19th week of 2019 patent applcation highlights part 81 |
Patent application number | Title | Published |
20190141042 | CONTROLLING ACCESS TO A HOST SITE USING A PERSONAL IDENTIFICATION VIDEO - Methods, systems and computer program products for controlling access to a host site are provided. Aspects include receiving, receiving an authentication video and processing the authentication video to identify a plurality of scenes. Aspects also include identifying a representative image for each of the plurality of scenes and comparing the representative image for each of the plurality of scenes with stored one of a plurality of master images. Based on a determination that a similarity between the representative image for each of the plurality of scenes and the one of the plurality of master images is between a first threshold level and second threshold level, aspects include granting access to the host site. | 2019-05-09 |
20190141043 | System and Method for Managing Electronic Interactions Based on Defined Relationships - Aspects of the subject disclosure may include, for example, a process that includes receiving first input defining a relationship between first and second entities, generating a first rule based on the first input, wherein the first rule determines accessibility of a networked service, and associating the first rule with the relationship. The first rule modifies settings of a service management infrastructure to effectuate the first rule in accordance with the relationship, wherein the service management infrastructure provides access to the networked service based on the accessibility. Other embodiments are disclosed. | 2019-05-09 |
20190141044 | Method and System to Enable Controlled Safe Internet Browsing - Various embodiments provide an approach to controlled access of websites based on website content, and profile for the person consuming the data. In operation, machine learning techniques are used to classify the websites based on community and social media inputs, crowdsourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine learning techniques. | 2019-05-09 |
20190141045 | OBSERVATION SYSTEM - Embodiments of an observation system are disclosed herein. The observation system includes at least one observation device having at least one observation unit configured to observe at least one observation object in accordance with at least one first instruction data set. The observation system also includes at least one access control arrangement configured to control access to the observation device by at least one access entity. The access control arrangement includes at least one first peer-to-peer module assigned to the observation device and configured to forward at least one first instruction data set to the observation unit. Also included is at least one peer-to-peer application of at least one peer-to-peer network. The peer-to-peer application is configured to control the access to the observation device by allowing the access entity to cause the provision of at least one first instruction data set to the first peer-to-peer module. | 2019-05-09 |
20190141046 | SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS - Methods and systems for providing a third party application with access to files stored on a server are disclosed. A method may include receiving, from a browser at a client device, a request for a file stored on the server, wherein the request is received via a web page provided by the third party application and rendered by the browser, the web page comprising an embedded user interface (UI) component associated with the server to access the file stored on the server, wherein the request includes a document identifier associated with the file, an application identifier of the third-party application, and an origin identifier, wherein the origin identifier is associated with the web page provided by the third party application and rendered by the browser. The method may further include authenticating the application identifier at the server, wherein authenticating the application identifier comprises determining whether the application identifier references a valid application, and based on the document identifier, the authenticated application identifier and the origin identifier, granting access to the file for the third party application via the embedded UI component. | 2019-05-09 |
20190141047 | VEHICLE NETWORK ACCESS CONTROL METHOD AND INFOTAINMENT APPARATUS THEREFOR - Disclosed is a vehicle network access control method and infotainment apparatus thereof. According to one aspect of the present disclosure, a vehicle network access control method comprises: checking an access subject on the basis of at least one among an ID of the terminal device, an application ID, and a user ID of the infotainment apparatus; determining an access right on the basis of at least one among the access subject, state information of the terminal device, and vehicle state information; and controlling vehicle network access of the infotainment apparatus according to the determined access right, wherein the access right comprises at least one among access permission, access denial, and access permission within a preset time. | 2019-05-09 |
20190141048 | BLOCKCHAIN IDENTIFICATION SYSTEM - A computing device comprises a processor module executing software to conduct a transaction, a networking module enabling connections to a peer-to-peer network, and an ASIC coupled to the processor module and the networking module. The ASIC comprises a blockchain server, an encryption module, and a memory storing a distributed ledger. The ASIC performs a calculation of a memory block within a predetermined minimum time and a predetermined maximum time. The block is stored in the distributed ledger by the blockchain server and is transmitted to the peer-to-peer network by the networking module. | 2019-05-09 |
20190141049 | ENFORCING DATA SECURITY IN A CLEANROOM DATA PROCESSING ENVIRONMENT - Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud environment stores a first set of data provided by a first user account and a second set of data provided by a second user account, where the first user account is associated with a first set of one or more security credentials and the second user account is associated with a second set of security credentials and where the first user account is prevented from accessing at least the second set of data and the second user account is prevented from accessing at least the first set of data. In response to receiving, from the first user account or the second user account, a request to destroy the virtual private cloud environment, at least the first set of data and the second set of data are deleted. | 2019-05-09 |
20190141050 | ACCESS CONTROL SYSTEM AND METHOD - A team-centric computerized access control system includes at least one data record, one or more collaboration spaces associated with the data record, and for each collaboration space, one or more teams having access to the collaboration space. Each team has one or more users associated with it. The access permissions between users within teams are identical, such that when a particular user in the team may access a particular data record or collaboration space, other users in the team may access the exact same information. The notification definitions between users within teams are different, such that particular users may receive notifications of changes or additions of information into a data record or a collaboration space, while other users in the same team will not receive such notifications. | 2019-05-09 |
20190141051 | COMPUTATION SYSTEM, COMPUTATION DEVICE, METHOD THEREOF, AND PROGRAM - A computation device accepts a first processing request output from a first external device, executes first processing, which does not involve outputting information to a second external device, of processing based on the first processing request until the first processing request is judged to satisfy a predetermined security level, and executes second processing, which involves outputting information to the second external device, of the processing based on the processing request after the first processing request is judged to satisfy the security level. | 2019-05-09 |
20190141052 | Differentially Private Processing and Database Storage - A hardware database privacy device is communicatively coupled to a private database system. The hardware database privacy device receives a request from a client device to perform a query of the private database system and identifies a level of differential privacy corresponding to the request. The identified level of differential privacy includes privacy parameters (ε,δ) indicating the degree of information released about the private database system. The hardware database privacy device identifies a set of operations to be performed on the set of data that corresponds to the requested query. After the set of data is accessed, the set of operations is modified based on the identified level of differential privacy such that a performance of the modified set of operations produces a result set that is (ε,δ)-differentially private. | 2019-05-09 |
20190141053 | ENHANCING INTEGRITY OF DATA CENTER SPECIFIC INFORMATION - There is provided a method comprising: receiving, by an apparatus of a data center, a request message from a server computer of said data center, the apparatus and the server computer being physically separate entities communicatively coupled with each other, said message requesting data center specific information stored into a read-only memory area of the apparatus; initiating deciphering of the request message in response to receiving the request message; and as a response to successfully deciphering the request message, transmitting a response message to the server computer, said message comprising the data center specific information acquired from the read-only memory area of the apparatus. | 2019-05-09 |
20190141054 | METHOD AND APPARATUS FOR BLOCKCHAIN POWERED INTEGRITY PROTECTION SYSTEM - Various embodiments relate to a method and apparatus for using blockchains as an integrity tracking tool for network elements, the method including the steps of receiving, by a blockchain network, a patch request from a patch initiator, validating, by the blockchain network, the patch request and writing the patch request on the blockchain, transmitting, by the blockchain network, the patch request to a network element, receiving, by the blockchain network, a patch report from the network element, and validating, by the blockchain network, the patch report and writing the patch report on the blockchain. | 2019-05-09 |
20190141055 | PREVENTING EXECUTION OF PROGRAMS THAT ARE EMBEDDED IN EMAIL MESSAGES - Systems and methods are presented which generate modified email messages, which are largely devoid of embedded functions, from original email messages, which have embedded functions. The embedded functions are amenable to self-executing codes such as viruses, worms, and Trojan programs. Thus, the modified email message without these embedded functions, and any argument associated with these functions, provides a more secure email environment. | 2019-05-09 |
20190141056 | PHYSICAL LAYER ROGUE DEVICE DETECTION - Systems and methods for detecting a rogue network device at a physical layer include obtaining physical layer characteristics of a link between a first network device and a second network device; analyzing the physical layer characteristics of the link; and detecting the rogue network device based on the analyzed physical layer characteristics, wherein the rogue network device was inserted in the link and causes detectable variances in the physical layer characteristics. The physical layer characteristics can include one of noise introduced in clock frequency and jitter. | 2019-05-09 |
20190141057 | AUTOMATED DETECTION OF PHISHING CAMPAIGNS VIA SOCIAL MEDIA - Methods and systems for automatically detecting and responding to phishing campaigns are described herein. Real-time feeds may be streamed from one or more social media servers. Each online post from the real-time feeds may be analyzed to determine whether the online post corresponds to a phishing campaign, by examining any web content that is linked from the online post. When it is determined that the online post corresponds to a phishing campaign, target user accounts of the phishing campaign may be identified by analyzing which user accounts have accessed the web content linked from the online post. Restrictions may be imposed to the target user accounts to prevent an account take-over and other losses to the user accounts. | 2019-05-09 |
20190141058 | DETECTION OF ADVERSARY LATERAL MOVEMENT IN MULTI-DOMAIN IIOT ENVIRONMENTS - Implementations are directed to methods for detecting and identifying advanced persistent threats (APTs) in networks, including receiving first domain activity data from a first network domain and second domain activity data from a second network domain, including multiple alerts from the respective first and second network domains and where each alert of the multiple alerts results from one or more detected events in the respective first or second network domains. A classification determined for each alert of the multiple alerts with respect to a cyber kill chain. A dependency is then determined for each of one or more pairs of alerts and a graphical visualization of the multiple alerts is generated, where the graphical visualization includes multiple nodes and edges between the nodes, each node corresponding to the cyber kill chain and representing at least one alert, and each edge representing a dependency between alerts. | 2019-05-09 |
20190141059 | INTRUSION DETECTION APPARATUS AND COMPUTER READABLE MEDIUM - A state management unit ( | 2019-05-09 |
20190141060 | PARALLELISM AND N-TIERING OF KNOWLEDGE INFERENCE AND STATISTICAL CORRELATION SYSTEM - An n-tiering security threat inference and correlation apparatus ( | 2019-05-09 |
20190141061 | METHODS AND DEVICES FOR AUTOMATICALLY DETECTING ATTACK SIGNATURES AND GENERATING ATTACK SIGNATURE IDENTIFICATIONS - Network traffic management apparatuses, systems, methods, and computer-readable media for automatically detecting attack signatures and generating attack signature identifications, involving: collecting a stable dataset during a stable time; determining whether a cyber-attack is detected; when a cyber-attack is detected, periodically generating attack signatures and updating an enforcer with the attack signatures, the attack signatures representing dynamic rules to be enforced; validating the dynamic rules via a long-time validation mechanism, validating involving considering behavior of each dynamic rule after the cyber-attack and during a new cyber-attack and ranking each dynamic rule using the stable dataset, thereby generating persistent rules having a dynamic rule; exporting the persistent rules to a security enforcer; introducing the persistent rules to a persistent rule revocater; determining whether export of an unrevoked persistent rule is requested; and if requested, exporting the unrevoked persistent rule of the persistent rules through a mitigator and collecting statistics. | 2019-05-09 |
20190141062 | METHODS AND SYSTEMS FOR MALWARE DETECTION - According to some embodiments, a method for training a malware detector comprising a deep learning algorithm is described, which comprises converting a set of malware files and non malware files into vectors by using a feature based dictionary, and/or by using a conversion into an image, and providing prospects that the files constitute malware. Various features and combinations of features are described to build a feature based dictionary and adapt its size. According to some embodiments, a method for detecting a malware by using a malware detector comprising a deep learning algorithm is described, which comprises converting a file into a vector by using a feature based dictionary, and/or by using a conversion into an image, and providing prospects that the file constitutes malware. Methods for providing a plurality of prospects and aggregating these prospects are provided. Additional methods and systems in the field of malware detection are also described. | 2019-05-09 |
20190141063 | SYSTEMS AND METHODS FOR COMPUTER ENVIRONMENT SITUATIONAL AWARENESS - Systems and methods for monitoring states of operation of a computer environment can include one or more computer servers identifying a target asset of the computer environment and establishing a communication link with a computing device associated with the target asset. The one or more computer servers can determine a first set of parameters for profiling the target asset, transmit a first query for the first set of parameters to the computing device via the communication link, and receive one or more first parameter values corresponding to the first set of parameters responsive to the query. The one or more computer servers can compare the one or more first parameter values to one or more first criteria or threshold values, an determine a state of operation of the target asset based on the comparison. The state of operation can be indicative of an abnormal behavior associated with the target asset. | 2019-05-09 |
20190141064 | DETECTING ATTACKS AGAINST A SERVER COMPUTER BASED ON CHARACTERIZING USER INTERACTIONS WITH THE CLIENT COMPUTING DEVICE - A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party. | 2019-05-09 |
20190141065 | Neutralizing malicious locators - Methods and systems for neutralizing malicious locators. Threat actors may shut down their web pages or applications (i.e., resources) that serve malicious content upon receiving request(s) configured to be perceived by the resource as non-browser requests. Therefore, initiating (large-scale) non-browser requests, or requests that are at least perceived as non-browser requests, may effectively act to inhibit, or even nullify, intended attack vectors. | 2019-05-09 |
20190141066 | Detecting malicious network activity using time series payload data - Methods and systems for detecting malicious network activity. The method may include analyzing payload data relating to activity on one or more virtual security appliances, grouping related payloads, and analyzing a time series dataset describing the groupings to identify anomalous payloads. | 2019-05-09 |
20190141067 | DEEP RECURRENT NEURAL NETWORK FOR CLOUD SERVER PROFILING AND ANOMALY DETECTION THROUGH DNS QUERIES - A method includes arranging a plurality of network domains from DNS server logs into a cohort of network domains, wherein the DNS server logs are for at least one client internet protocol (IP) source address, extracting, from the cohort of network domains, a plurality of features related to the network domains in the cohort of network domains, training a recurrent neural network (RNN) based on values of the plurality of features related to the network domains, operating the RNN to make a prediction of expected values for the plurality of features for a future period of time, comparing the expected values to actual values of the plurality of features for the future period of time, and when the expected values differ from the actual values by a predetermined threshold, indicating that a host associated with the at least one client IP source address is operating with an anomaly. | 2019-05-09 |
20190141068 | ONLINE SERVICE ABUSER DETECTION - An online service abuser detection method, apparatus, system, and/or non-transitory computer readable medium may decrease and/or prevent an occurrence of abuse by users of an online service by detecting an abuser based on features of users of the online service and imposing a restriction on the abuser before the abuse is transmitted to the other users of the online service. | 2019-05-09 |
20190141069 | CONTROLLER, A CONTEXT BROADCASTER AND AN ALERT PROCESSING DEVICE - A controller may include one or more processors configured to control an automotive operating function representing an operation of an actuator of an automobile; receive a first message in accordance with an automotive fieldbus communication protocol via a fieldbus communication network, wherein the first message comprises contextual information associated with the automobile; determine whether a relation between the contextual information and a status of the automotive operating function fulfills a predefined criterion; generate a second message in accordance with the automotive fieldbus communication protocol, wherein the second message comprises information representing a result of the determination. | 2019-05-09 |
20190141070 | ANOMALY DETECTION ELECTRONIC CONTROL UNIT, ONBOARD NETWORK SYSTEM, AND ANOMALY DETECTION METHOD - An anomaly detection electronic control unit (ECU) that detects unauthorized messages on a communication path is provided. An ECU that periodically transmits a first-type message including data to be monitored, and an ECU that periodically transmits a second-type message including data for comparison, are connected to the communication path. The anomaly detection ECU includes: a receiver that successively receives first-type and second-type messages; a processor that determines whether a first-type message received is normal or anomalous; and a transmitter that transmits a predetermined message in accordance with results of the determining. The determining is performed based on content of the first-type message, content of a second-type message last received at the time of receiving this first-type message, and at least one of content of a first-type message received further in the past than this first-type message, and content of a second-type message received further in the past than the second-type message last received. | 2019-05-09 |
20190141071 | IDENTIFYING MALWARE-INFECTED NETWORK DEVICES THROUGH TRAFFIC MONITORING - The present invention generally relates to detecting malicious network activity coming from network devices such as routers and firewalls. Specifically, embodiments of the present invention provide for detecting stealth malware on a network device by comparing inbound and outbound network traffic to discover packets originating from the network device and packets that violate configuration rules. When combined with a network traffic monitor server configured to monitor actual network traffic reports and to receive known network traffic reports from host computers, the system can detect stealth network traffic originating from both network devices and host computer systems. | 2019-05-09 |
20190141072 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - An information processing device capable of reducing an amount of data to be monitored in an onboard system is provided. The information processing device obtains a first log from the onboard system, determines whether an abnormality is included in communication data of the first log using the first log, and, in a case where the abnormality is determined to be included in the communication data, outputs first detection results indicating that the abnormality is included in the communication data to the onboard system. The first detection results is output, as a transmission instruction to cause transmission of a second log from the onboard system to the information processing device, with the second log including a larger amount of data than the first log. | 2019-05-09 |
20190141073 | INFORMATION PROCESSING APPARATUS THAT PREVENTS UNAUTHORIZED ACCESS THERETO, METHOD OF CONTROLLING THE INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus which is capable of preventing unauthorized access thereto. The information processing apparatus is capable of communicating with a server. An inquiry is made of the server about an IP address of the information processing apparatus, which is managed by the server. When it is determined that the IP address obtained from the server as a result of the inquiry and an IP address stored in the information processing apparatus match each other, a warning that a security level of the information processing apparatus is low is issued. | 2019-05-09 |
20190141074 | SECURITY TEST SYSTEM, SECURITY TEST METHOD, FUNCTION EVALUATION DEVICE, AND PROGRAM - A security test can be performed on an ECU by using random test signals without changing the ECU. | 2019-05-09 |
20190141075 | METHOD AND SYSTEM FOR A PROTECTION MECHANISM TO IMPROVE SERVER SECURITY - A method and system for a protection mechanism associated with a server to prevent execution of malicious code. The method includes identifying permissions of a set of files by the protection mechanism where the set of files are related to a request sent to the server, determining whether the request references any file in the set of files with inappropriate permissions, and blocking the request from being executed by a processing engine in response to determining the request is associated with at least one file with improper permissions. | 2019-05-09 |
20190141076 | METHODS, SYSTEMS AND DEVICES TO MITIGATE THE EFFECTS OF SIDE EFFECT URLs IN LEGITIMATE AND PHISHING ELECTRONIC MESSAGES - A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion. | 2019-05-09 |
20190141077 | SYSTEMS AND METHODS FOR DETECTING DOMAIN IMPERSONATION - The invention is a security system providing domain name authentication for intrusion and malware prevention. The system is configured to analyze domain names, specifically analyze network metadata associated with said domain names, and further identify domain names attempting to impersonate or spoof domain names associated with a trusted entity or party. | 2019-05-09 |
20190141078 | ALTERING CIPHER AND KEY WITHIN AN ESTABLISHED SESSION - An encrypted link is established with multiple ciphers. During a handshake protocol when establishing a secure session, at least two sets of cipher suites are transmitted to a server by a client. A choice cipher suite for each set of the at least two sets of cipher suites are received by the client from the server. The client selects a first choice cipher suite from among the choice cipher suites received from the server. The client establishes a connection with the server using the first choice cipher suite to encrypt the connection. | 2019-05-09 |
20190141079 | SYSTEMS AND METHODS FOR SHARING, DISTRIBUTING, OR ACCESSING SECURITY DATA AND/OR SECURITY APPLICATIONS, MODELS, OR ANALYTICS - Methods and systems for developing and distributing applications and data for building security applications can be provided. A plurality of data policies can be set for access and/or filtering security data based on selected parameters. One or more modules can be generated for processing the security data, with each of the modules governed by one or more module policies. Upon receipt of a request to initiate execution of the one or more modules to access and process a selected portion or filtered set of the security data, it can be determined if the request violates the data policies and/or the module policies applicable for processing the selected portion or filtered set of the security data, and if the data policies and/or the module policies are not violated, the one or more modules can be executed to process the selected portion or filtered set of the security data. | 2019-05-09 |
20190141080 | Apparatus for Comprehensive IoT Testing - A system for providing baseline compliance with data security standards for industrial and commercial devices that are connected to communications networks with TCP/IP protocols. This system will allow for verification of wired and wireless devices and connected components. This testing criteria will provide testing to an expanded primitive class of devices including Sensor, Aggregator, Communications Channel, eUtility, Decision Trigger and Actuator | 2019-05-09 |
20190141081 | METHOD OF ENABLING SLICE SECURITY SEPARATION - A mobile network system comprises a security device and a network device. The security device stores slice security requirements which are different for each slice ID (identification). The slice ID indicates a network slice in a core network. The network device transmits, to the security device, a Slice Security Request including the slice ID. The network device receives, from the security device, a Slice Security Response including the slice security requirements related to the slice ID. The network device selects, based on the slice security requirements, a security algorithm for the network slice. | 2019-05-09 |
20190141082 | MODULARIZED SOFTWARE SYSTEM FOR MANAGING A PLURALITY OF DISPARATE NETWORKS - Converged network management application and system is provided that delivers a management platform as a service that can view and/or manage all managed networks in the aggregate, or any one of them individually (including individual devices within the managed networks), in a secure and efficient manner, providing continuously available intelligence in real time on the managed networks and systems, and overcoming integration issues including conflicting address schemas, the need to avoid unnecessary infrastructure, and the need acquire all necessary information in real time within applicable memory and bandwidth constraints. | 2019-05-09 |
20190141083 | Obtaining Services Through a Local Network - One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset of the endpoints. The gateway may further include Session Initiation Protocol (SIP) proxy servers for communicating with a second subset of the endpoints. Incoming communications to the premises may be routed by the gateway to one or more of the endpoints via the local physical interfaces or the SIP proxy servers. One or more endpoints may initiate outgoing communications via the local physical interfaces or the SIP proxy servers. | 2019-05-09 |
20190141084 | METHODS, APPARATUS AND SYSTEMS TO INCREASE MEDIA RESOURCE FUNCTION AVAILABILITY - Communications methods, apparatus and systems for detecting a status condition indicative of a failure of a media processing entity and providing media redirection to increase media resource function availability. One embodiment of the present invention is a method that includes directing, by a first Session Border Controller (SBC), a first media call flow of a first call through a first media content processing entity to a second SBC, detecting, at one of said first or second SBCs, a status condition indicative of a failure condition for the first media content processing entity, and redirecting, by the SBC that detects the status condition indicative of a failure condition, the first media call flow for the first call so that the first media call flow passes through a second media content processing entity instead of through the first media content processing entity without terminating the first call. | 2019-05-09 |
20190141085 | STREAMING RELAY FOR DIGITAL SIGNAGE - Digital signage techniques are disclosed that utilize streaming technology to deliver digital signage content to digital signage display devices. In some examples, a method may include rendering a digital signage content frame by frame, capturing an image of each rendered frame, transforming the captured image of each rendered frame into a video frame of a video stream, and delivering the video stream to at least one remote display device. The captured image may be an image of a portion of the rendered frame. The display devices that receive the video stream may render the video stream using a streaming media player. | 2019-05-09 |
20190141086 | CODEC PARAMETER ADJUSTMENT BASED ON CALL ENDPOINT RF CONDITIONS IN A WIRELESS NETWORK - A network device determines radio frequency (RF) conditions at a first endpoint and a second endpoint of a call or session. The network device determines optimum first codec parameters for the determined RF conditions at the first endpoint of the call or session, and determines optimum second codec parameters for the determined RF conditions at the second endpoint of the call or session. The network device sends the first codec parameters to the first endpoint for altering operation of a first codec at a first device at the first endpoint. The network device sends the second codec parameters to the second endpoint for altering operation of a second codec at a second device at the second endpoint. | 2019-05-09 |
20190141087 | INSTANT AGENT - A system is described for setting up videoconferencing between a user | 2019-05-09 |
20190141088 | SYTEMS AND METHODS FOR REMOTE CONTROL IN INFORMATION TECHNGOLOGY INFRASTRUCTURE - Systems and methods of the present disclosure are directed to providing remote control capabilities in information technology infrastructure. In particular, systems and methods of the present disclosure can provide remotely control capabilities to facilitate the management, configuration, or maintenance of information technology infrastructure. | 2019-05-09 |
20190141089 | SYSTEM FOR ESTABLISHING A SHARED MEDIA SESSION FOR ONE OR MORE CLIENT DEVICES - A system is provided for establishing a shared media session for one or more client devices. One or more processors in the system are configured to establish a shared media session that includes a disparate live media output stream scheduled by a first client device to start at a defined timestamp, and played back on one of the first client device or a plurality of client devices that join the shared media session through a distributed communication network. A persistent record of event data and media, synchronized based on one or more criteria and received from a recording client device, is generated corresponding to the shared media session and previous shared media sessions until the shared media session is terminated by at least one of the first client device or by abandonment of the distributed communication network by the plurality of client devices. | 2019-05-09 |
20190141090 | SYNCHRONIZATION BASED ON DEVICE PRESENCE - An architecture that can facilitate initiation of an automatic synchronization operation based upon presence information in connection with a wireless communications network is provided. For example, when certain mobile devices register with a particular network entity (e.g., a femtocell) that services a particular target location (e.g., place of residence), then such registration can be leveraged to indicate presence at the target location. Accordingly, synchronization between the mobile device and other devices can be automatically initiated, without requiring input or effort by a user, or even that the user remembers to perform the synchronization operation. Moreover, the synchronization operation can be wireless, so connection cables need not be maintained or employed. | 2019-05-09 |
20190141091 | Systems and Methods for Conferencing. - Systems and methods are provided for establishing a video conference session. The systems and methods may include receiving, from a first conference client device, a request to establish a conference session with a second conference client device; determining a first media router for forwarding, to the second conference client device, a media data stream with predetermined attributes of a plurality of first media data streams generated by the first conference client device; determining a second media router for forwarding, to the first conference client, a media data stream with predetermined media attributes of a plurality of second media data streams generated by the second conference client device; and transmitting, to the first conference client device, a first address associated with the first media router and a second address associated with the second media router. | 2019-05-09 |
20190141092 | FRAMEWORK TO NOTIFY AND INVITE USERS TO JOIN A COLLABORATIVE SESSION - A notification framework and method that quickly sends invitations one device to another device to join devices to collaboration session. Devices may be provided with an application that enables a user to register with a registry service. The registry service is provided as a mechanism to enable delivery of a collaboration invitation and joining of participants in the collaborative session. Notification invitations containing a collaboration URL may then be forwarded via a push service to the invited registrants. Each invited registrant is then provided an option to accept invitation and automatically join the session with the user. In another example, the host user may “pass” or “share” a session to an invited registrant rather than having an invited registrant join a session. | 2019-05-09 |
20190141093 | METHODS, APPARATUS AND/OR SYSTEM FOR USING EMAIL TO SCHEDULE AND/OR LAUNCH GROUP COMMUNICATIONS SESSIONS - Methods and system for scheduling or launching online and phone sessions between two or more people via email and other electronic communication channels without the requirement for an account with the session service provider when scheduling the session. By including a designated service provider email address in the recipient list of the host's email or meeting invitation, a user account can be, and in some embodiments is automatically created by the service provider system in response to receipt of such an Email and session invitations are automatically sent to the host and invitees designated in the host's email or meeting invitation. In this way the host and invites calendars can be automatically updated and populated with session information and information on how to joint the session, e.g., on-line meeting or conference. The Email from the communications provider system can, and in some embodiments does, take the form of an updated invite Email message with the information in the Email from the service provider system updating or replacing information supplied by the original invite from the host. | 2019-05-09 |
20190141094 | MULTI-SUBSCRIPTION IN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEMS - Methods and apparatus for implementing a Home Subscriber Server, HSS, ( | 2019-05-09 |
20190141095 | System and Method for Distributed Mobile Network - According to one aspect of the present disclosure, there is provided a method, by a virtual network function, that includes: receiving a first request from a user equipment (UE), the first request including first parameters and a first token, the first token being a vector value corresponding to a session state for the UE; determining the session state for the UE according to the first token; programming network resources according to the session state, the programming updating states of the network resources, wherein the session state for the UE is updated when the states of the network resources are updated; producing a second token corresponding to the updated session state for the UE; storing the updated session state and the second token; and transmitting the second token to the UE. | 2019-05-09 |
20190141096 | Method for Implementing a Call Control of a Client on a Telephony Endpoint Representing a User, and Port Handler Designed Therefor - The invention concerns a computer-implemented method for executing call control for a client (Cl | 2019-05-09 |
20190141097 | ESTABLISHING A CONVERSATION BETWEEN INTELLIGENT ASSISTANTS - A computer-implemented method of establishing a conversation between intelligent assistants includes subdividing content of a user's conversation monitored over a predetermined period of time into a plurality of segments, and associating a time stamp with each segment; hashing each of the plurality of segments wherein a hash value is associated with each segment; matching pairs of the hash values and their time stamps with hash values and time stamps received from one or more intelligent assistants associated with the one or more other persons; and establishing a connection between the user's intelligent assistant and an intelligent assistant of at least one of the one or more other persons, when the user's hash value and time stamp for one or more segments of the conversation match hash values and time stamps of one or more conversation segments of the at least one of the one or more other persons. | 2019-05-09 |
20190141098 | Method and System for Writing Trajectory Synchronization Among Multiple Clients - A method and system for writing trajectory synchronization among multiple clients are disclosed. The method includes: receiving (S | 2019-05-09 |
20190141099 | SYSTEMS AND METHODS TO MANAGE MULTICAST TRAFFIC - In various example embodiments, a system, a method, and a machine readable medium to manage multicast traffic are disclosed. The system includes a controller server for receiving first multicast group member information and for providing centralized control of a network. The first multicast group member information is received from a first end-host computer and received at the controller server responsive to a first packet forwarding system identifying the first end-host computer is joining a first multicast group on a first virtual network. The controller server generates a first multicast tree and communicates a first network configuration message to at least one packet forwarding system of the first plurality of packet forwarding systems. The first network configuration message includes a packet flow table entry enabling configuration of a flow table to enable communication of multicast traffic for the first multicast group over a portion of the first multicast tree. | 2019-05-09 |
20190141100 | Video Storage System, and Video Data Transmission Method for Same - The present application discloses a system for video storage and method for video data transmission based on the same. The system for video storage in the present application includes a first control node, a second control node and at least two storage nodes. Each control node includes a signal agent module, and each storage node includes a data agent module. The second control node is configured for starting the signal agent module of the second control node after determining that the first control node is unavailable. The signal agent module of the second control node is configured for transmitting an instruction to the data agent module of a designated storage node based on a service request through a preset virtual IP address. The data agent module of the designated storage node is configured for transmitting video data to the third-party platform according to the received instruction and based on the predetermined signal protocol. This can effectively avoid the single point of failure and ensure the stability of the system. | 2019-05-09 |
20190141101 | CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION APPARATUS, AND CONTENT DISTRIBUTION METHOD - Provided is a content distribution system in which content is distributed from a content distribution apparatus to a plurality of display apparatuses, in which the content distribution apparatus stores the content and connection information on each of the plurality of display apparatuses, groups display apparatuses to which the same content is to be distributed, into one group, among the plurality of display apparatuses, manages one display apparatus, which belongs to the group, as a master display apparatus, and the other display apparatuses as slave display apparatuses, and transmits the content and the connection information on the slave display apparatus that belongs to the group, to the master display apparatus. The master display apparatus makes a connection the slave display apparatus based on the received connection information, and distributes the content. | 2019-05-09 |
20190141102 | APPARATUS AND METHOD FOR STORING AND PLAYING CONTENT IN A MULTIMEDIA STREAMING SYSTEM - Apparatus for transmitting media content in multimedia streaming system is provided. Apparatus includes transceiver; and at least one processor configured to control the transceiver to receive a request for the media content; and transmit a plurality of segments regarding the media content, wherein the plurality of segments comprises an initialization segment (IS) and a media segment (MS), wherein the IS includes a moov box and a stsd box, wherein the stsd box includes sample description entries required to decode all representations within a representation group, and wherein each sample description entry in the stsd box corresponds to coding information of a media component in each of the representations, wherein the MS includes a moof box including a sample description index and a mdat box including media data, and wherein a value of the sample description index is an index of one of the sample description entries in the stsd box. | 2019-05-09 |
20190141103 | Data-Plan-Based Quality Setting Suggestions and Use Thereof to Manage Content Provider Services - A user device described herein suggests a change to a quality setting associated with the consumption of content from one or more content providers. The change is suggested based both on a user's data plan and on a service quality of content received by the user device. This user-selected quality setting is then provided to the telecommunication network, which reduces network resources available for transmission of the content based on the quality setting. Such reduced network resources cause the content providers to provide content at a service quality no greater than the quality setting. Also, the user may be presented with or defaulted to selecting an option for a program offering consumption of the video content free of charge when provided to the user at a limited service quality. When the user participates, consumption of video content is then conditionally excluded from a consumption metric of the data plan. | 2019-05-09 |
20190141104 | SYNCHRONIZING FILTER METADATA WITH A MULTIMEDIA PRESENTATION - A method, system and apparatus for applying and synchronizing filter information with a multimedia presentation, such as a movie provided in a video-on-demand context, to suppress objectionable content. In one example, filter information, which includes an indicia of a portion of the multimedia presentation including objectionable content and a type of suppression action, is provided on either a set-top-box or a video-on-demand server. A user selects a particular video-on-demand presentation, and the selection is transmitted to the set-top-box. Filtering may take place at the set-top-box side such that the complete video-on-demand movie is transmitted to the set-top box and then content suppression, such as skipping, muting, cropping, and blurring, takes place at the set-top-box. Alternatively, some or all suppression may take place at the server such that some or all of the objectionable content is not transmitted to the set-top-box. Additionally, whether in a video-on-demand, DVD, or other environment it may be necessary to synchronize filter with the multimedia content so that the proper objectionable content is suppressed. | 2019-05-09 |
20190141105 | BACKFILL OF VIDEO STREAM - This application is directed to a camera system having one or more processors, memory having a limited capacity, a camera element and a microphone. The camera system captures video and audio data in real-time via the camera element and the microphone, respectively. While capturing the video and audio data in real-time, the captured video and audio data are stored in the memory having the limited capacity, and sent to a remote server system via the communication interface for storage by the remote server system. The camera system determines that a portion of the video and audio data was not available at the remote server system. In accordance with a determination that at least some of the portion is still available in the memory having the limited capacity, the camera system resends the at least some of the portion from the memory to the remote server system via the communication interface. | 2019-05-09 |
20190141106 | SYSTEM AND METHOD FOR INTERLEAVED MEDIA COMMUNICATION AND CONVERSION - A method or system configured for receiving a first single data stream representing a first multimedia file, the first single data stream including an interleaved sequence of data elements of a plurality of media, and/or transmitting a second single data stream representing a second multimedia file, the second single data stream including an interleaved sequence of data elements of said plurality of media, where the second multimedia file differs from said first multimedia file by at least one data element of a selected medium extracted from said first multimedia file, and/or by at least one data element of a selected medium added to the first multimedia file, and/or by at least one data element of a selected medium added to the first multimedia file being a converted version of the at least one data element of a selected medium extracted from the first multimedia file. | 2019-05-09 |
20190141107 | Transcoder Assignment for Real-time Text - Transcoder assignment for real-time text (RTT) is described. A service provider can send an offer to establish a RTT call with a first device to an alternate service provider associated with a second device. The alternate service provider can transmit the offer to the second device, which can decline the offer. The alternate service provider can receive a response indicating that the second device declined the offer and, based on receiving the response, can determine whether the second device supports RTT. If the second device does not support RTT, the alternate service provider can add an indictor to the response that indicates that the second device does not support RTT. The alternate service provider can send the response (and the indicator) to the service provider, and the service provider can establish the RTT call without assigning a transcoder to the RTT call. | 2019-05-09 |
20190141108 | TRANSFER TERMINAL AND TRANSFER METHOD PERFORMED THEREBY - A reception terminal is provided in a communication system including a transmission terminal that transmits packets in a real-time stream and a transfer terminal that caches and transfers packets transmitted from the transmission terminal. The reception terminal includes a receiver which receives packets, and circuitry which obtains a first available band between the reception terminal and the transfer terminal and a second available band between the reception terminal and the transmission terminal. The reception terminal includes a transmitter which transmits requests to the transfer terminal at a frequency that is based on the first available band, wherein the frequency defines how often the requests are transmitted and the requests trigger transmission of packets from the transfer terminal to the reception terminal in the first available band. The transmitter notifies the transmission terminal of the second available band to trigger transmission of packets from the transmission terminal in the second available band. | 2019-05-09 |
20190141109 | Host Selection for a Media Flow - Disclosed are methods and systems for selecting a host facility for a communications session for a group of devices. In one aspect, a method includes partitioning the devices into multiple clusters. Each cluster is associated with a respective host facility that is estimated to provide each device in the respective cluster a specified quality requirement during the communication session. The method also includes accessing a weighting value for each cluster of the different clusters based on one or more attributes of the devices in each respective cluster of the different clusters, and selecting a group host facility, from the host facilities associated with the clusters based on the weighting value of each respective cluster and a predefined criterion, the group host facility to host the communication session for the devices. | 2019-05-09 |
20190141110 | Design Analysis for Framework Assessment - Design analysis for framework assessment is described. In one or more example embodiments, a file including a designed image may be obtained from a storage device, and a guide structure may be extracted from the file. The guide structure may include multiple guide lines, and the guide lines may be analyzed to determine column-related data, such as at least relative widths or positional orders, a total number of columns, groups of column widths, a combination thereof, and so forth. From multiple frameworks, a framework may be ascertained that substantially matches the guide structure based at least partially on a comparison of column-related data to each framework of the multiple frameworks. Ascertainment of a framework may be indicated to an end-user. The ascertained framework may be applied to facilitate development of a coded functional version of at least a visual design of the image. | 2019-05-09 |
20190141111 | Method and System for Controlling Future Behavior of Devices - A distributive instructions transmission system for the performing a task the can be generated by request of a user. A user initiates the task by transmitting instructions for a chosen task to a remote processing center. The selected task will be acted upon by one or several processors. The processing center immediately generate instructions that will execute the task, check to see if the task is already requested by other users, or take steps to make possible execution of the task. Execution of the requested task can involve the generation of an enhance subset of user instructions that is transmitted to one or many different processors. If more than one processor is involved they can be located in a single site or be remote to one another. The instructions for each sub-segment task can be routed to the involved processor(s), and they initiate an integrated coordinated action. | 2019-05-09 |
20190141112 | COGNITIVE STORAGE MANAGEMENT FOR A MOBILE COMPUTING DEVICE - Embodiments include methods, systems and computer program products method for cognitive storage management for a mobile computing device. The computer-implemented method includes monitoring, using a processor, content generation and usage on a mobile computing device by a user associated with the mobile computing device to determine usage habits of the user. The processor determines a storage capacity for the mobile computing device. The processor predicts future content generation and usage by the user based on the determined usage habits. The processor determines whether future storage capacity issues could exist based on the predicted future content usage and the determined storage capacity. The processor, in response to a determination that future storage capacity issues could exist based on the predicted future content usage and the determined storage capacity, causes at least a portion of content stored on the mobile computing device for storage in a remote storage. | 2019-05-09 |
20190141113 | SIMULTANEOUS OPTIMIZATION OF MULTIPLE TCP PARAMETERS TO IMPROVE DOWNLOAD OUTCOMES FOR NETWORK-BASED MOBILE APPLICATIONS - Network traffic data associated with data requests to computer applications based on static policies is collected. An optimization order is established among network parameters. A first network parameter of a higher rank in the optimization order is estimated based on the collected network traffic data before one or more other network parameters of lower ranks are estimated. Optimal values for the other network parameters are estimated based at least in part on the estimated first optimal value for the first network parameter. The estimated first optimal value of the first network parameter and the estimated optimal values for the other network parameters are propagated to be used by user devices to make new data requests to the computer applications. | 2019-05-09 |
20190141114 | DATA SHARING AMONG PROCESSING SYSTEMS IN A COLLABORATION GROUP - Examples of techniques for data sharing among processing systems in a collaboration group are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes receiving a message sent to a collaboration group via a first network connection. The first processing system is a member of the collaboration group. The method further includes downloading data associated with the message via the first network connection. The method further includes determining whether any additional processing systems that are members of the collaboration group are in proximity to the first processing system. The method further includes, based at least in part on determining that a second processing system that is a member of the collaboration group is in proximity to the first processing system, transmitting a message indicator from the first processing system to the second processing system via a second network connection. | 2019-05-09 |
20190141115 | GRAPHICAL USER INTERFACE FACILITATING UPLOADING OF ELECTRONIC DOCUMENTS TO SHARED STORAGE - In an end user application running on a computer, for the purpose of collaborative modification of shared electronic documents, a graphical user interface is provided that facilitates storing an electronic document in shared storage. This graphical user interface includes a graphical element that conveys information about shared status of the currently accessed electronic document to the end user. Through input devices of the end user computer, an end user can manipulate this graphical element. Certain manipulations of this graphical element instruct the end user computer to store the currently accessed electronic document in shared storage if that electronic document has not yet been stored in shared storage. After the electronic document is stored in shared storage, the graphical user interface facilitates sharing of the electronic document with others. A graphical user interface that allows an electronic document to be quickly shared improves user efficiency and productivity in collaborative authoring. | 2019-05-09 |
20190141116 | DATA PURGE DISTRIBUTION AND COHERENCY - Systems, methods, and software for operating a content delivery system are provided herein. In one example, a method includes, in a first content delivery node, receiving a purge instruction to purge first content stored in the first content delivery node and responsively purging the first content. Responsive to purging the first content, the method includes transferring a content request for delivery to a second content delivery node, where the content request comprises a request for second content to replace the first content and a revision indicator of the first content. Responsive to the content request, the method includes receiving the second content for storage in the first content delivery node. | 2019-05-09 |
20190141117 | INDIVIDUALIZED CONNECTIVITY BASED REQUEST HANDLING - Individualized connectivity based request handling is disclosed. For example, a content source is accessed by a client device and a load balancer executes on a processor to receive a first request based on the client device accessing the content source. A first session variable is set to a first value in a first session and a first latency to the client device is measured. A first plurality of target nodes is selected based on the first session variable. A first plurality of messages is sent to the first plurality of target nodes. A second request is received from the client device after the first session expires, starting a second session. The first session variable is set to a different second value in the second session. A second plurality of messages is sent to a second plurality of target nodes different from the first plurality of target nodes. | 2019-05-09 |
20190141118 | LATENCY-BASED ROUTING AND LOAD BALANCING IN A NETWORK - Methods and systems for load balancing are described. A network node may replicate content. A lag time may be determined. A data structure may be generated that comprises the lag time. | 2019-05-09 |
20190141119 | TECHNOLOGIES FOR TRANSPARENT FUNCTION AS A SERVICE ARBITRATION FOR EDGE SYSTEMS - Technologies for function as a service (FaaS) arbitration include an edge gateway, multiple endpoint devices, and multiple service providers. The edge gateway receives a registration request from a service provider that is indicative of an FaaS function identifier and a transform function. The edge gateway verifies an attestation received from the service provider and registers the service provider. The edge gateway receives a function execution request from an endpoint device that is indicative of the FaaS function identifier. The edge gateway selects the service provider based on the FaaS function identifier, programs an accelerator with the transform function, executes the transform function with the accelerator to transform the function execution request to a provider request, and submits the provider request to the service provider. The service provider may be selected based on an expected service level included in the function execution request. Other embodiments are described and claimed. | 2019-05-09 |
20190141120 | TECHNOLOGIES FOR PROVIDING SELECTIVE OFFLOAD OF EXECUTION TO THE EDGE - Technologies for providing selective offload of execution of an application to the edge include a device that includes circuitry to determine whether a section of an application to be executed by the device is available to be offloaded. Additionally, the circuitry is to determine one or more characteristics of an edge resource available to execute the section. Further, the circuitry is to determine, as a function of the one or more characteristics and a target performance objective associated with the section, whether to offload the section to the edge resource and offload, in response to a determination to offload the section, the section to the edge resource. | 2019-05-09 |
20190141121 | TECHNOLOGIES FOR PROVIDING FUNCTION AS SERVICE TIERED SCHEDULING AND MAPPING FOR MULTI-OPERATOR ARCHITECTURES - Technologies for determining a set of edge resources to offload a workload from a client compute device based on a brokering logic provided by a service provider include a device that includes circuitry that is in communication with edge resources. The circuitry is to receive a brokering logic from a service provider receive a request from a client compute device, wherein the request includes a function to be used to execute the request and one or more parameters associated with the client compute device, determine the one or more parameters, select, as a function of the one or more parameters and the brokering logic, a physical implementation to perform the function, wherein the physical implementation indicates a set of edge resources and a performance level for each edge resource of the set of edge resources, and perform, in response to a selection of the physical implementation, the request using the set of edge resources associated with the physical implementation. | 2019-05-09 |
20190141122 | SYSTEMS AND METHODS TO IMPROVE THE PERFORMANCE OF A NETWORK BY MORE EFFICIENT VIRTUAL NETWORK RESOURCE ALLOCATION - A system and method for improving the performance of a network by more efficient virtual network resource allocation includes identifying VNF functionality implemented across a set of virtual resources in a network and determining an allocation parameter associated with the efficiency of the VNF functionality and the set of virtual resources. The VNF functionality is reallocated in a subset of the set of virtual resources based on the allocation parameter. | 2019-05-09 |
20190141123 | NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, PROCESS DISTRIBUTION APPARATUS AND PROCESS DISTRIBUTION METHOD - A non-transitory computer-readable storage medium storing a program that causes a computer to execute a process including acquiring, for each of a plurality of applications executed on a plurality of virtual machines, an amount of traffic of packets transmitted to any of a plurality of CPUs, identifying, for each of the plurality of applications, a CPU to which packets are transmitted, calculating, for each of the plurality of CPUs, a total amount of traffic of packets that are received by the CPU, identifying, among the plurality of CPUs, a specific CPU of which the calculated total amount exceeds a predetermined threshold, identifying, among applications those transmit packets to the specific CPU, a specific application, and identifying, among the plurality of virtual machines, a specific virtual machine, a CPU to which packets are transmitted from the specific application being changed by moving the specific application to the specific virtual machine. | 2019-05-09 |
20190141124 | CLOUD-END DATA MULTICAST METHOD AND SYSTEM, AND COMPUTER DEVICE - A cloud-end data multicast method includes: obtaining a multicast packet, the multicast packet carrying a tenant identifier, a destination address, and a source address; and searching for a multicast group according to the tenant identifier and the destination address. The multicast group includes multicast members. The method also includes obtaining routes corresponding to the multicast members; generating a routing tree according to the routes corresponding to multicast members; and obtaining member addresses corresponding to the multicast members. The method also includes obtaining an address list containing addresses of target members that are identified to receive the multicast packet by performing address filtering according to the source address and the member addresses; encapsulating the multicast packet; and delivering the encapsulated multicast packet to the target members according to the address list and the routing tree. | 2019-05-09 |
20190141125 | CROSS APPLICATION ACCESS PROVISIONING SYSTEM - The invention utilizes a plurality of robotic process automation (RPA) bots to provide cross-technology user access provisioning across multiple applications. Typically, an entity system comprises a plurality of different systems, such as mainframe systems, client applications, web applications, and the like. As such, a user typically must input an access request into several different systems or applications in order to complete a task. By utilizing RPA, the invention is able to provision user access through a single request across all of the systems to which the user must be given access to complete the task. | 2019-05-09 |
20190141126 | METHODS AND SYSTEMS FOR HYBRID SYNCHRONOUS-ASYNCHRONOUS COMMUNICATION IN CONTENT PROVISIONING - Systems and methods for automated content selection and/or distribution are disclosed herein. The system can include a packet selection system including a recommendation engine. The recommendation engine can select a next data packet that can include content for delivery to a user device. The system can include a presentation system including a presenter module. The presenter module can receive an indication of the selected next data packet and send the content for delivery to the user device via an electrical communication. The system can include a response system including a response processor. The response processor can receive a response from the user device, and the response processor can determine whether the received response is a desired response. The system can include a summary model system including model engine, and a messaging bus. | 2019-05-09 |
20190141127 | SYNCHRONIZATION OF COMPONENTS IN HETEROGENEOUS SYSTEMS - A method and system for synchronizing components of heterogeneous systems. A request is made to a host computer for a latest version of a client component pertaining to client code identified in a previously received communication. One or more loadable modules, which include an object representing the client component and are bound with a host component, are located at the host computer. The object is retrieved from the one or more loadable modules and sent to the client computer. A host component binary is built with a set of additional components bound to the host component binary. An encoding generated during compilation of the additional components transforms the client component into the object with an array populated with data of the client component. The object is built during link time into the one or loadable modules tightly bound with the host component binary. | 2019-05-09 |
20190141128 | SCALABLE STORAGE SYSTEM - A large-scale storage system is provided. The large-scale system includes a plurality of compute nodes; a plurality of storage nodes; and a communication fabric for providing a communication infrastructure between the plurality of compute nodes and the plurality of storage nodes; wherein each compute node of the plurality of compute nodes is configured to independently perform at least a storage operation on any of the storage nodes in a persistent manner, and wherein each storage node of the plurality of storage nodes provides physical storage space of the large-scale storage system. | 2019-05-09 |
20190141129 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - An information processing apparatus coupled to a storage device that stores object data including pieces of data, the information processing apparatus including a memory and a processor configured to execute a process including measuring a first acquisition time to acquire data that satisfy an acquisition condition from the storage device on an object-by-object basis, measuring a second acquisition time to acquire the data on a session-by-session basis, determining whether to acquire the data that satisfy the acquisition condition with an object-based acquisition that acquire the data on the object-by-object basis, or with a session-based acquisition that acquire the data on the session-by-session basis based on the first acquisition time and the second acquisition time, and upon a reception of a data acquisition request including the acquisition condition, acquiring the data that satisfy the acquisition condition on from the storage device in accordance with a result of the determining. | 2019-05-09 |
20190141130 | BOOTSTRAPPING A DISPERSED STORAGE NETWORK MEMORY WITH VIRTUAL DS UNITS - A method includes receiving a request to commission a set of storage units for a DSN memory, where the request includes a DSN address range and dispersed data storage parameters that includes a pillar width number, and where the DSN address range is divided into the pillar width number of pillar address sub-ranges. The method continues with identifying storage units of the DSN to associate with the DSN address range to produce the set of storage units. The method continues with determining whether a number of storage units in the set of storage units is less than the pillar width number. When the number of the storage units is less than the pillar width number, the method continues with determining capability level information for each storage unit of the set of storage units and assigning the pillar width number of pillar address sub-ranges to the set of storage units. | 2019-05-09 |
20190141131 | POINT TO POINT BASED BACKEND COMMUNICATION LAYER FOR STORAGE PROCESSING - A storage system is provided. The storage system includes a plurality of storage nodes, each of the plurality of storage nodes having a plurality of storage units with storage memory. The system includes a first network coupling the plurality of storage nodes and a second network coupled to at least a subset of the plurality of storage units of each of the plurality of storage nodes such that one of the plurality of storage units of a first one of the plurality of storage nodes can initiate or relay a command to one of the plurality of storage units of a second one of the plurality of storage nodes via the second network without the command passing through the first network. | 2019-05-09 |
20190141132 | METHOD AND APPARATUS FOR CONTROLLING IOT DEVICES INTERLOCKED WITH VEHICLE - A method and an apparatus for controlling Internet-of-Things (IoT) devices interlocked with a vehicle are disclosed may include confirming first classification information related to a plurality of IoT devices, confirming second classification information related to at least one service to be provided using the plurality of IoT devices, determining reliability of the plurality of IoT devices corresponding to the first classification information and the second classification information, in the case in which data of the same item are transmitted redundantly from the plurality of IoT devices, selecting a value transmitted from an IoT device selected corresponding to the reliability, and transmitting the selected value to a device that performs the at least one service. | 2019-05-09 |
20190141133 | HARDWARE-ACCELERATED PROTOCOL CONVERSION IN AN AUTOMOTIVE GATEWAY CONTROLLER - A network gateway in a vehicle connects heterogeneous networks and buses within the vehicle. The gateway implements hardware acceleration to accomplish protocol translation, e.g., between CAN, LIN, Flexray, and Ethernet buses and networks. In particular, the gateway provides hardware accelerated packet filtering, header lookup, and packet aggregation features. | 2019-05-09 |
20190141134 | METHOD FOR REMOTE SUPPORT OF ELECTRIC DRIVE APPARATUS - The invention relates to electric drive apparatuses used in different industries for different applications more particularly to a method for remote support of an electric drive apparatus. The method comprises: establishing a live support session with virtual drive assistance between a first apparatus and a third apparatus in the remote support site, said first apparatus having a connection with a local electric drive apparatus in a local site, and said third apparatus having a connection to a virtual drive tool for virtual drive assistance; downloading by said third apparatus from said first apparatus parameter settings and other relevant process information of the local electric drive apparatus to said third apparatus; and controlling and/or operating said virtual drive tool by said third apparatus to provide assistance to a user of said first apparatus. | 2019-05-09 |
20190141135 | METHOD AND TERMINAL FOR CONTROLLING INTERNET OF THINGS AND CONTROLLED ELECTRONIC DEVICE - A method for controlling an internet of things comprises: displaying, by a terminal, an interactive page of a controlled device, wherein the interactive page includes an interface interaction element configured to control the controlled device, and the controlled device is assigned a unique communication number; obtaining, by the terminal, a control command inputted by a user via the interface interaction element for controlling the controlled device, wherein the control command comprises the unique communication number; and sending, by the terminal, the control command to the controlled device in accordance with the unique communication number. | 2019-05-09 |
20190141136 | REMOTE CONTROL OF A MOBILE COMMUNICATION DEVICE - According to a first aspect, there is provided a mobile communication device programmable into a slave mode for remote control by a master mobile communication device, the mobile communication device comprising: at least one processor; at least one memory including computer program code; and a communication port coupled to the processor the at least one memory and the computer program code configured to, with the at least one processor, cause the mobile communication device at least to: receive, through the communication port, a signal effected by the master mobile communication device to initialise remote control of the mobile communication device; establish an identity of the master mobile communication device in response to reception of the signal; determine whether the identity is registered in a database containing identities that are authorised to gain remote control of the mobile communication device; detect, upon successful identity determination, whether the signal is paired with an access code granting remote control of the mobile communication device; validate the detected access code; and grant remote control of the mobile communication device to the master mobile communication device after successful validation of the detected access code. | 2019-05-09 |
20190141137 | ACTIVE COMMUNICATION SESSION HANDOVER BETWEEN DIRECT AND RELAYED CONNECTIONS - Methods and apparatus to manage communication sessions to handover between a direct connection at a secondary wireless device and a relayed connection to the secondary wireless device via a primary wireless device. A connection manager of a secondary wireless device can trigger transfer of a communication session based on measurements of performance metrics for the communication session. Upon detection of performance degradation in a local connection or a backhaul connection or both, the connection manager of the secondary wireless device can determine proximity of and/or capabilities for connections of the primary wireless device and instigate transfer of the communication session between different connection types, such as between a direct connection and a relayed connection. The transfer of the communication session can occur without user intervention or in response to input from the user without interrupting or reestablishing the communication session. | 2019-05-09 |
20190141138 | Multiple Device and Multiple Line Connected Home and Home Monitoring - Systems, devices, and techniques for multiple device and multiple line enabled computing devices and computing appliances are described herein. A device number can be assigned to a computing device and can be unique to the computing device. A plurality of alias numbers can be provided to the computing device and enabled for use by the computing device. Alias numbers can be enabled on multiple computing appliances, such that a user can transfer voice or video calls between devices using the alias numbers. Further, monitoring components in a home environment, for example, can be associated with one or more alias number so that security alerts can be provided to the various computing devices and computing appliances associated with the alias numbers. | 2019-05-09 |
20190141139 | SYSTEMS AND METHODS FOR NETWORK CONTROLLED ACCESS OF RESOURCES - The present disclosure is directed to systems and methods for controlling delivery of a resource. An intermediary device may establish a connection to deliver a resource hosted on at least one server to a client using a remoting protocol. The remoting protocol may define one or more channels in the connection for delivering or enabling one or more features of the resource to the client. The device may identify the one or more channels, and may identify the one or more features of the resource. The device may determine a policy for controlling access of the client to at least a first feature of the resource. The device may control access of the client to the first feature by modifying a first channel of the one or more channels according to the determined policy. | 2019-05-09 |
20190141140 | CONTROL OF AN APPLICATION SESSION TO ACCOMMODATE DIFFERENT USERS - According to one embodiment of the present invention, a system comprises at least one processor and controls an application session. The system suspends a first application session of a first user conducted for an application on a computing device. A second application session is established for a second different user from the first application session and conducted on the computing device for the same application. The second application session is associated with a set of conditions for terminating the second application session. The second application session is terminated in response to occurrence of the set of associated conditions. The first application session is resumed in response to termination of the second application session. Embodiments of the present invention further include a method and computer program product for controlling an application session in substantially the same manner described above. | 2019-05-09 |
20190141141 | DYNAMIC DETECTION OF INACTIVE VIRTUAL PRIVATE NETWORK CLIENTS - The present disclosure discloses a method and network device for dynamic detection of inactive virtual private network clients. Specifically, a network device receives periodic messages from a first device at a first interval, and determines a timeout value for the first device based at least on the first interval, at which the periodic messages are received from the first device. Subsequent to determining the timeout value, the network device detects that a message has not been received from the first device for a period of time corresponding to the timeout value for the first device. The network device then terminates at least one connection with the first device responsive to determining that no message has been received from the first device for the period of time corresponding to the timeout value for the first device. | 2019-05-09 |