40th week of 2021 patent applcation highlights part 72 |
Patent application number | Title | Published |
20210314341 | Determining Multiple Ways for Compromising a Network Node in a Penetration Testing Campaign - Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack. | 2021-10-07 |
20210314342 | SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR EXECUTING A WEB APPLICATION SCAN SERVICE - Systems, methods, and computer-readable media for performing web app scans of an application are provided. Telemetry events derived from the web app scan are intercepted by a runtime that has been instrumented in conjunction with the application. The telemetry events are collected and transmitted to a platform that analyzes the collected events and presents information based on the analysis. | 2021-10-07 |
20210314343 | SYSTEM AND METHOD FOR IDENTIFYING CYBERSECURITY THREATS - The invention relates to a computer-implemented system and method for automatic collection, analysis and reporting of data relating to a cybersecurity threat. The method may comprise the steps of: presenting an interface through which an executable can be configured and automatically generated; transmitting the executable to a client to enable the client to execute the executable on client systems to automatically collect forensic data; receiving from the client an encrypted data package that includes the forensic data; using a forensic toolset to automatically analyze the forensic data; presenting an option to select one or more of at least two types of output reports designed for different types of readers; inputting the analysis files into an automatic report generator to automatically generate the types of output reports selected by the client; and sending the output reports selected by the client to the client. | 2021-10-07 |
20210314344 | NETWORK ISOLATION BY POLICY COMPLIANCE EVALUATION - An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network. | 2021-10-07 |
20210314345 | Generating Vulnerability Exposure Scores in a Segmented Computing Environment - A segmentation server generates vulnerability exposure scores associated with workloads operating in a segmented computing environment. The segmentation server may automatically aggregate the vulnerability exposure scores in various ways to generate vulnerability exposure information representative of workloads in an administrative domain controlled by the segmentation server. The aggregated vulnerability exposure information may be presented in a manner that enables an administrator to easily evaluate different segmentation strategies and assess the risks associated with each of them. Moreover, the segmentation server can automatically generate a segmentation policy that modifies a configured segmentation strategy based on the vulnerability exposure scores to reduce exposure to certain vulnerabilities without impeding operation of the workloads. | 2021-10-07 |
20210314346 | GENERATING A SEGMENTATION POLICY BASED ON VULNERABILITIES - A segmentation server generates vulnerability exposure scores associated with workloads operating in a segmented computing environment. The segmentation server may automatically aggregate the vulnerability exposure scores in various ways to generate vulnerability exposure information representative of workloads in an administrative domain controlled by the segmentation server. The aggregated vulnerability exposure information may be presented in a manner that enables an administrator to easily evaluate different segmentation strategies and assess the risks associated with each of them. Moreover, the segmentation server can automatically generate a segmentation policy that modifies a configured segmentation strategy based on the vulnerability exposure scores to reduce exposure to certain vulnerabilities without impeding operation of the workloads. | 2021-10-07 |
20210314347 | SELECTING ACTIONS RESPONSIVE TO COMPUTING ENVIRONMENT INCIDENTS BASED ON SEVERITY RATING - Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects. | 2021-10-07 |
20210314348 | CLASSIFIER BYPASS BASED ON MESSAGE SENDER TRUST AND VERIFICATION - In some embodiments, techniques for computer security comprise receiving an email message; determining a sender of the email message; determining whether the sender of the email message is trusted, wherein determining whether the sender of the email message is trusted includes determining whether the sender of the email message is associated with a whitelist; retrieving domain-related information by performing a DNS query on a domain associated with the sender; based at least in part on the domain-related information, determining whether the sender of the email message is verified; determining whether the sender is both trusted and verified; and when it is determined that the sender is both trusted and verified, treating the email message as trustworthy, wherein treating the email message as trustworthy includes bypassing a classifier. | 2021-10-07 |
20210314349 | SYSTEMS AND METHODS CONFIGURING A UNIFIED THREAT MACHINE LEARNING MODEL FOR JOINT CONTENT AND USER THREAT DETECTION - A machine learning-based system and method for identifying digital threats includes a threat service that: implements a unified threat model that produces a unified threat score that predicts both of: a level of threat of a piece of online content, and a level of threat that a target user will create a harmful piece of online content; wherein: implementing the unified threat model includes: receiving event data comprising historical content data for the target user and content data of the pending piece of online content and historical user digital activity data and real-time user activity data; and providing input of content feature data and user digital activity feature data to the unified threat model; and the unified threat model produces the unified threat score based on the content and the user digital activity data; and computes a threat mitigation action based on an evaluation of the threat score. | 2021-10-07 |
20210314350 | DETECTING REPLAY ATTACKS USING ACTION WINDOWS - An example system includes a processor to receive a current session and previous sessions associated with an account. The processor can split the current session and the previous sessions into action windows. The processor can calculate a window similarity score for each action window of the current session using a pair-wise comparison with action windows of each of the previous sessions. The processor can aggregate the window similarity scores to generate a replay likelihood score for the current session with respect to each of the previous sessions. The processor can classify the current session as a replay attack in response to detecting that a replay likelihood score of the current session exceeds a threshold. | 2021-10-07 |
20210314351 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SOFTWARE-BASED EMULATION OF MEDIA ACCESS CONTROL SECURITY (MACsec) - A method for software-based emulation of media access control security (MACsec) includes generating, using a software-based emulated MACsec packet generator, a plurality of emulated MACsec packets, each of the emulated MACsec packets including a MACsec header having a packet number field value that remains fixed across the emulated MACsec packets. The method further includes configuring a device under test to accept plural MACsec packets with the same MACsec packet number field value. The method further includes transmitting the emulated MACsec packets to the device under test (DUT). The method further includes determining whether the DUT responds correctly to the emulated MACsec packets given a replay protection configuration of the DUT. The method further includes generating test output based on a result of the determination. | 2021-10-07 |
20210314352 | Detection of User Interface Imitation - Techniques are disclosed relating to generating trained machine learning modules to identify whether user interfaces accessed by a computing device match user interfaces associated with a set of Internet domain names. A server computer system receives a set of Internet domain names and generates screenshots for user interfaces associated with the set of Internet domain names. The server computer system then trains machine learning modules that are customized for the set of Internet domain names using the screenshots. The server then transmits the machine learning modules to the computing device, where the machine learning modules are usable by an application executing on the computing device to identify whether a user interface accessed by the device matches a user interface associated with the set of Internet domain names. Such techniques may advantageously allow servers to identify whether user interfaces are suspicious without introducing latency and increased page load times. | 2021-10-07 |
20210314353 | RULE-BASED DYNAMIC SECURITY TEST SYSTEM - A website anomaly test is performed by automatically checking that a website has not been compromised by malicious code. A system can test a dynamic behavior of a website that indicates a functional user flow through the website. A set of rules are applied against a log of dynamic behavior of the website, as well as static code of the website, to identify potential compromise by malicious scripts. | 2021-10-07 |
20210314354 | TECHNIQUES FOR DETERMINING THREAT INTELLIGENCE FOR NETWORK INFRASTRUCTURE ANALYSIS - Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital assets. The network analytic system can detect and track a relationship between assets based on one or more attributes related or shared between any given assets. The network analytic system can analyze network-based digital assets to determine information about a website (e.g., information about electronic documents, such as web pages) that has be used to detect phishing and other abuse of the website. The network analytic system can analyze data about network-based assets to determine whether any are being used or connected to use of unauthorized or malicious activity or known network-based assets. Based on the relationship identified, the network analytic system can associate or link assets together. The network analytic system may provide an interface to view data sets generated by the network analytic system. | 2021-10-07 |
20210314355 | MITIGATING PHISHING ATTEMPTS - Credential phishing attack mitigation is disclosed. A URL that is associated with a suspected credential phishing web page is received. The suspected credential phishing web page is one that includes at least one element soliciting at least one credential. The URL is included in a message having at least one intended recipient. An artificial credential is provided to the suspected credential phishing web page. An indication is received that, subsequent to providing the artificial credential to the suspected credential phishing web page, an attempted use of the artificial credential to access a resource was made. In response to receiving the indication that the attempted use of the artificial credential to access the resource has been made, at least one remedial action is taken with respect to the suspected credential phishing web page. | 2021-10-07 |
20210314356 | METHODS AND SYSTEMS FOR HONEYFILE CREATION, DEPLOYMENT AND MANAGEMENT - A method for automatically creating a honeyfile for a file system, includes the steps of: surveying a file set of the file system to identify tokenisable data in the file set, tokenising the identified tokenisable data to form a plurality of token sequences, and either selecting one of the plurality of token sequences or generating a token sequence to operate as an exemplar token sequence; applying a substitution method to substitute the tokens of the exemplar token sequence with replacement tokenisable data; and packaging the replacement tokenisable data into a honeyfile. | 2021-10-07 |
20210314357 | SECURE TRAFFIC OPTIMIZATION IN AN EDGE NETWORK - A client application establishes a connection between the client application and an origin server over one or more networks. The application generates a request to establish a secure session with the origin server over the connection. The request includes information, in a header of the request, that flags traffic sent during the secure session to a network of the one or more networks as subject to one or more optimizations performed by the network. Subsequent to establishing the secure session, the application encrypts the traffic in accordance with the secure session and sends the traffic to the origin server over the connection, subject to the one or more optimizations. The infrastructure service applies the one or more optimizations to the traffic as it passes through the edge network to the origin server. | 2021-10-07 |
20210314358 | SITE AWARE POLICY-BASED PROXIMITY ROUTING AND POLICY-BASED PROXIMITY ROUTING - In some embodiments, a method receives, by a first network device, a packet from a first workload that is located in first site. The first site includes stretched networks across a second site and a third site. The packet includes a destination IP address for a device in the second site. The method determines that the destination IP address does not match an eligible route in a routing table. The first workload was migrated from the second site to the first site and is located on a stretched network between the first site and the second site. A site identifier associated with the first workload is determined where the site identifier identifies the second site. The method selects a site policy based on the site identifier and uses the site policy to send the packet through a layer 2 channel to the second network device in the second site. | 2021-10-07 |
20210314359 | EFFICIENT ENCRYPTION IN VPN SESSIONS - Methods, apparatus, and software for efficient encryption in virtual private network (VPN) sessions. A VPN link and an auxiliary link (and associated sessions) are established between computing platforms to support end-to-end communication between respective application running on the platforms. The VPN link may employ a conventional VPN protocol such as TLS or IPsec, while the auxiliary link comprises a NULL encryption VPN tunnel. To transfer data, a determination is made to whether the data are encrypted or non-encrypted. Encrypted data are transferred over the auxiliary link to avoid re-encryption of the data. Non-encrypted are transferred over the VPN link. TLS and IPsec VPN agents may be used to assist in setting up the VPN and auxiliary sessions. The techniques avoid double encryption of VPN traffic, while ensuring that various types of traffic transferred between platforms is encrypted. | 2021-10-07 |
20210314360 | SYSTEM AND METHOD FOR THE DETECTION OF WEBSITE CONTENT THEFT - A system and method may detect the copying of all or part of a webpage or website and may report the ripping and an identification related to a processor that runs the ripped website content. A database of copying events, including the identification of processors involved in running copied content, may be established and maintained. Alerts to the copying may be transmitted to a plurality of processors. | 2021-10-07 |
20210314361 | DEFINING AND USING SERVICE RULES THAT REFERENCE ENDPOINT GROUP IDENTIFIERS - Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML, files. | 2021-10-07 |
20210314362 | CROSS-SERVICE RULEBOOK MANAGEMENT IN A DYNAMIC AND ADVERSARIAL ENVIRONMENT - Performing a networked transaction with proof of honesty is described. An identity credential is generated for a user based on an underlying secret associated the user. The identity credential is augmented with Rulebook credentials, and proof of honesty based thereon is conveyed to another user. On this basis, the user is permitted to transact with the other user in connection with the proof of honesty. | 2021-10-07 |
20210314363 | RESOURCE DE-DUPLICATOR FOR DATA-PROVIDER AGNOSTIC CLOUD SECURITY TOOL - A device determines that a policy is to be executed. The device retrieves rules, resource identifiers, and data provider identifiers associated with the policy, generates a pending rules data structure and populates the pending rules data structure with identifiers of the retrieved rules and their respective necessary resources as indicated by the resource identifiers. The device generates a pending resources data structure with the resource identifiers and their respective data providers, collects, asynchronously, each resource, and, as each respective resource is collected, deletes the respective resource from the pending resources data structure and populates a collected resources data structure with an identifier of the respective resource. The device determines whether the collected resources data structure includes identifiers of all resources needed to execute a rule, and executes individual ones of the retrieved rules as it is determined that their corresponding resources have identifiers populated in the collected resources data structure. | 2021-10-07 |
20210314364 | DATA PROCESSING SYSTEMS FOR DATA-TRANSFER RISK IDENTIFICATION, CROSS-BORDER VISUALIZATION GENERATION, AND RELATED METHODS - A data transfer analysis system is disclosed that analyzes data transfer log entries to determine whether a data transfer is authorized. The system determines information about the data assets involved in the data transfer (e.g., network address, geographical location, etc.) and uses a data map to determine if data transfers are authorized between the two data assets. If not, the system may take one or more actions, such as generating a notification, terminating the data transfer, restricting the access of the user that initiated the transfer, modifying network communications capabilities between the assets to prevent future transfers, and storing metadata that can be used to prevent future such transfers. | 2021-10-07 |
20210314365 | END-TO-END DEVICE ATTESTATION - Various examples of device and system implementations and methods for performing end-to-end attestation operations for multi-layer hardware devices are disclosed. In an example, attestation operations are performed by a verifier, including: obtaining layered attestation evidence regarding a state of a compute device, with the layered attestation evidence including attesting evidence provided from a second hardware layer of the compute device, such that the attesting evidence provided from the second hardware layer is generated from attesting evidence provided from a first hardware layer of the compute device to the second hardware layer of the compute device; obtaining endorsement information relating to the layered attestation evidence for the state of the compute device; determining an appraisal policy for performing attestation of the compute device from the layered attestation evidence; and applying the appraisal policy and the endorsement information to the layered attestation evidence, to perform attestation of the compute device. | 2021-10-07 |
20210314366 | Network Security System Using Statistical Object Identification - Apparatus to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached authentication devices is disclosed. The authentication device may use Statistical Object Identification to perform the authentication. The present disclosure greatly reduces the resources needed by the network endpoint device to perform the authentication and eliminates the topological restrictions found in traditional network appliance based approaches. | 2021-10-07 |
20210314367 | Secure Web Container for a Secure Online User Environment - Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services. | 2021-10-07 |
20210314368 | DATA-PROVIDER AGNOSTIC CLOUD SECURITY TOOL - A device determines that a policy is to be executed. The device retrieves rules, resource identifiers, and data provider identifiers associated with the policy. The device asynchronously retrieves resources from data providers that are called for by the rules, and executes each of the rules as their corresponding resources are retrieved. The device identifies a group of rules that have failed. The device calculates a risk score for each rule of the group and generates an alert for each rule of the group. The device outputs a report including each alert, each of the alerts being prioritized in the report based on the risk score of their corresponding rule. | 2021-10-07 |
20210314369 | ELECTRONIC DEVICE AND METHOD FOR MAINTAINING CALL FUNCTION IN ELECTRONIC DEVICE - According to various embodiments, an electronic device may include at least one antenna module; and at least one processor configured to receive a communication service from a first communication network, a second communication network, and an IP multimedia subsystem (IMS) network via the at least one antenna module, wherein the at least one processor may be configured to: access the first communication network based on first identification information which corresponds to the first communication network, via the accessed first communication network, based on second identification information which corresponds to the IMS network, request the IMS network to register the electronic device, if registration request to the IMS network fails, access the second communication network, and request the IMS network to register the electronic device via the second communication network. Other various embodiments are possible. | 2021-10-07 |
20210314370 | SUPPORT REQUEST ASSIGNMENT USING PACE OF CONVERSATION - Aspects discussed herein include a computer-implemented method comprising receiving a support request from a user, and during a current support session responsive to the support request, performing textual analysis of one or more inputs provided by the user during one or both of: (i) the current support session and (ii) one or more previous support sessions. The method further comprises applying one or more features determined by the textual analysis to a model to classify the user into a first class of a predefined plurality of classes that describe a pace of conversation during the current support session. The method further comprises, based on the classification of the user, assigning the support request to be fulfilled by a first operator of a predefined plurality of support operators. | 2021-10-07 |
20210314371 | NETWORK-BASED MEDIA PROCESSING (NBMP) WORKFLOW MANAGEMENT THROUGH 5G FRAMEWORK FOR LIVE UPLINK STREAMING (FLUS) CONTROL - A method, computer program, and computer system is provided for establishing Network-Based Media Processing (NBMP) workflow through 5G Framework for Live Uplink Streaming (FLUS) control. A plurality of sinks and network capabilities of a network platform are discovered through a plurality of 5G FLUS discovery and capabilities mechanisms. An NBMP workflow is created, updated, retrieved, and deleted through a control interface comprising a FLUS source and a FLUS sink, whereby the 5G FLUS control is extended to support tunneling information between an NBMP source and an NBMP workflow manager. | 2021-10-07 |
20210314372 | APPARATUS, METHOD AND COMPUTER PROGRAM FOR CALL SESSION CONTROL FUNCTION RESTORATION - There is disclosed an apparatus. The apparatus comprises means for performing: initiating restoration of the apparatus after a restart of the apparatus, the initiating restoration being in response to receipt of a session initiation message at the apparatus; sending a request to a home subscriber server for a service profile of a user equipment from which the session initiation message originated, the request comprising a wildcard public identity of the user equipment; and completing restoration of the apparatus using service profile information received from the home subscriber server in response to the request. | 2021-10-07 |
20210314373 | PROVIDING SURVIVABLE CALLING AND CONFERENCING - Disclosed herein are system, apparatus, method and/or computer program product embodiments for providing survivable calling and conferencing. An embodiment operates by providing, by a first server, a first sub-conference to a plurality of user devices over first lines. The first sub-conference is combined with a second sub-conference to form a collective conference of the plurality of user devices. The first server accesses the conference. A second server is configured to provide the second sub-conference of the collective conference to the plurality of user devices over second lines, the first and second lines being distinct from each other. The collective conference may provide resilient and reliable sharing of information among participants and may leverage dispersed elements or diverse links simultaneously without impediments of echoes, loops, or other impacts. | 2021-10-07 |
20210314374 | METHOD FOR DISPLAYING OBJECT IN TIMELINE AREA, OBJECT DISPLAY DEVICE, AND INFORMATION RECORDING MEDIUM HAVING RECORDED THEREON PROGRAM FOR IMPLEMENTING SAID METHOD - A method for displaying objects on a timeline area does not lower user retention and can increase the CVR. The present disclosure provides a method for displaying objects on a timeline area, including the steps of an object display device that manages a timeline of communication messages for a user of a Web service determining whether the user has taken an action within a predetermined time period on the timeline area of the Web service, displaying a first object on the timeline area when determining that the user has not taken the action, and displaying a second object that differs from the first object on the timeline area when determining that the user has taken the action. | 2021-10-07 |
20210314375 | MODERATOR CHANGE FOR AN EXISTING MEETING INVITE - The technology disclosed herein enables the moderator of a meeting invite to be changed to a different moderator. In a particular embodiment, a method provides, in a meeting control system, receiving a first request to change a moderator of a first meeting invite. The first meeting invite includes two or more participants and the two or more participants include a first moderator indicated for the first meeting invite. In response to determining that the first request is associated with a user allowed to change the moderators of the first meeting invite, the method provides modifying the first meeting invite to indicate a second moderator for the first meeting invite and including the second moderator in the two or more participants. | 2021-10-07 |
20210314376 | INFORMATION TERMINAL, CONTROL APPARATUS, EXTERNAL APPARATUS, AUTHENTICATION PROCESSING SYSTEM, AND AUTHENTICATION METHOD - An information terminal includes at least one control apparatus, at least one imaging unit, at least one communication unit, and at least one operation unit. The control apparatus is configured to perform a process of acquiring identification information of an external apparatus by analyzing an image including the identification information of the external apparatus wherein the image is obtained by the imaging unit by imaging the identification information displayed on the external apparatus, a process of, via the communication unit, transmitting information, which is to be used in an authentication process and which is input via the operation unit, to an authentication server and receiving key information from the authentication server, and a process of transmitting the key information by using the identification information to the external apparatus via the communication unit. | 2021-10-07 |
20210314377 | System and Method for Streaming Content from Multiple Servers - A system and a method for media streaming from multiple sources are disclosed. A content requesting client device accesses a server to receive a list of available sources that may include multiple Content Delivery Networks (CDNs) and independent servers. Based on a pre-set criteria, such as the source delivery performance and cost, the client device partitions the content into parts, allocates a source to each part, and simultaneously receives media streams of the content parts from the allocated sources. The server may be a Video-on-Demand (VOD) server, and the content may be a single file of a video data, such as a movie. The delivery performance of the used sources is measured during the streaming for updating the partition or the allocation. The updated measured performance may be stored locally at the client device, or at a server for use by other clients. The client actions may be implemented as a client-side script. | 2021-10-07 |
20210314378 | MEDIA DELIVERY NOTIFICATION DATA INGESTION AND DISPLAY - A facility for generating analytical information based on individual reports of multiple scheduled presentations of interstitial media assets is provided. Data files are received, each including multiple status reports regarding multiple scheduled presentations of multiple media assets by a plurality of distinct media receiver devices in multiple disparate locations. The data files are decrypted, such that the decrypted one or more data files include, for each of the multiple status reports, at least a media asset identifier and a presentation status indicator, and parsed to generate one or more database entries containing information regarding the scheduled media presentations and the plurality of distinct media receiver devices. One or more user interfaces are provided to allow execution of queries based on the generated one or more databases. | 2021-10-07 |
20210314379 | SPLIT RENDERING USING NETWORK BASED MEDIA PROCESSING WORKFLOW - Systems and methods for split rendering of Network Based Media Processing (NBMP) are provided. A method includes deriving a network based media processing (NBMP) workflow, and assigning a plurality of workflow tasks of the NBMP workflow among a media sink, a media source, and at least one cloud element, network element, or edge element. A first subset of the plurality of the workflow tasks are assigned to the media source, a second subset of the plurality of the workflow tasks are assigned to the media sink, and a third subset of the plurality of the workflow tasks are assigned to the at least one cloud element, network element, or edge element. The first subset, the second subset, and the third subset do not overlap with each other. | 2021-10-07 |
20210314380 | SERVER, METHOD AND USER DEVICE FOR PROVIDING VIRTUAL REALITY CONTENT - A content providing server provides virtual reality content. The content providing server includes a requesting unit configured to receive a request for virtual reality content from a user device; a dynamic object image processing unit configured to render an image of a dynamic object contained in the virtual reality content; a static object image processing unit configured to render an image of a static object contained in the virtual reality content; and a streaming unit configured to separately stream the image of the dynamic object and the image of the static object to the user device. | 2021-10-07 |
20210314381 | SYSTEM AND METHOD FOR INTERLEAVED MEDIA COMMUNICATION AND CONVERSION - A method or system configured for receiving a first single data stream representing a first multimedia file, the first single data stream including an interleaved sequence of data elements of a plurality of media, and/or transmitting a second single data stream representing a second multimedia file, the second single data stream including an interleaved sequence of data elements of said plurality of media, where the second multimedia file differs from said first multimedia file by at least one data element of a selected medium extracted from said first multimedia file, and/or by at least one data element of a selected medium added to the first multimedia file, and/or by at least one data element of a selected medium added to the first multimedia file being a converted version of the at least one data element of a selected medium extracted from the first multimedia file. | 2021-10-07 |
20210314382 | SYSTEM AND METHOD OF PRESENTING RICH MEDIA CONTENT - A system for presenting a rich media content. The system includes at least one user display device with a computing hardware configured to execute a software product thereon and a server arrangement with at least an analysis server coupled via a data communication network for communicating the rich media content to the at least one user display device. The executed software product is operable to enable interaction between the at least one user display device and a user of the at least one user display device; communicate with the server arrangement via the data communication network; detect information about hardware and web portal characteristics of the at least one user display device and communicate the information about hardware and web portal characteristics to the analysis server in the server arrangement for determine unique content delivery parameters. | 2021-10-07 |
20210314383 | Maximum Sustainable Encoding Bit Rates for Video Downloads - Described embodiments include a system that includes a network interface and a processor. The processor is configured to identify, via the network interface, a state of congestion in a communication channel between a base station belonging to a cellular network and a client device, to calculate, responsively to the state of congestion, a maximum sustainable encoding bit rate (MSEBR) for a video that is being downloaded by the client device, from a server, via the communication channel, the video being encoded at a plurality of different predefined bit rates, and to inhibit the client device, in response to calculating the MSEBR, from downloading a segment of the video that is encoded at any one of the predefined bit rates that exceeds the MSEBR. Other embodiments are also described. | 2021-10-07 |
20210314384 | SYSTEMS AND METHODS FOR PRIORITIZED SIP SERVICES USING UE-SPECIFIED SIP REGISTER MESSAGES - A system described herein may provide for the prioritization of Session Initiation Protocol (“SIP”) messages, transmitted by a User Equipment (“UE”), based on a priority class indicator (“PCI”) included in a registration message (e.g., a SIP REGISTER message) from the UE. The PCI may be included in a contact header, a SIP contact Uniform Resource Identifier (“URI”), and/or some other portion of the registration message. A Universal Integrated Circuit Card (“UICC”) may store information indicating the priority class (e.g., in an Access Control Class (“ACC”) Elementary File (“EF”)). One or more network components, such as a Call Session Control Function (“CSCF”) may prioritize SIP messages from the UE based on the priority class indicator included in the registration message by the UE. | 2021-10-07 |
20210314385 | INTEGRATION OF HYPER CONVERGED INFRASTRUCTURE MANAGEMENT WITH A SOFTWARE DEFINED NETWORK CONTROL - Systems, methods, and computer-readable for integrating a Hyper Converged Infrastructure (HCI) management platform with a Software Defined Wide Area Network (SDWAN) controller at a network site connected to a Software Defined Wide Area Network (SDWAN) through one or more edge devices include receiving an indication associated with a Hyper Converged Application at a the HCI management platform. The indication may be based on an availability of the Hyper Converged Application at the network site. Based on resources available at the network site, the HCI management platform or the SDWAN controller can determine whether the Hyper Converged Application can be shared with one or more network devices connected to the SDWAN, and the Hyper Converged Application can be advertised as being available for sharing with the one or more network devices if it is determined that the Hyper Converged Application can be shared with the one or more network devices. | 2021-10-07 |
20210314386 | SYSTEM AND METHOD FOR DATA TRANSFER, INCLUDING PROTOCOLS FOR USE IN DATA TRANSFER IN A CONTENT MANAGEMENT ENVIRONMENT - Embodiments of a service based data transfer system are disclosed herein. Embodiments may of such a data transfer system may include a data transfer server providing a common data transfer interface such as a services interface that may be called by a client device to transfer data files to, or retrieve data files from a content management system. | 2021-10-07 |
20210314387 | VOICE OPERATED CONTROL DEVICE - A wireless hub is configured to receive device identification information for each of a plurality of different devices. The wireless hub is further configured to access a database and obtain command codes for controlling the different devices and to transmit command codes based on the obtained command codes to control the different devices. The wireless hub is configured, in response to detect a gesture using motion detection of a user of the wireless hub, to control presentation of video content by a video display. | 2021-10-07 |
20210314388 | VIRTUAL LOAD-BALANCED SERVICE OBJECT - Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files. | 2021-10-07 |
20210314389 | AUTOMATIC APPLICATION SCALING BETWEEN PRIVATE AND PUBLIC CLOUD PLATFORMS - Methods, systems, and computer program products are provided that automatically scale an application between private and public cloud computing platforms, while simultaneous enforcing policies ensuring private data is persistently stored on the private cloud computing platform, but not the public cloud computing platform. A traffic manager on the public platform routes traffic to instances of a web app executing on a private platform. A traffic monitor on the private platform monitors performance criteria of the private platform, and reports traffic telemetry to the traffic manager. Based on the traffic telemetry, the traffic manager may instantiate one or more instances of the web app on the public platform to handle traffic. Private data gathered by such instantiated instance(s) is persisted to storage in the private platform, but not in the public platform. | 2021-10-07 |
20210314390 | SERVER SYSTEM AND METHOD OF MANAGING SERVER SYSTEM - A server system including a first server to execute first role, other server to execute at other role, spare server and management layer server. The management layer server is configured to allocate first group of users to access first server and other group of users to access other server, receive status information sent by first server and status information sent by other server, analyse status information to determine an operational status of first server and operational status of other server, update role of spare server to first role when operational status of first server indicates failed state and reallocate first group of users to the spare server, and update a role of another spare server to the other role when the operational status of the other server indicates a failed state and reallocate the other group of users to the other spare server. | 2021-10-07 |
20210314391 | ELECTRONIC DEVICE FOR PERFORMING EDGE COMPUTING SERVICE AND METHOD FOR THE SAME - An electronic device includes a memory, a communication circuit, and a processor. The memory is configured to store an application and an edge enabler client. The communication circuit is configured to communicate with at least one of a first server, a second server, or a third server. The application is configured to perform one or more functions corresponding to the third server. The processor is configured to receive access information for accessing the second server from the first server. The processor is configured to receive access information of the third server from each of a plurality of second servers. The processor is configured to check at least one or more third servers capable of providing a service The processor is configured to select the third server to request access among a plurality of third servers. The processor is configured to perform the service using the selected third server. | 2021-10-07 |
20210314392 | CONSENSUS NODE CHANGING METHOD AND RELATED APPARATUS BASED ON HONEY BADGER BYZANTINE FAULT TOLERANCE CONSENSUS MECHANISM - Embodiments of this specification provide a consensus node changing method and apparatus based on a Honey Badger Byzantine Fault Tolerance (BFT) consensus mechanism. The method includes: when receiving a transaction for changing a blockchain's consensus node, executing, by a consensus node of the blockchain, the transaction to trigger a smart contract to update a consensus node configuration list of the blockchain, where the consensus node configuration list includes serial numbers allocated to consensus nodes based on a serial number allocation rule specified by the smart contract; associating, by the consensus node based on serial numbers of consensus nodes in the updated consensus node configuration list, another consensus node of the blockchain with at least two state machines configured in the consensus node. | 2021-10-07 |
20210314393 | QUALITY OF SERVICE (QOS) SETTING RECOMMENDATIONS FOR VOLUMES ACROSS A CLUSTER - A system, method, and machine-readable storage medium for providing a quality of service (QoS) recommendation to a client to modify a QoS setting are provided. In some embodiments, a set of volumes of a plurality of volumes may be determined. Each volume of the set of volumes may satisfy a first QoS setting assigned to the volume and a second QoS setting assigned to the volume. The plurality of volumes may reside in a common cluster and may be accessed by the client. Additionally, a subset of the set of volumes may be determined. Each volume of the subset may satisfy an upper bound of a range based on a minimum IOPS setting of the volume. A QoS recommendation to the client to modify the first QoS setting may be transmitted for one or more volumes of the subset. | 2021-10-07 |
20210314394 | DISPARITY OF QUALITY OF SERVICE (QOS) SETTINGS OF VOLUMES ACROSS A CLUSTER - A system, method, and machine-readable storage medium for providing a recommendation to a client to modify minimum IOPS settings are provided. In some embodiments, a client may assign a minimum input/output operations per second (IOPS) setting to each volume of a plurality of volumes. The plurality of volumes may reside in a common cluster and include a first number of volumes. A set of volumes of the plurality of volumes may be determined, where each volume of the set of volumes has a relative disparity that satisfies a relative threshold. The set of volumes includes a second number of volumes. A minimum IOPS recommendation may be transmitted to the client to modify (e.g., increase or decrease) the minimum IOPS settings of the set of volumes in response to determining that a ratio of the second number of volumes to the first number of volumes is greater than a performance threshold. | 2021-10-07 |
20210314395 | ADD AND DROP BLOBBERS IN BLOCKCHAIN - An approach is disclosed to replace or by-pass a first blobber utilizing a blockchain infrastructure. The first blobber is identified. For replacement, a second blobber is identified and a replacement transaction is written. Write markers with respect to content for the second blobber are generated. The content is transferred to the second blobber. After detecting a successful completion of all the writes to the second blobber, a transaction to drop the first blobber is written. When the first blobber is by-passed content written to the first blobber capable of being reconstructed from other blocks is written to other blobbers. Read markers are sent for the other blocks to the other blobbers. The blockchain monitors for successful completion of all reads of the other blocks. After detecting the successful completion of all the reads of the other blocks from the other blobbers, the content is reconstructed from the other blocks. | 2021-10-07 |
20210314396 | STREAMING CONTENT VIA BLOCKCHAIN TECHNOLOGY - An approach is disclosed for streaming content to a client. A request is received to receive content suitable for access by a streaming application. The content is separated into chunks C (C1, C2, . . . , Cn). The chunks are uploaded to corresponding blobbers B (B1, B2, . . . , Bn). A first pipe is utilized by the blobbers B (B1, B2, . . . , Bn) to download the chunks C (C1, C2, . . . , Cn) into a buffer. A second pipe is utilized to convert the downloaded chunks C (C1, C2, . . . , Cn) from the buffer into a byte array A (A1, A2, . . . , An) and the byte array A (A1, A2, . . . , An) is sent to a plurality of streaming services. | 2021-10-07 |
20210314397 | FUND CONVERSION BETWEEN BLOCKCHAINS - An approach is disclosed for running a first smart contract on a first blockchain platform which restricts access to a client's funds appropriated to a second smart contract running on a second blockchain platform. A transaction is received by invoking the first smart contract authorizing the second smart contract. In response to receiving an indication of a successful completion of the first smart contract, a plurality of client's authorization tickets are sent to the second smart contract which restricts access to the client's funds appropriated to the second smart contract running on the second blockchain platform. The invoked smart contract receives the set of authorization information and records the set of authorization information. After receiving a set of authenticated authorization tickets exceeding a predetermined threshold, the funds are atomically eliminated on the first blockchain platform and a converted funds generated on the second blockchain platform. | 2021-10-07 |
20210314398 | PRESERVATION OF CHANNEL METADATA - An example operation includes one or more of generating, by a channel peer, a random value to be associated with a channel name, mapping, by the channel peer, the random value to a block range, receiving, by the channel peer, a channel-MAC from a second peer, and validating the channel-MAC based on the channel name and the random value. | 2021-10-07 |
20210314399 | METHOD AND APPARATUS FOR RECOVERING MISSING DATA IN MULTI-SOURCE HYBRID OVERLAY NETWORK - In a multi-source hybrid overlay network including a plurality of peers, an apparatus that recovers missing data occurring in a tree recovery process, acquires data that a peer does not have in a pull method through exchanging buffer maps with a first counterpart peer connected to a primary path recovered in the tree recovery process and at least one second counterpart peer connected to at least one candidate path, and provides data that the first counterpart peer does not have to the first counterpart peer in the push method, when a data recovery policy is a pull method, is provided. | 2021-10-07 |
20210314400 | System and Method for Replication of Storage Presentation in Application Orchestration - An embodiment method creates, at a first data center, a first storage volume for an application that is started at the first data center, communicates with a second data center for creating a second storage volume for the application at the second data center to replicate the first storage volume, and sends information identifying the application to the second data center. The second data center creates the second storage volume, and establishes a mapping between the application and the second storage volume using the information identifying the application, where the second data center identifies the second storage volume for the application using the mapping when the application is migrated from the first data center to the second data center. | 2021-10-07 |
20210314401 | Optimizing Data Transmission between a First Endpoint and a Second Endpoint in a Computer Network - A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint. | 2021-10-07 |
20210314402 | System and Method for Content Management with Intelligent Data Store Access Across Distributed Stores - A configuration object is provided to configure a server. The configuration object can include storage node information for a first set of storage nodes available to a server. The configuration object determines, from the storage node information, a second set of storage nodes for inclusion in a map. The configuration object maps each storage node in the second set of storage nodes to a different index value in a set of index values. The configuration object receives an object identifier for a first object, transforms the object identifier into a resulting index value in the set of index values and, based on a determination that a first storage node is mapped to the resulting index value in the map, selects the first storage node as a target storage node for servicing a request to perform a first operation with respect to the first object. | 2021-10-07 |
20210314403 | Systems and methods for restoring an interface to a global file system - A versioned file storage system (VFS) and method for operating and using the same is disclosed. In an aspect, a mechanism is provided wherein a first VFS interface unit coupling the VFS to a local data storage system is replaced with a second VFS interface unit in a coordinated procedure for taking the first unit offline, making a reliable snapshot of its data and cache structure in the VFS, and loading the same data and cache structure into the second VFS interface brought online. The first and second VFS interfaces transfer the necessary data to achieve the switch through respective side-loading daemons running in each interface. Clients in the local data storage system experience minimal interruption of services in the VFS. | 2021-10-07 |
20210314404 | CUSTOMIZED HASH ALGORITHMS - A storage system determines source addresses, and destination addresses in a storage system, for network traffic. The storage system determines a hash algorithm, from a plurality of hash algorithms. The hash algorithm is to be used across the source addresses for load-balancing the network traffic to the destination addresses. The storage system determines that the hash algorithm more closely meets one or more load-balancing criteria than at least one other hash algorithm, of the plurality of hash algorithms. The storage system distributes the network traffic from the source addresses to the destination addresses in the storage system, with load-balancing according to the determined hash algorithm. | 2021-10-07 |
20210314405 | HOME AUTOMATION HAVING USER PRIVACY PROTECTIONS - An acoustic sensor is positioned in an environment and configured to generate a data stream responsive to acoustic energy in the environment. A controller is configured to receive the data stream. The controller is further configured to analyze the data stream to determine ambient acoustic signals. The controller is further configured to generate an ambient acoustic template based on the determined ambient acoustic signals. The controller is further configured to apply the ambient acoustic template to the data stream so that the ambient acoustic signals are suppressed in the data stream. The controller is further configured to analyze the data stream after the ambient acoustic signals are suppressed in order to determine if the acoustic energy in the environment includes acoustic energy of human snoring. The controller is further configured to issue a control signal to a second controller in order to engage a home automation device. | 2021-10-07 |
20210314406 | Communication Method and System under Micro-Service Architecture - A communication method and system under micro-service architecture are provided. The communication method includes: an executer sends a session register request message to a communication server, and receives, from the communication server, information of a peer executer that has a session subscription and publishing relationship with the executer, wherein the session register request message at least carries information of the executer, a session set to be registered and an attribute of any session in the session set; and the executer subscribes to a session instance of a registered session from the communication server or the peer executer, or the executer receives information of a session instance, subscribed to by the peer executer, of a registered session from the communication server or the peer executer. The present disclosure provides a high-performance and low-delay communication scheme for communication software modified based on micro-service architecture. | 2021-10-07 |
20210314407 | Method And Apparatus To Implement A Home Computing Cloud - A home computing system (cloud) integrates a protocols gateway, WiFi router, cloud server, and mass storage device to support one or more Internet of Things (IoT) devices, possibly with different connectively protocols, in a local environment such as a residential home. The home computing cloud often reduces the amount of data traffic sent to a public computing cloud by locally processing collected device data rather than by sending the device data to the public computer cloud for processing. The home computing cloud may download an appropriate data analytic model from the public computing cloud, locally train (for example, reinforcement learning) the model, and locally execute the trained model to obtain prediction information from collected IoT device data. The home computing cloud also allows direct access of the connected IoT devices by user applications via the internet, through a protocols gateway and an IoT message translator. | 2021-10-07 |
20210314408 | SYSTEM AND METHOD FOR PERSONALIZED VIRTUAL REALITY EXPERIENCE IN A CONTROLLED ENVIRONMENT - A system and method for initiating a personalized virtual reality session via a virtual reality communication system in a controlled environment is disclosed. The system includes a profile subsystem configured to store an inmate profile of the inmate of the controlled environment. The system also includes a virtual reality subsystem that retrieves the inmate profile associated with the inmate from the profile subsystem, initiates the virtual reality session involving a first communication device used by the inmate of the controlled environment, and personalizes the virtual reality session based on the inmate profile. The system also includes a communication subsystem configured to transmit information related to the virtual reality session to a monitoring system. | 2021-10-07 |
20210314409 | Accessing Resources in a Remote Access or Cloud-Based Network Environment - A client device may, as part of a remote access or cloud-based network environment, access a resource either by using a connection to a gateway or by using a connection that bypasses the gateway. Which connection is used may be based on the network location of the resources provided by the network environment and network location of the client device. For example, if the client device and a resource are located at the same network location or connected to the same local network, the client device may access the resource by using a connection that bypasses the gateway. If the client device and the resource are located at different network locations or are connected to different local networks, the client device may connect to the gateway to access the resource. | 2021-10-07 |
20210314410 | On device device driver - I, Emile Michel Hobo, born Jul. 5, 1980 in The Hague, The Netherlands, sole inventor, hereby request a patent for the design of an On Device Device Driver, which through establishing a connection to a device grants instant use of that device. | 2021-10-07 |
20210314411 | SERVICE PEERING EXCHANGE - In general, this disclosure describes a service peering exchange for creating and managing service-to-service paths among applications. For example, a service peering exchange with network connectivity with multiple networks may receive application programming interface (API) data describing APIs for services provided, e.g., by enterprises or cloud service providers (CSPs) and accessible via the networks using service requests. Such services may include, for example, data storage, eCommerce, billing, marketing, customer relationship management (CRM), social media, digital media, financial, weather, search, and other services accessible using machine-to-machine communication over a network. An administrator or customer of the service peering exchange may configure policies that are applied by the service peering exchange to orchestrate service-to-service paths among different services accessible via the different networks. | 2021-10-07 |
20210314412 | System and Method For Identifying and Tagging Users - The present disclosure relates to a system, method, and computer-program product for identifying and tagging users. Embodiments may include receiving, using at least one processor, a first content request. Embodiments may further include associating a user-access identifier with a first portion of data from the first content request based upon a second portion of the data from the first content request. Embodiments may also include storing the first portion of data from the first content request and the user-access identifier within a memory system. Embodiments may further include receiving a second content request. Embodiments may also include generating a user-identifier tag based upon the user-access identifier stored in the memory system, the first portion of data from the first content request, and a first portion of data from the second content request. Embodiments may further include providing a response to the second content request, the response including the user-identifier tag. | 2021-10-07 |
20210314413 | SYSTEMS AND METHODS FOR RESOLVING AMBIGUOUS TERMS IN SOCIAL CHATTER BASED ON A USER PROFILE - Systems and methods are disclosed herein to provide information to a user based on a symbol with a plurality of interpretations. Each candidate interpretation for the symbol is identified and compared to an attribute of a user profile. The meaning of the symbol is determined and the user profile is updated with the meaning of the symbol. This meaning may be used to provide relevant information to the user. | 2021-10-07 |
20210314414 | FACILITATING INTER-PROXY COMMUNICATION VIA AN EXISTING PROTOCOL - A method, system and computer program product for facilitating inter-proxy communication via an existing protocol. A proxy receives a message (e.g., request message) using a protocol, such as HTTP. If the proxy determines to add proxy relevant information to the message, then the proxy defines a new message header for the inter-proxy communication, which is added to the existing header section of the message. The proxy relevant information is then added in the newly added message header of the message. The message with the proxy relevant information is then transmitted to a subsequent proxy using the protocol of the underlying request-response transaction. In this manner, inter-proxy communications are enabled via an existing protocol (e.g., HTTP) that is used in the request-response transaction so that proxies can communicate with one another pertaining to matters (e.g., maintenance schedule) unrelated to the original intent of the transaction using the existing protocol (e.g., HTTP). | 2021-10-07 |
20210314415 | PROVIDING SERVICES AT THE EDGE OF A NETWORK USING SELECTED VIRTUAL TUNNEL INTERFACES - For traffic exiting a logical network through a particular VTI, some embodiments perform a service classification operation for different data messages to identify different VTIs that connect the edge forwarding element to a service node to provide services required by the data messages. Each data message, in some embodiments, is then forwarded to the identified VTI to receive the required service. The identified VTI does not perform a service classification operation. The service node then returns the serviced data message to the edge forwarding element. In some embodiments, the identified VTI is not configured to perform the service classification operation and is instead configured to mark all traffic directed to the edge forwarding element as having been serviced. The marked serviced data message is received at the edge forwarding element and forwarded to a destination of the data message through the particular VTI. | 2021-10-07 |
20210314416 | REMOTE ACCESS OF MEDIA ITEMS - Methods and systems that facilitate the downloading of media items to a first network device from a second network device are disclosed. A plurality of media items are identified Media item metadata associated with the plurality of media items is obtained from the second network device and stored on the first network device. Media item content data associate with a first subset of the plurality of media items is obtained from the second network device and stored on the first network device. In this manner, only media item metadata associate with a second subset of the plurality of media items is stored on the first network device. | 2021-10-07 |
20210314417 | DIGITAL TWIN-BASED EDGE SERVER SWITCHING DECISION - The disclosure includes embodiments that provide a digital twin-based edge server switching decision. A method includes causing a sensor set of a connected vehicle to determine a current driving context of the connected vehicle. The method includes comparing the current driving context to a set of digital twin data to determine a predicted latency for using offboard computing resources of an edge server. The method includes determining that the predicted latency for using the offboard computing resources satisfies a threshold for the predicted latency. The method includes executing a switching decision that includes deciding to use the offboard computing resources of the edge server based on the comparing of the current driving context to the set of digital twin data and the determining that the threshold for the predicted latency is satisfied. | 2021-10-07 |
20210314418 | MACHINE LEARNING METHOD FOR ADAPTIVE VIRTUAL NETWORK FUNCTIONS PLACEMENT AND READJUSTMENT - Virtual Network Functions (VNFs) are placed in a substrate network and the placement is readjusted based on dynamic resource availability and dynamic resource utilization in the substrate network. A predetermined number of servers is selected sequentially as cluster-heads based on a set of metrics which measure the efficiency of the servers in different aspects. The servers are partitioned into the predetermined number of disjoint clusters with different efficiency aspects. Each cluster includes one of the cluster-heads which performs the placement and readjustment of the VNFs for the cluster. An incoming VNF is placed at a given server in a given cluster by the cluster-head of the given cluster, which optimizes an objective function subject to a set of constraints. The objective function is optimized with respect to a subset of the metrics which excludes one or more metrics in which the given cluster is efficient. | 2021-10-07 |
20210314419 | DIRECT NETWORK CONNECTIONS USING CLOUD INSTANCE FOR INTERNET APPLICATION SERVICES - Direct network connections using cloud instance for Internet application services is provided between two or more computers on a network. A first computer sends a request to start an Internet application service to a server. The server requests a computing cloud to launch a cloud instance for the first computer. The computer cloud launches a bank of cloud instances offering the Internet application service. The computing cloud attempts to connect to the cloud instances, and selects the fastest cloud instance to respond as the first computer cloud instance. The first computer cloud instance sends its connection information to the server. A second computer may make a request to the server to join the Internet application service of the first computer. The server sends to the second computer the connection information for the first computer cloud instance. The second computer uses the connection information for the first computer cloud instance to send to the first computer cloud instance connection information for the second computer via direct network connection. From this point on, the first computer and the second computer exchange data for the Internet application service via a direct network connection using the first computer cloud instance, independently of the server. | 2021-10-07 |
20210314420 | METHOD AND REAL-TIME DATA ACQUISITION AND RETRIEVAL USING A PASS-THROUGH SCALABLE ARCHITECTURE - A device may be configured to monitor operations of at least one application installed on the device. The device may include a processor and a non-transitory memory. When executed by the processor, an application stored in the memory may cause the processor to perform a plurality of operations. A beacon may be embedded in the application. When the application is executed by the processor, the beacon may cause the processor to establish a direct connection with a remote system comprising a storage database, gather data indicative of at least one of the plurality of operations as specified by at least one beacon microservice, and send the data through the direct connection to store the data in the storage database. | 2021-10-07 |
20210314421 | DYNAMIC LINK PROCESSING ENGINE - Method, apparatus and computer program product for dynamic link processing engine. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, determine link invocation information associated with a link invocation; determining, based on the link invocation information, a link display characterization for the link invocation; and in response to determining that the link display characterization indicates that the expected output associated with the link invocation comprises display-oriented data: determine, based on the link invocation information, a dynamic redirection characterization for the link invocation; and in response to determining that the dynamic redirection characterization indicates that the display-oriented data associated with the link invocation is associated with the target application, perform an inter-application redirection between the invoking application and the target application. | 2021-10-07 |
20210314422 | INTENT-BASED SCHEDULING VIA DIGITAL PERSONAL ASSISTANT - Techniques are described herein that are capable of performing intent-based scheduling via a digital personal assistant. For instance, an intent of user(s) to perform an action (a.k.a. activity) may be used to schedule time (e.g., on a calendar of at least one of the user(s)) in which the action is to be performed. Examples of performing an action include but are not limited to having a meeting, working on a project, participating in a social event, exercising, and reading. | 2021-10-07 |
20210314423 | USING SERVICE PLANES TO PERFORM SERVICES AT THE EDGE OF A NETWORK - Some embodiments provide novel methods for providing a set of services for a logical network associated with an edge forwarding element acting between a logical network and an external network. In some embodiments, the services are provided using a logical service forwarding plane that connects the edge forwarding element to a set of service nodes that each provide a service in the set of services. The service classification operation of some embodiments identifies a chain of multiple service operations that has to be performed on the data message. In some embodiments, identifying the chain of service operations includes selecting a service path to provide the multiple services. After selecting the service path, the data message is sent along the selected service path to have the services provided. The data message is returned to the edge forwarding element by a last service node in the service path that performs the last service operation and the edge forwarding element performs next hop forwarding on the data message. | 2021-10-07 |
20210314424 | SYSTEM AND METHOD FOR MANAGING CONFIGURATION DATA OF MONITORING AGENTS - In one example, a computer implemented method may include determining an application to be monitored in an endpoint, generating a marker with a unique identifier corresponding to the application running in the endpoint, bundling configuration data within the marker. The configuration data may include configuration settings of a monitoring agent installed on the endpoint to monitor the application. Further, the method may include appending the marker bundled with the configuration data to a configuration file of the monitoring agent and enabling the monitoring agent to monitor the application based on the configuration data in the configuration file. | 2021-10-07 |
20210314425 | Cell Phone and Host - A cell phone and a host may be disclosed. The cell phone may include a host and a slave. The host may include a first power module, a charging interface, a charging circuit board, a secondary board, and a power circuit board. The first power module may be configured to supply power to the secondary board. The charging interface may be configured to charge the first power module through the charging circuit board, the secondary board and the power circuit board. The slave may include a display and a second power module. The second power module may be configured to supply power to the display. The slave may be mountable to and demountable from the host. When the slave is demounted from the host, the slave may be capable of communicating with the host. | 2021-10-07 |
20210314426 | ELECTRONIC DEVICE FOR RECEIVING MULTIBAND GNSS SIGNAL - An electronic device according to an embodiment of the disclosure includes a housing that includes a first plate, a second plate facing away from the first plate, and a side member surrounding a space between the first plate and the second plate and including a first conductive region and a second conductive region electrically separated from the first conductive region, a wireless communication circuitry that is disposed within the space, transmits/receives a first signal in a first frequency band ranging from 1.4 GHz to 6 GHz by using the first conductive region, and transmits/receives a second signal in a second frequency band ranging from 0.6 GHz to 1.4 GHz by using the second conductive region, and a GNSS receiver circuitry that is disposed within the space, receives a third signal in a third frequency band ranging from 1559 MHz to 1610 MHz by using the first conductive region, and receives a fourth signal in a fourth frequency band ranging from 1164 MHz to 1189 MHz by using the second conductive region. Moreover, various embodiment found through the present disclosure are possible. | 2021-10-07 |
20210314427 | CAMERA MOUNTING MODULE, AND MOBILE TERMINAL - A camera mounting module includes a camera mounting assembly, an internal gear and a gear driving structure. The camera mounting assembly includes a mounting base and a camera positioned in the mounting base. The internal gear is coupled to the mounting base. The gear driving structure includes a first gear and at least one second gear arranged between the first gear and the internal gear, and each of the at least one second gear is engaged with the first gear and the internal gear. The gear driving structure is configured to drive the mounting base to rotate with respect to the first gear. | 2021-10-07 |
20210314428 | MOBILE TERMINAL - A mobile terminal includes a main unit, a first sub unit provided with a touch screen, and a second sub unit. The first and second sub units are communicatively connected to the main unit. The first surface has a bracket groove recessed therefrom. The main unit is provided with a bracket capable of rotating into or out of the bracket groove. When the bracket is rotated out of the bracket groove, the first sub unit is mountable to the first surface, the second sub unit is capable of detachably leaning against the bracket, and a first angle between a touch surface of the touch screen and a display surface of the second sub unit is greater than 90°. When the bracket is rotated into the bracket groove, the first sub unit is mountable to the first surface, and the second sub unit is detachably mountable to the second surface. | 2021-10-07 |
20210314429 | MOBILE TERMINAL - Provided is a terminal device, which includes a main unit and a detachable sub unit. The sub unit includes a display screen, a main circuit board, an auxiliary circuit board, and a piezoelectric ceramic receiver attached to the display screen. The main circuit board, the auxiliary circuit board, and the piezoelectric ceramic receiver are located on a side of the display screen facing away from a display surface of the display screen. A region surrounded by a continuous hole wall of the main circuit board or the auxiliary circuit board defines an avoiding groove; or the main circuit board or the auxiliary circuit board has a notch provided on an edge thereof, and a region surrounded by the notch defines the avoiding groove. The piezoelectric ceramic receiver is located in the avoiding groove, and the avoiding groove surrounds at least a part of the piezoelectric ceramic receiver. | 2021-10-07 |
20210314430 | MAGNETICALLY CONNECTABLE GRIP AND CONNECTOR FOR ELECTRONICS - Finger grip and connector for portable electronics, in particular cell phones. The grip includes a metallic ring. The ring adheres to the back of a cell phone, or case. The grip includes a corresponding ring of magnets for a grip assembly to magnetically attach to the metal ring adhered to the cell phone. The grip design provides infinite rotation of the grip assembly relative to the phone for holding the phone in various positions. The grip provides a support for viewing content on the electronic device at different angles and orientations. The grip provides a means of magnetically attaching a cell phone to metallic surfaces, chargers, mounts, and other devices. The grip can allow for wireless charging, which is optimized and enabled by a relatively large open inner diameter of the metallic ring and corresponding magnets. The grip can retract to be less than 3 millimeters in total thickness. | 2021-10-07 |
20210314431 | DEVICE THAT IS EXTENDABLE FOR SUPPORTING A SMARTPHONE HAVING A VIDEO CAMERA OR FOR SUPPORTING A VIDEO CAMERA - A device for supporting a smartphone having a camera or supporting an action camera has a holder configured for supporting a smartphone having a camera or supporting an action camera, an extendable handle configured to be held by a user, and components for receiving audio signals from an audio signal source and reproducing the received audio signals in the vicinity of the handle. | 2021-10-07 |
20210314432 | PROTECTIVE BAG AND DISPENSER TO MAKE MOBILE DEVICES MORE HYGIENIC - A protective bag into which a mobile device can be placed to limit exposure of the device to unsanitary conditions or conversely to limit exposure of other surfaces to an unsanitary mobile device. The protective bags are distributed to users using a dispenser. The system improves overall hygiene associated with use of mobile devices. | 2021-10-07 |
20210314433 | SYSTEM AND METHOD FOR DIGITAL ASSISTANT INTERFACE UTILIZING PLAIN-OLD-TELEPHONE - A system and method for utilizing a plain-old-telephone (“POT”) to interface with a digital assistant system. The POT is linked to an interface adapted to selectively provide a bidirectional audio connection to a standard telephone communication network, or to provide an interface to a digital assistant system in response to user voice commands. The functionality of the POT digital assistant interface being dependent upon the user input—DTMF tone/pulse dialing signals as opposed to voice commands spoken into the POT mouthpiece. Audio cues and prompts, as well as audio responses from the digital assistant system are provided to the user via the POT earpiece. Digital assistant functionality is provided via a simple and familiar interface, without impeding any standard voice telephony functionality (making/receiving calls, call waiting, caller ID, etc.) | 2021-10-07 |
20210314434 | Active Call Verification to Prevent Falsified Caller Information - In one embodiment, a network interface operable to receive a communication request over a communication link of a radio access network. A processor determines one or more characteristics based on the communication request and communicates a message to a networked device to determine a status of the network device identified based on at least one of the characteristics. The processor then terminates the communication request based in part on the status of the networked device. | 2021-10-07 |
20210314435 | BACKGROUND DISPLAY METHOD AND APPARATUS DURING CALL, AND STORAGE MEDIUM - A background display method during a call includes: obtaining information on the call; and dynamically displaying a background image on a call interface based on the information. | 2021-10-07 |
20210314436 | DETECTING A SPOOFED CALL - A system can be operable to receive a call from a communication device and identify whether the call is a spoofed based on, for example, whether a caller party user equipment associated with a caller identification number (caller ID number) is in an “idle” status, whether there are inconsistencies in the geographic location associated with a calling party's network and the geographic location determined to be associated with the caller ID number presented, and whether the phone number presented as the caller ID number is registered with a calling party's network. | 2021-10-07 |
20210314437 | SITE LINK TESTER VIA UNIQUE PHONE EMULATION - Remote on-demand site link testing is provided. A site link tester (SLT) system includes an SLT connected to a customer's VoIP phone system. The SLT is configured to communicate with a front end client application operating remotely on a user's computing device. The packet-capture application receives instructions from the client application to perform a packet capture in association with the SLT's network interface and/or to operate as an emulated VoIP endpoint and conduct a test call (e.g., to confirm the customer's VoIP system's compliance with 911-associated legislation or to troubleshoot a VoIP issue). Results of the packet capture may be sent to the client application and analyzed for remotely diagnosing and troubleshooting VoIP-related problems. Using the SLT system, the technician is enabled to perform 911-associated legislation compliance and diagnose VoIP issues on-demand from a remote location, which can reduce or eliminate the need for a technician to be on-site. | 2021-10-07 |
20210314438 | CONTENT DISTRIBUTION SYSTEMS AND METHODS - A system comprising: (a) a server receiving a calling party's phone number and a called party's phone number when a telephone call is placed; (b) a database of content items uploaded to the server, each of said content items associated with a telephone number of a party that uploaded it; and (c) a content delivery mechanism configured to push a unique identifier (UID) of a specific content item uploaded by the called party to the calling party's handset in response to said receiving by said server. | 2021-10-07 |
20210314439 | ELECTRONIC DEVICE TO WHICH INCOMING CALL SCREEN IS OUTPUT AND METHOD FOR OUTPUTTING INCOMING CALL SCREEN - An electronic device according to various embodiments may comprise a communication module, a display, an output device, and a processor, wherein the processor is configured to: in response to the reception of a call signal through the communication module, identify a caller corresponding to the call signal; identify a first photo on the basis of the caller; when the electronic device has been configured to output sound in response to the reception of the call signal, output an incoming call screen generated on the basis of the first photo to at least part of the display, wherein the incoming call screen includes one or more image components, each having at least one display attribute that changes according to a change of the sound characteristics of a ringtone; and output the ringtone through the output device while outputting the incoming call screen. Various other embodiments are also possible. | 2021-10-07 |
20210314440 | Synchronous Communication Using Voice and Text - A computing device is described that accepts, a telephone call, from another device, initiated by a caller. Prior to establishing a telephone user interface that receives spoken input from the user and outputs spoken audio from the caller, the computing device executes a call screening service that outputs an audio user interface, to the other device and as part of the telephone call. The audio user interface interrogates the caller for additional information including a purpose of the telephone call, which allows the user to have more context of the telephone call before deciding whether to accept the call or hang up. The computing device outputs a graphical user interface associated with telephone call. The graphical user interface includes an indication of the additional information obtained via the audio user interface that interrogates the caller. | 2021-10-07 |