events on a system or network. A suspicious fact is identified from the forensic facts. A related fact from the forensic facts is identified based on the suspicious fact. | 2019-04-04 |
20190104148 | Retrieving Network Packets Corresponding to Detected Abnormal Application Activity - A method for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding to information associated with the abnormal application activity in a data processing system. The packets are analyzed to identify content of the network packets causing the abnormal application activity. Network packets containing the content causing the abnormal application activity in the data processing system are blocked. | 2019-04-04 |
20190104149 | HARDWARE MODULE-BASED AUTHENTICATION IN INTRA-VEHICLE NETWORKS - A secure hardware-based module or Security Electronic Control Unit (SECU) for a Controller Area Network (CAN) prevents an attacker from sending malicious messages through the CAN bus to take over control of a vehicle. The SECU shares a unique key and counter with each ECU on the CAN bus. When a legitimate ECU sends a message, it first compresses the message and then generates a MAC of the counter and a secret key. The counter is increased by one for each transmitted message. The ECU then fits the compressed message and the MAC into one CAN frame and sends it onto the CAN bus. The SECU performs the message verification on behalf of the intended receiver(s) of the message. If the verification passes, the receiver(s) simply decompress the message and use it as a normal CAN message. If the verification fails, the SECU will corrupt the CAN frame before it is fully received by the intended receiver(s). The corrupted CAN frame will be ignored by the intended receiver(s) as if it was never received. Therefore, a malicious message generated by an attacker will inflict no damage on the system. | 2019-04-04 |
20190104150 | DENIAL OF SERVICE MITIGATION WITH TWO-TIER HASH - A computing apparatus for providing a node within a distributed network function, including: a hardware platform; a network interface to communicatively couple to at least one other peer node of the distributed network function; a distributor function including logic to operate on the hardware platform, including a hashing module configured to receive an incoming network packet via the network interface and perform on the incoming network packet a first-level hash of a two-level hash, the first level hash being a lightweight hash with respect to a second-level hash, the first level hash to deterministically direct a packet to one of the nodes of the distributed network function as a directed packet; and a denial of service (DoS) mitigation engine to receive notification of a DoS attack, identify a DoS packet via the first-level hash, and prevent the DoS packet from reaching the second-level hash. | 2019-04-04 |
20190104151 | CLOUD-BASED FORENSIC IP TRACEBACK - A method for IP traceback is provided comprising receiving a traceback request including the identity of a traceback-deployed autonomous system closest to the destination node in a network routing path, recursively querying a traceback server associated with the traceback-deployed autonomous system to receive the identity of a preceding traceback-deployed autonomous system in the network routing path, and determining the network routing path based on the received identities of traceback-deployed autonomous systems. Additionally, authentication for traceback request is achieved using token delivery, wherein token is fragmented and marking of a packet is performed when a field on the packet matches at least one token fragment. | 2019-04-04 |
20190104152 | BLIND INJECTION ATTACK MITIGATION - Blind injection attacks can compromise computer systems and their data. These attacks can appear in SQL, XML, LDAP, OS commands, or other contexts. Blind injection attacks may be used to obtain information from a data source based on whether a response is returned within a certain time frame. By introducing intentional delay servicing of commands , however, the efficacy of blind injection attacks can be reduced. SQL query statements or other commands can be analyzed to determine if a conditional delay exists, and randomization effects can be used (sometimes based on length of the conditional delay) to make it difficult for an attacker to use blind injection. These techniques may broadly apply to any data source, and include databases exposed to the public via the internet (e.g. via a web server URL). Blind SQL injection, blind XML injection, and other blind injection attacks can be mitigated using techniques described herein. | 2019-04-04 |
20190104153 | DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING - The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network. | 2019-04-04 |
20190104154 | PHISHING ATTACK DETECTION - A computerized method for analyzing a subject URL to determine whether the subject URL is associated with a phishing attack is disclosed. The method includes steps of detecting keypoints within a screenshot of a webpage corresponding to the subject URL and determining a set of confidences based on an analysis of the detected keypoints with a model. Each confidence within the set of confidences is assigned to feature vector within a set of training feature vectors representing a training set of URLs used in generating the model. The method comprises performing an image comparison between the screenshot and a screenshot corresponding to a feature vector within the set of training feature vectors, the feature vector being assigned a highest confidence. Responsive to determining the image comparison result exceeds a predefined threshold, transmitting an alert indicating that the subject URL is associated with the phishing attack. | 2019-04-04 |
20190104155 | Automated Mitigation of Electronic Message Based Security Threats - An example embodiment may include a security enforcement point device disposed within a managed network and a security decision point device disposed within a computational instance of a remote network management platform. The security decision point device may be configured to: receive a message by way of the managed network; parse the message to identify observable indicators of one or more of the security threats, where the observable indicators include at least one of a network addresses, a hyperlink, or a representation of an attached file; remotely query a security threat database for the observable indicators; receive, from the security threat database, an indication that the observable indicators are associated with a particular security threat, and transmit, to the security enforcement point device, a command to update its associated security policy such that the particular security threat is mitigated. | 2019-04-04 |
20190104156 | SYSTEMS AND METHODS FOR AUTOMATED GOVERNANCE, RISK, AND COMPLIANCE - Systems and methods for configuration vulnerability checking and remediation are provided. The systems provided herein map vulnerability data with compliance data, such that automated compliance indication may be facilitated. | 2019-04-04 |
20190104157 | CHATBOT INTERFACE FOR NETWORK SECURITY SOFTWARE APPLICATION - A chatbot interface is provided for a network security software application. The chatbot interface can receive and act upon text utterances from a user or from a speech-to-text engine in instances where the user provided a voice utterance. The chatbot interface also can automatically perform tasks relating to network security. In one embodiment, the chatbot interface receives a text utterance, performs named entity recognition on the text utterance, performs intent classification to determine the intent of the text utterance, and performs an action based on the determined intent. | 2019-04-04 |
20190104158 | NETWORKING FLOW LOGS FOR MULTI-TENANT ENVIRONMENTS - Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a firewall or other security device such that certain information does not reach the computing resources provided to the customer. A logging entity may be implemented on computer server operated by the computing resource service provider. The logging entity may obtain log information from the firewall or other security device and store the log information such that it is accessible to the customer. Additionally, the log information may be provided to other services such as a metrics service or intrusion detection service. | 2019-04-04 |
20190104159 | REAL-TIME POLICY DISTRIBUTION - In one example, there is disclosed a domain master for a data exchange layer (DXL), including: a hardware platform configured to execute instructions; and one or more memories having stored thereon instructions to instruct the hardware platform to: communicatively couple to the DXL; provide a DXL messaging service including native support for request-response (1:1) transactions via a publish-subscribe (1:N, N>1) fabric; provide DXL domain master services for a DXL domain; and provide DXL-based real-time policy and task distribution for DXL endpoints of the DXL domain. | 2019-04-04 |
20190104160 | METHOD AND APPARATUS FOR CENTRALIZED POLICY PROGRAMMING AND DISTRIBUTIVE POLICY ENFORCEMENT - A method and apparatus for centralized policy programming and distributive policy enforcement is described. A method comprises centrally maintaining a plurality of policy definitions for one or more subscribers, generating policy configurations using the plurality of policy definitions, each of the policy configurations being specific to one of the plurality of policy definitions, and disseminating the policy configurations to the appropriate ones of the subscribers' networks. | 2019-04-04 |
20190104161 | SYSTEMS AND METHODS FOR DIRECTLY ACCESSING VIDEO DATA STREAMS AND DATA BETWEEN DEVICES IN A VIDEO SURVEILLANCE SYSTEM - Systems and methods for directly accessing video data streams and data between devices in a video surveillance system can include a first camera of a mobile device capturing an image of a field of view of a video data stream displayed on a second device, the mobile device matching the field of view with a source of the video data stream, and responsive to matching the field of view with the source, the mobile device retrieving the video data stream directly from the source. | 2019-04-04 |
20190104162 | ENTERPRISE CLIENT-SERVER SYSTEM AND METHODS OF PROVIDING WEB APPLICATION SUPPORT THROUGH DISTRIBUTED EMULATION OF WEBSOCKET COMMUNICATIONS - A request to establish a bi-directional full-duplex network connection is received. The request conforms to a half-duplex network connection protocol and the half-duplex connection protocol is a HTTP based protocol. The request is processed to determine a decision on whether to allow the bi-directional full-duplex connection. In the event the decision is to allow the bi-directional full-duplex connection, the bi-directional full-duplex network connection is established using the half-duplex network connection protocol. The bi-directional full-duplex connection utilizes a WebSocket communication protocol. Establishing the bi-directional full-duplex connection utilizes a plurality of half duplex connections. A confirmation that the bi-directional full-duplex network connection has been established is provided. | 2019-04-04 |
20190104163 | MULTIWAY AUDIO-VIDEO CONFERENCING - A device implementing a system for audio-video conferencing using multiple stream identifiers includes a processor configured to receive, from a sending device, indication of a first content stream and a first stream identifier, and indication of a second content stream and a second stream identifier associated. The first content stream and the second content stream correspond to different bit rates of streaming content. The processor is configured to receive, from a receiving device, a request to subscribe to the second content stream, the request including the second stream identifier, and receive, from the sending device, an indication that the second stream identifier has been associated with the first content stream. The processor is configured to forward, to the receiving device, the first content stream based on the request to subscribe to the second content stream and on the indication that the second stream identifier has been associated with the first content stream. | 2019-04-04 |
20190104164 | METHOD, COMPUTER-READABLE STORAGE DEVICE AND APPARATUS FOR ESTABLISHING PERSISTENT MESSAGING SESSIONS - Creating a persistent messaging session includes providing a web application that enables browser-to-browser multimedia communications, creating the persistent messaging session in response to a request from a user, and setting the persistent messaging session to an idle state when all users have exited the persistent messaging session, wherein the idle state is monitored by the web application. Joining a persistent messaging session includes querying a server hosting a web application that supports and tracks a plurality of persistent messaging sessions, using a set of search criteria, receiving a set of search results from the server, wherein the search results indicate that the persistent messaging session satisfies the set of search criteria, and joining the persistent messaging session, where the joining allows the first endpoint device to exchange browser-to-browser multimedia communications directly with a second endpoint device. | 2019-04-04 |
20190104165 | METHODS AND NODES FOR SYNCHRONIZED STREAMING OF A FIRST AND A SECOND DATA STREAM - Disclosed is a method performed by a system of a communications network. The method comprises encoding the first data stream and the second data stream, analyzing time data related to the first and second data stream, in order to determine a time relationship between the first and second data streams. The method comprises creating an offset file comprising the time relationship between the first and second data streams and transmitting the first data stream, the first time metadata, the second time metadata and the offset file. The method comprises receiving the first data stream, the first time metadata, the second time metadata and the offset file and streaming the first data stream. The method comprises determining a start time for the second data stream, obtaining the second data stream and streaming the second data stream, such that the first and second data streams and synchronized. | 2019-04-04 |
20190104166 | INSTANCED WEB SERVERS FOR DISPLAYING CUSTOM CONTENT IN A SECURE CONTEXT - Systems and methods receiving an indication that a domain has been blocked. A temporary web server is created that has network address that is different from the network address associated with the blocked domain. Content is created that indicates the blocked domain, and optionally, a reason for the blocking. The network address of the temporary web server is returned to a requesting browser application, which can display the content without providing a security warning. | 2019-04-04 |
20190104167 | NETWORK ADDRESS RESOLUTION - A content delivery network with at least one first content server bound to a first domain associated with a first characteristic (e.g., popular) associated with content servable from the content delivery network. The content delivery network includes at least one second content server bound to a second domain associated with a second characteristic (e.g., unpopular) associated with content servable from the content delivery network. At least one processing device including computer executable instructions for receiving a request to provide an embedded resource including either a first host name associated with the first domain or a second host name associated with the second domain. | 2019-04-04 |
20190104168 | PORTAL MANAGEMENT - A method includes transmitting initial page data from a service platform customer instance to a client device. The initial page data representing a first page of a portal, and the first page includes a widget associated with a second page. The method further includes receiving, from the client device, a selection of the widget. The method further includes obtaining mapping data indicating an association between the second page and a third page, the association specific to the portal. The method further includes, in response to the selection and the association, routing the client device to the third page rather than the second page. | 2019-04-04 |
20190104169 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR TRANSCEIVING FILES THROUGH NETWORKS AND APPARATUSES USING THE SAME - The invention introduces an apparatus for transmitting files through networks, at least including a processing unit and a communications interface. The processing unit determines whether a real-time network situation is favorable; determines a first protocol over Transmission Control Protocol (TCP) to carry out a file upload or download task if the real-time network situation is favorable; determines a second protocol over User Datagram Protocol (UDP) to carry out the file upload or download task if the real-time network situation is not favorable; and sends or receives data fragments via the communications interface to or from a storage server using the determined protocol. | 2019-04-04 |
20190104170 | EFFICIENT FILE ROUTING SYSTEM - A method or system for efficiently routing a file located on two or more sources to one or more file recipients connected by a plurality of paths in one or more networks. For each file recipient, one or more predetermined utility functions are evaluated to select the most efficient one of the plurality of paths to use for routing the file to the one or more file recipients, and the file is routed to the one or more file recipient using the selected path. The predetermined utility function may be the estimated operating expense associated with the routing of the file to the one or more file recipients, or the estimated return on investment for improving the routing of said file to the one or more recipients, or is related to an estimated file transfer time to the one or more file recipients. | 2019-04-04 |
20190104171 | SYSTEM AND METHOD FOR TRANSFERRING VALUE BETWEEN DATABASE RECORDS - A computer system for transferring value between database records includes a memory storing instructions that, when executed by a processor, cause the computer system to: receive configuration options for configuring a particular transfer of value between database records and specifying a graphical element to be provided upon completion of the transfer and an email address; send a request to a communications server including the email address for use as a destination for a communication indicating that the transfer has been initiated including an indication of an identifier for the transfer; store an indication of the graphical element in association with the identifier; receive a request to complete the transfer indicating the identifier; retrieve the indication of the graphical element based on the identifier; confirm the transfer; and send a reply indicating completion of the transfer including an indication of the retrieved indication of the graphical element. | 2019-04-04 |
20190104172 | WEB STORAGE BASED IOT DEVICE PROTECT MECHANISM - Described embodiments provide systems and methods for provisioning disk images on remote devices. Described is a device configured to connect to a pre-configured network upon device start-up, transmit a request to a server at a pre-configured network address, receive a response containing a disk image for the device, and populate a memory component of the device with the disk image received. Described is a server configured to, responsive to receiving a request from a device, authenticate the request, identify a disk image corresponding to the device, and transmit the disk image to the device. These systems and methods are well suited for improving security and integrity of deployed special-purpose devices, e.g., as may be used for an “Internet of Things” deployment. | 2019-04-04 |
20190104173 | DISTRIBUTED PROCESS MANAGEMENT SYSTEM, DISTRIBUTED PROCESS MANAGEMENT METHOD, AND INFORMATION PROCESSING APPARATUS - A distributed process management system includes an edge server configured to start and execute a process corresponding to contents of data when the data sent from a device is received; and a center server configured to manage a state of the process, wherein the edge server is configured to notify the center server of a start time and an amount of processing of the process each time the process is started, and the center server is configured to estimate an end time of the process based on the start time and the amount of processing and update the end time of the process, each time the start time and the amount of processing are notified. | 2019-04-04 |
20190104174 | LOAD PROCESSING METHOD AND APPARATUS - A computing system for load processing obtains a current time and a reported load amount from an access machine at the current time and determines a delayed cognitive load amount allocated to the access machine at a first time period by subtracting a first time difference from the current time. Next the computing system determines an actual load amount of the access machine at the current time by adding the reported load amount and the delayed cognitive load amount and determines whether the access machine is running at an overload condition by comparing the actual load amount of the access machine at the current time and a maximum load amount threshold for the access machine. The present application can accurately determine the load amount that the access machine has received and schedule user terminals received by the access machine to prevent overloaded operation of the access machine. | 2019-04-04 |
20190104175 | BOOMERANG JOIN: A NETWORK EFFICIENT, LATE-MATERIALIZED, DISTRIBUTED JOIN TECHNIQUE - Embodiments comprise a distributed join processing technique that reduces the data exchanged over the network. Embodiments first evaluate the join using a partitioned parallel join based on join tuples that represent the rows that are to be joined to produce join result tuples that represent matches between rows for the join result. Embodiments fetch, over the network, projected columns from the appropriate partitions of the tables among the nodes of the system using the record identifiers from the join result tuples. To further conserve network bandwidth, embodiments perform an additional record-identifier shuffling phase based on the respective sizes of the projected columns from the relations involved in the join operation. Specifically, the result tuples are shuffled such that transmitting projected columns from the join relation with the larger payload is avoided and the system need only exchange, over the network, projected columns from the join relation with the smaller payload. | 2019-04-04 |
20190104176 | Mirroring Flow Configurations for Internet Protocol Receivers - Disclosed is a mechanism of operating a Networked Media Open Specifications (NMOS) Application Programming Interface (API) at a node controlling a local device including a local receiver. A flow message is received via the NMOS API. The flow message contains a flow state of a target receiver at a remote node. A local receiver at the local device is configured to mirror the flow state of the target receiver at the remote node. The NMOS API then notifies a registry with an updated flow state of the local receiver at the local device. | 2019-04-04 |
20190104177 | RESOLVER-BASED DATA STORAGE AND RETRIEVAL SYSTEM AND METHOD - System and method for for associating general data with an end-user based on the domain name system (DNS) resolver that the end-user uses to map the canonical domain names of internet services to their associated network addresses. The present invention elegantly addresses concerns of scale regarding the key-space, for example the global number of distinct DNS resolvers, and the data-space, for example the number of distinct geographical areas to associate | 2019-04-04 |
20190104178 | CLOUD SCALING WITH NON-BLOCKING NON-SPINNING CROSS-DOMAIN EVENT SYNCHRONIZATION AND DATA COMMUNICATION - Disclosed embodiments relate to cloud scaling with non-blocking, non-spinning cross-domain event synchronization and data communication. In an example, a processor includes a memory to store multiple virtual hardware thread (VHTR) descriptors, each including an architectural state, a monitored address range, a priority, and an execution state, fetch circuitry to fetch instructions associated with a plurality of the multiple VNFs, decode circuitry to decode the fetched instructions, scheduling circuitry to allocate and pin a VHTR to each of the plurality of VNFs, schedule execution of a VHTR on each of a plurality of cores, set the execution state of the scheduled VHTR; and in response to a monitor instruction received from a given VHTR, pause the given VHTR and switch in another VHTR to use the core previously used by the given VHTR, and, upon detecting a store to the monitored address range, trigger execution of the given VHTR. | 2019-04-04 |
20190104179 | SYSTEM AND METHOD FOR TOPICS IMPLEMENTATION IN A DISTRIBUTED DATA COMPUTING ENVIRONMENT - A system and method for providing store and forward messaging on a partitioned cache provided by a distributed data grid. The store and forward message system implements publish and subscribe semantics in a way that distributed messages over the partitions of the distributed cache, reduces contention and makes efficient use of processor and network resources. | 2019-04-04 |
20190104180 | ROVING COLLECTOR - Presented here are system and methods for collecting information from devices, such as sensors, that are not necessarily connected to the Internet. Multiple sensors are distributed in a geographic area. The sensors power up every 10 minutes to gather data about the environment and then power down to save battery. A collecting device, i.e., a device attached to a moving object, traverses the geographic area containing the sensors, and continuously sends wake-up signals into the environment. When a sensor is within 20 feet of the collecting device, and receives the wake-up signal, the sensor uploads the gathered data to the collecting device. Subsequently, when the collecting device establishes an Internet connection, the collecting device uploads the gathered data to a central database. | 2019-04-04 |
20190104181 | SELF AWARE LIGHTS THAT SELF-CONFIGURE - Techniques for self-aware light are provided. A self-aware light can determine characteristics of the environment in which the self-aware light is installed, determine capabilities of self-aware light, determine one or more objectives of the installation of self-aware light, perform a self-configuration of self-aware light according to the determined one or more objectives, and determine and execute suitable actions for self-aware light to perform to achieve the determined one or more objectives. | 2019-04-04 |
20190104182 | POLICY CONTROLLED SEMI-AUTONOMOUS INFRASTRUCTURE MANAGEMENT - Embodiments of the present disclosure may relate to an apparatus for infrastructure management with an interface to receive a plurality of telemetry signals from first one or more infrastructure components of an infrastructure; and a policy controlled semi-autonomous (PCSA) infrastructure evaluator coupled with the interface, where the PCSA infrastructure evaluator includes a machine-learning (ML) model of service level metric (SLM) deviation by second one or more application or infrastructure components of the infrastructure and the PCSA infrastructure evaluator is to: determine a deviation from a SLM of third one or more infrastructure components based at least in part the ML model and one or more of the plurality of telemetry signals; and send a message, based at least in part on the deviation from the SLM. Other embodiments may be described and/or claimed. | 2019-04-04 |
20190104183 | COMPUTING INFRASTRUCTURE SCALABILITY ASSESSMENT - Embodiments of the disclosure provide a method of assessing scalability of a computing infrastructure performed by a scalability server, the scalability server comprising a processor to execute computer executable instructions stored on a non-transitory computer readable medium, so that when the instructions are executed, the server performs the method comprising: (a) receiving growth data from one or more client devices, the growth data including growth projection of subunits of an organization; (b) receiving application and infrastructure information from a database, the application and infrastructure information including a list of application and infrastructure resources of the computing infrastructure; (c) determining scalability of the computing infrastructure using the growth data and the application and infrastructure information; (d) monitoring real-time performance of the computing infrastructure; and (e) determining a priority of infrastructure components to be upgraded using the scalability of the computer infrastructure, the real-time performance of the computing infrastructure, the growth data, and the application and infrastructure information. | 2019-04-04 |
20190104184 | INFORMATION PROCESSING METHOD, APPARATUS, AND SYSTEM - Implementations of embodiments disclose an information processing method, apparatus, and system. In an embodiment, the information processing method includes: monitoring at least one microservice request sent by each of at least two microservices, a microservice request being used by one microservice to call another microservice; determining a call relationship between a first microservice and a second microservice from each detected microservice request, the first microservice being a microservice sending the microservice request, and the second microservice being a microservice that the microservice request requests to call; and generating call information between the at least two microservices based on all determined call relationships. In embodiments of the present invention, call information between microservices can be obtained, the obtained call information is visually displayed to intuitively and conveniently present dependence between the microservices, and a processing capability of a microservice can be adjusted based on an indicator value. | 2019-04-04 |
20190104185 | SOFTWARE-AS-A-SERVICE DEPLOYMENT OF PRINTING SERVICES IN A LOCAL NETWORK - A method for configuring, via a website, a device to provide printing services to a local network is described. The method includes creating, via a website, a service host object that comprises a network address of a device on a local network and a service host name. The method also includes configuring, via the website, one or more printing settings for one or more printing services. The method further includes sending an indication to the device on the local network to run a service manager. The method additionally includes sending an indication to the service manager to run the one or more printing services on the local network based on the one or more printing service settings. | 2019-04-04 |
20190104186 | System and Methods for Tracking the Usage of Digital Services - Described in detail herein is a usage tracking system. In exemplary embodiments, an usage application executed on a device can transmit a request to a computing system for connecting the device to the Internet. The computing system can include a first server and a second server. The computing system can receive the request for connecting the device to the Internet from the application. The first server can initiate a connection of the device with the Internet. The first server can allocate a range of Internet Protocol (IP) addresses to the at least one device based on a set of selected digital services being executed on the at least one device. Each IP address of the range of IP addresses corresponds to a digital service of selected set of digital services executed on the at least one device. | 2019-04-04 |
20190104187 | INFORMATION NOTIFICATION METHOD, ELECTRONIC DEVICE, AND NETWORK APPARATUS - A method includes acquiring information and acquiring a user status of a target user. In response to the user status indicating it is inconvenient for the target user to check the information, execution of a notification command that prompts the target user of acquisition of the information is postponed. In response to the user status indicating it is convenient for the target user to check the information, the notification command is executed. | 2019-04-04 |
20190104188 | SYSTEMS AND METHODS FOR VISUALIZATION OF ELECTRONIC SOCIAL NETWORK CONTENT - Systems and methods of visualization of electronic social network content are disclosed. A monitor may be designated. The monitor may include criteria specifying desired characteristics of mentions of electronic social network content. Electronic social network content, including mentions, is received from one or more electronic social network platforms. A timeline is presented. The timeline can be representative of a period of time corresponding to when at least a portion of the electronic social network content was provided to electronic social network platforms. A plurality of graphical depictions is presented that match the one or more search criteria of the monitor. Each graphical depiction is presented on the timeline at a position corresponding to a time at which the corresponding mention was provided to a corresponding electronic social network platform. An individual graphical depiction may be sized, colored, and/or shaped to convey additional information about the corresponding mention. | 2019-04-04 |
20190104189 | DISTRIBUTED GENERATION OF LIVE FEED UPDATES IN A SOCIAL NETWORKING SYSTEM - Each user from the users of the social networking system accesses the social networking system through a client device coupled with one of the servers on which the social networking system is implemented. In response to an occurrence of an information update, a first server from the multiple servers, transmits a representation of the information update to each one of other servers from the multiple servers; a second server from the other servers determines a set of active feeds associated with one or more active users that are connected to the social networking service through the second server; and for each active feed from the set of active feeds, the social networking system updates a view of the active feed to include the information update. | 2019-04-04 |
20190104190 | DESIGN THEME-BASED PUSH NOTIFICATIONS - A method displaying a theme-based push notification on a mobile device. The method includes registering a mobile device, wherein registering includes receiving, by an application backend server, a registration token from the mobile device, and storing the received registration token. The method further includes participating in dissemination of at least one theme-based push notification template, wherein participating in dissemination includes transmitting, by the application backend server, at least one theme-based push notification template to the registered mobile device. The method further includes processing a push notification together with the at least one theme-based push notification template, wherein the processing includes generating payload information, by the application backend server, and transmitting the payload information with the push notification to the registered mobile device. | 2019-04-04 |
20190104191 | COGNITIVE DEVICE-TO-DEVICE INTERACTION AND HUMAN-DEVICE INTERACTION BASED ON SOCIAL NETWORKS - A social network platform and method thereof for providing Internet of Things (I-o-T) devices with social behavior for communicating natural language (NL) text messages. An I-o-T device is provided with a social device application to form a unit capable of: reading free form NL messages, and responsively perform an action. The social device application generates NL text in response to reading a text message and/or in response to receiving readings from a set of sensors. Types of messages generated include messages for initiating social relationships with other devices which may communicate an acceptance/declination. The platform may be centralized with a server for ranking the importance of read messages based on the relationships and addressing NL text messages to other social units or groups of social units based on the relationships. The platform further enables direct messaging between social unit devices, brokering trust, and moderating information flow between devices. | 2019-04-04 |
20190104192 | COGNITIVE DEVICE-TO-DEVICE INTERACTION AND HUMAN-DEVICE INTERACTION BASED ON SOCIAL NETWORKS - A social network platform and method thereof for providing Internet of Things (I-o-T) devices with social behavior for communicating natural language (NL) text messages. An I-o-T device is provided with a social device application to form a unit capable of: reading free form NL messages, and responsively perform an action. The social device application generates NL text in response to reading a text message and/or in response to receiving readings from a set of sensors. Types of messages generated include messages for initiating social relationships with other devices which may communicate an acceptance/declination. The platform may be centralized with a server for ranking the importance of read messages based on the relationships and addressing NL text messages to other social units or groups of social units based on the relationships. The platform further enables direct messaging between social unit devices, brokering trust, and moderating information flow between devices. | 2019-04-04 |
20190104193 | LAMP CAPABLE OF PUSHING INFORMATION, ELECTRONIC DEVICE AND PASSING INFORMATION PUSHING SYSTEM - A passing information pushing system is provided. The system includes a plurality of lamps, and an electronic device. Each of the lamps continuously identifies a signal type of power, calculates a remaining duration corresponding to the current signal type, and pushes a passing state and the remaining duration corresponding to the current signal type. The electronic device receives a first information from a first lamp, and identifies a first lamp direction. The electronic device receives a second information from a second lamp, and identifies a second lamp direction. Furthermore, the electronic device notifies a corresponding passing state and remaining duration according to the first information or the second information by determining whether a current moving direction is parallel to the first lamp direction or the second lamp direction. | 2019-04-04 |
20190104194 | MODIFYING SERVER RESOURCES USING A CLIENT-SIDE PROXY - A computer-implemented method for modifying server resources using a client-side proxy may include (1) intercepting, at a proxy, a server resource request that was sent from a client application on a client device and directed to a remote server, (2) determining, at the proxy, a modification for a server resource response based on the request, (3) applying, at the proxy, the modification to the server resource response, and (4) sending, from the proxy, the modified server resource response to the client application. Various other methods, systems, and computer-readable media are also disclosed. | 2019-04-04 |
20190104195 | COMPUTER SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION PATH - A computer system comprises a first computer having a first processing performed processing by using a storage region; a second computer having a second processing unit provided the storage region, manage a first port for communication with the first processing unit, and execute a processing request to the storage region; and a third computer having a third processing unit manage a second port for communication with the first processing unit. The third processing unit holds port management information for managing a correspondence relationship of the first port and the second port, selects the first port for redirecting on the basis of the port management information in a case of receiving a connection request; and transmits a response notifying the first port for redirecting to the first processing unit. | 2019-04-04 |
20190104196 | SYSTEM AND METHOD FOR PROVIDING A REPRESENTATIONAL STATE TRANSFER PROXY SERVICE FOR A BLOCKCHAIN CLOUD SERVICE - In accordance with an embodiment, described herein are systems and methods for implementing a distributed ledger a blockchain cloud service. The blockchain cloud service can include nodes of the distributed ledger and a REST proxy service component. The REST proxy service uses a service development kit for the distributed ledger to communicate with the distributed ledger, and can provide REST APIs for use by client applications to query through chaincodes, synchronously or asynchronously invoke transactions through the chaincodes, get transaction statuses, and get BCS proxy versions. The REST proxy service component can authenticate REST calls, and translate the REST calls into remote procedural calls, for use in interfacing with the distributed ledger. The REST proxy service component can further provide REST APIs that support the same functions which are provided by the BCS management console component, and provide a user interface for client applications to consume the BCS instance. | 2019-04-04 |
20190104197 | DISCOVERING SIGNATURE OF ELECTRONIC SOCIAL NETWORKS - A method for predicting the behavior of an electronic social network (ESN) includes identifying one user's connections with other users and creating a data structure in a memory that represents the users and their connections in the ESN. A plurality of data sources for electronic communications between users are analyzed and assigned a relative importance value. A weight is also assigned to each of the connections between the users. The weight is an encoded value computed based on a link structure of the connections where the link structure includes metadata indicating a category and a status of the respective connection. The probability that one user will communicate with one of the other users is calculated based on the analyzed plurality of data sources calculating, and the user's connections with respect to other users are ranked based on the calculated probabilities. | 2019-04-04 |
20190104198 | ACCELERATED THROTTLING FOR WEB SERVERS AND SERVICES - Accelerated throttling for web servers and services is provided. Request data may be collected for requests submitted to servers at a datacenter and a request metric and a window determined based on the collected information. The request metric may define a limit for a number of requests from a source to be accepted within the window. Incoming requests for the servers at the datacenter may be monitored and, in some cases, sources for the requests identified. If a number of requests from a source exceed the determined request metric within the window, further requests from the same source may be denied until the window expires. The incoming requests for the servers at the datacenter may be monitored by counting a subset of the incoming requests associated with the identified source, for example. | 2019-04-04 |
20190104199 | CROSS DEVICE BANDWIDTH UTILIZATION CONTROL - A system of multi-modal transmission of packetized data in a voice activated data packet based computer network environment is provided. A natural language processor component can parse an input audio signal to identify a request and a trigger keyword. Based on the input audio signal, a direct action application programming interface can generate a first action data structure, and a content selector component can select a content item based on a count reaches a target number. An interface management component can identify first and second candidate interfaces, and respective resource utilization values. The interface management component can select, based on the resource utilization values, the first candidate interface to present the content item. | 2019-04-04 |
20190104200 | Network Certification Augmentation and Scalable Task Decomposition - A certification-based network manager can consume either simple certifications or collection-inclusive certifications. For a simple certification, the certification-based network manager selects a discovery/collection template for the simple certification and associates the simple certification with at least some of the program code from the selected template. The program code from the selected template includes re-usable blocks or regions of program code (“task functions”) for device discovery and data collection. The certification-based network manager selects the template and the task functions based on the parameters and expressions of the simple certification, and associates with the simple certification to generate an augmented certification. The augmented certification can later be decomposed into individual tasks for scalable dispatch to data collectors. | 2019-04-04 |
20190104201 | SERVER TO SERVER INTERACTION IN CONTENT ITEM SELECTION EVENTS - Techniques are provided for server-to-server interaction for content item selection. A system receives a request for one or more content items from a client device. In response to receiving the request, the system generates multiple content requests. Each content request is sent to a different content provider of multiple content providers. At least one of the content requests is transmitted over a network to a content provider that is remote relative to the system. The system receives multiple responses, each of which is from a different content provider of the multiple content providers. Each response identifies a different content item. The system makes a determination that at least one content item is associated with a particular web domain. The system selects, based on the determination, a particular content item of the plurality of content items and causes the particular content item to be transmitted to the client device. | 2019-04-04 |
20190104202 | CENTRALIZED HYBRID WIRELESS SELF-ORGANIZING NETWORKS - A system includes one or more servers, and a plurality of wireless telecommunications devices registered with the system. The servers obtain corresponding client configuration states for at least some of the registered client devices, wherein a client configuration state for a given registered client device includes and/or is based on information about other devices with which the given registered client device can communicate in at least one direction. The servers determine and maintain a virtual representation of at least one hybrid network of gateways and the registered client devices. The servers determine a particular sub-network configuration of a particular sub-network for a particular client device, based on the virtual representation of the at least one hybrid network and on a client configuration state for the particular client device. The particular sub-network comprises at least one path between the one or more servers and the particular client device. The servers route data to and/or from the particular client device via the particular sub-network. | 2019-04-04 |
20190104203 | CLIENT-INITIATED LEADER ELECTION IN DISTRIBUTED CLIENT-SERVER SYSTEMS - A method for a client-initiated leader election in a distributed system including receiving a master listener election request by at least one listener of a plurality of listeners in the distributed system, arranging a list of configured listeners in a descending priority order, the list of configured listeners comprises one or more listeners of the plurality of listeners set for connection, selecting a listener with a highest priority from the list of configured listeners, determining an availability of the selected listener, verifying a connectivity to the selected listener using a ping utility program, assigning the selected listener as a master listener based on the connectivity, and connecting to the master listener. | 2019-04-04 |
20190104204 | ABNORMALITY DETECTION DEVICE, METHOD THEREOF, AND COMMUNICATION SYSTEM - An abnormality detection device includes: a receiver, a reception predictor, frame information storage, and an abnormality determiner. The receiver receives a communication frame via a communication network. The frame information storage stores information regarding the communication frame. The reception predictor calculates and sets a predicted time range including a scheduled reception time of the communication frame of a target frame type from among a plurality of frame types received by the receiver by referencing the frame information storage and the reception time of the communication frame when the communication frame is received. The abnormality determiner determines the target communication frame is an abnormal frame when the target communication frame is received at a time outside the predicted reception range. | 2019-04-04 |
20190104205 | Method and Apparatus for Communication in a Motor Drive Application - The subject matter disclosed herein describes a switch embedded in a motor controller and a network protocol executing on the switch to provide communication between devices connected to the motor controller in a motor drive application. The embedded switch is configured to communicate via separate ports with an external controller, a network interface for the motor controller, additional motor controllers, and with the motor or other devices mounted on the motor. The network protocol includes a first tier for data that requires deterministic delivery at a high data rate, a second tier for data that requires a high delivery rate but is also tolerant of some variation in delivery time, and a third tier for data that may be delivered at a slower data rate. The embedded switch receives data at any port, identifies the communication tier to which the data belongs, and delivers it to another port accordingly. | 2019-04-04 |
20190104206 | FABRIC CONTROL PROTOCOL FOR DATA CENTER NETWORKS WITH PACKET SPRAYING OVER MULTIPLE ALTERNATE DATA PATHS - A fabric control protocol is described for use within a data center in which a switch fabric provides full mesh interconnectivity such that any of the servers may communicate packet data for a given packet flow to any other of the servers using any of a number of parallel data paths within the data center switch fabric. The fabric control protocol enables spraying of individual packets for a given packet flow across some or all of the multiple parallel data paths in the data center switch fabric and, optionally, reordering of the packets for delivery to the destination. The fabric control protocol may provide end-to-end bandwidth scaling and flow fairness within a single tunnel based on endpoint-controlled requests and grants for flows. In some examples, the fabric control protocol packet structure is carried over an underlying protocol, such as the User Datagram Protocol (UDP). | 2019-04-04 |
20190104207 | NETWORK ACCESS NODE VIRTUAL FABRICS CONFIGURED DYNAMICALLY OVER AN UNDERLAY NETWORK - Network access node virtual fabrics configured dynamically over an underlay network are described. A centralized controller, such as a software-defined networking (SDN) controller, of a packet switched network is configured to establish one or more virtual fabrics as overlay networks on top of the physical underlay network of the packet switched network. For example, the SDN controller may define multiple sets of two of more access nodes connected to the packet switched network, and the access nodes of a given one of the sets may use a new data transmission protocol, referred to generally herein as a fabric control protocol (FCP), to dynamically setup tunnels as a virtual fabric over the packet switched network. The FCP tunnels may include all or a subset of the parallel data paths through the packet switched network between the access nodes for a given virtual fabric. | 2019-04-04 |
20190104208 | A-MSDU SUBFRAME PROCESSING METHOD AND WIRELESS NETWORK ACCESS DEVICE - An A-MSDU sub-frame processing method is provided. The method includes: allocating a first sub-block and a second sub-block adjacent to the first sub-block in a memory when an Ethernet frame is received, wherein the first sub-block includes a block with a preset bit length, the second sub-block includes a block with a bit length corresponding to the Ethernet frame, and a pointer initially points to a first initial address in the second sub-block; sequentially storing header information of the Ethernet frame into the second sub-block according to a header format of the Ethernet frame; filling the first sub-block with length information of the Ethernet frame; shifting the pointer along a first direction to a second initial address whose distance shifted from the first initial address is the preset bit length; and reading out data in a length along a second direction from the second initial address to generate the A-MSDU sub-frame. | 2019-04-04 |
20190104209 | HOUSING ASSEMBLY FOR TERMINAL AND TERMINAL WITH HOUSING ASSEMBLY - The present disclosure provides a housing assembly for a terminal, and a terminal with the housing assembly. The housing assembly may include a middle frame, an electroacoustic assembly and decorative member. The electroacoustic assembly is arranged on the middle frame and defines a sound transmission hole. The decorative member defines an inner space. The at least portion of the decorative member faces the sound transmission hole. The decorative member is fixed to the electroacoustic assembly. The sound transmission hole directly communicates with the inner space of the decorative member. | 2019-04-04 |
20190104210 | METHOD AND MEANS FOR EVALUATING TORIC CONTACT LENS ROTATIONAL STABILITY - The present invention is directed to a method and means for enabling contact lens wearers to photograph their own eyes using an electronic device with a camera such as an iPhone with a macro lens, for example, Olloclip® Macro Pro Lens Set 7× lens, and a custom three-dimensional printed eyecup attachment. The eyecup attachment is designed to position the camera at a suitable and reproducible distance from the eye to ensure that the system can focus appropriately on the lens details. The eyecup attachment also serves to block stray light and diffuse the ambient lighting. In addition, the eyecup attachment ensures that the camera is held in the correct orientation while photos are being captured. The capture images are analyzed using image processing software to determine the angel of rotation of the contact lens. | 2019-04-04 |
20190104211 | MOBILE TERMINAL - A mobile terminal including a display unit; a metal plate having a seating portion supporting a rear surface of the display unit and having a first coupling portion along an edge of the seating portion; a middle case having a second coupling portion covering a lateral surface of the metal plate and forming a gap between the middle case and the first coupling portion of the metal plate; a molding unit inserted in the gap and coupling the middle case and the metal plate to each other; and a rear case coupled to a rear surface of the middle case and defining an exterior of the mobile terminal. | 2019-04-04 |
20190104212 | MOBILE TERMINAL - The present disclosure discloses a mobile terminal, including a case forming a portion of an appearance; a circuit board disposed inside the case; a flexible printed circuit board electrically connected to the circuit board; a first connector mounted on the circuit board; a second connector mounted on the flexible printed circuit board and fastened to the first connector; and a first antenna having array elements mounted on the flexible printed circuit board, wherein the first antenna is disposed to face a side surface of the case to radiate beam-formed wireless signals through the side surface adjacent to one side of the circuit board. | 2019-04-04 |
20190104213 | PORTABLE ELECTRONIC DEVICE HOLDER WITH ASSISTANCE REQUEST BUTTON AND METHOD POWERING PORTABLE ELECTRONIC DEVICE - A portable electronic device (PED) holder assembly and related methods. A PED holder assembly includes a PED holder assembly to which a PED is detachably attachable, an output connector adapted for connection to an input port of a PED held by the PED holder assembly, an assistance request button attached to the PED holder assembly, a connection cable assembly operatively connected to the output connector and the assistance request button, and a bed-side connector assembly adapted to be connected to a bed-side end of a multifunctional assistance request cable. The bed-side connector assembly is operatively connected to the output connector, via the connection cable assembly, to transmit power received from the multifunctional assistance request cable to the PED. The bed-side connector is operatively connected to the assistance request button to transmit an assistance request signal generated via a pressing of the assistance request button through the multifunctional assistance request cable. | 2019-04-04 |
20190104214 | TRACKING ACTIVITY DATA BETWEEN WEARABLE DEVICES PAIRED WITH A COMPANION - A set of wearable devices, each paired with a companion device, are configured to cumulatively maintain data about physical activities even though a user may switch between wearing them over a period of time. For example, a streak of workouts over many days can be maintained while the user switches between two watches over that period of time. | 2019-04-04 |
20190104215 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING TERMINAL, AND CONTROL METHOD AND CONTROL PROGRAM OF INFORMATION PROCESSING TERMINAL - An information processing system includes first and second terminals for acquiring a desired image captured actively using a speech communication partner's apparatus during speech communication. The first terminal includes a first microphone, a first transmitter that transmits voice data to the second terminal, and a first receiver that receives voice data from the second terminal. The second terminal includes a camera, a second microphone, a second transmitter that transmits the voice data to the first terminal, and a second receiver that receives the voice data from the first terminal. During speech communication, the first transmitter transmits, together with the voice data, an operation command for operating the camera. The second receiver receives the operation command and operates the camera. During speech communication with the first terminal, the second transmitter transmits, together with the voice data, the image data captured by the camera. | 2019-04-04 |
20190104216 | SYSTEMS AND METHODS FOR ADAPTIVE AND PREDICTABLE GRAPHICAL USER INTERFACES - A computer-implemented method may include (i) identifying a set of launch icons for a graphical user interface, where each launch icon within the set of launch icons navigates to a corresponding activity within a set of activities when selected via the graphical user interface, (ii) selecting, from the set of activities and based on at least one recommendation criterion, a smaller subset of recommended activities for a user, (iii) displaying, via the graphical user interface, a dock that includes a subset of launch icons corresponding to the subset of recommended activities, (iv) receiving, via the graphical user interface, an input to view a drawer element that includes each launch icon within the set of launch icons, and (v) presenting, via the graphical user interface, the drawer element in response to receiving the input. Various other methods, systems, and computer-readable media are also disclosed. | 2019-04-04 |
20190104217 | TRANSMISSION DETECTION, INTERRUPTION, AND NOTIFICATION SYSTEM - Systems and methods for transmission detection, interruption, and notification are described. | 2019-04-04 |
20190104218 | INFORMATION PROCESSING APPARATUS AND IMAGE PROCESSING APPARATUS THAT PERFORM TRANSMISSION AND RECEPTION OF DATA, AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS - A information processing apparatus capable of avoiding deadlock between transmission and reception operations of data. A transmission section transmits a data block including a predetermined amount of data and a sequence number. A reception section receives the data block. A packet inspection controller of the reception section determines whether the received data block is correct or wrong, based on a result of detection of an error in the data and a result of comparison between an expected value of the sequence number and a value of the sequence number included in the data block. The expected value of the sequence number is changed to a next value when it is determined that the data block is wrong a predetermined number of times. | 2019-04-04 |
20190104219 | COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - In accordance with an authenticated user designating a destination linked to self as a transmission destination, the transmission destination is set, and a transmission setting including the set transmission destination is registered together with first information indicating that the transmission destination was designated by designation of the destination linked to self. Also, in a case where another user is authenticated, and in accordance with a read instruction for the registered transmission setting, the transmission setting that is the target of the read instruction was registered together with the first information, as a transmission destination of the transmission setting a destination linked to the another user, who performed the read instruction, is set. | 2019-04-04 |
20190104220 | INFORMATION PROCESSING DEVICE, AND CONTROL METHOD OF AN INFORMATION PROCESSING DEVICE - A user of a control server | 2019-04-04 |
20190104221 | INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - A photo album in which images having a high priority for a user are laid out in the order of photographing date and time is created without putting a load on the user. To achieve this, photographing date and time information on the plurality of images and reliability information indicating reliability of the photographing date and time information are obtained, scoring is performed on each of the plurality of images by analyzing, and images to be laid out on a template are selected in descending order of obtained scores from a plurality of images. Furthermore, after laying out the selected images on the template according to the order of photographing date and time, a message is notified to the user in a case where the laid out images include an image having a low reliability of the photographing date and time information. | 2019-04-04 |
20190104222 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM - Based on pixel information of a target image selected from a plurality of images, an information processing apparatus specifies whether the target image is to be used for an album, and sets a template based on a condition for creating the album. The information processing apparatus places on the set template the target image to be used for the album according to the specifying. | 2019-04-04 |
20190104223 | MULTI-FUNCTION PERIPHERAL, MULTI-FUNCTION PERIPHERAL SYSTEM AND METHOD FOR ADDING EXTENDED FUNCTION IN MULTI-FUNCTION PERIPHERAL SYSTEM - There is provided a multi-function peripheral including: a body including a recording section; a memory; and a controller. The memory is configured to store: first to third basic information. The controller is configured to execute: controlling the memory to store first extended information; extracting second extended information from the first extended information; generating third extended information; generating fourth extended information; and controlling the memory to store the fourth extended information. | 2019-04-04 |
20190104224 | COMPUTER-READABLE MEDIUM, INFORMATION PROCESSING DEVICE, AND METHOD FOR SELECTING IMAGE PROCESSING APPARATUS - A non-transitory computer-readable medium stores computer-readable instructions that are executable by a processor coupled with an information processing device, the information processing device including a communication interface, the instructions being configured to, when executed by the processor, cause the processor to determine whether a selected image processing apparatus is set, in a case where it is determined that the selected image processing apparatus is not set, search for and find one or more image processing apparatuses communicable with the information processing device via the communication interface, set a specified one of the found one or more image processing apparatuses as the selected image processing apparatus, and cause the selected image processing apparatus to perform a particular kind of image processing. | 2019-04-04 |
20190104225 | OPERATION SWITCH PRESS ERRONEOUS-DETECTION AVOIDANCE DEVICE, OPERATION SWITCH PRESS ERRONEOUS-DETECTION AVOIDANCE METHOD, PROGRAM FOR AVOIDING OPERATION SWITCH PRESS ERRONEOUS-DETECTION, OPERATION PANEL, AND MULTIFUNCTIONAL MACHINE - An operation switch press erroneous-detection avoidance device, if an operation on an operation switch is performed by an approaching object to the operation switch, in a case where the operation on the operation switch is detected during a period when an event which occurs in association with the operation on the operation switch occurs, prohibits a process associated with the operation switch from being activated. | 2019-04-04 |
20190104226 | IMAGE FORMING APPARATUS, CONTROL METHOD OF IMAGE FORMING APPARATUS, AND STORAGE MEDIUM - An image forming apparatus acquires an evaluation value of each user by using a combination of a plurality of criteria determined on the basis of usage history information, and determines priority order of users having a high possibility of using the image forming apparatus next time based on the acquired evaluation value. | 2019-04-04 |
20190104227 | IMAGE PROCESSING APPARATUS, METHOD OF CONTROLLING IMAGE PROCESSING APPARATUS, AND STORAGE MEDIUM - The present invention is directed to a technique for reducing communication errors in facsimile transmission while restraining an increase in the temperature of a motor during execution of jobs of different types when a temperature reduction control is executed. | 2019-04-04 |
20190104228 | IMAGE READING APPARATUS - An image reading apparatus includes a roller that transports a document; a reading unit that reads an image of the document which is transported; a DC motor that drives the roller; and a control unit that controls the DC motor. The control unit is configured to stop driving of the DC motor in a case where a driving load value obtained when the DC motor is driven exceeds a threshold. A first threshold which is applied in a case of a first document and a second threshold which is applied in a case of a second document of which a basis weight is larger than a first basis weight are set, and the first threshold is less than the second threshold. | 2019-04-04 |
20190104229 | NON-TRANSITORY COMPUTER-READABLE MEDIUM HAVING CONTROL INSTRUCTIONS, INFORMATION PROCESSING DEVICE, AND CONTROL METHOD - A non-transitory computer-readable medium has control instructions to control a computer of an information processing device including a communication interface used to perform communications with an image processing apparatus, and the control instructions cause the computer to perform: determining whether updating of firmware of the image processing apparatus is necessary to execute specific processing in the image processing apparatus; and outputting information based on a result of the determining. | 2019-04-04 |
20190104230 | NON-TRANSITORY COMPUTER-READABLE MEDIUM HAVING INSTRUCTIONS, INFORMATION PROCESSING DEVICE, AND CONTROL METHOD - A non-transitory computer-readable medium has instructions to control a computer, which includes a communication interface capable of communicating with an image processing device, to perform operations, and the operations includes: causing to select an arbitrary image processing device from one or more image processing devices, and notifying a specific function, the specific function being possible to be executed by updating a version of firmware of a selection image processing device that is selected in the selecting. | 2019-04-04 |
20190104231 | IMAGE DISPLAY SYSTEM, IMAGE DISPLAY METHOD, AND IMAGE DISPLAY PROGRAM - Moving images are switched naturally when development of a story is switched according to a situation. An image display system includes a display unit that displays a moving image, an acquisition unit that acquires a motion of a user viewing the moving image displayed by the display unit, a determination unit that determines whether or not the motion of the user acquired by the acquisition unit satisfies a predetermined switching condition in which the user does not recognize switching between images even when the moving image displayed by the display unit is switched from first moving image data to second moving image data different from the first moving image, and a switching unit that switches the moving image displayed by the display unit from the first moving image data to the second moving image data when the determination unit determines that the switching condition is satisfied. | 2019-04-04 |
20190104232 | INFORMATION PROCESSING APPARATUS AND WIRELESS COMMUNICATION METHOD - An information processing apparatus includes a first communication unit configured to communicate with a first communication apparatus; a second communication unit configured to wirelessly communicate with each of one or more second wireless communication apparatuses; an acquisition unit configured to acquire from the first communication apparatus via the first communication unit an apparatus ID that is held by the first communication apparatus and that is used for identifying one of the one or more second wireless communication apparatuses to or from which the second communication unit transmits or receives data; and a control unit configured to control the second communication unit to transmit or receive the data to or from the one of the one or more second wireless communication apparatuses that is identified by the apparatus ID acquired by the acquisition unit. | 2019-04-04 |
20190104233 | IMAGE FORMING APPARATUS WITH USER AUTHENTICATING FUNCTION THAT AUTHENTICATES USER LOGIN - Provided is an image forming apparatus capable of achieving easy user authentication by icon selection with high security. The image forming apparatus has a user-authenticating function that authenticates login of a user. The image forming apparatus includes a login-image-registering unit and a user-authenticating unit. The login-image-registering unit registers an output image that has been outputted in the past by a user in a storage unit as a login image that is correlated with the user. The user-authenticating unit generates a login screen on which the login image of the user logging in and a plurality of dummy images are arranged in a random order, and displays the login screen on an operation unit. The user-authenticating unit, after receiving a selection operation of the login image, authenticates login of the user. | 2019-04-04 |
20190104234 | PROFILE ADJUSTMENT METHOD, PROFILE ADJUSTMENT APPARATUS, AND PROFILE ADJUSTMENT SYSTEM - Device-independent coordinate values at an adjustment point are converted into second coordinate values in accordance with a B | 2019-04-04 |
20190104235 | SPECTATOR VIEW INTO AN INTERACTIVE GAMING WORLD SHOWCASED IN A LIVE EVENT HELD IN A REAL-WORLD VENUE - A method including establishing a multi-player gaming session of a gaming application that generates an interactive gaming world, the live event being a real-world venue where players playing the gaming application are present. A 3D live view of the venue is generated based on captured video streams, and generated for a physical POV anchored to a physical location in the venue. The 3D live view is streamed to an HMD of a remote user located outside the venue, and presents an augmented reality view of the live event. A request is received from the remote user to jump into the gaming session as a spectator of the interactive gaming world from a virtual POV defined by a virtual location in the gaming world. The spectator view is delivered to the HMD of the remote user for display, the spectator view presenting a virtual reality view of the interactive gaming world. | 2019-04-04 |
20190104236 | CAMERA MODULE, METHOD OF MANUFACTURING CAMERA MODULE, IMAGING APPARATUS, AND ELECTRONIC APPARATUS - The present disclosure relates to a camera module capable of achieving a smaller height, a method of manufacturing a camera module, an imaging apparatus, and an electronic apparatus. —An imaging device having its imaging surface bonded to a provisional substrate is attached, and the imaging device in that state is joined to a substrate via an electrode having a TSV structure. After the provisional substrate is detached, an IR cut filter (IRCF) on which a light blocking film is printed or jet-dispensed in a region other than the effective pixel region is bonded to the imaging surface via a transparent resin. Because of this, there is no need to provide any sealing glass in the stage before the imaging surface, and the optical length of the lens can be shortened. Thus, a smaller height can be achieved. The present disclosure can be applied to camera modules. | 2019-04-04 |