30th week of 2021 patent applcation highlights part 72 |
Patent application number | Title | Published |
20210234860 | Securing local network traffic using cloud computing - Systems and methods for securely handling data traffic on local or private networks, such as by using cloud computing, are provided. A non-transitory computer-readable medium, according to one implementation, may be configured to store executable instructions enabling a processor of a user device to perform the step of discovering an origin of a source application associated with network packets bound for a private address space. The executable instructions may further enable the processor to send a tuple regarding the discovered origin to a cloud server to request an analysis of the tuple. Upon receiving an allow instruction from the cloud server, the instructions enable the processor to allow the network packets to flow normally to a destination associated with the private address space. Upon receiving a deny instruction from the cloud server, the instructions enable the processor to drop the network packets. | 2021-07-29 |
20210234861 | SECURED METADATA SHARING AMONG VNFs - A system and method for securely sharing metadata among virtualized network functions (VNFs) disposed within a cluster of host computers includes a distributed forwarding and metadata sharing (DFMS) framework that forwards received data packets and provides remote direct memory access (RDMA) enabled sharing of secured metadata among the VNFs from more than one host computer in the cluster of host computers, and a DFMS controller that resides in the cluster of host computers as a VNF and registers VNFs in the cluster to at least one group of VNFs in the cluster and assigns access rights to the metadata of VNFs within respective groups of VNFs in the cluster. In operation, each registered VNF in a group in the cluster uses RDMA requests to access the metadata for other registered VNFs in the group in the cluster to which the each registered VNF in the group has access rights. | 2021-07-29 |
20210234862 | DEVICE INTERACTION METHOD, METHOD FOR MANAGING PERMISSION, INTERACTIVE DEVICE AND USER TERMINAL - The present disclosure provides a device interaction method, a method for managing a permission, an interactive device, and a user terminal. In the device interaction method, an interactive device may set an interaction permission of a second user terminal through a first user terminal as a management user terminal. When an interaction request of the second user terminal matches its permission setting parameter, the interactive device may respond to the interaction request of the second user terminal to achieve interaction. | 2021-07-29 |
20210234863 | DETERMINATION DEVICE, DETERMINATION METHOD, AND DETERMINATION PROGRAM - A determination apparatus according to a first embodiment collects information regarding communication performed by an IoT device. The determination apparatus extracts patterns used for detecting unauthorized communication performed by the IoT device from information that has been collected. Also, the determination apparatus approximates a change in the cumulative value of the number of patterns to a function that expresses a predetermined curve, thereby calculating the degree of convergence of the change. Also, the determination apparatus determines whether or not the degree of convergence is no less than a predetermined value. | 2021-07-29 |
20210234864 | AUTHENTICATION FRAMEWORK FOR RESOURCE ACCESS ACROSS ORGANIZATIONS - A client application is specified by a target tenant and represented in an OAuth provider, along with a corresponding secret. A source tenant consents to permissions to be executed by the client application on a resource of the source tenant. A target service uses the secret to obtain an access token from an authorization server coupled to the source tenant and uses the access token to obtain access, specified by the permissions, to the resource served by a source service acting on behalf of the source tenant. | 2021-07-29 |
20210234865 | GRAPHICAL USER INTERFACE AND OPERATOR CONSOLE MANAGEMENT SYSTEM FOR DISTRIBUTED TERMINAL NETWORK - A graphical user interface (GUI) and operator console management system for a distributed terminal network is described. In some embodiments, the terminals may be hardware terminals, kiosks, or clients. In some embodiments, a security analysis may be performed, and security scores may be determined, for visitors requesting operations at terminals based on an operator configuration. Security scores may be determined by a provider, in communication with the operator terminals, based on aggregation of a plurality of factors, wherein each factor may be weighted. The factors may incorporate operator settings or preferences. In one embodiment, the factors include one or more facial recognition factors. The one or more facial recognition factors may be used for biometric authentication. The provider may use the security scores to determine user privileges or permissions for the operations. The provider may deliver instructions or messages to the terminals based on the determinations. | 2021-07-29 |
20210234866 | COMPUTERIZED PLATFORM FACILITATING COMMUNICATION BETWEEN END-USERS - A computerized system providing parental supervision of child consumers of digital media, comprising an electronic repository of digital content; user interface for children, adults, digital content providers and guidance providers where digital content providers may upload digital content items into the repository and guidance providers may provide guidance objects for adults which are specific for subsets of children end-users being defined in terms of metadata, and for specific spots within, or portions of, specific items in the digital contents items; and logic including a central processor and configured to control interactions of the user interfaces with the processor and between various end-users at least partly depending on the category of each end-user wherein the logic presents overlaid digital content item/s to child C, including generating the overlaid item by selecting guidance object G specific to subset to which C belongs, and integrating G into the digital content as an overlay. | 2021-07-29 |
20210234867 | ACCOUNT ACCESS SECURITY USING A DISTRIBUTED LEDGER AND/OR A DISTRIBUTED FILE SYSTEM - A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger. | 2021-07-29 |
20210234868 | SLEEPER KEYS - A system includes an authorization token with a memory configured to store user attributes including a record of previous usage of the data store by the user, pre-authorization data for the user, and an access signature for accessing contents of a data store. The authorization token receives an authorization request. Session attributes are collected associated with a file path used by the user to request access to a file. A consistency measure is determined associated with whether the file path used by the user to request access to the file is consistent with a previous file path stored in a record of previous usage of the data store by the user. In response to determining that the consistency measure is greater than a threshold value, the access signature is provided to the data store, thereby granting the user access to the file. | 2021-07-29 |
20210234869 | CONTROLLING ACCESS TO MULTI-GRANULARITY DATA - According to certain implementations, a permissions gateway receives an access request indicating multiple sets of secured data that include high-granularity data stored on multiple secured data repositories. The access request is compared to a permission set with multiple consent parameters, which indicate access types for the secured data. Based on a comparison of the access request to a permission set, the permissions gateway queries, the permission gateway queries a first data repository for a high-granularity dataset that includes a portion of the high-granularity data, and queries a second data repository for a low-granularity dataset that includes a summary of part of the high-granularity data. The permissions gateway generates a multi-granularity response to the access request, based on a combination of the high-granularity dataset and the low-granularity dataset. | 2021-07-29 |
20210234870 | MESSAGE SECURITY ASSESSMENT USING SENDER IDENTITY PROFILES - An identity profile of a user is tracked using previous message communications of the user. A message identified as potentially from the user is received. The identity profile of the user is identified and obtained. Information is extracted from a header of the received message. A security risk assessment of the received message is determined at least in part by comparing the extracted information with one or more corresponding entries of the identity profile of the user. A security action is performed based on the determined security risk assessment. | 2021-07-29 |
20210234871 | INFECTION-SPREADING ATTACK DETECTION SYSTEM AND METHOD, AND PROGRAM - Provided is an infection-spreading attack detection system and method, as well as a program enabling an occurrence of an infection-spreading attack to be detected with high accuracy. A first feature amount is calculated based on traffic information on a packet transferred by a transfer device, and M partial address space(s) are identified to be a monitoring target based on the first feature amount. A second feature amount is calculated for each of the M partial address space(s) based on the traffic information related to the M partial address space(s). Abnormality detection determination is performed on each of the M partial address space(s) based on the second feature amount. Whether the infection-spreading attack has occurred is determined by evaluating M determination results. | 2021-07-29 |
20210234872 | MALWARE PROTECTION FOR VIRTUAL MACHINES - A computer-implemented method at a data management system comprises receiving, at the system, a write made to a virtual machine from a virtual machine host; computing, at the system, a fingerprint of the transmitted write; comparing, at the system, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if a number of matches from the comparing breaches a predetermined threshold over a predetermined amount of time. | 2021-07-29 |
20210234873 | REASSEMBLY FREE DEEP PACKET INSPECTION FOR PEER TO PEER NETWORKS - The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content. | 2021-07-29 |
20210234874 | APPLICATION OF COMPUTER VISUAL CLASSIFICATION TO SECURITY EVENTS - A security event identification system may enable obtaining, for each of the set of web requests, a screenshot of a corresponding web path resulting from the web request; applying a hash to each obtained screenshot; and determining, based on a comparison of the hashed screenshots, whether a security event exists related to the set of web requests. | 2021-07-29 |
20210234875 | CENTRALIZED SECURITY ASSESSMENTS OF SCRIPTS IN NETWORK ENVIRONMENTS - Disclosed embodiments relate to systems and methods for centrally analyzing and managing scripts. Techniques include identifying, at a centralized script execution resource in a network environment, a first script; identifying, at the centralized script execution resource, a security risk indication for the first script; determining, at the centralized script execution resource, a security context for the first script; and performing, based on the security risk indication and the security context, at least one of: determining whether to execute the first script at the centralized script execution resource on behalf of the at least one of the endpoint resources, executing the first script at the centralized script execution resource on behalf of the at least one of the endpoint resources, or determining execution conditions for execution of the first script at the centralized script execution resource on behalf of the at least one of the endpoint resources. | 2021-07-29 |
20210234876 | SYSTEMS AND METHODS FOR FRAUD MANAGEMENT - Systems and methods for fraud management are provided. A fraud management system can include a data gatherer operable with a plurality of agent computers for collecting agent activity data from the plurality of agent computers. System can include a fraud rules database containing fraud rules and a fraud management computing system. The fraud management computing system can be in communication with the data gatherer and the fraud rules database. The fraud management computing system can also include, processors and memory devices. The memory devices store instructions that when executed by the processors cause the processors to perform operations. The operations include obtaining the agent activity data using the data gatherer pursuant to collection rules, comparing the agent activity data to the fraud rules, determining whether agent fraud event(s) have occurred based on the comparison and providing fraud alert data based upon the agent fraud event(s). | 2021-07-29 |
20210234877 | PROACTIVELY PROTECTING SERVICE ENDPOINTS BASED ON DEEP LEARNING OF USER LOCATION AND ACCESS PATTERNS - Example implementations relate to proactively protecting service endpoints based on deep learning of user location and access patterns. A machine-learning model is trained to recognize anomalies in access patterns relating to endpoints of a cloud-based service by capturing metadata associated with user accesses. The metadata for a given access includes information regarding a particular user that initiated the given access, a particular device utilized, a particular location associated with the given access and specific workloads associated with the given access. An anomaly relating to an access by a user to a service endpoint is identified by monitoring the access patterns and applying the machine-learning model to metadata associated with the access. Based on a degree of risk to the cloud-based service associated with the identified anomaly, a mitigation action is determined. The cloud-based service is proactively protected by programmatically applying the determined mitigation action. | 2021-07-29 |
20210234878 | METHOD AND SYSTEM TO DETERMINE DEVICE VULNERABILITIES BY SCANNER ANALYSIS - Methods and systems provide a vulnerabilities list and an open devices list based on results from scanning by scanners not associated with a host computer or resource. | 2021-07-29 |
20210234879 | ENTERPRISE-LEVEL SECURITY METHOD AND SYSTEM - A method of detecting and responding to anomalous activity within a system involves generating a two-dimensional graphical image of a first dimension and a second dimension, and wherein the first dimension corresponds to a cyclical repeating interval made up of multiple bins, the graphical image having been generated such that a bin of the multiple bins, is the bin having a highest count, and the bin is scaled to the second dimension, and counts of all other bins in the interval are scaled relative to that highest count, graphically comparing the generated graphical image to an immediately preceding graphical image for similarity, and when a result of the comparison fails to satisfy a pre-specified similarity threshold, automatically triggering an appropriate anomaly detection-based follow-on action. | 2021-07-29 |
20210234880 | AUTOMATED DETECTION OF MALWARE USING TRAINED NEURAL NETWORK-BASED FILE CLASSIFIERS AND MACHINE LEARNING - Automated malware detection for application file packages using machine learning (e.g., trained neural network-based classifiers) is described. A particular method includes generating, at a first device, a first feature vector based on occurrences of character n-grams corresponding to a first subset of files of multiple files of an application file package. The method includes generating, at the first device, a second feature vector based on occurrences of attributes in a second subset of files of the multiple files. The method includes sending the first feature vector and the second feature vector from the first device to a second device as inputs to a file classifier. The method includes receiving, at the first device from the second device, classification data associated with the application file package based on the first feature vector and the second feature vector. The classification data indicates whether the application file package includes malware. | 2021-07-29 |
20210234881 | GRAPHICAL STRUCTURE MODEL-BASED PREVENTION AND CONTROL OF ABNORMAL ACCOUNTS - A graphical structure model trained with labeled samples is obtained. The graphical structure model is defined based on an account relationship network that comprises a plurality of nodes and edges. The edges correspond to relationships between adjacent nodes. Each labeled sample comprises a label indicating whether a corresponding node is an abnormal node. The graphical structure model is configured to iteratively calculate, for at least one node of the plurality of nodes, an embedding vector in a hidden feature space based on an original feature of the least one node and/or a feature of an edge associated with the at least one node. A first embedding vector that corresponds to a to-be-tested sample is calculated using the graphical structure model. Abnormal account prevention and control is performed on the to-be-tested sample based on the first embedding vector. | 2021-07-29 |
20210234882 | INTERACTIVE INTERFACES AND DATA STRUCTURES REPRESENTING PHYSICAL AND/OR VISUAL INFORMATION USING SMART PINS - Interactive interfaces and data structures representing physical and/or visual information are provided using smart pins (also called “pins” herein). Pins representing vectors of information may be provided. For instance, in the context of cybersecurity, each pin may represent an attack vector that an adversary can use to attack a system. Each pin may have a depth meter and may move up or down according to its value in an operating range. Each pin may also have a color, a number, or both, representing its current value in the operating range. Such pins may provide both a three-dimensional representation of data that is intuitive to users. | 2021-07-29 |
20210234883 | COMBINATORIAL TEST DESIGN FOR OPTIMIZING PARAMETER LIST TESTING - A method includes receiving test objective data indicates an objective to be achieved during a cybersecurity test of a target system. An attack tree is generated by processing the test objective data into attack tree data including a plurality of data parameter sets and links between data parameter sets. Complexity of the attack tree is analyzed based on the test objective data using a combinatorics model. The attack tree is reduced to achieve the objective of the cybersecurity test based on the analyzed complexity of the attack tree. | 2021-07-29 |
20210234884 | Information Security System Based on Multidimensional Disparate User Data - Aspects of the disclosure relate to information security by identifying unique or related factors in common between individuals subject to a common threat vector. Data mining and data acquisition of public and non-public user information is performed to prevent, disrupt, and/or address criminal, cyber, and fraudulent threats. The information can be normalized into template(s) to align information across disparate datasets and enable efficient storage of the big data into appropriate fields to be tracked. The information can be stored in data warehouse(s) or in multidimensional data structure(s) for investigation if a threat vector against a group of individuals is detected. The multidimensional data can be analyzed to identify direct connections, common connecting entities, and/or connectivity clusters between individuals who were attacked or who may be attacked in the future. Remediation, machine learning, enhanced security, and/or vulnerability assessments may be implemented based on the results of the analysis. | 2021-07-29 |
20210234885 | System and Method for Enumerating and Remediating Gaps in Cybersecurity Defenses - A method for identifying gaps in an organization's cyber defenses, and identifying and prioritizing remediations that are designed to eliminate those gaps, including using multiple choice questionnaires, wherein the answers to a series of multiple choice questions are scored for inherent risk, selecting security controls and calculating expected maturity scores for these controls based on the inherent risk score, using multiple choice questionnaires, wherein the answers to a series of multiple-choice questions are scored for actual control maturity, aggregating said actual and expected maturity scores and comparing these to identify and quantify gaps, and recommending and prioritizing control improvements that are designed to raise the score to an expected level. These steps are implemented using a computing device. In this manner the organization can identify a sequenced set of concrete steps it can take to achieve reasonable and effective security. | 2021-07-29 |
20210234886 | NETWORK ASSESSMENT SYSTEMS AND METHODS THEREOF - A method for assessing a network environment includes obtaining, by the network assessment computing device, device information for one or more devices each with an Internet Protocol address currently on a defined network in a network environment from a network appliance device coupled to the network environment. Each of the identified devices are assessed, by the network assessment computing device, for one or more vulnerabilities. Network status data and any actionable items for the identified devices for the one or more vulnerabilities is generated, by the network assessment computing device, based on the assessing. The generated status data and any actionable items are provided by the network assessment computing device. | 2021-07-29 |
20210234887 | SOFTWARE RELEASE TRACKING AND LOGGING - The present disclosure provides a method, system, and device for securely updating a software release across a network. To illustrate, a server may compile a transaction log that includes information corresponding to one or more nodes in the network to which the software release has been transmitted. The server may analyze one or more files based on vulnerability information to identify at least one file of the one or more files that poses a risk. The server may also identify at least one node of the network at which the at least one file is deployed. Based on identifying the at least one node, the server may transmit a corrective action with respect to the at least one node. | 2021-07-29 |
20210234888 | Security Management of Devices Using Blockchain Technology - Concepts and technologies disclosed herein are directed to security management of devices using blockchain technology. According to one aspect disclosed herein, a smart contract for a device can be created. The smart contract can identify a plurality of parties including a device customer, a device manufacturer, and a vulnerability assessor. The smart contract can include an expected action to be performed by the device manufacturer responsive to a trigger event. In response to the trigger event being detected, the smart contract can be executed to cause the expected action to be performed by the device manufacturer. | 2021-07-29 |
20210234889 | REACHABILITY GRAPH-BASED SAFE REMEDIATIONS FOR SECURITY OF ON-PREMISE AND CLOUD COMPUTING ENVIRONMENTS - A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system. | 2021-07-29 |
20210234890 | PREDICTIVE RATE LIMITING SYSTEM FOR CLOUD COMPUTING SERVICES - Examples include a method of predictive rate limiting for performing services requested by a client in a cloud computing system. The method includes receiving a request from a client for one of a plurality of services to be performed, the client belonging to an organization; and determining a current threshold for the organization by applying a real time data model and a historical data model, the real time data model generating a first threshold at least in part by determining a number of requests received from the organization over a first preceding period of time; the historical data model generating a second threshold, the historical data model being generated by applying a machine learning model to historical data stored during processing of previous requests for the plurality of services from the organization over a second preceding period of time, the current threshold being the average of the first threshold and the second threshold. The method further includes performing the requested service when the current threshold is not exceeded; and denying the request when the current threshold is exceeded. | 2021-07-29 |
20210234891 | ARTIFICIAL INTELLIGENCE (AI) POWERED CONVERSATIONAL SYSTEM FOR IDENTIFYING MALICIOUS MESSAGES - The subject matter discloses artificial intelligence (ai) powered conversational system for identifying malicious messages | 2021-07-29 |
20210234892 | Metadata-Based Detection and Prevention of Phishing Attacks - The technology disclosed intercepts a webpage rendered by a server in response to a user action executed on a client. The technology disclosed analyzes one or more images of the webpage and determines that a particular hosted service is represented by the images. It analyzes one or more fields of the webpage and determines that the fields elicit confidential information. The technology disclosed intercepts a request generated by the client in response to another user action providing the confidential information via the fields. The technology disclosed analyses the request and determines that the confidential information is being exfiltrated to an unsanctioned resource. This determination is made by comparing a resource address in the request with one or more sanctioned resource addresses used by the particular hosted service. The technology disclosed determines that the webpage is effectuating a phishing attack and blocks transmission of the confidential information to the unsanctioned resource. | 2021-07-29 |
20210234893 | SYSTEMS AND METHODS FOR COMMUNICATION VERIFICATION - Provided herein are systems and methods for verifying online communications. A sender and/or a recipient of an online communication can be a registered user of a verification system. Upon request by the sender and/or the recipient in relation to a particular instance of an online communication, the verification system can (1) confirm that the sender and/or the recipient is a registered user of the verification system, (2) verify that the sender and/or the recipient has sent and/or received, respectively, the particular instance of the online communication, and (3) communicate the verification of the particular instance of online communication to the sender and/or the recipient. | 2021-07-29 |
20210234894 | SYSTEMS AND METHODS FOR AIDA BASED A/B TESTING - Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users. The campaign controller receives a first response from a first user to the simulated phishing communication and a second response from a second user to the simulated phishing communication and determines that the first and second responses are corresponding, for example are the same or similar. The serving module assigns a first user to a first group of users and a second user to a second group of users and identifies a second version of the model to use for the first user and a third version of the model to use for the second user. | 2021-07-29 |
20210234895 | IDENTIFICATION OF UNKNOWN TRAFFIC BASED ON TRANSPORT LAYER SECURITY EXTENSIONS - A system for providing network data processing, comprising a processor operating one of more algorithms that are configured to interface with one or more clients to receive a client hello data message. A transport layer security extension extraction system operating on the processor and configured to extract an extension from the client hello data message. A transport layer security extension identification system operating on the processor and configured to process the extension from the client hello data message and to identify a data networking session using the extension. | 2021-07-29 |
20210234896 | Providing Access to Data in a Secure Communication - The present disclosure is directed to preventing computer data from being usurped and exploited by individuals or organizations with nefarious intent. Methods and systems consistent with the present disclosure may store keys and keying data for each of a plurality of connections in separate memory locations. These memory locations may store data that maps a virtual address to a physical memory address associated with storing information relating to a secure connection. These separate memory locations may have a unique instance for each individual communication connection session, for example each transport layer security (TLS) connection may be assigned memory via logical addresses that are mapped to one or more physical memory addresses on a per-core basis. Such architectures decouple actual physical addresses that are used in conventional architectures that assign a single large continuous physical memory partition that may be accessed via commands that access physical memory addresses directly. | 2021-07-29 |
20210234897 | Secure Network Aggregation Protocol - A system and architecture for containing unique protocols to establish multiple layers of secure communication within a network. Secure data is aggregated, and containers are assigned specific communication ports to maintain distinct, secure communication channels over a single network connection. Each security level is defined by a tenant; each tenant is assigned a unique range of ports for use over the network. | 2021-07-29 |
20210234898 | MULTI-DOMAIN POLICY ORCHESTRATION MODEL - The present technology pertains to a system, method, and non-transitory computer-readable medium for orchestrating policies across multiple networking domains. The technology can receive, at a provider domain from a consumer domain, a data request; receive, at the provider domain from the consumer domain, at least one access policy for the consumer domain; translate, at the provider domain, the at least one access policy for the consumer domain into at least one translated access policy understood by the provider domain; apply, at the provider domain, the at least one translated access policy understood by the provider domain to the data request; and send, at the provider domain to the consumer domain, a response to the data request. | 2021-07-29 |
20210234899 | DEVICE CONTEXT IN NETWORK SECURITY POLICIES - The use of device context in applying security policies is provided by receiving a Domain Name Service (DNS) query for a network resource from a user device (UD) at a DNS analysis server, the DNS query including a functional label describing a context of the UD; analyzing the DNS query to determine whether the UD is permitted to access the network resource based on the functional label; and in response to the functional label indicating that the UD is not permitted to access the network resource, transmitting a block page to the UD. The functional label can be added to the DNS query by a Mobile Device Management application on the UD, a router associated with the UD, or an enterprise server. Contexts for previously blocked DNS queries can be aggregated to identify UDs sharing at least one value with the previously blocked DNS queries as security compromised devices. | 2021-07-29 |
20210234900 | MANAGING A SEGMENTATION POLICY FOR WORKLOADS IN A SECURE ENCLAVE - A policy management server manages a segmentation policy and automatically configures an enclave protection device consistently with the segmentation policy so that that the segmentation policy can be enforced with respect to workloads within a secure enclave protected by the enclave protection device. The policy management server identifies protected workloads that are members of a secure enclave and external workloads that are external to the secure enclave. The policy management server identifies cross-boundary rules of the segmentation policy affecting traffic between the protected workloads and external workloads. The policy management server generates and distributes a configuration of the enclave protection device to enable enforcement of the cross-boundary rules pertaining to traffic passing through the enclave protection device. | 2021-07-29 |
20210234901 | SYSTEMS AND METHODS FOR NETWORK SECURITY - Methods, systems, and computer readable media for network security are described. In some implementations, security tasks and roles can be allocated between an endpoint device and a firewall device based on tag information sent from the endpoint, the tag information including one or more characteristics of a traffic flow, information of resource availability, and/or reputation of a process associated with a traffic flow. | 2021-07-29 |
20210234902 | CLOUD SECURITY SYSTEM IMPLEMENTING SERVICE ACTION CATEGORIZATION - A service action category based cloud security system and method implement cloud security by categorizing service actions of cloud service providers into a set of service action categories. The service action categorization is performed agnostic to the applications or functions provided by the cloud service providers and also agnostic to the cloud service providers. With the service actions of cloud service providers thus categorized, cloud security monitoring and threat detection can be performed based on service action categories. Thus, cloud security can be implemented without requiring knowledge of the applications supported by the cloud service providers and without knowing all of the individual service actions supported by the cloud service providers. | 2021-07-29 |
20210234903 | SYSTEMS AND METHODS FOR LIVE SAAS OBJECTS - Embodiments described include systems and methods for generating and displaying live objects for network applications. Live objects may be created from applications (apps) that are served from and/or hosted on one or more servers, such as web applications and software-as-a-service (SaaS) applications, and shared with one or more recipients. The objects may be loaded or accessed as if they were normal network applications, and the recipients may see the latest or “live” version of content as shown to the live object creator, including user- or device-specific data of the creator, under full access policy control, without requiring access to credentials of the live object creator. | 2021-07-29 |
20210234904 | METHOD AND APPARATUS TO SIMPLIFY REPLACING EXISTING IP PHONE WITH NEW IP PHONE USING HEADSET - A call control entity communicates with Internet Protocol (IP) phones. The call control entity creates a mapping between a headset identifier of a headset connected to a registered first IP phone, and an identifier associated with the first IP phone. Upon receiving a request from a second IP phone that is not registered, the call control entity determines there is no existing IP phone record for the second IP phone. Responsive to the determining, the call control entity acquires from the second IP phone the headset identifier, and accesses an first IP phone record of the first IP phone based on the headset identifier and the mapping. The call control entity creates a second IP phone record for the second IP phone, copies existing configuration information from the first IP phone record to the second IP phone record, and configures the second IP phone with the existing configuration information. | 2021-07-29 |
20210234905 | METHOD AND APPARATUS FOR USER COMMUNICATION IN LIVE STREAM ROOM, DEVICE AND STORAGE MEDIUM - A method for user communication in a live stream room, apparatus, electronic device and medium are provided. An implementation of the method may include: in response to a request for creating a discussion group from a primary user, determining target secondary users from other participants in the live stream room except the primary user; sending an invitation message to the target secondary users for inviting the target users to join the discussion group; and creating the discussion group, with the primary user and a target secondary user who confirms joining as members of the discussion group, and associating thereto a user identification of the primary user, a user identification of a target secondary user who confirms joining, and an identification of the discussion group, to conduct an inner-group discussion among the members of the discussion group on the basis of the discussion group. | 2021-07-29 |
20210234906 | COMMUNICATIONS SYSTEM WITH SEQUENCED CHAT, INTERACTIVE AND DIGITAL ENGAGEMENT FUNCTIONS INCLUDING PRE-CONNECTION WORKFLOW - A networked communications system that facilitates real-time interaction with persons-of-interest. The real-time communications system includes a pre-connection workflow that allows for efficient utilization of human resources and/or more precise control of the interaction and engagement time intervals allotted to users of the system. | 2021-07-29 |
20210234907 | DEVICE PRESENTATION WITH REAL-TIME FEEDBACK - A system and method for sharing presentations and other content is disclosed. In various exemplary embodiments, the system comprises a software program that enables a presenter to share content from a computer or other mobile device and to a number of different viewers, each of which has his or her own computer or mobile computing device that can display the presentation on the device. In yet other embodiments, the viewers of the presentation can communicate with the presenter via the computers or mobile computing devices. | 2021-07-29 |
20210234908 | SYSTEMS AND METHODS FOR COLLABORATIVE EDITING AN ELECTRONIC RESOURCE USING CLIENT DEVICE DESIGNATIONS - Described herein is a computer-implemented collaborative editing system for editing of electronic resources including documents and other electronic information. The system includes: an editor interface for interfacing with an editor executing on a client device, the editor being configured to edit a resource; an editing identity module for causing the processing unit to store a designation of the client device as a privileged or a non-privileged editor; and an editing interface for causing the processing unit to: receive proposed edits to the resource from the editor interface and communicate the proposed edits to a remote collaborative editing service; receive remote proposed edits to the resource from the remote collaborative editing service and in the event that the client device is designated as a privileged editor, accept or reject the remote proposed edits and communicate the acceptance or rejection to the remote collaborative editing service. | 2021-07-29 |
20210234909 | METHOD FOR A VIDEO CONTENT DISTRIBUTION AND MESSAGING PLATFORM - A computer-implemented method for providing, through a computer network via a server computer, a video content distribution and messaging platform to communicate video content from a plurality of content sources to respective user devices of platform users, and for enabling platform users to share the video content with their friends. The method comprises receiving, at the platform, a video recommendation from a first platform user for an instance of video content distributed to the first platform user, the video recommendation to be communicated to at least one other platform user who is a friend of the first platform user. The method further comprises sending from the platform the video recommendation to the at least one other platform user who is a friend. | 2021-07-29 |
20210234910 | SYSTEM TIME FREQUENCY AND TIME INFORMATION - A method of a reception apparatus for receiving transmission frames. The method includes receiving, by circuitry of the reception apparatus, the transmission frames transmitted on one millisecond boundaries. Each of the transmission frames includes a bootstrap, a preamble, and a payload. The method further includes determining, by the circuitry, an absolute point of time at a predetermined position in a stream of the transmission frames based on first time information included in a first one of the transmission frames. | 2021-07-29 |
20210234911 | MODIFYING MULTIMEDIA BASED ON USER CONTEXT - The exemplary embodiments disclose a system and method, a computer program product, and a computer system for modifying multimedia. The exemplary embodiments may include receiving a multimedia and one or more inputs, determining a required amount of modification to the multimedia based on the one or more inputs, generating a literary parse tree based on the multimedia, extracting one or more node features from one or more nodes of the parse tree, determining a node importance of the one or more nodes based on applying a model to the one or more node features, and modifying one or more portions of the multimedia corresponding to the one or more nodes based on the node importance and the required amount of multimedia modification. | 2021-07-29 |
20210234912 | METHODS, DEVICES, AND SYSTEMS FOR ENCODING PORTIONS OF VIDEO CONTENT ACCORDING TO PRIORITY CONTENT WITHIN LIVE VIDEO CONTENT - Aspects of the subject disclosure may include, for example, obtaining live video content from equipment of a media content provider, determining priority content within the live video content; segmenting the live video content into a plurality of tiles according to the priority content, and transcoding the live video content according to a type of client device. Further embodiments include determining an encoding schedule for the plurality of tiles according to the priority content, encoding the plurality of tiles according to the encoding schedule, and providing the plurality of tiles to the client device. Other embodiments are disclosed. | 2021-07-29 |
20210234913 | APPARATUS, SYSTEM, AND METHOD FOR MULTI-BITRATE CONTENT STREAMING - An apparatus, system, and method for maintaining a programming lineup of adaptive-bitrate content streaming is provided. The apparatus includes a timeline module configured to maintain a programming lineup of media content available over a network. The media content may comprise a plurality of streamlets. The apparatus also includes at least one data module configured to maintain multi-bitrate streamlet information. The system includes the apparatus and a client module configured to acquire content based upon the programming lineup provided by the timeline module. The method includes maintaining a programming lineup of media content available over a network, and maintaining multi-bitrate streamlet information. | 2021-07-29 |
20210234914 | SEGMENTED VIDEO CODEC FOR HIGH RESOLUTION AND HIGH FRAME RATE VIDEO - Embodiments disclosed herein provide systems, methods, and computer readable media for a segmented video codec for high resolution and high frame rate video. In a particular embodiment, a method of encoding a composite video stream provides identifying a first portion of an image of a video stream for encoding using first parameters and a second portion of the image of the video stream for encoding using second parameters. The method further provides segmenting the first portion of the image into one or more first tiles and the second portion of the image into one or more second tiles. The method further provides encoding the first tiles using the first parameters and the second tiles using the second parameters and, after the encoding, combining the first tiles and the second tiles into the composite video stream. | 2021-07-29 |
20210234915 | METHOD AND SYSTEM FOR PROVIDING WATERMARK TO SUBSCRIBERS - A method for providing watermark to subscribers is provided. The method comprises observing a request for a first content from a subscriber, determining if the subscriber can receive a watermark, generating a second content comprising the watermark if the subscriber can receive a watermark, causing the subscriber to fetch the first content, and causing the subscriber to fetch the second content comprising the watermark overlaying the first content. | 2021-07-29 |
20210234916 | SYSTEMS AND METHODS FOR CLIENT-SIDE CONTEXTUAL ENGAGEMENT - Disclosed is a new approach for client-side contextual engagement with a website visitor. A browser loads a page containing a reference to a script file implementing a visitor client. The visitor client may store visitor client data including site rules and a visitor profile locally on the client device. The visitor client may include a context monitor for calling the decision engine, a decision engine for evaluating the site rules relative to a context defined at least partially by events occurring on the page and the visitor profile, and a widget manager for managing visitor client data persisted on the client device. The content monitor may call the decision engine when the context changes. The decision engine may determine, in real time and relative to the context, that proactive or reactive engagement(s) may be appropriate and call the widget manager to launch and display corresponding engagement channel(s) on the page. | 2021-07-29 |
20210234917 | SYSTEMS AND METHODS FOR REAL-TIME TRANSFER FAILURE DETECTION AND NOTIFICATION - Methods and computer systems for processing bulk transfer files are described. In an aspect, a transfer processing system is configured for: receiving a bulk transfer file from a remote device, the bulk transfer file defining a plurality of requested transfers associated with a database; classifying one or more of the requested transfers defined in the bulk transfer file as being likely to fail processing by passing the requested transfers defined in the bulk transfer file to a classifier trained to identify transfers likely to fail processing based on training data, the training data including a plurality of prior requested transfers and associated completion indicators indicating the prior requested transfers that failed processing; and providing, in real time or near real time, a notification to the remote device of the requested transfers identified as likely to fail processing. | 2021-07-29 |
20210234918 | MOBILE INTERACTIVE KIOSK METHOD - To regulate information exchanges, provide personal security and enhance personal privacy inside and outside a network and to regulate devices. Provided is a personal bio-data mining and pairing method of a human user to one or more communications devices capable of functioning in a network cloud environment and, where the rules governing cloud organization and communications are based in part upon a human user bio-data and real world information exchanges commonly occurring at specific geographical locations. | 2021-07-29 |
20210234919 | SYSTEMS AND METHODS FOR LIVE PERFORMANCE MAPPING OF COMPUTING ENVIRONMENTS - Described implementations provide systems and methods generating and using live performance maps of a network environment for selecting combinations of proxies and servers for fulfilling client device requests. Proxy devices or connectors may gather network telemetry data from actual network flows between client devices and application servers or other resources traversing the proxy devices or connectors, when available, or by generating synthetic transactions to measure network telemetry data when actual flows are unavailable. The telemetry data may be provided to a management service, which may generate a performance map. The performance map may be provided to the proxy devices and/or a cloud proxy service for selection of optimal combinations of connectors and resources for client requests. Incoming client requests may be steered or redirected to the selected optimal combination. The performance map may be dynamically regenerated as network conditions change and/or as servers are deployed or undeployed. | 2021-07-29 |
20210234920 | SYSTEMS AND METHODS FOR PROVIDING LOAD BALANCING AS A SERVICE - The present disclosure is directed generally to systems and methods for providing load balancing as a service. A load balancer executing on a device intermediary to a server and a plurality of clients can receive a request from an agent executing on the server. The request can be to initiate establishment of a transport layer connection. The load balancer can accept the request to establish the transport layer connection with the server. The load balancer can receive a request to access the server from a client of the plurality of clients. The load balancer can forward the request to the server via the transport layer connection established between the load balancer and the server responsive to the request of the server. | 2021-07-29 |
20210234921 | PEER-TO-PEER BLOCKCHAIN FABRIC MANAGEMENT MECHANISM - A system is described. The system includes a distributed ledger peer-to-peer blockchain fabric comprising a plurality of peer nodes, including a first peer node to receive a workload package, examine the workload package to determine a role of the first peer node within a cluster configuration of a first set of the plurality of peer nodes and execute the workload package at resources included in the first peer node. | 2021-07-29 |
20210234922 | METHOD AND DEVICE FOR IDENTIFYING DISTRIBUTION NETWORK TOPOLOGY ERROR - Provided are a method and a device for identifying a distribution network topology error. The method includes: calculating a voltage of a coupling node to which each load belongs and obtaining a voltage sample space of coupling nodes to which all loads belong; calculating a current of a branch to which each load belongs and obtaining a current sample space of branches to which all loads belong; calculating a voltage correlation coefficient and a current correlation coefficient respectively between different loads according to the obtained voltage sample space and the current sample space; and completing verification and correction of the distribution network topology. | 2021-07-29 |
20210234923 | CONNECTION MANAGEMENT DURING NON-DISRUPTIVE UPGRADE OF NODES - Connection of clients to nodes associated with a storage system can be managed during non-disruptive upgrades (NDUs) of software or firmware of nodes. During NDU, connection manager component (CMC) manages connections of clients to nodes based on a node pool policy to determine nodes to consider for connection for a client request and a connection policy. CMC can determine whether to reduce a set of nodes to a subset of nodes having a particular upgrade status based on a threshold value associated with the particular upgrade status, which can be one of upgraded or non-upgraded. If threshold is satisfied for the set, CMC can reduce the set to the subset of nodes, and CMC can determine a node of the subset based on the connection policy. If threshold is not satisfied, the set is not reduced, and CMC determines a node from the set based on the connection policy. | 2021-07-29 |
20210234924 | PRIVACY PROTECTION FOR PROXY AUTO-CONFIGURATION FILES - A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided. | 2021-07-29 |
20210234925 | PERSISTENT VOLUMES FOR STATEFUL APPLICATIONS - Systems and methods for implementing stateful services using cloud-based resources are described. A server computing system determines existence of a first volume based on a launch of a first instance by an auto-scaling group (ASG). The first volume is to have a resource tag having a value similar to a value of a resource tag of the ASG. The first volume was previously attached to a second instance terminated by the ASG. Based on a successful determination of the existence of the first volume, the server computing system attaches the first volume to the first instance. Based on a failed determination of the existence of the first volume, the server computing system generates a second volume, attaches the second volume to the first instance, and set a resource tag of the second volume to a value similar to the value of the resource tag of the ASG. | 2021-07-29 |
20210234926 | Processing Signals from a Sensor Group - Embodiments disclosed herein for processing signals from sensor groups include processor(s) configured to perform operations comprising sampling, at a configurable signal sampling interval, a plurality of signal sample values via the one or more output signal traces from the plurality of remotely located sensors; storing, in a transmission array, an available portion of parameters extracted from a first timeslot array and from a second timeslot array, wherein the available portion of parameters is extracted using an algorithm configured to assign specific parameters to the transmission array, independent of the sampling; and transmitting, to an external communications network, an available portion of the parameters stored in the transmission array, at a transmission interval, wherein the transmission interval is independent of timeslot durations of the first timeslot array and the second timeslot array, and wherein the transmitting operation is performed independently of the storing operation of the available portion of parameters. | 2021-07-29 |
20210234927 | ELECTRONIC DEVICE AND OPERATING METHOD THEREFOR - An example electronic device may include a communication circuit, a processor, and a memory, wherein the memory stores instructions that, when executed by the processor, cause the processor to, acquire first information on one or more first electronic devices, which are located at a first place and can be connected to a first external apparatus, from the first external apparatus, store the acquired first information in association with an account accessed through the first external apparatus, acquire second information on one or more second electronic devices located at a second place, in response to at least one function-providing request corresponding to the one or more first electronic devices and made by a second external apparatus located at the second place and corresponding to the account, select at least one electronic device corresponding to the one or more first electronic devices from among the one or more second electronic devices, using the first information stored in the memory and the acquired second information, and deliver information on the at least one selected electronic device to the second external apparatus. | 2021-07-29 |
20210234928 | SETUP OF COMMUNICATION SESSION - Disclosed is a method for setting up a communication session to a terminal device. The method includes: receiving a registration request from the terminal device, the registration request including a unique transaction identifier for the terminal device; assigning a network slice; assigning a charging and policy scheme; and in response to an assignment of the network slice and an assignment of the charging and policy scheme for the communication session generating an acknowledgement to the terminal device. Also disclosed is a network node, to a communication system and a computer program product. | 2021-07-29 |
20210234929 | Data Check Method, Data Check Apparatus, and Storage Medium - Embodiments of this application provide a data check method, a data check apparatus, and a storage medium. The data check method includes: obtaining a first counter value and a second counter value, where the first counter value is a value obtained by performing counting by UE during data transmission between the UE and a UPF entity, and the second counter value is a value obtained by performing counting by the UPF entity during the data transmission between the UE and the UPF entity; determining whether the first counter value matches the second counter value; and if the first counter value does not match the second counter value, sending a response message to a session management network element. | 2021-07-29 |
20210234930 | MICROSERVICE MANAGEMENT SYSTEM FOR RECOMMENDING MODIFICATIONS TO OPTIMIZE OPERATION OF MICROSERVICE-BASED SYSTEMS - A method, system and computer-usable medium are disclosed for executing a comparative analysis of microservice profiles and recommending modifications to a microservice. In at least one embodiment, a plurality of microservice analysis daemons and a plurality of microservices are deployed to nodes of a network. Run-time execution characteristic of the plurality of microservices are monitored and gathered by the analysis daemons for microservices executed at the node at which the microservice analysis daemon is deployed. Microservice profiles are generated using the run-time execution characteristics data and data retrieved from a service registry. Recommendations regarding modification of one or more microservices are made based on the results of a microservice profile comparative analysis. | 2021-07-29 |
20210234931 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a processor configured to control, in a case where a user of a service for providing a space provided with a controllable lock is to withdraw from the service, execution of a withdrawal process in accordance with a current use condition of the service. | 2021-07-29 |
20210234932 | DYNAMIC TIME-BASED PLAYBACK OF CONTENT IN A VEHICLE - A computing device schedules media content for playback in a vehicle based on an estimated duration of an operating session of the vehicle, such that the runtime for the scheduled content approximately corresponds to the estimated operating session duration. Before an operating session, such as a drive from a first location to a specified second location or a session recharging a battery of the vehicle, the computing device determines the estimated duration of the operating session. The computing device selects one or more media content items that together have a collective runtime corresponding to the estimated duration of the operating session. During the operating session, the schedule of media is output for playback. | 2021-07-29 |
20210234933 | SHARING PERSONALIZED ENTITIES AMONG PERSONAL DIGITAL ASSISTANT USERS - Architecture that enables a user to designate acceptance to receiving social cards from other user in a social network using a personal digital assistant. A mapping component maintains the mappings of all users who have accepted to participate in card sharing and the acceptance level. A whitelist of users can be created that lists the users to whom a social card can be sent from an endpoint. The user can create local groups dynamically at runtime on the local endpoint, where the local groups enable the sharing of the personalized content with multiple users concurrently. The shared card is selected by the sending user and becomes available to the PDA on the proactive canvas of the recipient's PDA along with other cards. Based on the user engagement history, these cards can be ranked among other cards social or non-social PDA cards. Conflation, push notifications, and filtering are also provided. | 2021-07-29 |
20210234934 | METHOD AND SYSTEM FOR PROVIDING META DATA INFORMATION OF NETWORK FUNCTION SERVICE, AND RELATED DEVICE - One example method for providing meta data information of a network function service (NFS) includes obtaining service quality data of a plurality of NFSs from a network function quality collector (NFQC) device, obtaining a service content condition from a network function service consumer (NFSC) device, obtaining a service quality condition from a network function management function (NFMF) device, selecting at least one NFS from the plurality of NFSs based on the service content condition, the service quality condition, and the service quality data, and sending meta data information of the NFS to the NFSC device. The meta data information of the NFS is a set of attribute information that describes the NFS or a set of attribute information that describes a network function instance that provides the NFS. | 2021-07-29 |
20210234935 | RESTFUL METHOD AND APPARATUS TO IMPORT CONTENT BY GEO-AWARE CONTENT CACHING SERVICE - Representational state transfer (REST) based geo-aware content transfer includes a REST server configured for receiving an application programming interface (API) request from a client device. The REST server obtains a upload universal resource locator (URL) targeting a caching server that is geographically closest to the client device, constructs an upload link containing the upload URL and a completion callback, and sends the upload link to the client device. The client device uses the upload URL to upload content to the caching server. The caching server interprets the completion callback to obtain a completion URL and, upon completion of content uploading, makes a REST API call using the completion URL. Responsive to the REST API call, the REST server executes an inbound operation to complete the uploading to a content management system and returns the content URL to the caching server which sends the content URL to the client device. | 2021-07-29 |
20210234936 | PROXY CALLBACK INTERFACE SUPPORTING MULTIPLE WEBHOOK CHANNELS - In an example, a proxy server includes a proxy callback interface supporting a plurality of webhook channels, each channel of the plurality of webhook channels being identified by a respective webhook channel address. The proxy callback interface receives a webhook call, the webhook call including a specific webhook channel address identifying a specific webhook channel, and payload callback data. The proxy server also includes a database interface to store a callback record that includes the payload callback data in a proxy server database. The proxy server also includes a query interface to receive a callback query, the callback query identifying the specific webhook channel address. The query interface further identifies a plurality of callback records, associated with the specific webhook channel address, that were stored within the proxy server database subsequent to receipt of a previously-received callback query, and returns the plurality of callback records, responsive to the callback query. | 2021-07-29 |
20210234937 | CALL TERMINATION FOR WEBHOOK CALL - In some examples, a method also includes identify, using the callback query, a callback record. The method also includes providing, responsive to the callback query, the payload callback data of the callback record from a query interface to a callback client. The callback query includes a polling number, and the method further includes using the polling number to identify the callback record, detecting that the polling number corresponds to a last record number for callback records associated with the webhook channel identifier, and performing a call termination action responsive to the detecting of the correspondence between the polling number and the last record number for the callback records associated with the webhook channel identifier. | 2021-07-29 |
20210234938 | PRIORITIZATION OF PROCESSES BASED ON USER PERSONA AND REINFORCEMENT LEARNING - Settings on an information handling system may be adjusted to set priority levels for processes executing on the information handling system in view of desired operational characteristics of the information handling system for a user persona and in view of expected future events for the information handling system. A score may be generated based on a user persona (e.g., whether a user is a light gamer, heavy gamer, corridor warrior, or desk worker) and expected future computer contexts (e.g., an expectation that a user will play a game in one hour). That score may be used to determine policies (e.g., high performance, balanced, or battery saver) to implement through settings on the computer system. Consideration of user persona classifications, associated group behaviors, and dynamic system contexts (including resource extremas, location, temporal context, and predicted future events) improve use of system resources through prioritization and governing of diverse optimization methods. | 2021-07-29 |
20210234939 | PROVISION OF A LEASE FOR STREAMING CONTENT - This application relates to embodiments for providing a content stream to a device from a content server based on a protocol that is established between the device and an account server. The account server can initiate a session with the device and provide the device with a list of channels available for a user account associated with the device. When a channel is selected at the device, conditional access information can be provided from the account server to the device, which can thereafter relay the conditional access information to the content server. The content server can use the conditional access information to verify that the device has the appropriate permission to receive streaming content. In this way, because the conditional access information originates at the account server, permission to access streaming content can be managed by correspondence between the account server and the device, rather than the content server. | 2021-07-29 |
20210234940 | Resource Request Management Using Bandwidth Allocation and Time Slots - A resource management system may use information regarding the bandwidth status of a downstream communication path to determine what portion of queued content should be sent in the current available bandwidth timeslot. In some embodiments, multiple versions of the same requested content may be available, and the system may select a lower-quality version to send if needed to meet a time deadline included in the original content request. | 2021-07-29 |
20210234941 | Wireless Device, Computer Server Node, and Methods Thereof - According to an aspect, a wireless device receives ( | 2021-07-29 |
20210234942 | CRITICAL PATH ESTIMATION FOR ACCELERATED AND OPTIMAL LOADING OF WEB PAGES - Network requests are made to download a data object for a display page with different time delays. Page load outcomes of the display page are determined. A criticality of downloading the data object with respect to the display page is determined using page load outcomes. Criticalities of data objects of the display page are used to generate a specific data object download order that prioritizes critical and/or blocking objects of the display page. | 2021-07-29 |
20210234943 | DELIVERY OF MEDIA CONTENT TO A MEDIA DEVICE VIA MULTIPLE DATA PACKET STREAMS - A method includes receiving, at a customer premises equipment (CPE) device from a data source, media content requested by a media device. The method includes determining, at the CPE device, a number of concurrent media connections to establish to the media device based on a workload of the customer premises device. The method includes establishing the number of concurrent communication connections between the CPE device and the media device. The method also includes sending the media content as data packets via data packet streams to the media device from the customer premises equipment device. A data packet stream of the data packet streams is sent via each communication connection of the concurrent communication connections. Each data packet stream includes less than all data packets of the media content, and the media device processes the data packets received via the data packet streams to generate media content output. | 2021-07-29 |
20210234944 | NETWORK COMMUNICATION METHOD, SYSTEM, COMPUTING DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM - Techniques for network communication are described herein. The disclosed techniques include generating a request for accessing a target server by a computing device, the request comprising a URL; determining whether to select a QUIC transport protocol based on the URI; selecting the QUIC transport protocol in response to a determination that the URL comprises QUIC identification information; and establishing a QUIC connection with the target server via a QUIC stack of the computing device according to the QUIC transport protocol. | 2021-07-29 |
20210234945 | Packet Processing Method and Apparatus - A system and method for packet processing, the method being applied to a first network device and including sending a first packet to a second network device, where a control packet header of the first packet includes a first number, and the first number indicates a number of a packet that carries the first number and that is between the first network device and the second network device, and receiving a first acknowledgement packet from the second network device, where the first acknowledgement packet comprises an indication indicating whether the second network device receives the first packet. | 2021-07-29 |
20210234946 | ALTERNATE PROTOCOL NEGOTIATION IN A HIGH PERFORMANCE INTERCONNECT - A port of a computing device is to communicate with another device over a link, the port including physical layer logic of a first protocol, link layer logic of each of a plurality of different protocols, and protocol negotiation logic to determine which of the plurality of different protocols to apply on the link. The protocol negotiation logic is to send and receive ordered sets in a configuration state of a link training state machine of the first protocol, where the ordered sets include an identifier of a particular one of the plurality of different protocols. The protocol negotiation logic is to determine from the ordered sets that a link layer of the particular protocol is to be applied on the link. | 2021-07-29 |
20210234947 | ENHANCED FINE TIMING MEASUREMENT PROTOCOL NEGOTIATION - This disclosure describes systems, methods, and devices related to enhanced fine timing measurement protocol negotiation. A device may identify an enhanced fine timing measurement request received from a first device, the enhanced fine timing measurement request comprising one or more information elements associated with one or more multiple-input multiple-output (MIMO) parameters. The device may cause to send an enhanced fine timing measurement response to the first device. The device may identify a null data packet announcement associated with a location determination of the first device. The device may identify a null data packet received from the first device. The device may cause to send a null data packet feedback to the first device | 2021-07-29 |
20210234948 | Housing Assembly and Terminal - This application discloses a housing assembly, including a housing, a decorating part, and an adhesive assembly. The housing is provided with a through hole. The decorating part includes a substrate and a decorating ring protruding from the substrate. An air hole is disposed on the substrate. The air hole is located on an outer side of the decorating ring. The decorating ring is at least partially accommodated in the through hole. A gap is formed between an outer peripheral side surface of the decorating ring and a hole wall of the through hole. The adhesive assembly is attached between the substrate and the housing in a sealed manner. The adhesive assembly is disposed around the decorating ring and the air hole, and a channel is formed between the adhesive assembly and the outer peripheral side surface of the decorating ring. | 2021-07-29 |
20210234949 | INFORMATION PROCESSING TERMINAL - Provided is a mobile information terminal that allows a high-performance camera to be directed in any arbitrary direction relative to the terminal body and that allows photographing to be performed in a free position, while allowing for the viewing of a camera viewpoint image. An information processing terminal | 2021-07-29 |
20210234950 | ELECTRONIC DEVICE INCLUDING CONNECTOR MOUNTED ON CIRCUIT BOARD - Various embodiments of the present disclosure relate to an electronic device which may include: a circuit board; at least one electronic component mounted on the upper surface of the circuit board; at least one connector mounted on the upper surface of the circuit board and electrically connected to the circuit board or the at least one electronic component; and a conductive frame which includes a side wall surrounding a space, in which the at least one electronic component and the at least one connector are disposed, and an extension part extending from one end of the side wall into the space. | 2021-07-29 |
20210234951 | GENERATE USER-FRIENDLY STRING TO REPLACE TELEPHONE NUMBER - An approach is provided that hides a caller's telephone number and instead displays a user friendly string that acts as an alias for the caller's identity. The approach receives, from a caller using a calling device, an incoming call at a receiving device that is the information handling system such as a smart phone. The incoming call includes a set of textual metadata that includes an alias corresponding to caller as well as the caller's telephone number that corresponds to the calling device. The approach then displays, on a display screen accessible from the receiving device, the alias while inhibiting display of the caller telephone number, thus keeping the caller's actual telephone number hidden from the user of the receiving device. | 2021-07-29 |
20210234952 | ELECTRONIC DEVICE INCLUDING BUTTON AND METHOD FOR OPERATION IN ELECTRONIC DEVICE - Various embodiments relate to an electronic device including a button and a method for an operation in the electronic device. The electronic device may include: an elongated housing comprising a first end and a second end; a dielectric tip disposed at the first end; a button arranged on an outer surface of the housing; a first circuit connected to the dielectric tip and configured to receive a first electromagnetic signal from a touchscreen display of an external device and to transmit a second electromagnetic signal to the display of the external device; a second circuit configured to wirelessly receive and transmit a third signal; and a control circuit operatively connected to the first circuit and the second circuit. The control circuit may be configured to: detect pressing and/or touching of the button while the first electromagnetic signal is received through the first circuit and transmit the second electromagnetic signal while preventing the second circuit from transmitting the third signal; and detect pressing and/or touching of the button without receiving the first signal through the first circuit and transmit the third signal while the second signal is not transmitted. | 2021-07-29 |
20210234953 | REMOTE RECORDING AND DATA REPORTING SYSTEMS AND METHODS - Remote recording and data reporting apparatuses and methods, such as for enhancing personal security, are disclosed. Embodiments include a data processor, a microphone configured to detect audio signals and provide the audio signals to the data processor, a memory module configured to store one or more personal security response operations, and a communications module configured to transmit a personal security alert. A personal security procedure includes receiving an initiation signal, enabling the microphone in response to the receiving of the initiation signal, and detecting a spoken keyword which initiates one of the one or more personal security response operations and initiates recording of subsequent audio signals. Embodiments further include transmitting the personal security alert to a remote device. | 2021-07-29 |
20210234954 | TRANSMITTING A MEDICAL ALERT DIRECTLY TO AN EMERGENCY DISPATCH OFFICE - A method for enabling a user to transmit a medical alert. The method includes providing a cellular device that includes at least one user actuatable button, a wireless communication module, and a SIM card reader. A limited use SIM card may be provided that is insertable into the SIM card reader. The method further includes providing call initiation software on the cellular device that enables a user to associate a phone number, a user actuatable button such that, upon actuating the user actuatable button, the call initiation software may retrieve a phone number from a data store, connect to a cellular network, and establish a communication link with a call recipient by dialing the phone number. Also disclosed are methods and devices for transmitting a medical alert. | 2021-07-29 |
20210234955 | SYSTEM AND METHOD FOR LIMITING MOBILE DEVICE FUNCTIONALITY IN A GEOGRAPHIC AREA - A method and system for limiting mobile device functionality when the mobile device is located in a pre-defined fixed geographic area. The mobile device may receive a local disabling signal from a disabling device, which, when detected by a Device Owner Application resident on the mobile device, limits the mobile device functionality. Alternatively, the system may use GPS based geofencing to determine that the mobile device is in a predefined geographic area, and then transmit instructions to the mobile device, where a Device Owner Application operates to restrict the mobile device functionality. Mobile device functionality may be limited by restricting the mobile device's ability to send and receive text messages, email messages and phone calls; restricting the mobile device's ability to respond to user input; restricting the mobile device's ability to utilize a web browser; and restricting the mobile device's web browser from accessing predetermined web sites. | 2021-07-29 |
20210234956 | CONTROLLING A GRAPHICAL USER INTERFACE FOR WORKFLOW - Embodiments provide a method for providing a call center supplemental workflow tool, including: receiving from a database a workflow decisional matrix, a plurality of questions, and a plurality of scripts; displaying a web-based graphical user interface on a display providing at least one question or one script; receiving user input; determining, at least another question or at least another script, to be displayed, wherein determining is based upon the user input and the decisional matrix and advances the workflow; based upon the decisional matrix, determining that the workflow has been completed; providing an output of the questions displayed and the user input received; and the output being provided to a primary software application. Other aspects are described and claimed. | 2021-07-29 |
20210234957 | AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION - An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use. | 2021-07-29 |
20210234958 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A communication apparatus includes a user signal transmission unit that transmits a user signal required for an end user to perform communication; a manager function implementing unit that implements a function provided to a manager of the present apparatus; a license monitoring unit that monitors a license of the present apparatus, and outputs a function limitation signal when the license has expired; and a function limitation unit that limits the function implemented by the manager function implementing unit when receiving the function limitation signal. In a communication apparatus that transmits a user signal required for an end user to perform communication, a function of the apparatus is limited when a relevant license has expired, while preventing an influence of the limitation upon the end user. | 2021-07-29 |
20210234959 | SEMIAUTOMATED RELAY METHOD AND APPARATUS - A system includes a first user device configured to perform captioning session operations, a call-assistant (CA) device remote from the first user device, and a remote relay server separate from the CA device. The relay server initiates a captioning process, receives, from the first user device, a request to initiate a captioning session, establishes the session, assigns the session to the CA, receives first audio data from the first user device derived from a second user device, directs the first audio data to the CA device, receives, from the CA device, second audio data related to the first audio data and derived from CA speech, accesses an ASR engine trained to the CA voice, generates captioned text including a transcription of the second audio data, generates screen information including the transcription, directs the screen information to the CA device, and directs the captioned text to the first user device. | 2021-07-29 |