06th week of 2022 patent applcation highlights part 68 |
Patent application number | Title | Published |
20220046017 | SYSTEMS, METHODS, AND MEDIA FOR AUTHENTICATING MULTIPLE DEVICES - Systems, methods, and media for authentication are provided. In accordance with some implementations, the system comprises: a hardware processor that is programmed to: receive, from a device, a message relating to an authentication status of a user account associated with the device; transmit an authentication request to the device that is transmitted to an authentication server; receive, from the device, a response to the authentication request that includes authentication data relating to a session corresponding to the user account on the authentication server; cause an interface to be presented that requests authorization to authenticate the device with the authentication server using the user account; and transmit the authentication data to the device that causes the device to retrieve a corresponding authentication token from the authentication server, wherein the corresponding authentication token authenticates the user account on the device. | 2022-02-10 |
20220046018 | DYNAMIC USER AUTHORIZATION WITH A SERVICE PROVIDER - This disclosure describes techniques for dynamically changing a user authorization with a service provider during an ongoing user session. The changing user authorization may be used to address changing confidence in an identity of a user consuming a service provided by the service provider. The changing user authorization may also be used to adjust a scope of a service to which a user has access. The present techniques may allow single-sign-on type protocols to accomplish the flexible and dynamic change-of-authorization functionality of some traditional protocols to handle ongoing client-server sessions, rather than simply revoking authorization for access to the service. For this reason, the present techniques are able to integrate advantages of traditional protocols with newer, single-sign-on-type protocols. | 2022-02-10 |
20220046019 | ADDING THIRD PARTY HARDWARE TO NETWORK DEVICES - An example network device includes one or more hardware resources; a physical interface for receiving a hardware component; a memory; and one or more processors implemented in circuitry and configured to: receive the hardware component that has been coupled to the physical interface of the network device; receive data for an application programming interface (API) for the hardware component; store the data for the API to the memory; and execute the data for the API to grant the hardware component secure access to the hardware resources of the network device via the API. The hardware component may be an optical network interface. The resources may be raw registers of the network device. The processors may further tune the hardware component according to configuration for the network device, such as power management configuration for the network device, or the network device itself. | 2022-02-10 |
20220046020 | SECURITY SERVICE FOR AN UNMANAGED DEVICE - Particular embodiments described herein provide for a network element that can be configured to receive, from an electronic device, a request to access a network service. In response to the request, the network element can send data related to the network service to the electronic device and add a test link to the data related to the network service. The network element can also be configured to determine if the test link was successfully executed and classify the electronic device as untrusted if the test link was not successfully executed. | 2022-02-10 |
20220046021 | GATEWAY ENROLLMENT FOR INTERNET OF THINGS DEVICE MANAGEMENT - Disclosed are various examples for enrollment of gateway enrollment for Internet-of-Things (IoT) device management. In one example, the gateway device transmits an enrollment request to a management service. The enrollment request includes enrollment credentials that are entered through a user interface. The gateway device receives gateway credentials that authenticate communications with a management service. Subsequent communications transmitted from the gateway device to the management service are authenticated using the gateway credentials. | 2022-02-10 |
20220046022 | DISTRIBUTED EVALUATION LIST UPDATING - Methods and systems for providing distributed evaluation list updating. One system includes a data processing server. The data processing server receiving a request event associated with an update to an active evaluation list version. The active evaluation list version is actively accessible for request validation. The data processing server also generates an updated evaluation list version according to the update associated with the request event. After generating the updated evaluation list version, the data processing server replaces the active evaluation list version with the updated evaluation list version in storage, where, in response to storing the updated evaluation list version, the updated evaluation list version is actively accessible for request validation. | 2022-02-10 |
20220046023 | TRUST TOKENS FOR RESOURCE ACCESS - A system and method are provided which include receiving, from a first application on a user device, an indication that a user has been authenticated and receiving, from a second application on the user device, an indication that the user is detected. The user device receives the indication that the user is detected from a wearable device on the user. Based on receiving the two indications within a time period, a trust token is generated or maintained for the user. | 2022-02-10 |
20220046024 | TLS POLICY ENFORCEMENT AT A TUNNEL GATEWAY - Disclosed are various approaches for verifying the compliance of a TLS session with TLs policies. Traffic between an application and a destination server can be routed through a TLS gateway. The TLS gateway can inspect TLS handshake messages for compliance with TLS policies. | 2022-02-10 |
20220046025 | SYSTEMS AND METHODS FOR CONTROLLING EMAIL ACCESS - Examples described herein include systems and methods for controlling access to a server, such as an email server or a gateway, in situations where the identity of the requesting device is unknown or where the user device accesses the server using an unknown or unmanaged application. In one example, the system can utilize a user authentication credential included in the request to identify other devices belonging to the user that happen to be enrolled with the system. An out-of-band message can be sent to those enrolled devices, requesting confirmation from the user and, in conjunction with an authentication token, allowing the system to trust the previously unknown device. In the example of an unmanaged application attempting to access an email server, the system can confirm compliance of the requesting device and issue an authentication token that, along with an appropriate command sent to the email server, provides access. | 2022-02-10 |
20220046026 | ROUTER, METHOD FOR ROUTER, COMPUTER READABLE MEDIUM, AND APPARATUS - The present disclosure relates to a router, a method for a router, a computer readable medium and an apparatus. A router is provided, comprising: a memory having instructions stored thereon; and a processor configured to execute the instructions stored on the memory to cause the router to: receive a request from a first client device to access a graphical user interface (GUI) of the router; determine whether the first client device is a trusted device according to a physical address of the first client device; and based at least on the determination that the first client device is a trusted device, allow the first client device to access the GUI of the router without entering a password. | 2022-02-10 |
20220046027 | DISTRIBUTED DIGITAL CURRENCY MINING TO PERFORM NETWORK TASKS - A system to generate a web index includes a computing device having a processor and a memory operatively coupled to the memory. The computing device is configured to access a plurality of webpages through a network along a directed route. The computing device is also configured to generate an index corresponding to the plurality of webpages. The computing device is further configured to distribute a digest corresponding to the index to one or more additional computing devices in the network. | 2022-02-10 |
20220046028 | METHOD AND SYSTEM FOR DETERMINING A STATE OF AN ACCOUNT IN A NETWORK DEVICE RUNNING A LIGHT CLIENT PROTOCOL OF A DISTRIBUTED LEDGER TECHNOLOGY NETWORK - Methods and network devices for determining a state of an account of interest in a distributed ledger technology (DLT) network are described. The determination of the state of the account of interest is performed based on a DLT state indicator that is a representation of a state of the DLT network that is trusted by the network device. The network device determines whether the DLT state indicator is indicative of the state of the account of interest. Responsive to determining that the DLT state indicator is indicative of the state of the account of interest, the network device retrieves the state of the account of interest based on the DLT state indicator. Responsive to determining that the DLT state indicator is not indicative of the state of the account of interest, the network device performs the following operations: determining a first set of one or more transactions that include the account of interest and executing the first set of transactions to obtain the state of the account of interest. | 2022-02-10 |
20220046029 | DATA COMPRISING ENCRYPTION KEY - Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device. | 2022-02-10 |
20220046030 | SIMULATING USER INTERACTIONS FOR MALWARE ANALYSIS - Simulating user interactions during dynamic analysis of a sample is disclosed. A sample is received for analysis. Prior to execution of the sample, a baseline screenshot of a system folder is generated by accessing frame buffer data stored on a graphics card. The sample is caused to execute, at least in part using one or more hypervisor instructions to move a pointing device to an icon associated with the sample. A current screenshot of the system folder is generated by accessing current frame buffer data stored on the graphics card. | 2022-02-10 |
20220046031 | CLIENT-SIDE ATTACK DETECTION VIA SIMULATION - Client-side attack detection via simulation for detecting and mitigating cross-site script code client-side attacks is disclosed. A system can receive, through a network interface from a web server, a first response having a first payload that includes an action based on a request to the web server and a second response having a corresponding payload that is received concurrently with the first response on a signal path from the web server that is different from that of the first response. The system can invoke the action from the first payload and detect malicious activity in the invoked action. The system can verify the detecting of the malicious activity and issue a message indicating a security incident relating to the malicious activity. The system can either allow or restrict passage of the second response to a network based on a mode of the system when the malicious activity is verified. | 2022-02-10 |
20220046032 | LOW-LATENCY IDENTIFICATION OF NETWORK-DEVICE PROPERTIES - A method comprises analyzing, by a machine-learning model, a first network communication with a first set of inputs. The method also comprises inferring, by the machine-learning model and based on the analyzing, that a first device that is a party to the first network communication exhibits a device property. The method also comprises extracting, from the machine-learning model, a first set of significant inputs that had a significant impact on the determining. The method also comprises creating, using the first set of inputs, a rule for identifying the device property. The rule establishes a condition that, when present in a network communication, implies that a party to the network communication exhibits the device property. | 2022-02-10 |
20220046033 | INDUSTRIAL CONTROL SYSTEM MONITORING METHOD, DEVICE AND SYSTEM, AND COMPUTER-READABLE MEDIUM - The present disclosure relates to a monitoring method, device and system for an industrial control system and a computer-readable medium. They are used to effectively monitor the industrial control system. The method includes: obtaining first network traffic transmitted in the industrial control system in a passive monitoring manner; determining whether it is necessary to monitor the industrial control system in an active probe manner according to characteristics of industrial devices in the industrial control system in the first network traffic; and upon determining it is necessary to monitor the industrial control system in an active probe manner, determining a target industrial device according to the characteristics of the industrial devices in the industrial control system in the first network traffic, sending third network traffic to the determined target industrial device, and obtaining second network traffic sent by the target industrial device in response to the third network traffic. | 2022-02-10 |
20220046034 | METHOD AND SYSTEM FOR ON-BOARD CYBER SECURITY - A system, method, and computer readable and executable media for detecting, alerting, managing, and optionally mitigating cyber security events on an aircraft's networks using an on-board cyber security appliance and applications that monitors and detects cyber security events in real time. A software selectable cyber security agent within the cyber security appliance mitigates (if enabled) the effects of a cyber security events and/or anomalies on the aircrafts networks while the aircraft is in-flight and/or on the ground. | 2022-02-10 |
20220046035 | Man-in-the-middle (MITM) checkpoint in a cloud database service environment - A technique to protect a cloud database located at a database server and accessible from a database client. In this approach, a communication associated with a database session is intercepted. A hostname or network address associated with the communication is then evaluated to determine whether such information can be found in or otherwise derived from data in a database protocol packet associated with the database session. The information typically is placed there unavoidably by the cloud database client and normally cannot be spoofed by a process that does not understand or speak the proper database protocol semantics. Upon a mismatch, the database session is flagged as being potentially associated with a man-in-the-middle (MITM), in which case a given action may then be taken with respect to the database session that is then active. The technique provides for a MITM checkpoint in a cloud database service environment. | 2022-02-10 |
20220046036 | Mirage Instance of a Database Server - Instances of a database server can be of two kinds, regular or mirage that respectively handle database requests in sessions behaving normally or abnormally, and based on changes in behavior, sessions are relocated therebetween. Behavior of sessions is evaluated based on statistics generated in processing requests in individual steps within one or more stages, such as parse stage. The evaluation may be automatically tuned by changing tests that are enabled based on priorities, changing thresholds within tests, changing whether sessions are evaluated together as a group, and changing periodicity of evaluation. Evaluation may be triggered by news of normal/abnormal activity in locations of sessions' origin. Mirage instances can be of multiple classes, execute in lower/higher capacity computers. Sessions may start in either kind of instance. Sessions may be relocated for reasons unrelated to maliciousness, such as excessive utilization of resources, excessive errors, or update of software of the database server. | 2022-02-10 |
20220046037 | AIRCRAFT NETWORK MONITORING AND ATTESTATION - A system and method for compiling and monitoring a list of operational aircraft components to determine if a threshold is met. Utilizing the list and the threshold can provide for monitoring the network of aircraft components to monitor both health and security of the aircraft network and components thereof. The system can then indicate or alert when a threshold is met or exceeded. Such an alert can be on a display to a pilot, for example, or to a remote monitoring station. | 2022-02-10 |
20220046038 | Live log analysis for real-time data manipulation and visualization of a large data set - Systems and methods for visualization monitoring data from a cloud-based system include obtaining the monitoring data, wherein the monitoring data is based on transactions associated with a plurality of users of the cloud-based system; providing a Graphical User Interface (GUI); obtaining a plurality of filter selections for a plurality of filter types; and displaying a visualization comprising a Sankey diagram of the monitoring data with nodes in the Sankey diagram including each of the plurality of filter types and links between the nodes indicative of the transactions in the monitoring data. The monitoring data can be for one or more of cloud security service transactions, application access via a Zero Trust Network Access (ZTNA) service, and user experience metrics. | 2022-02-10 |
20220046039 | METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR ABNORMALITY DETECTION - The present disclosure relates to a method, a device, and a computer program product for abnormality detection. The method provided by embodiments of the present disclosure includes: acquiring information related to a target request initiated by a client terminal to an application and at least one context request, the information at least indicating the type and initiation time of the target request and the type and initiation time of the at least one context request; converting the acquired information into a vectorized feature representation for the target request; and determining an abnormality detection result of the target request based on the vectorized feature representation and using an abnormality detection model, the abnormality detection result indicating whether the target request is an abnormal request, and the abnormality detection model characterizing a correlation between a vectorized feature representation for a request and an abnormality detection result. | 2022-02-10 |
20220046040 | DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAM - A detection apparatus includes processing circuitry configured to store attack information including detection time, attack attribute, and communication destination of a DDoS attack, and extract, from a collection of the attack information, a combination of the attack information according to the detection time, the attack attribute, and the communication destination as a coincident attack, an intermittent attack, or an identical target attack. | 2022-02-10 |
20220046041 | METHOD AND DEVICE FOR PROCESSING DATA OF A TECHNICAL SYSTEM - A method, in particular a computer-implemented method, for processing data of a technical system. The method includes the following steps: ascertaining first pieces of information which are associated with a data traffic of the system, and ascertaining metadata associated with the data traffic of the system based on the first pieces of information. | 2022-02-10 |
20220046042 | Scanner probe detection - A method, including identifying, in network data traffic, multiple scans, each of the scans including an access, in the traffic, of multiple ports on a given destination node by a given source node during a time period. A group of high-traffic ports are identified in the traffic that include one or more ports that receive respective volumes of the traffic that exceed a threshold, and respective signatures are generated for the identified port scans that indicate the ports other than the high-traffic ports that were accessed in each of the port scans. A respective frequency of occurrence of each of the signatures over the set of the port scans is computed, and a whitelist of the signatures for which the respective frequency of occurrence is greater than a threshold is assembled. Upon detecting a port scan for which the respective signature is not whitelisted, a preventive action is initiated. | 2022-02-10 |
20220046043 | THREAT DETECTION AND SECURITY FOR EDGE DEVICES - Disclosed are various examples for threat detection and security for edge devices in communication with Internet-of-Things (IoT) devices. In one example, a baseline behavior profile for a gateway virtual machine is transmitted from a management service to a gateway security process executed in a gateway device. The management service receives an anomaly notification including an indication of an anomaly from the baseline behavior profile. The managements service generates a user interface that shows a description of the anomaly. | 2022-02-10 |
20220046044 | SYSTEMS AND METHODS FOR AN EMBEDDED BROWSER - The present disclosure is related to systems and methods of monitoring data of a network application. An embedded browser of a client application on a client device may initiate a request to access a network application hosted on a server. The client application may, responsive to the request, establish a secure session to communicate data of the network application to the client application for rendering in a display region of the embedded browser. The client application may decrypt the data communicated via the established secure session to monitor the network application. | 2022-02-10 |
20220046045 | SYSTEMS AND METHODS FOR APPLICATION PLACEMENT IN A NETWORK BASED ON HOST SECURITY POSTURE - Systems, methods, and computer-readable media for application placement can include the following processes. A security score service determines a respective security posture score for each of a plurality of candidate hosts of an enterprise network. A user then identify a set of performance parameters and security parameters for a host in an enterprise network to execute a workload thereon. An application placement engine selects a host from the plurality of candidate hosts having a security posture score matching the performance parameters and the security parameters for executing the workload. An application deployment engine places the workload on the host. | 2022-02-10 |
20220046046 | SYSTEMS AND METHODS FOR DETECTING HIDDEN VULNERABILITIES IN ENTERPRISE NETWORKS - Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting, identifying, and/or assessing hidden vulnerabilities in an enterprise network. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to receive vulnerability data of network components within an enterprise network. The vulnerability data can include identification of one or more vulnerabilities detected within the enterprise network. The device can then determine a vulnerability frequency and a machine frequency associated with each of the one or more vulnerabilities. The device can then determine a vulnerability score for each of the one or more vulnerabilities based on the vulnerability frequency and an inverse of the machine frequency, to yield a plurality of vulnerability scores. The device can then rank the one or more vulnerabilities based on the plurality of vulnerability scores. | 2022-02-10 |
20220046047 | Monitoring and Preventing Remote User Automated Cyber Attacks - Aspects of the disclosure relate to monitoring virtual desktops accessed by devices at remote locations using machine-learning models to mitigate potential cyber-attacks. In some embodiments, a computing platform may monitor data associated with a series of activities from a virtual desktop accessed by a remote computing device. Subsequently, the computing platform may detect new activity data on the virtual desktop accessed by the remote computing device, and evaluate the new activity data relative to the data associated with the series of activities, wherein evaluating includes applying a machine learning model to the new activity data. Based on evaluating the new activity data, the computing platform may determine if the new activity data is indicative of a potential cyber-attack. In response to determining that the new activity data is indicative of a potential cyber-attack, the computing platform may initiate one or more security response actions. | 2022-02-10 |
20220046048 | METHOD AND APPARATUS FOR PREDICTING ATTACK VULNERABILITY OF COMPUTER NETWORK - Collecting the topology and asset information of the virtual generated computer network, converting the topology and asset information into a training data set for training the neural network model, training the neural network model based on the training data set, and training A method and apparatus for predicting an attack vulnerability of a computer network through the step of inferring an attack vulnerability of a target computer network using a neural network model are provided. | 2022-02-10 |
20220046049 | NETWORK SECURITY THROUGH LINKING VULNERABILITY MANAGEMENT AND CHANGE MANAGEMENT - A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests. | 2022-02-10 |
20220046050 | AUTOMATED VULNERABILITY ASSESSMENT WITH POLICY-BASED MITIGATION - Disclosed are various approaches to automate vulnerability assessment implement policy-based mitigation. A plurality of vulnerability records from respective ones of a plurality of vulnerability feeds are aggregated. Each of the plurality of vulnerability records are stored in a standardized format. A plurality of enterprise-specific severity scores are generated by calculating an enterprise-specific severity score for each of the plurality of vulnerability records. Then, a web page can be created that includes at least a subset of the plurality of enterprise-specific severity scores and respective ones of the plurality of vulnerability records. | 2022-02-10 |
20220046051 | TECHNIQUES FOR PROTECTING APPLICATIONS FROM UNSECURE NETWORK EXPOSURE - A method and system for protecting an application from unsecure network exposure. The method includes identifying an at-risk application, wherein identifying the at-risk application further comprises determining that the application is configured incorrectly; identifying at least one port through which the at-risk application is accessible when the at-risk application is determined to be configured incorrectly; and determining, based on the identified at least one port through which the at-risk application is accessible, whether an exposure vulnerability exists, wherein the exposure vulnerability is an unapproved exposure of at least one of the at least one port to external resources. | 2022-02-10 |
20220046052 | AUTOMATIC CREATION AND UPDATING OF EVENT GROUP SUMMARIES - A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI. | 2022-02-10 |
20220046053 | SYSTEM AND METHOD FOR OMNICHANNEL SOCIAL ENGINEERING ATTACK AVOIDANCE - A method, computer program product, and computer system for identifying social engineering activity associated with at least one of a first communication and a second communication based upon, at least in part, correlation to a predetermined rule. Characteristics of the communications are compared to the predetermined rule to determine if there is a correlation. | 2022-02-10 |
20220046054 | DENIAL-OF-SERVICE DETECTION SYSTEM - A denial-of-service detection system includes a denial-of-service detection subsystem coupled to a plurality of storage systems via a network. The denial-of-service detection subsystem receives current first storage system data for each of a plurality of different storage system operating metrics from a first storage system included in the plurality of storage systems. Based on a historical storage system data for each of the plurality of different storage system operating metrics that was previously received from the plurality of storage devices, the denial-of-service subsystem detects an operating anomaly in the current first storage system data for at least one of the plurality of different storage system operating metrics, identifies a time-series similarity in a subset of respective time-series of the current first storage system data for each of the plurality of different storage system operating metrics for which the operating anomaly was detected and, in response, performs a denial-of-service remediation action. | 2022-02-10 |
20220046055 | SYSTEMS AND METHODS FOR PREVENTING DENIAL OF SERVICE ATTACKS UTILIZING A PROXY SERVER - Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing an access log of a proxy server device of a content delivery network (CDN) to detect and mitigate a denial of service (DOS) on a web or content server hosted by the CDN. Through an analysis of the content requests received at the proxy server listed in the access logs, one or more IP addresses may be identified as involved in a potential DOS attack or other suspicious behavior. Once identified, the suspicious activities of the one or more IP addresses may be tracked and aggregated over a particular period of time, with each detected suspicious request to the content server being counted. The count of suspicious requests to the content server may then be compared to one or more threshold values and a remediation action may occur when the thresholds are met or exceeded. | 2022-02-10 |
20220046056 | SYSTEMS, METHODS AND MACHINE READABLE PROGRAMS FOR ISOLATION OF DATA - The disclosure provides systems, methods and machine readable programs for isolation of data. In some implementations, this is performed on a healthcare information system (HCIS). It will be noted, however, that the disclosed embodiments can be used for different fields of endeavor, and for data other than medical patient data. After capturing data elements, such as patient records, the system automatically reviews and can extract the data elements in an isolated location, generates and stores reports, encrypts the reports, and sends them to multiple designated workstations and devices throughout a network at regular intervals to ensure that the most recent patient data is captured. After a compromising event, such as a system outage or a cyberattack, the updated patent data can be accessed locally by way of a locally installed client program. | 2022-02-10 |
20220046057 | DEEP LEARNING FOR MALICIOUS URL CLASSIFICATION (URLC) WITH THE INNOCENT UNTIL PROVEN GUILTY (IUPG) LEARNING FRAMEWORK - Techniques for providing deep learning for malicious URL classification (URLC) using the innocent until proven guilty (IUPG) learning framework are disclosed. In some embodiments, a system, process, and/or computer program product includes storing a set comprising one or more innocent until proven guilty (IUPG) models for static analysis of a sample; performing a static analysis of one or more URLs associated with the sample, wherein performing the static analysis includes using at least one stored IUPG model; and determining that the sample is malicious based at least in part on the static analysis of the one or more URLs associated with the sample, and in response to determining that the sample is malicious, performing an action based on a security policy. | 2022-02-10 |
20220046058 | ZERO-TRUST DYNAMIC DISCOVERY - Zero-trust dynamic discovery in provided by identifying a plurality of endpoints, including targets and initiators, connected to a software defined network, wherein the targets are provided on the software defined network according to a network addressable memory standard that lacks a native discovery service; grouping the targets into a plurality of target groups and the initiators into a plurality of initiator groups; and in response to receiving a discovery request from a given initiator grouped in a given initiator group of the plurality of initiator groups, returning addressing information for a target group of the plurality of target groups associated with the given initiator group in a security policy configuration for the software defined network. | 2022-02-10 |
20220046059 | Cloud Security Posture Management systems and methods with a cloud-based system - Cloud Security Posture Management (CSPM) systems and methods include, in a node in a cloud-based system, obtaining a plurality of security policies and one or more compliance frameworks for a tenant of a cloud provider where the tenant has a cloud application deployed with the cloud provider, wherein each security policy defines a configuration and an expected value, and wherein each compliance framework includes one or more of the security policies; obtaining configurations of the cloud application; identifying misconfigurations of the cloud application based on a comparison of the obtained configurations with the plurality of security policies; analyzing the misconfigurations to determine risks including prioritization of the risks based on their likelihood of exposure to security breaches; and causing remediation of the identified misconfigurations and the determined risks, wherein the cloud-based system performs the CSPM service in addition to one or more additional cloud services. | 2022-02-10 |
20220046060 | SYSTEM AND METHOD FOR PROVIDING NETWORK AND COMPUTER FIREWALL PROTECTION WITH DYNAMIC ADDRESS ISOLATION TO A DEVICE - A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security. | 2022-02-10 |
20220046061 | ELASTIC POLICY SCALING IN MULTI-CLOUD FABRICS - Systems, methods, and computer-readable media for elastic policy scaling in multi-cloud fabrics. A method can involve deploying a cluster of policy agents on a hub virtual private cloud (VPC) that interconnects spoke VPCs in a cloud associated with a multi-cloud fabric, and mapping endpoints in the spoke VPCs to the policy agents. The method can involve distributing groups of policies for the endpoints across the policy agents based on the mapping of endpoints to policy agents, and advertising, by each policy agent to a respective first set of virtual gateways in the spoke VPCs, routes associated with endpoints mapped to the policy agent and preventing the policy agent from advertising routes associated with a second set of virtual gateways in the spoke VPCs. The method can involve applying, via the policy agent, a group of policies on the policy agent to traffic received by the policy agent. | 2022-02-10 |
20220046062 | SECURELY MANAGING NETWORK CONNECTIONS - The disclosure relates generally to methods, systems, and apparatuses for managing network connections. A system for managing network connections includes a storage component, a decoding component, a rule manager component, and a notification component. The storage component is configured to store a list of expected connections for a plurality of networked machines, wherein each connection in the list of expected connections defines a start point and an end point for the connection. The decoding component is configured to decode messages from the plurality of networked machines indicating one or more connections for a corresponding machine. The rule manager component is configured to identify an unexpected presence or absence of a connection on at least one of the plurality of network machines based on the list of expected connections. The notification component is configured to provide a notification or indication of the unexpected presence or absence. | 2022-02-10 |
20220046063 | SYSTEM AND METHOD FOR CREATING ACCESS CONTROL POLICIES FOR INDIVIDUAL USERS, USER GROUPS, NETWORK HOST OR NETWORK HOST GROUPS THROUGH NETWORK TRAFFIC ANALYSIS - A method and system for automatically creating access control policies for a network, including: (a) automatically identifying and recording user or host entities that attach to the network; (b) monitoring allowed network communications from the user or host entities; (c) correlating network address information from the allowed network communications with names of the user or host entities; and (d) proposing a respective access control policy for each of the user or host entities based on information gleaned during a learning process. | 2022-02-10 |
20220046064 | GATEWAY ACTION FRAMEWORK - Disclosed are various examples of an action framework for configuring a gateway to perform actions on the gateway itself or in conjunction with connected IoT devices. In some examples, a command is transmitted from a management service to a gateway device to permit a gateway client application to execute on the gateway device. A command to register an action in association with the gateway client application is also transmitted. The management service then commands the gateway device to perform the action, and receives an action results message with information about the action. | 2022-02-10 |
20220046065 | METHODS AND APPARATUS FOR EFFICIENT LOAD BALANCING AMONG MICROSERVICES AND/OR PROCESSING ENTITIES - The present invention is directed to communications methods and apparatus for efficiently distributing traffic to processing entities. An exemplary method includes the steps of: receiving, at a first Session Initiation Protocol (SIP) load balancer (SLB), a first SIP INVITE message; selecting, at the first SLB, which Session Border Controller (SBC) in a first cluster of SBCs to send the first SIP invite message based on a message allocation weight determined based on message loss information corresponding to different SBCs in the first cluster of SBCs, the selecting including allocating a portion of incoming received SIP INVITE messages to an individual SBC based on a message loss rate corresponding to the individual SBC and the message allocation rate, said selecting including selecting a first SBC from the first cluster of SBCs to send said first SIP INVITE message, and sending the first SIP INVITE message to the first SBC. | 2022-02-10 |
20220046066 | Alteration of Event User Interfaces of an Online Conferencing Service - Techniques are disclosed relating to automatically altering a displayed user interface for an event. A server computer system may cause, via a conferencing service, display of a user interface for an event having a group of users accessing the conferencing service via a plurality of user devices, the displayed interface including an indication of a video feed of a user in the group of users that is currently active. The system may store, in a database, data for the event, including content of audio and video feeds of users in the event. The system may analyze a set of characteristics included in the content of the audio and video feeds. The system may alter, while the indication of the video feed of the user is being displayed, aspects of the displayed user interface other than the indication, where the altering is performed based on the analyzing. | 2022-02-10 |
20220046067 | INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) CALL SETUP TIME BOOSTER - A method for decreasing a Call Setup Time Key Performance Indicator (CST KPI) of an Internet Protocol (IP) multimedia call in a mobile telecommunications network includes: initiating the IP multimedia call from an originating user equipment (UE) to a terminating UE; transmitting a session initiation protocol (SIP) call initiation message from the originating UE to a terminating Proxy-Call Session Control Function (P-CSCF) through an originating Serving-Call Session Control Function (S-CSCF); and creating a wake-up message via a network element upon receiving the SIP call initiation message. The wake-up message bypasses a plurality of network application servers (ASs) to start switching a transition of the terminating UE from an idle state to a connected state before the SIP call initiation message reaches the terminating P-CSCF. | 2022-02-10 |
20220046068 | DYNAMIC ADAPTATION TO INCREASED SFU LOAD BY DISABLING VIDEO STREAMS - A method for dynamically adapting to increased system load at a selective forwarding unit (SFU) is disclosed. In an embodiment, an SFU sends a plurality of video streams to a plurality of participant computing devices. The SFU monitors a system load value on the SFU according to any of a plurality of metrics. When the SFU determines that the monitored system load value exceeds a stored load threshold value, the SFU selects one or more of the streams being sent to participant computing devices and disables them. | 2022-02-10 |
20220046069 | TECHNIQUE FOR GENERATING GROUP PERFORMANCES BY MULTIPLE, REMOTELY LOCATED PERFORMERS - In some embodiments, a distributed computer network has a server node, a leader node, and a plurality of participant nodes that communicate via a communications network. During a first phase, the leader node generates a leader performance, each participant node receives and renders the leader performance and generates a corresponding participant performance, and the server node receives the leader performance and the participant performances and generates one or more group performances, each including multiple, synchronized performances. During a second phase, the server node transmits the one or more group performances to the participant nodes, and each participant node receives and renders a group performance, thereby allowing a corresponding participant at each participant node to perform along with the rendering of the corresponding group performance. In some implementations, the server node generates different partial group performances, where each participant node receives a partial group performance that excludes the corresponding participant performance. | 2022-02-10 |
20220046070 | RESERVATION MANAGEMENT FOR POLLING REQUESTS IN A COMMUNICATION SYSTEM - Techniques for committing back end computing resources to an online stream of requests for data from client devices are described herein. A polling schedule server (e.g., a reservation management system), may receive polling reservation requests from a plurality of client devices, may evaluate each client device's need for “fresh” data based on a number of input signals, and may assign the client device a polling slot (e.g., a reservation for a future polling time). The polling scheduler server may subsequently receive a polling request from a client device and, upon validating a token received from the client device as well as a difference between an assigned polling time and the polling request timestamp, may grant the polling request by transmitting a request to one or more communication system servers, receiving data from the communication system servers, and providing the data to the client device. | 2022-02-10 |
20220046071 | METHOD, DEVICE, AND SYSTEM FOR FACILITATING GROUP CONFERENCE COMMUNICATION - A method for performing a conference communication by an intelligent terminal running an operating system is disclosed. The method includes sending an access request via a conference link to a conference server the access request specifying a mapping character string and an operating system identifier of the operating system sunning in the intelligent terminal; receiving a protocol string from the conference server generated according to the mapping character string and the operating system identifier in the access request, the protocol string comprising a conference attendance credential; automatically initiating an instant message (IM) client in the operating system according to the protocol string; and sending an IM user identifier associated with the intelligent terminal and the conference attendance credential to for the conference server to add the IM user identifier to a temporary IM user group corresponding to the conference attendance credential and establishing an Internet channel for the temporary IM user group to perform the conference communication via the IM client. | 2022-02-10 |
20220046072 | TRACKER SERVER IN DECENTRALIZED DATA STREAMING AND DELIVERY NETWORK - Methods and systems for caching and delivering data files among peer nodes in a decentralized data delivery edge network using a tracker server are disclosed. In one embodiment, a method utilized by the tracker server includes first, receiving a peer list request from a viewer peer node in the network for accessing one or more target fragments of a data file. Next, extracting, from the received peer list request, a content type of the data file, and a viewer location of the viewer peer node. Then, generating a cacher peer list by selecting, from peer nodes currently active in the network, one or more cacher peer nodes to provide access to the one or more target fragments of the data file. Finally, transmitting the generated cacher peer list to the viewer peer node. The method may be utilized in a hybrid network comprising peer-to-peer (P2P) connections implemented on top of a content delivery network (CDN). | 2022-02-10 |
20220046073 | TECHNOLOGIES FOR MULTI-USER INTERACTIVE MEDIA STREAMING - Technologies for streaming multi-user broadcasts include a broadcast management server configured to receive multimedia data captured of a user from a remote computing device. The broadcast management server streams a multimedia broadcast including the multimedia data captured of the user to other users. Additionally, the broadcast management server is configured to receive a request to participate in the streamed multimedia broadcast from another user. Multimedia data captured of the other user is received in response to a determination that the request to participate in the streamed multimedia broadcast is accepted. The broadcast management server merges the multimedia data captured of the first and second users to generate a merged multimedia broadcast, which is streamed to other users. The broadcast management server also generates a broadcast feed for users. The broadcast feed includes streaming multimedia broadcasts and streaming merged multimedia broadcasts corresponding to other users. Other embodiments are described and claimed. | 2022-02-10 |
20220046074 | SCALABLE MULTI-LEVEL COLLABORATIVE CONTENT MODERATION - A method for content moderation in real-time communication includes receiving a first portion of a media stream from a sending user; scaling the first portion of the media stream to obtain a scaled first portion of the media stream; transmitting, to a centralized content moderation device, the scaled first portion of the media stream; receiving, from the centralized content moderation device, a centralized determination of whether the first portion is appropriate; and, in response to the centralized determination indicating that the first portion of the media stream is inappropriate: blurring the first portion to obtain a blurred first portion; and transmitting, to a receiving user, the blurred first portion. | 2022-02-10 |
20220046075 | SYSTEMS AND METHODS FOR OPTIMIZATION OF TRANSMISSION OF REAL-TIME DATA VIA NETWORK LABELING - The present invention relates to systems and methods for network labeling in order to enhance real time data transfers. A network for a real time data transfer is identified and predictive models for network performance are compared against to determine if the network is suitable for the data transfer. If so, then the real time data transfer may be completed as expected. However, if the network is predicted to be unsuitable for transmission an alternate means for connection may be suggested. The alternate suggestion may include delaying the data transfer until the network is expected to be in better conditions, connecting to another access point in the network, or switching to another network entirely. During the data transfer, the quality of the network is monitored in order to update the predictive models for the network's quality. Identifiers for the network may be utilized to keep track of the networks. Network signal strength, signal pollution and time may also be tracked in order to identify patterns in the network's performance. | 2022-02-10 |
20220046076 | Method And System For Real-Time Modeling Of Communication, Virtualization And Transaction Execution Related Topological Aspects Of Monitored Software Applications And Hardware Entities - A system and method for real-time discovery and monitoring of multidimensional topology models describing structural aspects of applications and of computing infrastructure used to execute those applications is disclosed. Different types of agents are deployed to the monitored application execution infrastructure dedicated to capture specific topological aspects of the monitored system. Virtualization agents detect and monitor the virtualization structure of virtualized hardware used in the execution infrastructure, operating system agents deployed to individual operating systems monitor resource utilization, performance and communication of processes executed by the operating system and transaction agents deployed to processes participating in the execution of transactions, providing end-to-end transaction trace and monitoring data describing individual transaction executions. The monitoring and tracing data of the deployed agents contains correlation data that allows to create a topology model of the monitored system that integrates transaction execution, process execution and communication and virtualization related aspects. | 2022-02-10 |
20220046077 | Visual Representation of a User Interface - A visual representation may be displayed at a computing device to indicate a display configuration and/or user interactions associated with a user interface for an application that may be run on other computing devices. The visual representation of the user interface may be determined based on user interface information, which may be logged at the computing device on which the application may be run. The visual representation of the user interface may include data obtained from a remote data source. The data may include market data that may be obtained from an electronic exchange that is shared with the computing device on which the application may be run for displaying the user interface. | 2022-02-10 |
20220046078 | CONTENT COLLECTION NAVIGATION AND AUTOFORWARDING - Systems and methods for communicating and displaying collections of image and video clip content are described. In one example embodiment, a device receives interface information about a group of content collections from a server computer system. When a user inputs a selection of a first content collection, the device displays images and video clips in a sequence defined by the content collection. Each piece of content (e.g. image or video clip) is displayed for less than a threshold display time. When the device finishes playing the first content collection, the device automatically begins playing a next content collection. Additional content collections generated from content submitted by other client devices can be received from the server computer system, with autoforward play of additional content collections continuing indefinitely. Some embodiments include content collections generated by the server computer system, as well as advertising elements or other system images presented between content collections. | 2022-02-10 |
20220046079 | SYSTEMS AND METHODS FOR SIMPLIFIED RECORDING AND SHARING OF DATA - A method, computer program product, and computer system for receiving, by a computing device, data from a client device, the data being a piece of data from a source of digital content. A file may be created that includes the received data, the file being accessible by a file system executable on the computing device. An icon may be generated within a user interface of the file system in response to creation of the file, the icon configured to copy the received data to a cache in response to input received on the icon, and the copy of the received data within the cache may be accessible to one or more applications. The copy of the received data may be provided from the cache to at least one application accessible by the computing device so as to share the data received without accessing the file created. | 2022-02-10 |
20220046080 | SYSTEMS AND METHODS FOR SHARED ACCESS AMONG HOST INFORMATION HANDLING SYSTEM AND MULTIPLE CLIENT INFORMATION HANDLING SYSTEMS VIA MANAGEMENT CONTROLLER - An information handling system may include a processor, a management controller configured for out-of-band management of the information handling system and further configured to emulate non-transitory computer readable media of the management controller as an emulated mass storage device to an operating system executing on the processor and execute a server application to expose the emulated mass storage device to one or more client information handling systems communicatively coupled to the management controller via a network. | 2022-02-10 |
20220046081 | SYSTEMS AND METHODS FOR SELECTING MEDIA ITEMS - A device includes an image capture device configured to capture a first video. The device includes a memory configured to store one or more videos. The device further includes a processor coupled to the memory. The processor is configured to concatenate the first video and a second video to generate a combined video. The second video is included in the one or more videos or is accessible via a network. The second video is selected by the processor based on a similarity of a first set of characteristics with a second set of characteristics. The first set of characteristics corresponds to the first video. The second set of characteristics corresponds to the second video. | 2022-02-10 |
20220046082 | Systems and Methods for Communication Efficient Distributed Mean Estimation - The present disclosure provides systems and methods for communication efficient distributed mean estimation. In particular, aspects of the present disclosure can be implemented by a system in which a number of vectors reside on a number of different clients, and a centralized server device seeks to estimate the mean of such vectors. According to one aspect of the present disclosure, a client computing device can rotate a vector by a random rotation matrix and then subsequently perform probabilistic quantization on the rotated vector. According to another aspect of the present disclosure, subsequent to quantization but prior to transmission, the client computing can encode the quantized vector according to a variable length coding scheme (e.g., by computing variable length codes). | 2022-02-10 |
20220046083 | PERFORMING LOAD BALANCING SELF ADJUSTMENT WITHIN AN APPLICATION ENVIRONMENT - A technique performs load balancing self-adjustment within an application environment. The technique involves, while nodes of the application environment load balance traffic among clusters that provide services for an application in accordance with a first load balancing configuration, sensing application environment metrics. The technique further involves performing a self-adjustment operation that generates a second load balancing configuration based on the application environment metrics, the second load balancing configuration being different from the first load balancing configuration. The technique further involves deploying the second load balancing configuration among the nodes to enable the nodes to load balance the traffic among the clusters that provide the services for the application in accordance with second load balancing configuration in place of the first load balancing configuration. | 2022-02-10 |
20220046084 | PROVIDING A SET OF APPLICATION SLICES WITHIN AN APPLICATION ENVIRONMENT - Techniques manage cluster resources within an application environment. The techniques involve identifying a group of cluster resources from a plurality of cluster resources of the application environment, the plurality of cluster resources being constructed and arranged to provide a plurality of services. The techniques further involve forming an application slice having the group of cluster resources. The techniques further involve deploying the application slice to provide services. Certain techniques provide a platform that allows operators to build application slices (or application overlays) that are a way of grouping application pods (or containers) based on one or more organizing principles such as velocity of deployment, security, governance, etc. | 2022-02-10 |
20220046085 | Distributed system of record transaction receipt handling in an overlay network - A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner. In one embodiment, the computing network fabric or “core” is configured to support a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently, with little synchronization, at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. According to an aspect of this disclosure, the CDN edge network is then used to deliver receipts associated with transactions that are processed into the blockchain. | 2022-02-10 |
20220046086 | SYSTEM AND METHOD FOR PEER GROUP DETECTION, VISUALIZATION AND ANALYSIS IN IDENTITY MANAGEMENT ARTIFICIAL INTELLIGENCE SYSTEMS USING CLUSTER BASED ANALYSIS OF NETWORK IDENTITY GRAPHS - Systems and methods for graph based artificial intelligence systems for identity management systems are disclosed. Embodiments of the identity management systems disclosed herein may utilize a network graph approach to peer grouping of identities of distributed networked enterprise computing environment. Specifically, in certain embodiments, data on the identities and the respective entitlements assigned to each identity as utilized in an enterprise computer environment may be obtained by an identity management system. A network identity graph may be constructed using the identity and entitlement data. The identity graph can then be clustered into peer groups of identities. The peer groups of identities may be used by the identity management system and users thereof in risk assessment or other identity management tasks. | 2022-02-10 |
20220046087 | SYSTEMS AND METHODS FOR SYNDICATED DISTRIBUTION OF ELECTRONIC CONTENT - Systems and methods are disclosed for online distribution of content by receiving, from a user's mobile device, a request for a web page hosted by a publisher's CMS; applying a rules engine to analyze a received URL according to a set of rules identifying one or more website types and/or referrers; if the received URL satisfies the rules engine, redirecting the received request to a syndication server system hosted within a global CDN; adding a URL of the web page to a missing content queue and redirecting the request to the publisher's CMS if the CDN syndication server does not contain a suitable mobile-formatted version of the web page; and delivering a package of binary compressed content of the web page to a stub page cached at the user's mobile device by the CDN syndication server, using recirculation and monetization components chosen by the publisher. | 2022-02-10 |
20220046088 | SYSTEMS AND METHODS FOR DISTRIBUTING PARTIAL DATA TO SUBNETWORKS - Computer systems and methods for replicating a portion of a data set to a local repository associated with a subnetwork are disclosed. In one implementation, a method for a device associated with a subnetwork may include obtaining a portion of a data set from a central repository. The data set may be associated with one or more subnetworks, and the portion of the data set may be associated with the subnetwork. The method may further include obtaining a request for data originating from a node in the subnetwork. The requested data may include at least one of (i) the portion of the data set, and (ii) data generated based on the portion of the data set, and the request may be destined for the central repository. In addition, the method may include determining whether the central repository is unavailable to provide the requested data, and providing the requested data to the node after the central repository is determined as being unavailable. | 2022-02-10 |
20220046089 | SYSTEM AND METHODS OF TRACKING GAME EVENTS - System and methods for tracking events in a sports game using one or more event input devices. Each event input device tracks a subset of the game events and the devices work together to provide a simplified input experience by sharing input and context from other event input devices. Since the user is only responsible for capturing a subset of the events, and because each device simplifies the input requirements of the other event input devices, the end user is still able to enjoy watching the game while also opening up the input task to users who would not have typically done so. The combined results of the devices provides a complete picture of the game in the form of a game play-by-play for the fans and statistics for the coaches. Integration with the scoreboard, communication system and player devices provide further event input simplification, rich content for viewers and simplification for traditional scorekeepers and sound controllers. | 2022-02-10 |
20220046090 | SYSTEM AND METHOD FOR MIGRATING AN AGENT SERVER TO AN AGENT CLIENT DEVICE - In a network of mobile agents, data integrity can be improved by providing an agent server that can migrate between devices operating in the region of interest (ROI). The agent server distributes agent clients onto devices in the ROI and provides agent server services to the agent clients, including receiving and storing data from the agents. When the agent server device is to leave the ROI, the agent server can migrate to any device executing an agent client and continue to provide the agent server services, including data collection and aggregation, from the device to which the agent server has migrated. | 2022-02-10 |
20220046091 | System and Method for Context-Aware Computing - The present invention provides an electronic system comprising a single unified data module (OneData), a single unified application module (OneApp), and an interprocess automation module (OneAuto). | 2022-02-10 |
20220046092 | METHOD AND SYSTEM FOR IDENTIFICATION OF DIGITAL CONTENT USING A META-CONTENT IDENTIFIER CONSTRUCT - A method, system, and computer-program product for identification of digital content using a meta-content identifier construct are disclosed. The method includes obtaining a meta-content identifier construct (where the meta-content identifier construct comprises information), identifying one or more digital content constructs, determining one or more parameters, and producing one or more results by retrieving digital content using the one or more digital content constructs. The one or more digital content constructs are identified, at least in part, using at least a portion of the information. The retrieving comprises filtering the digital content, and the filtering uses the one or more parameters. | 2022-02-10 |
20220046093 | PLANNED MESSAGE NOTIFICATION FOR IOT DEVICE BASED ON ACTIVITY - Aspects of the present invention disclose a method for delivering a notification to an IoT enabled device that ensures successful user notification while avoiding duplicate notifications. The method includes one or more processors capturing a respective activity pattern of each of a plurality of internet of things (IoT) enabled devices of a user. The method further includes determining an active device of the user from the plurality of IoT enabled devices based at least in part on an activity pattern of the active device. The method further includes identifying a notification for distribution to the user, utilizing the plurality of IoT enabled devices. The method further includes intercepting delivery of the notification to non-active devices of the plurality of IoT enabled devices. The method further includes transmitting the notification to the active device of the user. | 2022-02-10 |
20220046094 | SYSTEM AND METHOD OF ESTABLISHING SERVER CONNECTIONS TO INTERNET OF THINGS DEVICES, INCLUDING ELECTRONIC LOCKS - Systems and methods of an internet of things device connecting to a remote server. The internet of things device connects to a web target. The web target sends a response to the internet of things device indicating whether a change to the one or more settings of the internet of things device has been received at a cloud server. If a change has occurred, the internet of things device connects to a secure cloud server to update the settings on the internet of things device. | 2022-02-10 |
20220046095 | CENTRALIZED MANAGEMENT OF CONTAINERIZED APPLICATIONS DEPLOYED ON DISTRIBUTED GATEWAYS - This application discloses a server to transmit an embedded application to a remote gateway device. The embedded application, when executed, prompts the remote gateway device to generate application messages including information associated with the execution of the embedded application by the remote gateway device. The server is configured to track the execution of the embedded application in the remote gateway device to determine operational states of the embedded application based, at least in part, on the application messages received from the remote gateway device. The server is configured to generate a parameter message for transmission to the remote gateway device based, at least in part, on the operational states of the embedded application deployed in the remote gateway device. The parameter message is configured to prompt the remote gateway device to transmit an application parameter associated with the execution of the embedded application. | 2022-02-10 |
20220046096 | Vehicle Communication System And Corresponding Method - The present disclosure provides a vehicle communication system, comprising: an information processing device including a processor and a memory. The memory stores instructions executable by the processor, that, when executed by the processor, cause the processor to perform steps comprising: in response to reception of a message sent by an Internet of Things device, determining category of the message and obtaining a corresponding user profile; and in response to the message being of a preset category, feeding real-time vehicle information back to the Internet of Things device based on the user profile. The present disclosure also provides a vehicle communication system and method. According to the present disclosure, an Internet of Things device, such as those in a house, can send a request to a vehicle and conveniently obtain the corresponding vehicle information without causing excessive interference to the driving driver. | 2022-02-10 |
20220046097 | Controlling the Handling of Communication Sessions - There is provided a method of operating an application server of a network for controlling handling of a communication session. The method comprises generating ( | 2022-02-10 |
20220046098 | MANAGEMENT SERVER, NETWORK SYSTEM, METHOD OF CONTROLLING NETWORK CONNECTION, AND RECORDING MEDIUM - A management server includes circuitry to receive a request relating to a network to be used, and control, based on the received request, a relay device to relay a connection to the network. In response to an elapse of a permitted use period of the network, the circuitry instructs the relay device to disconnect the connection to the network. | 2022-02-10 |
20220046099 | SPATIAL-TEMPORAL LIMITED USER SESSIONS - A method comprises receiving, at a server from a communications-enabled device that includes processing circuitry, a request for providing a user session correlated with a user identifier (ID) and a target appliance. The method further includes in response to the request for the requested user session: retrieving a user attribute from a user-ID database that stores user ID information for a plurality of user accounts, and retrieving an appliance attribute from an appliance-ID database that stores appliance ID information; and correlating the retrieved user attribute and appliance attribute with the requested user session for a user account from among the plurality of user accounts. The method further includes transferring the requested user session to the target appliance as a new user session that is spatial-temporal limited and that is without the target appliance using user login information. | 2022-02-10 |
20220046100 | SYSTEMS AND METHODS MULTI-TENANT AND OMNI-CHANNEL ROUTING - Systems and methods for multi-tenant and omni-channel routing are disclosed. In one embodiment, a method for multi-tenant and omni-channel routing may include: ( | 2022-02-10 |
20220046101 | NWDAF NETWORK ELEMENT SELECTION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND READABLE STORAGE MEDIUM - Aspects of the disclosure provide methods and apparatuses for network data analytics. In some examples, an apparatus includes processing circuitry. The processing circuitry transmits a network data analytics function (NWDAF) service discovery request to a network repository function (NRF) network element. The NWDAF service discovery request indicates a requested network data analysis service. The processing circuitry receives an NWDAF service discovery response in response to the NWDAF service discovery request. The NWDAF service discovery response includes performance parameter information of one or more NWDAF network elements for the requested network data analysis service. Further, the processing circuitry selects, according to the performance parameter information of the one or more NWDAF network elements for the requested network data analysis service, a target NWDAF network element used for providing the requested network data analysis service, and transmits an NWDAF service request to the target NWDAF network element. | 2022-02-10 |
20220046102 | EDGE INTELLIGENCE-BASED RESOURCE MODIFICATION FOR TRANSMITTING DATA STREAMS TO A PROVIDER NETWORK - A trained model and/or an edge client running on an edge device may obtain data from a data source (e.g., a security video camera) and determine, based on a result of processing the data using the model, whether to send an indication of an upcoming data/video stream to the provider network (e.g., indicating a bearer modification). The received indication may be used by the provider network to send a request to a serving wireless infrastructure (e.g., telco operator/wireless mobile core) for configuration of one or more resources on behalf of the edge device to process the upcoming data stream. The received indication may be used by the provider network in order to configure one or more resources at the provider network to process the upcoming data stream. The edge device initiates transmission of the data stream from the data source to the provider network via the serving wireless infrastructure. | 2022-02-10 |
20220046103 | PUSHING CONTENT IN TIME WINDOWS BASED ON DIFFERENT POSITIONS - In some embodiments, a method receives a first request for a first time window and a first position. A first message is sent to indicate a computing device will push content to a client in a stream for a video for a first one or more time windows other than the first time window. The method pushes content for the first time window based on the first position. A second request is received to change from the first position to a second position. The method pushes content for a second time window to the client based on the first position. A second message is sent to indicate the computing device will push content to the client in the stream for a second one or more time windows other than the second time window. The method pushes content for a third time window to the client based on the second position. | 2022-02-10 |
20220046104 | SYSTEMS AND METHODS OF TOKEN PIGGYBACKING - A method, system, and computer-readable medium are disclosed for generating a unified user profile. For example, a system may store, on a client device, a token under a first domain name. The token may specify state data for a communication session between the client device and a first content publisher addressed by the first domain name. The communication session utilizes a stateless communication protocol. The system may then generate a redirection resource locator. The redirection resource locator may include an identifier for a web object belonging to a second content publisher addressed by a second domain name and the token. The system then stores, on the client device, the token under the second domain name by directing the client device to send a web object request generated based at least in part on the redirection resource locator to the second content publisher. The web object request may request the web object from the second content publisher and including the token. | 2022-02-10 |
20220046105 | SYSTEMS AND METHODS FOR AN AUTOMOTIVE COMMERCE EXCHANGE - Disclosed are systems and methods to provide a platform for standardizing application programming interfaces (APIs) for a plurality of different dealership management software (DMS) systems. A computer server includes one or more processors of an automotive commerce exchange platform. The one or more processors are configured to execute a plurality of different software interfaces with a plurality of different DMS systems and provide a standardized software interface. The standardized software interface is configured to enable communication between the one or more processors of the automotive commerce exchange platform and a plurality of different devices of entities involved with an automotive market. The standardized software interface is also configured to enable the plurality of different devices access to each of the plurality of different DMS systems independent of local software interfaces of the plurality of different devices with each of the different DMS systems. | 2022-02-10 |
20220046106 | INTENT-BASED CALENDAR UPDATING VIA DIGITAL PERSONAL ASSISTANT - Techniques are described herein that are capable of performing intent-based scheduling via a digital personal assistant. For instance, an intent of user(s) to perform an action (a.k.a. activity) may be used to schedule time (e.g., on a calendar of at least one of the user(s)) in which the action is to be performed. Examples of performing an action include but are not limited to having a meeting, working on a project, participating in a social event, exercising, and reading. | 2022-02-10 |
20220046107 | INTENT-BASED CALENDAR UPDATING VIA DIGITAL PERSONAL ASSISTANT - Techniques are described herein that are capable of performing intent-based scheduling via a digital personal assistant. For instance, an intent of user(s) to perform an action (a.k.a. activity) may be used to schedule time (e.g., on a calendar of at least one of the user(s)) in which the action is to be performed. Examples of performing an action include but are not limited to having a meeting, working on a project, participating in a social event, exercising, and reading. | 2022-02-10 |
20220046108 | LOCAL INTERCONNECT NETWORK (LIN) MESSAGING BETWEEN LIN PARTITIONS SEPARATED BY A BACKBONE COMMUNICATION NETWORK - A proxy slave in a first LIN partition receives data from a proxy master in the second LIN partition which in turn receives the data from a slave in the second LIN partition. The proxy slave stores the data in a data structure and receives a read request from an originating master in the first LIN partition after the data is stored. The read request comprises a LIN message identifier subscribed to by the slave in the second LIN partition. The proxy slave accesses the data stored in the data structure based on the LIN message identifier in the read request; and sends a LIN response to the originating master with the stored data from the slave in the second LIN partition. | 2022-02-10 |
20220046109 | METHOD, APPARATUS AND SYSTEM FOR PROCESSING ACCESS REQUEST OF ENTERPRISE BRANCH, AND EQUIPMENT AND MEDIUM - An access request processing method includes Customer Premise Equipment (CPE) in an enterprise branch network receiving an access request in the enterprise branch network, determining whether the access request is for accessing an extranet and requires accelerated processing, forwarding the access request to an acceleration network in response to determining that the access request is for accessing the extranet and requires accelerated processing, receiving response data of the access request from the acceleration network, and sending the response data to a sender of the access request. | 2022-02-10 |
20220046110 | VIRTUAL DATASET MANAGEMENT DATABASE SYSTEM - A request to access a virtual dataset identifying one or more changeset selection criteria may be received. One or more changesets may be selected based on the selection criteria. Each changeset may correspond with a point in time and may include data references to data items added to the virtual dataset at the point in time. A learning dataset that includes a plurality of data items may be identified. | 2022-02-10 |
20220046111 | ENTERPRISE HEALTH SCORE AND DATA MIGRATION - One or more computers receive a request from a user to change a configuration of a computing environment provided by one or more servers. In response to receiving the request and before performing the requested change in the configuration of the environment, the computers determine an estimated measure of performance that represents a level of performance of the computing environment if changed according to the request and provide data indicating performance measures indicating the estimated measure of performance for the environment corresponding to the change in the configuration of the environment. After providing the data indicating the estimated performance measures, the computers receive data indicating user input confirming the request to change the configuration of the environment, and perform the requested change in the configuration of the computing environment. | 2022-02-10 |
20220046112 | VR VIDEO TRANSMISSION WITH LAYERED VIDEO BY RE-USING EXISTING NETWORK INFRASTRUCTURES - Aspects of the subject disclosure may include, for example, a method comprising obtaining media content; receiving a request from equipment of a user to view the media content; identifying a predicted field of view of the user; sending a base layer of the media content to the equipment of the user using a first stream; and sending a first enhancement layer of the predicted field of view to the equipment of the user using a second stream. The first stream and the second stream may utilize different protocols, different servers, different buffer sizes, and/or a combination thereof. While the first stream may include an entire 360 degrees of the base layer of the media content, the second stream may be limited to the first enhancement layer of the predicted field of view of the media content. Other embodiments are disclosed. | 2022-02-10 |
20220046113 | DISTRIBUTED STATE RECOVERY IN A SYSTEM HAVING DYNAMIC RECONFIGURATION OF PARTICIPATING NODES - A method for obtaining previously stored session state data for a session between a system having a plurality of nodes and a client device includes obtaining a session identifier specifying the session and hashing the session identifier. A currently valid hash map is searched. The hash map maps a hash of the session identifier to the nodes for a current system configuration. The search is performed to identify a system node on which the session state data for the session is stored. If the session state data is not located using the currently valid hash map, at least one earlier generation hash map that is valid for a previous configuration of the system is searched. Upon identifying the system node on which the session state data is stored, the session state data from the system node is retrieved. The session state data is used to establish the session. | 2022-02-10 |
20220046114 | SYSTEM AND METHOD FOR DATA COMPRESSION BASED ON DATA POSITION IN FRAMES STRUCTURE - Method and system for lossless and stateless compression scheme is used with a fixed-length data such as frames. Frames having a payload of M bits length are mapped into a payload of N bits length, where N2022-02-10 | |
20220046115 | BROADCAST SIGNAL TRANSMISSION APPARATUS, BROADCAST SIGNAL TRANSMISSION METHOD, BROADCAST SIGNAL RECEPTION APPARATUS AND BROADCAST SIGNAL RECEPTION METHOD - A broadcast signal transmission method comprises outputting an RoHC channel that includes one or more RoHC streams and a signaling table that includes information related to header compression by performing header compression for Internet Protocol (IP) packets, which include broadcast data, in accordance with an adaptation mode, a header of each IP packet including an IP header and a User Datagram Protocol (UDP) header, generating at least one first link layer packet that includes the RoHC channel and generating at least one second link layer packet that includes the signaling table, and physical layer processing the at least one first link layer packet and the at least one second link layer packet and transmitting through one or more Physical Layer Pipes (PLPs), wherein the signaling table includes adaptation mode information indicating the adaptation mode, and each RoHC stream in the RoHC channel includes RoHC packets. | 2022-02-10 |
20220046116 | Apparatus and Method for an Accelerated and Offload Dual Border Relay - Methods and systems for an accelerated and offload dual border relay. A method includes receiving, by a hardware border relay from a network device, an Internet Protocol (IP) packet, determining, by the hardware border relay, a packet type of the IP packet, translating, by the hardware border relay provisioned with IPv6 transition technology rules, the IP packet to a hardware translated IP packet when the IP packet is a first type, translating, by the offload border relay provisioned with MAP-T rules, the IP packet to an offload translated IP packet when the IP packet is a second type, transmitting, by the offload border relay to the hardware border relay, the offload translated IP packet when the IP packet is the second type, and transmitting, by the hardware border relay, one of the offload translated IP packet and the hardware translated IP packet to another network device. | 2022-02-10 |