37th week of 2017 patent applcation highlights part 67 |
Patent application number | Title | Published |
20170264624 | METHOD OF MITIGATING COOKIE-INJECTION AND COOKIE-REPLAYING ATTACKS - The present disclosure is drawn to systems, methods, and computer-readable media for mitigating cookie-injection and cookie-replaying attacks using a VPN client. The VPN client receives a session request regarding access to a private intranet. In response to the request, the VPN client retrieves cookie deleting criteria, and deletes all cookies which satisfy the cookie deleting criteria. Once all cookies satisfying the cookie deleting criteria are deleted, the VPN client proceeds with the session request. | 2017-09-14 |
20170264625 | SECURITY TEST TOOL - A test tool includes a connection engine, a transformation engine, a validation engine, and a messaging engine. The connection engine connects to a first non-relational database, a second non-relational database, and a server. The transformation engine receives first and second messages from the first and second non-relational databases and transforms the second message into a JavaScript Object Notation message. The validation engine compares the first message with a server log stored on the server to determine whether information in the first message matches information in the server log and compares the JavaScript Object Notation message with the server log to determine whether information in the second message matches information in the server log. The messaging engine communicates a message indicating that information in the first message and the second message match information in the server log. | 2017-09-14 |
20170264626 | MALICIOUS HTTP COOKIES DETECTION AND CLUSTERING - Techniques for malicious HTTP cookies detection and clustering are disclosed. In some embodiments, a system, process, and/or computer program product for malicious HTTP cookies detection and clustering includes receiving a sample at a cloud security service; extracting a cookie from network traffic associated with the sample; determining that the cookie is associated with malware; and generating a signature based on the cookie. | 2017-09-14 |
20170264627 | Cost Prioritized Evaluations of Indicators of Compromise - A method for evaluating indicators of compromise (IOCs) is performed at a device having one or more processors and memory. The method includes receiving respective specifications of a plurality of IOCs, wherein the respective specifications of each IOC of the plurality of IOCs includes a respective cost associated with evaluating the IOC. The method further includes dynamically determining an order for evaluating the plurality of IOCs based on the respective costs associated with the plurality of IOCs, and determining whether a threat is present based on results for evaluating one or more of the plurality of IOCs in accordance with the dynamically determined order, instead of an order by which the plurality of IOCs have been received at the device. | 2017-09-14 |
20170264628 | AUTOMATED INSIDER THREAT PREVENTION - Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider threat prevention includes monitoring network communications at a network device; detecting an anomalous activity based on the monitored network communications associated with a user based on a behavior profile for the user; and performing an action in response to the detected anomalous activity based on a policy. | 2017-09-14 |
20170264629 | PRODUCTION PROCESS KNOWLEDGE-BASED INTRUSION DETECTION FOR INDUSTRIAL CONTROL SYSTEMS - A system for threat detection in an industrial production environment comprises a programmable logic controller. This programmable logic controller includes a process image updated according to a scan cycle with process data associated with one or more field devices, a program configured to operate the one or more field devices using the process data, and one or more function blocks. These function blocks are configured to monitor the process data in the process image during each scan cycle, and identify a possible cyberattack based on the process data. | 2017-09-14 |
20170264630 | SELECTIVE EXTENDED ARCHIVING OF DATA - A system is provided for selective extended archiving of data. A network analyzer may intercept and log traffic that passes over at least part of a computer network including capturing a plurality of network packets and producing a traffic log including a corresponding plurality of entries with values of fields in the plurality of network packets. A data collector may receive the traffic log and archive the corresponding plurality of entries for a predetermined retention period, and produce a table of the values of the fields. An data collector may then identify a value from the table as an indicator of a network compromise, and cause the data collector to archive entries of the corresponding plurality of entries having the value for an additional period beyond the predetermined retention period. | 2017-09-14 |
20170264631 | CONTROL DEVICE FOR A NETWORK AND VULNERABILITY SCANNER - A control device for a network and vulnerability scanner for testing a computer system for the presence of security vulnerabilities includes: a first interface for selecting a test profile which comprises parameter data that define a test of the computer system, wherein the parameter data include a user's administrative login data for the computer system; and a second interface for transmitting the parameter data of the test profile to the network and vulnerability scanner. | 2017-09-14 |
20170264632 | A TELECOMMUNICATIONS DEFENCE SYSTEM - A telecommunications defence system ( | 2017-09-14 |
20170264633 | Social Engineering Simulation Workflow Appliance - A system for evaluating the susceptibility of an organization to social engineering, the organization having a plurality of sources and a plurality of members using electronic devices, is provided. The system includes an appliance in communication with the plurality of sources configured to retrieve contact information of members and to detect triggering events from the plurality of sources. The system includes a platform remote from the appliance configured to receive signals from the appliance indicative of the triggering events and to prepare and send communications, including templates based on each of the triggering events to the appliance. Upon receipt of the communications, the appliance is configured to retrieve the contact information of intended recipient members, to create messages based on the templates, and to send the messages to the intended recipient members. The platform does not receive the contact information of the plurality of members from the appliance. | 2017-09-14 |
20170264634 | SYSTEMS AND METHODS FOR SUPPORTING INFORMATION SECURITY AND SUB-SYSTEM OPERATIONAL PROTOCOL CONFORMANCE - Systems and methods are described that support information security and sub-system operational conformance with protocols. In some embodiments, agent access to resources can be controlled via generation of credentials and/or tokens and/or conditioned external authentication. In some embodiments, workflows used to assess protocol conformance can be conditionally triggered at sub-systems. | 2017-09-14 |
20170264635 | APPLICATION PLATFORM SECURITY ENFORCEMENT IN CROSS DEVICE AND OWNERSHIP STRUCTURES - Methods and systems provide application platform security enforcement. A distributed system communicates between a plurality of remote devices and at least one secured server to facility providing a secured service. The distributed system may comprise a remote communication server and one or more security layer components where the plurality of remote devices connect through ones of the security layer components. Upon detection of a security breach by a first remote device, the distributed system determines potential devices at risk from the plurality of remote devices, analyzing risk factors for commonalities. A lock down and/or quarantine of the first remote device and the devices at risk is instructed. Risk factors may include whether the remote devices communicate via a same security layer component, are geographically proximate; and/or are associated at the user level, for example are, proximate users in a social network, graph. Reactivation is also provided. | 2017-09-14 |
20170264636 | SECURITY NETWORK BUFFER DEVICE - A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach. | 2017-09-14 |
20170264637 | Method, Apparatus and System for Processing Attack Behavior of Cloud Application in Cloud Computing System - An apparatus for processing an attack behavior of a cloud application in a cloud computing system, including a policy manager configured to store a security determining rule and a malicious application processing rule, a security analyzer configured to receive application behavior data from a security detector, and send the application behavior data to a security processor when the cloud application running on the cloud host has an attack behavior, and the security processor is configured to invoke, according to the malicious application processing rule, an interface provided by a cloud controller in order to process the cloud application having an attack behavior. The apparatus performs security protection based on an application level of cloud computing, which can prevent mutual attack between different applications on a same host, and reduce impact on a normal application. | 2017-09-14 |
20170264638 | SYSTEM AND METHOD FOR SOFTWARE DEFINED BEHAVIORAL DDOS ATTACK MITIGATION - Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS attacks. A DDoS attack mitigation appliance of multiple mitigation appliances controlled by a DDoS attack mitigation central controller receives DDoS attack mitigation policies through a network connecting the controller and the mitigation appliance. A DDoS attack is mitigated by the mitigation appliance based on the received mitigation policies. The mitigation policies are generated by the controller based on granular behavioral packet rate thresholds estimated based on granular traffic rate information collected from one or more of the multiple mitigation appliances controlled by the controller. | 2017-09-14 |
20170264639 | ACTIVE DECEPTION SYSTEM - Provided are methods, including computer-implemented methods or methods implemented by a network device, devices including network devices, and computer-program products for an active deception system. The active deception system can separate execution of services from deception mechanisms on a network. In particular, the active deception system can include a sensor on the network. The sensor can establish a two-way connection with a remote server executing the services. The sensor can receive communications from client devices and forward the communications to the remote server. While this forward can happen, the client devices might not be aware of the forward. In fact, the client device might only be aware that the sensor receives a communication and responds to the communication. | 2017-09-14 |
20170264640 | SYSTEMS AND METHODS OF ENFORCING MULTI-PART POLICIES ON DATA-DEFICIENT TRANSACTIONS OF CLOUD COMPUTING SERVICES - The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata. | 2017-09-14 |
20170264641 | ENHANCED FIREWALL AND METHOD FOR SECURING INTERNET COMMUNICATIONS - A system and method are described for securing a network-connected device from a hacker having access to a network to which the network-connected device is communicatively connected. Such network-connected devices include a variety of electronics that when connected to the Internet are commonly referred to as the Internet of things (“IoT”). The systems and methods described herein include a transparent traffic control (TTC) device that is installed between an IoT device and a communications network to intercept data packets transmitted between the IoT device and the network and to allow or block the data packets based on rules for a group to which the IoT device or a remote destination are assigned. | 2017-09-14 |
20170264642 | THICK CLIENT POLICY CACHING - Techniques for evaluating authorization requests using cached policy data are disclosed. In one or more embodiments, a thick client receives an authorization request. The thick client evaluates the authorization request, based on partial contextual information associated with the authorization request and a local policy data cache, to generate a preliminary authorization response. The preliminary authorization response includes one of (a) denial of the authorization request and (b) non-denial of the authorization request. Responsive to the preliminary authorization response including non-denial of the authorization request, the thick client submits complete contextual information associated with the authorization request to an authorization service. The authorization service provides a final authorization result, which the thick client uses to grant or deny the authorization request. | 2017-09-14 |
20170264643 | LANGUAGE-LOCALIZED POLICY STATEMENTS - Techniques for generating and using reader-friendly policy statements are disclosed. In one or more embodiments, a policy management service receives a request for an authorization policy in a language-localized syntax. The policy management service identifies a syntax graph corresponding to the authorization policy and traverses the syntax graph to obtain at least a requestor variable value associated with the authorization policy, an action variable value associated with the authorization policy, a resource variable value associated with the authorization policy, and a location variable value associated with the authorization policy. The policy authorization service generates a reader-friendly policy statement in the language-localized syntax using the requestor variable value, the action variable value, the resource variable value, and the location variable value. Responsive to the request, the policy authorization service provides the reader-friendly policy statement. | 2017-09-14 |
20170264644 | APPLICATION PLATFORM SECURITY ENFORCEMENT IN CROSS DEVICE AND OWNERSHIP STRUCTURES - Methods and systems provide application platform security enforcement. A distributed system communicates between a plurality of remote devices and at least one secured server to facility providing a secured service. The distributed system may comprise a remote communication server and a plurality of security layer components where the plurality of remote devices connect through respective ones of the security layer components. Upon detection of a security breach by a first remote device, the distributed system determines potential devices at risk from the plurality of remote devices, analyzing risk factors for commonalities. A lock down of the first remote device and the devices at risk is instructed. Analysis of risk factors examines whether the first remote device and other remote devices communicate via a same security layer component, are geographically proximate; and/or are associated at the user level, for example are proximate users in a social network graph. Reactivation is also provided. | 2017-09-14 |
20170264645 | LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL - A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials. | 2017-09-14 |
20170264646 | SYSTEM AND METHOD FOR SOFTWARE DEFINED BEHAVIORAL DDOS ATTACK MITIGATION - Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for controlling multiple distributed denial of service (DDoS) mitigation appliances. A DDoS attack mitigation central controller configures attack mitigation policies for the DDoS attack mitigation appliances. The DDoS attack mitigation policies are sent to the DDoS attack mitigation appliances through a network connecting the DDoS attack mitigation central controller and the DDoS attack mitigation appliances. | 2017-09-14 |
20170264647 | GROUP COMMUNICATION SERVICE ENABLER SECURITY - Systems, methods, apparatuses, and computer program products for securing user plane (e.g., MB2-U) interface between a group communication service application server (GCS AS) and Broadcast Multicast Service Center (BM-SC) are provided. One method may include transmitting a message via a control plane, to an application server, indicating whether to establish a security association on a user plane in an interface between the GCS AS and the BM-SC. The method may also include providing, to the GCS AS, a target internet protocol (IP) address and possible port as a target for the security association. | 2017-09-14 |
20170264648 | PROVIDING SIP SIGNALING DATA FOR THIRD PARTY SURVEILLANCE - A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over Internet protocol (VoIP) network, that employs a session initiation protocol (SIP). The method includes receiving a subscription request from a third party subscriber, the subscription request identifying a targeted user to be monitored, monitoring communication sessions in which the targeted user is a participant, to detect SIP events corresponding to state transitions associated with the communication sessions. A system for facilitating surveillance of a targeted user includes an application programming interface (API) operable to receive a subscription request from a third party subscriber, the subscription request identifying the targeted user, wherein the third party subscriber is not a participant in the one or more communication sessions, and a SIP events monitoring module operable to detect one or more predetermined SIP events associated with the communication sessions based on the subscription request and notify the third party subscriber of the detected SIP events. | 2017-09-14 |
20170264649 | EMPLOYING SESSION LEVEL RESTRICTIONS TO LIMIT ACCESS TO A REDIRECTED INTERFACE OF A COMPOSITE DEVICE - Session level restrictions can be implemented to limit access to a redirected interface of a composite device. These session level restrictions can be defined within a policy of a directory service, such as Active Directory, to facilitate the dynamic application of the restrictions to the appropriate remote sessions. In this way, access restrictions can be applied to individual interfaces of a redirected composite device so that a particular interface will only be accessible from specified remote sessions. | 2017-09-14 |
20170264650 | AUTOMATIC CONFIGURATION OF ENDPOINT COMMUNICATION DEVICES TO SET UP A VOIP NETWORK - Implementations relate to automatic configuration of endpoint communication devices to set up a communication network such as a VOIP network. In some implementations, a method includes a server receiving an extension request for device extension from an endpoint communications device connected to a communication network, mapping an identifier for the endpoint communications device to a device extension, and transmitting the device extension to the endpoint communications device. | 2017-09-14 |
20170264651 | Communication System - There is provided a method comprising: causing received image and/or audio data associated with an audio-visual call to be played-out via a user interface; receiving, during the audio-visual call, an instruction to store received image and/or audio data associated with the audio-visual call; and storing image and/or audio data played-out prior to receipt of the instruction in response to the received instruction. | 2017-09-14 |
20170264652 | CROSS-PLATFORM VIDEO CONVERSATION BETWEEN RELATED DEVICES - Cross-platform video conversation between related devices is described. Techniques described herein include receiving, by a first device registered with a network to utilize a communication address for sending and receiving cellular communications via the network, live video associated with a video conversation between the first device and a second device. Information for related device(s) may be retrieved by the first device. The related device(s) may be related to the first device based on utilizing the communication address for sending and receiving at least communications via the network and/or being associated with a same subscriber account as the first device. Moreover, techniques described herein enable the first device to share the live video with related device(s) to enable the related device(s) to join the video conversation irrespective of which computing platform provides conversational video services for each of the related device(s). | 2017-09-14 |
20170264653 | Remote support service with two-way smart whiteboard - Mobile devices, such as a smartphone, tablet or wearable, are leveraged to facilitate remote support between a user of the device, and a remote technician. In this approach, the mobile device is used as a tool on behalf of the remote technician. In particular, and in one embodiment, the mobile device is used to transfer images to the remote technician's desktop. The remote technician desktop is provisioned with a whiteboard functionality by which the remote technical draws on the camera image that the remote technician is then viewing. The resulting annotation(s) are then transferred back over the network and drawn on the end user's camera view. In this manner, the technician highlights any area of the camera image, and those highlights are visible on the end user mobile device regardless of whether the local end user rotates the view or moves the mobile device camera during the support session. In an alternative embodiment, collaborative support is provided between or among the user and one or more technicians using a two-way, bi-directional smart whiteboard. | 2017-09-14 |
20170264654 | RETRIEVAL OF WIRELESS NETWORK CREDENTIALS - Methods, systems, and computer readable media may be operable to facilitate a retrieval and display of network credentials. A predetermined input may be received at a client, wherein the predetermined input initiates a retrieval of network credentials such as network identifiers and corresponding passwords or passphrases. The client may aggregate retrieved network credentials associated with one or more networks that may be available to a user, and may output the aggregated credentials to a display. | 2017-09-14 |
20170264655 | Indicating an Association Between a Social-Media Account and a Media Playback System - Examples disclosed herein include a social-media computing system receiving, from a first computing device, a first message indicating that a media playback system is associated with a first social-media account; and based on the received first message, sending, to a second computing device associated with a second social-media account, a second message indicating that the media playback system is associated with the first social-media account. The examples may also include the second computing device receiving, from the social-media computing system, the second message; and based on the received second message, causing display of an indication of the association between the media playback system and the second social-media account. | 2017-09-14 |
20170264656 | HANDLING SOURCE ROUTED CONTENT - Methods for handling source-routed content are provided, together with apparatuses for performing the methods. A method at a receiving network node includes receiving a data transmission. The data transmission has control information and a content payload. The receiving node determines whether the control information includes an instruction to execute an action. This determination may involve determining that the instruction is directed to the receiving node. In response, the receiving node performs the action. The action may include caching the content at the receiving node. The receiving node also forwards the content payload in accordance with the control information. | 2017-09-14 |
20170264657 | STREAMING SERVICE DATA RECEIVING DEVICE AND METHOD IN MOBILE COMMUNICATION SYSTEM FOR SUPPORTING PLURALITY OF RADIO ACCESS INTERFACES - The present invention relates to technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and the Internet of things (IoT). The present invention can be utilized for intelligent services (smart home, smart building, smart city, smart car or connected car, health care, digital education, retail business, security and safety-related services, and the like) based on the technology. The present invention relates to a streaming service data receiving method of a terminal in a mobile communication system for supporting a plurality of radio access interfaces, the method comprising a step of receiving streaming service data from a server through at least one of the plurality of radio access interfaces, wherein the at least one radio access interface is selected such that the streaming service data can be received at a network speed corresponding to an encoding bit rate to be applied to the streaming service. | 2017-09-14 |
20170264658 | METHOD FOR DISTRIBUTING FRAME DATA OF IMAGE - A method for distributing frame data of an image to a plurality of clients via a network, the method including generating, using a processor, first frame data and second frame data as the frame data, transmitting, using the processor, the first frame data to all of the plurality of clients, and transmitting, using the processor, the second frame data to clients for whom a communication environment between the clients and the server satisfies a predetermined condition between the transmissions of the first frame data. | 2017-09-14 |
20170264659 | APPLICATION STREAMING USING ACCESS AND EXECUTION ENVIRONMENTS - Methods, systems, and computer-readable media for application streaming using access and execution environments are disclosed. User input comprising a selection of an application by a user is received. The user input is received at an access environment from a computing device associated with a client. The access environment permits access by the user, and the access environment is associated with an execution environment for the application. The execution environment specifies a computing resource description for the application. Execution of the application is initiated using one or more computing resources compatible with the computing resource description. A pixel display is streamed to the computing device associated with the client. The pixel display is associated with the application executing using the one or more computing resources. | 2017-09-14 |
20170264660 | SYSTEM AND METHOD FOR USE OF CYCLIC PLAY QUEUES IN A MEDIA CONTENT ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for use of cyclic play queues in a media content environment. A cyclic list data structure that can be initially populated with a list of media content items to be played at a media device, exposes a cyclic list of sequences of media content items, and supports operations to modify portions of the cyclic list to provide a cyclic play queue of media content items. When changes are made to an underlying play queue or context, the system performs a three-way merge of sequences of media content items within the cyclic list, to provide a modified play queue, for example with the left sequence being an updated playlist, and the right sequence being a patch window that reflects a user's changes to the play queue. | 2017-09-14 |
20170264661 | Association of User Interactions at a First Venue with the User for Use in a Second Venue - There is provided a server and method for association of user interactions of a first venue and a second venue. The server including a memory storing a user profile of a user and a hardware processor, wherein the hardware processor may be configured to receive first user interactions of the user with a first system in a first venue, the first user interactions including a request for playing a first media content using the first system in the first venue, store the first user interactions of the user in the user profile of the user in the memory, determine, after storing, the user is in a second venue, retrieve from the user profile, after determining, the first user interactions, and provide, after retrieving, a custom presentation to the user using a second system in the second venue, wherein the custom presentation is based on the first user interactions. | 2017-09-14 |
20170264662 | METHOD AND APPARATUS FOR THE TRANSMISSION OF THE VIDEO STREAM WITH THE COMMENT DATA - This invention relates generally to the video stream of the comment data and more particularly to the method and apparatus for the transmission of the video stream of the comment data. A method comprising: receiving content data associated with a presentation of a content item, wherein the content data comprises attribute information corresponding to the content data; receiving comment data, wherein the comment data comprises a plurality of comment data segments and attribute information corresponding to the plurality of comment data segments; integrating the plurality of comment data segments into the content data based on their respective attribute information and generating an integrated data stream; and transmitting, to a client computing device, the integrated data stream, saving the bandwidth required by decoding and greatly unleashing the decoding speed of the comment data video; improving the viewability of the comment data; enhanced the adaptability of advanced comments. | 2017-09-14 |
20170264663 | METHOD FOR STREAMING PACKET CAPTURES FROM NETWORK ACCESS DEVICES TO A CLOUD SERVER OVER HTTP - A system for streaming packet captures over the Internet includes multiple network access devices, each operating as one of a gateway device, a wireless access point, and a network switch, and a management server communicatively coupled to the network access devices over the Internet for managing the network access devices. The management server maintains a persistent hypertext transport protocol (HTTP) connection with each of the network access devices over the Internet. The management server is to generate a bytecode based on a filtering expression for packet captures (PCAPs) representing one or more PCAPs filtering rules, transmit the bytecode to the network access devices without requiring the network access devices to compile the PCAPs filtering rules, receive PCAPs from the network access devices captured by the network access devices based on the PCAPs filtering rules, and merge the PCAPs received from the network access devices into merged PCAPs. | 2017-09-14 |
20170264664 | MODERATING APPLICATION COMMUNICATIONS ACCORDING TO NETWORK CONDITIONS - Systems, methods and computer-readable media are presented for moderating the network connectivity of an application according to network connectivity quality. A monitoring component and/or process receives information regarding network requests from the computing device, filters the requests according to an application, and for each of the filtered network requests generates a network request tuple from the network request and stores the information in a communication queue. A moderating component and/or process receives a network request of the application, evaluates the network connectivity quality for the application according to the information in the communication queue, and moderates the network request activity of the application commensurate with the network connectivity quality. | 2017-09-14 |
20170264665 | MANAGING STREAMED COMMUNICATION - Methods, apparatus and systems are disclosed for managing streamed communication (such as video, audio, or audio-visual communication) between client devices and remote devices via a digital data communication network in situations where the data communication network comprises one or more routers operable to receive streamed data from one or more client devices and/or from one or more other routers, and to forward such streamed data to one or more remote devices and/or to one or more other routers such as to enable the client device and potentially-varying subsets of the one or more remote devices to participate in a communication session. | 2017-09-14 |
20170264666 | METHOD AND ASSOCIATED SERVER FOR PROVIDING USER-FRIENDLY OPERATION - A server includes a web page service module, a first CGI module and a second CGI module, in which the first CGI module and the second CGI module correspond to applications required to be executed by different respective authorities. In the operations of the server, the web page service module receives a request from a device external to the server, and the web page service module determines contents of the request to select the first CGI module or the second CGI module in order to execute the request. | 2017-09-14 |
20170264667 | SYSTEMS AND METHODS FOR CONTENT SHARING USING UNIQUELY GENERATED IDENTIFIERS - Systems and methods for location-based online content sharing using unique identifiers are provided. A server and a plurality of clients may be connected to one or more networks. A first client may send a shared content to the server. The first client may also send a first location of the first client as well as a unique identifier for the shared content. The server may store the shared content. A second client may request the shared content, and the request may include the unique identifier and a second location of the second client. The server may determine that the second location is within a predefined distance from the first location. Upon such determination, the server may send the shared content to the second client. | 2017-09-14 |
20170264668 | FILE DELIVERY METHOD, DEVICE, AND PROGRAM - A file delivery device includes a memory and a processor that reads and executes instructions stored by the memory. The processor selects, from a plurality of file groups that are an application divided into a specific division count, a file group that is to be delivered next to a terminal, based on a usage state of a file group at the terminal and a file group transition state that was predetermined based on a usage sequence of the respective file groups when executing the application; and delivering the selected file group to the terminal. | 2017-09-14 |
20170264669 | INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM AND INFORMATION PROCESSING METHOD - An information processing apparatus includes a first communication unit communicating with a first device, a second communication unit communicating with a second device, a first transmission unit adding identification information of a request for processing and transmitting the request to the second device using the second communication unit in a case where the first communication unit receives the request and the request is suitable for a transmission using the second communication unit, a control unit performing control such that the identification information and the first communication unit are correlated with each other and are stored in a storage unit, and a second transmission unit extracting a communication unit correlated with the identification information using the storage unit and transmitting a result of the processing to the first device using the extracted communication unit when the result with the identification information is received from the second device. | 2017-09-14 |
20170264670 | UNIFIED CLIENT FOR DISTRIBUTED PROCESSING PLATFORM - Techniques are described for providing a unified client to interact with a distributed processing platform such as a Hadoop cluster. The unified client may include multiple sub-clients each of which is configured to interface with a particular subsystem of the distributed processing platform, such as MapReduce, Hive, Spark, and so forth. The unified client may be included in an application to provide, for the application, a single interface for communications between the application and the distributed processing platform during a unified communication session. | 2017-09-14 |
20170264671 | REMOTE COMMUNICATION SYSTEM, COMMUNICATION TERMINAL, AND EXTENDED FUNCTION PROVIDING METHOD - A remote communication system includes: a first communication terminal configured to establish a call session for transmitting and receiving at least a voice with a target communication terminal, and to communicate with the target communication terminal; and a second communication terminal configured to participate in the call session. The second communication terminal provides a given function that is not limited to a telephone call to one of the first communication terminal and the target communication terminal, in response to a request from one of a user of the second communication terminal, the first communication terminal, and the target communication terminal. | 2017-09-14 |
20170264672 | METHODS, SYSTEMS, AND MEDIA FOR STORED CONTENT DISTRIBUTION AND ACCESS - Methods for distributing and providing access to stored content from remote storage comprising: receiving a first request to access a first portion of stored content from a requestor, wherein the first request is in a file system request format; creating a placeholder for the stored content so that the placeholder has at least one parameter identical to the stored content and the placeholder can hold the first portion of the stored content and at least a second portion of the stored content; requesting the first portion of the stored content from remote storage; receiving the first portion of the stored content from the remote storage; storing the first portion of the stored content in the placeholder; and before the second portion of the stored content has been stored in the placeholder, providing the first portion of the stored content to the requestor using a file system response format. | 2017-09-14 |
20170264673 | METHOD OF AND SYSTEM FOR DETECTING SPAM ACTIVITY IN A CLOUD SYSTEM - There are provided a method and a system for detecting and blocking spam activity in a cloud system. The method can be executed at a server. The method comprises receiving from a first user of the plurality of users of the cloud service an indication of a first sharing action for sharing access to the digital object; responsive to the first indication, increment a sharing counter value of a sharing counter dedicated to the digital object; receiving from a second user of the plurality of users of the cloud service an indication of a second sharing action for sharing access to the digital object; responsive to the second indication further incrementing the sharing counter value of the sharing counter dedicated to the digital object; responsive to the sharing counter value reaching a pre-determined threshold value, executing a spam preventive action associated with the digital object. | 2017-09-14 |
20170264674 | DETECTING AND TRANSMITTING A REDEEMABLE DOCUMENT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for detecting documents within content received by a computing device. A computing device can receive content through an application. The received content is scanned to determine if it includes a file type indicating that it includes a redeemable document. A notification is presented to the user when a document has been detected within the content including a button enabling rendering of the document on the computing device. The rendered document can include a button to transmit the document to secondary computing devices associated with the user. A user profile associated with the user can include data indicating secondary computing devices associated with the user. The user profile can be accessed to retrieve the data and, if the button is selected, the document can be transmitted to the secondary computing devices from which the user can render the document. | 2017-09-14 |
20170264675 | Method and Apparatus for Controlling Data Transmission - A method and apparatus for controlling data transmission includes: obtaining an amount of data, the data requested by a requesting server, an instructed deadline, and candidate source servers storing the requested data; obtaining, based on the amount of data, a minimum bandwidth required for transmitting the requested data before the deadline as a required bandwidth corresponding to the requested data; and selecting one of the candidate source servers as a source server for transmitting the requested data, based on the required bandwidth, bandwidth resources of the candidate source servers and the requesting server, and remaining bandwidth of links between the candidate source servers and the requesting server. This implementation implements the selection of the most appropriate source server from the holistic perspective, ensures that data transmission can be completed before the deadline, and effectively utilize the link bandwidth. | 2017-09-14 |
20170264676 | TRANSITIONING FROM AN INFRASTRUCTURE BASED WIRELESS CONNECTION TO A PEER TO PEER (P2P) WIRELESS CONNECTION - Disclosed in some examples are methods, systems, devices, and machine readable mediums which provide for device discovery and P2P negotiation in infrastructure mode and then a transition to P2P mode. This allows devices to take advantage of the robustness and improved device discovery of infrastructure mode and the reduced latency of P2P mode. | 2017-09-14 |
20170264677 | Service Processing Apparatus and Method - Embodiments of the present disclosure provide a service processing apparatus and method, and relate to the field of network service processing, and the method includes receiving, by a forwarding plane device, a packet of a first service flow, determining, by the forwarding plane device, a value-added service instance corresponding to the first service flow, and sending, by the forwarding plane device, the packet of the first service flow to the value-added service instance. In this way, a problem is resolved that a load balancer is heavily loaded because all service flow packets need to be processed using the load balancer, and generally, the load balancer may only need to allocate a value-added service instance to the first service flow packet in a service flow, thereby relieving processing pressure of the load balancer. | 2017-09-14 |
20170264678 | METHOD AND SYSTEM FOR CLUSTERING DISTRIBUTED OBJECTS TO USE THEM AS IF THEY WERE ONE OBJECT - A method for clustering objects distributed in multiple servers to allow one or more distributed objects to be used as if they were one object is provided. The method includes steps of: (a) a specific server transmitting to a client a remote controller including a particular communication object capable of supporting communications between the client and the specific server; and (b) the specific server supporting the client to include at least one communication object, capable of supporting communications between the client and at least one server, respectively, except the specific server within the cluster, in the remote controller, to thereby support the client to be communicable with all the servers in the cluster by acquiring, and providing to the client, the at least one communication object by referring to information on all the servers within the cluster. | 2017-09-14 |
20170264679 | LOAD BALANCING BASED ON USER BEHAVIOR PREDICTION - A method for load balancing is provided based on a user behavior pattern. The user behavior pattern is generated from historical user data to predict next operations a user would perform. Further, the user behavior pattern is bound to resource consumption, and a user and resource type is linked by a weighted value. Load balancing strategies are employed according to the weighted value of the user other than using connection count. | 2017-09-14 |
20170264680 | METHODS AND APPARATUS TO IMPROVE COMPUTING RESOURCE UTILIZATION - Methods, apparatus, systems and articles of manufacture are disclosed to improve computing resource utilization. An example apparatus includes an application specific sensor (AS) to monitor a workload of a platform, the workload executing on at least one general purpose central processing unit (CPU) of the platform, and a dynamic deployment module (DDM) to: in response to a workload performance threshold being satisfied, identify a bit stream capable of configuring a field programmable gate array (FPGA) to execute the workload, and configure the FPGA via the bit stream to execute at least a portion of the workload. | 2017-09-14 |
20170264681 | MULTITENANCY GAMING SERVICES PLATFORM - Systems and methods for providing multitenancy gaming platform services are presented. In one embodiment a method for providing multitenancy gaming platform services comprises receiving, at a server computer, a request from one of a plurality of applications for an operation associated with a service, the request including a token, data related to an application, and a target user identifier. The method further comprises, decoding the token to determine an application identifier and a user identifier. The method further comprises, determining which service of a plurality of multitenancy gaming platform services is requested, and sending the data related to the application to a second server computer responsible for the service, wherein the operation is authorized by the second server computer based on the user identifier and target user identifier. The method further comprises receiving a response from the second server computer responsible for the service, indicating a status of the operation. | 2017-09-14 |
20170264682 | DATA MOVEMENT AMONG DISTRIBUTED DATA CENTERS - Embodiments of the present disclosure provide a method and an apparatus for data movement among distributed data centers in a peer network. The method comprises: reducing an amount of data to be moved by pre-processing the data; generating a torrent file for the data; distributing the torrent file to a peer data center, and in response to receiving a data request from the peer data center, transmitting a segment of the data to the peer data center. Compared with the prior art, the embodiments of the present disclosure can realize reliable and fast data movement among distributed data centers over an unreliable and low-bandwidth network, can support an adaptive network topology among distributed data centers without complex pre-configuration or cumbersome runtime coordination, can support different types of data storage, and facilitates coordinated cloud computing and data aggregation among distributed data centers. | 2017-09-14 |
20170264683 | Streaming Digital Content Synchronization - Streaming digital content synchronization techniques are described. A response is received to a request to stream the digital content. The response includes a time at which the digital content was last modified (e.g., a last-modified header) and a time at which the response was generated, e.g., a date header. An age is calculated by subtracting the time at which the digital content was last modified, e.g., the last-modified header, from the time at which the response was generated, e.g., the date header. An age describing an amount of time the response spent in one or more caches, if available, is added as part of this age. The time is determined by subtracting the age from a predefined setback time and the stream of the digital content is rendered based at least in part on the determined time. | 2017-09-14 |
20170264684 | CONTAINER RUNTIME IMAGE MANAGEMENT ACROSS THE CLOUD - Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent. | 2017-09-14 |
20170264685 | DISTRIBUTION METHOD, DISTRIBUTION REQUEST METHOD, AND INFORMATION PROCESSING DEVICE - A distribution method includes assigning, to each of files including divided video data which is divided in accordance with a time series, identification information that includes information indicating one of the video data and information indicating an order of the time series, receiving, from a terminal device that reproduces the files, a distribution request for video data based on a pseudo definition file in which pseudo identification information is defined in a reproduction order of reproducing the files, selecting, based on relationship information indicating a correspondence relationship between the pseudo identification information and the identification information, a file corresponding to the distribution request from among the files, and distributing the selected file to the terminal device. | 2017-09-14 |
20170264686 | External Injection of Cloud Based Network Functions into Network Services - Disclosed herein are system, method, and computer program product embodiments for providing an API description of an external network service and using the API to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (API), transmitting a call to the service provider using the API for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied. | 2017-09-14 |
20170264687 | MANAGING MULTIPLE CLOUD STORES THROUGH A WEB SERVICE - A service exposes a storage system-independent application programming interface (API) and receives a data request from an application over the API. The service transforms the storage system-independent data request into a storage system-specific data request and executes it against an identified cloud-based storage system. The service can execute the request against multiple cloud-based storage systems and then return aggregated results to the application through the storage system-independent API. | 2017-09-14 |
20170264688 | METHODS AND DEVICES FOR REQUESTING AND PROVIDING INFORMATION - A method for a network entity requesting information from clients located in a first area is disclosed, said method comprising determining of a second area overlapping with the first area and transmitting an information request to clients located in the second area, wherein said information request comprising a condition defining when a client shall respond to the information request. | 2017-09-14 |
20170264689 | Automatic Report Rate Optimization For Sensor Applications - A report interval mode is selected from one of multiple selectable report interval modes in cases where the preferred sensor sample intervals of multiple applications are different. By using multiple selectable report interval modes some of the problems that occur when a single fixed report interval mode is used can be avoided. | 2017-09-14 |
20170264690 | Low-Voltage Alternating Current-Based Led Light With Built-In Cooling And Automatic Or Manual Dimming - A low-voltage alternating current-based LED light with built-in cooling and automatic or manual dimming. As it is self-cooled with fan failure protection, the light can be safely run in conditions that are near-hostile to its operation, with little possibility of damage. The light is movable along the XY axes of a grid system and can be either fixed in position in the Z axis or can be movable up and down the Z axis. The light can be equipped with either manual dimming using a standard potentiometer, or with automatic dimming via sensors and local network connectivity. The device prevents line-voltage electric shocks as the input voltage is low-voltage AC; in embodiments, about the same voltage as a doorbell, and the input current is | 2017-09-14 |
20170264691 | VIRTUAL VEHICLE SENSORS AND PERIPHERALS BASED ON ADD-ON DEVICE CAPABILITY - A transportation-vehicle system for use in virtualizing sensor data from an add-on device for use by a vehicle application. The system includes a hardware-based processing unit and a computer-readable storage device. The storage includes (i) a virtual-sensor-arrangement client configured to communicate with a virtual-sensor-arrangement server of the add-on device, including receiving, from the virtual-sensor-arrangement server, the sensor data corresponding to sensing performed at a sensor of the add-on device. The add-on device is not a part of the transportation vehicle as originally manufactured. The storage also includes (ii) a virtual input/output device driver configured to, when executed by the processing unit, process the sensor data received, yielding virtualized sensor data for delivery to the vehicle application. The technology also includes processes for making and using the system for virtualizing sensor data from an add-on device for use by a vehicle application. | 2017-09-14 |
20170264692 | Remote Management for a Computing device - Examples are disclosed for remote management of a computing device. In some examples, a secure communication link may be established between a network input/output device for a computing device and a remote management application. Commands may be received from the remote management application and management functions may be implemented at the network input/output device. Implementation of the management functions may enable the remote management application to manage or control at least some operating parameters of the computing device. Other examples are described and claimed. | 2017-09-14 |
20170264693 | METHOD AND APPARATUS FOR COORDINATING BODY DEVICES FOR COMMUNICATION - The present invention relates to the computer field, and specifically, to a method and an apparatus for coordinating body devices for communication. The method includes: obtaining, by a mobile personal station, an identifier of a body device, and a location parameter and an ambient parameter that are of a user that carries the body device; obtaining, according to the identifier of the body device, a communication mode supported by the body device; obtaining, according to the identifier of the body device, a communication mode supported by the body device; determining, a networking mode of the body device according to the scenario and the communication mode supported by the body device; and establishing, a connection to the body device according to the networking mode. | 2017-09-14 |
20170264694 | PROCESS BROKER FOR EXECUTING WEB SERVICES IN A SYSTEM OF ENGAGEMENT AND SYSTEM OF RECORD ENVIRONMENTS - A method for implementing an on-premises process broker. The method may include receiving parameter data from a system of engagement, whereby the parameter data includes a query goal. The method may include storing the parameter data in a cache. The method may include preparing a REST call using programming logic based on the parameter data. The method may include transmitting the prepared REST call to a system of record. The method may further include receiving response data from the system of record based on the transmitted REST call. The method may also include updating the parameter data in the cache based on the response data. The method may include determining whether the query goal is satisfied. The method may also include transmitting the parameter data to the system of engagement based on determining the query goal is satisfied. | 2017-09-14 |
20170264695 | Methods and Apparatus for Optimizing Sevice Discovery - A first computing device and a second computing device may both be located behind the same gateway. The first computing device and the second computing device may not be part of a same local area network. Accordingly, the first computing device and the second computing device may not be discoverable to each other via standard layer two discovery protocols. The first computing device may be a tunneled device and the second computing device may be a non-tunneled device. Accordingly, the first computing device and the second computing device may not be discoverable to each other via standard layer three discovery protocols. Described herein are systems and methods for performing IP packet manipulation to facilitate a local discovery session between the first computing device and the second computing device. | 2017-09-14 |
20170264696 | PUBLISH-SUBSCRIBE MESSAGING IN A CONTENT NETWORK - A plurality of subscribers are registered to receive, from a publisher component, at client devices, via a broker component, at least one of messages and content pertaining to a first topic. Each of the subscribers is caused to generate one of N random numbers. A different one of the N random numbers is generated by each of the subscribers. Each of the subscribers is instructed to listen only for the messages and content pertaining to the first topic and corresponding to the corresponding one of the N random numbers. The at least one of messages and content pertaining to the first topic are published to those of the subscribers associated with each one of the N random numbers, number by number, until the at least one of messages and content pertaining to the first topic has been published to all of the plurality of subscribers. | 2017-09-14 |
20170264697 | SYSTEMS AND METHODS FOR ENABLING SERVICE INTEROPERABILITY FUNCTIONALITY FOR WIFI DIRECT DEVICES CONNECTED TO A NETWORK VIA A WIRELESS ACCESS POINT - Certain embodiments herein are directed to enabling service interoperability functionality for wireless fidelity (WiFi) Direct devices connected to a network via a wireless access point. A WiFi Direct device may identify various other WiFi Direct devices on a WiFi network for performing a requested service, such as printing content or displaying content to a screen. In so doing, the device may share information associated with an access point to which the device is connected with the other devices, which may also share information associated with an access point to which they are connected. In this way, WiFi Direct devices may discover their connectivity with respect to other devices to utilize a broader array of connection options for implementing a desired service, and hence, may leverage application programming interface (API) modules directed at providing service interoperability functionality between software applications and services requested by the software applications. | 2017-09-14 |
20170264698 | Activity Recognition with Activity Reminders - An athletic performance monitoring system, for motivating a user to reach a goal level of athletic activity. The system may motivate the user by calculation a deficit between a current total level of activity and the goal level of athletic activity, and suggesting activity types that the user may carry out an order to reach the goal level, wherein the suggested activity types may be based on activities that are geographically close to the user, or sporting equipment worn by, or in possession of, the user. | 2017-09-14 |
20170264699 | RECOMMENDATIONS FOR SHAREBLE LINKS TO CONTENT ITEMS STORED IN AN ONLINE CONTENT MANAGEMENT SERVICE - Recommendations for shareable links to content items stored in an online content management service. In one aspect, a recommendation is sent to a first user to create and share a shareable link to a content item with a second user. The content item to share via a shareable link is identified as one that is currently not shared by the first user and that has one or more characteristics in common with a “popular” content item as determined by monitoring the popular content item for a threshold number of requests to access the popular content item via a corresponding shareable link to the popular content item. | 2017-09-14 |
20170264700 | APPARATUS AND METHOD FOR SHARING INFORMATION THROUGH PRESENCE SERVICE IN A COMMUNICATION NETWORK - An apparatus is capable of sharing information through a presence service in a communication network and capable of providing presence information of a Mobile Station (MS). The apparatus extracts at least one of application information and contents indication information from an application in execution. Presence information is generated that includes at least one of the application information and the contents indication information, and transmitting the presence information to a presence server. | 2017-09-14 |
20170264701 | SYSTEM AND METHOD FOR CONTEXT SPECIFIC WEBSITE OPTIMIZATION - A system for optimizing a website for different contexts includes an intermediary component configured to connect to clients and servers via network connections, means for analyzing a HTTP request from a client and determining specific context of the HTTP request, means for configuring optimization settings of selected website properties for the specific context of the HTTP request, and means for applying the configured context-specific optimization settings to redirected HTTP requests and HTTP responses. The intermediary component includes a traffic management system (TMS) and a traffic processing system (TPS). The TMS manages HTTP requests originating from the clients and targeting the servers and HTTP responses targeting the clients and redirects the HTTP requests to the intermediary component. The TPS receives the redirected HTTP requests and the HTTP responses, detects the context and applies relevant optimization techniques for the specific context to the redirected HTTP requests and the HTTP responses. | 2017-09-14 |
20170264702 | DISTRIBUTED HIERARCHIAL CACHE MANAGEMENT SYSTEM AND METHOD - A method for managing a cache memory network according to a distributed hierarchical cache model is disclosed. The distributed hierarchical cache model includes a plurality of cache levels each corresponding to a delivery rank for delivering data content to users of the cache memory network. The method includes dividing at least one cache memory of the cache memory network into a plurality of cache segments, mapping each of the cache segments to a cache level of the distributed hierarchical cache model, and performing cache management operations over the cache memory network according to the distributed hierarchical cache model. | 2017-09-14 |
20170264703 | PROCESS BROKER FOR EXECUTING WEB SERVICES IN A SYSTEM OF ENGAGEMENT AND SYSTEM OF RECORD ENVIRONMENTS - A method for implementing an on-premises process broker. The method may include receiving parameter data from a system of engagement, whereby the parameter data includes a query goal. The method may include storing the parameter data in a cache. The method may include preparing a REST call using programming logic based on the parameter data. The method may include transmitting the prepared REST call to a system of record. The method may further include receiving response data from the system of record based on the transmitted REST call. The method may also include updating the parameter data in the cache based on the response data. The method may include determining whether the query goal is satisfied. The method may also include transmitting the parameter data to the system of engagement based on determining the query goal is satisfied. | 2017-09-14 |
20170264704 | METHOD OF TRANSFERRING DATA, DATA TRANSFER DEVICE AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - A method of transferring data executed by a data transfer device, the method includes receiving a plurality of first data and a plurality of second data, accumulating the received plurality of first data and the received plurality of second data respectively, sending, to a first node, the plurality of first data accumulated during a first period, and sending, to a second node, the plurality of second data accumulated during a second period, wherein, the first period is longer than the second period when a first data amount of the plurality of first data to be sent to the first node per unit time is greater than a second data amount of the plurality of second data to be sent to the second node per the unit time. | 2017-09-14 |
20170264705 | COMMUNICATION METHOD OF NODE OVERHEARING CONTENT IN CONTENT CENTRIC NETWORK AND NODE - Provided is a communication method of a node overhearing content in a content centric network (CCN) and the node, the communication method including, overhearing a content transmitted from a neighboring node, caching the overheard content, and providing the overheard content, in response to receiving a content request packet requesting the overheard content. | 2017-09-14 |
20170264706 | Integrating Complex Data Structures into Collaboration Environments - Various embodiments of the present disclosure provide improved mechanisms and techniques for integrating complex data structures with collaboration environments. Various embodiments involve creating a collaboration group around a selected complex data structure, and including the selected complex data structure as well one or more other related complex data structures in the collaboration group. In some embodiments, an object consumption definition is applied to metadata associated with the complex data structure to determine the related complex data structures. | 2017-09-14 |
20170264707 | UPLOADING A FORM ATTACHMENT - Embodiments of the present application relate to a method, apparatus, and system for uploading a form attachment file. The method includes receiving, from a second terminal, a request for an attachment upload address. In response to receiving the request for the attachment upload address, sending a form attachment upload address to the second terminal, receiving, from a first terminal, an attachment upload page access request, and receiving a form attachment from the first terminal. | 2017-09-14 |
20170264708 | LOGIN PERFORMANCE - An embodiment of the invention may include a method, computer program product and system for receiving a request from a user to access a system. The user requesting access has an associated job function. The embodiment of the invention may include determining an access window for the job function of the user. The access window for the job function is a range of time where historical usage of the system by one or more users having the job function is above a threshold amount. The embodiment of the invention may include determining whether a time of access of the request is within the access window. The embodiment of the invention may include granting access to the system based on determining that the time of access of the request is within the access window. | 2017-09-14 |
20170264709 | MEDIA INTELLIGENCE SUITE - A device may receive an indication to determine status information associated with a media content delivery of media content. The media content may be delivered via a content delivery system. The device may determine, based on information provided by devices included in the content delivery system, progress information associated with the media content delivery. The progress information may identify progress, associated with the media content delivery, with respect to one or more steps, associated with delivering the media content, performed by the devices included in the content delivery system. The device may determine the status information, associated with the media content delivery, based on the progress information. The status information may indicate the status of the media content delivery. The device may provide the status information such that the status information may be displayed as a visual indication of the status of the media content delivery. | 2017-09-14 |
20170264710 | COORDINATED THING-SOURCING IN AN INTERNET OF THINGS - Requirements for a thing-sourcing project that comprises a thing-sourcing task are posted to thing-sourcing participant devices. Electronic requests are received from a first group of the thing-sourcing participant devices, to participate in the task. The electronic request identifies a portion of the task that can be accomplished by the thing-sourcing participant device, but none of the electronic requests indicate that the task can be accomplished entirely by any one of the thing-sourcing participant devices. A second group of the thing-sourcing participant devices is selected from the first group of the thing-sourcing participant devices. The second group of the thing-sourcing participant devices can collectively accomplish the task, even though none of the second group of the thing-sourcing participant devices can accomplish the task individually. Execution of the thing-sourcing project by the second group of the thing-sourcing participant devices is then coordinated. Related systems, methods and computer program products are provided. | 2017-09-14 |
20170264711 | METHOD AND SYSTEM FOR ACHIEVING IMPROVED QUALITY OF SERVICE (QOS) FOR CONTENT DELIVERY IN A SDN CONTROLLER BASED COMMUNICATION NETWORK - In one embodiment, an application server to achieve improved quality of service (QoS) for content delivery in a communication network is disclosed. The application server receives a request from a client device to deliver content to the client device. The application server determines a relative priority of each of a plurality of content delivery servers in the communication network based on at least one of one or more parameters and a configuration file. The application server identifies at least one content delivery server from the plurality of content delivery servers based on relative priority. The application server identifies a shortest path for the content delivery between the identified at least one content delivery server and the client device based on one or more pre-defined rules. The application server further transmits the content from the identified at least one content delivery server to the client device via the identified shortest path. | 2017-09-14 |
20170264712 | CONTENT BLOCKER DETECTION AND CIRCUMVENTION - Methods and systems for circumventing content blocking systems are disclosed. Example implementations include detecting the presence of an existing blocker that disrupts a first content-type and circumventing the blocker, such that a circumvented first content-type is presented to a user. The method can also include determining that the blocker has adjusted to block the circumvented content, in which case, the method can include disrupting presentation of a second content-type. | 2017-09-14 |
20170264713 | SERVICE FUNCTION CHAINING BRANCHING - A system comprising a plurality of service nodes, a controller and a network device in communication with the controller. Each of the plurality of service nodes is configured to support one or more service functions to establish a service function chain that includes a plurality of service functions to be performed by routing traffic among the plurality of service nodes. The controller is configured to generate provisioning information for the service function chain. The provisioning information includes at least one condition upon which a service function reclassification or branching operation is to be performed by at least one service node. The network device is in communication with the controller, and is configured to distribute the provisioning information for the service function chain to the plurality of service nodes using a distributed routing protocol. | 2017-09-14 |
20170264714 | METHOD AND SERVER FOR DISPLAYING ACCESS CONTENT - Embodiments of the present application relate to the technical field of computers, and in particular, to a method and a server for displaying access content, which are used to resolve the problem existing in the prior art that because information is inaccurately transmitted, a user may interrupt access or perform repeated access, causing a resource waste for a computer system or an Internet system. According to the embodiments of the present application, access content requested by a first user is determined according to an access request of the first user, a presentation identifier corresponding to a second user identifier comprised in the access content is determined, and the access content is returned to the first user, so that a peer end displays the received presentation identifier, thereby improving accuracy of information transmission, reducing the occurrence of interrupted access or repeated access of a user due to inaccurate information transmission, and reducing the resource waste caused for a computer system or an Internet system. | 2017-09-14 |
20170264715 | VIRTUAL ASSISTANT SYSTEM TO ENABLE ACTIONABLE MESSAGING - A virtual assistant system includes a mobile device to receive an input command corresponding to a function to be performed at one or more external services, to translate the input command into a semantic atom representing the command, and to transmit the semantic atom, and an assistant server configured to receive the transmitted semantic atom, the assistant server including a plurality of plugins, each plugin corresponding to a respective one of the external services and configured to generate a proprietary language command corresponding to the received semantic atom for each external service in which the function is to be performed. | 2017-09-14 |
20170264716 | COMMUNICATION PACKET HEADER DATA COMPRESSION - A data communication system compresses packet headers. A transmitter executes state machines to process a data packet and determine if a transmitter state machine is transferring Interdependent Machine Output (IMO) data. The transmitter generates an IMO vector that indicates if any IMO data is in the data packet. If IMO is present, then the transmitter augments the IMO vector to indicate the individual transmitter state machines that transferred the IMO data. The transmitter transfers the data packet with the IMO vector to a receiver. The receiver processes the IMO vector to determine if any IMO data is transferred in the data packet. If IMO data is transferred, then the receiver processes the augmented IMO vector to transfer the IMO data to individual receiver state machine that correspond to the transmitter state machines that transferred the IMO data. | 2017-09-14 |
20170264717 | FRAME DELINEATION METHOD FOR A GENERIC FRAMING PROCEDURE - A frame delineation method for a generic framing procedure (GFP) that includes: searching a serial data stream comprising GFP frames, octet by octet, to identify an eight octet sequence; and delineating GFP frames from the serial data stream in response to determining that a first group of four octets of the identified eight octet sequence comprises a valid Core Header, and in response to determining that a second group of four octets of the identified eight octet sequence comprises one of a valid Core Header and a valid descrambled Type Header. | 2017-09-14 |
20170264718 | COMMUNICATION CIRCUITRY IN AN ELECTRONIC CONTROL UNIT - This application discloses an electronic control unit coupled to a bus in a vehicle communication network. The electronic control unit includes a processing system configured to generate an instruction including an identifier of a type of signal exchanged through a vehicle communication network and including a command associated with exchange of a signal value corresponding to the type of the signal. The electronic control unit includes a communication circuitry configured to identify, based on the type of the signal in the instruction, a packet having a section allocated for the signal value corresponding to the type of the signal. The communication circuitry also can perform packet operations on the section of the packet allocated for the signal value based, at least in part, on the command included in the instruction. The packet operations can include packing the signal value into the packet or extracting the signal value from the packet. | 2017-09-14 |
20170264719 | Multi-Stream Interleaving for Network Technologies - Methods for adding timestamps to packets from data streams in a computing network may include receiving, in a processor in the computing network, a plurality of data streams and building, by the processor a first packet from a first data stream in the plurality of data streams. The processor may further determine a value of a first timestamp for outputting the first packet that satisfies one or more parameters of the first data stream, add the first timestamp to the first packet, and hand over the first packet to a network device in the computing network. | 2017-09-14 |
20170264720 | UNIBODY DESK TELEPHONE - An example system for a telephone can include a unibody plate having a front portion and a back portion, a back plate mounted to the back portion of the unibody plate, and a touch sensitive display panel mounted to the front portion of the unibody plate. The unibody plate can be of a single piece of milled material. The back portion of the back plate, when combined with the unibody plate, can forming at least one cavity such as a speaker cavity. The speaker cavity can include a speaker mount, a speaker cradle, and a speaker. The speaker cradle can have an interior portion and be secured to the back plate. The speaker mount can engages the back portion of the unibody plate and the rim of speaker cradle. The speaker can be mounted within the interior portion of the speaker cradle. | 2017-09-14 |
20170264721 | CONDUCTIVE STRUCTURAL MEMBERS ACTING AS NFC ANTENNA - In an embodiment, conductive structural members of a device acting as NFC antenna are described. According to an embodiment, a device comprises: two conductive structural members, each comprising a first electrical end and a second electrical end, a dielectric isolation being configured between the first electrical end of the first structural member and the first electrical end of the second structural member; two NFC antenna feeds, the first feed being electrically coupled with the first electrical end of the first member, the second feed being electrically coupled with the first electrical end of the second member; two grounding components, one each grounding the second electrical end of the conductive structural members; at least one additional antenna feed configured for a frequency other than that of NFC, coupled to either of the two members. | 2017-09-14 |
20170264722 | ELECTRONIC DEVICE - The present disclosure relates to a type of electronic device, comprising an internal circuit and a surface structure. The internal circuit comprises a circuit board, a feed portion, and a coupler. The surface structure comprises a rectangular display, a metal casing, an elongated metal plate, a connection element, a resonant element, and a dielectric material. The circuit board is provided with a reference plane and a transceiver installed thereon. The feed portion is electrically connected to the transceiver. The coupler is electrically connected to the feed portion. The rectangular display is located at the top portion of the electronic device. The metal casing is electrically connected to the reference plane of the circuit board, forming an integrated reference ground. The elongated metal plate is located on one side surface of the electronic device and is separated from the edge of the metal casing by a gap. The connection element is located within the gap and connects the elongated metal plate and the metal casing. The resonant element comprises a part of the edge of the elongated metal plate, the connection element, and a part of the edge of the metal casing connected to each other. The resonant element and the coupler are separated. The coupler is capacitively coupled to the resonant element. The dielectric material fills the gap. | 2017-09-14 |
20170264723 | DISPLAY SYSTEM WITH A FLEXIBLE DISPLAY - A display system includes a continuous flexible display, two book halves, two main display supports, and a movement synchronizing coupling. The two book halves is connected to each other via a hinge mechanism. The hinge mechanism has two hinges, and each hinge is rotatable about respective axis. Each of the two main display supports connects to one of the two book halves and is configured to support the flexible display. The coupling is connected to the two main display supports and rotating about a rotation axis that is parallel to the axis of hinge to enable a synchronized movement of the two main display supports. | 2017-09-14 |