41st week of 2019 patent applcation highlights part 59 |
Patent application number | Title | Published |
20190312872 | ACCESS CONTROL SYSTEM AND METHOD - A system and method control or manage access to multiple target servers in a network. The system includes an access control user interface, a memory, and a management server. The access control user interface is accessible to the multiple target servers. The memory stores a database providing information to the access control user interface. The management server includes a processor implementing discovery and event trigger engines. The discovery engine discovers user rights stored at the multiple target servers and delivers the user rights over the network to the database. The event trigger engine is invoked by detection of a security event from a first target server, updates the user rights at a local cache on the first target server, and delivers the updated user rights to the database. The event trigger engine is configured to modify the discovery engine based on the detection of the security event. | 2019-10-10 |
20190312873 | COMPUTER READABLE STORAGE MEDIA FOR TIERED CONNECTION POOLING AND METHODS AND SYSTEMS FOR UTILIZING SAME - Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool. | 2019-10-10 |
20190312874 | LOCAL API ACCESS AUTHORIZATION - A computing device, including one or more output devices and a processor. The processor may be configured to download a web application. The web application may include an authorization certificate and a metadata file that includes an identifier of at least one local application program interface (API) of the computing device that is not included in an API whitelist of a web host application program. The processor may determine, based on the authorization certificate and the metadata file, that the web application is authorized to access the at least one local API. The processor may execute the web application at the web host application program. Executing the web application may include utilizing the at least one local API. The processor may convey at least one output of the web application for output at the one or more output devices. | 2019-10-10 |
20190312875 | PERMISSIONS USING BLOCKCHAIN - A network device receives a smart contract for permissions to access a service, wherein the smart contract is in an initial block for authorizations in a shared ledger. The network device receives, from an authorization server device, an update to the shared ledger, wherein the update is a proposed block in the shared ledger requiring validation. The network device stores, in a local memory, a copy of the shared ledger with the update, when the update is validated by the distributed consensus network. The network device receives, from a client device, an item request for an item associated with the service, wherein the item request includes a client identifier. The network device identifies if there is match of the client identifier and the item in the copy of the shared ledger and sends, to the client device, the item when there is match of the client identifier and the item. | 2019-10-10 |
20190312876 | IDENTIFYING AND BLACKLISTING PROBLEM CLIENTS USING MACHINE LEARNING IN WIRELESS NETWORKS - In one embodiment, a network assurance service that monitors a wireless network receives data regarding connection failures of a wireless client of the wireless network. The network assurance service forms a behavioral profile for the wireless client based on the received data regarding the connection failures of the wireless client. The network assurance service uses machine learning to determine whether the behavioral profile of the wireless client is an outlier in relation to behavioral profiles of other wireless clients of the wireless network. The network assurance service causes performance of a mitigation action with respect to the wireless client, when the wireless client is determined to be an outlier. | 2019-10-10 |
20190312877 | BLOCK CHAIN MINING METHOD, DEVICE, AND NODE APPARATUS - A registration and authorization method, device and system is used for solving the technical problem of relatively low safety of the existing authorization technology. The method is applied to an authorization server, the authorization server is a node in a blockchain network and stores a blockchain composed of a plurality of blocks, each block is used for storing authorization information, and the method comprises: receiving a registration request message sent by a user device, wherein the registration request message includes identification information, and the identification information is used for performing identity verification on a user; assigning authorization information to the user, wherein the authorization information is used for indicating a service that the user can access; and writing the identification information and the authorization information into the blocks of the blockchain through the authorization server. | 2019-10-10 |
20190312878 | SECURE COMMUNICATION USING DEVICE-IDENTITY INFORMATION LINKED TO CLOUD-BASED CERTIFICATES - Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products to manage storage of certificate information, including at least a public key and private key, in a manner associated with device-identity information and facilitate secure communication between a user device and a service provider device. A device-identity management system may be provided to receive a secure key request over a carrier network from a user device, the secure key request including device-identity information injected by a carrier device of the carrier network via header enrichment. The device-identity management system may retrieve, from a secured key storage, the private key associated with the device-identity information. The device-identity management system may transmit, from the device-identity management system to the user device over a secured network, secure key information based on the private key. The secure key information may be used for secure communication. | 2019-10-10 |
20190312879 | SYSTEMS AND METHODS FOR CREATING A VERIFIED CUSTOMER PROFILE - Systems and methods for creating a verified customer profile are disclosed. In some exemplary embodiments, a customer first provides a phone number. A message is then sent to the device associated with the phone number to request a specific response. When the specific response is received from the user, it is then verified that the user has possession of the device associated with the phone number. An identity query may be sent to each of multiple identity services and a response may be received from each of the multiple identity services in response to the identity query. The responses from each of the multiple identity services are then processed to determine the accuracy of the at least one of date of birth, address, or social security number of the customer in each response. The verified responses are stored as the basic profile of the customer in a database as records. | 2019-10-10 |
20190312880 | Preventing Unauthorized Access to Secure Information Systems Using Multi-Push Authentication Techniques - Aspects of the disclosure relate to preventing unauthorized access to secured information systems using multi-push authentication techniques. A computing platform may receive an event request associated with a group of enrolled devices. The computing platform may load multi-push settings and identify one or more user devices linked to the group of enrolled devices. Then, the computing platform may generate one or more notifications for the one or more user devices, and each notification may be generated for a corresponding user device based on device-specific user account state information. After sending the one or more notifications, the computing platform may generate one or more event execution commands based on prompt response information received from the one or more user devices and may send the one or more event execution commands to an event management computer system, which may execute an event corresponding to the event request. | 2019-10-10 |
20190312881 | MULTI-USER PERMISSION STRATEGY TO ACCESS SENSITIVE INFORMATION - A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user permission strategy centering on organizational structure. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature, making it very hard to guess which approvers will be selected for a particular request. | 2019-10-10 |
20190312882 | REAL-TIME AUTHORIZATION OF INITIATED DATA EXCHANGES BASED ON DYNAMICALLY GENERATED TOKENIZED DATA - The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device. | 2019-10-10 |
20190312883 | DYNAMIC AUTHORIZATION OF PRE-STAGED DATA EXCHANGES BASED ON CONTEXTUAL DATA - The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, dynamically authorize pre-stages data exchanges based on contextual data. For example, an apparatus may receive first data characterizing an initiation of a first exchange of data between a client device and a terminal device. Based on the first data, the apparatus may obtain second data that characterizes an expected initiation of a second exchange of data during a corresponding temporal interval, which may be specified relative to an initiation time of the first data exchange. The apparatus may generate and transmit, to a computing system, pre-authorization data that requests a pre-authorization of the second data exchange to a computing system. The pre-authorization data may include a portion of the second data and may instruct the computing system to pre-authorize the second data exchange in accordance with the second data. | 2019-10-10 |
20190312884 | AUTOMATIC TOKEN-BASED SECURE CONTENT STREAMING METHOD AND APPARATUS - Disclosed are systems and methods for improving interactions with and between computers in secure content access, distribution and download and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide systems and methods for automatic token-based secure content streaming. | 2019-10-10 |
20190312885 | APPARATUS AND METHOD FOR SECURELY MANAGING THE ACCESSIBILITY TO CONTENT AND APPLICATIONS - A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download application function, provide a request for a first verification to a secure element where the first verification is associated with access to content and/or an application that is accessible via the secure download application function, receive the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor, receive the non-secret information from the secure element, and generate a second verification for the access based on the non-secret information, where the content and/or application is accessible from the secure download application function responsive to the first and second verifications. Other embodiments are disclosed. | 2019-10-10 |
20190312886 | USER BEHAVIOR PROFILE INCLUDING TEMPORAL DETAIL CORRESPONDING TO USER INTERACTION - A system, method, and computer-readable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising temporal detail corresponding to the user interaction; and generating a user behavior profile based upon the electronic information representing the user interactions, the generating the user profile including a layer of detail corresponding to the temporal detail corresponding to the user interaction. | 2019-10-10 |
20190312887 | SECURE ENDPOINT IN A HETEROGENOUS ENTERPRISE NETWORK - An endpoint in an enterprise network is configured to respond to internal and external detections of compromise in a manner that permits the endpoint to cooperate with other endpoints to secure the enterprise network. For example, the endpoint may be configured to self-isolate when local monitoring detects a compromise on the endpoint, and to respond to an external notification of compromise of another endpoint by restricting communications with that other endpoint. | 2019-10-10 |
20190312888 | SECURING ENDPOINTS IN A HETEROGENOUS ENTERPRISE NETWORK - Endpoints within a subnet of a heterogeneous network are configured to cooperatively respond to internal or external notifications of compromise in order to protect the endpoints within the subnet and throughout the enterprise network. For example, each endpoint may be configured to self-isolate when a local security agent detects a compromise, and to shun one of the other endpoints in response to a corresponding notification of compromise in order to prevent the other, compromised endpoint from communicating with other endpoints and further compromising other endpoints either within the subnet or throughout the enterprise network. | 2019-10-10 |
20190312889 | SYSTEM FOR PROCESSING QUERIES USING AN INTERACTIVE AGENT SERVER - A system for processing queries is disclosed. The system is configured to receive a query from a user, the query comprising a message indicating a request for a service. The system then performs natural language processing on the query, and identifies keywords of the query based on the natural language processing. Based on the identified keywords, the system determines an action and an actionable item from the query. Then, the system generates an acknowledgement request for the query based on the determined action and actionable item, and sends the acknowledgement request to the user. After receiving an acknowledgement from the user on the acknowledgement request, the system sends the determined action and actionable item to an upstream server to request the service. | 2019-10-10 |
20190312890 | MITIGATING CYBER-ATTACKS BY AUTOMATICALLY COORDINATING RESPONSES FROM CYBER-SECURITY TOOLS - Cyber-attacks can be mitigated by automatically coordinating responses from cyber-security tools. For example, a cyber-security engine can include software modules created by multiple sources, each of the software modules being for integrating a respective cyber-security tool with the cyber-security engine. The cyber-security engine can use the software modules to communicate with the cyber-security tools in order to detect one or more events indicative of a cyber-attack against a computing environment. The cyber-security engine can then determine a coordinated-response strategy involving cooperation among the cyber-security tools to mitigate the cyber-attack. The cyber-security engine can transmit commands to the cyber-security tools to cause the cyber-security tools to implement the coordinated-response strategy. | 2019-10-10 |
20190312891 | PACKET CAPTURE AND NETWORK TRAFFIC REPLAY - Implementations disclosed herein provide a network agent embodied in firmware and/or software that replays network traffic of an enterprise network to an entity outside of the enterprise network. The network agent selects and processes the network traffic according to certain policies set by the enterprise network or a third party security management system. These policies allow for a capture and replay of high-integrity data that enables threat analysis. | 2019-10-10 |
20190312892 | ONBOARD CYBERSECURITY DIAGNOSTIC SYSTEM FOR VEHICLE, ELECTRONIC CONTROL UNIT, AND OPERATING METHOD THEREOF - Disclosed herein is an onboard cybersecurity diagnostic system for a vehicle, which may include at least one In-Vehicle Network (IVN) security diagnostic sensor configured to detect and diagnose an Electronic Control Unit (ECU) attack command on a communication bus; at least one ECU configured to control an actuator based on sensor data collected from a sensor, autonomously diagnose the integrity of ECU electronic control software, and diagnose the integrity of ECU electronic control data by combining the sensor data with a security diagnostic packet received from the at least one IVN security diagnostic sensor; and a cyber dashboard configured to display a security problem in the event of the security problem in the integrity of the ECU electronic control software or the ECU electronic control data. | 2019-10-10 |
20190312893 | ASSOCIATING A USER IDENTIFIER DETECTED FROM WEB TRAFFIC WITH A CLIENT ADDRESS - In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web traffic in the network. The web traffic log data includes header information captured from the web traffic and a plurality of client addresses associated with the web traffic. The device detects a particular one of the set of known user identifiers in the header information captured from the web traffic associated with a particular one of the plurality of client addresses. The device makes an association between the particular detected user identifier and the particular client address. | 2019-10-10 |
20190312894 | MACHINE LEARNING-BASED TRAFFIC CLASSIFICATION USING COMPRESSED NETWORK TELEMETRY DATA - In one embodiment, a device in a network receives telemetry data regarding a traffic flow in the network. One or more features in the telemetry data are individually compressed. The device extracts the one or more individually compressed features from the received telemetry data. The device performs a lookup of one or more classifier inputs from an index of classifier inputs using the one or more individually compressed features from the received telemetry data. The device classifies the traffic flow by inputting the one or more classifier inputs to a machine learning-based classifier. | 2019-10-10 |
20190312895 | FRAUD DETECTION ELECTRONIC CONTROL UNIT, ELECTRONIC CONTROL UNIT, AND NON-TRANSITORY RECORDING MEDIUM IN WHICH COMPUTER PROGRAM IS DESCRIBED - A fraud detection electronic control unit is connected to an electronic control unit through an in-vehicle network system. The fraud detection electronic control unit includes a storage and a determination unit. The storage stores a first regulation for determining whether the frame transmitted from the electronic control unit is fraudulent. The determination unit determines whether the frame transmitted from the electronic control unit is fraudulent in pursuant to the first regulation. When a predetermined condition is satisfied, the storage acquires a second regulation retained by the electronic control unit and updates the stored first regulation. | 2019-10-10 |
20190312896 | MISBEHAVIOR PROTECTION FOR CONNECTED VEHICLE COMMUNICATION - The invention is applicable for use in conjunction with a system that includes connected vehicle communications in which vehicles in the system each have an onboard processor subsystem and associated sensors, the processor subsystem controlling the generation, transmission, and receiving of messages communicated between vehicles for purposes including crash avoidance. A method is set forth for determining, by a given vehicle receiving messages, the occurrence of misbehavior, including the following steps: processing received messages by performing a plurality of plausibility determinations to obtain a respective number of plausibility measurements; determining at least one context for the region at which the given vehicle is located; weighting the plurality of plausibility measurements in accordance with values determined from the at least one context to obtain a respective plurality of plausibility indicator values; and deriving a misbehavior confidence indicator using the plausibility indicator values. | 2019-10-10 |
20190312897 | SYSTEMS AND METHODS FOR ASSESSING RISKINESS OF A DOMAIN - One or more computing devices, systems, and/or methods for assessing riskiness of a domain are provided. For example, a content request is received from a content provider service that hosts a website associated with a domain. The content request is evaluated to identify request features. Feature scores are assigned to the request features using labeled feature data. The feature scores are aggregated to generate a content request risk score corresponding to a riskiness of the content request corresponding to fraud, such as domain spoofing. The content request risk score along with other content request risk scores of content requests associated with the content provider service are aggregated to create a content provider risk score corresponding to a riskiness of the content provider service, such as a risk of the domain being fraudulent. The content provider risk score is used to either block or process the content request. | 2019-10-10 |
20190312898 | SPATIO-TEMPORAL ANOMALY DETECTION IN COMPUTER NETWORKS USING GRAPH CONVOLUTIONAL RECURRENT NEURAL NETWORKS (GCRNNs) - In one embodiment, a device receives sensor data from a plurality of nodes in a computer network. The device uses the sensor data and a graph that represents a topology of the nodes in the network as input to a graph convolutional neural network. The device provides an output of the graph convolutional neural network as input to a convolutional long short-term memory recurrent neural network. The device detects an anomaly in the computer network by comparing a reconstruction error associated with an output of the convolutional long short-term memory recurrent neural network to a defined threshold. The device initiates a mitigation action in the computer network for the detected anomaly. | 2019-10-10 |
20190312899 | SYSTEM AND METHOD FOR PROTECTING SERVERLESS APPLICATIONS - A system and methods for protecting a serverless application, the system including: (a) a serverless application firewall configured to inspect input of the serverless function so as to ascertain whether the input contains malicious, suspicious or abnormal data; and (b) a behavioral protection engine configured to monitor behaviors and actions of the serverless functions during execution thereof. | 2019-10-10 |
20190312900 | Systems and Methods of Stateless Processing in a Fault-Tolerant Microservice Environment - A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to systems and methods of stateless processing in a fault-tolerant microservice environment. In one example, a method is disclosed, which includes transmitting, by a first microservice, packet data and a context associated therewith; receiving the packet data and the context by a second microservice, the second microservice to: use the context to determine what security processing to perform, perform the security processing over the packet data, and transmit resulting data and the context to a third microservice; and receiving the resulting data and the context by the third microservice, the third microservice to: use the context to determine what security processing to perform, and perform the security processing over the resulting data. | 2019-10-10 |
20190312901 | EFFECTIVE DETECTION OF A COMMUNICATION APPARATUS PERFORMING AN ABNORMAL COMMUNICATION - An apparatus extracts a server process from a communication in a network to generate log data in which a combination of addresses of access sources in the server process is recorded, and compares a combination of past addresses recorded in the log data with a combination of addresses in a specific target access to identify a first communication apparatus performing an abnormal communication. | 2019-10-10 |
20190312902 | IDENTITY BASED BEHAVIOR MEASUREMENT ARCHITECTURE - A method includes generating a behavioral state for an endpoint device based on actor identities and corresponding subject identities for a plurality of operations wherein for each operation, a respective actor represented by a respective actor identity performs the operation upon a respective subject represented by a respective subject identity. Performance of a later operation by an actor with an actor identity upon a subject with a subject identity is recorded and the actor identity and the subject identity are used to determine that the performance of the later operation does not match the behavioral state and indicates a security risk. | 2019-10-10 |
20190312903 | Identifying communicating network nodes in the same local network - Methods and systems for executing a penetration test of a networked system by a penetration testing system so as to determine a method by which an attacker could compromise the networked system, and/or for distributing common sets of data to nodes of a networked system. The methods and systems include identifying network nodes which have shared broadcast domains. | 2019-10-10 |
20190312904 | NETWORK TRAFFIC FILTERING AND ROUTING FOR THREAT ANALYSIS - Implementations disclosed herein provide a managed security service that distributes processing tasks among a number of network security modules working in parallel to process component portions of a replayed network traffic stream. If a network security module detects a potential security threat, the network security module may generate a delivery request specifying other information potentially useful in further investigation of the potential security threat. The delivery request is communicated to a plurality of other processing entities, such as the other network security modules, and any processing entity currently receiving the requested information may respond to the delivery request. Once a source of the requested information is determined, the requested information is routed to the origin of the request. | 2019-10-10 |
20190312905 | SYSTEMS AND METHODS FOR ASSESSING THE STATUS AND SECURITY OF ELECTRONIC NETWORK SERVERS AND SYSTEMS - Systems and methods are disclosed for determining a secured system security risk score. One method comprises receiving, on an electronic network, security data corresponding to a security vulnerability of each of a plurality of servers, each of the plurality of servers being associated with a secured system. A server security risk score may be determined for each of the plurality of servers, based on the security data corresponding to the security risks for each of the plurality of servers. The server security risk score may be modified, for each of the plurality of servers, based on a time elapsed since a discovery of each security vulnerability or hosting environment influence. A secured system security risk score may be determined, associated with the secured system, based on the mitigated server security risk score for each of the plurality of servers. | 2019-10-10 |
20190312906 | Information Security - An information security system that incorporates time, feedback, and/or varying trust in analyzing and responding to attacks. A solution can defer processing of a request for a period of time, which can be sufficient to allow the request to be approved or disproved. The solution can be configured to automatically approve or disprove the request after the period of time if no affirmative response is received. Trust for an entity can be periodically determined and can automatically decay over time. Feedback can be used as part of the approval/disproval process and/or to reevaluate trust. | 2019-10-10 |
20190312907 | EVENT DRIVEN ROUTE CONTROL - Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems. | 2019-10-10 |
20190312908 | CYBER CHAFF USING SPATIAL VOTING - A method of generating cyber chaff can include determining a cell of a grid of cells to which a first feature and a second feature of user data maps, identifying a cell type of the cell, the cell type indicating whether the cell is an active cell, an inactive cell, or a sub-process cell, and providing cyber chaff based on cyber chaff data associated with either (a) one or more cells of the inactive cell type or (b) one or more cells of the sub-process cell type. | 2019-10-10 |
20190312909 | METHOD AND SYSTEM FOR APPLYING COMPLIANCE POLICIES ON PRIVATE AND PUBLIC CLOUD - Syncing compliance policies on a private cloud network and a public cloud network is disclosed. The technology accesses a hybrid cloud environment including: at least one private cloud network and at least one public cloud network. A private policy gateway appliance is coupled with the private cloud network and a public policy gateway appliance, in communication with the private policy gateway appliance, is coupled with the public cloud network. One or more policy rules for the hybrid cloud environment are provided to the private policy gateway appliance which then disseminates the one or more policy rules to the public policy gateway appliance, such that the one or more policy rules are synced for the at least one private cloud network and the at least one public cloud network. | 2019-10-10 |
20190312910 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR DATA PROTECTION SIMULATION AND OPTIMIZATION IN A COMPUTER NETWORK - A system, method and computer-readable medium for data protection simulation and optimization in a computer network, including grouping data stored in data stores in the computer network into groupings according to an architectural or a conceptual attributes, storing, current values of risk metrics for each grouping, each of the metrics corresponding to sensitive domains, receiving a risk reduction goal corresponding to at least one risk metric in the risk metrics, the at least one risk metric corresponding to at least one sensitive domain in the sensitive domains, determining a simulated value of the at least one risk metric for each grouping in the groupings by simulating application of a protection mechanism to sensitive data in each corresponding data store, the sensitive data corresponding to the at least one sensitive domain, and ranking the groupings based on the at least one simulated value of the at least one risk metric for each grouping. | 2019-10-10 |
20190312911 | Methods and Systems for Protecting a Secured Network - Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets. | 2019-10-10 |
20190312912 | COMPLIANCE CONFIGURATION MANAGEMENT - Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request. | 2019-10-10 |
20190312913 | SECURING METHOD FOR LAWFUL INTERCEPTION - A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key. | 2019-10-10 |
20190312914 | USING SYMMETRIC AND ASYMMETRIC FLOW RESPONSE PATHS FROM AN AUTONOMOUS SYSTEM - A symmetric flow response path from an Autonomous System (AS) can be forced by using a same edge gateway for ingress and egress of communications with an Internet source. An asymmetric flow response path from an AS can be used by using different edge gateways for ingress and egress of communications with an Internet source. An anycast IP address can be used for selecting egress edge gateways of an AS. Packets in an AS can be redirected to selected egress edge gateways of the AS. | 2019-10-10 |
20190312915 | METHODS AND APPARATUS FOR PACKETIZED CONTENT DELIVERY OVER A CONTENT DELIVERY NETWORK - Methods and apparatus for delivery of packetized content (e.g., video, audio, data, etc.) over a content delivery network. In one embodiment, the content is packetized using an Internet Protocol (IP), and delivered by a service provider over both managed and unmanaged networks to subscribers of the provider, so as to provide delivery at any time, at any location, and via any designated user device. The delivered content may originate from the service provider, third-party content sources (e.g., networks or studios), the subscriber(s) themselves, or other sources including the Internet. Use of a common control and service functions within the network afford the ability to integrate or blend services together, thereby affording the service provider and subscriber new service and economic opportunities. Content delivery sessions may also be migrated from one device to another. A network-based user interface infrastructure, and gateway-based client-side architecture, are also disclosed. | 2019-10-10 |
20190312916 | SYSTEM AND METHOD FOR NETWORK ASSISTED MULTI-LINE REGISTRATION IN AN IMS NETWORK - A multi-line network registration capability for an IMS network is disclosed. Registration with a Home IMS domain is used for a user equipment (UE) device to authenticate to the IMS network infrastructure. IMS network infrastructure expects each UE to have a single identity (e.g., IMPI/IMPU pair) on the network. A multiple back to back registration (MB2B) module may optionally provide multiple identities to a single UE device. Multiple identities may be associated with a service plan provided for the IMPI/IMPU unique identifier. Infrastructure of the Home IMS domain may be used to support the multiple identities for a given UE device. Accordingly, the MB2B module may not require any additional infrastructure changes by other service providers. The MB2B module may be implemented as a software upgrade to existing infrastructure devices or may be implemented as a standalone front-end device to assist in performing registrations for a telco service provider. | 2019-10-10 |
20190312917 | RESOURCE COLLABORATION WITH CO-PRESENCE INDICATORS - The herein described technology facilitates web-based co-presence collaboration conferences with user presence indicators to convey actions of users relative to a shared resource. A method for conducting a web-based co-presence collaboration conference includes selecting a form factor for a user presence indicator associated with an action of a first user identified based on data collected at one or more environmental sensors of a first co-presence collaboration device displaying the shared resource. The method further includes transmitting a presentation instruction to a second co-presence collaboration device displaying the shared resource concurrently with the first co-presence collaboration device. The presentation instruction instructs the second co-presence collaboration device to display the user presence indicator a select position relative to the shared resource and according to the selected form factor. | 2019-10-10 |
20190312918 | SYSTEM AND METHOD FOR PROVIDING A RICH USER EXPERIENCE FOR CELLULAR CALLS - An invitation is received from a cell phone application in a mobile device to join or establish a conference session. A determination is made that the invitation to join or establish the conference session is from a cellular network. For example, the invitation may be based on a known cellular telephone number in the request to join or establish the conference session. A push notification message is sent to a push notification service. The push notification message causes a conferencing application on the mobile device to become active. For example, the push notification message may cause the conferencing application to be launched in the mobile device. A message is received that indicates the conferencing application is active. Information is sent associated with the conference session to the active conferencing application. The information is then displayed to a user. An embodiment is also described for a collaboration application. | 2019-10-10 |
20190312919 | SYSTEM FOR BROADCASTING EVENTS - Systems and methods for broadcasting events are provided. The system, for example, may include, but is not limited to, a communication system, a memory, and a processor. The processor may be configured to receive, from the communication system, a session identifier identifying a broadcast session and at least one application event corresponding to the broadcast session from a presenting electronic device, update a playback queue corresponding to the broadcast session stored in the memory based upon the received at least one application event, receive, from the communication system, a subscription request to the broadcast session from at least one subscribing electronic device, and transmit, via the communication system, a corresponding playback queue to each electronic device subscribed to the broadcast session, the playback queue including instructions to regenerate the application event within an application operating on the at least one subscribing electronic device. | 2019-10-10 |
20190312920 | In-Band Quality Data - A method of transmitting data in a media stream in accordance with a media streaming protocol includes generating data of a first type associated with a first type identifier in accordance with the protocol, encapsulating the generated data in a data structure defined by the protocol, the data structure including a type identifier field for specifying a type of data contained within the data structure, setting the type identifier field to a second type identifier different than the first type identifier, forming a packet comprising the first data structure, and transmitting the packet in the media stream. | 2019-10-10 |
20190312921 | DETECTING AN EVENT FROM STREAMING DATA - The present invention extends to methods, systems, and computer program products for detecting events from ingested data streams. A data stream is ingested. A first score is computed from a portion of the data stream. The first score indicates a likelihood of the video stream including event information. Computing resources are allocated to further process the data stream portion based on the first score indicating that further processing is warranted. A second score is computed from parameters of the data stream portion. An event is detected based on the second score. | 2019-10-10 |
20190312922 | METHOD FOR PROCESSING TRANSCODING TASK, SYSTEM AND TASK MANAGEMENT SERVER - A method for processing a transcoding task includes: receiving the transcoding task created by a streaming media server, and dispatching the transcoding task to a transcoding server to allow the transcoding server to execute the transcoding task; detecting an execution status of the transcoding task in the transcoding server, when it is detected that the transcoding task is terminated, feeding back, to the streaming media server, a notification message signifying a termination of a transcoding process, to allow the streaming media server to determine whether to re-create the transcoding task; and if the streaming media server re-creates the transcoding task, receiving the re-created transcoding task sent by the streaming media server, and dispatching the re-created transcoding task to the transcoding server to allow the transcoding server to re-execute the transcoding task. | 2019-10-10 |
20190312923 | Method For VoLTE Voice Quality Fault Localization - Methods and apparatus for identifying a source of quality degradation for a media call flowing in a first direction and a second direction between a mobile-originating user equipment (UE) and a mobile-terminating (MT) UE are presented. In an example method, a network node obtains a set of multiple rules specified respectively for multiple candidate sources of quality degradation for the media call in the first direction. These rules indicate whether a particular candidate source is an actual source of quality degradation based on values of certain key performance indicators (KPIs). The network node identifies, from among the multiple candidate sources of quality degradation, one or more sources of quality degradation by evaluating one or more rules from the set of multiple rules. | 2019-10-10 |
20190312924 | Controlling Wireless Devices Using Aggregated Data from Cross-Network Access Points - This document describes methods, devices, systems, and means for controlling wireless devices using aggregated data from cross-network access points. An access point (AP) provides operational information from a plurality of different types of client devices communicating with the AP to a cloud service and obtains per-client-device-type policy data from the cloud service that is based on aggregated operational information from a plurality of different types of client devices from different AP networks. The AP controls, using a wireless transceiver, a wireless client device that is of a first type, using the per-client-device-type policy data for the first type based on aggregated operational information from a plurality of different types of client devices from different AP networks. | 2019-10-10 |
20190312925 | TIME-BASED CONGESTION DISCOUNTING FOR I/O FAIRNESS CONTROL - Computer system and method for managing storage requests in a distributed storage system uses congestion signals associated with storage requests, which are generated based on congestion at local storage of the computer system that supports a virtual storage area network. The storage requests are differentiated between a first class of storage requests and at least one other class of storage requests. For a storage request of the first class of storage requests, an actual ratio of a current average bandwidth of the first class of storage requests to a current average bandwidth of a second class of storage requests is calculated and compared with an expected ratio. The congestion signal associated with the storage request is then adjusted and transmitted to at least one source of storage requests for storage request fairness control. | 2019-10-10 |
20190312926 | PARTITION BALANCING IN AN ON-DEMAND SERVICES ENVIRONMENT - Techniques for partition balancing. Organization identifiers (orgIDs) are acquired for one or more organizations within a multi-organization on-demand services environment having multiple nodes, each of which have one or more partitions. A mapping of the orgIDs to the partitions within the multi-organization on-demand services environment is determined. Resource consumption for the organizations is determined. Resource consumption for the partitions based on the resource consumption of the organization and the mapping of the organization to the partitions is determined. A score for the partitions based on the resource consumption is generated. The partitions are redistributed among the nodes based on the partition scores. | 2019-10-10 |
20190312927 | NEWNODE: DECENTRALIZED CONTENT DISTRIBUTION NETWORK - A method and apparatus of a device that downloads content to a local device using a decentralized content distribution network is described. In an exemplary embodiment, the device receives a request from an application to download content using the decentralized content distribution network. In addition, the device determines a plurality of nodes in the decentralized content distribution network to download the content. For each of the plurality of nodes, the device attempts to establish communications between the device and that node. In addition, the device downloads a portion of the content from that node if communication is established between the local device and that node, wherein the size of the portion is based on at least a characteristic of that node. Furthermore, the device downloads a portion of the content from a proxy if communication cannot be established between the local device and that node, wherein the size of the portion is based on at least a characteristic of that proxy. | 2019-10-10 |
20190312928 | SYSTEMS AND METHODS FOR CONSENSUS-BASED DATA SECURITY FOR NETWORKED DEVICES - Systems and methods for providing reliability and redundancy of data for networked nodes (e.g., sensors and/or actuators) is provided. Each sensor may operate as network node in the sensor network that may operate as a peer to peer (P2P) consensus network. Each network node may maintain its local copy of a data chain and may generate a data block for updating the data chain. After a threshold number of network nodes generate the same consensus block from the data block, each network node may update its local data chain by appending the consensus block thereto. | 2019-10-10 |
20190312929 | INFORMATION SYNCHRONIZATION METHOD AND DEVICE - The present invention provides an information synchronization method and device. The method comprises: receiving a first request message sent from a terminal and used for requesting to create context information of the terminal, wherein the first request message comprises first context parameters for creating the context information of the terminal; creating the context information of the terminal according to the first context parameters; and sending a second request message to a gateway agent (GA) of a GA identifier according to the GA identifier obtained from the first context parameters and used for identifying the GA that needs to create the context information of the terminal, wherein the second request message is used for requesting the GA to create the context information of the terminal. | 2019-10-10 |
20190312930 | EXTERNAL INJECTION OF CLOUD BASED NETWORK FUNCTIONS INTO NETWORK SERVICES - Disclosed herein are system, method, and computer program product embodiments for providing an API description of an external network service and using the API to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (API), transmitting a call to the service provider using the API for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied. | 2019-10-10 |
20190312931 | DYNAMIC DATA BATCHING - The present disclosure relates to a network, comprising a switch, a server and a database, and specifically the dynamic batching of data from the switch to the server for uploading to the database according to dynamic feedback received from a monitoring device arranged to obtain operation metrics from at least one of the server device and the database. | 2019-10-10 |
20190312932 | SYSTEM AND METHOD FOR CLIENT POLICY ASSIGNMENT IN A DATA STORAGE SYSTEM - A system and method for property assignment in a data storage system is presented. A data storage system defines a client configuration profile comprising a set of storage operation properties, wherein the storage operation properties regulate criteria for performing storage operations by the data agent on client devices that are associated with the client configuration profile. A storage management system associates a first client device to the client configuration profile; and communicates the set of properties of the client configuration profile to property tables of corresponding objects in the first client device. | 2019-10-10 |
20190312933 | Distributed Data Analysis for Streaming Data Sources - This application is directed to a distributed data processing method performed at a server system coupled to a linear communication orbit. The server system has a plurality of function modules. Each function module is configured to collect data related to a core function from the linear communication orbit. Each function module includes an internal client configured to adaptively perform a set of data processing operations according to a schema definition, including generating a data collection request for collecting raw data items, sending the data collection request through the linear communication orbit, collecting the requested raw data items from a set of machines via the linear communication orbit, and performing analysis on the collected raw data items. In some embodiments, a central data management module of the one or more servers is configured to provide the schema definition to and receive result data reported from the function modules. | 2019-10-10 |
20190312934 | MIGRATION TO CLOUD STORAGE FROM BACKUP - During a data protection operation, a data storage system can collect computing attributes associated with hosting of an application generating data being backed up and may also obtain information relating to physical characteristics of the computing device hosting the application and the data. At the time of migration to a cloud, the system can use the collected attributes and/or information to provision cloud resources. For instance, the cloud storage system may accept provisioning requests, and may provide several templates which each specify a cloud resource that can be provisioned upon request, such as a cloud computing resource. The system can compare the collected attributes with the attributes of the available templates to determine the best match. Then, the system can issue a provisioning request to the cloud provider according to the best-matched template. After provisioning the resources, the system can restore backup data of the application to the cloud storage system to migrate the data. | 2019-10-10 |
20190312935 | AVIONICS DATA ACCESS FUNCTION - A system is disclosed for facilitating communications between certified on-board avionics control functions and one or more uncertified remote client applications. The system includes an avionics data access function (ADAF), which acts as a multi-mode data acquisition agent for the onboard avionics control functions and serves the requests from the remote client applications. In some cases, ADAF comprises a separate space- and time-partitioned module, which handles retrieving data from the onboard avionics and transmitting the data to the remote client application(s) in the appropriate format. | 2019-10-10 |
20190312936 | ON-SITE SYSTEM - An on-site system includes a disclosure-condition-table storage unit and a disclosure-condition-table creation unit. The disclosure-condition-table storage unit stores a disclosure condition table for management of a relationship between a purpose of a service and a data characteristic of on-site data, as a disclosure condition for disclosing the on-site data to a service device that provides the service. The disclosure-condition-table creation unit creates the disclosure condition table in which a purpose of a service included in descriptive information of the service is associated with a data characteristic included in descriptive information of the on-site data, and stores the disclosure condition table in the disclosure-condition-table storage unit. | 2019-10-10 |
20190312937 | SYSTEM AND METHOD FOR IMPROVING EFFICIENCY OF SSL/TLS CONNECTIONS - A system for optimizing network traffic is described. An appliance operates within a cluster of appliances. The appliance includes one or more network interfaces to facilitate a first secure session between a client device and the appliance, and a second secure session between the appliance and a server. One of the network interfaces is configured to receive a secure connection request to the server. A secure session exchange module acquires a message from another appliance, with the message indicating that the other appliance is acting as a primary instance for the server. The secure session exchange module determines whether a valid primary instance for the server exist, and requests from the other appliance at least one session-related parameter based on determination of existence of the valid primary instance for the server. A session to the server is used based on at least one session-related parameter acquired from the other appliance. | 2019-10-10 |
20190312938 | Data Transmission Method And Apparatus - The present disclosure relates to data transmission methods. One example method includes receiving, by a receive end, at least two streams from a transmit end, where each stream of the at least two streams includes a plurality of data packets, each data packet carries a stream identifier of a stream to which the particular data packet belongs and a stream data sequence number, and the stream data sequence number indicates a sequence of the particular data packet in the stream to which the particular data packet belongs, for at least one of the at least two streams, determining, by the receive end, that a data packet whose stream data sequence number meets a sequential condition has been received, and submitting, by the receive end, the data packet whose stream data sequence number meets the sequential condition. | 2019-10-10 |
20190312939 | CLOUD PLATFORMS, SERVICES, AND METHODS - A cloud data management method comprising: receiving, from a first client device, client data for cloud storage; analyzing a first ledger to determine one or more acceptable cloud storage services from a plurality of cloud storage services; uploading, to the one or more acceptable cloud storage services, the client data; and updating the first ledger to include an indication of a location for the client data at the one or more acceptable cloud storage services. | 2019-10-10 |
20190312940 | Apparatus and method for analyzing using pattern of crypto currency and providing service based on artificial intelligence - An apparatus and a method for analyzing a using pattern of crypto currency and providing a service based on artificial intelligence are provided. The apparatus analyzes a using pattern of artificial intelligence-based crypto currency and provides customized services by analyzing a using pattern of a user who uses crypto currency in response to popularization of the crypto currency. The apparatus predicts a future using pattern of the user by analyzing the using pattern of the user only with simple using of the crypto currency, provides various customized services to respective users through analysis and prediction of using patterns by artificial intelligence, maximizes usage convenience by handling processes from the use of crypto currency to the providing of service as one stop, and maximizes precision of using pattern analysis and satisfaction of service provided to the user by combining characteristics of crypto currency and advantages of artificial intelligence. | 2019-10-10 |
20190312941 | METHOD AND SYSTEM FOR CROSS CHANNEL IN-CAR MEDIA CONSUMPTION MEASUREMENT AND ANALYSIS USING BLOCKCHAIN - A method and system for measuring and analyzing in vehicle media consumption and user interaction with a vehicle through an in vehicle entertainment system located in the vehicle. The in vehicle entertainment system receives media content. The method and system monitors both the media content and user interaction with the vehicle with content and interaction measurement software stored in the storage of the head unit of the vehicle as a module on the in vehicle entertainment system. The content measurement software directly records data relative to the media content being played or user interaction, in real time, as a data set and transmits the data set relative to the media content being played and user interaction to at least one immutable distributed ledger. The data set includes at least the local time of the start of the media content or the user interaction and is hashed. | 2019-10-10 |
20190312942 | SYSTEMS AND METHODS FOR RECOGNIZING A DEVICE - A system for detecting whether a device seeking communication with a server is a returning device that previously communicated with the server includes a database that stores groups of device attributes based on observable device characteristics and unique identifiers. The database is generally not accessible to the devices. Each attribute group and the associated device identifier (DID) can uniquely identify a particular device, and the associated DID is generally not derivable from the attributes. The database may satisfy a uniqueness property so that each attribute value in the database may also uniquely identify a device. | 2019-10-10 |
20190312943 | SYSTEMS AND METHODS FOR AVOIDING SERVER PUSH OF OBJECTS ALREADY CACHED AT A CLIENT - This patent document describes, among other things, methods, apparatus, and systems for tracking those resources that a server has pushed to a client, e.g., using the HTTP 2.0 or other server push mechanism. Pushed resources may be cached at the client. By tracking such pushed resources, a server can avoid pushing such cached resources in response to subsequent requests from that client; doing so would be wasteful if the client already has the resource cached. Among other things, techniques for storing, encoding, organizing, and managing data about pushed resources in cookies are disclosed. | 2019-10-10 |
20190312944 | UPDATING PLAYLISTS USING PUSH AND PULL - Some implementations allow users to create and share data including playlists. Such playlists may be subscribed to by other users. Changes to such playlists, such as updates by the curator of the playlist, must be propagated to subscribers in a timely manner while efficiently utilizing resources. Some implementations allow updates to be propagated using a push notification to cause client devices to request the update (push). Alternatively, updates may be made when the client devices of the subscribers next accesses the system (pull). An aggregator system may be used to make decisions on which users to send push notifications, and which users to wait to pull updates on their own. Additionally, the aggregator may determine that certain playlist updates should be distributed using push notifications. The aggregator may determine that only certain playlist subscribers should receive push notifications regarding playlist updates. | 2019-10-10 |
20190312945 | SYSTEMS AND METHOD FOR PROVIDING A PROXY TO UNIVERSAL PLUG AND PLAY DEVICES - A proxy may provide user equipment (“UE”), operating within or outside a particular Local Area Network (“LAN”), access to different network-connected devices operating within the particular LAN, including access to read data from the devices, write data to the devices, or otherwise configure the devices to perform various tasks, functions, or other actions. The proxy may provide an external network interface to access the network-connected devices of a given LAN by converting and securely exchanging messaging between a first interface that is exposed to the external network, such as the Internet, and a different second interface with which the network-connected devices communicate within the LAN. A single application or user interface, executing on the UE, may also be used to facilitate messaging with the proxy, and access to each of the different network-connected devices on the LAN. | 2019-10-10 |
20190312946 | ORCHESTRATION ENGINE FACILITATING MANAGEMENT OF OPERATION OF RESOURCE COMPONENTS - Systems, computer-implemented methods, and computer program products that facilitate orchestration engine components for a cloud computing environment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a blueprint component that can, based on one or more dependencies between respective resource components of a cloud-based computing platform, declare a steady state action to be executed in response to a steady state event indicative of an event associated with steady state operation of a resource component of the cloud-based computing platform. The computer executable components can further comprise an orchestration engine component that can, based on the blueprint component, execute the steady state action in response to the steady state event. | 2019-10-10 |
20190312947 | INTER-PROCESS COMMUNICATION FAULT DETECTION AND RECOVERY SYSTEM - An inter-process communication (IPC) system, includes a first client engine, a first server engine, and a broker engine that is coupled to the first client engine. The broker engine initiates a first timer that is configured to reset when traffic is received from the first server engine while the first server engine is registered with the broker engine and coupled to the broker engine via a communication channel. The traffic that causes the first timer to reset includes at least one of: traffic generated by the first client engine to complete a request, and a first server-to-broker heartbeat message generated by the first server engine. The broker engine determines that the first timer has reached a predefined time amount, and in response, removes the registration of the first server engine and removes the communication channel between the broker engine and the first server engine. | 2019-10-10 |
20190312948 | PROBABILITY BASED CACHING AND EVICTION - Some embodiments set forth probability based caching, whereby a probability value determines in part whether content identified by an incoming request should be cached or not. Some embodiments further set forth probability based eviction, whereby a probability value determines in part whether cached content should be evicted from the cache. Selection of the content for possible eviction can be based on recency and/or frequency of the content being requested. The probability values can be configured manually or automatically. Automatic configuration involves using a function to compute the probability values. In such scenarios, the probability values can be computed as a function of any of fairness, cost, content size, and content type as some examples. | 2019-10-10 |
20190312949 | Prefetch cache management using header modification - An apparatus ( | 2019-10-10 |
20190312950 | HEBBIAN LEARNING-BASED RECOMMENDATIONS FOR SOCIAL NETWORKS - A network device applies Hebbian-based learning to provide content recommendations in content-based social networks. The method includes obtaining customer activity data for a content-based social network; modeling the customer activity data as nodes and edges within the content-based social network, the nodes representing users and the edges representing connections between the users; assigning initial weights to the edges, that correspond to a connection strength, based on user-designated of relationships between the nodes; adjusting the initial weights in response to temporally correlated activity between the nodes from the customer activity data, to provide adjusted weights; identifying a content recommendation for a particular node based on an activity to access content by another node and one or more of the adjusted weights; storing a customer profile including the content recommendations associated with a node; and providing the content recommendation to a user device associated with the customer profile. | 2019-10-10 |
20190312951 | UPDATING A PROFILE - Updating a profile includes monitoring electronic communications between a target user and a number of other users in real-time, extracting communicated information available about the target user and the number of other users from the electronic communications, based on an analysis of the communicated information available about the target user and the number of other users identifying relevant information from the communicated information that is relevant for updating the profile of the target user on at least one social network, and updating the profile of the target user on the at least one social network using the relevant information derived from the analysis. | 2019-10-10 |
20190312952 | Method and System for Mobile Applications Update in the Cloud - A method, system and a computer program product are provided for updating mobile device applications at a central cloud server by establishing an application virtual machine representation of a first mobile device application installed on a mobile device; updating the application virtual machine representation at the central cloud server to perform software configuration, installation, upgrade, optimization, testing, or maintenance tasks on the application virtual machine representation without using computational resources at the mobile device; and sending the mobile device one or more modules that were changed when updating the application virtual machine representation for integration into the first mobile device application installed on the mobile device. | 2019-10-10 |
20190312953 | CONTENT MANAGEMENT AND TRANSFORMATION SYSTEM FOR DIGITAL CONTENT - A transformation engine that enables content and information to be transformed from one format, a source format, to a format that is compatible with the requesting device, a destination format. Advantageously, various device types can access and share content via a network without concern as to the original format of the content. When a client device provides a request for content, the transformation engine identifies delivery characteristics of the client device, and identifies a source for the requested content. The transformation engine then transforms the source formatted content into a format identified through a best fit analysis of the delivery characteristics of the device. | 2019-10-10 |
20190312954 | GAME RECAP PUSH ADVERTISEMENTS - Provide, to a user, a banner with which it may be possible to arouse an interest of the user with respect to a specific application. A banner relating to an application that has been executed on a terminal device can be displayed on the terminal device. The banner can be generated on the basis of information unique to the terminal device or to a user thereof, the information being collected by a server device during execution of the application. Examples of the unique information include information relating to video displayed on the terminal device during execution of the application, and information relating to manipulations inputted to the terminal device during the execution of the application. Examples of a banner include media that include the video, and media that reproduce the manipulations on the terminal device on the basis of information relating to the manipulations. | 2019-10-10 |
20190312955 | DIGITAL RIGHTS LIST FOR DEVICE GROUPS - In one example, a device directory server may maintain a digital rights management list for a user device belonging to a device group associated with a user. The device directory server may maintain a primary digital rights management list associating a user device with a primary online account for a user having a content license for a digital content item. The device director server may receive a status update indicating the user device is still in use by the user if sent by the user device. The device directory server may determine whether a status update has been received from the user device. The device directory server may deactivate the user device on the primary digital rights management list when no status update has been received within a pruning period for the user device to be associated with the primary online account. | 2019-10-10 |
20190312956 | BEACON UTILIZATION SYSTEM, METHOD, BEACON UTILIZATION METHOD - In accordance with an embodiment, a beacon utilization system comprises an image forming apparatus, a server and a mobile terminal. The image forming apparatus wirelessly transmits a beacon including identification information, and sends a status to the server. The server receives the identification information from the mobile terminal, and sends map information for displaying the image forming apparatus specified by the identification information to the mobile terminal. The mobile terminal receives the beacon, sends the identification information to the server, receives the map information from the server, and displays a map screen for displaying the status of the image forming apparatus indicating a position of the image forming apparatus on the basis of the map information. | 2019-10-10 |
20190312957 | SYSTEMS AND METHODS FOR AIRCRAFT INTERFACE DEVICE CONNECTIVITY WITH MOBILE DEVICES - A computer-implemented method for providing vehicle data to a mobile device is disclosed. The method may include: receiving raw vehicle data from one or more vehicle data streams using one or more protocols; recording the received raw vehicle data from the one or more vehicle data streams in a file format; and transmitting the recorded vehicle data to a mobile device having at least one application configured to interpret the transmitted vehicle data. | 2019-10-10 |
20190312958 | SYSTEMS AND METHODS FOR INDICATING AND DETERMINING CHANNEL STRUCTURE INFORMATION - Systems and methods for indicating and determining channel structure information in a wireless communication network are disclosed herein. In one embodiment, a method performed by a first node is disclosed. The method comprises: receiving a wireless signal from a second node; obtaining channel structure information indicated by the wireless signal; determining a first waveform parameter set configured for the channel structure information indicated by the wireless signal; and determining transmission attributes of a transmission link between the first node and the second node in a predetermined time duration with respect to the first waveform parameter set based on the channel structure information. | 2019-10-10 |
20190312959 | Normalization of Communication between Devices - The invention is a method and device for normalizing communication. The method includes receiving on a first device a first message via a first protocol from a second device; transmitting a second message to a third device via a second protocol, wherein the second message is transmitted using a first spreading factor; initiating a delay timer upon transmitting the second message, wherein a duration of the delay timer is based on a second spreading factor, wherein the second spreading factor is greater than or equal to the first spreading factor; receiving a third message from the third device via the second protocol, wherein the third message is transmitted using the first spreading factor, and wherein the third message is in response to the second message; and upon the expiration of the delay timer, sending a fourth message to the second device via the first protocol. The device includes the hardware and instructions to perform the method. | 2019-10-10 |
20190312960 | MOBILE TERMINAL - There is disclosed a mobile terminal including: a display; a middle frame including a supporting portion and a side portion provided around the supporting portion to define a lateral external appearance; a main board including a ground; a first wireless communication unit configured to transceive a first signal; a second wireless communication unit configured to transceive a second signal; and a rear case configured to cover a rear surface of the main board, wherein the side portion includes a plurality of conductive members of which ends are divided into slits, and the plurality of the conductive members includes a common antenna electrically connectable with the first wireless communication unit and the second wireless communication unit and configured to receive the first signal and the second signal; and an independent antenna electrically connectable with the first wireless communication unit and configured to receive the first signal. | 2019-10-10 |
20190312961 | MOBILE TERMINAL - The durability of a mobile terminal can be improved by improving the heat-dissipating performance thereof, the mobile terminal comprising an inner space and having a camera hole formed on the rear surface thereof; a substrate located in the inner space and having an electric element mounted thereon; a camera module including a lens part and mounted at a location corresponding to the camera hole; a deco frame, which includes a lens hole for exposing a lens part of the camera module and a heat-dissipating hole formed on the circumference of the lens hole, and is inserted into the camera hole; and a heat-dissipating sheet located in the inner space and including a heat-absorbing part coming in contact with the electric element, a heat-dissipating part located on the inner side of the deco frame and covering the heat-dissipating hole, and a heat transfer part connecting the heat absorbing part and the heat-dissipating part. | 2019-10-10 |
20190312962 | MOBILE PHONE - A mobile phone includes a phone body including spaced lateral perimeter walls. At least one indentation is provided in each of the said spaced lateral walls, the indentations forming a detent or cavity to provide an overhang portion suitable for being selectively gripped or released by correspondingly mating jaws or hooks on an accessory attachable to the mobile phone. | 2019-10-10 |
20190312963 | INTERNET PHONE SYSTEM - An internet phone system includes an internet phone main body, an expansion device and a multiple-layer connecting card. The internet phone main body includes a first connecting port. The at least one expansion device includes a second connecting port. One end of the multiple-layer connecting card is connected to the first connecting port, and the other end is connected to the second connecting port such that the internet phone main body can be electrically connected to the expansion device via the multiple-layer connecting card. The expansion device is capable of combining with another expansion device by another multiple-layer connecting card. | 2019-10-10 |
20190312964 | Lighting Device for a Mobile Terminal - A lighting device for a mobile terminal is disclosed. In an embodiment the lighting device includes a light-emitting component comprising a light-emitting semiconductor element and a first light emission face and a second light emission face, the light-emitting component configured to emit light radiation, a first optical waveguide for guiding the light radiation via the first light emission face to a first radiation element, a second optical waveguide for guiding the light radiation via the second light emission face to a second radiation element and at least one optical switch arranged in a region of the first light emission face or the second light emission face for controlling a quantity of light emitted from the light-emitting component via the respective light emission face. | 2019-10-10 |
20190312965 | MOBILE TERMINAL AND METHOD FOR CONTROLLING SAME - The present invention relates to a wrist-wearable mobile terminal and a method for controlling the same. A mobile terminal according to an embodiment of the present invention comprises: a band configured to be worn around a user's wrist; a first body connected to the band; a second body formed to be attachable to or detachable from the first body; and a control unit for outputting information relating to an external device to different devices when the first body and the second body are separated from each other and when the same are coupled to each other, respectively. | 2019-10-10 |
20190312966 | METHODS AND SYSTEMS FOR FACILITATING AUTOMATED CONTACT WITH EMERGENCY SERVICES IN CASE OF AN EMERGENCY - Further disclosed herein is a system for facilitating automated contact with emergency services in case of an emergency, in accordance with some embodiments. Accordingly, the system may include a communication device configured for receiving at least one of an emergency indicator, and a distress input from a first user device. Further, the communication device may be configured for transmitting a request to a second user device for initiating communication with at least one emergency contact. Further, the system may include a processing device configured for analyzing the at least one of the emergency indicator, and the distress input to determine an emergency situation. | 2019-10-10 |
20190312967 | SYSTEM AND METHOD FOR MOBILE DEVICE TO AUTOMATICALLY DISABLE FINGERPRING UNLOCK WHEN USER IS SLEEPING - A device includes a processing component, a user interface component, a locking component, a biometric parameter unlock component, a detecting component and a sleep bypass component. The processing component performs a processing function. The user interface component instructs the processing component to perform the processing function. The locking component prevents the user interface component from instructing the processing component to perform the processing function. The biometric parameter unlock component detects a biometric parameter of the user and disables the locking component to enable the user interface component to instruct the processing component to perform the processing function. The detecting component generates a sleep signal based on a detected sleeping parameter of the user indicating that the user is asleep. The sleep bypass component disables biometric parameter unlock component based on the sleep signal. | 2019-10-10 |
20190312968 | COUNTRY-SPECIFIC TELEPHONE NUMBER SYSTEM ANALYSIS SYSTEM USING MACHINE LEARNING TECHNIQUE, AND TELEPHONE CONNECTION METHOD USING SAME - Provided is a country-specific telephone number system analysis system. The system includes a telephone number system analysis logic server; a number analysis machine learning system; a country-specific international call service provider information database; a country-specific telephone number system information database; and a telephone call connection logic database. The telephone number system analysis logic server receives a target telephone number of a telephone call from a user terminal, and checks whether the target telephone number conforms to an international telephone number system protocol. When it is determined that the target telephone number does not conform to the international telephone number system protocol, the number analysis machine learning system identifies a country corresponding to the target telephone number by accessing the country-specific telephone number system information database. When the country and an international call service provider are identified by the number analysis machine learning system, the target telephone number is dialed after adding a dial code of the international call service provider and a country code as prefixes before the target telephone number, based on the telephone call connection logic database. | 2019-10-10 |
20190312969 | USER INTERFACE CONTROLS FOR CAPTURING COMMUNICATION DATA - Disclosed are various embodiments related to user interface controls for capturing communications data with a remote device. In one embodiment, a system includes a transceiver, a computing device, and an application executable in the computing device. The application can detect an incoming call signal of a phone call and render an incoming call user interface on a display. The incoming call user interface includes a call tracking component that is configured to initiate a call tracking action. The application also can initiate the phone call in response to receiving a user manipulation of the call tracking user interface component. Then, the application can execute the call tracking action, which can involve generating call data associated with the phone call. The application also cause the computing device to render a call tracking user interface that displays the call data. | 2019-10-10 |
20190312970 | FACILITATING SOFTWARE DOWNLOADS TO INTERNET OF THINGS DEVICES VIA A CONSTRAINED NETWORK - Software downloads to Internet of things (IoT) devices are facilitated over a constrained network. In one embodiment a method comprises monitoring, by a network device comprising a processor, data determined to have been sent to a device for transmission to the device via a radio access network device of a wireless communication network, and determining, by the network device, a type of traffic associated with the data. The method further includes based on a determination that the data comprises firmware and that the type of traffic is of a traffic priority that is lower than a defined traffic priority, applying, by the network device, a low priority transport protocol to the data, wherein the applying comprises associating protocol information with the data representative of the low priority transport protocol. | 2019-10-10 |
20190312971 | FAULT ROUTING OF AN EMERGENCY COMMUNICATION - Aspects of the disclosure relate to routing of an emergency communication under fault conditions. Routing can be implemented in a packet-switching (PS) network that provides voice service. For a network node of the PS network, availability to route the emergency communication through a specific emergency service routing number (ESRN) can be determined and, in response to the network node being unavailable, administrative data associated with the ESRN can be accessed. In addition, an identifier associated with the administrative data can be updated (e.g., created or modified) with data indicative of the device that originated the emergency communication. The administrative data and the resulting identifier can be delivered to a second network node that can route the emergency communication to an emergency service network. | 2019-10-10 |