16th week of 2020 patent applcation highlights part 71 |
Patent application number | Title | Published |
20200120130 | SELF-HEALING ARCHITECTURE FOR RESILIENT COMPUTING SERVICES - For each respective virtual machine (VM) of a plurality of VMs, a distributed computing system generates a unique Application Binary Interface (ABI) for an operating system for the respective VM, compiles a software application to use the unique ABI, and installs the operating system and the compiled software application on the respective VM. A dispatcher node dispatches, to one or more VMs of the plurality of VMs that provide a service and are in the active mode, request messages for the service. Furthermore, a first host device may determine, in response to software in the first VM invoking a system call in a manner inconsistent with the unique ABI for the operating system of the first VM, that a failover event has occurred. Responsive to the failover event, the distributed computing system fails over from the first VM to a second VM. | 2020-04-16 |
20200120131 | PREDICTED NETWORK TRAFFIC - A system can include a recurrent neural network operating on one or more computing devices that generates a model that outputs a predicted network traffic for a network infrastructure based on a sample of network traffic of the network infrastructure. The predicted network traffic characterizes a predicted traffic volume and a predicted packet type and distribution in the predicted network traffic. The system can also include a network manager operating on one or more computing devices that commands a network router logically coupled to a point of ingress of the network infrastructure to adjust bandwidth limits controlled by the network router based on the predicted network traffic of the network infrastructure. | 2020-04-16 |
20200120132 | METHOD FOR AN OBJECT TO COMMUNICATE WITH A CONNECTED OBJECTS NETWORK TO REPORT THAT A CLONE MAY BE IMPERSONATING THE OBJECT IN THE NETWORK - The invention proposes a method for an object ( | 2020-04-16 |
20200120133 | TECHNIQUES FOR DETECTING MALICIOUS BEHAVIOR USING AN ACCOMPLICE MODEL - The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.). | 2020-04-16 |
20200120134 | SYNCHRONIZING LINK AND EVENT DETECTION MECHANISMS WITH A SECURE SESSION ASSOCIATED WITH THE LINK - A first network element, such as a router, in a computer network may have established a communication link with a second network element in the computer network. A secure session associated with the communication link between the first and second network elements may then be established. The secure session may use a secure communication function on each of the first network element and the second network element. The first network element may then detect that the first network element cannot communicate with the second network element over the communication link. When the first network element cannot communicate with the second network element, the first network element may terminate the communication link and the secure session associated with the communication link. | 2020-04-16 |
20200120135 | SYSTEMS AND METHODS FOR DETERMINING ACCESS OUTCOMES USING ACCESS REQUEST SCORING - Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome. | 2020-04-16 |
20200120136 | SYSTEM AND METHOD FOR DEPLOYING AND CONFIGURING CYBER-SECURITY PROTECTION SOLUTION USING PORTABLE STORAGE DEVICE - This disclosure provides a system and method for deploying and configuring a cyber-security protection solution using a portable storage device. The portable storage device may include a memory storing instructions to be executed by a computing device. When executed, the instructions may cause the computing device to implement a cyber-security protection solution that is configured to scan a second storage device and determine whether the second storage device is usable in a protected environment. | 2020-04-16 |
20200120137 | Device and Method for Checking Properties of Resources - Device, computer program product and method for checking properties of resources, wherein a checking device for checking properties of resources of a web server includes a calculation unit for calculating an identifier identifying a particular resource using the particular resource, a detection unit for detecting a license requirement for the particular resource using the calculated identifier, and a determination unit for determining an existing license for the web server in the case of a license requirement detected for the particular resource using the calculated identifier, such that unauthorized posting of a particular resource to a web server can be easily detected and prevented. | 2020-04-16 |
20200120138 | ASSIGNING PRIVILEGES IN AN ACCESS CONTROL SYSTEM - An access control system may include a log data parser that receives log data observations in a cloud system and extract user-permission data from the log data observations. The system may also include a clustering unit that uses the user-permission data to generate one or more clusters, each cluster associated with one or more users. Alternatively, and/or additionally, the system may include a feature extractor and a classifier. The feature extractor may extract one or more features from the user-permission data. The classifier may generate predictions of permissions for the one or more users based on the extracted one or more features. The system may also include a policy generator that uses the output of the clustering unit and/or the classifier to generate an access control policy. The policy may be executed in the cloud system to control user's access to one or more services of the system. | 2020-04-16 |
20200120139 | SYSTEM AND METHOD FOR ENHANCING TRUST FOR PERSON-RELATED DATA SOURCES - The technology disclosed relates to enhancing trust for person-related data sources by tracking person-related sources using trust objects that hold trust metadata. In particular, it relates to generating trust-enhanced data by appending trust metadata to social media content and other business-to-business entities, and further using the trust-enhanced data to develop social engagement models based on customer preferences. The trust metadata described includes names, interface categories and origins of the person-related data sources along with customer engagement preferences and connection types. | 2020-04-16 |
20200120140 | TRUSTED-CODE GENERATED REQUESTS - Custom policies are definable for use in a system that enforces policies. A user, for example, may author a policy using a policy language and transmit the system through an application programming interface call. The custom policies may specify conditions for computing environment attestations that are provided with requests to the system. When a custom policy applies to a request, the system may determine whether information in the attestation is sufficient for the request to be fulfilled. | 2020-04-16 |
20200120141 | DYNAMIC POLICY INJECTION AND ACCESS VISUALIZATION FOR THREAT DETECTION - The present disclosure relates generally to threat detection, and more particularly, to techniques for analyzing security events using dynamic policies and displaying a consolidated view of active threats and user activity including the dynamic policies being triggered by the active threats and user activity. Some aspects are directed to the concept of a policy bus for injecting and communicating the dynamic policies to multiple enforcement entities and the ability of the entities to respond to the policies dynamically. Other aspects are directed providing a consolidated view of active threat categories, a count of policies being triggered for each threat category, and associated trends. Yet other aspects are directed to providing a consolidated view of users, applications being accessed by users, and the access policies, if any, implicated by the such accesses. | 2020-04-16 |
20200120142 | Processing Policy Variance Requests in an Enterprise Computing Environment - Methods, systems, and computer-readable media for processing policy variance requests in an enterprise computing environment are presented. A computing platform may receive, from a first endpoint computing device, a request for a first policy variance. In response to receiving the request, the computing platform may authenticate the first endpoint computing device based on enrollment information and may validate contents of the request. Subsequently, the computing platform may generate a policy variance result message based on approval or rejection of the request for the first policy variance. Then, the computing platform may send, to the first endpoint computing device, the policy variance result message. By sending the policy variance result message to the first endpoint computing device, the computing platform may cause the first endpoint computing device to execute a policy action corresponding to the approval or rejection of the request for the first policy variance. | 2020-04-16 |
20200120143 | AUTOMATED DISCOVERY OF SECURITY POLICY FROM DESIGN DATA - An industrial security policy configuration system generates and implements security policies for industrial automation systems based on design data for the industrial systems generated by device manufacturers, system integrators, original equipment manufacturers, or the owners of the industrial assets during the design of the industrial systems. the collected design data to a security rule set defining device-level communication privileges. The system translates the collected design data to a security rule set defining device-level communication privileges, which are then translated to a comprehensive set of security policies customized to the requirements of the industrial systems represented by the design data. By leveraging the rich set of available design data to identify or infer security requirements and generate suitable security configurations, the system can mitigate the need to manually configure security policies based on human judgments regarding normal and abnormal network traffic. | 2020-04-16 |
20200120144 | MULTI-DIMENSIONAL DRIFT NUANCE INTELLIGENCE THREAT ENGINE - Methods and systems are presented for dynamically adjusting a risk classification of a risk source based on classifications of one or more other risk sources. The risk engine may first classify a first risk source as a first risk type based on an initial analysis of the first risk source. Subsequent to classifying the first risk source as the first risk type, the risk engine may determine that a second risk source is associated with a second risk type. Based on the determination that the second risk source is associated with the second risk type, the risk engine may re-classify the first risk source as the second risk type. The risk engine may then use the reclassification of the first risk source to improve network security of an online service provider. | 2020-04-16 |
20200120145 | SYSTEM AND METHOD FOR INTEGRATING SESSION INITIATION PROTOCOL COMMUNICATION IN A TELECOMMUNICATIONS PLATFORM - A system and method for facilitating signaling and media communication at a communication platform that includes receiving a communication request to a resource, wherein the communication request specifies a destination endpoint; establishing signaling and media communication in a session with the destination endpoint of the communication request; registering a callback resource to a signaling event of the session; monitoring signaling messages of the session; detecting the signaling event in the signaling messages of the session; and triggering the callback resource upon detecting the signaling event. | 2020-04-16 |
20200120146 | Application Server for Dynamic IMS CSCF Overload Protection - Systems, apparatuses, and methods are described for tracking a number of computing devices associated with a particular element within a network. A registration count application server may keep track of the total number of devices associated with one or more network elements. The registration count application server may audit registered device counts to determine network elements that may have an associated device count greater than a threshold. | 2020-04-16 |
20200120147 | ROUTING OF DATA INCLUDING MULTIMEDIA BETWEEN ELECTRONIC DEVICES - Rerouting apparatus for rerouting data including multimedia data. The apparatus is for association with electronic equipment and allows for routing the data to a device regarded as the most convenient for playing the media. The apparatus comprises an announcer device for indicating to surrounding equipment that associated equipment is available for rerouting, thereby to enable receipt of rerouted communications therefrom, and a scout device for scanning surroundings of the associated equipment to find out about compatible equipment in the vicinity, thereby to reroute communications thereto. The apparatus may be attached to any device having data processing capability, to enable rerouting of data and communications therebetween. | 2020-04-16 |
20200120148 | METHOD AND DEVICE FOR MANAGING USER INFORMATION - Embodiments of the present disclosure relate to a method for managing user information in a SIP network and a device thereof. The method comprises: initiating a restart timer after a SIP access gateway restarts; within an expiration period of the restart timer, sending a heartbeat reply message to the network element in response to a heartbeat message from a network element, the reply message including the time when the SIP access gateway restarts. If a difference between the time when the SIP access gateway restarts and a current time is less than a time interval between heartbeat messages, the network element sends a registration request to the SIP access gateway, where the registration request includes user information of all users represented by the network element. It is further disclosed a device implementing the method discussed above. | 2020-04-16 |
20200120149 | METHOD FOR RECORDING A SHARED SCREEN BASED ON ACTIONS AND APPARATUS FOR THE SAME - Provided is an action based shared screen recording method including providing a video call screen to a plurality of users, providing a shared screen to display one or more documents separately from the video call screen, reflecting and displaying a document manipulation performed by at least one of the plurality of users based on the displayed document, and recording in real time the shared screen reflecting the document manipulation, wherein the shared screen is recorded based on action information generated based on the document manipulation of the at least one user. | 2020-04-16 |
20200120150 | CACHE AND MULTICAST TECHNIQUES TO REDUCE BANDWIDTH UTILIZATION - Techniques are described herein for caching content locally at a local network device and serving the cached content via multicast transmission to a user equipment in a multicast single frequency network (SFN) coverage area in which the local network device is located. The local network device receives a request for content from the user equipment in the multicast SFN coverage area. The request includes usage data associated with the user equipment indicating a triggering event. If the content is not cached at the local network device, the local network device identifies a content server to provide the content based at least on the usage data and a broadcast identifier associated with the local network device. The local network device receives the content that is associated with the broadcast identifier of the local network device and stores the content locally. Thereafter, the local network device serves the content via multicast transmission to the user equipment. | 2020-04-16 |
20200120151 | Interactive Real-Time Visualization System for Large-Scale Streaming Data - Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing at least one program, and a method for rendering interactive visualizations of high volume streaming data. Streaming data that describes a plurality of events is loaded in memory. The streaming data includes geospatial data that specifies a source location and a destination location for each event. Visual metaphors representing the events are rendered using a visualization mathematical model that defines, for each visual metaphor, a spatial position and opacity for each point along the visual metaphor throughout a sliding time window. | 2020-04-16 |
20200120152 | EDGE NODE CONTROL - There is provided a method for providing edge node fault management and bandwidth, BW, control for transmission of a data stream in a packet-based network. The method comprises adaptively transmitting a data stream DS by controlling an outgoing data stream being transmitted to one or more client devices by analyzing at least one data stream characteristics of a corresponding received data stream of the one or more receiving client devices and providing a transmission strategy for the outgoing data stream based on said analyzed data stream characteristics. Thereby accurate adjustment of consumed BW and an associated recovery scheme based on applying adaptive bitrate, ABR, to maintain highest achievable performance when it comes to video quality and also affect on other services, are provided. | 2020-04-16 |
20200120153 | HIDDEN DESKTOP SESSION FOR REMOTE ACCESS - Systems and methods of the present disclosure are directed to providing remote access capabilities in information technology infrastructure. In particular, systems and methods of the present disclosure can provide remotely access capabilities to facilitate the management, configuration, or maintenance of information technology infrastructure. | 2020-04-16 |
20200120154 | Parallel Computing System - A parallel computing system is provided, including input ports, a first switching network, a computing array, a second switching network and output ports. The first switching network is receiving input data from the input ports, sequencing the input data according to different computing modes of the computing array and outputting sequenced input data; the computing array is performing parallel computation on the sequenced input data and outputting intermediate data; and the second switching network is sequencing the intermediate data according to different output modes and outputting sequenced intermediate data through the output ports. The present disclosure applies the switching networks to the parallel computing system and performs any required sequencing on the input or output data according to the different computing modes and output modes to complete various arithmetic operations through the computing array after the input data are input into the computing array. | 2020-04-16 |
20200120155 | METHOD AND PROGRAM PRODUCT FOR ROBOT COMMUNICATIONS - A method and program product includes communicating with a mobile edge computing server as a client. The mobile edge computing server is configured to be in control of a heterogeneous domain. A request to join the heterogeneous domain of the mobile edge computing server is made. The mobile edge computing server is configured for determining an on-board cache size of the requesting client, determining a download size for the requesting client, and transmitting a download to the requesting client. The download includes an application, an operating database, and a size determined by the download size. The download is received. At least one task determined by the download is executed. | 2020-04-16 |
20200120156 | DYNAMIC CONTENT DISTRIBUTION IN AN ENTERPRISE NETWORK - Embodiments described herein provide a system for facilitating dynamic content distribution in an enterprise environment. During operation, the system determines topographical information of the enterprise environment. The system determines a set of logical groups based on the topographical information. A respective logical group can include one or more devices managed by the controller and a network that provides connections among the one or more devices. The system generates a distribution plan for a piece of content via a first distribution tree. A respective node of the first distribution tree corresponds to a logical group of the set of logical groups. The logical group hosting the piece of content can correspond to a root node of the first distribution tree. The system then sends a notification message comprising the distribution plan to a respective logical group of the set of logical groups. | 2020-04-16 |
20200120157 | SYSTEM AND METHOD FOR ADDING NODE IN BLOCKCHAIN NETWORK - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for adding a node in a blockchain network are provided. One of the methods includes: obtaining, by a current consensus node of the blockchain network, a first transaction comprising a first request for adding the node as a new consensus node of the blockchain network; in response to that consensus verification of the first transaction succeeds, executing the first transaction and numbering the node in a node list based on numbers of a plurality of current consensus nodes of the blockchain network; and performing view change for the node to participate in future consensus verification as the new consensus node of the blockchain network. | 2020-04-16 |
20200120158 | HETEROGENEOUS DISTRIBUTED LEDGER DATA CURATOR - The collection of data from multiple different Distributed Ledger Technology (DLT) networks is managed for a large-scale work flow having multiple interdependent data collection processes. Embodiments of the invention are configured to coordinate and orchestrate the collection of data from any DLT network and communicate the data to any legacy system requiring such. As a result, the invention can leverage the areas of expertise afforded by each of the different DLT networks used to conduct interdependent data collection processes of the work flow. In addition, through use data collection extensions the present invention provides the capability to collect data from any known or future known DLT network and communicate the data to any requesting legacy system. | 2020-04-16 |
20200120159 | COMPUTER SYSTEM PROVIDING MIRRORED SAAS APPLICATION SESSIONS AND RELATED METHODS - A computer system may include a client computing device configured to run a first Software as a Service (SaaS) application session from a SaaS server within a first browser. A server may cooperate with the at least one client computing device to run a second SaaS application session within a second browser mirroring a state of the first SaaS application session, and forward data traffic generated by the first SaaS application session to the SaaS server while blocking traffic generated by the second SaaS application session from passing to the SaaS server. | 2020-04-16 |
20200120160 | GROUP SMART SENSOR MANAGEMENT SERVICE - A smart sensor group management service may be used to establish groups of smart sensors that are associated with one or more common characteristics, such as a common application associated with the smart sensors. The group management service may establish multiple physical groups per application so that multiple entities may have access to managing the groups. The physical groups may be associated with a virtual group that facilitates management of the physical groups and may be accessible by the entities. The entities may perform different types of management operations using the group management service, such as creating groups, adding smart sensors to groups, removing smart sensors from groups, and adjusting settings of features of the applications that are associated with the groups. | 2020-04-16 |
20200120161 | Method and System for Triggering an Online Interaction in Connection with a Physical Product - A computer-readable medium is attached to a physical product and triggers an online interaction when communicatively coupled with a computing device having a display to establishes an online connection whereby services or information pertaining to the physical product can be provided to a user of the product. The computer readable medium can be coupled to the computing device alternatively through a Universal Standard Bus (USB), Near Field Communication (NFC), or Matrix Barcode (e.g., QR code) coupling techniques, for example. The established connection uniquely identifies the product to which the medium is attached and calls an Internet service with that identifying information. The Internet service in turn queries a database where each medium was registered prior to product distribution and extracts a dynamic destination where the computing device should connect to. This destination is returned to the displaying computing device and a variety of follow-on actions can ensue. | 2020-04-16 |
20200120162 | APPARATUS AND METHODS FOR DECLARATIVE CONTROL AND QUERY OF DEVICES CONNECTED TO A COMPUTER NETWORK - A method and apparatus of a management device that sends a command to a device is described. In an exemplary embodiment, the management device receives an operation for a managed device, wherein the operation includes an operation request, operation command, and operation response. The management device determines a device type and protocol and identifies an operation request for the device protocol. The management device further populates a device command for the device from at least one of the operation command and operation request. In addition, the management device sends the device command to the managed device and receives a device response from the managed device. Furthermore, the management device populates an operation response from the device response. The management device additionally sends the operation response to a software system that stores the operation response. | 2020-04-16 |
20200120163 | MANAGING DATA AND PERSONIFICATION OF IOT DEVICES IN MULTIPLE NETWORKS - The present invention provides managing data and personification of IOT devices operating in multiple networks or applications. The system for managing data includes a plurality of IOT devices configured for data capture and communication, a network interface configured to communicate with one or more remote systems in communication with the plurality of IOT devices, at least one controller in communication with the plurality of IOT devices for controlling and managing the captured data, at least one memory to store instructions or rules or protocols, and at least one processor configured to execute instructions based on the stored rules wherein the processor is associated with a cognitive artificial intelligence engine configured for collating the captured data from the plurality of IOT devices to generate data patterns based on machine learning models and natural language processing (NLP) models. | 2020-04-16 |
20200120164 | Using Voice Commands From A Device To Remotely Access And Control A Computer - A method of using voice commands from a mobile device to remotely access and control a computer. The method includes receiving audio data from the mobile device at the computer. The audio data is decoded into a command. A software program that the command was provided for is determined. At least one process is executed at the computer in response to the command. Output data is generated at the computer in response to executing at least one process at the computer. The output data is transmitted to the mobile device. | 2020-04-16 |
20200120165 | Using Voice Commands From A Device To Remotely Access And Control A Computer - A method of using voice commands from a mobile device to remotely access and control a computer. The method includes receiving audio data from the mobile device at the computer. The audio data is decoded into a command. A software program that the command was provided for is determined. At least one process is executed at the computer in response to the command. Output data is generated at the computer in response to executing at least one process at the computer. The output data is transmitted to the mobile device. | 2020-04-16 |
20200120166 | VIRTUAL HOSTING DEVICE AND SERVICE TO PROVIDE SOFTWARE-DEFINED NETWORKS IN A CLOUD ENVIRONMENT - A hosting system to facilitate a customer of an operator of the system to connect to a cloud provider, the system including: a first cloud exchange co-located with and connected to first cloud provider equipment; a second cloud exchange co-located with and connected to second cloud provider equipment, wherein the first cloud provider equipment and the second cloud provider equipment are of a same cloud provider but at different geographically spaced locations or the first cloud provider equipment is of a different cloud provider than that of the second cloud provider equipment, and wherein the first cloud exchange is connected to the second cloud exchange; and a non-transitory computer readable medium including computer program instructions, the instructions configured to facilitate the configuration of a software-defined network including the first cloud exchange and/or second cloud exchange, wherein the network connects the customer to the first cloud provider equipment and/or the second cloud provider equipment. | 2020-04-16 |
20200120167 | NATIVE ACTIVITY TRACKING USING CREDENTIAL AND AUTHENTICATION MANAGEMENT IN SCALABLE DATA NETWORKS - Native activity tracking using credential and authentication management in scalable data networks is described, including detecting a request from an extension installed on a browser to access a data network, initiating another request from the extension to a server to retrieve authentication data to access the data network, transferring from the server to the extension the authentication data and an instruction to the extension to generate a further request, transmitting the further request to the data network from the browser, the request comprising the authentication data from the server without manual input of the authentication data, presenting an overlay on the browser, the overlay being configured to indicate a login status associated with the data network, and storing one or more portions of data transferred between the data network and the browser, the storing being performed by the extension if access to the data network has been provided to the browser in response to the request. | 2020-04-16 |
20200120168 | DIFFERENTIATED SERVICES WITHIN A SERVICE MESH - Systems, methods, and computer-readable media for differentiating service within a service mesh. A translator service receives network traffic directed to a service mesh from a communications network. The translator service can determine a service characteristic for the network traffic and update rulesets within the service mesh based on the determined service characteristic. The updated rulesets enable the service mesh to differentiate services for the network traffic similarly to forwarding rules within the communications network. | 2020-04-16 |
20200120169 | SCALABLE MESSAGE PASSING ARCHITECTURE A CLOUD ENVIRONMENT - Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic. | 2020-04-16 |
20200120170 | MAP-BASED GRAPHICAL USER INTERFACE INDICATING GEOSPATIAL ACTIVITY METRICS - A server-side administrative interface for a social media platform allows for restriction of defined geographical areas. Social media items originating from such restricted areas are automatically filtered or age-restricted for availability via a map-based graphical user interface of the social media platform. | 2020-04-16 |
20200120171 | NODE PROCESSING - Embodiments of the present invention disclose a node processing method and apparatus, an electronic device, and a computer storage medium. The method includes: obtaining node data of a plurality of nodes; calculating an angle parameter between a first node and neighboring nodes and a distance parameter between the first node and the neighboring nodes, the first node being any of the plurality of nodes; determining an information amount of the first node based on the angle parameter and the distance parameter; and performing node deletion processing on the plurality of nodes based on the information amount. | 2020-04-16 |
20200120172 | METHOD AND SYSTEM FOR SYNCHRONIZING USER IDENTITIES - A method for synchronizing an identity of a user between a network observer and a third party includes: reading, by the network observer, a connection request sent from the user to the third party, the connection request including a host field having a host part corresponding to the third party and a sub-host part corresponding to identification information of the user; and associating, by the network observer in a database, the identification information of the user derived from the sub-host part with the identity of the user and an identity of the third party. | 2020-04-16 |
20200120173 | SYSTEM AND METHOD FOR AN ADAPTIVE SEARCH ENGINE USING DOMAIN SOCIAL NETWORKING DATA - An engine, system and method for a domain social network that interconnects Internet users with at least domains owned by or of interest to those Internet users, and that may obtain and/or forward obtained dynamic data regarding those domains automatically, such as by web service or email service. The dynamic data may be used to filter and protect content and data of the respective domains, to protect users by identifying low quality web pages or malicious software or pages, to isolate or improve search results regarding the domain, and/or to improve Internet-based transaction flow, such as the creation of advertising. | 2020-04-16 |
20200120174 | METHODS AND SYSTEMS FOR ALERTING USERS REGARDING AVAILABILITY OF UNCONSUMED CONTENT - Methods and systems are described for a media guidance application that limits the incentive for authorized users to share content with unauthorized users, while still allowing users to access content virtually anywhere. Specifically, the media guidance application allows an authorized user to receive only a portion of a media asset that he or she is authorized to access on a different device, after a designated time period, and/or when the remaining portion of the media asset is inaccessible. | 2020-04-16 |
20200120175 | TRANSMISSION DEVICE,TRANSMISSION METHOD, RECEPTION DEVICE, AND A RECEPTION METHOD - A transmission system is provided. The transmission system includes a first server and a second server. The first server is configured to transmit a metafile including location information for a reception device to acquire an audio stream into which metadata is inserted. The second server is configured to transmit the audio stream to the reception device according to a request from the reception device. Identification information indicating that the metadata is inserted into the audio stream corresponding to the location information is inserted into the metafile in association with the location information. | 2020-04-16 |
20200120176 | PROXYING SESSION INITIATION PROTOCOL (SIP) COMMUNICATIONS - Proxying Session Initiation Protocol (SIP) communications in a load balancing device. An outgoing SIP message is received from a session border controller device. The received outgoing SIP message comprises a routing control parameter in the form of a Uniform Resource Identifier (URI). The received outgoing message comprises one or more additional outgoing routing control parameters different to the URI. The one or more additional outgoing routing control parameters have been originated at the session border controller device to control one or more outgoing routing characteristics at the load balancing device. The one or more additional outgoing routing control parameters are extracted from the received outgoing SIP message. The outgoing SIP message is forwarded to a peer device using the one or more outgoing routing characteristics on the basis of the one or more extracted outgoing routing control parameters. | 2020-04-16 |
20200120177 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - Systems and methods that provide for the pre-fetching of data, including receiving user input data from a user device, and in response, identifying a first set of objects for enabling an application operating on the user device to render a first interface in a sequence of interfaces, and determining a second set of objects for enabling the application to render a second interface in the sequence of interfaces. The first set of objects are transmitted to the user device, as well as instructions for directing the user device to render the first interface in the application using the first set of objects, and receive and store the second set of objects in an information repository associated with the user device. In response to a user input, the second interface is rendered in the application using the second set of objects. | 2020-04-16 |
20200120178 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - Systems and methods for pre-fetching data over a network are described. In some implementations, a first request for content to be displayed in a first interface output at a user device is received, and in response to the first request, content to be output in the first interface and content to be output in a second interface accessible from the first interface are identified. The content to be output in the first and second interfaces are transmitted to the user device and the content to be output at the second interface is stored in a cache of the user device. A second request is then received for content to be displayed in the second interface, and in response particular content that does not include the already transmitted content and that is to be output at the second interface is identified and transmitted to the user device. | 2020-04-16 |
20200120179 | PROFILE SWITCH FEATURE IN SUBSIDY LOCKED DEVICES WITH EUICC - The apparatus determines whether a subscriber identification module (SIM) card is an embedded universal circuit card (eUICC) or a non-eUICC while in a subsidy locked state. The apparatus performs a profile sequence to determine available network profiles if the SIM card is the eUICC. The apparatus may present an option at the user interface UI to switch network profiles on the UE if the current profile of the eUICC does not satisfy a personalization check on the ME. | 2020-04-16 |
20200120180 | Managing Interactions in a Network Communications Environment - A network communications environment has advanced interaction management functionality that enables the opportunities for users to interact with one another to be expanded beyond the opportunities that exist with closed interaction management approaches while still providing reasonable privacy and security protections that are not available with open interaction management approaches. The advanced interaction management functionality also encourages the proliferation of trust-based interactions. | 2020-04-16 |
20200120181 | Service Provider User Accounts - Examples described herein involve switching between two user accounts of a streaming media service. In an example implementation, a playback device stores data representing credentials for multiple user accounts including a first user account of a first streaming audio service and a second user account of the first streaming audio service. The playback device receives instructions to play first audio content from the first streaming audio service and plays back the first audio content by streaming data representing the first audio content from one or more servers of the first streaming audio service using credentials of the first user account. The playback device detects a trigger associated with the first user account of the first streaming audio service and switches from streaming data representing the first audio content using credentials of the first user account to streaming data representing the first audio content using credentials of the second user account. | 2020-04-16 |
20200120182 | METHOD AND SYSTEM FOR EDGE COMPUTING NETWORK INTERFACING - A method, a device, and a non-transitory storage medium are described in which a mobile edge computing service is provided. The mobile edge computing service provides for the hosting of a function of an application in a mobile edge computer network, and another function of the application to be hosted in a network external from the mobile edge computer network. The mobile edge computing service includes an on-boarding service that obtains subscription information and policies. The mobile edge computing service also includes network resource availability and security measure verifications. | 2020-04-16 |
20200120183 | METHOD, DEVICE AND PROGRAM PRODUCT FOR ACCESSING BACKUP SERVER THROUGH OFFICE SOFTWARE - Embodiments of the present disclosure provide a computer-implemented method, an electronic device and a computer program product. In the method, an electronic device receives, from a user via office software, a request for an operation on a backup server, the electronic device performs the operation associated with the request on the backup server, and the electronic device presents a result of the operation to the user via the office software. The embodiments of the present disclosure can simplify a process for a user to access a backup server. | 2020-04-16 |
20200120184 | INFORMATION PROCESSING METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - Embodiments of the present disclosure provide an information processing method, an electronic device and a computer program product. According to an embodiment, the method comprises: obtaining, by a first client, metadata of a first message in a message pool; in response to the metadata indicating that the first message is associated with the first client, pulling the first message by the first client; in response to the metadata indicating that the first message is associated with the second client, determining a priority of the first message; and in response to determining that the priority of the first message exceeds a predetermined threshold, sending a first paging message by the first client to the second client to enable the second client to pull the first message associated with the second client. | 2020-04-16 |
20200120185 | DYNAMIC ENDPOINT COMMUNICATION CHANNELS - The present disclosure relates generally to providing a concierge service to handle a wide variety of topics and user intents via a common interface. The concierge service can be part of a connection management system that can dynamically manage and facilitate conversations between a user making a request or providing an instruction and one or more endpoints for the purposes of fulfilling the request or instruction. | 2020-04-16 |
20200120186 | DATA TRANSMISSION TO A NETWORKED RESOURCE BASED ON CONTEXTUAL INFORMATION - Embodiments of the present invention provide a system for transmitting data to networked resources based on extracted contextual information from said networked resources. The system gathers contextual data from devices on the network, extracts contextual information from the contextual data, and determines supplemental resources to provide to the networked devices based on the contextual information. The system may further provide an augmented reality environment to a networked device that integrates identifies objects in an image and integrates notifications of supplemental resources in the augmented reality environment. | 2020-04-16 |
20200120187 | SYSTEM FOR PROVIDING GAME PLAY VIDEO BY USING CLOUD COMPUTER - Provided is a system for providing a game play video by using a cloud computer, and more particularly, to a system for providing a game play video to a user by rendering the game play video by using a cloud computer connected to a user terminal. | 2020-04-16 |
20200120188 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2020-04-16 |
20200120189 | CONTEXTUAL REMOTE MANAGEMENT OF VIRTUAL APP LIFECYCLE - Systems and methods for managing app lifecycles on a user device. A user device context is determined and a set of server based apps associated with the context is determined based on the context and a set of conditions associated with server based apps. An indicator for user interface elements for each server based app is sent with the indication of the context. These user interface elements are displayed to a user of the device. In an example, these user interface elements are displayed on a default pane of the device. A user interface element in some examples is able to be selected by a single interaction. Interactions between a user and a user interface for a selected app are received at a. The user interactions are processed to produce results based on the user interface inputs, and the results are sent. | 2020-04-16 |
20200120190 | SEMI-FLEXIBLE PACKET COALESCING CONTROL PATH - Methods, apparatus, and systems for implementing a semi-flexible Receive Segment Coalescing (RSC) control path. Logic for evaluating packet coalescing open flow criteria and close flow criteria are implemented in hardware on a network device that receives packets from one or more networks. packet coalescing open profiles and packet coalescing close profiles are also stored on the network device, wherein each packet coalescing open profile defines a set of packet coalescing open flow criteria to be applied for that packet coalescing open profile and each packet coalescing close profile defines a set of packet coalescing close flow criteria to be applied for that packet coalescing open profile. packet coalescing open flow and close flow profiles are then assigned to packet coalescing-enabled receive queues on the network device and corresponding open and flow criteria are used to perform packet coalescing-related processing of packets in the receive queues. The scheme supports hardware-based packet coalescing packet processing while providing flexibility in meeting the requirements of different operating systems and future usage models on a single network device. | 2020-04-16 |
20200120191 | REALIZATION OF A PROGRAMMABLE FORWARDING PIPELINE THROUGH PACKET HEADER SUMMARIES IN A DATA PROCESSING UNIT - This disclosure describes techniques that include storing, during parsing of a data unit or a network packet, information (i.e., “summary information”) that identifies how the network packet has been process and/or other aspects of the parsing process. In one example, this disclosure describes a method that includes parsing a packet header from a data unit, wherein parsing the packet header includes storing in result vector storage each of a plurality of data items derived from the packet header, the result vector storage having a result vector format defining fields within the result vector storage for storing each of the plurality of data items; storing in template storage, for each of the plurality of data items, summary information about the plurality of data items stored in the result vector storage; and processing, by the packet-processing integrated circuit and based on the summary information and the plurality of data items, the network packet. | 2020-04-16 |
20200120192 | METHOD AND DEVICE FOR TRANSMITTING DATA - Embodiments of the present application provide a method and a device for transmitting data, which are capable of achieving timely data transmission. The method includes: starting, by a receiving end, a timer of a first delivery mode when determining that data delivered and data to be delivered are not continuous, where the first delivery mode is used to indicate that the receiving end directly delivers data to an upper layer upon the receipt of the data; and delivering, the receiving end, the data to be delivered to the high level using the first delivery mode in a case where the timer of the first delivery mode does not expire. | 2020-04-16 |
20200120193 | ELECTRONIC DEVICE INCLUDING ELECTRONIC COMPONENT - According to various embodiments of the present invention, an electronic device may comprise: a housing which comprises a first surface facing in a first direction, a second surface facing in a second direction opposite to the first direction, and a side wall at least partially surrounding a space between the first surface and the second surface; at least one seating part formed to be partially surrounded by a part of the side wall inside the housing; a guide member disposed adjacent to a part of the side wall inside the housing and surrounding another part of the seating part; and at least one electronic component comprising a body part and a protrusion part formed on one surface of the body part, wherein the electronic component may be guided by the guide member to enter the seating part along a direction inclined with respect to the side wall or the first surface and then to be mounted in the seating part. The electronic device as described above may vary depending on embodiments. | 2020-04-16 |
20200120194 | Personal Device Docking Station For Video Calls - A personal device docking station can include a base, a neck with a stationary and non-stationary portion and a rest pad that can hold a personal device such as a smartphone or tablet. When a personal device is docked in the docking station, bidirectional audio feed is established between the personal device and the docking station. A user can receive audio feed from the docking station's speakers and transmit audio feed via a plurality of microphones. The rest pad of the docking station can have a window or cutout that aligns with the camera of the docked personal device. The non-stationary portion of the neck can include multiple motorized rotation heads that allow for horizontal and vertical rotation of the rest pad and docked device. | 2020-04-16 |
20200120195 | TRACKING ACTIVITY DATA BETWEEN WEARABLE DEVICES PAIRED WITH A COMPANION DEVICE - A set of wearable devices, each paired with a companion device, are configured to cumulatively maintain data about physical activities even though a user may switch between wearing them over a period of time. For example, a streak of workouts over many days can be maintained while the user switches between two watches over that period of time. | 2020-04-16 |
20200120196 | SAFETY CUTOFF FOR A POWER TOOL OR OTHER DEVICE - A cutoff system for a power tool or other device includes a receiver and a transmitter, the receiver being configured to electrically couple to a power source and to a power tool or other device, the transmitter is configured to transmit a communication signal to the receiver, and the receiver is further configured to transmit electrical power from the power source to the power tool or other device only when the receiver receives the communication signal from the transmitter. | 2020-04-16 |
20200120197 | Integrated Platform for Aggregating Context Information - Events and offers based on context is provided by determining an event based on a social media footprint, determining a group of people associated with the event based on the social media footprint, generating an offer based on the group of people and the event; and causing the offer to be displayed to at least one of the group of people. | 2020-04-16 |
20200120198 | METHOD AND APPARATUS FOR AUTOMATICALLY SETTING ALARMS AND NOTIFICATIONS - A processor-based personal electronic device (such as a smartphone) is programmed to automatically respond to data sent by various sensors from which the user's activity may be inferred. One or more alarms on the device may be temporarily disabled when sensor data indicates that the user is asleep. One or more of the sensors may be worn by the user and remote from the device. A wireless communication link may be used by the device to obtain remote sensor data. Data from on-board sensors in the device—such as motion sensors, location sensors, ambient light sensors, and the like—may also be used to deduce the user's current activity. User data (such as calendar entries) may also be used to determine likely user activity and set alarms accordingly. Biometric data from a second, nearby person may also be used to automatically select certain alarm modes on a first person's device. | 2020-04-16 |
20200120199 | METHOD OF PROVIDING NOTIFICATION ACCORDING TO SURROUNDING SITUATION OF INTELLIGENT TERMINAL AND DEVICE FOR THE SAME - Provided are a method of providing a notification and a device for the same. The method of providing the notification has an effect in that a terminal detects a surrounding situation and recognizes the surrounding situation, thereby providing a notification according to a preset notification setting based on the recognized surrounding situation. The terminal can be connected to an artificial intelligence module, a drone (unmanned aerial vehicle (UAV)), a robot, an augmented reality (AR) device, a virtual reality (VR) device, a device related to a 5G service, and the like. | 2020-04-16 |
20200120200 | METHOD OF CONTROLLING MOBILE DEVICES IN CONCERT DURING A MASS SPECTATORS EVENT - The present invention discloses a system and a method for controlling multiple computerized mobile devices in a mass spectator event, such as a music show, sporting event, political event and the like where the usage of traditional networks such Wi-Fi or Cellular is not feasible economically or technically due to the limited bandwidth. The present invention discloses a method whereby a network of beacons, and, optionally, the GPS location is used to synchronize, coordinate, and control the selection and execution of a sequence of actions on the mobile devices such as playing video, playing vibrations, playing camera flash patterns, illuminating screen patterns, illuminating screen colors, displaying images, displaying texts, playing sounds, or playing music. | 2020-04-16 |
20200120201 | SCHEDULING WITH DISTRACTIONS DISABLED - A communication device comprising: one or more processors and one or more memories supporting communication, the device comprising a plurality of modes, including at least a normal mode and at least one focused mode, wherein the normal mode is distinct from the focused mode, and wherein, when the device is in the focused mode one or more features of the device are at least partially disabled, and wherein the one or more features of the device that are at least partially disabled in the focused mode include one or more features relating to communication supported by the device, wherein the device is configured to: support a user interface (UI) for setting one or more focused time periods, and wherein the device is further configured to switch to the at least one focused mode during the focused time periods. | 2020-04-16 |
20200120202 | CONFIGURATION AND MANAGEMENT OF SMART NODES WITH LIMITED USER INTERFACES - An apparatus in an illustrative embodiment comprises at least one processing device comprising a processor coupled to a memory. The processing device is configured to obtain an identifier of a first node of a set of nodes deployed at a building or other structure, to associate the first node with a user account, to obtain an identifier of a second node of the set of nodes, and to associate the second node with the first node and the user account. Associating the first node with the user account may comprise, for example, establishing an association between the first node and the user account without the processing device having access to a network connection. Additionally or alternatively, the identifier of the first node may be sent to a backend server over a network connection, with configuration information for the first node being received from the backend server in response thereto. | 2020-04-16 |
20200120203 | METHOD AND SYSTEM FOR CONTROLLING A MOBILE COMMUNICATION DEVICE - Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. The present method and system determines whether the vehicle is being operated by a user that may also have access to a mobile communication device which, if used concurrently while the vehicle is in operation, may lead to unsafe operation of the vehicle. If the mobile services control system determines that a vehicle operator has potentially unsafe access to a mobile communication device, the mobile services control system may restrict operator access to one or more services that would otherwise be available to the operator via the mobile communication device. | 2020-04-16 |
20200120204 | Method and Apparatus for Customizing Status Bar of Terminal, and Electronic Device - A method and apparatus for customizing status bar of terminal, and an electronic device are provided. The method includes: determining an application set displayable in a status bar ( | 2020-04-16 |
20200120205 | Caller Identity and Authentication Service - A computer-implemented method is described for authenticating the identity of a caller. A mobile computing device receives, via a wireless communications network, an incoming call setup request initiated by a phone system of a caller, and executes an identity service application upon receipt of the incoming call setup request. The call includes a plurality of data packets. The mobile computing device extracts a caller identifier from the plurality of data packets. The caller identifier includes one or more bits at a first predetermined position within the plurality of data packets. The mobile computing device forwards the caller identifier to an identity service computing device. The identity service computing device determines an identity status of the caller. The mobile computing device receives, from the identity service computing device, an authentication token and the identity status of the caller. The mobile computing device displays the identity status of the caller. | 2020-04-16 |
20200120206 | ATTACHING MULTIPLE PHONE LINES TO A SINGLE MOBILE OR LANDLINE PHONE - Agencies issue multiple devices to personnel for maintaining distinct identities over the course of assigned investigations. To provide flexible capabilities to agencies, a phone is converted for use with multiple attached telephone numbers. Accordingly, a single phone may be used to manage multiple identities over the course of one or more investigations. Using a multiple attached number, a given device can place and receive calls over the network to and from contacts. In addition to providing multiple attached numbers, calls using the multiple attached numbers may be monitored live and recorded to establish evidence. | 2020-04-16 |
20200120207 | CALL RECORDING SYSTEM FOR AUTOMATICALLY STORING A CALL CANDIDATE AND CALL RECORDING METHOD - Embodiments of the present disclosure describe a call recording system and a call recording method for automatically recording, i.e. storing, a call candidate when an active call is detected. The call recording system comprises a sound receiver to receive sound data and to convert sound data to audio representations of sound, a buffer to buffer the audio representations of sound for a predetermined time duration, a call candidate determination unit to determine if the buffered audio representations comprise a call candidate, a call analyzer to analyze the call candidate, wherein the call analyzer determines if the call candidate is a call to be stored, and a storage to store the call candidate as a call. Hence, a reliable system can be provided for automatically storing a call. | 2020-04-16 |
20200120208 | SYSTEM AND METHOD FOR PROVIDING AND MANAGING THIRD PARTY CONTENT WITH CALL FUNCTIONALITY - Systems and methods for implementing an online content item campaign with selective call functionality can include a processor determining a rendering frequency of instances of a third-party content item for rendering with a call icon, based on a resource of the third-party content provider. The processor can provide a first instance of the content item for rendering with the call icon in accordance with the rendering frequency of instances. A call bridge device can receive a call from the client computing device upon actuation of the call icon, direct the call to a phone number of the third-party content provider, and determine a parameter of the call. The processor can adjust the rendering frequency of instances based on the parameter of the call and provide instances of the content item for display by client computing devices with the call icon in accordance with the adjusted rendering frequency of instances. | 2020-04-16 |
20200120209 | NEXT GENERATION EMERGENCY CALL ROUTING OVER DIVERSE NETWORKS - Methods and systems for routing calls include determining media types within a received call for emergency services from a caller. Emergency service providers for the call are determined based on the determined media types. The call is routed to the emergency service providers, with different subsets of data within the call, corresponding to respective determined media types, being routed to different emergency service providers from the determined emergency service providers. | 2020-04-16 |
20200120210 | Systems, Methods and Computer Program Products for Voice Call Customer Support - The invention provides systems, methods and computer program products for providing optimized customer support over data networks. In an embodiment the invention comprises implementing within a processor based computing system, the steps of (i) receiving voice data from a customer through a client terminal, (ii) converting the received voice data to text data, (iii) extracting one or more search parameters from the converted text data, wherein said extracted search parameters are based on at least one of a context or a subject identified from the converted text data, (iv) retrieving from a customer record database, at least one customer record that matches the extracted one or more search parameters, and (v) transmitting the retrieved at least one customer record to a customer service representative terminal for display to a customer service representative. | 2020-04-16 |
20200120211 | DYNAMIC AGENT MEDIA TYPE SELECTION BASED ON COMMUNICATION SESSION QUALITY OF SERVICE PARAMETERS - A value of a quality of service parameter is monitored based on one or more communication sessions with an agent communication endpoint of a contact center agent. For example, a jitter parameter is monitored in an audio communication session with the contact center agent. A determination is made if the value of the quality of service parameter does not meet a threshold level. For example, a minimum amount of jitter threshold. In response to determining that the value of the quality of service parameter does not meet the threshold level, the agent communication endpoint is prevented from receiving new communication sessions in one or more media types originally supported by the contact center agent. For example, the agent communication endpoint is prevented from receiving any new voice communication sessions while still being allowed to receive communication sessions in other mediums, such as Instant Messaging and email. | 2020-04-16 |
20200120212 | GATEWAY FUNCTION CONTROL VIA TELEPHONY/VOICE SERVICE - An apparatus, method and computer readable memory comprises a voice service interface for allowing user control of a gateway. The voice service interface comprises a voice service module operable to interface with a telephonic communication device to process and receive gateway configuration entries from the user through the telephonic communication device. The voice service module is operable to transmit the gateway configuration entries to a gateway controller. The gateway configuration entries are configured to be parsed and applied to the gateway for control, configuration and/or diagnostic of the gateway. Gateway configuration entries include control function changes such as home gateway device reboot, Wi-Fi, enabling/disabling/configuration, parent control enabling/disabling/configuration, and other intended gateway functionalities. | 2020-04-16 |
20200120213 | SYSTEM AND METHOD FOR RUNNING A MULTI-MODULE TELEPHONY APPLICATION - A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session. | 2020-04-16 |
20200120214 | METHODS AND DEVICES FOR TIME-BASED CONDITIONAL PRESENCE REPORTING - A device obtains and stores presence reporting area (PRA) data, including an area identifier, an event start time, and an event end time. The device receives, at a first point in time, an indication that a user device is present in an area identified by the area identifier. The device determines whether the first point in time is at or between the event start time and the event end time, and selectively reports a presence of the user device in the area based on a result of determining whether the first point in time is at or between the event start time and the event end time. | 2020-04-16 |
20200120215 | METHODS OF SHARING DATA USAGE AT A PLURALITY OF NETWORK DEVICES - The present invention discloses methods and systems for sharing data usage by a plurality of SIM cards at a plurality of network devices. Each of the plurality of network devices is capable of housing at least one SIM card from the plurality of SIM cards. The method comprises the steps of determining the total data usage allowance. A remaining total data usage allowance is determined by either retrieving it from a carrier server or by subtracting aggregated data usage information from the total data usage allowance. The method further comprises restricting use of one or more of the plurality of SIM cards when the remaining total data usage allowance is below a first threshold until the remaining total data usage allowance is above the first threshold. The total data usage allowance is changed to a first value periodically or according to an administrator's instruction. | 2020-04-16 |
20200120216 | SYSTEMS AND METHODS FOR CONTENT TRANSFER - The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The Remote FAX Interconnect known as etherFAX® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using Internet/web based communication protocols such as HTTP(S) as the transport between a facsimile capable application or hardware and the remotely accessible etherFAX® services. | 2020-04-16 |
20200120217 | IMAGE FORMING APPARATUS, ABNORMAL MEMBER DETECTION METHOD AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM ENCODED WITH ABNORMAL MEMBER DETECTION PROGRAM - An image processing apparatus includes a member controller that controls a drive prevented member that is prevented in advance from being driven in a standalone mode while an image processing operation is not being carried out, and a plurality of other normal members that are not the drive prevented member, and a hardware processor, wherein the hardware processor allows at least one of the plurality of normal members to be driven after an integrated signal indicating abnormality in at least one of the plurality of normal members is detected, and determines an abnormal member having abnormality from among the plurality of normal members based on presence or absence of the integrated signal with at least one of the plurality of normal members being driven. | 2020-04-16 |
20200120218 | IMAGE FORMING APPARATUS, A NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CONTROL PROGRAM, AND CONTROL METHOD - An image forming apparatus includes a main CPU. The main CPU detects whether or not a commercial power supply has been shut off while operating in a warning mode which, in response to detecting an intruder, alerts a surrounding person and/or a specified person that the intruder was detected. If the commercial power supply has been shut off, the surroundings are alerted in the form of audio that the commercial power supply has been shut off, and the alert is also issued by transmission of an email addressed to an administrator. | 2020-04-16 |
20200120219 | DECORATING SYSTEM FOR EDIBLE PRODUCTS - A device, method, and computer-readable medium for printing an image on an edible media. The method including receiving from an external device associated with a consumer the image, determining whether the image is of suitable quality to be printed on the edible media, transmitting a message to the external device, in response to a determination that the image is not of suitable quality to be printed on the edible media, and performing an image processing technique on the image to enhance the image for printing on the edible media, in response to a determination that the image is of suitable quality to be printed on the edible media. The method further including transmitting a request to a printer to print the enhanced image on the edible media, and transmitting a request to the printer to print a shipping label to ship the printed edible media to the consumer. | 2020-04-16 |
20200120220 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - A multi-function peripheral (MFP) includes a function of performing a setting to attach an electronic signature to a file including data acquired by executing scanning of a document, attaching, based on the setting, at least one of a plurality of electronic signatures to the file including the data acquired by executing scanning of the document in response to a request received from a smartphone, the electronic signatures including a user signature corresponding to an authenticated user and a device signature corresponding to the MFP, and transmitting the file to which the electronic signature is attached to a communication terminal or the like. | 2020-04-16 |
20200120221 | METHOD TO CREATE A SECURE DISTRIBUTED DATA VALIDATION SYSTEM USING A DISTRIBUTED STORAGE SYSTEM AND ARTIFICIAL INTELLIGENCE - Methods and apparatus for validating paper forms are provided. A node can receive paper-form data from a paper form that has first and second data items (DIs). The node can: determine first and second metadata for the first and second DIs respectively, determine respective first and second validation entities (VEs) to validate respective values of the first and second DIs based on the respective first and second metadata, where the first and second VEs can differ, provide a user interface (UI) including a display of the first DI, receive a validation status for the first DI via the first UI from the first VE, select a first distributed storage system (DSS) associated with the first DI, and record the value of the first DI and the validation status in the first DSS. The node can generate an output related to the paper-form data based on the first DSS. | 2020-04-16 |
20200120222 | INFORMATION PROCESSING APPARATUS WITH MULTIPLE CONFIGURATION SCREENS - An information processing system according to the present disclosure has, for example, a copy function. In the copy function, a plurality of configuration screens including a paper selection screen are displayed one at a time in a predetermined order as a configuration target screen in a main area on a display surface of a display. In a case where a subsequent configuration screen is present when any configuration screen is displayed as the configuration target screen in the main area, a left end part of the subsequent configuration screen is displayed in a marginal part on a right side of the main area. Furthermore, in a case where configuration on the current configuration target screen is complete by a user operation, an appropriate modification is made on the left end part of the subsequent configuration screen. Accordingly, an operability of an information processing system having the copy function is improved. | 2020-04-16 |
20200120223 | SYSTEMS, PROCESSES, AND COMPUTER PROGRAM PRODUCTS FOR CUSTOMIZED PRINTING OF PAGE SHAPE FROM SCANNED DATA - A system and process are disclosed which provide users with a user-defined or custom-shaped print job from scanned data. A document may be scanned and an image object may be extracted from the scanned data which may be used as a print template from which the shape of a cut page is formed. Text and/or graphics may be applied to the page space occupied by the page shape area that will be cut. In an exemplary embodiment, the text and/or graphics may be automatically scaled or sized to fit within the boundary of the print template area. Once the page is cut, the text and/or graphics will automatically fit within the page's shape. | 2020-04-16 |
20200120224 | DOCUMENT SIZE DETECTION DEVICE, IMAGE READING DEVICE, IMAGE FORMING APPARATUS, AND DOCUMENT SIZE DETECTING METHOD - A document size detection device includes: a light source to irradiate a document with light; an imaging device to receive light reflected at the document; and circuitry to control switch on and off of the light source and movement in a sub-scanning direction of the light source, and determine a size of the document based on image data acquired by the imaging device. The circuitry is to determine a size in a main-scanning direction of the document based on: first image data acquired when the light source is switched off while the light source is at a first reading position; second image data acquired when the light source is switched on while the light source is at the first reading position; and third image data acquired when the light source is switched on while the light source is being moved from the first reading position to a second reading position. | 2020-04-16 |
20200120225 | DOCUMENT SIZE DETECTION DEVICE, IMAGE READING DEVICE, IMAGE FORMING APPARATUS, DOCUMENT SIZE DETECTING METHOD, AND RECORDING MEDIUM - A document size detection device includes: a light source that irradiates a document placed on placing means with scanning light via the placing means; a reading unit that receives reflection light from the document via the placing means to acquire image data of the document; and circuitry to set an illumination depth of the scanning light at a size detection time when the size is detected, shallower than an illumination depth of the scanning light at an image reading time when an image of the document is read, and detects, at the size detection time, the size based on a difference between first image data acquired in a state in which the scanning light is switched off and second image data acquired in a state in which the scanning light is switched on. | 2020-04-16 |
20200120226 | IMAGE PROCESSING APPARATUS - An image processing apparatus comprises a memory configured to store a scanned image obtained by scanning a document placement area, and a processor configured to detect an image of each original document from the scanned image, specify a placement state of each original document, and generate data in a data format corresponding to the placement state of each original document in the image. | 2020-04-16 |
20200120227 | IMAGE FORMING APPARATUS PERFORMING WIRELESS COMMUNICATION AND METHOD OF SETTING AND STARTING A JOB VIA WIRELESS COMMUNICATION - An image forming apparatus including: a wireless communication circuitry configured to make a wireless communication with a portable information processing device including a display unit; and a computer and a memory storing a program causing the computer to execute: a recognition step recognizing a portable information processing device that is within a communicable range through communication via the wireless communication circuitry; a job setting step receiving a job setting; and a job control step receiving a start instruction and executing a job in response to the start instruction, wherein the job setting step receives the job setting, which is made in the portable information processing device, via the wireless communication circuitry after the portable information processing device falls within the communicable range, and the job control step accepts reception from the portable information processing device of an instruction to rearrange the order of the execution of the job among jobs which await their starts. | 2020-04-16 |
20200120228 | READING DEVICE, IMAGE FORMING APPARATUS, AND IMAGE READING METHOD - A reading device includes: a light source that irradiates a subject with scanning light; a light receiving section that receives reflection light from the subject; and circuitry to: control the light source to switch on and off of the scanning light; control the light receiver to receive the reflection light from the subject for a predetermined acquisition time at a predetermined acquisition interval so as to acquire data; and calculate a difference between the data acquired while the scanning light is switched on and the data acquired while the scanning light is switched off. The predetermined acquisition time and the predetermined acquisition interval are set such that the acquisition time or a total time of the acquisition time and the acquisition interval become an integer multiple of a fluctuation cycle of a fluctuation factor. | 2020-04-16 |
20200120229 | IMAGE READING APPARATUS AND IMAGE READING METHOD - An image reading apparatus includes a first reading section configured to read a first plane of the document, a second reading section configured to read a second plane which is a back side of the first plane, a first controller stops the reading of the first reading section after causing the first reading section to read a last line before the reading of the first reading section is stopped and transmits a reading stop instruction to a second controller earlier than a timing when the first reading section reads the last line by a time difference corresponding to a delay generated in communication between the first and second controllers. The second controller stops reading of the second reading section after causing the second reading section to read one line in response to the reading stop instruction. | 2020-04-16 |