08th week of 2020 patent applcation highlights part 56 |
Patent application number | Title | Published |
20200059453 | TOKENIZING NETWORK APPLIANCE AND METHOD - An example security device receives a plurality of data units carrying traffic in a message encoded in accordance with an application layer protocol for a server. The message comprises payload. The security device analyzes the plurality of data units to identify the application layer protocol; selects a data extraction algorithm in dependence on the identified application layer protocol; extracts selected data from the payload, in accordance with one or more tokenizing rules; and forwards selected data to a token encoder, to allow the token encoder to store selected data and return at least one token used to identify the selected data. The device receives from the token encoder, at least one token and replaces the selecting data in the payload with the at least one token to form modified payload and forming and forwards a modified message comprising the payload data, in place of the message, thereby securing the original message. | 2020-02-20 |
20200059454 | METHOD, DEVICE, MEDIUM AND APPARATUS FOR CDN INTER-NODE ENCRYPTION - A method for content delivery network (CDN) inter-node encryption by a CDN node includes receiving a symmetric key set and a key index from a key center, determining a key from the symmetric key set according to the key index, and performing encryption and decryption processing using the key when performing Hyper Text Transfer Protocol (HTTP) data transmission with another CDN node. | 2020-02-20 |
20200059455 | DYNAMIC OFFLINE ENCRYPTION - A method for encrypting data when a device is offline is disclosed. In the method, a determination is made as to whether a successful connection with a remote server computer can or cannot be made. If a connection cannot be made, then data can be encrypted with an ephemeral public key. Later, then a connection is available, the encrypted data can be transmitted to the remote server computer for processing. | 2020-02-20 |
20200059456 | VEHICLE CONFIGURABLE TRANSMITTER FOR ALLOWING CLOUD-BASED TRANSFER OF DATA BETWEEN VEHICLES - A configurable transmitter is provided for a vehicle for transmitting signals to a device remote from the vehicle. The configurable transmitter includes an RF transmitter that receives an RF signal during a training mode to learn characteristics of the received RF signal, and to transmit an RF signal to the remote device in an operating mode where the transmitted RF signal includes the learned characteristics of the received RF signal; a local memory device for storing channel data representing the learned characteristics and for storing a unique identification code and a cloud encryption key; an interface that communicates with an Internet server; and a controller coupled to the local memory device and the interface, the controller retrieves the channel data from the local memory device, encrypts the channel data using the cloud encryption key and transfers the encrypted channel data for remote storage in the Internet server through the interface. | 2020-02-20 |
20200059457 | SECURE WAN PATH SELECTION AT CAMPUS FABRIC EDGE - A method is performed by an access router of an enterprise network including a first edge router to communicate with a second edge router over a wide area network (WAN). The method includes receiving a packet from a first endpoint, receiving from a mapping service a network location of a second edge router for which the packet is destined and a security association (SA) to encrypt the packet from the access router to the second edge router, and generating for the first edge router one or more path selectors for WAN path selection. The method includes encrypting the packet using the SA, and adding to the encrypted IP packet, in clear text, the path selectors and outer encapsulation including the network location, to produce an encrypted tunnel packet. The method also includes forwarding the encrypted tunnel packet to the second edge router via the first edge router and the WAN. | 2020-02-20 |
20200059458 | SYSTEM AND METHOD FOR TRANSFERRING PACKETS BETWEEN KERNEL MODULES IN DIFFERENT NETWORK STACKS - In general, techniques are described for enhancing communication between kernel modules operating in different network stacks within the kernel space of the same network device. An IPVLAN driver is configured to establish an endpoint in a first and second kernel module, wherein each kernel module executes in a different networking stack in the same kernel space. The endpoint in the first kernel module is associated with an interface of the first module. Selected packets are transferred from the second kernel module to the first kernel module via the interface of the first module. | 2020-02-20 |
20200059459 | SECURE FORWARDING OF TENANT WORKLOADS IN VIRTUAL NETWORKS - In general, techniques are described for enhancing operations of virtual networks. In some examples, a network system includes a plurality of servers interconnected by a switch fabric comprising a plurality of switches interconnected to form a physical network. Each of the servers comprises an operating environment executing one or more virtual machines in communication via one or more virtual networks. The servers comprise a set of virtual routers configured to extend the virtual networks to the operating environments of the virtual machines. A virtual router of the set of virtual routers is configured to prepare tunnel packets by forwarding packets received from virtual machines to an IPSec kernel executing in a host operating network stack, receiving the ESP packets back from the IPSec kernel and forwarding the ESP packets across the virtual networks. | 2020-02-20 |
20200059460 | CREATING SECURE ENCRYPTED BROADCAST/MULTICAST GROUPS OVER WIRELESS NETWORK - Embodiments herein describe segmenting a Wi-Fi network into different groups. The embodiments herein assign a user, a client device, or a traffic flow originating from a client device to a group. For example, all the client devices for a particular user can be assigned to the same group tag, or each traffic flow in the client device may be assigned to different groups. Each group corresponds to a group key which can be transmitted to the client device when the device associates to an access point (AP). As such, within the same service set identifier (SSID), there can be multiple groups, and thus, client devices can use different group keys to communicate with other client devices associated to the same SSID. Put differently, rather than all devices connected the same SSID being assigned to the same group, the client devices can be assigned in different groups. | 2020-02-20 |
20200059461 | OPTIMIZATION OF AUTHENTICATION PROCESS - A secure protocol has been developed that reduces the number of transactions associated with multifactor authentication (MFA) systems. An identity provider determines authentication factors which satisfy an application assurance level and constructs a credential collection file with input elements corresponding to the determined factors. The identity provider communicates the file to a client for collection of corresponding credentials. After submission of credential data, the collected set of credentials or credential data (“MFA credential set”) is returned to the identity provider for verification. The identity provider does not redirect to the client for additional transactions until after verifying the MFA credential set. In addition to reducing MFA communication overhead for a client, the credential collection file is based on a structure or schema that can be edited to adapt to changes in assurance level and authentication mechanisms. This allows the protocol to be adapted to non-standard or custom authentication mechanisms. | 2020-02-20 |
20200059462 | Methods and Systems for Dynamic Creation of Hotspots for Media Control - Methods, systems, and/or devices for controlling media presentation at a shared media presentation system are described herein. To that end, an electronic device defines a distance-related access restriction between a media presentation system and a second electronic device. The device selects one or more access control settings for the media presentation system to be controlled by the second electronic device. The device receives a request, from the second electronic device, to control playback at the media presentation system. In accordance with a determination that the second electronic device meets the distance-related access restriction, the device provides authorization for the second electronic device to access the media presentation system using media control requests that comply with the one or more access control settings selected by the electronic device. | 2020-02-20 |
20200059463 | SYSTEMS AND METHODS FOR CONTROLLING A LOCAL APPLICATION THROUGH A WEB PAGE - A client computer includes a web browser connected to a local web server that is coupled with a local utility. Upon loading a web page, the web browser sends, to the local web server, a first open-ended message that does not require a return message from the local web server. In response to and upon receiving a response to the first open-ended message, the web browser maintains communication with the local web server by sending a second open-ended message that does not require a return message to the local web server. The local web server receives the first open-ended message, waits until the local utility determines that there is information to be provided to the web browser, and in response to determining that there is information to be provided to the web browser, sends a first return message including the information to the web browser. | 2020-02-20 |
20200059464 | HIGHLY AVAILABLE WEB-BASED DATABASE INTERFACE SYSTEM - Techniques are provided for a highly available web-based database interface system (WDIS) processing database requests that target one or more databases managed by a coupled DBMS. In an embodiment, a web server of multiple web servers receives a first client web-based request that includes one or more first database instructions of a database request. The multiple web servers are configured to balance client web-based requests among one or more of the multiple web servers. The one or more of the multiple web servers are coupled to a database management system that includes one or more database servers executing database instructions on one or more databases. Based on balancing client web-based requests among the one or more of the multiple web servers, routing the first client web-based request that includes the one or more first database instructions of the database request to the first web server of the one or more multiple web servers coupled to the database management system. A request coordinator store coupled to the one or more of the multiple web server is queried to determine a state of the database request. Based at least in part on the state of the database request, the first web server requests the database management system to execute the one or more first database instructions and update the state. | 2020-02-20 |
20200059465 | SYSTEMS AND METHODS FOR CLONING AN AGENT IN A DISTRIBUTED ENVIRONMENT - Methods and apparatus to clone an agent in a distributed environment are disclosed. An example apparatus includes a first management agent associated with a first component server in a virtualization environment, the first management agent configured to facilitate communication between the first component server and a virtual appliance, the virtual appliance to authenticate the first management agent based on first credentials including a first identifier and a first certificate. The example apparatus includes a second management agent associated with a second component server in the virtualization environment, the second management agent cloned from the first management agent and including a copy of the first credentials. The example second management agent is to: generate second credentials including a second identifier and a second certificate; authenticate with the virtual appliance based on the first identifier and the first certificate; and delete the copy of the first credentials. | 2020-02-20 |
20200059466 | PHISHING ATTACK PREVENTION FOR OAUTH APPLICATIONS - An example operation may include one or more of obtaining a request to validate an application with respect to an OAuth provider, identifying a previously registered digital signature of the application, generating verification information of the application based on the identified digital signature of the application, and passing the generated verification information of the application to the OAuth provider via a user login page. | 2020-02-20 |
20200059467 | Idebtifying and authorizing user data over a network based on biometric and statistical data - The subject disclosure relates to employing sourcing and generation components to facilitate a generation of identity data. In an example, a system comprising a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory, comprise a sourcing component and a generation component. In an aspect, the sourcing component can source, by a user device comprising the processor, a set of biometric data and a set of statistical data. In another aspect, a generation component can generate, by the user device, a set of identification data based on an interpolation of the set of biometric data and the set of statistical data. | 2020-02-20 |
20200059468 | USER AUTHENTICATION OF SMART SPEAKER SYSTEM - Methods for authenticating a user utilizing a smart speaker system are presented, the methods including: requesting a user authentication by issuing a voice command to a smart speaker; playing a sonic one-time password (OTP) on the smart speaker received from an authentication server in response to the requesting a user authentication; receiving the sonic OTP by a mobile device of the user; transmitting an OTP decoded from the sonic OTP to the authentication server; and authorizing the user by the authentication server to execute a secure transaction using the smart speaker system. | 2020-02-20 |
20200059469 | SECRET SHARING-BASED ONBOARDING AUTHENTICATION - A technique includes receiving a request from a first electronic device to connect to a network and receiving a first part from the first electronic device. The technique includes regulating onboarding of the first electronic device. Regulating the onboarding includes authenticating the first electronic device. Authenticating the first electronic device includes communicating with a plurality of electronic devices that are connected to the network to receive a set of second secret parts; constructing a first secret from the first secret part and the set of second secret parts; and comparing the first secret to a second secret. Regulating the onboarding of the first electronic device includes allowing the first electronic device to connect to the network based on a result of the comparison. | 2020-02-20 |
20200059470 | INDUSTRIAL INTERNET ENCRYPTION SYSTEM - The present disclosure provides an industrial internet encryption system for an internet of things (IoT) environment. The present disclosure provides an apparatus, a system, and a method for providing an industrial internet encryption system comprising: accessing an application module; initiating registration with the application module; completing registration with the application module by providing profile attributes; locally encrypting registration profile attributes; authenticating into a networked environment using encrypted registration information; and maintaining registration information for one or more devices. The method further comprising wherein the profile attributes are at least one of: a fingerprint, a name, a media access control (MAC) address, an international mobile equipment identity (IMEI) number, a password, a cellular phone number, an address, a date of birth, a driver's license, an email address, a username, data nucleus aggregated information (DNA), digital data nucleic authority (DDNA) information, and other personally identifiable information. The present disclosure provides an industrial internet encryption system comprising: a server; | 2020-02-20 |
20200059471 | System for Application Aware Rate-Limiting Using Plug-In - A method, system and computer-usable medium for web application aware rate-limiting. One embodiment of the system involves a computer-implemented method in which requests for a web application are receive from a plurality of client entities. When the received requests are to be rate-limited, a rate-limiting identifier is requested from a plug-in respectively associated with the web application. The plug-in generates the rate-limiting identifier, wherein the rate-limiting identifier is unique to the web application. The plug and sends the rate-limiting identifier to the rate-limiting engine, which uses the rate-limiting identifier to rate-limit passing of the received requests to the web application. In some embodiments, the rate-limiting identifier is generated as a hash value that is independent of IP address and header information data of the client making the request. | 2020-02-20 |
20200059472 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO CUSTOM BROWSER FUNCTIONALITY - A method, non-transitory computer readable medium and apparatus for controlling access of a custom browser function are disclosed. For example, the method includes a processor that sends a request to a third party website, receives a hypertext markup language code and a browser script, renders the hypertext markup language code, detects that the browser script is trying to access a custom browser function, compares one or more parameters associated with the custom browser function to an access control list to control an access of the custom browser function, and executes the custom browser function when a match of the one or more parameters is found in the access control list. | 2020-02-20 |
20200059473 | Network Device Isolation For Access Control and Information Security - A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint device to the threat management server in response to the device connecting to a port on the switch. The threat management server determines the endpoint device is present in a device log file. The threat management server determines the number of times the endpoint device has failed authentication exceeds a first threshold value within a first time period and the number of times the endpoint device has passed authentication is less than a second threshold value within a second time period. The threat management server determines the endpoint device does not have a lease for the port on the switch and sends a reroute command to the switch to transform the destination of traffic associated with the endpoint device to a safe zone. | 2020-02-20 |
20200059474 | SYSTEM AND METHOD FOR CONTROL SYSTEM CYBERSECURITY - A method may include connecting a network device to a control zone of a drilling management network. The control zone may include a control system that includes a programmable logic controller that performs drilling operations. The method may further include validating that the network device is authorized to communicate with a destination device in the control zone. The method may further include reconfiguring, in response to validating the network device, the control zone to enable the network device to communicate with the destination device. The method may further include obtaining a packet from the network device. The method may further include transmitting, in response to reconfiguring the control zone, the packet to the network device. | 2020-02-20 |
20200059475 | SYSTEM FOR DETECTING UNAUTHORIZED ACCESS VIA CARD CHARACTERISTIC VERIFICATION - Embodiments of the present invention provide a system for detecting unauthorized access via card characteristic verification. The present invention is configured to identify initiation of a resource distribution event via a resource distribution card at a resource distribution device, identify one or more characteristics of the resource distribution card, determine a first user associated with the resource distribution card based on the one or more characteristics, determine that the resource distribution card of the first user is associated with an issuing entity associated with a resource account of the first user based on the one or more characteristics, and authorize and process the resource distribution event based on determining that the resource distribution card is associated with the issuing entity associated with the resource account associated with the first user. | 2020-02-20 |
20200059476 | SYSTEM AND METHOD OF BUSINESS ROLE MINING - A system, non-transitory computer-readable medium, and method for approving access permissions are provided. The system comprises at least one processor and memory storing instructions which when executed by the at least one processor configure the at least one processor to perform the method. The non-transitory computer-readable medium has instructions thereon, which when executed by a processor, perform the method. The method comprises transforming enterprise access data into data sets, identifying business roles based on common patterns of the access data, presenting at least one business role assignable to an employee to an access manager, and receiving an approval indication input associated with the access manager assigning the business role to the employee. The business roles comprises at least one access point associated with the access data. | 2020-02-20 |
20200059477 | SYSTEMS AND METHODS FOR BINDING AUTHORIZATION TO A PROXY USING A GET/AUTHORIZE URL THROUGH A NATIVE APPLICATION - In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for binding a GET/AUTHORIZE URL to a proxy through a native application may include: (1) receiving, at a native application executed by an electronic device, an applink call or a universal link call from a third-party application executed by the electronic device, the redirect comprising at least one parameter; (2) providing a Get/Authorize call with the at least one parameter to an API gateway; (3) receiving a 302 redirect from the API gateway; (4) providing authentication information to an authorization platform; (5) receiving an authorization code from the authorization platform; and (6) redirecting the third-party application with the redirect URL and authorization code. | 2020-02-20 |
20200059478 | CONTINUOUS HASH VERIFICATION - There is described a method and data processing apparatus for verifying part or all of a downloading file, the file comprising a sequence of bytes, one or more bytes defining a block, the file having a final hash state calculated by a hash algorithm over the blocks in ascending order from first to last, each block having a starting hash state calculated by the hash algorithm, said method comprising: receiving the final hash state; receiving one or more blocks orderable in descending order starting from the last block; receiving, for each received block, the starting hash state for that block; calculating, for each received block, an ending hash state by running the hash algorithm from the starting hash state of the received block; confirming the starting hash state for each received block when the ending hash state is the same as the final hash state or a confirmed starting hash state; and flagging an error when an ending hash state does not match the final hash state or a confirmed starting hash state. | 2020-02-20 |
20200059479 | INTEGRATED RESOURCE LANDSCAPE SYSTEM - The invention relates to a resource landscape system that allows users to identify issues with elements within the organization and implement changes to the elements utilizing a relational database that utilizes nodes for defining the elements and relationships between the elements. The resource landscape system and applications therein provide a holistic inventory of resources, threat vectors, controls, metrics, policies, rules, and/or the like. The resource landscape system may be implemented through one or more interfaces that allows users to view cross-references of the elements, identify the priority of the elements using the crossed-references, and/or identify element issues in the elements of the organization that could results in threats to the organization. Moreover, the invention allows for receiving changes to one or more of the elements and automatically updating the cross-references of the elements, the priority of the elements, and/or the element issues. | 2020-02-20 |
20200059480 | Port Scanning - A method of scanning a plurality of ports at one or more target IP addresses is disclosed. Each of the plurality of ports corresponds to a port number at one of the one or more target IP addresses, for example an IPv4 or IPv6 address. The method comprises assigning each port to one of a plurality of sets of ports and executing a plurality of port scanning processes at the same time on a common source machine (virtual or physical). Each port scanning process sends port probe requests to the ports of a respective set of the plurality of sets from a different respective source IP addresses. Thus, a different respective source IP address is associated with each set of the plurality of sets of ports, different from the source IP addresses associated with the remaining sets, and each set of target IP addresses receives probe requests from a different respective source IP address. The sets may be aligned with target addresses or may spread several target addresses or only part of the ports of a target address. For example, one or more of the plurality of port scanning processes may send port probe requests to more than one target IP address and/or two or more of the plurality of port scanning processes may send port probe requests to the same target IP address. | 2020-02-20 |
20200059481 | SYSTEM AND METHOD ASSOCIATED WITH EXPEDIENT DETECTION AND RECONSTRUCTION OF CYBER EVENTS IN A COMPACT SCENARIO REPRESENTATION USING PROVENANCE TAGS AND CUSTOMIZABLE POLICY - A system associated with detecting a cyber-attack and reconstructing events associated with a cyber-attack campaign, is disclosed. The system performs various operations that include receiving an audit data stream associated with cyber events. The system identifies trustworthiness values in a portion of data associated with the cyber events and assigns provenance tags to the portion of the data based on the identified trustworthiness values. An initial visual representation is generated based on the assigned provenance tags to the portion of the data. The initial visual representation is condensed based on a backward traversal of the initial visual representation in identifying a shortest path from a suspect node to an entry point node. A scenario visual representation is generated that specifies nodes most relevant to the cyber events associated with the cyber-attack based on the identified shortest path. | 2020-02-20 |
20200059482 | ADAPTIVE ANOMALY DETECTION FOR COMPUTER SYSTEMS - Feature vectors are abstracted from data describing application processes. The feature vectors are grouped to define non-anomalous clusters of feature vectors corresponding to normal application behavior. Subsequent feature vectors are considered anomalous if they do not fall within one of the non-anomalous clusters; alerts are issued for anomalous feature vectors. In addition, the subsequent feature vectors may be used to regroup feature vectors to adapt to changes in what constitutes normal application behavior. | 2020-02-20 |
20200059483 | METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING - Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously. | 2020-02-20 |
20200059484 | PROTOCOL-INDEPENDENT ANOMALY DETECTION - A computer-implemented method for implementing protocol-independent anomaly detection within an industrial control system (ICS) includes implementing a detection stage, including performing byte filtering using a byte filtering model based on at least one new network packet associated with the ICS, performing horizontal detection to determine whether a horizontal constraint anomaly exists in the at least one network packet based on the byte filtering and a horizontal model, including analyzing constraints across different bytes of the at least one new network packet, performing message clustering based on the horizontal detection to generate first cluster information, and performing vertical detection to determine whether a vertical anomaly exists based on the first cluster information and a vertical model, including analyzing a temporal pattern of each byte of the at least one new network packet. | 2020-02-20 |
20200059485 | SECURE NETWORKING PROTOCOL OPTIMIZATION VIA NIC HARDWARE OFFLOADING - Methods and apparatus for secure networking protocol optimization via NIC hardware offloading. Under a method, security offload entries are cached in a flow table or a security database offload table on a network interface coupled to a host that implements a host security database mapping flows to Security Association (SA) contexts. Each security offload entry includes information identify a flow and information, such as an offset value, to locate a corresponding entry for the flow in the host security database. Hardware descriptors for received packets that belong to flows with matching security offload entries are generated and marked with the information used to locate the corresponding entries in the host security database. The hardware descriptors are processed by software on the host and the location information is used to de-reference the location of applicable entries in the host security database. In effect, the lookup of matching flows in the host security database is offloaded to the network hardware device. | 2020-02-20 |
20200059486 | INFORMATION PROCESSING APPARATUS, RECORDING MEDIUM RECORDING NETWORK MONITORING PROGRAM, AND NETWORK MONITORING METHOD - An information processing apparatus includes: a memory; and a processor coupled to the memory and configured to: specify, from among packets which are captured in a network, a head packet for transmitting a response related to remote control; extract a total size of the response from the head packet; calculate an area size which is assigned for the response in the head packet; and determine, based on the total size and the area size, that the remote control succeeds. | 2020-02-20 |
20200059487 | VERIFYING NETWORK SUBSYSTEM INTEGRITY WITH BLOCKCHAIN - In a telecommunication network, individual network slices are provided for various uses and/or for various enterprise customers. A network subsystem such as a network slice comprises multiple components, such as routers, applications, virtual network functions, etc. Each component of the subsystem generates and provides a digital signature, such as a hash, based on state properties of the component that have been designated as being invariant. The signatures from the multiple components are then combined and hashed to form a subsystem signature. A chronological sequence of subsystem signatures is saved in a distributed ledger, which may use blockchain technology to protect against after-the- fact modifications to the saved signatures. A network threat may be detected by detecting situations in which the subsystem signature of a particular subsystem changes over time. A saved blockchain, containing the sequence of signatures, can be provided as historical evidence of network integrity. | 2020-02-20 |
20200059488 | DETECTION AND PREVENTION OF AUTOMATIC REDIRECTS OF MAIN HTML DOCUMENT FROM WITHIN NESTED SUB-DOCUMENT - A method comprising: receiving, from a web browser, a request for content to be inserted into a sub-document that is nested inside a main document; and transmitting to said web browser, in response to the request: said content, and a client-side script that, when inserted by said web browser into said sub-document: (i) listens to software methods that attempt to invoke a user event without an action by a user of said web browser, (ii) analyzes said user event to determine if said user event is configured to cause said web browser to navigate away from said main document. | 2020-02-20 |
20200059489 | USING CLONED ACCOUNTS TO TRACK ATTACKS ON USER ACCOUNTS - Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed. | 2020-02-20 |
20200059490 | METHODS FOR HYPERTEXT MARKUP LANGUAGE (HTML) INPUT FIELD OBFUSCATION AND DEVICES THEREOF - Methods, non-transitory computer readable media, security management apparatuses, and network traffic management systems are disclosed that improve network security via input field obfuscation are disclosed. With this technology, a script is injected into source code of a web page received from a server. The source code is then sent to a requesting client. The script is configured to remove an event listener attached to a protected input field of the web page to provide a script secured input field. An application layer message that is received from the client is subsequently sent to the server. The application layer message includes data submitted via the script secured input field that prevented one or more keystrokes corresponding to the data from being observed by a source of the event listener. | 2020-02-20 |
20200059491 | Generation of security policies for microsegmented computer networks - A computer-implemented method of generating a security policy for a microsegmented computing system is provided. The method includes generating a port service map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system and a port distribution map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system, and generating a list of security policy recommendations based on the port service map and/or the port distribution map. | 2020-02-20 |
20200059492 | ELASTIC POLICY SCALING IN MULTI-CLOUD FABRICS - Systems, methods, and computer-readable media for elastic policy scaling in multi-cloud fabrics. A method can involve deploying a cluster of policy agents on a hub virtual private cloud (VPC) that interconnects spoke VPCs in a cloud associated with a multi-cloud fabric, and mapping endpoints in the spoke VPCs to the policy agents. The method can involve distributing groups of policies for the endpoints across the policy agents based on the mapping of endpoints to policy agents, and advertising, by each policy agent to a respective first set of virtual gateways in the spoke VPCs, routes associated with endpoints mapped to the policy agent and preventing the policy agent from advertising routes associated with a second set of virtual gateways in the spoke VPCs. The method can involve applying, via the policy agent, a group of policies on the policy agent to traffic received by the policy agent. | 2020-02-20 |
20200059493 | NETWORK POLICY MIGRATION TO A PUBLIC CLOUD - An example method of migrating a firewall policy between a first virtual data center and a second virtual data center includes: generating a static firewall from a firewall document at a first firewall server in the first virtual data center, the firewall document defining polices applied to groups of objects in the first virtual data center, the static firewall including firewall rule tuples; sending the static firewall from the first firewall server to a second firewall server in the second virtual data center; migrating a plurality of virtual machines (VMs) from the first virtual data center to the second virtual data center; and importing the firewall document from the first firewall server to the second firewall server by mapping the policies of the first firewall to groups of objects in an inventory of the second virtual data center. | 2020-02-20 |
20200059494 | NETWORK POLICY MIGRATION IN A FEDERATED HYBRID CLOUD - One or more embodiments provide a firewall policy between a first virtual data center and a second virtual data center. A method includes: establishing a communication link between a first firewall server in the first virtual data center and a second firewall server in the second virtual data center over a network, the first firewall server having a first firewall defined by polices applied to groups of objects in the first virtual data center; obtaining, at the first firewall server, an inventory of objects in the second virtual data center from the second firewall server; determining firewall rule tuples by mapping the policies of the first firewall to groups of objects in the inventory of the second virtual data center; and sending the firewall rule tuples to enforcement points in the second virtual data center. | 2020-02-20 |
20200059495 | METHOD FOR MANAGING DATA TRAFFIC WITHIN A NETWORK - A method manages data traffic within a network having controllers that each control a part of the network having a forwarding element (FE), the controllers being connected to a reference monitor (RM) for enforcing a security policy. The method includes: receiving a rule request by a controller and transmitting it its RM; the RM checking the rule request for policy compliance and authorizing a poly compliant part of the rule request. When the rule request has an outside modification: the controller contacts controllers impacted by the outside modification for obtaining an authorization, and upon receipt of authorization, sending the controller sends the modifications and authorizations to the impacted controllers to implement the modification in their FE. | 2020-02-20 |
20200059496 | Wireless Network Service Interfaces - A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple wireless networks that may have different service plan activation or service plan purchase processes. Network detection of service usage anomalies based on device-based data usage reports is provided to enable the network to determine whether an end-user device is likely operating in accordance with the established policy, or whether the end-user device may be operating fraudulently. | 2020-02-20 |
20200059497 | APPARATUS AND METHODS FOR CENTRALIZED MESSAGE EXCHANGE IN A USER PREMISES DEVICE - Methods and apparatus for providing a messaging server within a premises device e.g., a home or enterprise gateway device. In one embodiment, a system is described that includes a premises device that acts as a centralized client messaging platform providing messaging services between a content provider and client devices, and also between client devices within a premises network. The premises device enables client-to-client communication that bypasses the long trip and propagation delay over the Internet by connecting the message across the premises network. The premises device enables messages to be communicated between a content provider outside the premises network and the client devices via a single connection to minimize the number of Internet connections that need to be opened, and the number of messages communicated with servers outside of the premises network via both upstream aggregation and downstream dis-aggregation, which collectively save both network bandwidth and device reaction time. | 2020-02-20 |
20200059498 | MINIMIZING PRODUCTIVITY LOSS IN A COLLABORATIVE SHARING ENVIRONMENT - According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects. | 2020-02-20 |
20200059499 | TECHNOLOGIES FOR AUDIOVISUAL COMMUNICATION USING INTERESTINGNESS ALGORITHMS - Technologies for audiovisual communication include an audiovisual server and a number of audiovisual client devices, including a presenter device and a number of audience devices. Each audience device captures an audiovisual stream and transmits the audiovisual stream to the audiovisual server. Each audience device also captures sensor input data such as eye tracking data or facial expression data and transmits abstracted sensor input data to the audiovisual server. The abstracted sensor input data may be based on the captured audiovisual stream. The audiovisual server determines an interestingness rating associated with each audience device based on the sensor input data, and selects one or more audiovisual streams based on the interestingness ratings. The audiovisual server transmits the selected audiovisual streams to the presenter device. The audiovisual server may update the interestingness rating algorithm based on feedback from the presenter device or the audience devices. Other embodiments are described and claimed. | 2020-02-20 |
20200059500 | SIMULTANEOUS INPUT SYSTEM FOR WEB BROWSERS AND OTHER APPLICATIONS - In a computing environment having a multiple input detection system including a detector that detects and transmits multiple simultaneous user inputs from different users at a same time, a method for processing inputs from different users across multiple application windows of one or more applications displayed on a single display of a user interface, resulting in a multi-user graphical user interface (GUI), the computing environment running an operating system (OS) designed to run with a single user GUI, the method including determining, in a primary application, separate from the OS, that a first user input corresponds to a first window and a second user input corresponds to a second window, the primary application sending the first and second user inputs to first and second secondary applications that run in parallel with the primary application, the first and second secondary applications being designed to run with the OS. | 2020-02-20 |
20200059501 | METHOD AND APPARATUS FOR MULTI-EXPERIENCE METADATA TRANSLATION OF MEDIA CONTENT WITH METADATA - A method or apparatus that incorporates teachings of the present disclosure may include, for example, a method for retrieving a plurality of sensory information from an environment of a device. A digital representation of the environment of the device is identified corresponding to the plurality of sensory information from the environment of the device. A media presentation element of the device associated with media content of the device is identified. A user interface of the media presentation element is adapted to modify a presentation of the media content by the media presentation element of the device according to the digital representation of the environment of the device. Other embodiments are disclosed. | 2020-02-20 |
20200059502 | HEAD-MOUNTED DEVICES (HMDs) DISCOVERY IN CO-LOCATED VIRTUAL, AUGMENTED, AND MIXED REALITY (xR) APPLICATIONS - Methods and systems are provided for collaborating in the discovery of Head-Mounted Devices (HMDs) configured for hosting a co-located virtual, augmented, or mixed reality (xR) session. An HMD issues a request to join a co-located xR session. Participating in a co-located xR session requires a joining HMD to obtain authorization from a host HMD. A joining HMD may be located such that direct communications between the joining HMD and the host HMD are either unreliable, or beyond the capabilities of two HMDs. The joining HMD may collaborate with neighboring HMDs to obtain authorization from a host HMD. The host HMD aggregates information from joining HMDs to determine the authorized HMDs and to determine the most reliable forms of direct communication between each pair of HMDs participating in the xR session. | 2020-02-20 |
20200059503 | MEDIA STREAMING USING A HEADLESS BROWSER - A method includes receiving an input media stream at a hardware encoder. The method also includes executing, at a processor of the hardware encoder, a headless browser to retrieve an instance of a dynamic web page that includes additional content. The method also includes storing the additional content at a memory that is accessible to the processor and encoding circuitry of the hardware encoder. The method further includes retrieving, at the encoding circuitry, the additional content from the memory and encoding the input media stream to generate an output media stream. At least one frame of the output media stream includes at least a portion of the additional content in conjunction with at least a portion of a corresponding frame of the input media stream. | 2020-02-20 |
20200059504 | SCHEMES CAPABLE OF SYNCHRONIZING NATIVE CLOCKS AND AUDIO CODEC CLOCKS OF AUDIO PLAYING FOR BLUETOOTH WIRELESS DEVICES - A method utilized in a wireless device used to wirelessly receive and play audio information includes: receiving a data packet stream transmitted from an audio source; monitoring a data amount of at least one buffer of a memory of the wireless device; and tuning an audio clock frequency dedicated for playing audio samples if the data amount of the at least one buffer deviates from a specific data amount level. | 2020-02-20 |
20200059505 | Systems, Methods, and Media for Delivery of Content - Systems, methods, and computer readable media for delivery of content are provided. In some embodiments, systems for controlling delivery of content are provided, the systems comprising processing circuitry configured to: receive a request to stream the content, the request being received from a user equipment device; determine a first location of the user equipment device; determine a count of user equipment devices that are located at the first location and are currently streaming the content; determine whether the count meets a threshold; and responsive to determining that the count meets the threshold, add a first content delivery network to a pool of one or more content delivery networks that are used to stream the content. | 2020-02-20 |
20200059506 | DATA TRANSMISSION FRAMING - Techniques for framing data in various data transmission contexts are described. A data framing technique may include a transmitter sending a data stream including repeating bits in alternating forward and reverse order. A receiver of the data stream may fold the data stream, and correlate portions of the folded data stream for purposes of validating the data stream and/or identifying an ID in the data stream. In at least some instances, once the receiver validates the data stream, the receiver may accept payload accompanying the data stream. | 2020-02-20 |
20200059507 | ADDING AND REMOVING VIRTUAL DISKS REMOTELY TO A STREAMING MACHINE - A client device includes a memory and at least one processor configured to cooperate with the memory. The at least one processor receives a virtual disk change notification from a server, with the virtual disk change notification including a new configuration for a virtual disk image. At least one change to the virtual disk image is determined based on a comparison of the virtual disk image with the new configuration of the virtual disk image. The virtual disk image is modified based on the determined at least one change. | 2020-02-20 |
20200059508 | High Availability Voice Over Internet Protocol Telephony - The present invention is directed to processes and systems for high availability Voice Over Internet Protocol telephony. Exemplary embodiments comprise a VOIP proxy cluster in communication with an IP private branch exchange cluster in communication with a PSTN VOIP gateway cluster, all at a first call cluster locale. In exemplary configuration, nodes within each of the clusters mount a database node from the database cluster, and store and retrieve persistent telephony operation data within the database cluster. Embodiments employ the clustering mechanisms to separate telephony elements in a cluster to cluster topology. In exemplary usage, multiple physically separate call cluster locales are deployed for higher availability. | 2020-02-20 |
20200059509 | UPLOADING A FILE FROM A USER DEVICE TO A DATA STORAGE SERVICE - The present invention relates to a method for uploading a file from a user device ( | 2020-02-20 |
20200059510 | BLOCKCHAIN DIGITAL TWIN - Performing blockchain operations on behalf of a capability limited device that is unable to perform the blockchain operations. The method includes hosting a digital twin for the capability limited device on a system capable of performing the blockchain operations. The capability limited device includes a unique device identifier. The digital twin also includes the unique device identifier, such that actions performed by the digital twin are attributable to the capability limited device. The method further includes receiving input for a set of blockchain operations at the system capable of performing the blockchain operations, from the capability limited device. The method further includes performing the set of blockchain operations at the system capable of performing the blockchain operations using the digital twin and the unique device identifier, such that performance of the set of blockchain operations is attributed to the capability limited device. | 2020-02-20 |
20200059511 | MODEL-DRIVEN IMPLEMENTATION OF SERVICES ON A SOFTWARE-DEFINED NETWORK - A method includes receiving, at a model and optimization framework, a request, rendered in a first format, for a service to be implemented on a subset of a software-defined network. The request includes at least one constraint affecting implementation of the service. The method includes producing an optimized solution, rendered in a second format, for implementing the service based on the at least one constraint. The method includes translating the optimized solution to the first format and providing instructions for a cloud manager to implement the service consistent with the translated optimized solution. | 2020-02-20 |
20200059512 | AUTOMATIC APPLICATION SCALING BETWEEN PRIVATE AND PUBLIC CLOUD PLATFORMS - Methods, systems, and computer program products are provided that automatically scale an application between private and public cloud computing platforms, while simultaneous enforcing policies ensuring private data is persistently stored on the private cloud computing platform, but not the public cloud computing platform. A traffic manager on the public platform routes traffic to instances of a web app executing on a private platform. A traffic monitor on the private platform monitors performance criteria of the private platform, and reports traffic telemetry to the traffic manager. Based on the traffic telemetry, the traffic manager may instantiate one or more instances of the web app on the public platform to handle traffic. Private data gathered by such instantiated instance(s) is persisted to storage in the private platform, but not in the public platform. | 2020-02-20 |
20200059513 | PAIRWISE COMPARISON FOR LOAD BALANCING - Load balancing across hosts in a computer system is triggered based on pairwise comparisons of resource utilization at different host. A method for load balancing across hosts includes the steps of determining a resource utilization difference between first and second hosts, wherein the first host has a higher resource utilization than the second host, comparing the resource utilization difference against a threshold difference, and upon determining that the resource utilization difference exceeds the threshold difference, selecting a workload executing in the first host for migration to the second host. | 2020-02-20 |
20200059514 | USER SPACE REDIRECT OF PACKET TRAFFIC - Enhanced packet redirect capabilities are disclosed herein for draining traffic to a server. In an implementation, a server in an infrastructure service receives a packet from a stateless load balancer. The packet may comprise a request for content. A user space program on the server determines whether a connection identified in the packet belongs to the server. If the connection belongs to the server, the user space program handles the request for the content. If not, the server forwards the packet to a secondary server in the infrastructure service. The secondary server, to which the connection may belong, can then handle the request. | 2020-02-20 |
20200059515 | SYSTEM AND METHOD FOR A DATABASE PROXY - A database proxy includes a computing device and a hardware-accelerated database proxy module. The computing device includes one or more processors, memory, a first bus interface, and a network interface coupling the database proxy to one or more networks. The database proxy module includes a second bus interface coupled to the first bus interface via one or more buses, and a request processor. The database proxy is configured to receive a database read request from a client via the one or more networks and the network interface; forward the database read request to the request processor using the one or more buses; process, using the request processor, the database read request; and return results of the database read request to the client. In some embodiments, the computing device or the database proxy module further includes a flash memory interface for accessing one or more flash memory devices. | 2020-02-20 |
20200059516 | BRIDGING CLOUDS - Technology is disclosed for bridging clouds of computing devices for compute and data storage. The technology can receive a virtual routing table (VRT), wherein the VRT indicates an association with a virtual local area network (VLAN) and defines neighbors for each route wherein at least one neighbor is defined for each of the two different cloud service providers, wherein the route definition creates a private transitive network between the neighbors; receive from a first node a first message destined for a second node; determine that the first message employs the route specified by the VRT; forward the first message to the second node; receive from a third node a second message destined for the second node; determine that the second message does not employ the route specified by the VRT; and fail to forward the second message to the second node. | 2020-02-20 |
20200059517 | SYSTEM AND METHOD FOR SCHEDULING COMPUTER TASKS - A method, system, and computer-readable storage medium for a reconfigurable computing system are disclosed. One method involves configuring one or more computing resources (selected according to a workflow that specifies an application to be executed) of a computing node and executing, using the one or more computing resources, at least a portion of an application at the computing node. At least one of the one or more computing resources is a reconfigurable logic device, and the configuring, at least in part, configures the reconfigurable logic device according to a configuration script of the workflow. The executing comprises performing one or more operations. The one or more operations are performed by the reconfigurable logic device. The reconfigurable logic device is configured to perform the one or more operations by virtue of having been configured according to the configuration script. | 2020-02-20 |
20200059518 | CELLULAR NETWORK HIERARCHICAL OPERATIONAL DATA STORAGE - A system may include a first processor for storing, in a key-value column-based database, data records from data sources of a cellular network that is transformed into a single format. Customer identifiers may be used as key-values for indexing the data records in the key-value column-based database. The system may include a second processor for creating session records from the data records. Each session record may include a velocity of an endpoint device associated with a session and a number of inter-cell handoff attempts for the session. Each session record may also be labeled with a session identifier comprising a customer identifier and a timestamp. The system may further include a third processor for creating cell-level records from the session records. Each cell-level record may include a plurality of key performance indicators for a cell site of the cellular network segregated by a plurality of endpoint device types. | 2020-02-20 |
20200059519 | DATA DELIVERY SYSTEM, INDICATION DEVICE, DATA DELIVERY DEVICE, SENSOR MANAGEMENT DEVICE, DATA DELIVERY METHOD, AND PROGRAM - One mode of the present invention is configured to acquire sensor-side metadata including a first label corresponding to a label showing a name given in order to identify event data, to acquire app-side metadata including a second label that is an event condition showing a condition of an event and corresponds to the label, to determine, in a case where sensing data satisfies a requirement of an application, whether the first label and the second label are identical, and to transmit, in the case where these labels are identical, a dataflow control command including information specifying a sensor, information specifying the application and the event condition included in the app-side metadata. | 2020-02-20 |
20200059520 | FIELD DATA PROCESSING METHOD, APPARATUS, AND SYSTEM - The present application relates to the technical field of industrial data processing, and in particular relates to a field data processing method, apparatus and system, which are used to realize the timely processing of field data. In the embodiments of the present application, a field data processing apparatus located on an industrial site of an industrial system receives field data from at least a field apparatus on the industrial site, and processes the received field data and provides the processing result of the field data. In this way, untimely processing of field data can be avoided. | 2020-02-20 |
20200059521 | JOINT IOT BROKER AND NETWORK SLICE MANAGEMENT COMPONENT - A method for Internet of Things (IoT) traffic management in a communication network supporting a plurality of network slices, in particular a 5 | 2020-02-20 |
20200059522 | ELECTRONIC DEVICE, SERVER AND METHOD OF CONTROLLING THE SAME - An electronic apparatus and method of controlling the electronic apparatus are provided. The electronic apparatus includes an operation performer, network communicator circuitry that performs network communication with a server, infrared communicator circuitry, and a processor that controls the operation performer to perform a predetermined operation, obtains information of an external device from a first infrared signal of the external device, is the first infrared signal being obtained through the infrared communicator circuitry, controls the network communicator circuitry to transmit the obtained information of the external device to the server to register the external device as a control target, obtains a control command for controlling the external device from the server, and controls the infrared communicator circuitry to transmit a second infrared signal, which contains command information based on the obtained control command, to the external device to make the external device perform an operation corresponding to the obtained control command. | 2020-02-20 |
20200059523 | Communication Management Method and System for Auto-bookmark - The present disclosure relates to the field of communication management, more particularly, communication management methods and systems for session visit auto-bookmarking. In one disclosed embodiment, a communication management server is disclosed. The communication management server comprises a memory storing a set of instructions, and at least one processor configured to execute the instructions to receive communication messages from a plurality of user devices, store the communication messages in a communication content database, provide communication content for display on the user device, receive a display suspension instruction, and generate a visit bookmark indicating a last displayed message in the communication content. | 2020-02-20 |
20200059524 | Secure, Anonymous Browsing with a Remote Browsing Server - A client device may connect to a remote browsing server, which may browse to a Uniform Resource Identifier, render a web service or other content, and stream the content back to the client device. The client device may have a web browser through which the server may stream rendered images and which may capture various inputs, such as mouse operations, keyboard inputs, and other input. The remote browsing server may receive the inputs from the browser, then transmit the inputs to the web service through a server browser, which may render the images transmitted to the client device. The remote browsing server may be a virtual machine that may be created for a limited use, such that the virtual machine and browser may be wiped clean with each use. | 2020-02-20 |
20200059525 | REDIRECTION METHOD, CONTROL PLANE NETWORK ELEMENT, AGGREGATION USER PLANE NETWORK ELEMENT, CONTENT SERVER, AND TERMINAL DEVICE - This embodiments of the application provides a redirection method and a control plane network element to quickly obtain the content requested by a terminal device. The method may include obtaining, by a control plane network element, a content transmission request sent from a content server; determining, by the control plane network element based on the content transmission request, a cache node configured to store to-be-transmitted content and an aggregation user plane network element associated with the cache node. The method may also include sending, by the control plane network element, a traffic flow matching parameter to the aggregation user plane network element, where the traffic flow matching parameter is used to match a traffic flow of the to-be-transmitted content and determine a connection used to transmit a matched traffic flow. | 2020-02-20 |
20200059526 | SYSTEMS AND METHOD FOR MICRO NETWORK SEGMENTATION - A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet. | 2020-02-20 |
20200059527 | Automatic Browser inactivity detection method and apparatus - Disclosed are systems and methods for improving interactions with and between computers in controlling external programs executed by a browser application. The disclosed systems and methods provide systems and methods for automatically identifying an external program in a document definition used in rendering a document display in a user interface of the browser application. In response to detecting inactivity in connection with the document display, the disclosed systems and methods generate a first modified document definition, by modifying the document definition, to suspend execution of the external program in a first modified document display based on the first modified document definition. In response to activity in connection with the first modified document display, the disclosed systems and methods generate a second document definition, by modifying the first document definition, to restore execution of the external program in a second modified document display based on the second modified document definition. | 2020-02-20 |
20200059528 | CLIENT-SIDE QUALITY-OF-SERVICE (QOS) FOR VIEWING OF ADAPTIVE BITRATE (ABR) STREAMS - Client-side Quality-of-Service (QoS) for viewing of Adaptive Bitrate (ABR) streams may be provided. First, a plurality of Adaptive Bitrate (ABR) objects corresponding to a first video rendition of a content program may be downloaded from a Content Delivery Network (CDN) in non-real-time. The plurality of ABR objects may comprise a portion of ABR objects comprising the content program. Next, the plurality of ABR objects downloaded in non-real-time may be stored in a cache. At least a portion of the content program may then be retrieved in real-time using ABR streaming. Retrieving the at least a portion of the content program may comprise obtaining a first ABR object corresponding to the content program and a second ABR object corresponding to the content program. | 2020-02-20 |
20200059529 | DATA MANAGEMENT IN AN EDGE NETWORK - Generally discussed herein are systems, devices, and methods for data management in a reverse content data network (rCDN). A component of the rCDN may include a memory to hold content received from a first sensor device of a plurality of sensor devices of the rCDN and first attributes that describe properties of the content. The component may include processing circuitry to receive second content from a second sensor device of the plurality of sensor devices, the second content including a plurality of second attributes that describe properties of the second content, and forward, in response to a determination, based on the first and second attributes, that there is insufficient space to store the second content on the memory, the second content to a node of the rCDN that is fewer hops away from a backend cloud than the component. | 2020-02-20 |
20200059530 | HANDLING OF CONTENT IN A CONTENT DELIVERY NETWORK - A content delivery network has at least a first tier of servers. A content delivery method includes at a first server in the first tier of servers, obtaining a request from a client for a resource. If the resource is available at the first server or at a peer of the first server, then the resource is served to the client from the first server. Otherwise, it is determined whether the resource is popular, and if the resource is determined to be popular, then the first server obtains the resource and the first server serves the resource to the client. If the resource is determined not to be popular, the server contacts a second server to obtain the resource, not in the first tier of servers, and the second server provides the resource to the first server. The first server is instructed not to cache the unpopular content. | 2020-02-20 |
20200059531 | SYSTEMS AND METHODS FOR REDUCING DOWNLOAD REQUIREMENTS - A method of reducing download requirements for display of content includes transmitting, by a client device to a content server, a content request, the request including an identifier for each of one or more pre-cached media files stored on the client device, the transmission being carried out whilst the client device is connected to a first network. The method further includes receiving, by the client device from the content server, a response comprising instructions to display a selected one of the pre-cached media files, the response including additional display instructions for display of the selected pre-cached media file, and displaying, by the client device, the pre-cached media file according to the additional display instructions. | 2020-02-20 |
20200059532 | DELIVERY OF INCREMENTAL SENSOR DATA OVER OPTIMIZED CHANNEL - A computer system including program instructions to receive a message at a source gateway of the local network, the message includes message data corresponding to a plurality of message elements, assign a unique group ID based on the type of message received at the source gateway, extract a message format from the received message, the message format defines how the message data is organized with respect to the message elements, and associate the extracted message format with the unique group ID. The computer system further including program instructions to store locally, the extracted message format together with the associated unique group ID, establish a dedicated connection between the source gateway and a target gateway of the remote network based on the unique group ID, encode the message based on the extracted message format, and send the encoded message from the source gateway to the target gateway across the dedicated connection. | 2020-02-20 |
20200059533 | DELIVERY OF INCREMENTAL SENSOR DATA OVER OPTIMIZED CHANNEL - A computer system including program instructions to receive a message at a source gateway of the local network, the message includes message data corresponding to a plurality of message elements, assign a unique group ID based on the type of message received at the source gateway, extract a message format from the received message, the message format defines how the message data is organized with respect to the message elements, and associate the extracted message format with the unique group ID. The computer system further including program instructions to store locally, the extracted message format together with the associated unique group ID, establish a dedicated connection between the source gateway and a target gateway of the remote network based on the unique group ID, encode the message based on the extracted message format, and send the encoded message from the source gateway to the target gateway across the dedicated connection. | 2020-02-20 |
20200059534 | Content Distribution Network Supporting Popularity-Based Caching - A content delivery network may provide content items to requesting devices using a popularity-based distribution hierarchy. A central analysis system may determine popularity data for a content item stored in a first caching device. At a later time, the central analysis system may determine that a change in the popularity data is beyond a threshold value. The central analysis system may then transmit an instruction to move the content item from the first caching device to a second caching device in a different tier of caching devices than the first caching device. The central analysis system may update a content index to indicate that the content item has been moved to the second caching device. A user device may then be redirected to request the content item directly from the second caching device. | 2020-02-20 |
20200059535 | Schedule Creator for Digital Media and Multimedia Scheduling and Delivery Platform - The system is a self-serve platform, which delivers user uploaded media and multimedia files, of varying playback duration, to a client computer connected to a digital display; which is set to receive executions for a scheduled playlist and punctually presents the playback of media and/or multimedia files in said playlist record. The system's included functions for schedule generation, schedule selection, and playlist creation contain unique, and embedded automatic functions, provide the capacity for making scheduling and delivery of media and multimedia files reliable, accessible, and cost efficient. | 2020-02-20 |
20200059536 | System and Method for Improving Internet Communication by Using Intermediate Nodes - A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both. The partition into slices may be overlapping or non-overlapping, and the same slice (or the whole content) may be fetched via multiple tunnel devices. | 2020-02-20 |
20200059537 | NETWORK NODE AND METHOD PERFORMED THEREBY PROVIDING A RECOMMENDATION ASSOCIATED WITH A SERVICE TO A WIRELESS DEVICE - A network node and a method performed by a network node for providing a recommendation associated with a service to a wireless device are provided. The network node is operable in a wireless communication network. The method includes obtaining bandwidth information associated with a radio interface between a radio access node of a Radio Access Network, RAN, of the wireless communication network and the wireless device; and obtaining bandwidth information associated with a transport network of the wireless communication network. The method further includes determining available bandwidth for providing the service to the wireless device based on the obtained bandwidth information associated with the radio interface and the obtained bandwidth information associated with the transport network. | 2020-02-20 |
20200059538 | RF TRANSCEIVER AND WIRELESS MESH NETWORK - A RF transceiver for a mesh network node is described. The RF transceiver includes a RF transmitter and a RF receiver coupled to the processor. The RF transceiver is configured in a normal mode of operation as a network node in a wireless mesh network and is configured in a service mode of operation as a network node in a tree network. | 2020-02-20 |
20200059539 | CLOUD-NATIVE RESERVOIR SIMULATION - Systems and methods for cloud-based management of reservoir simulation projects are provided. A cloud-based application server may receive from a client device over the communication network information defining a reservoir simulation project for a wellsite in a hydrocarbon producing field. The reservoir simulation project may include at least one reservoir simulation job to be performed by the cloud-based application server. The information may include one or more parameters for the reservoir simulation job. The cloud-based application server may perform the reservoir simulation job according to the one or more parameters. The cloud-based application server may provide results of the simulation job to the client device over the communication network for display within a graphical user interface (GUI) provided at the client device for a cloud-based reservoir simulation application executable by the application server. | 2020-02-20 |
20200059540 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2020-02-20 |
20200059541 | TRANSMISSION APPARATUS, TRANSMISSION METHOD, RECEPTION APPARATUS, AND RECEPTION METHOD - The present disclosure relates to a transmission apparatus, a transmission method, a reception apparatus, and a reception method which make it possible to control redundancy of a header in packet communication. A region representing a packet length in a header of a packet is set according to a size of a payload of an input packet. A header of a baseband packet includes a minimum fixed length header including type identification information for identification of a type of the input packet or the stream and information of a packet length of the input packet or the stream stored in a payload of the baseband flame packet. | 2020-02-20 |
20200059542 | FUNCTIONAL ASSEMBLY AND ELECTRONIC DEVICE - A functional assembly is provided. The functional assembly includes a functional module and a lifting assembly. The lifting assembly is fixed in the housing and configured to drive the functional module to move. In addition, the functional assembly further includes a rotating assembly. The rotating assembly is connected to the functional module. | 2020-02-20 |
20200059543 | SCREEN LIGHTING METHOD FOR DUAL-SCREEN TERMINAL AND TERMINAL - The present invention discloses a screen lighting method for a dual-screen terminal and a terminal. In this method, after detecting an operation performed by a user to trigger lighting of a screen, the terminal detects a quantity of touch regions on a first screen of the terminal and a quantity of touch regions on a second screen of the terminal, and the terminal lights a screen with a smaller quantity of touch regions. By analyzing a gesture of handholding the terminal by the user, a generality between a touch status of a screen that the user expects the terminal to light and a touch status of a currently unused screen is found. Therefore, the screen that the user expects the terminal to light can be determined relatively accurately based on the touch statuses of the two screens. | 2020-02-20 |
20200059544 | ELECTRONIC DEVICE - An electronic device according to various embodiments of the present invention can comprise: a housing including a first plate, a second plate, and a side member surrounding the space between the first plate and the second plate; a processor arranged in the space; a display exposed through a part of the first plate; a communication circuit arranged in the space; a piezoelectric actuator arranged in the space and providing vibration to the first plate; a speaker arranged in the space near the edge of the first plate; an audio processing circuit arranged in the space and electrically connected to the piezoelectric actuator and the speaker; and a memory arranged in the space and electrically connected to the processor. According to various embodiments, when instructions, which can be included by the memory, are executed, the processor wirelessly connects to an external device by using the communication circuit, receives an audio signal through the communication circuit, and provides the audio signal to the audio processing circuit. According to various embodiments, the side member can be separated from or integrated with the second plate. According to various embodiments, the audio processing circuit can provide, to the piezoelectric actuator, a first signal having a first frequency band and can provide, to the speaker, a second frequency band lower than the first frequency band, on the basis of at least a part of the audio signal. Additional various embodiments are possible. | 2020-02-20 |
20200059545 | MOBILE TERMINAL - A mobile terminal includes a housing having a front side, a rear side and lateral sides; a cover window disposed on the front side of the housing and defining a display area and a bezel area, wherein the bezel area includes printed color under an edge of the cover window; an OLED display unit disposed between the cover window and the front side of the housing; and a sensing unit disposed under the OLED display unit. Further, the OLED display unit includes a substrate having a hole below the display area of the cover window; a transistor layer including thin film transistors and being disposed on the substrate and having a hole corresponding to the hole of the substrate; an organic light emitting layer disposed on the transistor layer and having a hole corresponding to the hole of the transistor layer; and an encapsulation layer disposed on the organic light emitting layer and having a hole corresponding to the hole of the organic light emitting layer. In addition, the sensing unit senses a light transmitted through the holes. | 2020-02-20 |
20200059546 | PORTABLE DEVICE CASE FOR REMOVABLY ATTACHING ACCESSORIES - A portable device case can be engage various removably attachable accessories. The case is sized and shaped to at least partially enclose the mobile device and includes an opening sized and shaped to receive at least a portion of a casing of an accessory, a top flange sized and shaped to removably engage with a top flange of the casing of the accessory, and a bottom flange sized and shaped to removably engage with a bottom flange of the casing of the accessory. Various accessories and removable attachments can be used with the case. | 2020-02-20 |
20200059547 | MESSAGE OBTAINING METHOD AND APPARATUS - A data channel and an audio channel may be established between a wearable device and a terminal. When being in the earphone mode, the wearable device notifies the terminal of a current status, and receives and plays the voice message that is obtained by converting the text message and that is sent by the terminal, thereby overcoming an insufficient screen display capability of the wearable device, and enabling a user to conveniently check content of the text message in time. | 2020-02-20 |
20200059548 | TERMINAL - A terminal is disclosed. The terminal, according to one embodiment of the present invention, comprises: a display unit for displaying an image; a control unit for controlling the display of the image; and an artificial intelligence unit for acquiring at least one conversation, acquiring at least one keyword corresponding to the at least one conversation, and controlling the control unit so as to display summary data including the at least one keyword. | 2020-02-20 |
20200059549 | Audio Processing Method And Terminal Device - The present disclosure relates to audio processing methods and terminal devices. One example method includes determining, by a terminal device, an actual uplink gain based on a position relationship between an acoustic source and a microphone of the terminal device, and processing, by the terminal device, an audio signal from the acoustic source based on the actual uplink gain. | 2020-02-20 |
20200059550 | MOBILE TERMINAL DEVICE WITH FUNCTION LIMITATION, FUNCTION LIMITATION METHOD THEREOF, AND PROCESSING PROGRAM USED IN SAME - The purpose is to provide a mobile terminal device that can limit the use of the application by detecting the user position of the mobile terminal device and the speed of the vehicle by itself. To this end, provided is a function limitation method of a mobile terminal device with function limitation capable of limiting a use of an application, including, a step of determining whether or not a limitation target application of the mobile terminal device is in activation, a usage position check step of determining, by the mobile terminal device, a user of the mobile terminal device is on a driver seat, and a speed check step of calculating, by the mobile terminal device, a vehicle in which the user of the mobile terminal device is riding is traveling, in which the use of the application is limited or terminated when the user of the mobile terminal device is on the driver seat, and the vehicle is traveling. | 2020-02-20 |
20200059551 | INTELLIGENT ELECTRONIC DEVICE AND MODE SETTING METHOD - A method of setting a mode of an intelligent electronic device is disclosed. The method includes collecting a plurality of sensing information through a plurality of sensors, obtaining surrounding situation information based on the plurality of collected sensing information, extracting a feature value from the obtained surrounding situation information and determining a surrounding environment based on the extracted feature value, and selecting a disturbance interruption mode corresponding to the determined result. The intelligent robot device may be associated with an artificial intelligence module, an unmanned aerial vehicle (UAV), a robot, an augmented reality (AR) device, a virtual reality (VR) device, devices related to 5G services, and the like. | 2020-02-20 |
20200059552 | ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF - A method of controlling an electronic apparatus is provided. The method includes obtaining a name referring to a user of another electronic apparatus in a chat with the user of the other electronic apparatus using an artificial intelligence (AI) model trained by an AI algorithm while conducting the chat with the user of the other electronic apparatus using the electronic apparatus; and storing the obtained name in association with contact information of the user of the other electronic apparatus. At least some of the control method of the disclosure may use an AI model trained according to at least one of machine learning, neural network, or deep learning algorithm. | 2020-02-20 |