20th week of 2020 patent applcation highlights part 76 |
Patent application number | Title | Published |
20200153729 | OBSERVATION PLATFORM FOR USING STRUCTURED COMMUNICATIONS WITH CLOUD COMPUTING - In a method of using structured communications in an observation platform with cloud computing, a signal from a first communication device is received by a second communication device associated with a first computer system. The second computer system forwards the signal from the first computer system to a second computer system, wherein the second computer system is physically remote from the first computer system and connected with the first computer system via a network. The second computer system derives context information for the signal, the deriving based on a plurality of factors derived from an analysis of the signal, wherein the plurality of factors comprises a speech to text analysis of the signal, and wherein the second computer system is cloud based. The second computer system determines at least one destination for the signal based on the plurality of factors for the context information. | 2020-05-14 |
20200153730 | PACKET BROADCASTING MECHANISM FOR MESH INTERCONNECTED MULTI-COMPUTERS - A method is provided for packet broadcasting in a mesh-interconnected multi-computer network having a plurality of routers interconnected to a plurality of arbiters. The method includes live-lock free arbitering, by each of the plurality of arbiters, between two or more packet broadcast requests using a shared priority matrix, implemented by a binary matrix, that selects one of the two or more packet broadcast requests and includes a column for each of the plurality of routers, the shared priority matrix being shared amongst the plurality of arbiters and storing priority information determined from summing the matrix column values and relating to a correspondence between a plurality of packet broadcast requests, including the two or more packet broadcast requests, with respect to priorities assigned to each of the plurality of packet broadcast requests. Each of the columns of the shared priority matrix corresponds to a respective one of the routers. | 2020-05-14 |
20200153731 | PACKET BROADCASTING MECHANISM FOR MESH INTERCONNECTED MULTI-COMPUTERS - A system is provided for packet broadcasting in a mesh-interconnected multi-computer network having a plurality of routers. The system includes a plurality of arbiters, interconnected to each of the plurality of routers, configured to live-lock free arbiter between the two or more packet broadcast requests using a shared priority matrix, implemented by a binary matrix, that selects one of the two or more packet broadcast requests and includes a column for each of the plurality of routers. The shared priority matrix is shared amongst the plurality of arbiters and stores priority information determined from summing the matrix column values and relating to a correspondence between a plurality of packet broadcast requests, including the two or more packet broadcast requests, with respect to priorities assigned to each of the plurality of packet broadcast requests. Each of columns of the shared priority matrix corresponds to a respective one of the routers. | 2020-05-14 |
20200153732 | Method for Establishing Segment Routing for Ipv6 Tunnel - The present invention provides a method for establishing Segment Routing tunnel based on IPv6 data-plane by using a path computation element communication protocol (PCEP). The method includes generating, by a path computation element (PCE), a first PCEP message, wherein the first PCEP message comprises indicating information and segment identifier (SID); and wherein the indicating information indicates that the SID is an IPv6 prefix of a node in a tunnel. A first path computation client (PCC) receives a first PCEP message from a PCE and the first PCC establishes a SRv6 tunnel from the first PCC to a second PCC. | 2020-05-14 |
20200153733 | IS-IS EXTENSIONS FOR FLEXIBLE PATH STITCHING AND SELECTION FOR TRAFFIC TRANSITING SEGMENT ROUTING AND MPLS NETWORKS - A router operates in both a Segment Routing (SR) network portion and a Multiprotocol Label Switching (MPLS) network portion of a network that utilizes Intermediate System to Intermediate System (IS-IS). The router receives an IS-IS advertisement message originated by a mapping server that includes a sub-Type-length-value (sub-TLV) element that identifies a preferred type of path across the MPLS network portion for an identifiable set of traffic to be received by the router from the SR network portion. The router identifies, based at least in part upon the sub-TLV element, one path of a plurality of available paths across the MPLS network portion for the identifiable set of traffic, and configures its forwarding plane to utilize the identified one path for the identifiable set of traffic. The IS-IS advertisement message can be an IS-IS TLV such as a SID/Label Binding TLV | 2020-05-14 |
20200153734 | Signaling Among Entities of a Virtualized Packet Processing Apparatus Using In-Band Operations Data Included in Packets Being Processed - In one embodiment, in-band operations data included in packets being processed is used to signal among entities of a virtualized packet processing apparatus. Using in-band operations data provides insight on actual entities used in processing of the packet within the virtualized packet processing apparatus. The operations data in the packet is modified to signal a detected overload condition of an entity that participates in communicating the packet within the virtualized packet processing apparatus and/or applying a network service to the packet. An In-Situ Operations, Administration, and Maintenance (IOAM) header is used in one embodiment, with the IOAM header typically including a new Overload Flag to signal the detection of the overload condition. In response to the signaled overload condition, a load balancer is adjusted such that future packets are not distributed to the virtualized entity associated with the detected overload condition. | 2020-05-14 |
20200153735 | DATA LINK LAYER-BASED COMMUNICATION METHOD, DEVICE, AND SYSTEM - A method includes: a first network device generates a data link layer-based autonomic control plane (L2 ACP) packet, wherein the first network device is an autonomic device in the autonomic network; encapsulates, based on a frame at a data link layer, the L2 ACP packet, wherein the frame at the data link layer comprises a source data link layer address and a destination data link layer address, and the source data link layer address is a data link layer address of the first network device; and sends, according to the destination data link layer address, the L2 ACP packet encapsulated based on the frame at the data link layer to a second network device, wherein the second network device is also an autonomic device in the autonomic network, and the second network device is a neighboring device of the first network device. | 2020-05-14 |
20200153736 | MAPPING OF INTERNET PROTOCOL ADDRESSES IN A MULTI-CLOUD COMPUTING ENVIRONMENT - A method for interconnecting two or more virtual private networks in a hybrid multi-cloud computing environment. The method may include remapping a first virtual private network to a first Internet Protocol address range that does not overlap with a second Internet Protocol address range of a second virtual private network. The remapping may include assigning, to a first endpoint in the first virtual private network, a first Internet Protocol address that differs from a second Internet Protocol address of a second endpoint in the second virtual private network. Traffic between the first virtual private network, the second virtual private network, and/or a third virtual private network may be routed based at least on the first Internet Protocol address range and the second Internet Protocol address range. Related systems and articles of manufacture, including computer program products, are also provided. | 2020-05-14 |
20200153737 | RETURN-LINK ROUTING IN A HYBRID NETWORK - Embodiments provide techniques for providing return-link routing in a hybrid communications network that includes a number of different networks having different characteristics. User terminal routing systems (UTRSs) provide interfaces between local user networks and the multiple communications networks of the hybrid network. Each UTRS can include a routing table having stored mappings that are populated according to forward-link communications (implicitly or explicitly), each associating a respective one of a plurality of routing table entries with one of the communications networks. When a UTRS receives return-link data from its respective local user network, the received data indicates a destination node. The UTRS can determine which of the stored mappings corresponds to the destination node and can route the received return-link data over a selected one of the communications networks in accordance with the identified one of the mappings. | 2020-05-14 |
20200153738 | VIRTUAL DISPERSIVE NETWORKING SYSTEMS AND METHODS - A method for network communications from a first device to a second device includes communicating data from the first device to the second device by spawning a first virtual machine for a first network connection that virtualizes network capabilities of the electronic device, and using the virtualized network capabilities of the first virtual machine, transmitting a plurality of packets for communication to a first network address and port combination associated with the second device. The method further includes repeatedly changing to a respective another network address and port combination by repeatedly spawning a respective another virtual machine for a respective another network connection that virtualizes network capabilities of the electronic device, and using the virtualized network capabilities of the spawned respective another virtual machine, transmitting a plurality of packets for communication to the respective another network address and port combination associated with the second device. | 2020-05-14 |
20200153739 | Load balancing among network links using an efficient forwarding scheme - A network element includes multiple output ports and circuitry. The multiple output ports are configured to transmit packets over multiple respective network links of a communication network. The circuitry is configured to receive from the communication network, via one or more input ports of the network element, packets that are destined for transmission via the multiple output ports, to monitor multiple data-counts, each data-count corresponding to a respective output port, and is indicative of a respective data volume of the packets forwarded for transmission via the respective output port, to select for a given packet, based on the data-counts, an output port among the multiple output ports, and to forward the given packet for transmission via the selected output port. | 2020-05-14 |
20200153740 | UNIFIED NETWORKING SYSTEM AND DEVICE FOR HETEROGENEOUS MOBILE ENVIRONMENTS - Method for unified networking for a device in heterogeneous mobile environments includes maintaining and monitoring active network interfaces, managing the location of the device, managing network access security, enabling disruption tolerance support for applications, enabling service sharing and session mobility, managing system parameters for one or more active application sessions, managing storage functionality in one or more memory devices, and maintaining a mapping for one or more flows corresponding to the one or more active application sessions, maintaining one or more policies, and performing flow control decisions based upon the policies using a policy engine. The method can also include monitoring for network events, evaluating whether to perform a handover based upon policies, and providing seamless secure handovers in a heterogeneous mobile environment. A device, non-transitory computer-readable medium, and a system for unified networking are also provided. | 2020-05-14 |
20200153741 | MESSAGE TYPE MAPPING FOR PACKET TRAFFIC PRIORITIZATION - Techniques that enable user plane data to be carried by control plane messages and still be correctly recognized and prioritized as user plane data in a packet network are provided. A base station of cellular network receives a message from a user equipment (UE). The base station transmits a packet based on the received message over a packet network to a control plane component of the cellular network. When the UE data includes user plane data, the base station sets a differentiated services code point (DSCP) marking of the packet so the packet is prioritized as user plane data in the packet network. When the received message does not include user plane data, the base station sets the DSCP marking of the packet so the packet is prioritized as control plane data. | 2020-05-14 |
20200153742 | ABNORMAL FLOW DETECTION DEVICE AND ABNORMAL FLOW DETECTION METHOD THEREOF - An abnormal flow detection device and an abnormal flow detection method thereof are provided. The abnormal flow detection device analyses a plurality of packets captured during a time interval to obtain a plurality of flow features of each packet and selects at least one key flow feature from the flow features based on a dimensionality reduction algorithm. The abnormal flow detection device trains a bidirectional generative adversarial network (BiGAN) by taking the at least one key flow feature of each packet as an input of the BiGAN to build a flow recognition model for detecting abnormal flows. | 2020-05-14 |
20200153743 | DEEP PACKET INSPECTION INDICATION FOR A MOBILE CDN - Systems and techniques are disclosed to reduce workload on base stations in a mobile network when content delivery networks cache content inside the network. A user equipment sets a flag only with those packets on the uplink which include requests that should be routed to the cache server inside the mobile network. The base stations perform deep packet inspection of those packets where flags have been set and forward other packets on to the rest of the relevant backhaul of the mobile network. After deep packet inspection, the base stations either route the packet to the cache server via an established connection or propagate the flag in an extension header to another network node for routing to the cache server. The resulting content is returned to the UE with the source address of the originally intended destination instead of the cache server, rendering the process transparent to the end user. | 2020-05-14 |
20200153744 | AUTOMATED DATA FLOWS USING FLOW-BASED DATA PROCESSOR BLOCKS - Systems and methods for a flow-based data processing can begin with receiving a selection of a plurality of data processor blocks and a configuration mapping corresponding to the inputs and outputs of each data processor block. At a first compute node associated with a selected data source, an automated data flow can be initiated, wherein the automated data flow is generated from the configuration mapping and comprises a continuous sequence of one or more of the selected plurality of data processor blocks. Data from the selected data source is ingested into the automated data flow and is transformed by the continuous sequence of data processor blocks. The transformed ingested data is transmitted from the automated data flow to a second compute node associated with a selected data destination, via a data accelerator. | 2020-05-14 |
20200153745 | Route Processing Method, Device, and System - A route processing method includes obtaining, by a first network device, a flow effective time parameter and a route related to the flow effective time parameter, processing, by the first network device in the specified time interval, service traffic corresponding to the route related to the flow effective time parameter, generating a route control message, where the route control message carries the flow effective time parameter and the route, and sending, by the first network device, the route control message to a second network device. | 2020-05-14 |
20200153746 | METHOD, DEVICE AND SYSTEM FOR DISCARDING DATA PACKET - A method for discarding a data packet includes: receiving an instruction message sent by a base station, the instruction message instructing start of monitoring transmission timeout of a data packet in an SDAP layer; when detecting that a target session is initiated, starting, according to the instruction message, a packet discarding timer corresponding to each data packet in a data stream of the target session in the SDAP layer; and when the packet discarding timer expires and it is detected that the data packet corresponding to the packet discarding timer fails to be transmitted, discarding the data packet corresponding to the packet discarding timer. | 2020-05-14 |
20200153747 | COMMUNICATION APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM - If a communication apparatus is to transmit data to another communication apparatus and communication via a communication unit included in the other communication apparatus is not performable, whether or not to transmit a frame for causing a transition to a state where the communication via the communication unit included in the other communication apparatus is performable is selected based on an amount of data accumulated in a transmission queue in which the data is stored. | 2020-05-14 |
20200153748 | LAYER 3 FAIR RATE CONGESTION CONTROL NOTIFICATION - A network device, including ports that receive/send data packets from/to a network, receives data packets of multiple traffic flows, and populates a queue in memory with the data packets. The network device periodically updates a fair rate for the multiple traffic flows to converge a length of the queue to a reference length. Specifically, the network device determines a length of the queue, a change in the length from a previous length, and a deviation of the length from the reference length. The network device detects an increase in the change in length above a threshold that is based on the reference length. If the increase is not above the threshold, the network device derives the fair rate from a previous fair rate using proportional integral control. The network device identifies elephant flows among the multiple traffic flows, and sends the fair rate to a source of each elephant flow. | 2020-05-14 |
20200153749 | BIASED SELECTION OF DEDICATED PHYSICAL CONNECTIONS TO PROVIDER NETWORK - A connectivity coordinator may receive a request for a dedicated physical connection between a provider network and a client network. In response, the connectivity coordinator may determine a capacity for each connection capacity group available to accept the dedicated physical connection. The connectivity coordinator may use the determined capacities for each available connection capacity group to determine bias response information for each connection capacity group based on the determined capacities and a capacity bias model. The connectivity coordinator may provide the determined bias response information to the client as part of a response to the connectivity request to influence the client to select to connect to a connection capacity group that has more physical ports available to accept the dedicated physical connection than other connection capacity groups that have less ports available to accept the dedicated physical connection. | 2020-05-14 |
20200153750 | ENTERPRISE BUSINESS MOBILE DASHBOARD - Aspects of the subject disclosure may include, for example, a server, comprising a processing system including a processor and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including receiving a request from a mobile device of a user having an account to access a first mobile application of a plurality of mobile applications, wherein each of the plurality of mobile applications is embedded into a single bundled application, and wherein the single bundled application is downloaded onto the mobile device, determining whether the mobile device has permissions for access to the first mobile application and whether the mobile device is executing the single bundled application, and sending permissions data to the mobile device that enables the mobile device via the account to access the first mobile application. Other embodiments are disclosed. | 2020-05-14 |
20200153751 | MONITORING DATA STREAMS AND SCALING COMPUTING RESOURCES BASED ON THE DATA STREAMS - A device may determine values for a set of metrics related to a set of event messages being processed, by a set of server devices, from a set of queues. The values for the set of metrics may be determined as the set of event messages are being processed. Each of the set of queues may be associated with a different subset of event messages and a different subset of server devices. The device may determine to scale a quantity of server devices included in the set of server devices. The quantity of server devices may be scaled to increase the quantity of server devices or to decrease the quantity of server devices. The device may provide a set of instructions to scale the quantity of server devices. The device may perform an action to facilitate accessibility of data related to processing of the set of event messages. | 2020-05-14 |
20200153752 | CLOUD-DRIVEN HYBRID DATA FLOW AND COLLECTION - Described herein are systems, devices, methods, computer-readable media, techniques, and methodologies for cloud-to-edge data flow migration. More specifically, example embodiments relate to migrating at least a portion of cloud-based data processing functionality from a cloud environment to network edge environment. The functionality can be migrated to anywhere along the network edge. Input data received or generated at a network edge device may be classified according to one or more classification criteria. At least a portion of cloud-based data processing functionality may then be selected for migration to the network edge based at least in part on the classified input data and/or one or more network characteristics. After migration, at least a portion of the input data may be processed by the migrated functionality. The input data processed at the network edge may then be sent to the cloud environment for additional processing by cloud-based data processing functionality. | 2020-05-14 |
20200153753 | ENHANCED REAL-TIME LINKING METHODS AND SYSTEMS - Systems and methods for enabling links between various devices is provided. The systems and methods may include a platform that enables different devices to access spatial models of a resource. The platform may enable the different devices to define and/or modify assignment conditions for access rights to resources. Further, the platform may enable definition of assignment conditions before or after the access rights are available for assignment. | 2020-05-14 |
20200153754 | TOKEN-BASED BILLING MODEL FOR SERVER-SIDE RENDERING SERVICE - A token-based billing model for delivering server-side rendered applications to remote users. A token represents a right to access a server-side rendered application. Each remote user is associated with one or more tokens. When a given token expires, the set of tokens associated with a user is decremented. The rate at which tokens expire are modulated based on aggregate load across the resources of the server-side rendered application provider, as well as the individual loads attributable to each of the users. | 2020-05-14 |
20200153755 | DYNAMICALLY DOCKING AN UNMANNED AERIAL VEHICLE - A method for docking an unmanned aerial vehicle (“UAV”) equipped with a wireless communications system. The method includes coupling the UAV to a docking device that is configured to provide power and data communication to the UAV via a physical interface. The method further includes receiving, at a docking device controller, an identity of the UAV, and determining, based on the received identity of the UAV, an organization associated with the UAV. The method also includes accessing, via the docking device controller, a collaborative operating profile associated with the determined organization and the identity of the UAV. The method further includes providing access to one or more resources associated with the docking station based on the collaborative operating profile. | 2020-05-14 |
20200153756 | STREAMING PLATFORM FLOW AND ARCHITECTURE - A system includes a host system and an integrated circuit coupled to the host system through a communication interface. The integrated circuit is configured for hardware acceleration. The integrated circuit includes a direct memory access circuit coupled to the communication interface, a kernel circuit, and a stream traffic manager circuit coupled to the direct memory access circuit and the kernel circuit. The stream traffic manager circuit is configured to control data streams exchanged between the host system and the kernel circuit. | 2020-05-14 |
20200153757 | Routing Flits in a Network-on-Chip Based on Operating States of Routers - A system is described that includes an integrated circuit chip having a network-on-chip. The network-on-chip includes multiple routers arranged in a topology and a separate communication link coupled between each router and each of one or more neighboring routers of that router among the multiple routers in the topology. The integrated circuit chip also includes multiple nodes, each node coupled to a router of the multiple routers. When operating, a given router of the multiple routers keeps a record of operating states of some or all of the multiple routers and corresponding communication links. The given router then routes flits to destination nodes via one or more other routers of the multiple routers based at least in part on the operating states of the some or all of the multiple routers and the corresponding communication links. | 2020-05-14 |
20200153758 | EFFICIENT NETWORK LINK STATUS HANDLING - A multi-port status message maintains network connections between virtual ports of two network elements. The network elements negotiate the network connections between first virtual ports on a first network element and corresponding second virtual ports on a second network element. The first network element generates a multi-port status message listing the first virtual ports that are actively connected to the corresponding second virtual ports. The first network element sends the multi-port status message to the second network element to maintain the network connections. | 2020-05-14 |
20200153759 | EGRESS FLOW MIRRORING IN A NETWORK DEVICE - At least a payload of a packet that is received by a network device is stored in a packet memory. The packet is processed at least to determine at least one egress port via which the packet is to be transmitted, modify a header of the packet to generate a modified header, and determine, based at least in part on the modified header, whether the packet is to be transmitted or to be discarded by the network device. In response to determining that the packet is to be transmitted, the at least the payload of the packet is retrieved from the packet memory, a transmit packet is generated at least by combining the at least the payload of the packet with the modified header, and the transmit packet is transmitted via the determined at least one egress port of the network device. | 2020-05-14 |
20200153760 | RESPONSE CENTER - A method of communicating a response is disclosed, the method comprising the steps of receiving, at a response center, a message having at least one of a content characteristic and a metadata characteristic, the message associated with an author having an author characteristic; determining a response categorization data based on at least one of the content characteristic, the metadata characteristic, and the author characteristic; determining a first response, the first response associated with the response categorization data; and communicating the first response to the author. | 2020-05-14 |
20200153761 | SYSTEMS AND METHODS FOR CONTROLLING SECURE PERSISTENT ELECTRONIC COMMUNICATION ACCOUNT SERVICING WITH AN INTELLIGENT ASSISTANT - The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is provided that includes receiving, at an enrollment web portal, enrollment data including: enrollment credentials identifying a user for authentication, a phone number of a mobile device associated with the user, and consent by the user to persistently interact with an account servicing system via SMS texting. The method includes: processing the received enrollment data, authenticating the user responsive to processing the received enrollment data, storing the phone number of the mobile device associated with the user in a phone number data storage, and generating, responsive to the authenticating, a revocable token for persistent access to a natural dialogue module via a SMS texting gateway for the mobile device identified by the phone number. | 2020-05-14 |
20200153762 | PUBLISHER AND SHARE ACTION INTEGRATION IN A USER INTERFACE FOR AUTOMATED MESSAGING - Disclosed are some implementations of systems, apparatus, methods and computer program products for publisher and share action integration in a user interface (UI) for automated messaging. In some implementations, information is displayed in a first component and in a second component in a UI on a display. The first component is a publisher configured for composing and sharing messages on different communication channels using different share actions. The second component includes links to data items. When one of the data items is selected, a set of share actions for sharing the selected item using the publisher can be identified and displayed. When one of the displayed share actions is selected, it can be determined that the selected share action is applicable to one of the communication channels. A reference to the selected item can be provided in a message being composed in the publisher for sharing on the one communication channel. | 2020-05-14 |
20200153763 | COGNITIVE VIRTUAL DETECTOR - Aspects of the present invention disclose a method, computer program product, and system for detecting and mitigating adversarial virtual interactions. The method includes one or more processors initiating a mitigation protocol on interactions between the user and the virtual agent, wherein the mitigation protocol is based on the actions performed by the user while interacting with the virtual agent. The method further includes one or more processors, in response to initiating the mitigation protocol on interactions between the user and the virtual agent, generating a lower fidelity response from the virtual agent to the user, wherein the lower fidelity response is a progressive dilution of the precision of language of an original response from the virtual agent to the user prior to the user exceeding the risk level threshold. | 2020-05-14 |
20200153764 | ENSURING THAT ALL USERS OF A GROUP MESSAGE RECEIVE A RESPONSE TO THE GROUP MESSAGE - A method, system and computer program product for ensuring that all users of a group message receive a response to the group message. The content of a detected group message is analyzed to determine if the group message requires a response and, if so, to assess the urgency of the response. If the analyzed group message requires a response, then a determination is made as to whether a response was received by all or a subset of the users of the group message (sender and recipients of the group message) within a threshold amount of time based on the urgency of the response. If the response was only received by a subset of the users of the group message, then the response is broadcasted to the other users of the group message who had not previously received the response if no confidential information is detected in the response. | 2020-05-14 |
20200153765 | CONTACT INFORMATION EXTRACTION AND IDENTIFICATION - A database server may identify mentioned names in a body of a message and extract the names using name identification heuristics and algorithms. The service retrieves or utilizes a distributed connection graph to identify contacts associated with the parties to the conversation that may match or be similar to the mentioned name. Contacts may be scored based on similarities between the extracted name the names associated with nodes of the graph, as well as other factors. The highest scoring contact may be surfaced or displayed to one or more of the parties to the communication message. | 2020-05-14 |
20200153766 | REAL-TIME INTERACTIVE COMMUNICATIONS SYSTEM - Described herein is a real-time communications system and a method of its operation. Structured datasets can be used to coordinate events. The data within a structured dataset may change dynamically (i.e., in real-time), and as such, can provide up-to-date information to a user. One or more associations can be used for making changes to the structured dataset(s) to facilitate information gathering in an organized fashion. Examples of the disclosure can further include using interactive elements embedded in a communication to allow a user to communicate information in an easier, more streamlined manner. The system further includes additional features to enhance the communications. These additional features include automatically updating members of a group, allowing the host (or the guest) the ability to send a broadcast message, allowing a guest the ability to create an interactive element embedded into a communication, and the ability to communicate with a system-allocated group. | 2020-05-14 |
20200153767 | MANAGING CUSTOMER RELATIONSHIP USING MULTIPLE CHAT SERVERS DESIGNED TO INTERFACE WITH SERVICE APPLICATIONS - An interfacing unit provided according to an aspect of the present disclosure facilitates an user to be serviced based on multiple chat servers in a single chat session. In an embodiment, the interfacing unit receives a request on a chat session for a chat conversation from a user, identifies a first suitable chat server for generating responses for the chat conversation, and forwards a first sequence of inputs received from the end user to the first suitable chat server. The corresponding responses are forwarded back to the end user. The interfacing unit then forwards a received second sequence of inputs to a second chat server to generate a second sequence of messages corresponding to the second sequence of inputs. The interfacing unit forwards the second sequence of messages as respective responses to the second sequence of inputs. | 2020-05-14 |
20200153768 | APPARATUS AND METHOD FOR MESSAGE IMAGE REFERENCE MANAGEMENT - A method for referencing an image comprises the steps of displaying the image on a first display device, receiving selection of at least a portion of the image via the first display device, receiving content, wherein the content is associated with and digitally linked to at least the portion of the image for which selection was received, transmitting the image as part of a message included in a continuous stream of messages from the first display device to a second display device, displaying at least a portion of the message on the second display device as part of the continuous stream of messages, and displaying the content on the second display device and indicating that the content is associated with the specific portion of the image. | 2020-05-14 |
20200153769 | Communication Method and Apparatus - Communication method and apparatus are provided. The method may include obtaining comment information for approval events; and sending a communication session message related to the comment information to an associated user of the approval event through a communication session with the associated user. | 2020-05-14 |
20200153770 | INTEROPERABLE CLINICAL DOCUMENT-EXCHANGE SYSTEM - A method of exchanging messages between users over a network includes receiving a registration request from an organization and provisioning an organizational sub-domain, verifying the registration request according to requirements of a first protocol and provisioning a first user address that is part of the organizational sub-domain, and sending a message from the first user address to a second user address according to the first protocol. | 2020-05-14 |
20200153771 | E-MAIL TESTING AND RENDERING PLATFORM - A method for automatically modifying hyper-text markup language (HMTL) code of an e-mail within an email pre-deployment platform comprises receiving previously-created e-mail content comprising a plurality of e-mail content types, each of the e-mail content types written in HMTL code, automatically detecting, by parsing the received HTML code, one or more deficiencies in the e-mail content, identifying the one or more deficiencies in the HTML of the e-mail content types for a user by presenting a natural language explanation of the one or more deficiencies on the user interface, guiding a user of the platform to rectify the one or more deficiencies in the e-mail content by using one or more user interface tools for rectifying the one or more deficiencies; and automatically editing the HTML code based on the user's use of the one or more user interface tools. | 2020-05-14 |
20200153772 | POINT IN TIME EXPRESSION OF EMOTION DATA GATHERED FROM A CHAT SESSION - A method rewrites a text message according to an emotional state of a sender of the text message while originally writing the text message. An electronic chat session monitoring device intercepts a current text message from an electronic chat session, where the current text message is generated by an initial sender at a sending device. The electronic chat session monitoring device receives a current photo, of the initial sender of the current text message, that depicts the initial sender while generating the current text message. The electronic chat session monitoring device determines that the emotional state of the initial sender, as evidenced by the current photo, is incongruous with a content of the current text message, and rewrites text in the current text message to comport with the emotional state of the initial sender while generating the current text message. | 2020-05-14 |
20200153773 | SHORT MESSAGE COMMUNICATION WITHIN A MOBILE GRAPHICAL MAP - In an embodiment, a computer-implemented process is programmed or configured to allow a first computing device to generate and send enriched pin data to a geographical messaging system. The geographical messaging system may then broadcast the enriched pin data to a second computing device belonging, for instance, to a team member in the same geographical region as the first computing device. The second computing device may then use the enriched pin data to display, on a geographical map, a map pin that corresponds to the enriched pin data for a selected map pin type. | 2020-05-14 |
20200153774 | METHOD AND SYSTEM FOR DISPLAYING EMAIL MESSAGES - A computing device and method for displaying content such as email messages in a user interface including email message cards. Email messages in an email mailbox are accessed. The email messages are configured into a graphical display format, where the display format includes email message cards, each email message card representing a respective email message in the mailbox and including a portion of email contents of the email message. The graphical display format is communicated to a display device for display of the configured message cards. | 2020-05-14 |
20200153775 | NOVEL COMMUNICATION AND MESSAGING SYSTEM - A client device displays a user interface, which includes a menu item associated with forced reminders. In response to a user selecting the menu item, the client device displays a forced-reminder user interface, which includes a content display area configured to display one or more forced-reminder messages. | 2020-05-14 |
20200153776 | CONTEXT AND TIME PREDICTION BASED MESSAGE RECOMMENDATION SYSTEM - A messaging system configured for recommending messages is provided. The messaging system machine trains a prediction model associated with a user based on past review and response times for past messages. During runtime, the messaging system generates a predicted user action time for each new message based on the prediction model and tags each new message with a corresponding predicted user action time. Based on an amount of available time, the predicted user action time for each new message, and importance for each new message, the messaging system determines a recommended set of new messages that the user should read and respond to during the available time, whereby a sum of the predicted user action time of the recommended set of new messages is equal to or less than the available time. The recommended set of new messages are visually distinguished for the user. | 2020-05-14 |
20200153777 | DEEP LEARNING-BASED SOCIAL MASHUP LOGIC IMPLEMENTATION SYSTEM AND METHOD FOR REDUCING ADVERSE EFFECTS OF SOCIAL NETWORKING SERVICE - A deep learning-based social mashup logic implementation system, includes a user interface server configured to store data about a user's personal information, login information, activity information, and the like of web- and mobile-based interfaces, an external link server configured to store data about activities, a situation recognition server configured to sense mental and environmental changes of the user and store data related to the mental and environmental changes of the user, an analysis server configured to generate and store a relationship index obtained by numerically calculating a relationship between the user and the other user with an artificial neural network, and a management server configured to adjust a level of the other user's access to the user's posts and a level of exposing content uploaded by the user. | 2020-05-14 |
20200153778 | COMBINING UPDATES OF A SOCIAL NETWORK FEED - Disclosed are examples of systems, apparatus, methods and computer program products for combining updates of a social network feed. In some implementations, a feed of a social networking system can be configured to share feed items associated with an enterprise record. The feed items can include a first update associated with a first user. A first request to share a comment on the first update can be processed. A second request to share a first post in a feed can be processed. The first post can be related to the first update based on a first attribute conforming to a second attribute. A combined update can be generated based on the first post being related to the first update. The combined update can be displayed in a feed. | 2020-05-14 |
20200153779 | Electronic Messaging Systems - A computer system for facilitating communications between users is configured for: (A) receiving, from a first user, one or more user watch area attributes; (B) using the one or more user watch area attributes to define a watch area; (C) receiving, from a second user, a message associated with a geographical location; (D) determining whether the geographical location is located within the user watch area; (E) at least partially in response to determining that the geographical location is located within the user watch area, subscribing the first user to a thread of messages that includes the message; and (F) dynamically adjusting a shape of the user watch area based, at least in part, on a factor selected from a group consisting of: (1) a number of message postings within the user watch area; and (2) a population density of an area that is within the user watch area. | 2020-05-14 |
20200153780 | Delaying a social media post - A social media application, platform, or computer system facilitating same presents a user with an option to post information later, as opposed to immediately. If the user selects to post later, the user may select a time, enter a time, or select a random time for the post to occur. The user may select a range from which the randomly selected posting time occurs. The computer system may be a user device or a server computer device, either of which may determine a random value for use in causing the information-to-be-posted to post randomly within the selected time range. The computer system may analyze multiple posts from multiple source and append information-to-be-posted to postings of others that contain content related to the information-to-be-posted. | 2020-05-14 |
20200153781 | Methods, Systems, and Apparatus for Text to Persistent Messaging - A chat-based persistent messaging platform that can seamlessly convert messages from different modalities (e.g., email clients and text message clients) into persistent messages and vice versa is described herein. The platform can include a parsing processor to convert messages into standard format data. A message classifier can process the standard format data into different subcomponents. These subcomponents can be translated into persistent messaging content via one or more content processing engines. The persistent messaging content can be converted into a persistent message via the parsing processor. The message classifier can also add messages into a persistent thread so that message history between two or more users can be maintained in perpetuity. | 2020-05-14 |
20200153782 | CHECKOUT CHASSIS CHAT PLATFORM - A computerized method for integrating message-based services with external execution environments includes receiving from a first external execution environment a request to access message-based services of a messaging software. A processor determines whether the first external execution environment includes a pre-existing relationship with the messaging software. If no, the processor requests access to a second external execution environment on behalf of the first external execution environment. The processor receives a response from the second external execution environment granting the access; and the processor grants the request from the first external execution environment to access the message-based services in the messaging service while integrating services from the second external execution environment to the messaging software. If yes, the processor identifies parameters associated with the pre-existing relationship and grants the request from the first external execution environment. | 2020-05-14 |
20200153783 | NETWORK SWITCH - A network switch includes: a table record portion that records an address solution table that records multiple address information; an information addition portion that adds new address information for a new communication device based on the address solution data to the address information table; a relay portion that relays data other than the address solution data; and a rewrite portion that rewrites at least one of the address solution table or propriety information in accordance with an external instruction output from an external device. The address solution table includes the propriety information indicating availability propriety of the address information for each of the multiple address information. The relay portion relays the data by utilizing the address information set to be utilizable in the propriety information. | 2020-05-14 |
20200153784 | ADDRESS RESOLUTION IN VIRTUAL EXTENSIBLE NETWORKS - A network element is provided. The network element includes a tunneling endpoint having a virtual address. The tunneling endpoint is configured to receive an address resolution reply that has a destination MAC (media access control) address matching the virtual address of the tunneling endpoint and is from a network device in a first network that includes the tunneling endpoint. The tunneling endpoint is further configured to send the address resolution reply via an interconnect to a further tunneling endpoint in a further network. A method for address resolution in virtual extensible networks is also provided. | 2020-05-14 |
20200153785 | OBSCURED ROUTING - Systems and techniques are provided for obscured routing. A computing device may send stacks of identifiers to neighbor computing devices in a network. Each stack of identifiers may include a unique identifier for the neighbor computing device to which it is sent. The computing device may send a notification identifying a destination computing device to the neighbor computing devices. The computing device may receive stacks of identifiers from the neighbor computing devices. The received stacks of identifiers may include completed routes to the destination computing device. Each completed route may be specified by unique identifiers added to the stack of identifiers by computing devices in the network. A unique identifier in each stack of identifiers may not be resolvable to an address by the computing device. The computing device may send a message a neighbor computing device based on a unique identifier in a chosen stack of identifiers. | 2020-05-14 |
20200153786 | MAPPING DATABASE SYSTEM FOR USE WITH CONTENT CHUNKS AND METHODS OF ROUTING TO CONTENT IN AN IP NETWORK - A method of retrieving content in an Internet Protocol version 6 (IPv6) network is described, including receiving from a network node a lookup request associated with content at a server comprising a mapping database. A response is generated including an IPv6 address, the IPv6 address comprising a content identifier and an indication of a location of the content. The response is transmitted to the network node. A method including receiving at a mapping database a lookup request associated with content and returning a text record comprising an ordered list of addresses for use in segment routing to the content is also described. | 2020-05-14 |
20200153787 | METHODS FOR MAPPING IP ADDRESSES AND DOMAINS TO ORGANIZATIONS USING USER ACTIVITY DATA - A computer-implemented method is provided for mapping IP addresses and domain names to organizations. The method includes receiving, by a mapping system from an data provider, a dataset related to a plurality of users of the data provider. The dataset includes (a) an IP address for a user device of each user of the plurality of users, and (b) a domain name for a user account of each user of the plurality of users; enriching, by an analytics engine of the mapping system, the received dataset with enrichment data from an enrichment source; receiving, by the analytics engine from a storage medium, historical data relevant to the enriched dataset; and mapping, by the analytics engine, (i) the IP address and/or (ii) the domain name of each user of a portion of the plurality of users to an organization based on the enriched dataset and the historical data. | 2020-05-14 |
20200153788 | INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing device includes a processor that performs a process of acquiring a first setting value that relates to a network environment and that is previously designated by a user and storing the first setting value in a memory in response to a given instruction; and a controller that, when the processor has acquired the first setting value, performs control of acquiring a second setting value that differs from the first setting value and that relates to the network environment, and giving the processor an instruction that relates to storage of the first setting value and the second setting value in the memory. | 2020-05-14 |
20200153789 | CONFIGURATION OF AN M2M DEVICE - There is provided mechanisms for configuring a message brokering service address in an M2M device. A method is performed by a gateway. The method comprises sending a request to a DHCP server for configuration. The method comprises receiving a response from the DHCP server comprising at least address information assigned to the gateway. The method comprises receiving an MQTT_BROKER_URI representing the message brokering service address from a node. | 2020-05-14 |
20200153790 | TRUSTWORTHINESS-VERIFYING DNS SERVER FOR NAME RESOLUTION - A request is received at a local domain name system server (LDNS)from a client application to resolve a domain name. Responsive to the request a WHOIS information corresponding to the domain name is obtained, using which an age of registration of the domain name and a first weighted value based on the age are computed at the LDNS. A host associated with the domain name is accessed to determine whether a type of a service is configured at the host. A second weighted value is computed based on the configuration of the type of the service. A weighted score is computed using the first weighted value and the second weighted value. An action is selected according to the weighted score. The action is applied to a network component in a network where the client application is executing, to control a manner in which the client application communicates with the host. | 2020-05-14 |
20200153791 | SETTING UP NETWORK - An image forming apparatus includes: a network interface configured to set up a network for communication with an application; and a controller configured to set up a network connection with the application by using the network interface, wherein the controller is further configured to set up the network connection with the application by using a port mapping table including network connection information according to a port number of the application. | 2020-05-14 |
20200153792 | AUTHENTICATING TO A HYBRID CLOUD USING INTRANET CONNECTIVITY AS SILENT AUTHENTICATION FACTOR - A technique for performing authentication to a hybrid-cloud service includes selectively applying varying authentication requirements based on whether a client device can be confirmed to be connected to a private intranet. The technique includes operating a set of local agents on one or more computing machines on the intranet. When a client device requests access to the hybrid-cloud service, the client device attempts to contact one or more of the local agents. If the client device succeeds in contacting a local agent, then the client device is confirmed to be connected to the private intranet and receives relatively trusting treatment during authentication. However, if the client device fails to contact at least one local agent, the client device is not confirmed to be connected to the private intranet and receives relatively less trusting treatment. | 2020-05-14 |
20200153793 | SECURITY GATEWAY FOR HIGH SECURITY BLOCKCHAIN SYSTEMS - A system for providing security blockchain systems where at least some users are on insecure networks is disclosed. The system includes a security gateway that inspects requests for compliance using a rules engine according to a plurality of rules and passes compliant requests to their respective intended destinations. Compliance inspection includes at least checking credentials of a sender of each request. A transaction resulting from a request is blocked if it would result in an asset transfer to a non-whitelisted address on an insecure network. | 2020-05-14 |
20200153794 | Database firewall for use by an application using a database connection pool - An application server environment that uses connection pooling is augmented to include a database access control system having a database firewall. When the database firewall detects a security violation with respect to a request received via a pooled connection, the firewall skips over (i.e. do not forward) the violating request and instead creates an artificial error database protocol packet corresponding to the application request. The database firewall then sends the error database protocol packet as a response back to the application, using the pool connection. The application receives the database error as a response to the security violating request, and it responds by releasing the connection of the policy violation database user. By releasing the pool connection is this manner, the performance of other applications (or other clients) using the connection pool is not impacted. Preferably, the error packets include no sensitive information. | 2020-05-14 |
20200153795 | Rule Swapping in a Packet Network - In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set. | 2020-05-14 |
20200153796 | EMERGENCY COMMUNICATION MANAGER FOR INTERNET OF THINGS TECHNOLOGIES - According to one embodiment, a method, computer system, and computer program product for managing electronic devices connected to a communications channel is provided. The present invention may include disabling at least one communication channel available at an emergency location in response to receiving a trigger signal from an electronic device, connecting electronic devices to a virtual private network (VPN) established in response to the disabling, and communicating messages pertaining to an emergency situation to the mobile devices of users logged in to the VPN network. | 2020-05-14 |
20200153797 | Secure Use of Dual Networks - The proposed technology relates to a method carried out by a computer system comprising a computer networking hardware for communicating in a first network and in a second network. The method comprises: emulating a first system virtual machine, and emulating a second system virtual machine. The first system virtual machine provides a first virtual platform that supports the execution of a complete first operating system, and the first system virtual machine is configured to communicate in the first network. The second system virtual machine provides a second virtual platform that supports the execution of complete second operating system, and the second system virtual machine is configured to communicate in the second network. | 2020-05-14 |
20200153798 | CENTRALIZED ACCESS TO DATA REPOSITORY FROM A MULTI-CLOUD COMPUTING ENVIRONMENT - A method for accessing a web-based repository service from a cloud platform is provided. The method may include receiving, at a gateway controller, a first request from an endpoint to access the web-based repository service. Upon successfully verifying the first request, a redirect request to a reverse proxy at the gateway controller may be returned to the endpoint. The redirect request may include a cryptographic signature and the first request. The reverse proxy may respond to the redirect request from the endpoint by accessing, on behalf of the endpoint, the web-based repository service to store and/or retrieve data. The web-based repository service may be accessed by sending, to the web-based repository service, an encrypted second request corresponding to the first request. Related systems and articles of manufacture, including computer program products, are also provided. | 2020-05-14 |
20200153799 | NETWORK SECURITY PROCESSING - A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource and a duplicate of request for the resource are forwarded to a first proxy server and a second proxy server, respectively. A first output including the received request, and a second output including the duplicate of the received request, are received from first proxy server and the second proxy server, respectively. A determination is made that the first output and the second output differ and in response, a first alarm is generated and transmission to the web server of the received request and the duplicate of the received request is blocked. | 2020-05-14 |
20200153800 | SENSOR NODES AND HOST FORMING A TIERED ECOSYSTEM THAT USES PUBLIC AND PRIVATE DATA FOR DUPLICATION - One or more networks each include a plurality of sensor nodes operable to communicate public data with each other. Each of the plurality of sensor nodes is operable to gather sensor node data and store the sensor node data locally on the sensor node. Duplicate portions of the sensor node data are distributed to the public data of others of the plurality of sensor nodes via the public data paths for backup storage. The system includes a host that is coupled to individually communicate private data with each of the plurality of sensor nodes. Each of the sensor nodes protects the private data from others of the sensor nodes using distributed key management to ensure distributed encryption. | 2020-05-14 |
20200153801 | SYSTEM AND METHOD FOR INFORMATION PROTECTION - A computer-implemented method for information protection comprises: committing a transaction amount of a transaction with a first commitment scheme to obtain a transaction commitment value, committing a change of the transaction with a second commitment scheme to obtain a change commitment value, the first commitment scheme comprising a transaction blinding factor, and the second commitment scheme comprising a change blinding factor; encrypting a first combination of the change blinding factor and the change with a first key; transmitting the transaction blinding factor, the transaction amount, and the transaction commitment value to a recipient node associated with a recipient for the recipient node to verify the transaction; in response to that the recipient successfully verifies the transaction, obtaining an encrypted second combination of the transaction blinding factor and the transaction amount encrypted with a second key. | 2020-05-14 |
20200153802 | Encrypted Content with Dynamic Key for Content Enrichment - The invention relates to techniques for content encryption with dynamic keys over encrypted protocols (P), like SSL/TLS. The method comprises a step (S | 2020-05-14 |
20200153803 | CRYPTOGRAPHIC DATASHARE CONTROL FOR BLOCKCHAIN - A system includes circuitry for cryptographic data share controls for distributed ledger technology based data constructs. The system may support placement of compute data on to a distributed ledger technology based data construct. The compute data may have multiple layers of encryption to support permissions and coordination of processing operations for application to the compute data. The multiple layers of encryption may include a homomorphic layer to allow sharing of the compute data for processing by a compute party without divulging the content of the compute data with the compute party. While in the homomorphically encrypted form, the homomorphic compute data supports the application of processing operations while maintaining the secrecy of the underlying data. | 2020-05-14 |
20200153804 | CRYPTOGRAPHY USING MULTI-FACTOR KEY SYSTEM AND FINITE STATE MACHINE - A process receives a specification of a finite-state machine and an encrypted language element of a language over an input alphabet for the finite-state machine. The received encrypted language element is encrypted with a selected public key of a plurality of public keys. The process decrypts the encrypted language element using each private key of a plurality of private keys corresponding to the public keys. The decrypting provides a plurality of decrypted language elements and the process applies each decrypted language element to the finite-state machine. The process identifies a decrypted language element that that is accepted by the finite-state machine. The process identifies a private key, of the private keys, used in the decrypting that provided the decrypted language element identified as being accepted by the finite-state machine. The process receives from the message sender an encrypted message, and uses the identified private key in decrypting the encrypted message. | 2020-05-14 |
20200153805 | Method and Apparatus for Inferring ABR Video Streaming Behavior from encrypted traffic - Aspects of the subject disclosure may include, for example, a method in which a processing system parses a network trace to collect packet information for an encrypted adaptive bite rate (ABR) video stream encoded into a plurality of tracks; detects request packets corresponding to a sequence of requests for video segments to be downloaded at a network client; and determines a traffic volume downloaded at the network client to obtain a sequence of traffic volumes. The processing system identifies, for each of the sequence of traffic volumes, a set of candidate segments each having a size meeting a size-matching criterion; selects a segment from the set of candidate segments to determine a segment sequence meeting an index-matching criterion; and infers characteristics of the sequence of traffic volumes based on the segment sequence. Other embodiments are disclosed. | 2020-05-14 |
20200153806 | AUTHENTICATION AND AUTHORIZATION IN PROXIMITY BASED SERVICE COMMUNICATION - A method of performing authentication and authorization in Proximity based Service (ProSe) communication by a requesting device which sends a request of a communication and a receiving device which receives the request from the requesting device, the method including deriving session keys Kpc and Kpi from an unique key Kp at the requesting and receiving devices, using the session keys Kpc and Kpi for ProSe communication setup and direct communication between the requesting and receiving devices, starting the direct communication with the requesting and receiving devices. The key Kpc is confidentiality key and the key Kpi is integrity protection key. | 2020-05-14 |
20200153807 | RENDERING APPARATUS IDENTITIES - A method for registering the identity of a rendering apparatus, the method comprising generating a passphrase using a processor of the rendering apparatus, attesting to the validity of the passphrase at user equipment or submitting the passphrase to the user equipment, encrypting a rendering apparatus identity using a cryptographic session key agreed on the basis of the passphrase, and transferring the rendering apparatus identity from the user equipment to a user apparatus | 2020-05-14 |
20200153808 | Method and System for an Efficient Shared-Derived Secret Provisioning Mechanism - Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments of this mechanism use a trusted third-party topology, but only a single instance of a public-private key exchange is required for initialization. Embodiments of the system and methods are secure and any of the derived secret keys are completely renewable in untrusted environments without any reliance on asymmetric cryptography. The derived secrets exhibit zero knowledge attributes and the associated zero knowledge proofs are open and available for review. Embodiments of systems and methods can be implemented in a wide range of previously-deployed devices as well as integrated into a variety of new designs using minimal roots-of-trust. | 2020-05-14 |
20200153809 | REAL-TIME COOKIE FORMAT VALIDATION AND NOTIFICATION - Provided are techniques for real-time cookie format validation and notification. It is determined that a web page with the real cookie is loaded onto a browser at a client. In response to determining that a control cookie does not exist for the real cookie, a matching cookie pattern for the real cookie is searched for in a cookie patterns database. In response to determining that the matching cookie pattern has been found for the real cookie, the control cookie is created. In response to determining that the matching cookie pattern has not been found for the real cookie, a notification is provided that the real cookie does not have a conforming format. | 2020-05-14 |
20200153810 | TOOL VERIFICATION SYSTEM AND METHOD OF VERIFYING AN UNQUALIFIED COMPONENT - A tool verification system and a method of verifying an unqualified component includes receiving communications between a tool and an unverified component, comparing the communications with a previously-qualified set of communications, and determining whether the unqualified component can be qualified based on the comparison. | 2020-05-14 |
20200153811 | DETERMINISTIC REPRODUCTION OF SYSTEM STATE USING SEEDED PSEUDO-RANDOM NUMBER GENERATORS - Computer systems and methods for improving the security and efficiency of client computers interacting with server computers through an intermediary computer using one or more polymorphic protocols are discussed herein. In an embodiment, a computer system comprises a memory; one or more processors coupled to the memory and configured to: generate a modified identifier for a original object based on a original identifier and a nonce; render one or more instructions that include the nonce and define a modified object that corresponds to the original object and includes the modified identifier; send the one or more instructions to a client computer, wherein the one or more instructions, when executed by the client computer, are configured to cause the client computer to send a request from the client computer with the modified identifier and the nonce; receive, from the client computer, a request with a challenge identifier and a challenge nonce; generate a test identifier based on the original identifier and the challenge nonce; determine whether the test identifier matches the challenge identifier. | 2020-05-14 |
20200153812 | DEPLOYMENT OF A DEVICE - A method for deploying a device to a local network hosted by a host device includes receiving a message causing the host device to request a piece of information from the device; requesting a determination if the received piece of information comprises data corresponding to an expected data pattern; if the received piece of information comprises data corresponding to the expected data pattern initiating a pairing with the device; and in response to the pairing generating an indication that the device is paired with the host device. A host device, a system and to a computer program product are also disclosed. | 2020-05-14 |
20200153813 | ENCRYPTION AND DECRYPTION TECHNIQUES USING SHUFFLE FUNCTION - Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing. | 2020-05-14 |
20200153814 | METHOD FOR AUTHENTICATION WITH IDENTITY PROVIDERS - The present disclosure relates to a method for authentication with identity providers via a federating authorization server, wherein the federating authorization server has at least one interface to at least one identity provider. Each identity provider is configured to validate user identities using a respective validation method. The method comprises: receiving login data via a webpage, the login data indicating at least an identity provider and a user. The validation method of the indicated identity provider may be determined using the login data. An update of the content of the webpage may be caused for enabling the determined validation method. Identity information of the user may be provided via the updated webpage and verifying the identity information using the determined validation method. | 2020-05-14 |
20200153815 | SINGLE SIGN-ON FOR MOBILE APPLICATIONS USING DIRECT BROKERING FOR IDENTITY AUTHENTICATION - Systems, methods, devices and non-transitory, computer-readable storage mediums are disclosed for single sign-on (SSO) for mobile applications using direct brokering for identity authentication. In an embodiment, a method comprises: sending, by a mobile application operating on a mobile device, a request to an online service provider for access to a resource; receiving, by the mobile application, a redirect from the service provider to an identity service provider for authentication; and establishing, by a portion of binary code of the mobile application and using the redirect, a brokered authentication session with the identity service provider, the portion of binary code configured to operate as a broker for the mobile application for the authentication session, and to provide single sign-on (SSO) services to the mobile application and other mobile applications operating on the mobile device, the SSO services including services to access the resources and authorization to use the accessed resources. | 2020-05-14 |
20200153816 | METHOD AND DEVICE OF REGULATING WEBSITE LOAD - Provided in the present disclosure are method, device, and apparatus of regulating a website load. The method includes: determining, by a server, a current load level of a website according to a current load of the website and a target value of the website load; and adjusting, by the server, login time of a client to regulate the website load according to the determined current load level of the website. The present disclosure enables load regulation of a website at an entry point of a site or a key service, thus improving user experience. | 2020-05-14 |
20200153817 | SYSTEMS AND METHODS FOR ONE-TIME PASSWORD AUTHENTICATION - In an aspect, the present disclosure provides an electronic device for OTP authentication of a present location, comprising: a power source, a processor, and a memory in a housing; a strap comprising first and second ends, and a first wire extending from the first end to the second end of the strap and forming an external loop, wherein the first wire establishes a first electrical connection between the power source and the processor; and a second electrical connection operatively connected to the processor and the memory, the processor configured to generate an OTP, only when the processor is connected to the power source by the first electrical connection without interruption once the first electrical connection is established. The OTP authentication may be time-based one-time password (TOTP) authentication, and the generated OTP may be a time-based one-time password (TOTP). | 2020-05-14 |
20200153818 | SYSTEMS AND METHODS FOR SECURE SAAS REDIRECTION FROM NATIVE APPLICATIONS - Systems and methods discussed for redirection of launch requests for local applications to corresponding remote applications, such as SaaS or network applications provided by an application server, and access of the corresponding remote application via an embedded browser of a client application. A client application executed by a client device may detect a request of a user to launch a local application of the client device. The client application may determine that the local application corresponds to a network application provided by an application server. The client application may intercept the request to launch the local application, responsive to the determination. An embedded browser of the client application may access the network application from the application server, responsive to interception of the request. | 2020-05-14 |
20200153819 | METHODS AND SYSTEMS FOR AUTHENTICATING IDENTITY - Systems and methods are disclosed that provide for secure communications between a user device and an authentication system. The systems and methods create a dynamic identification for the device that is stored in both the device and authentication system. | 2020-05-14 |
20200153820 | METHOD FOR VERIFYING AN OPERATOR IN A SECURITY SYSTEM - The present disclosure relates to a computer implemented method for verifying a computing device and preferably an operator associated with a security system, wherein the security system is specifically adapted for ensuring that the correct security operator is performing the correct task. The present disclosure also relates to a corresponding security system and a computer program product. | 2020-05-14 |
20200153821 | SYSTEMS AND METHODS FOR FACILITATING NETWORK VOICE AUTHENTICATION - Systems and methods are provided for facilitating voice authentication of a user in connection with a network transaction. One exemplary method includes receiving an authentication request for a transaction, initiated at a voice interactive device, from a merchant plug-in (MPI) associated with a merchant involved in the transaction, where the authentication request includes a pre-authentication indicator based on voice authentication of a user by the voice interactive device or by a voice authentication service. The method also includes generating a risk score for the transaction based at least in part on the pre-authentication indicator, transmitting the risk score with the authentication request for the transaction to an access controller server (ACS) associated with an issuer of an account to which the transaction is directed, and returning a result response to the MPI where the result response indicates permission to proceed in the transaction based on authentication of the user. | 2020-05-14 |
20200153822 | CONTACT AND NON-CONTACT IMAGE-BASED BIOMETRICS USING PHYSIOLOGICAL ELEMENTS - An authentication system includes at least one device arranged to provide digital images of a physiological element. The physiological element is formed at a location of a living body. A digital fingerprinting unit is arranged to form a digital fingerprint from each of the provided digital images and further arranged to form the digital fingerprints of a plurality of different types of physiological elements. An association unit is arranged to associate each digital fingerprint with its corresponding living body, and a storage unit is arranged to store the digital fingerprints. An authentication unit is arranged to compare a newly acquired digital fingerprint to at least some of the digital fingerprints stored by the storage unit, and based on a determined match, the authentication unit is arranged to output an indication of authenticity. | 2020-05-14 |
20200153823 | BIOMETRIC AUTHENTICATION OF INDIVIDUALS UTILIZING CHARACTERISTICS OF BONE AND BLOOD VESSEL STRUCTURES - Biometric authentication of a subject utilizing bone and/or blood vessel (vein or artery) structures is provided. A vertice profile is generated from a non-invasive, multi-dimensional image scan of a subject or a portion thereof. The vertice profile is generated by identifying relative locations of divots and peaks on a surface of a bone structure or by identifying branch intersections and traversals of blood vessels. Additional varication techniques can be used for proof of life (verification of human subject). If authenticated, access to physical or digital/virtual assets is allowed. | 2020-05-14 |
20200153824 | MULTIFACTOR PRIVACY-ENHANCED REMOTE IDENTIFICATION USING A RICH CREDENTIAL - A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential. | 2020-05-14 |
20200153825 | Methods for Internet Communication Security - The present disclosure relates to network security software cooperatively configured on plural nodes to provide authenticated and authorized communication, node protection, and prevention of a compromised node from contaminating other nodes. | 2020-05-14 |
20200153826 | Methods and Systems for Verifying a Source of a Message or Call - Various implementations described herein are directed to providing time-dependent authentication of a sending device. A message to a designated receiver is prepared. A portion of at least one secret identifier value of the sending device is retrieved. A portion of time information is retrieved. An authentication field is produced using the portion of the at least one secret identifier value and the portion of the time information. The authentication field is attached to the message. The message is transmitted to the designated receiver. | 2020-05-14 |
20200153827 | REPUTATION TRACKING BASED ON TOKEN EXCHANGE - Techniques are provided for reputation tracking based on token exchange. A first token and a second token submitted to an application server from a client computing device are received. The first token includes a first token-generated value. The second token includes a second token reputation value and a second function-generated value generated at the client computing device. The second token is validated by verifying the second function-generated value based on the first function-generated value. A third token is generated that includes a third token reputation value and a third function-generated value. The third function-generated value is generated based on the second function-generated value and at least one secret not available to the client computing device. The third token reputation value is generated based on the second token reputation value. | 2020-05-14 |
20200153828 | TRANSPARENCY MECHANISM FOR THE LOCAL COMPOSITION OF PERSONAL USER DATA STORED IN A DISTRIBUTED FASHION - A system and method for a client computer for the local composition of a data page having personal user data for services accessed by the user and provided on a number of servers. The method includes: setting up a central access server from among the servers; setting up a query for the composition of the data page, for a transmission from the client computer to the central access server; receiving a processing element, which includes a visual element and access addresses to the servers that are relevant for the query, the processing element including control commands processed by the client computer, and queries of the client computer to the access addresses included in the processing element being coordinated so that the personal user data on the servers to be aggregated for the composition of the data page are delivered directly to the client computer for the local composition. | 2020-05-14 |