39th week of 2017 patent applcation highlights part 67 |
Patent application number | Title | Published |
20170279845 | User Interface for Displaying and Comparing Attack Telemetry Resources - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for displaying information about computer network resources identified as engaging in malicious activities. One of the systems includes one or more computers including one or more processors and one or more memory devices, the one or more computers configured to: identify resources associated with an attack, and provide an attach resource dashboard user interface that displays information related to attack resources, wherein the user interface presents resource information comparing behavior of a particular resource at a single online service with behavior of the resource at other online services, and comparing the behavior of that resource with behavior of other resources. | 2017-09-28 |
20170279846 | DETECTING AND REMEDIATING HIGHLY VULNERABLE DOMAIN NAMES USING PASSIVE DNS MEASUREMENTS - Some embodiments provide a technique for detecting highly-vulnerable domain names and remediating associated problems. The technique can include collecting DNS data representing a requests to the DNS over a period of time and determining a subset of the DNS data representing DNS-based service discovery requests to unregistered domains over the period of time. The technique can also include, for each of the unregistered domains, determining a query ratio and a persistence ratio. The technique can also include ranking the unregistered domains according to a metric that includes the query ratios and the persistence ratios, such that a ranked list of domain names is produced and outputting an initial segment of the ranked list of domain names as the highly-vulnerable domain names. The technique can also include remediating attacks on at least one of the highly-vulnerable domain names. | 2017-09-28 |
20170279847 | INCREASED GRANULARITY AND ANOMALY CORRELATION USING MULTI-LAYER DISTRIBUTED ANALYTICS IN THE NETWORK - In one embodiment, a primary networking device in a branch network receives a notification of an anomaly detected by a secondary networking device in the branch network. The primary networking device is located at an edge of the network. The primary networking device aggregates the anomaly detected by the secondary networking device and a second anomaly detected in the network into an aggregated anomaly. The primary networking device associates the aggregated anomaly with a location of the secondary networking device in the branch network. The primary networking device reports the aggregated anomaly and the associated location of the secondary networking device to a supervisory device. | 2017-09-28 |
20170279848 | SCORE BOOSTING STRATEGIES FOR CAPTURING DOMAIN-SPECIFIC BIASES IN ANOMALY DETECTION SYSTEMS - In one embodiment, a device in a network detects an anomaly in the network using an anomaly detector. The anomaly corresponds to an anomalous behavior exhibited by one or more nodes in the network. The device computes an anomaly score for the anomaly that represents a measure of the anomalous behavior. The device adjusts the anomaly score using a boost score. The boost score is generated by a boosting function that accounts for domain-specific biases of the anomaly detector. The device reports the anomaly to a supervisory device based on whether the adjusted anomaly score exceeds a reporting threshold. | 2017-09-28 |
20170279849 | CONSTRAINT-AWARE RESOURCE SYNCHRONIZATION ACROSS HYPER-DISTRIBUTED LEARNING SYSTEMS - In one embodiment, a device in a network receives data indicative of a target state for one or more distributed learning agents in the network. The device determines a difference between the target state and state information maintained by the device regarding the one or more distributed learning agents. The device calculates a synchronization penalty score for each of the one or more distributed learning agents. The device selects a particular one of the one or more distributed learning agents with which to synchronize, based on the synchronization penalty score for the selected distributed learning agent and on the determined difference between the target state and the state information regarding the selected distributed learning agent. The device initiates synchronization of the state information maintained by the device regarding the selected distributed learning agent with state information from the selected distributed learning agent. | 2017-09-28 |
20170279850 | DETECTING AND PREVENTING FLOODING ATTACKS IN A NETWORK ENVIRONMENT - A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit. | 2017-09-28 |
20170279851 | System and Method for Anti-Phishing Authentication - A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted commitment to the client. The method can also include receiving a one-time password (OTP) from the client, and validating the OTP. The method can also include sending a commitment key, to be authenticated by the client, receiving a static password from the client and authenticating the client. Embodiments of the invention are directed to a system for providing security against phishing attacks. The system can include one or more servers configured to receive a login ID from a client, and provide an encrypted commitment to the client. The processors can be configured to receive a one-time password (OTP) from the client, validate the OTP, send a commitment key, to be authenticated by the client, receive a static password from the client and authenticate the client. | 2017-09-28 |
20170279852 | Identifying and Trapping Wireless Based Attacks on Networks Using Deceptive Network Emulation - A system and method are provided that enable identifying and trapping cyber security attacks via wireless connectivity on enterprise and corporate networks. A deceptive network emulation of a specific customer network is used to invite and draw in possible attackers. The attacker is also enticed to initiate attack on the emulated deceptive network. Packet header inspection and deep packet evaluation of the attack are used for generating possible signatures of the attacker and the attack. The information from deep packet inspection combined with the understanding of attack modality derived from enablement of attack on the deceptive network are used to generate detailed defensive methodologies, response capabilities and attack signatures, so that various types of cyber attacks including zero-day attacks from the attacker can be identified, prevented or addressed and responded to. | 2017-09-28 |
20170279853 | SYSTEMS, METHODS, AND DEVICES FOR SECURELY MANAGING NETWORK CONNECTIONS - The disclosure relates generally to methods, systems, and apparatuses for managing network connections. A system for managing network connections includes a storage component, a decoding component, a rule manager component, and a notification component. The storage component is configured to store a list of expected connections for a plurality of networked machines, wherein each connection in the list of expected connections defines a start point and an end point for the connection. The decoding component is configured to decode messages from the plurality of networked machines indicating one or more connections for a corresponding machine. The rule manager component is configured to identify an unexpected presence or absence of a connection on at least one of the plurality of network machines based on the list of expected connections. The notification component is configured to provide a notification or indication of the unexpected presence or absence. | 2017-09-28 |
20170279854 | IDENTIFYING DATA USAGE VIA ACTIVE DATA - Disclosed are various embodiments for active data that tracks usage. The active data includes instructions that are executable by a computing device. The computing device is scanned to identify characteristics of the computing device. The characteristics of the computing device are utilized to determine whether the usage of the active data is authorized. Data is transmitted to a network service, including identifying information for the particular computing device and data that identifies a deployment of the active data. | 2017-09-28 |
20170279855 | TRUSTED-CODE GENERATED REQUESTS - Custom policies are definable for use in a system that enforces policies. A user, for example, may author a policy using a policy language and transmit the system through an application programming interface call. The custom policies may specify conditions for computing environment attestations that are provided with requests to the system. When a custom policy applies to a request, the system may determine whether information in the attestation is sufficient for the request to be fulfilled. | 2017-09-28 |
20170279856 | MANAGING NETWORK RESOURCE ACCESS USING SESSION CONTEXT - A computing device providing a network service to a service area may receive a connection request from a user device and generate a session start request to start a user session in a service domain covering the service area. One or more policy rules may be evaluated to determine whether any rule is applicable to the user device, which includes determining that an authoritative user session has already been established in the service domain. The user session may be established in the service domain for the user device, and at least one permission for access to a controlled network resource may be associated with the user session based on the determination that the authoritative user session has already been established. A request from the user device to access the controlled network resource may be received and access to the controlled network resource may be granted. | 2017-09-28 |
20170279857 | ELECTRONIC MESSAGING EXCHANGE - A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform. | 2017-09-28 |
20170279858 | IMS Registration of a V2X Wireless Device - A wireless device may transmit a session initiation protocol (SIP) REGISTER request to an internet protocol multimedia subsystem (IMS) network entity. The SIP REGISTER Request may comprise a first SIP header field. The first SIP header field may comprise one or more indicators for V2X capabilities of the wireless device. The wireless device may receive a SIP response from the IMS network entity. The SIP response may comprise the first SIP header field confirming the registration of the V2X capabilities. The wireless device may receive a second SIP request from the IMS network entity. The second SIP request may comprise a second SIP header field. The second SIP header field may comprise one or more indicators for V2X multicast service capabilities. The second SIP request may comprise one or more configuration parameters to receive packets via V2X broadcast and multicast bearers. The wireless device may transmit a second SIP response to the IMS network entity. The wireless device may receive packets via the V2X broadcast and multicast bearers. According to an embodiment, the SIP header field may comprise a SIP Contact header field. | 2017-09-28 |
20170279859 | CONCURRENT NETWORK BASED COLLABORATION SESSIONS - Disclosed in some examples are computer systems, methods, and machine readable mediums which provide for concurrent instances of network based collaboration sessions. Media that is shared in a collaboration session may be termed blocking media or unblocking media. The active session presents both the blocking and non-blocking media. Only non-blocking media is presented in the background sessions. Thus, for example, the audio, video, or all the media may be presented in the active session, and only the non-blocking media such as a text chat may be presented in one or more background sessions. Users may switch which collaboration session is active and which collaboration sessions are background sessions. | 2017-09-28 |
20170279860 | WEB COLLABORATION PRESENTER SHARING STATUS INDICATOR - Methods and systems are provided for automatically determining whether participant devices in a collaborative communication session are synchronized with content shared by a presenting device. The methods and systems present an indication to a presenting device regarding a status of each participant device. The indication may include an interactive display configured to render an image, or images, representing the content one or more participant devices have received according to a state of synchronization of the participant devices in the communication session. | 2017-09-28 |
20170279861 | SYSTEM AND METHOD FOR PROVIDING SUPPLEMENTAL INFORMATION RELATED TO MEDIA CONTENT - A method of providing supplemental information synchronized with a piece of media content being played and related to a current state of the piece of media content being played is provided. The supplemental information may be transmitted to an electronic device in synchronization with the playing of the piece of media content on an audio/visual display interface. The method includes receiving identifying information from the electronic device and/or the audio/visual display interface, storing the identifying information in an active device table, receiving a viewing initiation notification, and transmitting the supplemental information to the electronic device in response to the viewing initiation notification. The electronic device may also transmit a request to begin playing the piece of media content. Transmission of the supplemental information may be paused, stopped, or resumed in synchronization with the piece of media content being played. | 2017-09-28 |
20170279862 | SYSTEM AND METHOD FOR TRACKING EVENTS AND PROVIDING FEEDBACK IN A VIRTUAL CONFERENCE - A virtual conferencing system is described which tracks events during a virtual conference, provides a user interface for reviewing the events, and allows a moderator and/or other participant to provide feedback related to the events. For example, one embodiment of a virtual conferencing system comprises: a plurality of clients operated by participants and at least one moderator of a virtual conference, each of the clients comprising state management logic to maintain a current state of the virtual conference; a virtual conferencing service to establish audio and/or video connections between the plurality of clients during the virtual conference, the virtual conferencing service further including a state synchronization service communicatively coupled to the state management logic on each client to ensure that the current state of the virtual conference is consistent on each client; a virtual conferencing graphical user interface (GUI) to be rendered on the plurality of clients, the virtual conferencing GUI configured, via signals sent from the state synchronization service, to display a video stream of one or more current speakers during the virtual conference utilizing the established video connections; and a contribution identification module to identify events related to actions of participants during the virtual conference; an event log to store the events identified by the contribution identification module; and an event filter to provide options for searching for specific types of events within the event log based on input from the moderator and/or participants when reviewing a recording of the virtual conference, the event filter to generate a filtered set of events based on the input from the moderator and/or participants. | 2017-09-28 |
20170279863 | SYSTEM AND METHOD OF MANAGING MULTIPLE VIDEO PLAYERS - A system and method are provided for managing multiple video players executing on a client software platform. The method includes the operation of displaying a plurality of video players viewable by an end user. Each video player can have at least one video data stream supplied over a data network. A priority value can be applied to selected video players. In addition, an amount of bandwidth available from the data network to supply the plurality of video players can then be determined. Another operation is calculating whether the selected video players can sustain a video playback quality above a pre-defined threshold using the determined amount of bandwidth available. This operation can include appropriately apportioning and managing bandwidth and/or processing power allotments between the video players based on the priority assignments when the bandwidth and/or processing power is less than what the video players want to consume A modify playback message may be sent to at least one video player when the video playback rate is not sustainable or has become sustainable again. | 2017-09-28 |
20170279864 | DATA TRANSMISSION METHOD IN WIRELESS COMMUNICATION SYSTEM, AND APPARATUS THEREFOR - According to an aspect of the present invention, a method for performing a downlink (DL) multi-user (MU) transmission by an access point (AP) in a wireless communication system may include transmitting a DL MU Physical Protocol Data Unit (PPDU), where the DL MU PPDU includes a trigger frame including trigger information for an uplink (UL) MU transmission and a DL MU frame; and UL MU receiving a UL MU PPDU generated based on the DL MU PPDU, where the UL MU PPDU includes a UL MU frame based on the trigger frame and an acknowledge (ACK) frame in response to the DL MU frame. | 2017-09-28 |
20170279865 | TRANSMISSION METHOD, RECEPTION METHOD, TRANSMISSION APPARATUS, AND RECEPTION APPARATUS - A transmission method includes: generating a frame for transfer which stores one or more first internet protocol (IP) packets storing content, and one or more second IP packets each including reference clock information which indicates a time for a playback of the content; and transmitting the generated frame through broadcasting. In the generating, header compression is performed on the one or more first IP packets and the header compression is not performed on the one or more second IP packets. | 2017-09-28 |
20170279866 | ADAPTATION OF STREAMING DATA BASED ON THE ENVIRONMENT AT A RECEIVER - An apparatus is described herein. The apparatus includes an environmental conditions capture mechanism, a controller, and a receiver. The environmental conditions capture mechanism is to obtain environmental information. The controller is to control streaming data based on the environmental information. The receiver is to receive streaming data that is adapted based on the environmental information and a volume of the streaming data is reduced as a result of adapting the streaming data. | 2017-09-28 |
20170279867 | FRAME DEVICES FOR A SOCIALLY NETWORKED ARTWORK ECOSYSTEM - The present disclosure describes methods, systems, and computer program products for a using one or more customized electronic devices to enable connection with an artwork ecosystem and social network so that content can be customized, delivered, and displayed to a user so as to maximize the user experience. A frame device receives, from a central server, media content item data, and determines whether the user preferences stored at the frame device allow a media content item associated with the received media content item to be presented. The frame device converts the received media content item data from a first data format to a second data format. The first data format is associated with the central server and the second data format is associated with the display at the frame device. The frame device presents, on a display, the media content item associated with the received media content item data. | 2017-09-28 |
20170279868 | Upstream Fault Detection - Techniques are described for detecting faults in media content based on the behavior of users viewing the media content. Embodiments stream a first instance of media content to one or more users. The behavior of the one or more users is monitored while the users are viewing the streaming first instance of media content. Embodiments then determine whether the first instance of media content is faulty, based on the monitored behavior of the one or more users. | 2017-09-28 |
20170279869 | LOW LATENCY APPLICATIONS USING MULTIPLE SERVERS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing an application having sub-applications sharded across different servers. A plurality of servers each serve a separate sub-application of a primary application that includes one or more of the sub-applications. The sub-applications are combined at a client device to create a graphical user interface of the primary application. Each of the sub-applications is separately served in response to multiple different network calls to multiple different servers initiated by the client device. Synchronization code, served by one or more of the servers, prevents the client device from initiating a network call for UI code that renders static user interface elements of each sub-application until the client device has initiated one or more networks calls requesting data that will be presented by a given user interface view of the sub-application. | 2017-09-28 |
20170279870 | TARGET WEBPAGE PERFORMANCE - One or more computing devices, systems, and/or methods for generating a recommendation for increasing loading time performance of a target webpage are provided. For example, a third party window, specifying a target webpage as a source, is inserted into a webpage. The webpage is provided to a browser that displays the webpage and loads the target webpage into the third party window. Resource timing data, associated with loading the target webpage into the third party window, is retrieved. Loading time performance of the target webpage is measured based upon the resource timing data. A recommendation for increasing loading time performance of the target webpage is generated. In an example, an action such as a resource allocation change for hosting the target webpage, compression of an image of the target webpage, a connection reduction of files connected to by the target webpage, etc. is performed based upon the recommendation. | 2017-09-28 |
20170279871 | INTER-REGIONAL FILE SHARING METHOD AND SYSTEM - An inter-regional file sharing method and system are provided. The method includes: configuring, in a first region, a first server and a first cloud storage cluster having a first domain name interface; and acquiring, by the first server, a file to be shared via the first domain name interface from the first cloud storage cluster and/or locally and transmitting the acquired file to be shared to a cloud cluster in a second region. | 2017-09-28 |
20170279872 | SELECTIVE RESOURCE MIGRATION - Selective resource migration is disclosed. A computer system includes physical memory and a plurality of physical processors. Each of the processors has one or more cores and each core instantiates one or more virtual processors that executes program code. Each core is configured to invoke a hyper-kernel on its hosting physical processor when the core cannot access a portion of the physical memory needed by the core. The hyper-kernel selectively moves the needed memory closer to a location accessible by the physical processor or remaps the virtual processor to another core. | 2017-09-28 |
20170279873 | Dynamic Medical Object Information Base - A dynamic medical object information base (DMOIB) is used with a communication protocol. A medical object information base (MOIB) may generally define rules of creation and modification of data defined for use in medical products. A dynamic version of the MOIB adapts to changing data classifications. DMOIB is preferably compatible with non-dynamic MOIB systems. DMOIB preferably reduces code space and simplifies management of software projects. DMOIB may allow for an entirely dynamic system using a discovery/negotiation process for determining full features of a device. DMOIB may also allow for generation of a dynamic interface to handle data from devices. | 2017-09-28 |
20170279874 | TRANSLATION OF MESSAGES USING SENSOR-SPECIFIC AND UNIFIED PROTOCOLS - The present disclosure involves systems, software, and computer implemented methods for translating messages between a sensor-specific protocol and a unified protocol associated with a backend application server. One example method includes: receiving, at a load balancer, a first message from a first sensor to a backend application server, the first message in a first sensor-specific protocol; identifying, by the load balancer, the first sensor-specific protocol of the first message; translating, by the load balancer, the first message from the first sensor-specific protocol to a second message in the unified protocol associated with the backend application server; and transmitting, by the load balancer, the second message in the unified protocol to the backend application server for processing. | 2017-09-28 |
20170279875 | SHARING A DATA MANAGEMENT POLICY WITH A LOAD BALANCER - In one general embodiment, a computer program product for sharing a data management policy with a load balancer comprises a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se. Additionally, the program instructions are executable by a processor to cause the processor to perform a method comprising analyzing, by the processor, a plurality of data management factors within an object-based storage system, determining, by the processor, a data management policy for predetermined data within the object-based storage system, based on the analyzing, and sharing, by the processor, the data management policy for the predetermined data with a load balancer associated with the object-based storage system. | 2017-09-28 |
20170279876 | CONFIGURING CONTROL DEVICES OPERABLE FOR A LOAD CONTROL ENVIRONMENT - A control device configuration system may receive, store, process, and/or display control device configuration information. The control device configuration system may filter the control device configuration information based on user selections of configuration options for configuration parameters. The control device configuration system may identify compatible and incompatible configuration options for various configuration parameters. The control device configuration system may allow selections of the incompatible configuration options. The control device configuration system may adjust how it filters the control device configuration information based on the selections of the incompatible configuration options. The control device configuration system may implement a configuration model that includes configuration parameter groups for efficient evaluation of user selections. | 2017-09-28 |
20170279877 | LOAD BALANCING METHOD, LOAD BALANCING SYSTEM, LOAD BALANCING DEVICE AND TOPOLOGY REDUCTION METHOD - The disclosure provides a load balancing method, a load balancing system, a load balancing device and a topology reduction method. The load balancing method includes configuring a transmission progress value for each of the edge servers; grouping the edge servers into server groups, wherein each of the edge servers is grouped into at least one server group among the server groups; receiving a download request corresponding to a first video stream from a user device, wherein a first server group among the server groups provides the first video stream; and selecting one of the edge servers from the edge servers of the first server group as a first edge server to provide video data of the first video stream to the user device according to the transmission progress values of the edge servers of the first server group. | 2017-09-28 |
20170279878 | CONTENT HOSTING IN A MOBILE AD HOC NETWORK - An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device. | 2017-09-28 |
20170279879 | PROVIDING APPLICATION VIRTUALIZATION USING A PEER-TO-PEER MODEL - Virtualized applications can be delivered using a peer-to-peer model. Each client in a virtual desktop infrastructure environment can function as both a server and a client for purposes of distributing and receiving application layers. A server component on each client can advertise any application layers that the client maintains in its local storage and can receive and service streaming requests from other clients. A client component on each client can discover each application layer that is available within its location including which client provides each application layer. The client component can therefore also be configured to request application layers from the appropriate clients. This peer-to-peer model eliminates the need to provide a dedicated server at each location. Also, because a server component on the client will only be tasked with streaming to a limited number of clients, virtually any client can function as the source of an application layer. | 2017-09-28 |
20170279880 | PEER CORRESPONDING TO THE DOMAIN IN MULTI-DOMAIN ENVIRONMENT AND METHOD FOR CONTROLLING THE SAME - A peer corresponding to a domain in a multi-domain environment and a method for controlling the peer are provided. The peer includes a Peer Connector for a communications connection with at least one different peer, and a Shared Manager storing information of the peer and information of the at least one different peer received through the peer connector. Also the peer includes a SFC Distributor generating service function chaining (SFC) by using the information of the at least one different peer and the information of the peer. | 2017-09-28 |
20170279881 | LOAD BALANCING SYSTEM, LOAD BALANCING DEVICE AND TOPOLOGY MANAGEMENT METHOD - The disclosure provides a load balancing system, a load balancing device and a topology management method. The topology management method includes configuring and maintaining a transmission progress value for each of edge servers; grouping the edge servers into server groups, wherein the edge servers of each of the server groups provide one of a plurality of video streams, and each of the edge servers is grouped into at least one server group among the server groups; selecting a first video stream from at least one video stream corresponding of a first edge server having bandwidth usage rate higher than a high load threshold; synchronizing video data of the first video stream to a second edge server; setting a transmission progress value of the second edge server as a transmission progress value of the first edge server; and adding the second edge server into the server group corresponding to the first video stream. | 2017-09-28 |
20170279882 | CENTRALIZED MANAGEMENT OF A P2P NETWORK - Telemetry data from a plurality of peer computers of a peer-to-peer network is aggregated via a computer network. Each of the plurality of peer computers sends telemetry data relating to transfer of a digital content item within the peer-to-peer network. A designated peer computer is quarantined from transferring a digital content item within the peer-to-peer network according to one or more health metrics of the peer-to-peer network derived from the telemetry data aggregated from the plurality of peer computers | 2017-09-28 |
20170279883 | METHOD, STORAGE MEDIUM, AND SYSTEM - A method includes: determining a group in which communication between virtual machines belonging to the group is not permitted by referring information regarding communication rules on virtual machines belonging to individual groups; storing deployment information indicating dispersed deployment in association with identification information on the determined group; determining whether the deployment information associated with identification information on a first group is stored when receiving an instruction to deploy a first virtual machine belonging to the first group; and determining a target physical machine in which the first virtual machine is to be deployed from among one or more physical machines in which a second virtual machine other than the first virtual machine belonging to the first group is not running out of physical machines when determining that the deployment information is stored in association with the identification information on the first group. | 2017-09-28 |
20170279884 | MIGRATION OF HOSTS - When monitoring that a host migrated, a software defined network (SDN) controller may actively detect a port located by the host. Besides, when detecting the port located by the host, the SDN controller may bind the host to the port where the host is located, so as to limit migration of the host. When not detecting a port located by the host, the SDN controller may also block packets from the host. | 2017-09-28 |
20170279885 | SERVICE PROVIDING SYSTEM, CLIENT APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A service providing system includes a mobile apparatus that moves to a user in response to receiving an instruction to provide a service from the user and provides the service to the user after obtaining approval; and a client apparatus that manages a schedule input by the user, and, in response to receiving the instruction, transmits an instruction which is derived from the received instruction, the received instruction including information of at least one of a designated date and time and a designated location at which the service is to be provided. The client apparatus includes a display that displays a schedule in which a service providing schedule is added to the schedule input by the user according to a schedule display instruction, and the mobile apparatus moves to a scheduled location at a scheduled date and time and provides the service. | 2017-09-28 |
20170279886 | Method of Synchronizing User Setting Data Among Multiple Centers - Disclosed herein is a method of synchronizing data among multiple EMS centers. The method may include updating user setting data by a client in a main center; transmitting the user setting data from the main center to a secondary center; and synchronizing the user setting data between the main center and the secondary center. | 2017-09-28 |
20170279887 | SYSTEM AND METHOD FOR OPTIMIZED CONTENT SYNCHRONIZATION FOR MOBILE DEVICES - A mobile device may download preconfigured synchronization settings from a server machine. An application running on the mobile device may have special control logic that works with the server machine to implement a mobile synchronization algorithm. The control logic may collect information on communication system elements including device attributes, static channel attributes, dynamic channel attributes, or a combination thereof. The server machine may determine communication settings based at least on the collected information. The mobile device may, based at least in part on the determined communication settings, perform a synchronization process and obtain one or more synchronization items from the server machine to update content, graphics, and/or behavior of the application. Upon completion of the synchronization process, statistics may be collected and used in a subsequent dynamic synchronization process. To further optimize synchronization performance while minimizing costs, a multi-tier storage solution may be utilized. | 2017-09-28 |
20170279888 | HOSTING PROVIDER HOSTING ROUTES FROM A MEDIA REPOSITORY - A hosting provider may be bi-directionally authenticated with one or more media repositories. The hosting provider preferably has domain name registration and hosting capabilities. The media repositories may collect data (such as pictures and/or files) from one or more users. Once authenticated, the hosting provider and media repositories may cooperate in storing, aggregating and transmitting data to a user. Routes may be hosted by the hosting provider and used to organize and access the data. For example, a user may enter a route into a browser and receive media/data, possibly from a plurality of media repositories, that is associated with that route. In another example, the user may enter a route into the browser and be redirected from the hosting provider to a website of the media repository. | 2017-09-28 |
20170279889 | IDENTIFYING DATA FOR DEDUPLICATION IN A NETWORK STORAGE ENVIRONMENT - A computer-implemented method includes receiving, by a storage controller, a hash data. The hash data includes a hash of a remote data. The method includes comparing, by the storage controller, the hash data against an index. The index includes one or more hashes of a local data. The method includes determining, by the storage controller, whether the remote data parallels any part of the local data, based on comparing the hash data with the index. The method is responsive to the remote data paralleling any part of the local data. The method includes sending, from the storage controller, a request to not transmit said remote data. | 2017-09-28 |
20170279890 | DISTRIBUTION OF DATA IN CLOUD STORAGE BASED ON POLICIES MAINTAINED IN METADATA - Provided are a method, a system, and a computer program product in which metadata associated with data is maintained, wherein the metadata indicates whether storage of the data is restricted geographically. A controller receives a request to store the data in cloud storage comprising a plurality of cloud servers located in a plurality of geographical locations. The controller determines where to store the data in the cloud storage, by interpreting the metadata. | 2017-09-28 |
20170279891 | AUTOMATIC CLIENT-SERVER ROLE DETECTION AMONG DATA STORAGE SYSTEMS IN A DISTRIBUTED DATA STORE - A data storage system configured as node in a distributed data store is presented. The system comprises an RDMA-enabled network adapter and a role management unit. The RDMA-enabled network adapter is configured to communicate with one or more other data storage systems in the distributed data store. The role management unit is configured to: detect a node identification number associated with each of the other data storage systems, compare a node identification number assigned to the data storage system with each of the detected node identification numbers to generate comparison results, determine whether the data storage system is to perform either a server role or a client role with respect to each of the other data storage systems on the basis of the comparison results, and set up the network adapter to operate in both an RDMA server mode and an RDMA client mode during runtime according to the determined roles. | 2017-09-28 |
20170279892 | METHODS AND SYSTEMS FOR CONTAINER NODE-BASED ENHANCED MANAGEMENT OF A MULTI-LEVEL WIRELESS NODE NETWORK - Methods, apparatus and systems are described that manage a multi-level wireless node network with package ID nodes associated with different packages, a container node in a logistics container, a facility master node, and a server at different levels. In one method, the container node detects an advertising signal broadcast by each package ID node and detects an advertising signal broadcast by the facility master node as the container node approaches the facility. The method offloads management control of each of the package ID nodes from the facility master node down to the container node as part of managing the first level of the network, and has the container node transmitting relevant node information to the facility master node. Such relevant node information provides information about at least one of the packages in the logistics container and reflects status information to be sent to the server by the facility master node. | 2017-09-28 |
20170279893 | TRANSACTION TRACKING AND MONITORING - A device may generate one or more objects for one or more transactions. The one or more transactions may include a sequence of one or more events. The one or more objects may include one or more states associated with the sequence of one or more events. The device may receive information associated with the one or more transactions. The information may be used to update the one or more states of the one or more objects. The device may detect one or more alerts based on the one of more objects. The one or more alerts may be associated with the one or more states of the one or more objects. The device may determine an alarm status based on the one or more alerts and may provide information to cause an action to be performed. | 2017-09-28 |
20170279894 | UNIVERSAL INTERNET OF THINGS (IOT) SMART TRANSLATOR - A system provides communication among user devices and Internet of things (IoT) devices includes a user device able to execute at least one application that is able to communicate using at least a first IoT protocol; an IoT device able to communicate using at least a second IoT protocol; and a universal translator able to communicate using at least the first IoT protocol and the second IoT protocol. An automated method of providing communications between a user device and an IoT device includes: determining a protocol of the IoT device; determining a protocol of the user device; and inserting a virtual device if the protocols are different. An automated method of translating communications for IoT systems includes: receiving a device protocol and identifier; receiving an application protocol and identifier; adding the application identifier to an application list; and adding the device identifier to a device list. | 2017-09-28 |
20170279895 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - An information processing system comprising a memory, and a processor coupled to the memory and configured to receive requests from a plurality of client apparatuses, store, in the memory, information about sessions established to communicate with the plurality of client apparatuses, store, in the memory, a request in response to which processing has not yet been started, the request being one of the requests received from the plurality of client apparatuses, detect a session during which a predetermined time-out time has elapsed in a state in which processing demanded by a request corresponding to the session is not being executed, the session being one of the sessions, information about the sessions being stored in the memory, and suppress, when a request received from a client apparatus corresponding to the detected session is stored in the memory, invalidation of the session due to an elapse of the time-out time. | 2017-09-28 |
20170279896 | SYSTEM AND METHOD FOR PROVIDING INTERACTIVE CONTENT TO A USER - Systems and methods are set forth which provide seamless connectivity between an enterprise and a user's mobile device and a fixed terminal such as a gaming terminal. The connectivity can follow the user through several different communication channels and can enable different content, including interactive content, to be provided based upon the communication channel currently invoked which can be attributed to the user's location as either within a venue and at a terminal or roaming about remote from the terminal and venue. In various embodiments the system may be open to outside content providers to provide content to a user of the system. The systems and methods also support the use of an electronic wallet account for funding activities. | 2017-09-28 |
20170279897 | Real-time Sensors in Complex Computing Networks - This disclosure is directed to an apparatus for real-time routing of an input signal received from a real-time sensor to perform disparate computing operations in a complex computing network, wherein hut for the real-time routing of the input signal, which is necessarily rooted in computing technology, separate input signals would be needed for performing the disparate computing operations. | 2017-09-28 |
20170279898 | Method for Accessing Virtual Desktop and Mobile Terminal - The present disclosure provides a method for accessing a virtual desktop and a mobile terminal. The method for accessing the virtual desktop includes: obtaining preset address information by a mobile terminal, in which the address information includes a communication address of a virtual desktop client; and establishing a connection between the virtual desktop client and the mobile terminal according to the communication address of the virtual desktop client, and receiving virtual desktop information sent by the virtual desktop client. | 2017-09-28 |
20170279899 | ABORT MESSAGES FOR POSITION LOCATION MESSAGE FLOWS - Provided is an enhanced LPP transport that may improve performance where a sender or receiver of messages processes certain messages that include requests to abort transactions or sessions, or processes certain messages that might otherwise result in the sending of abort messages. Embodiments may reduce unwanted system actions such as, for example, the unwanted termination of a transaction or session, or the unnecessary use of system resources. | 2017-09-28 |
20170279900 | FAILOVER AND LIVE MIGRATION OF ZERO/THIN CLIENTS - In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a control device. The control device determines that a first thin client is in a remote session with a remote machine and is in wireless connection with one or more peripherals. The control device detects that the first thin client is in a predetermined status. The control device requests a second thin client to resume the remote session of the remote machine. The control device connects the one or more peripherals with the second thin client wirelessly. | 2017-09-28 |
20170279901 | METHOD AND APPARATUS FOR SHIP TO SHORE COMMUNICATION - A method and database server for synchronizing contents of a local database with contents of a remote database. The method includes writing data transactions to a local transaction log file, assigning bin numbers to the data transactions, and determining if the assigned bin numbers have changed due to receipt of subsequent data transactions and if the bin numbers have changed, inserting the subsequent data transactions into a local sequence log file and assigning the subsequent data transactions a first sequence number. The method includes providing, to a remote replicator service, access to the first sequence number, the remote replicator service having access to a second sequence number, and if the first sequence number does not match the second sequence number, providing to the remote replicator service access to the subsequent data transactions, the remote replication service updating a remote database to include the subsequent data transactions. | 2017-09-28 |
20170279902 | METHOD, APPARATUS AND SYSTEM FOR DEVICE DISCOVERY - The present invention provides a method, an apparatus and a system for device discovery. The method includes: acquiring, by a first device, a user identification of a target user, and acquiring, according to the user identification of the target user, broadcast information of a second device which the target user logs in; when broadcast information of another device is monitored through a D2D function, matching, by the first device, the monitored broadcast information with the broadcast information of the second device, and if the match is successful, determining, by the first device, that the second device and the first device are within a preset distance. According to the present invention, the accuracy of discovering a short distance user is improved and, thus, the problem in the prior art that the accuracy of discovering a user in a short distance cannot be guaranteed by using a cell ID is solved. | 2017-09-28 |
20170279903 | PROXIMITY-BASED PATRON DISCOVERY AND GROUP CREATION - A system for proximity-based patron discovery and group creation, comprising a patron management server that receives location and ID information from a plurality of client devices via a network, directs a patron interaction manager, groups client devices based on information similarities, and produces group information for a group; and a display manager that presents group information for review. | 2017-09-28 |
20170279904 | TERMINAL DEVICE - A terminal device includes an acquirer, a transmitter, a receiver, and a notifier. The acquirer acquires first location information of a subject vehicle where the terminal device is installed. The transmitter transmits a communication packet containing the first location information, and identification information identifying the terminal device. The receiver receives a communication packet transmitted from another terminal device installed in another vehicle, the received communication packet containing the second location information of the other vehicle, and acquires the second location information. The notifier performs notification of a warning, based on the second location information and the first location information. In a case where stop conditions have been satisfied, the transmitter stops transmission of the communication packet containing the first location information and the identification information. Even in a case where the stop conditions have been satisfied, the receiver receives the communication packet transmitted from the other terminal device. | 2017-09-28 |
20170279905 | INFLUENCE ANALYSIS OF INTERACTIVE CONTENT - Technology for analyzing interactive content is disclosed. In one example, a method is used for providing influence analysis of the interactive content. The method can include determining a base influence score of a first user based at least on types and quantities of the first-user-generated content items. The base influence score can be dampened to account for self-referential content items within the first-user-generated content items. The method can include determining an interactive influence score of the first user based on other-user-generated content items descending from the first-user-generated content items. The method can include combining the base influence score and the interactive influence score to create an influence score of the first user. | 2017-09-28 |
20170279906 | Multi-Modal Conversational Intercom - The techniques discussed herein allow an agent that provides dialog-based services to converse with a user via any mode. A central service programmed to be able to communicate via any mode collects information from agents necessary to act on the agents' behalf. In order to ensure that an agent has a maximal presence across modes, the central service provides auxiliary services such as language translation, fidelity upgrading and/or downgrading, modal constraint conformation, etc. Moreover, the central service provides session tracking via user profiles stored at the intercom so that if a user changes a mode by which the user is conversing with an agent, the central service can keep the context of the conversation across the new mode. Furthermore, agents can communicate with other agents via the central service, allowing other agents to provide services to agents or to add their services to an ongoing dialog with a user. | 2017-09-28 |
20170279907 | Behavior Analysis Apparatus for Analysis of User's Behavior, Behavior Analysis Method, and Storage Medium - A behavior analysis apparatus | 2017-09-28 |
20170279908 | NON-TRANSITORY COMPUTER READABLE MEDIUM STORING COMMUNICATION PROGRAM, COMMUNICATION DEVICE AND INFORMATION PROCESSING APPARATUS - A non-transitory computer readable medium storing a program causing a computer to execute a process, the process including: selecting in a case where an error occurs in communication between a communication device and a communication target device, a setting item to be changed in order to handle the occurred error by referring to information in which a type of an error is previously correlated with a setting item to be changed; acquiring a setting value of another communication device regarding the selected setting item; and determining a setting value of the communication device based on the acquired setting value of the other communication device. | 2017-09-28 |
20170279909 | METHOD AND ELECTRONIC DEVICE FOR RESUMING PLAYING VIDEOS BETWEEN MULTI-TERMINALS - A method for resuming playing videos between multi-terminals include: monitoring an event that a user is watching a video via a first terminal; sending an upload instruction to the first terminal; receiving a piece of play progress information of the video that is continuously uploaded at a preset time interval by the first terminal until the event that the user is watching the video via the first terminal finishes; monitoring an event that the user requests playing of the video via a second terminal; reading the piece of play progress information to determine a play stopping location where the user stops watching the video via the first terminal; and pushing video resources of the video to the second terminal starting from the play stopping location so that the second terminal resumes playing of the video from the play stopping location. | 2017-09-28 |
20170279910 | Evolved Packet Core Applications Microservices Broker - Concepts and technologies disclosed herein are directed to an evolved packet core (“EPC”) applications microservices broker (“microservices broker”). According to one aspect of the concepts and technologies disclosed herein, a microservices broker can receive a microservice request that identifies a microservice. The microservices broker can check a microservices broker database for a user equipment (“UE”) that is capable of servicing the microservice request. The microservices broker can request a status of the UE from a home subscriber server (“HSS”). The status can indicate whether or not the UE is connected to a radio access network (“RAN”). If the status indicates that the UE is connected to the RAN, the microservices broker can route the microservice request to the UE for providing the microservice. | 2017-09-28 |
20170279911 | RESOURCE USAGE ANONYMIZATION - One embodiment of a method, executed by one or more processors, includes receiving a request from a client for a network resource, selecting a previously-serviced client as a proxy client, forwarding the request to the proxy client, receiving the network resource from the proxy client, and forwarding the network resource to the client. In another embodiment, the method includes receiving a request from a client for a network resource, selecting a proxy client from a dynamic pool of proxy clients that are each capable of requesting the network resource, and directing the request from the client to the proxy client. The selected proxy client may be the client whose request immediately preceded the current request. A computer system and computer program product corresponding to the method are also disclosed herein. | 2017-09-28 |
20170279912 | PROXY FOR MONITORING SPECIAL HANDLING OF CONTENT WITHIN A SERVICE NETWORK - A device intercepts a request from a requesting device, and the request includes a network address or a universal resource locator (URL) for content. The device determines whether special handling is applicable when forwarding the content to the requesting device. The device establishes a session between the content device and the requesting device, and the session exchanges data via a pathway that includes a proxy. The proxy identifies data, including the requested content, exchanged in the session and determines whether the special handling was used when forwarding the data. The proxy forwards reporting data identifying the exchanged data and indicating whether the special handling was used when exchanging the data through the session. | 2017-09-28 |
20170279913 | UNIFIED DATA NETWORKING ACROSS HETEROGENEOUS NETWORKS - A system is provided for unified data networking across a plurality of heterogeneous networks different ones of which include a source network node and a querying network node. The system may receive a data packet having a payload and a tag that includes a unified identity code (UIC) for a category of information. Content of the payload may be stored in a cache memory based at least in part on the UIC. In at least one instance, a query including the UIC may be received from the querying network node, and the system may retrieve the content from the cache memory based on the UIC. The system may then generate and transmit, to the querying network node, a reply data packet having a payload with the content and a tag that includes the UIC. | 2017-09-28 |
20170279914 | DYNAMICALLY ADJUSTING MEDIA CONTENT CACHE SIZE - Disclosed are various embodiments for dynamically adjusting the amount of media content to be cached by a client device streaming media from a streaming device. An initial amount of media content is transmitted for caching to the client device from the streaming device. The location of a client device can be used to determine a connectivity interruption probability between the client device and the streaming device. The amount of media content for caching on the client device is adjusted based on the connectivity interruption probability, and the adjusted amount of media content is transmitted to the client device. | 2017-09-28 |
20170279915 | SWITCH ACCESS MODULE, CELL ENCAPSULATION METHOD, SWITCHING NETWORK SYSTEM AND COMPUTER STORAGE MEDIUM - A switch access module, a cell encapsulation method, a switching network system and a computer storage medium are described. The method includes that: the switch access module determines accumulated unsent data corresponding to a destination address according to the destination address of a received data packet, the accumulated unsent data corresponding to the destination address including the data packet received by the switch access module and unsent data cached by the switch access module and corresponding to the destination address; and the accumulated unsent data corresponding to the destination address is filled into at least one cell according to a preset cell minimum length and a length of the accumulated unsent data corresponding to the destination address. | 2017-09-28 |
20170279916 | Content delivery network (CDN) cold content handling - A method of content delivery in a content delivery network (CDN), where the CDN is deployed, operated and managed by a content delivery network service provider (CDNSP). The CDN comprises a set of content servers and a domain name system (DNS). For a given content provider, a determination is first made whether the content provider has “cold content” delivery requirements by evaluating one or more factors that include: total content size, size of content objects expected to be served, uniqueness of content, total number of content objects, and a percentage of the total content size that is expected to account for a given percentage of traffic. Upon a determination that the content provider has cold content delivery requirements, a subset of the CDN content servers are configured to implement a set of one or handling rules for managing delivery of the cold content from the CDN content servers. | 2017-09-28 |
20170279917 | MEMORY SYSTEM ALLOWING HOST TO EASILY TRANSMIT AND RECEIVE DATA - According to one embodiment, a memory system includes a non-volatile semiconductor memory device, a control unit, a memory as a work area, a wireless communication module, and an extension register. The control unit controls the non-volatile semiconductor memory device. The extension register is provided in the memory and has a data length by which a wireless communication function of the wireless communication module can be defined. The control unit causes the non-volatile semiconductor memory device to store, as a file, an HTTP request supplied from a host, causes the extension register, based on a first command supplied from the host, to register an HTTP transmission command transmitted together with the first command, and causes the wireless communication module to transmit the HTTP request stored in the non-volatile semiconductor memory device based on the transmission command registered in the extension register. | 2017-09-28 |
20170279918 | COMPUTER SYSTEM - A computer system according to one preferred embodiment of the present invention has a server and a storage subsystem, wherein the server is configured to enable data write to a cache area of the storage subsystem. Further, the server manages the usages of the cache area. When storing data from the server to the cache area, the server determines whether a data-writable area exists in the cache area or not. If there is a writable area, data is stored in the writable area. | 2017-09-28 |
20170279919 | Handling User Interface Components - In one embodiment, a method includes by a client computing device, sending a request for two or more categories of content for display in a user interface, wherein each of the categories of content are received from a different content source, and wherein each of the categories of content are displayed in a corresponding region of the user interface. The method further includes determining a space requirement for each of the categories of content, wherein the determining is based at least in part on information in the request and information stored on the client computing device. The method further includes allocating, based on the space requirements, space for each of the regions of the user interface, and displaying each of the categories of content in its corresponding region as the content is received. | 2017-09-28 |
20170279920 | INTEREST SCHEDULING BY AN INFORMATION AND DATA FRAMEWORK IN A CONTENT CENTRIC NETWORK - One embodiment provides a system for facilitating scheduling of interests in a CCN. The system determines, by a scheduler component, network properties associated with name prefixes of interests transmitted by a plurality of local applications, wherein a name for an interest is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level, and wherein a name prefix includes one or more contiguous name components. The system generates a first interest which indicates a command to set a window size for a transport stack associated with a respective local application based on the network properties. The system transmits the first interest to a component associated with the transport stack, which causes the component to set the window size for the transport stack, thereby facilitating scheduling of interests based on the network properties. | 2017-09-28 |
20170279921 | AUTOMATIC QOS OPTIMIZATION IN NETWORK EQUIPMENT - Systems, methods, and software for automatically optimizing QoS configuration in networking equipment. A network device measures current line metric values associated with a network connection of the device and compares the current line metric values to previously measured values to determine whether there has been a material change in a line metric value. If a material change in a line metric value has occurred, new QoS settings are computed for the network device based on the current line metric values measured, and the new QoS settings are applied to the QoS functions of the network device. The measuring, comparing, computing, and applying steps are repeated on a periodic basis in order to keep the QoS settings optimized to changing network conditions. | 2017-09-28 |
20170279922 | SCALING PERSISTENT CONNECTIONS FOR CLOUD COMPUTING - Examples relate to scaling persistent connections for cloud computing. In some examples, a data packet is used to determine connection information of the first connection. At this stage, server portion of the first connection is closed by using the connection information to send a close command to the cloud server. In response to a keepalive signal from the client computing device, the connection information is used to send a keepalive response to the client computing device to maintain a client portion of the first connection. In response to a service request from the client computing device, a service notification including the service request is sent to the client computing device, where the client computing device initiates a second connection with the cloud server to process the service request. | 2017-09-28 |
20170279923 | PROVISIONING OF NETWORK SERVICES BASED ON VIRTUAL NETWORK FUNCTION PERFORMANCE CHARACTERISTICS - A method includes performing, by a processor: receiving a selection of a network service, determining a plurality of Virtual Network Functions (VNFs) and a plurality of Virtual Machines (VMs) based on the selection of the network service, the plurality of VNFs being configured to run on the plurality of VMs, generating a plurality of tuples, each of the plurality of tuples corresponding to a combination of one of the plurality of VNFs and one of the plurality of VMs where the one of the plurality of VNFs is configured to run on the one of the plurality of VMs, receiving a plurality of VNF performance parameters, estimating values for each of the plurality of VNF performance parameters for each of the plurality of tuples, respectively, processing the values for each of the plurality of VNF performance parameters to generate a plurality of scores for the plurality of tuples, respectively, generating a plurality of VNF Forwarding Graphs (FGs), each of the VNF FGs corresponding to a combination of ones of the plurality of tuples that support the network service, generating a plurality of grade scores for the plurality of VNF FGs, respectively, based on the plurality of scores for the plurality of tuples, and provisioning the network service on one of the plurality of VNF FGs based on the plurality of grade scores. | 2017-09-28 |
20170279924 | CANCELLATION MANAGEMENT WITH RESPECT TO A WEB APPLICATION - Disclosed aspects relate to cancellation management with respect to a web application. A service request is received by the web application. An identifier for the service request is established. A cancellation request for the service request is received by the web application. Using the identifier, a termination of the service request is initiated. In embodiments, the termination of the service request is performed to free a set of computing resources such as bandwidth, processing, or memory. | 2017-09-28 |
20170279925 | SERVICE PROCESSING METHOD AND APPARATUS, AND SERVICE SERVER - Disclosed are a service processing method and apparatus, and a service server. The method comprises: receiving an operation request, sent by a first client device, for requesting to perform a service operation; generating a target service random code for a first account according to the operation request; receiving an operation response that is sent by a second client device according to the target service random code; identifying the first account by using the operation response; and sending account information of the first account to the second client device, so that the second client device completes the service operation based on the account information. In embodiments of the present application, a service processing process is completed based on a service random code that is generated by a service server in real time; therefore, security is relatively high, and interference from the external natural environment is avoided, and reliability of service processing can be effectively improved. | 2017-09-28 |
20170279926 | ACCURATE NETWORK POWER ESTIMATIONS TO IMPROVE PERFORMANCE IN LARGE DISTRIBUTED COMPUTER SYSTEMS - Systems, apparatuses and methods may provide for a plurality of node-level agents, wherein each node-level agent aggregates network statistics information from a plurality of probes associated with a communications interface. Additionally, one or more job-level agents may be communicatively coupled to the plurality of node-level agents, wherein each job-level agent aggregates network statistics information from two or more of the node-level agents. Moreover, a system-level agent may be communicatively coupled to the job-level agent(s). The system-level agent may generate a power model based on aggregated network statistics information from the job-level agent(s) and propagate the power model to the node-level agents via the job-level agent(s). | 2017-09-28 |
20170279927 | Robust Suspension and Resumption of Desktop Virtualization - A method for suspending and resuming a connection for desktop virtualization between two computing devices. In response to a client computing device shutting down, suspending, hibernating, or losing network connectivity during virtualization, the server computing device may itself shut down, suspend, or hibernate, or may pause or suspend the operation of one or more applications currently hosted by the server computing device. The server may detect that connectivity has been restored and resume operation of hosted applications. Alternatively, the client may transmit a command to the server indicating that the client is ready to resume virtualization. The client may also be configured to transmit a command that may cause the server to resume a powered-on state after the server was shut down or in a state of hibernation. | 2017-09-28 |
20170279928 | PRE-FORMED INSTRUCTIONS FOR A MOBILE CLOUD SERVICE - Methods, systems, and computer readable mediums are disclosed for introducing pre-formed instruction sets to a mobile cloud service. In some examples, an archive file, such as a .zip file, can include two sets of files: 1) logic for creating an application programming interface (API) and connecting the API with backend service behind a corporate enterprise network's firewall, and 2) custom user-code. In such examples, the API can connect through defined channels to the back end service. In some examples, the custom user code can execute in a secure virtual machine (VM) on the cloud service. In such examples, the custom user code can perform error checks on data, recalculate or reformat data, or otherwise modify it before sending to a user's mobile device or receiving from a user's device. | 2017-09-28 |
20170279929 | HIGH-PERFORMANCE WEB SERVER, PROTOCOL AND CLIENT - A protocol, server and client producing high performance web service with security and lower power requirements. A web protocol retrofits web browsers with a translating program on the client to relay the messages to the server with less bandwidth. Optionally, the protocol is embedded within a custom browser to communicate directly, eliminating translation and layers of programming. By storing web pages in a binary format and skipping the intermediate representation of HTML, CSS, and JavaScript the size of the web page, and the time it takes to display it can be reduced. The elimination of JavaScript also increases security because JavaScript is a known, common source of attacks. Communication of static data is minimized. A key repository and automated client use thereof may eliminate manual entry and transmission of access credentials making phishing attacks impossible. | 2017-09-28 |
20170279930 | NETWORK DEVICE AND INFORMATION PROCESSING METHOD - For information processing, a network device includes a first communication component that is connected with a server via a first type of access network, and performs an information interaction with the server. The network device further includes a second communication component that is connected to the first communication component. The second communication component connects with at least one terminal device and performs an information interaction with the at least one terminal device by sending information based on an information interaction with the server. | 2017-09-28 |
20170279931 | COMPRESSION DICTIONARY SYSTEMS AND METHODS - In one aspect, the disclosure teaches a system configured to receive from a device a request for content including an identifier of a first set of dictionaries available locally at the device. The system is also configured to select a second set of dictionaries to compress content requested by the device based at least on the set of dictionaries available at the device, the second set of dictionaries selected from a third set of local system dictionaries available at the system. | 2017-09-28 |
20170279932 | COMPRESSION DICTIONARY GENERATION SERVICE SYSTEM AND METHOD - A system for dictionary generation that can generate a set of candidate dictionaries based at least in part on subsets of content, where candidate dictionaries of the set of candidate dictionaries are generated based at least in part on a different subset of the content. The system can further use candidate dictionaries of the set of candidate dictionaries to compress the content and can identify one or more dictionary quality metrics for candidate dictionaries of the set of candidate dictionaries based at least in part on the respective compression of the content by candidate dictionaries of the set of candidate dictionaries. | 2017-09-28 |
20170279933 | COMPRESSION DICTIONARY SNAPSHOT SYSTEM AND METHOD - A system configured to generate a set of compression dictionary snapshots. The system can determine a subset of a set of compression dictionary definitions, the subset having a first subset comprising one or more definitions that have changed since a time of a previous snapshot and a second subset having one or more definitions associated with a predetermined portion of the dictionary. The system can further generate and store snapshots based at least in part on the determined subset of one or more definitions and determine a plurality of active snapshots from the set of snapshots such that the set of one or more definitions is included in the plurality of active snapshots. | 2017-09-28 |
20170279934 | DATA COMPRESSION FOR CELLULAR INTERNET OF THINGS (CIOT) - Aspects of the present disclosure provide techniques for compressing data packets for cellular internet of things (CIoT) communications. An example method generally includes establishing at least one prefill buffer common to one or more UEs, wherein the prefill buffer includes a plurality of common strings, generating a compressed packet by finding matches to the common strings in at least one of a header portion or payload portion of the packet and associating identifiers with the common strings, and transmitting the packet. | 2017-09-28 |
20170279935 | Systems and Methods for Establishing Asymmetric Network Communications - A method of establishing an asymmetric network between at least one node device and a gateway device is provided. The method may include transmitting a reduced data package from the node device, receiving the reduced data package in a data stream at the gateway device, validating bits of the data stream, and retrieving the reduced data package based on the validated bits. | 2017-09-28 |
20170279936 | UNIVERSAL FRAMEWORK FOR CONNECTIVITY OF DEVICES AND DEVELOPMENT TOOLS - Methods and systems for a universal framework for connectivity of devices and developer tools are disclosed. A network device is detected at an engine. Data is received from the network device at the engine via a first protocol wherein the data comprises metadata. The metadata is converted from the first protocol to a plurality of protocols at the engine. A universal framework is provided at the engine to make the metadata available via the plurality of protocols. The metadata is sent from the universal framework to an external device via a specified protocol requested by the external device. In one embodiment, developer tools are provided for developing objects using said universal framework. | 2017-09-28 |
20170279937 | METHOD AND DEVICE FOR TRANSLATION BETWEEN IPV4 AND IPV6 - A method for the translation between IPv4 and IPv6 is disclosed, including: a BIH link tracker and quick translator are provided in a network core and when a link is established between an IPv4 client and IPv6 server, a standard translator translates and sends to the IPv6 server, a packet sent from the IPv4 client to the IPv6 server, and the | 2017-09-28 |
20170279938 | PACKET PROCESSING METHOD AND APPARATUS - A packet processing method and an apparatus are provided. A first SFC proxy of a first SF entity splits a first packet to obtain a first original packet and a first SFC header, and the first SFC proxy sends the first SFC header to a second SFF. The first SF entity processes the first original packet to obtain a second original packet, and sends the second original packet to a service classifier. The service classifier sends, to the second SFF, a second packet that is obtained after the service classifier adds a second SFC header to the second original packet. The second SFF changes the second SFC header in the second packet into the first SFC header. In this way, a first packet carrying a first SFC header can be transmitted in a network architecture in which a legacy SF exists, so that the legacy SF becomes compatible. | 2017-09-28 |
20170279939 | METHOD AND APPARATUS FOR CONFIGURING TERMINAL CAPABILITY SET - Provided are a method and apparatus for configuring a terminal capability set. In the above-mentioned method, a ControLling mUltiple streams for tElepresence (CLUE) encoding parameter is configured in a terminal capability set, and the terminal capability set is transmitted. According to the technical solution provided in the technical solution, new demands of a telepresence system can be met, and a telepresence product can be supported. | 2017-09-28 |
20170279940 | SOFTWARE DEFINED NETWORK-BASED DATA MANAGEMENT METHOD AND SYSTEM, AND COMPUTER STORAGE MEDIUM - The disclosure provides a Software Defined Network (SDN)-based data management method and system, and a computer storage medium. The method includes: a client and a proxy server perform capability negotiation therebetween; when it is determined through the capability negotiation that both the client and the proxy server support the operable-ephemeral data capability, the client sends to the proxy server a retrieving or modifying operation message; and the proxy server receives the operation message and performs a corresponding operation on the data of an ephemeral data set according to the operation message. | 2017-09-28 |
20170279941 | METHOD, APPARATUS, AND SYSTEM FOR MANAGING TERMINAL DEVICE IN PASSIVE OPTICAL NETWORK - The present invention provides a method for managing a terminal device in a PON network. When a layer 3 network between an OLT and an ONU is disconnected, a layer 2 channel is established between the OLT and the ONU by extending an OAM protocol, and the ONU is managed by using the layer 2 channel. In this way, maintenance personnel do not need to go to a site to perform commissioning, and therefore, maintenance costs can be reduced. | 2017-09-28 |
20170279942 | MOBILE DEVICE - The present invention relates to a mobile device. A mobile device, according to an embodiment, comprises: a first main body which has a display unit having an image output on one side thereof; a second main body which is positioned at a predetermined distance away from the first main body and has a substrate unit, inside which an electronic component is mounted, and a power source battery for supplying a power source; and a connecting member which electrically connects the first main body and the second main body on the lower ends of the first main body and the second main body. The connecting member comprises: a body portion which forms the external shape; a mounting portion which is provided on the upper side of the body portion and has the first main body and the second main body placed thereon; a flexible substrate which is placed on the inside of the body portion and electrically connects the first main body and the second main body; and terminals which are formed on both end portions of the flexible substrate, are externally protruded from the mounting portion, and which are coupled to the first main body and the second main body, respectively. | 2017-09-28 |
20170279943 | HOUSING FEATURES OF AN ELECTRONIC DEVICE - An enclosure and a method for forming an enclosure are disclosed. The enclosure may be formed from metal, such as aluminum, and further include a non-metal portion allowing for transmission and receipt of electromagnetic waves. The non-metal portion may be interlocked to the enclosure and in particular, to a region within the enclosure including a first material having a relatively high strength and stiffness compared to the non-metal portion. Interlocking means may include forming dovetail cuts into the enclosure to receive the non-metal portion, a hole or cavity drilled into the enclosure which includes internal threads, and a rod inserted into the first material to provide a tension to the non-metal portion. Methods of assembling internal components using anodization are also disclosed. | 2017-09-28 |
20170279944 | MOBILE DEVICE SHADE - A mobile device shade apparatus includes a case defining a pocket and at least one panel configured to travel in and out of the pocket to transition between a stowed state and a deployed state, wherein in the deployed state that at least one panel extends from and is rotatable with respect to an edge of the case. The apparatus also includes a coupler configured to couple the case to a mobile device, such as a cell phone or tablet, as examples. | 2017-09-28 |