29th week of 2022 patent applcation highlights part 65 |
Patent application number | Title | Published |
20220231967 | PROVISIONING NETWORK SERVICES IN A SOFTWARE DEFINED DATA CENTER - A novel method for dynamic network service allocation that maps generic services into specific configurations of service resources in a network is provided. An application that is assigned to be performed by computing resources in the network is associated with a set of generic services, and the method maps the set of generic services to the service resources based on the assignment of the application to the computing resources. The mapping of generic services is further based on a level of service that is chosen for the application, where the set of generic services are mapped to different sets of network resources according to different levels of services. | 2022-07-21 |
20220231968 | ARCHITECTURE FOR HIGH PERFORMING DATA PLANE APPLICATIONS WITH SMART NETWORK INTERFACE ON COMPUTE SERVERS - A system for processing data, comprising a compute node having a first processor that is configured to receive a digital data message containing a request for computing services and to allocate processing resources on a network as a function of the request. A smart network interface controller (NIC) having a second processor that is configured to interface with the network and to send and receive data over the network associated with the computing services as a function of one or more policies. The smart NIC configured to receive policy update data and to implement the policy update data and to process the data that is sent and received over the network in accordance with the policy data. | 2022-07-21 |
20220231969 | DYNAMIC NETWORK RESOURCE AVAILABILITY FOR PLANNED EVENTS - Disclosed herein is a method for managing network resources of a communication network. The method includes determining a number of expected users to be physically present at a planned event. The expected users are associated with a network operator. The method also includes adapting an amount of available network resources for the network operator in conjunction with the planned event based on the number of expected users. Also disclosed herein is a computer program product, an apparatus and a control node. | 2022-07-21 |
20220231970 | PROGRAMMABLE VIRTUAL NETWORK INTERFACE CONTROLLER (VNIC) - Example methods and systems for a programmable virtual network interface controller (VNIC) to perform packet processing are described. In one example, the programmable VNIC may modify a packet processing pipeline based on the instruction. The modification may include injecting a second packet processing stage among the multiple first packet processing stages of the packet processing pipeline. In response to detecting an ingress packet that requires processing by the programmable VNIC, the ingress packet may be steered towards the modified packet processing pipeline. The ingress packet may then be processed using the modified packet processing pipeline by performing the second packet processing stage (a) to bypass at least one of the multiple first processing stages, or (b) in addition to the multiple first processing stages. | 2022-07-21 |
20220231971 | PACKET PROCESSING METHOD AND RELATED DEVICES - A packet processing method and related devices are disclosed. The method includes step of slicing and encapsulating a client packet based on a preset slice length, and adding a tag value to each slice, here the tag value is used to identify characteristic information of the client packet in the slice; and then outputting encapsulated slices. | 2022-07-21 |
20220231972 | METHODS AND APPARATUS FOR EXCHANGING ASYNCHRONOUS MESSAGES - The disclosed subject matter relates to a system and method for facilitating automated conversations with users over a network. In some embodiment, a disclosed system includes a computing device operably connected to a database, and is configured to receive a plurality of incoming messages from a first user in an asynchronous manner; and identify a user request associated with the plurality of incoming messages. In these embodiments, the computing device determines that the plurality of incoming messages are all incoming messages that are associated with the user request; processes the plurality of incoming messages together; and generates at least one outgoing message as a response to the user request. | 2022-07-21 |
20220231973 | COMPUTER SERVICE FOR HELP DESK TICKET CREATION AND RESOLUTION IN A COMMUNICATION PLATFORM - Embodiments include a computer implemented method for automatically identifying an issue from a help message received via a chat interface and generating a response for responding to the help message. The method can include receiving one or more response templates that each include a reference to a resource associated with a help topic. The method can also include receiving, from a second user, a help request via the chat interface of a help channel. In response to receiving the help request the method can include parsing the help request to identify a help topic, generating a help desk ticket associated with the help request and generating a response message that includes an information resource associated with the help topic, and sending the response message to the user. In response to the user viewing the information resource and selecting a user interface element, the method can include automatically closing the help desk ticket. | 2022-07-21 |
20220231974 | VISUAL DESIGN OF A CONVERSATIONAL BOT - A visual bot designer displays a user interface that has a visual authoring canvas and a property pane. It can also have a serialized file display pane. A user can provide authoring inputs on any of the user interfaces, and the visual bot designer computing system generates and displays updates on the other parts of the user interface. | 2022-07-21 |
20220231975 | INTERNAL MESSAGE ROUTING SYSTEM AND METHOD - There is provided a system and method for routing messages received from any one of a plurality of external user accounts on any one of a plurality of different messaging applications within an entity. The system and method comprises one or more integration modules coupled to each of the plurality of different messaging applications for receiving messages via the messaging application. These messages are directed to a unique account identifier for the entity using additional address identifier information. A central messaging module is configured to receive from each of the one or more integration modules the messages via a common internal messaging protocol, and distribute the messages to at least one more internal user accounts within the entity using additional address identifier information. | 2022-07-21 |
20220231976 | INTELLIGENT MANAGEMENT OF HERO CARDS THAT DISPLAY CONTEXTUAL INFORMATION AND ACTIONS FOR BACKEND SYSTEMS - Methods and systems are described for intelligently managing hero cards generated for a user profile. In an example, a server can collect user interaction data that measures how a user interacts with system components. The system components can include emails, hero cards, and software applications. The server can analyze the user interaction data to determine whether a new hero card type should be enabled for a user profile, whether an active hero card type should be disabled for the user profile, and whether parameters for action options on hero cards should be changed for the user profile. The server can make changes to hero cards for the user profile so that the user can receive customized hero cards based on the user's behavior. | 2022-07-21 |
20220231977 | INTELLIGENT MANAGEMENT OF HERO CARDS THAT DISPLAY CONTEXTUAL INFORMATION AND ACTIONS FOR BACKEND SYSTEMS - Methods and systems are described for intelligently managing hero cards generated for a user profile. In an example, a server can collect user interaction data that measures how a user interacts with system components. The system components can include emails, hero cards, and software applications. The server can analyze the user interaction data to determine whether a new hero card type should be enabled for a user profile, whether an active hero card type should be disabled for the user profile, and whether parameters for action options on hero cards should be changed for the user profile. The server can make changes to hero cards for the user profile so that the user can receive customized hero cards based on the user's behavior. | 2022-07-21 |
20220231978 | SMART ATTACHMENT OF CLOUD-BASED FILES TO COMMUNICATIONS - Technologies are presented directed to smart attachment of cloud-based files to communications such as email. A communication service may determine and select automatically between local and cloud versions of synchronized files allowing the recipient of the message to receive a version of the file regardless of whether the sender is offline or online when the attachment was made and in a user-friendly manner to the sender through a single representation. | 2022-07-21 |
20220231979 | DEVICE AND METHOD FOR PROVIDING NOTIFICATION MESSAGE RELATED TO CONTENT - Provided are a device and method for providing a notification message related to content. The method includes: recognizing an action related to at least one object in the image content by applying the image content to a first artificial intelligence model for identifying the action of the at least one object; determining target images for identifying the at least one object in the image content; obtaining identification information of the at least one object in the target images by applying the target images to at least one second artificial intelligence model for identifying the at least one object; and generating the notification message describing the image content by applying, to a third artificial intelligence model, an identification value indicating the action and the identification information of the at least one object. | 2022-07-21 |
20220231980 | ENHANCING A SOCIAL MEDIA POST WITH CONTENT THAT IS RELEVANT TO THE AUDIENCE OF THE POST - Systems and methods are described for enhancing a social media post with a content item. An illustrative method includes receiving a social media post; extracting, from the social media post, a first content item; identifying, in a frame of the first content item, a portion of the frame that is a non-focus portion; identifying a plurality of content items that fit within the non-focus portion; identifying a content preference of an audience of the social media post; determining an estimated length of time that the audience will view the social media post; selecting a second content item, from the plurality of content items, that matches the content preference of the audience and has a duration that does not exceed the estimated length of time; generating an enhanced social media post by overlaying the second content item onto the non-focus portion; and generating for display the enhanced social media post. | 2022-07-21 |
20220231981 | NOTIFICATION OUPUT TIMING BASED ON WEIGHTED IMPORTANCE SCORES - According to examples, an apparatus may include a processor and a memory on which may be stored instruction that when executed by the processor, may cause the processor to receive notification of a first type and determine whether other notifications of the first type were previously received. In some examples, a local importance score and a global importance score may be accessed, and based on wether other notifications of the first type were previously received, a weighted local importance score, a weighted global importance score, or both may be determined. In some examples, a weighted importance score may be determined based on the local importance score or the weighted local importance score and the global importance score or the weighted global importance score. In some examples, a timing at which the notification is output may be determined based on whether the weighted importance score is greater than a threshold value. | 2022-07-21 |
20220231982 | METHOD, COMPUTER DEVICE, AND NON-TRANSITORY COMPUTER READABLE RECORD MEDIUM TO DISPLAY CONTENT OF INTEREST - A method, a system, and a non-transitory computer-readable record medium are provided to display content of interest. A content display method may include analyzing a user interest based on a user activity on an application; generating a customized content in response to receiving from a server, information that matches the user interest; and displaying the customized content through an interface related to a specific event when the specific event occurs on the application. | 2022-07-21 |
20220231983 | PRIORITIZING TRANSMISSIONS BASED ON USER ENGAGEMENT - Systems and methods are provided for transmitting events. The systems and methods include operations for: receiving data indicating a level of user engagement with a messaging application for a given user; determining that the level of user engagement is below a specified threshold; prioritizing a plurality of events, associated with the messaging application, for transmission to a client device of the given user in response to determining that the level of user engagement is below the specified threshold; and transmitting a first event of the plurality of events to the client device based on prioritizing the plurality of events. | 2022-07-21 |
20220231984 | SOCIAL PLATFORM WITH ENHANCED PRIVACY AND INTEGRATED CUSTOMIZATION FEATURES - Embodiments provide a social networking platform offering various services, such as, facilitating aggregation and management of a user's interaction on one or more social networking platforms, offering enhanced control over the level of privacy associated with the flow of user data, offering tools to customize the user's exposure to advertisement-related content on the social networking platform(s), integrating features to control aspects of how data/content is presented to and visualized by the user, empowering the user to multicast direct messages to other users without the other users having to meet certain constraints, empowering the user to create and/or join a group based on messaging threads, and the like. One or more of these enhanced services/features are associated with a powerful framework of authentication/permission model for access control. | 2022-07-21 |
20220231985 | CONTEXTUALLY-BASED AUTOMATIC SERVICE OFFERINGS TO USERS OF MACHINE SYSTEM - Disclosed is a Social-Topical Adaptive Networking (STAN) system that can inform users of cross-correlations between currently focused-upon topic or other nodes in a corresponding topic or other data-objects organizing space maintained by the system and various social entities monitored by the system. More specifically, one of the cross-correlations may be as between the top N now-hottest topics being focused-upon by a first social entity and the amounts of focus ‘heat’ that other social entities (e.g., friends and family) are casting on the same topics (or other subregions of other cognitive attention receiving spaces) in a relevant time period. | 2022-07-21 |
20220231986 | EFFICIENT ARP PACKET PROPAGATION - Techniques disclosed herein provide a method for efficiently propagating address resolution reply messages. A first router in a first network receives an address resolution request message from a second router in a second network. The first router generates an entry for the address resolution request message and stores the entry in a pending address resolution requests table. When the first router receives a route advertisement, it extracts a network layer address from the route advertisement and determines whether the pending address resolution requests table includes an entry for the network layer address. If so, the router extracts a link layer address from the route advertisement and generates an address resolution reply message comprising the network layer address and the link layer address. The router then transmits the address resolution reply message to the second router. | 2022-07-21 |
20220231987 | NETWORK ANTI-TAMPERING SYSTEM - A system and method detects or prevents tampering of computer networks by transmitting address messages indicating that unused network addresses are in use. The systems and method handles requests for network resources, such as Address Resolution Protocol (ARP) messages, and provides fabricated information to a potential attacker to disrupt an attack on an information system. | 2022-07-21 |
20220231988 | STABLE MAC ADDRESS CHANGE PROCESS - A method includes linking, at an access node, a first media control access (MAC) address of a device to an identifier of the device to establish a communication session between the access node and the device and during the communication session, receiving, at the access node, an indication of a change of the first MAC address to a second MAC address. The method also includes linking, at the access node, the second MAC address to the first MAC address and the identifier and receiving, at the access node, a communication from the device using the second MAC address while maintaining the communication session. | 2022-07-21 |
20220231989 | HARDWARE ADDRESS CONSISTENCY MANAGEMENT - A VPN tunnel interface is instantiated within a router based on a tunnel network namespace. One or more virtual peers corresponding to the VPN tunnel interface and one or more virtual ethernet interfaces corresponding to the one or more virtual peers are instantiated. The tunnel network namespace is configured to route, based on a source address, network traffic from a specified client device to a specified virtual peer of the one or more virtual peers via the VPN tunnel interface. A connection is established between a client device and a VPN process of the router and a traffic flow is transported to and from the client device through a VPN tunnel via the VPN tunnel interface, the one or more virtual peers, and the one or more virtual ethernet interfaces. | 2022-07-21 |
20220231990 | INTRA-LAN NETWORK DEVICE ISOLATION - A private network device such as a security device is inserted in a local network and is operable to isolate networked devices on the local network. The networked security device uses Internet Protocol spoofing to intercept network traffic between at least two networked devices on the same local network as the networked security device, and selectively blocks intercepted network traffic between the at least two networked devices on the local network. | 2022-07-21 |
20220231991 | METHOD, SYSTEM AND APPARATUS FOR INLINE DECRYPTION ANALYSIS AND DETECTION - The disclosure generally relates method, system and apparatus to expedite processing of packet data through a network endpoint. In one embodiment, the disclosure relates to an Inline Security Engine (ISE) which may be deployed at network's edge, for example, at a network interface card or a network adaptor. The exemplary ISE may be configured to receive and analyze packets traversing through the endpoint device for compliance with the encryption protocols and other network requirements. Additionally, the ISE may implement steps to increase security of the data if the analysis suggests that the encryption may be weak or faulty or if certain predefined security rules are violated. All processes are implemented inline and at line speed without diminishing the data rate. | 2022-07-21 |
20220231992 | SYSTEM AND METHOD FOR DETECTING FORBIDDEN NETWORK ACCESSES BASED ON ZONE CONNECTIVITY MAPPING - A system for automating identifications of forbidden network connections is configured to create a network connectivity matrix comprising allowability indications indicating whether establishing network connections between network zones are allowed or forbidden. The system determines whether there is any network connection between devices connected to a firewall device that violates a corresponding allowability indication in the network connectivity matrix. In response to determining at least one network connection between different devices that violates the corresponding allowability indication, the system determines that the at least one network connection is a forbidden network connection. | 2022-07-21 |
20220231993 | SECURITY ASSOCIATION BUNDLING FOR AN INTERFACE - A method for IPSec communication between a source machine and a destination machine is provided. The method includes receiving, at the destination machine, first and second packets from the source machine through first and second VPN tunnels established between a first VTI of the source machine and a second VTI of the destination machine; determining the first packet corresponds to a first SA and the second packet corresponds to a second SA; processing, by a first processing core, the first packet based on the first SA, and processing, by a second processing core, the second packet based on the second SA; and updating, at the second VTI, states of one or more flows based on the first and second packets, the second VTI providing one or more stateful services for the one or more packet flows based on the one or more states. | 2022-07-21 |
20220231994 | SECURE MESSAGE INCLUDING A VEHICLE PRIVATE KEY - An example apparatus comprises a memory resource configured to store a private key associated with a vehicle and store a data matrix comprising data corresponding to operation of the vehicle. The apparatus may further include a processing resource configured to generate a first secure message comprising data corresponding to the vehicle, transmit the first secure message, receive a second secure message comprising an updated data matrix, and update the data matrix based, at least in part, on the updated data matrix. | 2022-07-21 |
20220231995 | SECURED COMMUNICATION FROM WITHIN NON-VOLATILE MEMORY DEVICE - An apparatus includes a non-volatile memory (NVM) device coupled to a host, the NVM device including a processing device to: receive a communication packet from a server via the host computing system that is coupled to the NVM device and communicatively coupled to the server, the communication packet comprising clear text data that requests to initiate secure communications; perform a secure handshake with the server, via communication through the host computing system, using a secure protocol that generates a session key; receive data, via the host computing system, from the server within a secure protocol packet, wherein the data is inaccessible to the host computing system; authenticate the data using secure protocol metadata of the secure protocol packet; optionally decrypt, using the session key, the data to generate plaintext data; and store the plaintext data in NVM storage elements of the NVM device. | 2022-07-21 |
20220231996 | SOURCING INFORMATION FOR A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK - The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly. | 2022-07-21 |
20220231997 | SETTING DEVICE, COMMUNICATION SYSTEM, AND VEHICLE COMMUNICATION MANAGEMENT METHOD - A network having a new configuration is flexibly constructed through a simple process while ensuring security in the network. A setting device includes: an acquisition unit configured to acquire an authentication result regarding a new function unit serving as a function unit newly added to an in-vehicle network including one or a plurality of function units; and a setting unit configured to, when the authentication result acquired by the acquisition unit is affirmative, perform a setting process for allowing the new function unit and an existing function unit serving as a function unit included in the in-vehicle network before the new function unit is added thereto, to perform communication via a plurality of relay devices capable of relaying information between the function units, the setting process being regarding at least one of the relay devices, the existing function unit, and the new function unit. | 2022-07-21 |
20220231998 | DIRECTORY SERVICE USER SYNCHRONIZATION - Disclosed are various examples for enrolling a client device and synchronizing user attributes for the client device across multiple directory services. A search request for user attributes can be sent to a first directory service with an identifier for a user account. The first directory service can query for the identifier and send back user attributes. If a global identifier is included in the attributes, another search request for user attributes can be sent to a second directory service with the global identifier. The second directory service can query for the global identifier and send back user attributes. | 2022-07-21 |
20220231999 | ENABLING A MODE OF INTERACTION TO SUPPORT SPECIALLY-ABLED NEEDS OF AGENTS, VIA A WEB APP IN A CONTACT CENTER - A computerized-method for enabling a mode of interaction to support specially-abled needs of agents, via a web-app, in a contact-center, is provided herein. The computerized-method is operating an Application Programming Interface (API) client. The API-client includes receiving credentials from a user, upon login of the user to the web-app and then communicating with an authentication-server for an authentication-service and forwarding the credentials thereto. After successful completion, forwarding the credentials to an authorization-service that is retrieving a preassigned disability role-ID, according to the credentials and transmitting a preassigned disability role-ID in an access-token. The API-client receives the access-token, having the preassigned disability role-ID and sends the access-token to the authorization-service, to receive a permissions-list, according to the preassigned disability role-ID of the user and then stores the permissions-list of the user on a database associated with the API-Client and loads a component to support specially-abled needs, according to the stored permissions-list. | 2022-07-21 |
20220232000 | SECURE COMMUNICATION SYSTEM - A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network. | 2022-07-21 |
20220232001 | APPARATUS AND METHOD FOR AUTOMATED EMAIL AND PASSWORD CREATION AND CURATION ACROSS MULTIPLE WEBSITES - One or more first servers can implement an example method including storing, at a memory accessible by the first one or more servers, a primary email address for a user. The method further includes detecting a request, from a client device associated with the user, to access a network resource hosted at a second one or more servers, wherein the network resource is associated with an online service. The method also includes automatically generating a secondary email address for the user that is unique to the online service; and transmitting the secondary email address to the second one or more servers such that the online service receives the secondary email address for the user without receiving the primary email address for the user, thereby enabling the online service to transmit emails to the user despite not receiving the primary email address for the user. | 2022-07-21 |
20220232002 | System, Method, and Apparatus for Authenticating a User Device - Provided is a method, system, and apparatus for authenticating a user device. The method includes registering a device identifier with at least one transformation rule, receiving a request for authentication comprising a device identifier associated with a user device, obtaining a one-time password (OTP) in response to receiving the request, communicating the OTP to the user device, receiving a transformed OTP from the user device, and authenticating the user device based on the OTP, the transformed OTP, and the at least one transformation rule. | 2022-07-21 |
20220232003 | LIMITING SCOPES IN TOKEN-BASED AUTHORIZATION SYSTEMS - Access token scope limiting is provided. An access token of a client containing a list of scopes is presented to an authorization application programming interface of the computer. Each scope in the list of scopes defines a permission to access a particular protected resource hosted by a resource server. A new access token is returned to the client containing a decreased number of scopes using a scope alias in response to the authorization application programming interface requesting a decrease in a number of scopes in the list of scopes. The scope alias representing a plurality of specific scopes from the list of scopes contained in the presented access token. | 2022-07-21 |
20220232004 | VIRTUAL SESSION ACCESS MANAGEMENT - Methods and systems are described for managing access to a virtual session. A user device can send a request for a virtual session to a virtual desktop interface (“VDI”) server. The VDI server can send details of a user's account to a management server. The management server can send a machine learning (“ML”) model trained to identify the user's face to the user device. The user device can apply the ML model to a video feed of the viewing area of the user device to verify the user's face. The VDI server can initialize the virtual session if the user's face is verified. The user device can monitor the video feed during the virtual session to detect unauthorized objects. If an unauthorized object is detected, the user device can terminate or minimize the session. | 2022-07-21 |
20220232005 | INFORMATION PROCESSING APPARATUS, METHOD, AND COMPUTER READABLE MEDIUM - An information processing apparatus, configured to function as a FIDO client, includes: a memory configured to store authentication device information indicating an authentication device usable in FIDO authentication using the information processing apparatus; and a processor configured to acquire the authentication device information from an authentication device information management server to present the authentication device information to an administrator, cause the memory to store the authentication device information indicating an authentication device that is selected by the administrator as being connectable to the information processing apparatus, and, in response to an authentication start request from a user for FIDO authentication, in a case where an authentication device used by the user is not included in the authentication device indicated by the authentication device information stored in the memory, restrict use of an authentication device used by the user. | 2022-07-21 |
20220232006 | CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION - A system for contextual and risk-based multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network's traffic data and to serve the traffic data to other modules and a directed computation graph module configured to receive network traffic data from the multi-dimensional time series data server, determine a network traffic baseline from the network traffic data, and determine a verification score needed before granting access based at least in part by the network traffic baseline. A plurality of verification methods build up a user's verification score to required level to gain access. | 2022-07-21 |
20220232007 | METHODS AND SYSTEMS FOR TRUSTED WEB AUTHENTICATION - An identification method which comprises providing at least one database storing, for each of a plurality of users, user data comprising biometric data representative of biometric features of the user, user identification data comprising at least one or more usernames and passwords, each username and password being associated with a website, the method comprising, by at least one processing unit, obtaining biometric data representative of biometric features of a candidate user attempting to be identified by a given website, searching, in the database, biometric data matching the biometric data of the candidate user according to a matching criterion, and sending to the given web site at least a password stored for the candidate user in the database and associated with the given website, wherein the password is encrypted using an encryption mechanism which allows decryption of the password only by the given website. | 2022-07-21 |
20220232008 | TECHNIQUES FOR REDUNDANT ACCESS RULE MANAGEMENT - Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis. | 2022-07-21 |
20220232009 | SECURE TRANSFER USING MEDIA ACCESS CONTROL SECURITY (MACSEC) KEY AGREEMENT (MKA) - A key server device obtains authorization information of a user associated with an intelligent electronic device (TED). The key server communicates the authorization information to the TED, via a Media Access Control Security (MACsec) Key Agreement (MKA) protocol to allow the TED to authenticate the user. The key server receives one or more commands from the user. The key server communicates the one or more commands to the TED to allow the TED to perform operations based on the one or more commands. | 2022-07-21 |
20220232010 | PROTECTED RESOURCE AUTHORIZATION USING AUTOGENERATED ALIASES - Database systems and methods are provided for authorizing access to a protected resource. One method involves an authorization service automatically assigning a unique alias to a web application and thereafter receiving a request for access to a protected resource on behalf of a user of the web application. In response to the request, the authorization service generates a graphical user interface (GUI) display including a graphical representation of the unique alias automatically assigned to the web application at a client device associated with the user, and thereafter in response to user selection of a GUI element of the GUI display to authorize access, the authorization service obtains an access token associated with the user and the protected resource and transmits the access token to the web application. | 2022-07-21 |
20220232011 | TECHNOLOGIES FOR ENABLING PERSONAL COMMUNICATIONS - This disclosure discloses various computing technologies that enable a user to make calls from someone else's mobile device (e.g., mobile phone, smartphone, tablet, laptop, wearable) that is running a mobile application that is programmed for such actions. | 2022-07-21 |
20220232012 | Methods and Systems for Virtual File Storage and Encryption - The present invention discloses an intelligent cloud server for cloud storage information management and encryption. In some embodiments, the intelligent cloud server can save and store documents without the need of first saving them in a local drive for upload. Upon storage, the document can be scanned and classified in a security level according to pre-determined settings and parameters. In some embodiments, depending on the classification, the system can encrypt portions of the document in order to facilitate the sharing and access of information in a secure way. Encryption keys and access to the encrypted portions are only provided upon authentication of the user, network, and/or need, according to corresponding protocols for the information. | 2022-07-21 |
20220232013 | DELAYED AND PROVISIONAL USER AUTHENTICATION FOR MEDICAL DEVICES - Representative embodiments of operating a secured device requiring user authentication include receiving a request from a user for operating the device without prior authentication; granting the user temporary access to the device in accordance with a security policy that specifies a predetermined time interval and/or a predetermined number of device operations within which authentication must occur to continue at least some operations of the device; computationally storing an audit trail identifying the temporary access and actions performed during the temporary access; and upon determining that authentication has not been provided within the predetermined time interval or number of device operations, preventing at least some operations of the device and updating the audit trail to specify expiration of the temporary access. | 2022-07-21 |
20220232014 | VEHICLE COMMUNICATION METHOD, APPARATUS, STORAGE MEDIUM AND PROGRAM PRODUCT - The present disclosure provides a vehicle communication method, apparatus, storage medium and program product, which relates to the field of artificial intelligence. The method includes: acquiring first root verification information and a first download address corresponding to a first area, and second root verification information and a second download address corresponding to a vehicle; downloading first sub-verification information corresponding to the first area according to the first download address, where the first root verification information is used to verify correctness of the first sub-verification information; downloading second sub-verification information corresponding to the vehicle according to the second download address, where the second root verification information is used to verify correctness of the second sub-verification information; communicating with a communication device within the first area according to the first root verification information, the first sub-verification information, the second root verification information and the second sub-verification information. | 2022-07-21 |
20220232015 | PREVENTING CLOUD-BASED PHISHING ATTACKS USING SHARED DOCUMENTS WITH MALICIOUS LINKS - The technology disclosed prevents phishing attacks where a malicious attacker creates a malicious file in a cloud-based store and shares it with endpoint users. A user, opening the shared document, is redirected to a malicious website where a corporation's critical data may be compromised. The cloud-based method applies a set of rules and policies to allow the shared document or block the shared document from the network, based on identifying the ownership or originator of the shared document. Documents from blacklisted websites are blocked. Documents from trusted sources are allowed access to the network. Unknown documents are blocked and threat-scanned to determine if they contain malicious content. If analysis proves a blocked document to be safe, it may be released into the network along with subsequent documents having the same ownership or originator. | 2022-07-21 |
20220232016 | ARTIFICIAL INTELLIGENCE VULNERABILITY COLLATION - Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives. | 2022-07-21 |
20220232017 | ARTIFICIAL INTELLIGENCE REVERSE VENDOR COLLATION - Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives. | 2022-07-21 |
20220232018 | ARTIFICIAL INTELLIGENCE CORROBORATION OF VENDOR OUTPUTS - Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives. | 2022-07-21 |
20220232019 | Command and Control Steganographic Communications Detection Engine - A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware. | 2022-07-21 |
20220232020 | APPLICATION SECURITY ENFORCEMENT - Example methods and systems for application security enforcement are described. In one example, a computer system may detect, from a client device, a packet requiring processing by a first server pool; and determine whether the packet is associated with a security attack. In response to determination that the packet is not associated with the security attack, the packet may be steered towards the first server pool to cause processing of the packet by one of multiple first application servers. Otherwise, the packet may be steered towards a second server pool to cause processing of the packet by one of multiple second application servers and to learn attack information associated with the security attack. The multiple second application servers in the second server pool may be capable of mimicking behavior of the multiple first application servers in the first server pool. | 2022-07-21 |
20220232021 | COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS - A computer-implemented method includes: collecting transaction data concerning a specific virtual currency address from a blockchain; decrypting address information based on transaction details specified in the collected transaction data; collecting threat information concerning the address information based on the decrypted address information; and detecting a change in an attack scheme of a cyberattack using the virtual currency address, based on a time-series change in at least one item included in the transaction details specified in the collected transaction data and the collected threat information. | 2022-07-21 |
20220232022 | METHOD AND SYSTEM FOR DETECTING INTRUSION IN A VEHICLE SYSTEM - Methods and systems of improving security of a computing system having a network of embedded devices are disclosed. The method includes starting a timer of a predetermined length of time, obtaining an expected number of cyclic messages to be received within the predetermined length of time, incrementing a message counter each time a cyclic message is received within the predetermined length of time, incrementing a set counter in response to an actual number of cyclic messages received by the end of the predetermined length of time exceeding the expected number of cyclic messages to be received by a first threshold value, and detecting an intrusion in the system in response to the set counter exceeding a second threshold value by the end of the predetermined length of time. | 2022-07-21 |
20220232023 | TECHNIQUES FOR SECURING COMPUTING INTERFACES - A system and method for identifying computing interface calls using communications protocols. A method includes extracting data from a communications session involving communication between a first computing interface and a second computing interface, wherein the communication between the first computing interface and the second computing interface is implemented via a plurality of communication protocol layers, wherein extracting the data from the communications session further comprises building at least one layer of the plurality of communication protocol layers based on a portion of the data extracted from at least one other layer of the plurality of communication protocol layers; duplicating traffic for the communications session based on the extracted data, wherein duplicating the traffic further comprises converting the extracted data into a unified data modeling format; and identifying at least one computing interface call based on the duplicated traffic. | 2022-07-21 |
20220232024 | DETECTING DEVIATIONS FROM TYPICAL USER BEHAVIOR - Detecting deviations from typical user behavior, including: identifying a geographic location of a device that is associated with a user; determining device activity associated with the user; and detecting, based on a profile associated with the user, that the device activity associated with the user deviates from normal activity for the user. | 2022-07-21 |
20220232025 | DETECTING ANOMALOUS BEHAVIOR OF A DEVICE - Detecting anomalous behavior of a device, including: generating, using information describing historical activity associated with a user device, a trained model for detecting normal activity for the user device; gathering information describing current activity associated with the user device; and determining, by using the information describing current activity associated with the user device as input to the trained model, whether the user device has deviated from normal activity. | 2022-07-21 |
20220232026 | INTRUSION DETECTION SYSTEM ENRICHMENT BASED ON SYSTEM LIFECYCLE - Techniques are described for automatically incorporating lifecycle information for a secured environment (SE) into an intrusion detection system monitoring the secured environment's operations. In one example, a secured environment including at least one component is monitored, where the secured environment is associated with a lifecycle operations manager (LOM) responsible for managing lifecycle operations associated with at least one component in the SE. One or more log files associated with operations of each of the at least one components are obtained, along with log files associated with lifecycle operations executed by the LOM. A determination is made as to whether the particular activities documented in the log files indicate a violation of at least one malicious action rule. In response to determining that the log files are associated with a malicious action rule, a mitigation action associated with the violation is triggered. | 2022-07-21 |
20220232027 | Rule-Based Network-Threat Detection - A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination. The packet-filtering device may generate a log entry comprising information from the packet-filtering rule that identifies the one or more network-threat indicators and indicating whether the packet-filtering device prevented the packet from continuing toward its destination or allowed the packet to continue toward its destination. | 2022-07-21 |
20220232028 | Rule-Based Network-Threat Detection - A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination. The packet-filtering device may generate a log entry comprising information from the packet-filtering rule that identifies the one or more network-threat indicators and indicating whether the packet-filtering device prevented the packet from continuing toward its destination or allowed the packet to continue toward its destination. | 2022-07-21 |
20220232029 | SYSTEMS AND METHODS FOR MACHINE LEARNING-BASED DIGITAL CONTENT CLUSTERING, DIGITAL CONTENT THREAT DETECTION, AND DIGITAL CONTENT THREAT REMEDIATION IN MACHINE LEARNING-BASED DIGITAL THREAT MITIGATION PLATFORM - A machine learning-based system and method for content clustering and content threat assessment includes generating embedding values for each piece of content of corpora of content data; implementing unsupervised machine learning models that: receive model input comprising the embeddings values of each piece of content of the corpora of content data; and predict distinct clusters of content data based on the embeddings values of the corpora of content data; assessing the distinct clusters of content data; associating metadata with each piece of content defining a member in each of the distinct clusters of content data based on the assessment, wherein the associating the metadata includes attributing to each piece of content within the clusters of content data a classification label of one of digital abuse/digital fraud and not digital abuse/digital fraud; and identifying members or content clusters having digital fraud/digital abuse based on querying the distinct clusters of content data. | 2022-07-21 |
20220232030 | ARTIFICIAL INTELLIGENCE VENDOR SIMILARITY COLLATION - Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives. | 2022-07-21 |
20220232031 | METHOD AND SYSTEM FOR EVALUATING CYBER SECURITY RISKS - Systems and methods described herein provide a cyber risk assessment service. A computing device determines weights for techniques of a cyber security framework based on historical industry impact. The computing device associates an enterprise network with an industry identifier, obtains customer risk data for the enterprise network, and normalizes and/or combines the customer risk data to form normalized risk scores. The computing device maps the customer risk data to corresponding techniques in the cyber security framework, generates technique scores based on the mapping and the normalized risk scores, and generates weighted technique scores using some of the weights selected based on the industry identifier. The computing device calculates an overall security score for the enterprise network based on the weighted technique scores, identifies a corrective recommendation for the overall security score, and provides the overall security score and the corrective recommendation for presentation to a user. | 2022-07-21 |
20220232032 | PERFORMING CYBERSECURITY OPERATIONS BASED ON IMPACT SCORES OF COMPUTING EVENTS OVER A ROLLING TIME INTERVAL - The disclosure herein describes automatically performing security operations associated with a client system based on aggregated event impact scores of computing events during a rolling time interval. Event data is obtained, wherein the event data is from a plurality of computing devices of the client system associated with computing events occurring during a time interval after an endpoint of the rolling time interval. Event impact scores are calculated for the computing events of the obtained event data over the time interval based at least on cardinality estimation. The calculated event impact scores are merged into the set of aggregated event impact scores associated with the rolling time interval and event impact scores associated with an expired time interval are removed from the set of aggregated event impact scores. Based on the set of aggregated event impact scores, at least one security operation is performed for at least one computing event. | 2022-07-21 |
20220232033 | METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKS - Methods and systems for generating stateful attacks for simulating and testing security infrastructure readiness. Attack templates descriptive of a plurality of attacks to be executed against one or more targets are defined. The attack templates are processed to compile a decision tree by traversing through a list of attack templates to create a logical tree with tree branches representing different execution paths through which attacks may be executed against the targets. During attack simulations and/or testing, single and/or multi-stage attacks are executed against targets, wherein attack sequences are dynamically determined using the execution paths in the decision tree in view of real-time results. The attacks may be executed against various types of targets, including target in existing security infrastructures and simulated targets. Moreover, the attacks may originate from computer systems within security infrastructures or remotely using computer systems external to the security infrastructures. | 2022-07-21 |
20220232034 | IDENTIFYING AND USING DNS CONTEXTUAL FLOWS - In one embodiment, a device in a network captures domain name system (DNS) response data from a DNS response sent by a DNS service to a client in the network. The device captures session data for an encrypted session of the client. The device makes a determination that the encrypted session is malicious by using the captured DNS response data and the captured session data as input to a machine learning-based or rule-based classifier. The device performs a mediation action in response to the determination that the encrypted session is malicious. | 2022-07-21 |
20220232035 | SYSTEM AND METHOD FOR GENERATING AND IMPLEMENTING A REAL-TIME MULTI-FACTOR AUTHENTICATION POLICY ACROSS MULTIPLE CHANNELS - Systems and methods for generating and implementing a real-time multi-factor authentication policy across multiple channels, are configured to: during a pre-authentication stage: receive, via a user interface, information defining one or more scenarios; receive, via the user interface, information defining one or more authentication flows; for each of the one or more scenarios, map one of the one or more authentication flows to a given scenario; and generate a multi-factor authentication policy associated with each of the one or more scenarios; and during a real-time authentication stage: upon receiving an interaction, identify, by a decision engine, a relevant scenario of the one or more scenarios; implement, by the decision engine, the multi-factor authentication policy associated with the relevant scenario; and determine, by the decision engine, an authentication result. | 2022-07-21 |
20220232036 | SYSTEMS AND METHODS FOR PROVIDING SOCIAL ENGINEERING AND MALWARE ALERTS - Systems and methods for providing social engineering and malware alerts are disclosed. According to one embodiment, a method for providing in-application alerts may include: (1) receiving, at a computer program and from an operating system executed by a user electronic device, a notification that a message was received by the user electronic device and a caller ID for the message and/or a message sender identifier; (2) comparing, by the computer program, the caller ID for the message and/or the message sender identifier to data in one or more database; (3) determining, by the computer program, that the message is suspicious based on the comparison; (4) identifying, by the computer program, an activity being conducted using the user electronic device within a predetermined period of time from receipt of the message; and (5) issuing, by the computer program, a warning that the activity may be suspicious. | 2022-07-21 |
20220232037 | AGGREGATED NETWORKING SUBSYSTEM STATION MOVE CONTROL SYSTEM - An aggregated networking device subsystem station move control system includes first and second aggregated networking devices connected via an ICL. The first aggregated networking device receives a MAC address from the second aggregated networking device that was learned on an orphan port that has port security enabled and a station-move-deny configuration, and generates a static MAC address entry in its MAC address table that associates the MAC address with the ICL. The static MAC address entry causes data packets received on non-ICL ports on the first aggregated networking device that include the MAC address to generate a static MAC move violation. The first aggregated networking device also programs rule(s) that, in response to data packets being received on its non-ICL ports that have port security disabled and generating a static MAC move violation, causes the association of the MAC address with that non-ICL port. | 2022-07-21 |
20220232038 | Web Conference Security - There is disclosed, by way of example, a computing apparatus, including a hardware platform having a processor and a memory; and instructions encoded within the memory to instruct the processor to provide access to a web conference; determine that an object has been shared via the web conference; determine a reputation for the object; and according to the reputation, modify a conference experience for at least one participant of the web conference | 2022-07-21 |
20220232039 | Wireless Network Service Interfaces - A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple wireless networks that may have different service plan activation or service plan purchase processes. Network detection of service usage anomalies based on device-based data usage reports is provided to enable the network to determine whether an end-user device is likely operating in accordance with the established policy, or whether the end-user device may be operating fraudulently. | 2022-07-21 |
20220232040 | ADVANCED CYBERSECURITY THREAT MITIGATION USING SOFTWARE SUPPLY CHAIN ANALYSIS - A system and method for comprehensive cybersecurity threat assessment of software applications based on the totality of vulnerabilities from all levels of the software supply chain. The system and method comprising analyzing the code and/or operation of a software application to determine components comprising the software, identifying the source of such components, determining vulnerabilities associated with those components, compiling a list of such components, creating a directed graph of relationships between the components and their sources, and evaluating the overall threat associated with the software application based its software supply chain vulnerabilities. | 2022-07-21 |
20220232041 | ESTABLISHING A TRUSTED PATH AND TRANSMITTING INFORMATION VIA A NETWORK OF UNTRUSTED ELEMENTS - An overlay to existing infrastructure that establishes trusted paths in a communication network to fulfill a fundamental need to identify and protect a trusted plane of devices and/or applications on a need specific basis is described. Establishing trusted paths operationally fulfills a fundamental need to identify and protect a trusted plane of devices and/or applications on a need specific basis as an overlay to the existing relatively unsecured network. | 2022-07-21 |
20220232042 | SYSTEM AND METHOD FOR CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS - A system and method for cybersecurity reconnaissance, analysis, and scoring that uses distributed, cloud-based computing services to provide sufficient scalability for analysis of enterprise IT networks using only publicly available characterizations. The system and method comprise an in-memory associative array which manages a queue of vulnerability search tasks through a public-facing proxy network. The public-facing proxy network has search nodes configurable to present the network to search tools in a desired manner to control certain aspects of the search to obtain the desired results. A distributed data processing engine and cloud-based storage are used to provide scalable computing power and storage. A data packet modifier is used to reveal the IP address of a threat actor behind a port scan and subsequently block the threat actor. Each of the cloud-based computing services is containerized and orchestrated for management and efficient scaling purposes. | 2022-07-21 |
20220232043 | APPLYING APPLICATION LAYER POLICY TO TRANSPORT LAYER SECURITY REQUESTS SYSTEMS AND METHODS - Systems and methods for applying an application layer policy to a transport layer security request are provided. A device, intermediary to one or more clients and one or more servers, can receive a transport layer security (TLS) request to establish a TLS connection between a client of the one or more clients and a server of the one or more servers. The TLS request can include an application layer request to a resource of the server. The device can apply an application layer policy to the application layer request of the TLS request. The device can determine, responsive to applying the application layer policy, whether to one of accept or reject at least the application layer request of the TLS request. | 2022-07-21 |
20220232044 | ELECTRONIC ACCESS CONTROL SYSTEM - Systems and methods for providing controlled access to a system by a user device include receiving, from a user device, a request including a current context. The method includes receiving a request for access to a computing resource, the request including a current context, the current context defining a user space and a resource space. The user device evaluates the current context against a security policy. The user device determines that the user device is permitted to access the computing resource based on the request in response to the evaluating the current context against the security policy. In response to determining that the user device is permitted to access the computing resource, accessing the computing resource as requested. | 2022-07-21 |
20220232045 | CUSTOMIZABLE CERTIFICATE VALIDATION POLICY - Specifications of digital certificate validation security policies for a server within an intranet environment are received. A first one of the policies is specified to be applied for an intranet network connection and a second for a network connection outside the intranet. Each of the first and second policies includes a plurality of different configurable individual settings to enable or disable corresponding individual components of a plurality of different component digital certificate validation checks. A determination is made to establish a connection with a network destination and a digital certificate from the destination is received. One of the policies to apply for the connection is identified. For each of the plurality of the different component checks, a determination is made based on the identified policy whether to perform the component check for the received certificate. Any of the plurality of the different component checks determined to be performed are performed. | 2022-07-21 |
20220232046 | 5G SYSTEM (5GS) FAILURE DETECTION MONITORING OF PROXY - CALL SESSION CONTROL FUNCTION (P-CSCF) OF AN INTERNET PROTOCOL (IP) MULTIMEDIA SYSTEM (IMS) FOR EFFICIENT RESTORATION OF IMS SERVICE - Techniques and mechanisms for Fifth Generation (5G) system (5GS) failure detection monitoring of an application or control function in a network for efficient restoration of service are described. The network may be an Internet Protocol (IP) Multimedia Subsystem (IMS) network, and the voice or data service may be an IMS service that utilizes Session Initiation Protocol (SIP) signaling. The application or control function may be a Proxy-Call Session Control Function (P-CSCF) of the IMS network. In some implementations, the procedure may involve a session management function (SMF) programming of a user plane function (UPF) for UPF monitoring of the P-CSCF, using a ping procedure or health check procedure (e.g. for 3GPP Pre-Release 16). In other implementations, the procedure may involve the SMF monitoring of a P-CSCF via a Network Function (NF) Repository Function (NRF) (e.g. for 3GPP Release 16). | 2022-07-21 |
20220232047 | SYSTEM AND METHOD FOR DETERMINING ESTABLISHMENT CAUSES FOR EMERGENCY SESSIONS - A method for initiating a Packet Switched emergency call using a user equipment (UE) is presented. The UE includes a plurality of protocol layers. The plurality of protocol layers including an IMS sublayer, a non-access stratum (NAS) layer and an access stratum (AS) layer. The method includes generating an ATTACH REQUEST using the UE. The ATTACH REQUEST has an attach type. The method includes retrieving the attach type of the ATTACH REQUEST using the NAS layer of the UE, and generating an RRC CONNECTION REQUEST. The RRC CONNECTION REQUEST includes an RRC establishment cause based upon the attach type of the attach request. | 2022-07-21 |
20220232048 | SYSTEM, METHOD, AND APPARATUS FOR IP-BASED RADIO COMMUNICATIONS - System, method, and apparatus for Internet Protocol (IP) based radio communications. One or more browser-based dispatch consoles connect to one or more Radio over IP (RoIP) gateway device over an untrusted network (e.g., the public Internet) using a Web Real-Time Communication (WebRTC) connection secured with SSL/TLS. Each RoIP gateway device provides an analog interface to the radio domain so as to communicate with one or more radio. This architecture avoids any ongoing connection to a centralized cloud-based server and maintains secure radio communications over the untrusted network. Each browser-based dispatch console accesses each RoIP gateway device from a standard web browser thus enabling portability across any platform that supports a browser. | 2022-07-21 |
20220232049 | NETWORK NODE, IMS NODE AND METHODS IN A COMMUNICATIONS NETWORK - A method performed by a network node, for handling an outgoing call from a first user in a communications network. The network node receives a request for the outgoing call to be set up via a first persona out of multiple personas associated with the first user, which request is obtained as a voice instruction from the first user via a Digital Assistant device. The voice instruction comprises a personalized name associated with the first persona of the first user. The network node identifies among the multiple personas associated with the first user, an Internet Protocol Multimedia Subsystem (IMS) user ID corresponding to the first persona based on the personalized name received in the voice instruction. The network node sends to an IMS node in the communications network, the identified IMS user ID, and a request to initiate the outgoing call via the first persona of the first user. | 2022-07-21 |
20220232050 | RELAY SERVER, RELAY METHOD AND RELAY PROGRAM - A relay server | 2022-07-21 |
20220232051 | METHOD AND APPARATUS FOR RESTORATION OF PROXY CALL SESSION CONTROL FUNCTION - Embodiments of the present disclosure relate to a method and an apparatus for a restoration of a proxy call session control function, P-CSCF. A first aspect of the present disclosure provides a method performed at a data management node, comprising: determining whether a local policy of the data management node allows to select a session management node for a restoration of a P-CSCF, to provide an IMS service for a terminal device; and selecting the session management node for the restoration of the P-CSCF, if the local policy allows to select the session management node. | 2022-07-21 |
20220232052 | RELAY DEVICE FOR CALL PROCESSING, CALL PROCESSING METHOD PERFORMED BY RELAY DEVICE, AND RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING CALL PROCESSING METHOD IS RECORDED - A relay device for call processing according to an embodiment may include: a database; a protocol relay unit; a call processing unit for checking whether a sender and recipient of a call are subscribers stored in the database, on the basis of an income SIP signal through the protocol relay unit, and providing the income SIP signal to an external call routing server when the sender of the call is the subscriber and the recipient of the call is not the subscriber; and a packet processing unit for rearranging incoming call packets of the call according to the sequence of the call packets and adjusting transmission speed of the rearranged call packets according to the situation in which the call packets are incoming. | 2022-07-21 |
20220232053 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR OPTIMIZED INTER-SESSION BORDER CONTROLLER (SBC) ATTENDED CALL TRANSFER WITH RE-USE OF TRANSFER TARGET SESSION - A first SBC establishes a first media session between a transferor and a transferee. A second SBC establishes a second media session between the transferor and a transfer target. The first SBC receives a REFER message initiated by the transferor and determines that a dialog ID in the REFER message does not correspond to a media session currently being handled by the first SBC. The first SBC sends a SIP INVITE message to a plurality of SBCs, including the second SBC, that are in a load sharing group with the first SBC. The SIP INVITE message includes the dialog ID associated with the second media session, which triggers the second SBC to re-use the second media session to establish a media session between the transferee and the transfer target. | 2022-07-21 |
20220232054 | SYSTEM AND METHOD FOR MEETING PREPARATION AND USER CONTENT MANAGEMENT USING HETEROGENEOUS CLOUD SERVICE PROVIDERS - A method for managing cloud service providers (CSPs) includes obtaining, by a CSP management service, CSP user information corresponding to a plurality of users, initiating access to user content in at least a CSP of the CSPs using the CSP user information, after obtaining the CSP user information: obtaining, from a meeting preparation service, a content provide request, wherein the content provide request corresponds to a meeting, in response to the content provide request: obtaining access links to each data object of the user content that corresponds to the meeting, and providing dashboard-ready information to the meeting preparation service, wherein the dashboard-ready information comprises the access links. | 2022-07-21 |
20220232055 | Location-Based Playlist Generation - Example techniques disclosed herein relate to location-based playlists. In an example implementation, a system receives, from a mobile device, first GPS data indicating that the mobile device is located at a first physical location, wherein an application on the mobile device is registered with a particular user account of the cloud service. The system determines that the first physical location represented in the first GPS data corresponds to a location of a first business associated with one or more first playback devices within the cloud service. The one or more first playback devices are playing back first audio tracks. As each first audio track is at least partially played back, the system adds the respective first audio track to a location-based playlist associated with the particular user account of the cloud service. The computing system causes the mobile device to display an indication of the location-based playlist. | 2022-07-21 |
20220232056 | METHODS AND APPARATUS FOR DELIVERING CONTENT - Methods and apparatus are provided for processing communications. In one aspect, a method in a first node in a network of delivering content comprises delivering a first portion of the content to a device, receiving a request for a second portion of the content from the device and, responsive to the request and responsive to a determination that the second portion of the content should be delivered to the device from a second node in the network, instructing the device to retrieve the content from the second node. | 2022-07-21 |
20220232057 | SYSTEMS AND METHODS FOR ANALYZING STREAMED MEDIA TO DETERMINE COMMON SOURCE ENCODERS - Systems and methods are disclosed for analyzing different media to determine if the media originated from the same source. A two-part analysis is provided. During the first part, target data streams are analyzed to determine a template for the data stream or file, based upon the encoder used to encode the media transmitted in the data stream or stored in a file. After generating templates for the different streams, the templates are compared to determine which streams have matching templates. The second part of the analysis includes monitoring streams with matching templates to identify the same piece of media content in each of the streams. Upon identifying the same content, the content of each stream is synchronized and then compared to determine if the compared pieces of content were generated using the same encoder. | 2022-07-21 |
20220232058 | METHOD FOR TRANSMITTING STREAM, STREAMING SERVER AND STORAGE MEDIUM - A method for transmitting a stream includes: receiving a streaming request from a stream receiver, in which the streaming request includes a stream identifier and a type of the stream receiver; obtaining an encapsulated stream by performing protocol encapsulation on a stream corresponding to the stream identifier based on a streaming protocol corresponding to the type; and transmitting the encapsulated stream to the stream receiver. | 2022-07-21 |
20220232059 | LATENCY REDUCTION IN REMOTE RENDERING WITH ADAPTIVE PHASE SHIFTING - Sending streamed data packets from a producer to a consumer. A method includes, at a first entity, sending consumable data packets from the first entity to a second entity at a first consumable packet rate. The method further includes receiving a first phase delta from the second entity, wherein the first phase delta is computed from transmission jitter, computed from timing information in the consumable data packets. The method further includes sending from the first entity consumable data packets at a second consumable packet rate, the second consumable packet rate being dependent on the first phase delta. | 2022-07-21 |
20220232060 | METHODS AND SYSTEMS FOR IMPROVING PERFORMANCE OF STREAMING MEDIA SESSIONS - Disclosed is a method for improving performance of a streaming media session between a plurality of communicating entities. Observation reports are collected from a plurality of monitoring entities. Each observation report comprises information pertaining to events observed and recorded at a corresponding monitoring entity. A size of at least one window to be used for analyzing the observation reports is determined. The observation reports are analyzed using the at least one window of the determined size, to determine a correlation between the events across the observation reports. A problem encountered during the streaming media session is identified, based upon the correlation between the events. A notification is sent to at least one of the monitoring entities, based upon the problem. The notification is sent during the streaming media session. | 2022-07-21 |
20220232061 | ASYNCHRONOUS DISTRIBUTED MODULAR FUNCTION CALLING - A computer-readable media, method, and system for calling a function within a group-based communication system. The function may be initiated according to a trigger condition and is associated with arguments and return values. To carry out the function, an HTTP request is generated and sent to an HTTP server, which sends an HTTP callback to a group-based communication system server. The HTTP callback may include return values indicative of either a successful completion of the function or an error. | 2022-07-21 |
20220232062 | FORCED IDENTIFICATION WITH AUTOMATED POST RESUBMISSION - A method by a web application layer proxy communicatively coupled between a client and an origin server for performing automated POST resubmission. The method includes intercepting a request by the client for a resource provided by the origin server, obtaining an interstitial page in response to receiving an indication from a bot detector component that the client needs to be identified, where the interstitial page includes challenge code for interrogating the client and code for automatically submitting a form included in the interstitial page if the client successfully acquires a token, encrypting a payload of the request, adding the encrypted payload to a hidden input field of the form included in the interstitial page, and sending the interstitial page with the encrypted payload added to the hidden input field of the form to the client as a response to the request. | 2022-07-21 |
20220232063 | IoT GATEWAY WITH CONFIGURABLE DATA TRANSMISSION MODE - An IoT gateway with configurable data transmission mode includes a data collector, a data capturer and a data uploader. The data collector is configured to collect the data provided by a data provider based on a first data policy. The data capturer is configured to capture the data collected by the data collector based on a second data policy. The data uploader is configured to handle the data captured by the data capturer based on a third data policy. The first data policy, the second data policy and the third data policy may be configured separately according to different IoT applications. | 2022-07-21 |
20220232064 | IOT Interaction System - Systems and methods for facilitating interactions with embedded devices are provided. In one embodiment, a method can include obtaining a first set of data indicative of at least a plurality of interactions between a user device and a plurality of embedded devices associated with a building, and one or more locations of the user device associated with each respective interaction. The method can include generating a second set of data for each embedded device based, at least in part, on the first set of data. Each second set of data can be indicative of at least a number of interactions between the user device and the respective embedded device for each location. The method can include determining a particular location of the user device. The method can include identifying one or more recommended embedded devices and providing information about at least one recommended embedded device to the user device. | 2022-07-21 |
20220232065 | Method and Apparatus for Cloud Service Management, and Readable Storage Medium - A method and an apparatus for cloud service management, and a readable storage medium are disclosed. The method includes steps of: by a service management module in response to receipt of a work order of an application request, splitting the work order, creating a department and a virtual data center (VDC), creating a user, and binding the user to the department and the VDC, where the work order comprises a resource creation request and a resource parameter; by a resource management module, sending the resource parameter to an underlying resource pool through an interface; by the resource management module, sending a first notification to a software defined network (SDN) controller, where the first notification is a notification requesting to send a flow table; and by the SDN controller, sending the flow table to gateway device according to the first notification. | 2022-07-21 |
20220232066 | Load Balancing of Discovery Agents Across Proxy Servers - A non-transitory computer readable storage medium may have stored thereon instructions that, when executed by an endpoint device, cause the endpoint device to perform operations including: (i) establishing, by the endpoint device, a first communication channel with an intermediary proxy server; (ii) receiving, from a computational instance and via the intermediary proxy server, a registration payload comprising a list of available proxy servers; (iii) ranking, at the endpoint device, the list of available proxy servers; (iv) selecting, by the endpoint device, a particular proxy server from the list of available proxy servers as ranked; (v) establishing, by the endpoint device, a second communication channel with the particular proxy server; and (vi) communicating, by the endpoint device, with the computational instance via the particular proxy server by utilizing the second communication channel. | 2022-07-21 |