34th week of 2022 patent applcation highlights part 74 |
Patent application number | Title | Published |
20220272096 | MEDIA DATA BASED USER PROFILES - An image of users of an application may be received from a computing device on a home network. The image may comprise representations of a group of users. Recognition techniques may be applied to the image. Unclaimed profiles may be created for users who are not recognized. The unclaimed profiles may be utilized by applications prior to being claimed by a user or group. Access to the unclaimed profiles may be controlled based on the identity of the network gateway used in the transmission of the image used as the basis for forming the profile. | 2022-08-25 |
20220272097 | SYSTEMS AND METHODS FOR DELEGATING ACCESS TO A PROTECTED RESOURCE - A method for managing access privileges is disclosed. The method includes: obtaining employee hierarchy data associated with an organization; identifying a change in access privileges associated with at least one employee for a protected resource, the identifying including: determining first permissions data indicating current access privileges associated with one or more employees for the protected resource based on the employee hierarchy data; comparing the first permissions data with stored second permissions data that indicates previously granted access privileges associated with the one or more employees for the protected resource; and identifying a difference in access privileges associated with at least one employee based on the comparing, determining that the change in access privileges associated with the at least one employee requires approval from an authorized permissions management entity; and configuring an account at the protected resource that is associated with the authorized permissions management entity to present options for approving the change in access privileges associated with the at least one employee. | 2022-08-25 |
20220272098 | EXTENDED DOMAIN PLATFORM FOR NONMEMBER USER ACCOUNT MANAGEMENT - A device including a processor and a memory, in which the memory includes executable instructions for detecting that a first user has invited a second user to a communication session, wherein the first user is associated with a first user account registered to a first domain platform and the second user is not associated with any of user accounts registered to the first domain platform, the first domain platform defining a first user privilege granted to the user accounts registered to the first domain platform; causing a second user account associated with the second user to be created and registered to a second domain platform, the second domain platform being different from the first domain platform and defining a second user privilege granted to user accounts registered to the second domain platform; and granting the second user account the second user privilege. | 2022-08-25 |
20220272099 | SYSTEM FOR ENHANCED RECONFIGURATION OF ACCESS MANAGEMENT PROTOCOLS - Systems, computer program products, and methods are described herein for enhanced reconfiguration of access management protocols. The present invention is configured to electronically receive, via a first communication channel, a user request from a user to reconfigure an access management protocol; initiate, via the first communication channel, an access identifier request to the user; electronically receive, via the first communication channel, an access identifier in response to the access identifier request; initiate, via a preferred communication channel, an access reconfiguration protocol to the user to confirm the user request to reconfigure the access management protocol; electronically receive, via the preferred communication channel, a user confirmation to reconfigure the access management protocol in response to the access reconfiguration protocol; and implement one or more actions to initiate the reconfiguration of the access management protocol in response to receiving the user confirmation. | 2022-08-25 |
20220272100 | Network architecture providing device identification and redirection using whitelisting traffic classification - Systems and methods include monitoring packets, by a network edge device, from one or more endpoint devices where the packets are destined for corresponding application services in a network; classifying the one or more endpoint devices based on the monitoring into a corresponding trust level of a plurality of trust levels; and, responsive to a first endpoint device of the one or more endpoint devices being untrusted, steering the packets from the first endpoint device into a restricted zone. | 2022-08-25 |
20220272101 | LOCATION IDENTIFICATION IN MULTI-FACTOR AUTHENTICATION - Disclosed herein are system, method, and device embodiments for implementing location identification in multi-factor authentication (MFA). In an example embodiment, a user service may present a geographic map based on a MFA process, and receive an authentication attempt including a geographic indicator and interaction information. Further, the system may determine whether the authentication attempt was made by a human based at least in part on the interaction information, determine whether the geographic indicator matches an expected response, and send, to an electronic device, an authentication result indicating whether geographic information was determined to be selected by a human and the geographic indicator was determined to match the expected response. | 2022-08-25 |
20220272102 | Creating Network-Based Consent Contracts - Techniques for creating consent contracts for devices that indicate whether the devices consent to receiving network-based communications from other devices. Further, the techniques include enforcing the consent contracts such that network-based communications are either allowed or disallowed in the network-communications layer prior to the network communications reaching the devices. Rather than simply allowing a device to communicate with any other device over a network, the techniques described herein include building in consent for network-based communications where the consent is consulted at one or more points in a communication process to make informed decisions about network-based traffic. | 2022-08-25 |
20220272103 | ADAPTIVE ACCESS CONTROL TECHNOLOGY - A method and system for processing an access request are provided. The method includes displaying authorized resources of a user, receiving an access request for a resource based on a user selection, prompting the user to confirm the requested access for the resource, receiving a confirmation from the user for the requested access for the resource, and applying a corresponding security permission based on the received confirmation. | 2022-08-25 |
20220272104 | AUTHORIZATION SERVER, SYSTEM, AND METHOD FOR SYSTEM - After receiving an authorization result from a user, an authorization server sets a deadline for re-authorization, performs wait processing until the deadline, and thereafter issues an access token. | 2022-08-25 |
20220272105 | BLOCKCHAIN-BASED DATA DETECTION METHOD, APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM - This application discloses a blockchain-based data detection method performed by a computer device. The method includes obtaining respective block verification results of at least two consensus nodes for a to-be-verified block; counting valid verification results and invalid verification results among the respective block verification results of the at least two consensus nodes; determining a target verification result for the block according to the counts, comparing the target verification result with the respective block verification results of the at least two consensus nodes for the block, and updating a historical quantity of abnormal verifications corresponding to each consensus node according to a result of the comparison, to obtain a target quantity of abnormal verifications of each consensus node counted by the target consensus node; and determining an abnormal consensus node among the at least two consensus nodes according to the target quantity of abnormal verifications counted by the target consensus node. | 2022-08-25 |
20220272106 | REMOTE ATTESTATION METHOD, APPARATUS, SYSTEM, AND COMPUTER STORAGE MEDIUM - This application discloses a remote attestation method, applied to a remote attestation system, where the remote attestation system includes a plurality of RA servers and a plurality of network devices, and the method is performed by any one of the plurality of network devices. In the method, the network device obtains an integrity measurement value of a measurement object in the network device, and sends the integrity measurement value of the measurement object to at least one of the plurality of RA servers, so that the at least one RA server performs remote attestation on integrity of the measurement object in the network device. This implements reliable integrity attestation in an open cross-vendor system. | 2022-08-25 |
20220272107 | IMPEDING LOCATION THREAT PROPAGATION IN COMPUTER NETWORKS - A computer implemented method to block malware propagation in a network of computer systems, each computer system in the network having associated location information indicating a physical location, by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a physical location at which one or more computer systems are involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems; colocation of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the physical location so as to block propagation of the malware through the network. | 2022-08-25 |
20220272108 | BOT HUNTING SYSTEM AND METHOD - The system and method may look for bots using statistics. At a high level, bots communicate back and forth to a command and control computer. The communications are at somewhat random times by design to not be obvious. Using expected probability of a normal distribution rather than simply analyzing time of communications may result in better bot recognition. | 2022-08-25 |
20220272109 | AUTOMATED EXTRACTION AND CLASSIFICATION OF MALICIOUS INDICATORS - Techniques for generating actionable indicators of compromise (IOCs) are disclosed. A set of potential sources for IOCs are received. One or more candidate IOCs are extracted from at least one source included in the set of potential sources. An actionable IOC is automatically identified from the one or more candidate IOCs. The actionable IOC is provided to a security enforcement service. | 2022-08-25 |
20220272110 | SYSTEMS AND METHODS OF CREATING NETWORK SINGULARITIES AND DETECTING UNAUTHORIZED COMMUNICATIONS - Systems and methods of creating a network singularity for a network connected device deployed over a shared network, analyzing the shared network traffic to detect unauthorized communication, and implementing security and access control for the network singularity. Systems and methods for creating network subnet for the network singularity, detecting unsolicited response to and from the network singularity, and discarding the unsolicited response to interrupt unauthorized communication. | 2022-08-25 |
20220272111 | CLOUD-PLATFORM PUSH FOR KNOWN DATA BREACHES - In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network. | 2022-08-25 |
20220272112 | DETECTING A MISSING SECURITY ALERT USING A MACHINE LEARNING MODEL - Methods, systems, and apparatuses are provided for detecting a missing security alert by receiving an alert sequence generated by a network security provider, applying the received alert sequence to a security incident model, receiving an indication from the security incident model that the received alert sequence corresponds to a security incident defined by a predetermined sequence of alerts that includes at least one alert missing from the received alert sequence, and generating a notification to the network security provider that indicates at least one of the security incident or the missing alert(s). In addition, the security incident model may be generated by providing a set of historical alerts and a set of historical security incidents to a machine learning algorithm to generate the security incident model. | 2022-08-25 |
20220272113 | SECURITY SERVER FOR DYNAMIC VERIFICATION OF WEB CONTENT, END USERS REMOTE DEVICE, SYSTEM COMPRISING SAID END USERS REMOTE DEVICE AND SERVER, AND METHOD IMPLEMENTED BY SAID SYSTEM - A security server for dynamic verification of web content located on a platform in the cloud or in the edge which runs artificial intelligence (AI) algorithms including a collector receiving collection of user interactions from an adapted browser of a remote to simulate content of pages loaded on the device based on user interactions from an adapted browser located on the end-user device navigating on the web and for sampling the outcome of these interactions at irregular time intervals, this sample resulting a fixed image such as JPG or PNG, a data mining and artificial intelligence (AI) algorithm relying on image processing executed while sample interval to detect object or patterns on the displayed content, a heartbeat generator generates heartbeat at regular interval and transmits at a continuous interval to the end-user's device to indicate to the adapted browser of the device it may display the content. | 2022-08-25 |
20220272114 | COMMUNICATIONS METHODS AND APPARATUS FOR DYNAMIC DETECTION AND/OR MITIGATION OF ANOMALIES - The present invention relates to communications methods and apparatus dynamically detecting and/or mitigating anomalies in communications systems/networks. An exemplary method embodiment includes the steps of: (i) storing a set of N key performance indicator (KPI) models; (ii) associating each of a plurality of recurring time slots of a recurring time frame on a per group member basis with one of the N KPI models wherein the associating including associating a first group member of a first group and a first recurring time slot with a first one of the N models, the first one of the N models being a first model; (iii) receiving event data for the first group member for a first time period; and (iv) determining based on the first model if a key performance indicator value for the first group member and first time period is anomalous. | 2022-08-25 |
20220272115 | PREDICTING CYBER RISK FOR ASSETS WITH LIMITED SCAN INFORMATION USING MACHINE LEARNING - Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level. | 2022-08-25 |
20220272116 | SYSTEMS AND METHODS FOR NETWORK DEVICE DISCOVERY AND VULNERABILITY ASSESSMENT - Various embodiments are discussed that provide systems and methods for identifying possible unsecured devices on a network. In some cases, embodiments discussed relate to systems and methods for identifying possible unsecured devices; clustering the identified devices with other similar devices, and/or determining default or simplified access processes for a given cluster of the identified devices. | 2022-08-25 |
20220272117 | CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICES - Certain edge networking devices such as application gateways may report status to a cloud-based threat management platform using a persistent network connection between the gateway and the cloud platform. Where a cloud computing platform for an edge networking device or the treat management platform imposes periodic timeouts, the threat management platform may monitor connects and disconnects for edge devices and asynchronously evaluate connection status of edge devices independently of a heartbeat or other signal through the persistent connection in order to distinguish periodic timeouts imposed by the cloud computing platform from networking devices that are compromised or malfunctioning. | 2022-08-25 |
20220272118 | COMPREHENSIVE RISK ASSESSMENT - Systems, methods, and related technologies for determining a comprehensive risk score or value are described. The risk score determination may include selecting an entity communicatively coupled to a network and determining a cyber-attack likelihood value and a cyber-attack impact value associated with the entity. A cyber-attack risk may then be determined based on the cyber-attack likelihood value and a cyber-attack impact value associated with the entity. An operational failure likelihood value and an operational failure impact value associated with the entity can be determined. An operational failure risk based on the operational failure likelihood value and the operational failure impact value associated with the entity can be determined. A risk value may then be determined for the entity based on the cyber-attack risk and the operational failure risk and the risk value for the entity can be stored. | 2022-08-25 |
20220272119 | PROTECTION SYSTEM OF INFORMATION NETWORKS AND RELEVANT SECURITY PROCEDURE - Disclosed is a security system against an attack and/or cyber threat carried out over an information network having at least one or more hosts and/or one or more clients and possibly connected to an Internet network and/or other types of networks. The security system is able to recognize the attack and/or cyber threat and to implement a consequent countermeasure. The security system constitutes one of the clients and has a connection to the information network, an electrical supply thereof, at least one socket adapted to the electrical connection of one or more of the hosts and/or clients of the same information network and an electrical supply cutoff for the one or more hosts and/or clients connected thereto. | 2022-08-25 |
20220272120 | SYSTEMS AND METHODS FOR MITIGATING CYBERATTACKS - Systems and methods for mitigating cyberattacks are described herein. A computing system can detect illegitimate network traffic associated with a cyberattack in network traffic. The computing system can determine an amplification factor of the cyberattack based in part on a probability distribution of the illegitimate network traffic. The computing system can determine a filter to demotivate a generation of the illegitimate network traffic. The determined filter can reduce the amplification factor of the cyberattack. The computing system can implement the determined filter to block the illegitimate network traffic. | 2022-08-25 |
20220272121 | Methods and Systems for Injection Detection to Secure Against an Injection Attack - An illustrative injection detection system receives a text statement that includes a set of text elements and implements instructions for performing an operation with respect to a data structure. The system identifies a target risk element count equal to a number of risk elements preapproved to occur within the set of text elements of the text statement. The system also determines a detected risk element count equal to a number of risk elements that occur within the set of text elements of the text statement. If the system detects a violation of a predetermined rule defining an acceptable relationship between the target and detected risk element counts for the text statement, the system triggers an exception condition indicating a risk that the text statement corresponds to an injection attack on the data structure. Corresponding methods and systems are also disclosed. | 2022-08-25 |
20220272122 | AUTONOMOUS VEHICLE CONTROL ATTACK DETECTION AND COUNTERMEASURES - The present subject matter provides improved solutions for autonomous vehicle malicious control attacks. One technical solution for detecting and mitigating autonomous vehicle malicious control attacks includes receiving a malicious control signal, determining signal characteristics based on the malicious control signal, determining an autonomous vehicle attack based on signal characteristics, determining an attack countermeasure based on the attack determination, and sending a modified autonomous vehicle control signal to an autonomous vehicle based on the attack countermeasure. This solution may further include sending the signal characteristics to an autonomous vehicle attack machine learning (ML) system and receiving ML signal characteristics from the autonomous vehicle attack ML system, where the attack determination is based on the ML signal characteristics. This solution may further include sending the attack determination to the autonomous vehicle attack ML system and receiving the ML attack determination from the autonomous vehicle attack ML system, where the generation of the attack countermeasure is further based on the ML attack determination. | 2022-08-25 |
20220272123 | METHOD AND SYSTEM FOR PROTECTING A CHECKOUT TRANSACTION FROM MALICIOUS CODE INJECTION - A computer-implemented method for detecting malicious code injection into checkout operations, the method including receiving a report regarding a checkout operation; determining based on the report that a checkout operation includes one or more events satisfying a first criterion; determining that a modification of customizable software code related to the checkout operation satisfies a second criterion; and responsive to the satisfaction of the first criterion and the second criterion, providing an indication of a detection of a potential malicious code injection into the checkout operation. | 2022-08-25 |
20220272124 | USING MACHINE LEARNING FOR DETECTING SOLICITATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) - Systems and methods for identifying solicitations of personally identifiable information (PII) are disclosed. An example method includes generating training data based on historical transcript data corresponding to solicitations of PII in historical support call transcripts, training a neural network, using the training data, to identify solicitations of PII in support call transcripts, and processing the trained neural network for deployment. | 2022-08-25 |
20220272125 | SYSTEMS AND METHODS FOR MALICIOUS URL PATTERN DETECTION - A system for identifying and classifying malicious URLs comprising one or more processors having access to program instructions that when executed generate a queue module configured to receive a file including a potentially malicious URL from a source, a feature selector module configured to select features of interest to identifying URLs extracted from the file, a vectorizing module configured to generate vectorized feature data from the features, a feature generation module configured to generate URL data features with reduced dimensionality from the vectorized data using autoencoding techniques, a model handler module configured to select an artificial intelligence/machine learning (AI/ML) model to analyze the URL data features with reduced dimensionality, to transmit the model for execution, and to receive the results of the execution of the selected AI/ML model, and a visualizer module configured to provide a rendering of results of the execution of the selected AI/ML model. | 2022-08-25 |
20220272126 | MONITORING OF JAVASCRIPT OBJECT PROPERTIES FOR DETECTION OF WEB BROWSER SECURITY THREATS - Detection of a security threat to a web browser by: Wrapping a suspect JavaScript code with a detection JavaScript code, wherein, when the wrapped suspect JavaScript code is executed in a web browser, the detection JavaScript code indirectly monitors access to a property of a non-writable, non-configurable JavaScript property, to detect an attempt by the suspect JavaScript code to perform a malicious action in the web browser. Executing the wrapped suspect JavaScript code in the web browser, to effect the monitoring and the detection. | 2022-08-25 |
20220272127 | AUTOMATIC INSERTION OF SECURITY POLICIES FOR WEB APPLICATIONS - Techniques to facilitate automatic insertion of security policies for web applications are disclosed herein. In at least one implementation, security configuration information for a web application is received. A web request for a web resource is received and processed to determine an HTTP security header for insertion into a web response to the web request based on properties of the web request. The web response is intercepted and the HTTP security header is inserted into the web response to generate a modified web response. The web response is processed to determine a security enhancement to apply to the web resource based on the security configuration information. The security enhancement is applied to the web resource to generate a modified web resource. The modified web response and the modified web resource are provided to a client application in response to the web request for the web resource. | 2022-08-25 |
20220272128 | ZERO-TRUST DECENTRALIZED CYBERSECURITY ARCHITECTURE FOR ENDPOINT DEVICES - The present invention provide a zero-trust decentralized cybersecurity architecture solution. This zero-trust decentralized cybersecurity architecture should cover features like least privilege access control, two-factor authentication, and support secure messaging, support secure emailing, detecting phishing support secure notifications with preserving confidentiality, integrity and non-repudiation. The zero-trust decentralized cybersecurity architecture solution using blockchain technology addresses cybersecurity requirements to build up a secure collaborative environment between enterprises, internally and externally. Integrating blockchain technology (as the core of the present invention) provides a zero-trust decentralized cybersecurity architecture. The present invention has no central core and has no dependency on 3rd parties (decentralized). Therefore, each node needs to prove its reliability through cybersecurity measures integrated into the present invention (zero-trust). The proposed zero-trust decentralized cybersecurity architecture (the present invention solution) is enriched with: 1) two-factor authentication, secure emailing/messaging/notification and 2) secure file sharing and access management based on role-based access control (RBAC) mechanism. | 2022-08-25 |
20220272129 | TRAFFIC CAPTURE MECHANISMS FOR INDUSTRIAL NETWORK SECURITY - According to various embodiments, a networking device in a network receives traffic from the network. The networking device duplicates the traffic into a duplicate traffic copy. The networking device encapsulates the duplicate traffic copy into a multicast frame. The networking device sends, via a multicast address, the multicast frame to a network sensor in the network for analysis, wherein the multicast address is reserved in the network for traffic analysis. | 2022-08-25 |
20220272130 | METHOD AND APPARATUS FOR MATCHING USERS, COMPUTER DEVICE, AND STORAGE MEDIUM - A method and apparatus for matching users, a computer device, and a storage medium are provided. The method includes: receiving a matching request sent by a first user; searching, in response to the matching request, second users adapted to the first user; selecting a second user of the second users as a target user according to the second link value to create a voice session with the first user; recording behavior data between the first user and the target user in the voice session; and updating a first link value and a second link value of the target user according to the behavior data and the second link value of the target user. The method and apparatus for matching users can greatly reduce cost and improve efficiency. | 2022-08-25 |
20220272131 | METHOD, ELECTRONIC DEVICE AND SYSTEM FOR GENERATING RECORD OF TELEMEDICINE SERVICE - According to an aspect of the present disclosure, a method for generating a record of a telemedicine service in a video call between at least two terminal devices is disclosed. The method includes obtaining authentication information of a user authorized to use the telemedicine service, receiving a sound stream of the video call from a terminal device of the at least two terminal devices, detecting a voice signal from the sound stream, verifying whether the voice signal is indicative of the user based on the authentication information, upon verifying that the voice signal is indicative of the user, continuing the video call to generate the record of the telemedicine service, and upon verifying that the voice signal is not indicative of the user, interrupting the video call. | 2022-08-25 |
20220272132 | COGNITIVE ENCAPSULATION OF GROUP MEETINGS - An embodiment includes identifying which of a plurality of participants of a web conference is an identified participant associated with a selected cluster of a plurality of clusters of audio feed data of an audio feed of the web conference based on a self-introduction in the selected cluster. The embodiment also generates a first preliminary leadership score for the identified participant based on a speaking duration value associated with the identified participant and generates a second preliminary leadership score for the identified participant using a selected video segment as an input for a machine learning classifier model. The embodiment calculates a final leadership score for the identified participant based on the first and second preliminary leadership scores. The final leadership score is representative of a likelihood that the identified participant is a supervisor, and is indicative of the identified participant being a supervisor if it exceeds a designated threshold value. | 2022-08-25 |
20220272133 | METHOD AND SYSTEM FOR SUPPORTING SHARING OF EXPERIENCES BETWEEN USERS, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A method for supporting experience sharing between users is provided. The method includes the steps of: acquiring spatial information on a shared content for experience sharing; providing a user with the shared content in a virtual space created with reference to the spatial information on the shared content; and in response to the user creating an authored content in the virtual space, sharing the authored content with respect to a location matched with a location where the authored content is created in the virtual space. | 2022-08-25 |
20220272134 | AUTOMATIC ISSUE IDENTIFICATION AND STATUS NOTIFICATION OF SCREENSHARING IN A VIRTUAL MEETING - A system and method for automatically detecting issues during screensharing in an online meeting. The system and method allow automatic status notification of screensharing, which facilitates efficient and convenient use of virtual meetings. The system and method also use a live status indicator to provide constant and continuous data about the health of the ongoing screensharing session, which prevents computer and network resources waste on status inquiries. The system and method also recognize a problem/issue of the content-sharing and provide virtual meeting participants real-time action guidance to optimize the quality of content-sharing. | 2022-08-25 |
20220272135 | INTERACTIVE EVENT VIEWING METHOD AND SYSTEM - Disclosed herein are a system and method for interactive event viewing. The system includes a plurality of servers communicatively coupled to a plurality of data sources. A plurality of users participate in more or more online events via one or more user devices. The system also includes a plurality of financial partners communicatively coupled to the system. The servers execute a method that includes receiving data from the plurality of data sources, converting the data into a video and audio feed, and providing the video and audio feed to the participants. | 2022-08-25 |
20220272136 | CONTEXT BASED CONTENT POSITIONING IN CONTENT DELIVERY NETWORKS - A set of nodes of a content delivery network are weighted according to an effect of a node on a network. A data points parameter specifying a number of nodes constituting a cluster is set according to a policy. A subset of the weighted nodes is clustered according to the data points parameter. A cluster comprises nodes having a content access history similarity greater than a threshold similarity. A structured representation of a natural language document is positioned at a node within the cluster, the positioning determined by evaluating a similarity between the structured representation and a content access history of the node. | 2022-08-25 |
20220272137 | APPARATUS FOR LIGHT WEIGHTED SETTING SPATIAL DATA OF 3D MODELING DATA AND VIDEO MONITORING - A method of setting spatial information for defining a space in the shape of dimensional data or property information including relationship information between objects installed in the space is defined, and a video monitoring apparatus is set to be linked to the defined method. Then, based on the same, a video captured by a video monitoring apparatus provided in a space may be efficiently output on the web. Therefore, various functions may be performed in which 3-dimensional spatial information and video monitoring are linked in a very easy way. | 2022-08-25 |
20220272138 | INTELLIGENT AND NEAR REAL-TIME MONITORING IN A STREAMING ENVIRONMENT - The present invention is directed to intelligent and near real-time monitoring in a streaming environment. In embodiments, a streaming platform streams raw data from raw data capture devices, where the raw data is contextually enriched using multiple information sources. A rule execution operator, integrated within the streaming platform, detects events by executing rules against the contextually enriched data. The rules applied are customizable, flexible, multivariate, and dynamically responsive to changing information. When an event is detected, an action can be instantiated in response to the event detection and/or newly derived information. The action and/or instructions for performing the action are communicated to external sources, where the action can be initiated and/or completed. Accordingly, actions are instantiated in near real time relative to the initial receipt of raw data from which the events were detected. Actions may be delayed using sophisticated temporal reasoning, in some embodiments. | 2022-08-25 |
20220272139 | Systems and Methods for Content Transmission - Aspects of the disclosure relate to transmitting content throughout a distribution network. For example, a computing device may generate data packets and attribute packets, and transmit the data packets and attribute packets to one or more user devices. The attribute packets may comprise information that enables validation and storage after the data packet is reassembled by the receiving device. | 2022-08-25 |
20220272140 | Streamlined Delivery of Video Content - A content delivery server may provide content to a requesting client device using a streamlined HTTP enhancement proxy delivery technique. For example, an HTTP proxy server may receive a request for video content or a fragment of video content from a client device. The request may be associated with a timeout scheduled to occur if no content has been received after a specified amount of time. The server may then transmit a request for the content to a remote server, such as an upstream cache server in the proxy server's CDN. When the proxy server receives a portion of the requested content from the remote server, the proxy server begins transmitting the portion to the client device before the requested content has been completely received and buffered. The client device may then begin receiving data from the proxy server before timeout has occurred. | 2022-08-25 |
20220272141 | WORD-BASED REPRESENTATION OF COMMUNICATION SESSION QUALITY - The technology disclosed herein enables user notification of word inconsistencies to indicate session quality. In a particular embodiment, a method includes, during a communication session between a first endpoint operated by a first participant and a second endpoint operated by a second participant, determining a first number of words spoken by the first participant during a period of time based on sound captured by the first endpoint for inclusion on the communication session. The method also includes determining a second number of the words spoken by the first participant during the period of time based on audio received at the second endpoint via the communication session. Upon determining that an inconsistency exists between the first number and the second number, the method includes notifying at least one of the first participant and the second participant about the inconsistency. | 2022-08-25 |
20220272142 | SYSTEMS AND METHODS FOR OPTIMIZATION OF TRANSMISSION OF REAL-TIME DATA VIA NETWORK LABELING - The present invention relates to systems and methods for network labeling in order to enhance real time data transfers. A network for a real time data transfer is identified and predictive models for network performance are compared against to determine if the network is suitable for the data transfer. If so, then the real time data transfer may be completed as expected. However, if the network is predicted to be unsuitable for transmission an alternate means for connection may be suggested. The alternate suggestion may include delaying the data transfer until the network is expected to be in better conditions, connecting to another access point in the network, or switching to another network entirely. During the data transfer, the quality of the network is monitored in order to update the predictive models for the network's quality. Identifiers for the network may be utilized to keep track of the networks. Network signal strength, signal pollution and time may also be tracked in order to identify patterns in the network's performance. | 2022-08-25 |
20220272143 | COMPUTER APPLICATION PROMOTION - A computer-implemented process includes providing a request to access content associated with a website; receiving web page information associated with the website, and data for displaying a notification that indicates availability of a native computer application that is associated with the website; providing a request to access information associated with the native computer application; receiving information associated with the native computer application that describes interactions between a plurality of users of an application marketplace and a component of the application marketplace that provides and receives information related to the native computer application; and displaying the descriptive information for viewing by a user, including displaying information that indicates the interactions between the plurality of users and the component of the application marketplace. | 2022-08-25 |
20220272144 | STEERING BETWEEN CONTENT STREAMING DEVICES USING DERIVED LINK METRICS AND CHANNEL UTILIZATION INFORMATION - A wireless gateway for steering a client device between content streaming apparatuses in a wireless local area network (WLAN). The gateway provides an access point (GW AP) including a gateway steering controller configured to determine whether a client device should be steered to a content streaming apparatus based on at least one sample measurement on received signal strength between the client device and the content streaming apparatus and at least one other content streaming apparatus, and conduct steering logic calculations. The steering logic calculations are compared against predetermined thresholds, and said gateway steering controller provides an instruction to steer the client device to one of the content streaming apparatuses based on a difference between the steering logic calculations and the predetermined thresholds. Optionally, the gateway steering controller may also provide band steering as well as signal strength steering. | 2022-08-25 |
20220272145 | METHOD FOR REQUESTING RESOURCES AND TERMINAL - The present disclosure provides a method for requesting resources and a terminal. The terminal sends a first resource acquisition request for a target resource to each of first edge nodes, determines each of second edge nodes based on each first amount of the target resource returned by each of the first edge nodes, and sends a second resource acquisition request for the target resource to each of the second edge nodes. | 2022-08-25 |
20220272146 | POINT OF PRESENCE MANAGEMENT IN REQUEST ROUTING - A system and method for the management of client computing device DNS queries and subsequent resource requests within a content delivery network service provider domain are provided. The management of the DNS queries can include the selection of computing devices corresponding to various Point of Presence locations for processing DNS queries. Additionally, the management of the content requests can include the selection of computing devices corresponding to resource cache components corresponding to various Point of Presence locations for providing requested content. The selection of the computing devices can incorporate logic related to geographic criteria, testing criteria, and the like. | 2022-08-25 |
20220272147 | SYSTEMS AND METHODS FOR AUTOMATED, CONTROLLERLESS AND STATELESS NETWORK CONNECTION SELECTION BASED ON DISTRIBUTED SERVER INFORMATION - The invention is that of systems and methods for controllerless and distributed network connections to servers on a network by remote clients seeking their services. The invention comprises a server database where servers within a server group identified by a groupname may post unique identifiers (UIDs) for retrieval by group clients configured with the groupname, which may query the server database for server connection information such as uptime, downtime, and congestion in order to select a server for a preferential connection based on an overall availability profile as determined by the group client. The methods described herein eliminate a separate controller and thereby eliminate the single point of failure (SPOF) represented by connection controllers and load balancers in a network as are common in the current state of the art. Servers in the server group may periodically refresh their connection details to enable group client to server connections based on dynamic real-time updates, establishing a high-availability server group for the provision of services. | 2022-08-25 |
20220272148 | WEIGHTED AUTO-SHARDING - Methods, systems, and apparatus for automatic sharding and load balancing in a distributed data processing system. In one aspect, a method includes determining workload distribution for an application across worker computers and in response to determining a load balancing operation is required: selecting a first worker computer having a highest load measure relative to respective load measure of the other work computers; determining one or more move operations for a partition of data assigned to the first worker computer and a weight for each move operation; and selecting the move operation with a highest weight the selected move operation. | 2022-08-25 |
20220272149 | Content Delivery in Wireless Wide Area Networks - A base station or content delivery server in a wireless network is configured to receive wireless network topology information from each of a plurality of wireless user devices. The wireless network topology information indicates which wireless user devices are within radio communication range of each other. The base station or content delivery server is configured to respond to a request for content from a first wireless user device by using the wireless network topology information for selecting a second wireless user device that has the content and is within radio communication range of the first wireless user device. The base station or content delivery server can be configured to forward the request to the second wireless user device, send a resource identifier to the first wireless user device that identifies the second wireless user device, and/or transmit a radio resource allocation to the first wireless user device to create a peer-to-peer link with the second wireless user device. | 2022-08-25 |
20220272150 | LOAD BALANCING SYSTEM, LOAD BALANCING METHOD, AND NON-TRANSITORY RECORDING MEDIUM - A load balancing system, a load balancing method, and a non-transitory recording medium. The load balancing system includes a first client apparatus and a second client apparatus each of which communicates with a particular server among a plurality of servers through a load balancer that distributes load of the plurality of servers. The first client apparatus transmits to the load balancer, a request to the server to acquire identification information for identifying the particular server selected by the load balancer from among the plurality of servers, notifies the second client apparatus of the identification information of the particular server, the second client apparatus requesting the load balancer to connect to the particular server, and requests the load balancer to connect to the particular server using the identification information. | 2022-08-25 |
20220272151 | SERVER-SIDE RESOURCE MONITORING IN A DISTRIBUTED DATA STORAGE ENVIRONMENT - Apparatus and method for performing real-time monitoring of server-side resources required to satisfy a client-side request in a distributed data storage environment, such as in a cloud computing or HPC (high performance computing) network. A client device is configured to issue a service request to carry out a service application associated with one or more server nodes. A request scheduler forwards the service request from the client device to a selected server node associated with the service request. A service log accumulates entries associated with data transfer operations carried out by the server node responsive to the service request over each of a succession of time periods. A service monitor accumulates, for each of the succession of time periods, information associated with the data transfer operations. A monitor tool aggregates the cumulative information to provide an indication of server-side resources utilized to satisfy the service request. | 2022-08-25 |
20220272152 | POST-COPY MIGRATION CROSS CLUSTER SYNCHRONIZATION FOR POST-COPY MIGRATION OF VIRTUAL MACHINES - Systems and methods of the disclosure include: publishing, by a first host computer system of a computing cluster comprising a plurality of host computer systems running a plurality of virtual machines, a list of memory page identifiers, wherein each memory page identifier is associated with a corresponding content identifier; receiving, from a second host computer system of the computing cluster, a memory page request comprising a first memory page identifier; and sending, to the first host computer system, a first memory page identified by the first memory page identifier. | 2022-08-25 |
20220272153 | Policy-Based Programmable Internet of Things Devices - The concepts and technologies disclosed herein are directed to policy-based programmable Internet of Things (“IoT”) devices. An apparatus, for example, can include a device that includes an interface through which the device is to be connected to an asset. The asset can include one or more asset sensors. The device can include one or more device sensors, a network module, and a controller that executes instructions that cause the device to perform operations. In particular, the controller can execute instructions to cause the device to receive a device policy that instructs the device to collect device data from the device sensor(s) in accordance with a device ruleset. The device also can receive an asset policy that instructs the device to collect asset data from the asset sensor(s) in accordance with an asset ruleset. The device can collect the device data and the asset data in accordance with the device/asset policies. | 2022-08-25 |
20220272154 | REMOTE MANAGEMENT FOR A COMPUTING DEVICE - Examples are disclosed for remote management of a computing device. In some examples, a secure communication link may be established between a network input/output device for a computing device and a remote management application. Commands may be received from the remote management application and management functions may be implemented at the network input/output device. Implementation of the management functions may enable the remote management application to manage or control at least some operating parameters of the computing device. Other examples are described and claimed. | 2022-08-25 |
20220272155 | SYSTEMS AND METHODS FOR MANAGED CONNECTIVITY WALL OUTLETS USING LOW ENERGY WIRELESS COMMUNICATION - A system providing connectivity management is provided. The system comprises: a content management server configured to manage connectivity for a network; one or more central controllers configured to collect connectivity information for at least a portion of the network for use by the content management server; and at least one outlet having one or more ports for receiving one or more plugs, wherein connectivity information is communicated between the outlet and the central controller through one or more wireless communication interface. | 2022-08-25 |
20220272156 | AUTOMATICALLY SCALING A NUMBER OF DEPLOYED APPLICATION DELIVERY CONTROLLERS (ADCs) IN A DIGITAL NETWORK - There is provided a system and method for automatically scaling a number of deployed application delivery controllers (ADCs) in a digital network. The method is conducted at a destination controller provided or accessed by a server computer. The destination controller receives telemetry data from a plurality of ADCs managed by the server computer. The destination controller also receives multiple data transfer requests originating from a plurality of user devices that are connected to the destination controller. A number of currently deployed ADCs for handling network traffic originating from the plurality of user devices may be detected by the destination controller or by the system. The telemetry data is intelligently processed, and the number of deployed ADCs is automatically scaled, based on the received telemetry data, or based on an output of an Artificial Intelligence (AI) module. | 2022-08-25 |
20220272157 | OPTIMIZE MIGRATION OF CLOUD NATIVE APPLICATIONS IN A MUTLI-CLOUD ENVIRONMENT - A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud. | 2022-08-25 |
20220272158 | PROVING POSSESSION OF A COMMUNICATIONS DEVICE VIA A DIRECTED CONNECTION - Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to prove possession of a communications device, such as a mobile communications device. In a particular method, proving possession of a communications device may include receiving, from a client server, an indicator to indicate a communication services carrier servicing the communications device. The method may continue with generating a session identifier and a resource locator to direct the communications device to establish communications with an identity verifier at an address corresponding to the resource locator. The resource locator may be determined based, at least in part, on the indicator received from the client server. The method may additionally include the communications device transmitting one or more identifiers, determined, at least in part, from content stored within, or data derived from, memory of the communications device. | 2022-08-25 |
20220272159 | LOCATION-BASED DETERMINATIONS - A method for location-dependent determination comprises: determining, with one or more processors, a geographic location of a user's electronic device using first data; in response to determining the determined geographic location is insufficient for performing a location-dependent determination, requesting second data to determine an updated geographic location of the user's electronic device; performing, with an Application Programming Interface (API), the location-dependent determination based on the updated geographic location; and completing, with the API, a transaction using the location-dependent determination. | 2022-08-25 |
20220272160 | UNIFORMITY OF INSTRUCTIONS FOR CONTENT REQUESTS AND RESPONSES IN A CONTENT DELIVERY NETWORK - Examples described herein relate to standardizing content requests and responses in a content delivery network (CDN). An edge node receives a control object including sets of instructions each implementing portions of a customer's business logic. The edge node may receive, from a client, a content request identifying a content item, and may apply a set of the instructions which causes the edge node to (i) determine whether any changes are needed for the benefit of a cache server and whether any changes are need for the benefit of an origin server, and (ii) generate a processed client request identifying the content item and including, if needed, any changes for the benefit of the cache server and the origin server. The edge node transmits the processed client request to the cache server, receives a response from the cache server, and transmits a processed client response to the client. | 2022-08-25 |
20220272161 | METHOD AND DEVICE FOR DISPLAYING GROUP - A group display method includes in response to a group display operation triggered by a user account, obtaining a candidate group set to be displayed, and obtaining, according to group attribute information of each candidate group in the candidate group set, a group recommendation index corresponding to each candidate group, the group attribute information including at least setup time and a flow parameter of the candidate group. The method also includes selecting, according to the group recommendation indexes, a target group from the set of candidate groups for display. | 2022-08-25 |
20220272162 | IOT DEVICE READING TRANSFORMATIONS - Apparatus and associated methods relate to transformations of data provided by an Internet of Things (IoT) device. A processor defines a data transformation corresponding to data transmitted by the IoT device in an IoT system. The data transformation includes a definition of a transformation of data from a first format to a second format and an identification (ID) of the IoT device. The processor then compiles the data transformation to produce compiled executable code for performing the data transformation. The processor registers the compiled executable code for the data transformation as an available transformation for various components of the IoT system. The processor facilitates execution of the compiled executable code so as to perform the data transformation upon a data stream provided by the IoT device. | 2022-08-25 |
20220272163 | REMOTE NETWORK MANAGEMENT INFRASTRUCTURE FOR CLOUD-BASED DEPLOYMENTS - A software architecture within a public cloud network may include units of: (i) a plurality of computational instances respectively related to managed networks, (ii) a plurality of servers configurable as load simulators, (iii) administrative components configured to deploy and update the software architecture, and (iv) shared infrastructure services, wherein the units of the software architecture are implemented on virtual machines of the public cloud network and are connected to but logically isolated from one another by way of different access controls or policies. A provider network, coupled to the software architecture by way of network gateways within the shared infrastructure services, may be configured to deliver the configuration, software packages, and database schema to the infrastructure-as-code platform. | 2022-08-25 |
20220272164 | EXPERIENCE SHARING SYSTEM AND EXPERIENCE SHARING METHOD - An experience sharing system is configured to share an experience between a request user terminal and an execution user terminal. The experience sharing system includes an accepter, an experience sharing determiner, an information acquirer, and a distributor. The accepter is configured to accept each of request information related to a request of the experience from the request user terminal and execution information related to performing the experience from the execution user terminal. The experience sharing determiner is configured to determine the experience to be shared between the request user terminal and the execution user terminal based on the request information and the execution information. The information acquirer is configured to acquire shared information when the shared information including a voice or an image to share the experience is acquired by the execution user terminal. The distributor is configured to distribute the shared information to the request user terminal. | 2022-08-25 |
20220272165 | Mechanism to Facilitate Signaling Traffic - Apparatuses, non-transitory program storage devices, and methods to implement a network function proxy are described. An example apparatus includes at least one non-transitory memory including computer program code configured with at least one processor to cause the apparatus to perform updating a profile including data associated with a producer network function in response to a registration request of the producer network function by adding a token identifier to a service identifier associated with a service of the producer network function, forwarding the updated profile to a network function repository function, wherein at least one internet protocol address is updated so that a proxy function is an endpoint for use of the service, storing and maintaining a mapping between the token identifier and the service of the producer network function, and providing the updated profile to a consumer network function in response to a discovery request for the service. | 2022-08-25 |
20220272166 | Method, Apparatus, and System for Implementing Service Function Deployment - A system for implementing service function deployment includes an active apparatus and a standby apparatus for a first service, such as an active main processing unit (MPU) and a standby MPU. The active apparatus is configured to process the first service and deploy a first function module (such as a feature extraction module or an inference module) for a second service (such as an artificial intelligence (AI) service) on the standby apparatus. The standby apparatus is configured to process data of the second service by using the first function module. The second service may be implemented by using an idle resource of the standby apparatus for the first service. | 2022-08-25 |
20220272167 | ELECTRONIC SYSTEM FOR COMBINATION OF TEMPORAL RESOURCE ACTIVITY DATA AND RESOURCE TRANSMISSION - Embodiments of the present invention relate to, in general, combination of temporal resource activity data and resource transmission. Typically, a system configured to concatenate time dependent sequential activity data structures such that resource transmission for an impending resource activity may be performed at an antecedent resource activity associated with the sequential activity data structures, is provided. In some embodiments, based on analyzing a trigger signal, the system is configured to identify a first resource activity initiated by the user. The system may then modify the first resource activity at the first networked device, in order to link a second resource activity with the first resource activity such that the second resource activity is initiated concurrently with the first resource activity prior to the second time interval associated with the second resource activity. | 2022-08-25 |
20220272168 | Prioritized Provision and Retrieval of Offline Map Data - Provided are methods, systems, devices, and tangible non-transitory computer readable media for offline mapping and navigation. The disclosed technology can determine a current region associated with a current location of a navigation device. Predicted travel destinations from the current region can be determined based on aggregated travel data. The aggregated travel data can include previous travel destinations from within the current region. Based on the current region and the predicted travel destinations, additional regions associated with the current region can be determined. Further, connectivity information can be determined based on network data. The connectivity information can be associated with network connectivity within the additional regions. The additional regions can be prioritized based on the connectivity information. Furthermore, portions of offline map data associated with the respective additional regions can be sent to the navigation device in an order partly based on the priority of the additional regions. | 2022-08-25 |
20220272169 | METHOD AND SYSTEM FOR MONITORING AND TRACKING BROWSING ACTIVITY ON A HANDLED DEVICE - A system and method for method for monitoring and tracking browsing activity of a user on a client device. The method includes generating, based on browsing activity information of a user interacting with at least a page displayed over the client device and page information identifying in part the page displayed over the client device, an exposure map at a page-level view, wherein the exposure map indicates a salience of each area of a page-view respective of the page displayed over the client device and visited by the user. | 2022-08-25 |
20220272170 | METHODS AND APPARATUS TO SHARE ONLINE MEDIA IMPRESSIONS DATA - An example method includes accessing a network communication at a database proprietor server, the network communication including one or more audience measurement entity cookie identifiers associated with one or more audience measurement entity cookies, the one or more audience measurement entity cookies from an audience measurement entity server and stored in a client device; generating one or more cookie mappings of the audience measurement entity cookies to respective one or more database proprietor cookies, the one or more database proprietor cookies from the database proprietor server and stored in the client device; and causing transmission of one or more re-direct messages to cause the client device to send the one or more cookie mappings in a batch to the audience measurement entity server, a re-direct message of the one or more re-direct messages including a first database proprietor cookie identifier and a first audience measurement entity cookie identifier. | 2022-08-25 |
20220272171 | METHOD AND APPARATUS FOR SUBSCRIBING TO RESOURCE - Provided in the present application is a method for subscribing to a resource that is applied in the Internet of Things, the method comprising: a subscribing device sends a request message to a target device, the request message requesting that a notification condition associated with the subscribing device be configured for the target device; and the subscribing device receives from the target device a response message for the request message. Since a notification condition configured by the target device for a target resource is a notification condition associated with the subscribing device, the subscribing device can thus configure a personalized notification condition, thereby increasing the degree of intelligence of an Internet of Things device. | 2022-08-25 |
20220272172 | VALUE-BASED DATA TRANSMISSION IN AN AUTONOMOUS VEHICLE - Value-based data transmission in an autonomous vehicle, comprising: acquiring sensor data from a plurality of sensors of the autonomous vehicle, the sensor data comprising a plurality of portions; determining, for each portion of the sensor data, a value based on one or more objects identified in the sensor data; determining, based on the values for the sensor data, an upload policy; and transmitting, based on the upload policy, one or more portions of the sensor data to a server. | 2022-08-25 |
20220272173 | SCALABLE SERVER-BASED WEB SCRIPTING WITH USER INPUT - Disclosed are techniques and apparatuses that are configured to receive an indication that a web browsing session executing on an enterprise server needs additional information based on a request for additional information being sent to a client device. The request may include an identifier of the web browsing session and an identifier of an enterprise server that initiated the web browsing session. A globally unique identifier related to the web browsing session and an identifier of the enterprise server is stored in a common data store. The web browsing session may be paused when the web browsing session requests additional information from a client device. The client device may respond with the additional information. The system may provide the identifier of the enterprise server to a load balancing component so the identified web browsing session executing on the enterprise server may continue to be used. | 2022-08-25 |
20220272174 | System and Method for Improving Internet Communication by Using Intermediate Nodes - A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both. The partition into slices may be overlapping or non-overlapping, and the same slice (or the whole content) may be fetched via multiple tunnel devices. | 2022-08-25 |
20220272175 | EFFICIENT PROCESSING METHOD ACCORDING TO RELOCATION OF APPLICATION SERVER IN 5G - According to the present specification, disclosed is a method for preventing the transmission of a negative response when an AF subscribed to a notification service for a user plane management event receives a notification from an SMF, and when it is determined that a subsequent action according to the notification cannot be processed immediately but can be processed after a predetermined period of time. | 2022-08-25 |
20220272176 | TOOL PORT AWARE STATEFUL PROTOCOL VISIBILITY FOR PACKET DISTRIBUTION - At least one technique for distributing traffic from a visibility node to a network tool is disclosed. In certain embodiments, the visibility node has a tool port through which to receive a plurality of packets which each include a compressed header. The visibility node determines, for each packet, whether a given network tool has received the compressed header in decompressed format based on a header-to-tool mapping structure. The structure includes information indicative of which packet headers each of the plurality of network tools have received in decompressed format. If the visibility node determines that the tool previously received the decompressed header, the visibility node transmits the packet to the network tool in compressed format. If the visibility node determines that the tool has not previously received the decompressed header, the visibility node decompresses the compressed header prior to transmitting the packet to the given network tool | 2022-08-25 |
20220272177 | NODE/NETWORK AGGREGATION GATEWAY DEVICE - A method, gateway device, computer and computer program product for monitoring responder interaction with equipment and credentialing of a responder are provides. A gateway device includes a memory and a processor. The memory is configured to store responder credentials and equipment data. The processor is in communication with the memory and is configured to translate equipment data received from equipment in a first format according to a first protocol to a second format according to a second protocol, the translated equipment data to be relayed to a computer. The processor is also configured to register equipment data in the memory. The gateway device also includes a transceiver configured to receive the equipment data from external equipment, transmit responder credentials to the computer and transmit the translated equipment data to the computer. | 2022-08-25 |
20220272178 | RE-ASSEMBLY MIDDLEWARE IN FPGA FOR PROCESSING TCP SEGMENTS INTO APPLICATION LAYER MESSAGES - A method and system of a re-assembly middleware in FPGA for processing TCP segments into application layer messages is disclosed. In recent years, the communication speed in digital systems has increased drastically and thus has brought in a growing need to ensure a good/high performance from the FPGA services. The disclosure proposes a re-assembly middleware in the FPGA for processing TCP segments into application layer messages at a pre-defined frequency for a good/high performance. The pre-defined frequency is a high frequency performance feature of the re-assembly middleware, wherein the FPGA's implementation frequency is at atleast 300 MHz based on a memory optimization technique. The memory optimization technique includes several strategies such registering an output and slicing memories. | 2022-08-25 |
20220272179 | VIRTUAL DEVICE SYSTEMS AND METHODS - A system comprising a gateway at a premises and configured to communicate with a premises device including a proprietary communication protocol different from a protocol of the gateway. The system includes a bridge server coupled to the gateway and to a device server. The device server corresponds to the premises device. An integration component, running on the bridge server, corresponds to the premises device. The system includes a virtual instance running on the gateway. The virtual instance corresponds to the premises device. The virtual instance is configured to represent a state change of the premises device using data received from the premises device via at least one of the integration component and the device server. | 2022-08-25 |
20220272180 | DATA TRANSMISSION METHOD AND APPARATUS - Embodiments of the present disclosure provide a data transmission method, including: a first device receiving a data packet in a first slot, where the data packet is noise or a data packet received from a data source device; the first device determining a link state between the data source device and the first device according to the data packet, where the link state comprising an idle state or a busy state; and the first device transmitting audio data to a second device in the first slot when determining the link state being the idle state, where the audio data is audio data received by the first device from the data source device. | 2022-08-25 |
20220272181 | METHOD AND DEVICE FOR IDENTIFYING PACKET IN WIRELESS LAN SYSTEM - An example according to the present disclosure relates to a technique for identifying a wireless LAN (WLAN) packet. For example, when a physical protocol data unit (PPDU) includes a legacy signal field, a field contiguous to the legacy signal field may be used to identify a type of the PPDU. A field contiguous to the legacy signal field may include information indicating that the PPDU is an extreme high throughput (EHT) PPDU. The field contiguous to the legacy signal field may include at least one of information related to a frame format, a transmission opportunity, an STA ID, and/or a bandwidth. | 2022-08-25 |
20220272182 | APPARATUS AND METHOD FOR PROCESSING SENSOR SIGNAL - Disclosed are an apparatus and method for processing a sensor signal. The apparatus for processing a sensor signal includes a sensing unit, an amplification unit configured to amplify an analog signal sensed by the sensing unit, an analog to digital converter (ADC) configured to convert the amplified analog signal into a digital signal having a first resolution, and a signal processor configured to process the digital signal with a numeral system having a second resolution or higher, allocate the processed digital signal to a message frame according to a regulated protocol, and output the message frame. | 2022-08-25 |
20220272183 | STATUS INDICATORS FOR MOBILE VOICE DEVICES - Status indicator devices for use with handheld transceiver devices are shown and methods of using the same are described. Status indicator devices are disposed between a battery and a handheld transceiver unit allowing a single battery to power both the status indicator device and the handheld transceiver unit. The status indicator devices are capable of wirelessly transmitting and/or receiving information and reproducing it visually, tactilely, or both. | 2022-08-25 |
20220272184 | EMERGENCY PERSONAL PROTECTION SYSTEM INTEGRATED WITH MOBILE DEVICES - A mobile device includes a camera unit, a location unit, a transmitting unit, a self-defense mechanism, and a panic button. The camera unit location unit obtains at least one of image data and audio data, and the location unit obtains location data. The transmitting unit transmits at least one of the image data, the audio data, the location data, and specific information including owner identification information. The panic button is adapted to activate the camera, the location unit, the transmitting unit, and the self-defense mechanism. | 2022-08-25 |
20220272185 | MOBILE TERMINAL - The present invention provides a mobile terminal comprising: a pair of bodies provided on the rear surface of a flexible display panel; a pair of hinge portions connecting the pair of bodies to each other such that a folding mechanism of the pair of bodies can operate; a hinge cover provided between the pair of bodies for connecting the pair of hinge portions to each other; and a pair of supports provided on the front surfaces of the pair of bodies in order to support the flexible display panel and having fixed shafts on end portions thereof separated from each other such that the pair of supports respectively rotate with respect to the pair of bodies, wherein the hinge cover comprises a pair of guides supporting the end portions of the pair of supports, the end portions facing each other, and a first space provided between the pair of guides such that a curvature forming unit of the flexible display panel can be drawn therein or withdrawn therefrom. | 2022-08-25 |
20220272186 | COVER PLATE, DISPLAY PANEL, AND DISPLAY TERMINAL - The present disclosure relates to a cover plate, a display panel and a display terminal. The cover plate includes a first region and a second region surrounding the first region. The second region includes a plurality of side cover plate regions and at least one corner opening region located between two adjacent side cover plate regions. The cover plate includes at least one buffer portion which is filled in the corner opening region. | 2022-08-25 |
20220272187 | PORTABLE TERMINAL APPARATUS - A portable terminal apparatus includes a display unit displaying an image, an operation input unit inputting a user operation, and a wireless communication unit performing wireless communication by a wireless LAN, and at a time of startup from a sleep state, a remote control button is displayed on the display unit when a mutual communication with a predetermined access point can be performed in the wireless communication unit, and when the remote control button is selected, a remote control signal corresponding to the selected remote control button is transmitted. | 2022-08-25 |
20220272188 | INFORMATION INPUT METHOD, TERMINAL, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - An information input method, a terminal, and a non-transitory computer-readable storage medium are disclosed. The method includes controlling a bottom modal view to be displayed on a current user interface, in response to receiving a first instruction configured for indicating a state in which first information is to be received, the bottom modal view being a floating layer page displayed on the current user interface, having an area less than that of the current user interface, and comprising a first input widget; and controlling the first information to be input based on an input signal in response to the first input widget being triggered. | 2022-08-25 |
20220272189 | SYSTEM AND METHOD FOR ACHIEVING DISPLAY OF CARPLAY INTERFACE ON DISPLAY SCREENS OF MULTIPLE ELECTRONIC DEVICES INTEGRATED IN MOTOR-DRIVEN TRANSPORTATION MEANS - A system for achieving display of CarPlay operation interface on display screens of multiple electronic devices is disclosed. The system comprises a first electronic device and a second electronic device, wherein the first electronic device has functionality of Apple CarPlay because of including an Apple Mfi authentication chip. Particularly, a CarPlay executor comprising a principal execution unit and a plurality of sub-execution units is provided in the first electronic device. As such, after a second mobile electronic device is in communication with a second electronic device that is coupled to the first electronic device, one sub-execution unit is authorized by the Apple Mfi authentication chip so as to let a CarPlay operation interface be shown on a display screen of the second electronic device, thereby achieving display of CarPlay operation interface on display screens of multiple electronic devices. | 2022-08-25 |
20220272190 | SYSTEMS AND METHODS FOR PROVIDING CALLER IDENTIFICATION OVER A PUBLIC SWITCHED TELEPHONE NETWORK - A system and method of providing caller identification (ID) over a public switched telephone network (PSTN). For outbound calls, the system and method enable a caller to provide a caller ID that differs from the native caller ID of their mobile phone. The system and method enable multiple phones tied to a single account to display the same caller ID for outbound calls. For forwarded inbound calls, such as calls being forwarded from an office, the system and method inform the recipient of the identification of the call as well as that the call is being forwarded. The system and method enable the recipient to have calls forwarded from more than one number and identify the identity of the caller as well as the specific number the call is being forwarded from. | 2022-08-25 |
20220272191 | METHODS AND APPARATUS FOR BYPASSING HOLDS - Automated monitoring of a voice communication session, when the session is in an on hold status, to determine when the session is no longer in the on hold status. When it is determined that the session is no longer in the on hold status, user interface output is rendered that is perceptible to a calling user that initiated the session, and that indicates that the on hold status of the session has ceased. In some implementations, an audio stream of the session can be monitored to determine, based on processing of the audio stream, a candidate end of the on hold status. In response, a response solicitation signal is injected into an outgoing portion of the audio. The audio stream can be further monitored for a response (if any) to the response solicitation signal. The response (if any) can be processed to determine whether the end of the on hold status is an actual end of the on hold status. | 2022-08-25 |
20220272192 | DETECTING AND MITIGATING EFFECTS OF UNAUTHORIZED TELEPHONE NUMBER SPOOFING - The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, facilitating, by a first device, receiving a first communication directed to a second device from a third device associated with a first telephone number. The method can further include determining, by the first device, that the first communication comprises a reference to a second telephone number different from the first telephone number, resulting in a number discrepancy. Further, based on the number discrepancy and an analysis of the first communication, the method can further include preventing, by the first device, communication of the first communication to the third device. | 2022-08-25 |
20220272193 | Call Authentication Service Systems and Methods - A system for authenticating the calling device used to place a call to an enterprise call center. The system uses a premise component, a cloud-based Call Authentication Service (CAS), and orchestration between these two components. The premise component includes a number of sub-components including servers and probes. The CAS includes a Decision Engine that utilizes a number and variety of authentication plugins. The disclosed system may be used independently or as part of a multi-factor authentication strategy with other techniques such as reduced Knowledge-Based Authentication or voice biometrics. | 2022-08-25 |
20220272194 | SPAM TELEPHONE CALL REDUCER - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spam telephone call reducer are disclosed. In one aspect, a method includes the actions of receiving first telephone call data that reflects telephone calls received by a first user and second telephone call data that reflects telephone calls received by a second user. The actions further include comparing the first telephone call data and the second telephone call data. The actions further include determining that the first user received more spam telephone calls than the second user. The actions further include determining a first characteristic of the first user and a second characteristic of the second user. The actions further include determining an action that increases a similarity of the first characteristic to the second characteristic. The actions further include performing the action on the first characteristic. | 2022-08-25 |
20220272195 | SYSTEMS AND METHODS OF AUTOMATED VALIDATION OF ELECTRONIC DATA VIA A USER INTERFACE - Certain aspects of the present disclosure provide a system for obtaining electronic data from a network server accessible. The system comprises a communication device to electronically access an automated phone system via a telephone number and a memory circuit that stores a configuration file and a log file. The system further comprises a processor that identifies a record that includes a unique identifier for an entity and data to compare with corresponding data from the automated phone system. The processor is further configured to access and navigate the phone menu based on the configuration file and input a unique sequence of digits based on the instructions in the configuration file. The processor is also configured to obtain an audio message from the automated phone system, convert the audio message to a corresponding text message, and determine whether the corresponding text message indicates an error or includes the corresponding data. | 2022-08-25 |