42nd week of 2021 patent applcation highlights part 75 |
Patent application number | Title | Published |
20210328962 | COMPUTER SOFTWARE SYSTEM AND METHOD FOR CREATING AND SCHEDULING POSTS ON MULTIPLE SOCIAL MEDIA PLATFORMS SIMULTANEOUSLY - The present invention comprises a system, method and software application for social media subscribers to post simultaneously on multiple platforms, or post multiple times throughout a certain time period. The system, method and software allow users to create message posts in a single step for posting on multiple platforms, and schedule posts to occur automatically as scheduled. The system comprises a computing device, and a software program downloadable to or accessible by the computing device. The computer-implemented method may include creating a user database, creating a social media post, selecting at least one social media platform destination, scheduling posting of the post, storing post data, analyzing data and generating a data analysis report accessible by the user. The present invention enables the user to create and schedule posts on multiple social media platforms, and permits minimization of processing time, enabling the user to save time and money for future planning. | 2021-10-21 |
20210328963 | SYSTEM AND METHOD FOR ENABLING REAL-TIME EVENTING - A method and system for real-time eventing including interacting with at least one configuration attribute according to instructions specified through an application programming interface (API); adding subscribers for an event channel; generating an event from operation of an application; publishing the event message to the event channel on an event router; processing the event message according to the at least one configuration attribute; identifying a subscriber to the event channel; and sending the event from the event router to the subscriber. | 2021-10-21 |
20210328964 | SYSTEM AND METHOD FOR ENABLING REAL-TIME EVENTING - A method and system for real-time eventing including interacting with at least one configuration attribute according to instructions specified through an application programming interface (API); adding subscribers for an event channel; generating an event from operation of an application; publishing the event message to the event channel on an event router; processing the event message according to the at least one configuration attribute; identifying a subscriber to the event channel; and sending the event from the event router to the subscriber. | 2021-10-21 |
20210328965 | System and Method of Generating Automated Communications - A system and method are disclosed to generate, transmit, and update communications with end user systems. Embodiments comprise an automation platform comprising a processor and memory. Embodiments generate a communication based, at least in part, on input from a rules engine and one or more communication templates. Embodiments modify the content of the generated communication, and transmit, using one or more communication channels, the modified communication to one or more end user systems. Embodiments monitor the one or more end user systems for a response communication to the transmitted communication. In response to the one or more end user systems transmitting one or more response communications using at least one of the one or more communication channels, embodiments generate and transmit an updated communication to the one or more end user systems. | 2021-10-21 |
20210328966 | Systems and Methods for Providing an Online Platform for Facilitating a Communication Connection Between an Individual and an Elected Official - Systems and methods for providing an online platform that enables an organization to provide information to interested individuals are described. The organization requests individuals to contact elected officials to express support, rejections or comments for specific issues. The online platform determines an advocate's elected official(s) and facilitates a communication connection between the advocate and an elected official(s). Geocoding is performed using the individual's street address and zip code to obtain geographical coordinates, and the coordinates are geomatched to district matching databases to determine the individual's elected officials. The individual selects a preferred method of connecting, and the platform enables and facilitates the connection. Further, the platform tracks and analyzes actions taken by advocates, provides analytical data about advocacy campaigns initiated by organizations, and also rates advocates based on the actions taken and the method by which the actions were taken to advocate for issues. | 2021-10-21 |
20210328967 | Method for Configuring, Method for Providing Topology Information, Name Service Server, Device, Computer Program and Computer-Readable Medium - A method for providing topology information, use of a name service server, a device, a computer program, a computer-readable medium and a method for configuring a device to be named within an industrial network, wherein a) the device to be named receives a neighbouring name message from a neighbouring device, b) a self-naming module creates a topological neighbouring domain name based on the neighbouring name message, c) the self-naming module transmits the topological neighbouring domain name to a name service server, d) the self-naming module receives from the name service server a response message, which includes at least one device name of the device to be named belonging to the topological neighbouring domain name, and e) at least one device name from the response message is assigned to the device to be named and this name is stored as the device name by the self-naming module. | 2021-10-21 |
20210328968 | SYSTEMS AND METHODS FOR MANAGING DOMAIN NAMES IN A PLURALITY OF COMPUTERIZED DEVICES COMMUNICATING OVER A COMMUNICATION NETWORK - Systems and methods of the present invention provide for servers generating a suggested domain name from a requested domain name via a modification using a variation algorithm using a first variation technique in a plurality of variation techniques. The server(s) render a user feedback interface including the suggested domain name and a first and second user interface control encoding a positive and negative response to the variation technique respectively. After decoding a response, the server(s) generate a user interface allowing the user to review which of the suggested domain names have been liked or added to a favorites list by other users. | 2021-10-21 |
20210328969 | SYSTEMS AND METHODS TO SECURE API PLATFORMS - A method and system for protecting access to remote systems, such as resource datases containing sensitive resources, such as cryptographic keys or personally identifying information, is disclosed. A server can receive a plurality of access requests from a requesting entity. The server can identify an entity profile corresponding to the access requests, as well as a machine learning model corresponding to the entity profile. The access requests can be used to form access sequences, which can be evaluated by the machine learning model. The machine learning model returns an anomaly score that can be compared to a threshold. If the anomaly score exceeds the threshold, the server can prevent further access to the remote system, for example, by revoking a credential associated with the requesting entity. | 2021-10-21 |
20210328970 | WEB ATTACK DETECTING AND BLOCKING SYSTEM AND METHOD THEREOF - A system for detecting and blocking a web attack includes a filter unit receiving web request data from a user terminal, and controlling a web application to maintain a standby state, and a web firewall daemon receiving the web request data from the filter unit and determining a risk by analyzing the web request data and transmitting the resulting risk to the filtering unit. A method of detecting and blocking a web attack includes receiving web request data from a user terminal, controlling a web application to maintain a standby state, transmitting the web request data to a web firewall daemon, determining a risk by analyzing the web request data, and transmitting the risk of the web request data to the filtering unit. Embodiments of the present invention can provide customer customized web security service without affecting the stability and the availability of the web application. | 2021-10-21 |
20210328971 | SECURE SERVICE MESH - A request to perform an operation associated with a service instance may be received by a processing device. The service instance may have an associated service instance identifier. A proxy instance associated with the service instance may be identified. The proxy instance may perform operations within a secure enclave associated with the processing device. The proxy instance within the secure enclave associated with the processing device may be used to verify that the secure enclave associated with the processing device contains the service instance associated with the service instance identifier. When the verification is successful, the proxy instance within the secure enclave associated with the processing device may be used to send a request to the service instance to perform the operation. | 2021-10-21 |
20210328972 | RPC CALL INTERCEPTION - A service proxy is described herein. The service proxy is configured to act as an intermediary between a client and a service. The service proxy may observe communications, modify communications, log communications, or the like, particularly so as to enhance the security and reliability of the host device. In some implementations, the service proxy may cooperate with an operating system to take over a named port object. In some implementations, the service proxy may receive messages as an intermediary between the client and the server. In some implementations, the service proxy may attach to a shared memory to intercept communications. In some implementations, the service proxy may be injected into a client process to appear to be the client itself. | 2021-10-21 |
20210328973 | TRANSACTIONAL IDENTITY SYSTEM AND SERVER - Disclosed are systems, servers and methods for a novel, multifactor-token based framework for securely executing electronic transactions while protecting user and transactional data related to and/or communicated during the transactions. The disclosed systems and methods enable an on-demand multifactor token to be generated for electronic transactions, whereby the tokens can be specific to a type of transaction, a type of entity and/or other party involved, and the like. The disclosed tokens can be relayed between users and the parties they are interacting with rather than personally identifiable information, which ensures a user's data is securely maintained and prevented from undesired exposure on a network. | 2021-10-21 |
20210328974 | SYSTEM AND METHOD OF UTILIZING REMOTE INFORMATION HANDLING SYSTEMS TO SECURELY STORE FILES - In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: receive, by a first information handling system (IHS), one or more client files of a web application; receive a binary module; populate a document object model (DOM) with content of the web application; receive first user input via a first node of the DOM; receive an encrypted file and a first portion of a symmetric encryption key from a second IHS; receive second user input via a second node of the DOM; execute a binary module; provide the second user input to the binary module; determine a second portion of the symmetric encryption key based at least on the second user input; combine the first and second portions of the symmetric encryption key to obtain the symmetric encryption key; and decrypt the encrypted file to obtain the file. | 2021-10-21 |
20210328975 | SYSTEM AND METHOD FOR ENCRYPTING A DATA ALERT - A method and system for providing real-time encrypted data alerts over secure networks. The method and system detect the improper duplicate data records and generate alerts that indicate the improper duplication. The systems encrypt the data alerts and transmit them to remote devices over private, secure networks to protect sensitive data contained in the alerts. | 2021-10-21 |
20210328976 | Sending Secure Communications Using a Local Ephemeral Key Pool - A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver. | 2021-10-21 |
20210328977 | AUTHENTICATION FOR LOGICAL OVERLAY NETWORK TRAFFIC - Example methods and systems for authentication for logical overlay network traffic are described. In one example, a first computer system may detect an inner packet and generate authentication information associated with the inner packet based on control information from a management entity. The authentication information may indicate that the inner packet originates from a trusted zone. The first computer system may further generate an encapsulated packet by encapsulating the inner packet with an outer header that specifies the authentication information, and send the encapsulated packet towards the second virtualized computing instance to cause a second computer system to verify that the inner packet originates from the trusted zone based on the authentication information. | 2021-10-21 |
20210328978 | ANALOG WAVEFORM MONITORING FOR REAL-TIME DEVICE AUTHENTICATION - A method that includes operating a bus monitoring system having at least one interface configured to be coupled to at least one communication bus and receive bus traffic transmitted over the communication bus(es). The method also includes, using a device authentication system of the bus monitoring system, analyzing the bus traffic received via the at least one interface. Analyzing the bus traffic includes obtaining a message in the bus traffic (where the message identifies a source), identifying a support vector machine that corresponds to the source of the message, applying a wave transform to a waveform of the received message in order to generate a transformed waveform, inputting the transformed waveform to the identified support vector machine, and taking action in response to the identified support vector machine determining that the transformed waveform or the associated information does not correspond to the source. | 2021-10-21 |
20210328979 | Automatic Provisioning - The present disclosure pertains to provisioning of credentials, and in particular to provisioning of authentication credentials to a computer device for accessing a cloud platform computer system. The computer device obtains sensor data and sends a request including a device identifier to a provisioning server using a provisioning server network address. The computer device receives a response, from the provisioning server, including a platform credential and a platform server network address of a platform server. The computer device stores the platform credential. The computer device sends the sensor data and the platform credential to the platform server using the platform server network address. | 2021-10-21 |
20210328980 | SECURING IDENTITY TOKEN FORWARDING - Methods, systems, and computer-readable storage media for receiving, from a first component and by a second component in a cloud platform, a call, a token, and a first client certificate, determining, by the second component, a first client identifier associated with the first component, and determining, by the second component, that the first client identifier is included in a manifest of the token, the manifest defining at least a portion of a communication path between components within the cloud platform, and in response: executing functionality responsive to the call. | 2021-10-21 |
20210328981 | COMPUTING SYSTEMS UTILIZING GENERATED UNIQUE AUTHORIZATION IDENTIFIERS FOR AUTHORIZING USER OPERATIONS AND METHODS OF USE THEREOF - In some embodiments, an exemplary method may include receiving by a computing device of a user, first facial image data of the user for identity verification from an authorizing entity for authorizing user operations in computing systems managed by a plurality of entities. Second facial image data of the user is obtained using an imaging device of the computing device at a predefined location of a particular entity from the plurality of entities for authenticating the user. A unique authorization identifier is displayed of the computing device of the user. A location of the computing device and a timestamp when a computing terminal of the particular entity scans the unique authorization identifier on the computing device of the authenticated user and an authorization request is relayed to the authorizing entity. An approval is received based on verification of the unique authorization identifier generated for the particular entity, the location of the computing device, and the timestamp. | 2021-10-21 |
20210328982 | SYSTEMS, METHODS, AND NON-TRANSITORY COMPUTER-READABLE MEDIA FOR SECURE BIOMETRICALLY-ENHANCED DATA EXCHANGES AND DATA STORAGE - A privacy-enhancing system, method, and non-transitory computer-readable medium for securely identifying or verifying an individual over time without retaining sensitive biometric data (e.g., biometric images or biometric templates) for the purpose of securely storing data regarding the individual. | 2021-10-21 |
20210328983 | AUTHENTICATION VIA CAMERA - Systems and methods for authentication via camera are provided. In example embodiments, an authentication server transmits, to a mobile device, an identity verification image. The authentication server receives, from a computing device, a scanned image, wherein the computing device is different from the mobile device. The authentication server determines whether the scanned image includes data from the identity verification image. The authentication server transits, to a web server accessed by the computing device, an indication that a user's identity has been verified upon determining that the scanned image includes the data from the identity verification image. | 2021-10-21 |
20210328984 | DEVICE FOR IDENTIFYING A PERSON AND A METHOD THEREOF - A device having a fingerprint reader and a first heart rate monitor which are co-located such that a person's heart rate is obtained at the same time as this fingerprint. The device is integral to yet another heart rate monitor for monitoring the performance of the person in exercise. The readings of the other heart rate monitor correlates to the readings of the first heart rate monitor if the person whose fingerprint is read is the same person wearing the second heart rate monitor, in which case the fingerprint is deemed acceptable for identifying the person. Other biometric identification besides fingerprint can be used such as iris recognition. | 2021-10-21 |
20210328985 | SYSTEM FOR NETWORK ISOLATION OF AFFECTED COMPUTING SYSTEMS USING ENVIRONMENT HASH OUTPUTS - A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration. | 2021-10-21 |
20210328986 | REVISITING DEVICE CLASSIFICATION RULES UPON OBSERVATION OF NEW ENDPOINT ATTRIBUTES - In various embodiments, a device classification service uses an initial device classification rule to label each of a set of endpoint devices in a network as being of a particular device type. The device classification service identifies a particular attribute exhibited by at least a portion of the set of endpoint devices and was not previously used to generate the initial device classification rule. The device classification service generates one or more new device classification rules based in part on the particular attribute. The device classification service switches from using the initial device classification rule to label endpoint devices in the network to using the one or more new device classification rules to label endpoint devices in the network. | 2021-10-21 |
20210328987 | METHOD FOR CONFIGURING ACCESS FOR A LIMITED USER INTERFACE (UI) DEVICE - A method operable by a computing device for configuring access for a limited user interface (UI) device to a network service via a local network access point is disclosed. The method comprises the steps of: obtaining from the limited UI device a device identifier via a first out-of-band channel. The device identifier is provided to the network service via a secure network link. A zero knowledge proof (ZKP) challenge is received from the network service. Configuration information is provided to the limited-UI device via a second out-of-band channel, the configuration information including information sufficient to enable the limited-UI device to connect to the local network access point. The ZKP challenge is provided to the limited-UI device via the second out-of-band channel. A secure channel key is received from the network service indicating a successful response from the limited-UI device to the ZKP challenge; and provided to the limited-UI device enabling the limited-UI device to access the network service. | 2021-10-21 |
20210328988 | SYSTEMS AND METHODS FOR ONLINE THIRD-PARTY AUTHENTICATION OF CREDENTIALS - Systems and methods are disclosed for online authentication of online attributes. One method includes receiving an authentication request from a rely party, the authentication request including identity information to be authenticated and credential information to be authenticated; determining whether a user account is associated with the received identity information by accessing an internal database; accessing user data of the user account determined to be associated with received identity information; determining authentication data to obtained from a user associated with the user account based on the user data of the user account and the credential information to be authenticated; transmitting a request for authentication data; receiving authentication data associated with the user; transmitting authentication data associated with the user; and receiving an authentication result from the verification data source server for the user associated with authentication data. | 2021-10-21 |
20210328989 | SYSTEMS AND METHODS FOR ONLINE THIRD-PARTY AUTHENTICATION OF CREDENTIALS - Systems and methods are disclosed for online authentication of online attributes. One method includes receiving an authentication request from a rely party, the authentication request including identity information to be authenticated and credential information to be authenticated; determining whether a user account is associated with the received identity information by accessing an internal database; accessing user data of the user account determined to be associated with received identity information; determining authentication data to obtained from a user associated with the user account based on the user data of the user account and the credential information to be authenticated; transmitting a request for authentication data; receiving authentication data associated with the user; transmitting authentication data associated with the user; and receiving an authentication result from the verification data source server for the user associated with authentication data. | 2021-10-21 |
20210328990 | CREDENTIAL STORAGE MANAGER FOR PROTECTING CREDENTIAL SECURITY DURING DELEGATED ACCOUNT USE - There are provided systems and methods for a credential storage manager for protecting credential security during delegated account use. A first user that controls the account may delegate usage of the account to a second user through a credential manager of a transaction process that manages sensitive authentication information and delegates account usage. The credential manager may automatically fill authentication information for use of the account by the second user. A device fingerprint of a device of the second user may be used to provide risk prevention and access the account. The credential manager may prevent revealing of the credentials and navigation to sensitive data or processes with the account. Two-factor authentication may be performed by receiving a code in a message received by a device of the first user, scraping the code from the message, and entering the code to a device of the second user. | 2021-10-21 |
20210328991 | Systems and Methods for a Secure Tipping Notification for a Motorized Mobile Chair - A system and method for a motorized mobile chair include at least one processor of the motorized mobile chair to receive sensor data from one or more sensors of the motorized mobile chair, the sensor data comprising attitude data of the motorized mobile chair, determine a tipping of the motorized mobile chair has occurred based on the attitude data of the motorized mobile chair, transmit an authentication key to a remote server, wherein the authentication key, when authenticated by the remote server, corresponds to a unique user account, and transmit at least one of the attitude data of the motorized mobile chair and a communication identifying the tipping of the motorized mobile chair from the motorized mobile chair to the remote server for storage in a memory in association with the unique user account when the authentication key has been authenticated by the remote server and the at least one processor determines the tipping of the motorized mobile chair has occurred. | 2021-10-21 |
20210328992 | COMPUTER READABLE STORAGE MEDIA FOR TIERED CONNECTION POOLING AND METHODS AND SYSTEMS FOR UTILIZING SAME - Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool. | 2021-10-21 |
20210328993 | ACCESS TO A SERVICE IN A NETWORK - There is provided mechanisms for handling access to a service in a network. A method is performed by a network controller. The method comprises obtaining an indication of the service is accessible in the network. The indication is received from a network switch operatively connecting a server of the service to the network. The indication causes a timer to start. The method comprises obtaining an indication of a client requesting to access the service. The indication is received from the network switch. The method comprises recording, only when the timer has not yet expired, identity information of the client in an access control list. The method comprises providing the access control list at least to the network switch upon expiration of the timer. | 2021-10-21 |
20210328994 | ACCESS MANAGEMENT SYSTEM AND ACCESS MANAGEMENT METHOD - According to one embodiment of the present application, provided is an access management method of an access control device, comprising the steps of: receiving, from a user terminal, a first advertising packet including open authentication information; generating a key on the basis of at least a first random key; confirming the open authentication information on the basis of the generated key; and determining the opening of a door on the basis of the open authentication information. | 2021-10-21 |
20210328995 | SYSTEM FOR PREVENTION OF UNAUTHORIZED ACCESS USING AUTHORIZED ENVIRONMENT HASH OUTPUTS - When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements. | 2021-10-21 |
20210328996 | ACCOUNT ACCESS RECOVERY SYSTEM, METHOD AND APPARATUS - Some embodiments of the invention provide a program for recovering access to a service associated with an account. The program provides a login credential to log into the account to receive the associated service. Next, the program receives an access continuation parameter (ACP) after logging into the account. The program then accesses the service and receives a rejection of a subsequent access to the service. The program then provides the ACP in lieu of the login credential to continue to receive the service. | 2021-10-21 |
20210328997 | PERMISSION BASED RESOURCE AND SERVICE DISCOVERY - Current discovery mechanisms lack capabilities, such as capabilities related to permissions associated with a given registrant for example. In an example embodiment, a registrant of a service layer can communicate with a network node that hosts the service layer. The network node may receive a discovery request for a resource from the registrant. The discovery may request include various context. For example, the context of the discovery request may be indicative of an operation that the registrant intends to perform on the resource, a role that the registrant intends to assume if the registrant accesses the resource, a location in which the registrant intends to access the resource, or a subscription plan that the registrant intends to use if the registrant accesses the resource. Based on the context of the discovery request, the network node may determine whether one or more resources at the service layer satisfy the discovery request. | 2021-10-21 |
20210328998 | Tenant Grouping For Secure Transport of Content - A distribution network communicates content to tenant groups in a secure manner. An engine of the distribution network receives content created utilizing an application having different customers and partners. The engine also receives: a first identifier indicating a customer of the application with which a tenant is associated, and a second identifier indicating a partner of the application with which the tenant is associated. The engine references a stored database table to correlate the first identifier and the second identifier. Based upon the first identifier and the second identifier, the engine evaluates whether the tenant is to be provided access to the content. The engine may provide the tenant with the content according to an access right determined from the first identifier and the second identifier. Certain embodiments may find particular use disseminating content to new tenants of a customer, based upon prior distribution to other tenants of that customer. | 2021-10-21 |
20210328999 | TECHNIQUES INVOLVING A SECURITY HEAT MAP - A technique utilizes a security heat map associated with a geographic region. The technique involves receiving, by a server, current heat scores for one or more endpoint devices located within the geographic region. The technique further involves providing, by the server, for areas within the geographic region, respective aggregate heat scores based on the current heat scores for the one or more endpoint devices. The technique further involves, based on the respective aggregate heat scores for the areas within the geographic region, generating, by the server, a security heat map defining one or more security zones within the geographic region. The technique further involves imposing, by the server, security policies on the one or more endpoint devices based on the security heat map. | 2021-10-21 |
20210329000 | Automated Delivery Security System - A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock. | 2021-10-21 |
20210329001 | ENFORCING DATA SOVEREIGNTY POLICIES IN A CLOUD ENVIRONMENT - Systems, methods, and computer-readable media for enforcing data sovereignty policies in a cloud environment are provided. An example method can include sending, by a cloud provider, to a government entity associated with a geographic area, a request for device certificates for nodes located within the geographic area; receiving device certificates for the nodes; creating a data sovereignty policy specifying that data associated with the government entity must be stored on nodes located within the geographic area; based on the device certificates, verifying those of the nodes that comply with the data sovereignty policy; and storing the data associated with the government entity on those of the nodes verified to comply with the data sovereignty policy. | 2021-10-21 |
20210329002 | INTELLIGENT SERVICE PROVIDING METHOD AND APPARATUS BASED ON AUTHENTICATION LEVEL - A method for providing a service using a device based on an authentication level is disclosed. The method for providing a service using a device based on an authentication level according to one embodiment of the present invention includes, when a first authentication request to request configuring of a first authentication level for the device is obtained, configuring the first authentication level for the device; when an access request to one of a plurality of services provided using the device is obtained, determining whether the first authentication level for the device matches the access request; and upon determination that the first authentication level matches the access request, providing the service using the device. Thus, the service corresponding to the authentication level matching with the authentication may be provided without the need of further authentication. The present intelligent devices may be associated with autonomous driving vehicles, drones (unmanned aerial vehicles, UAVs), robots, augmented reality (AR) devices, virtual reality (VR) devices, and devices related to 5G services. | 2021-10-21 |
20210329003 | ON-THE-FLY CREATION OF TRANSIENT LEAST PRIVILEGED ROLES FOR SERVERLESS FUNCTIONS - The disclosed serverless security access control system leverages static analysis information about application code and runtime information to create and assign on-the-fly transient serverless function roles. A default role can be initially assigned to serverless functions of the application. The default role allows the function to communicate with a security access broker. The access broker accesses least privilege information about an invoked serverless function and then creates and assigns a transient role to the serverless function based on that information. The short life of the role reduces and possibly eliminates the security risk of an over-permissive role. The access broker can update the least privilege information based on updated analysis of the application code and runtime information to allow flexibility and adaptation over executions. | 2021-10-21 |
20210329004 | NETWORK VERIFICATION METHOD AND APPARATUS - A network verification system obtains configuration data of a plurality of network devices, where a data model of the configuration data is described by using a general data modeling language independent of the network devices; and the network verification system verifies data links between the plurality of network devices based on the configuration data of the plurality of network devices and a topology structure between the plurality of network devices. The network verification system verifies the data links between the plurality of network devices based on the topology structure between the plurality of network devices and the configuration data described by using the general data modeling language independent of the network devices. This helps improve scalability of the network verification system and avoids relatively poor scalability of network simulation software that occurs when conventional network simulation software provides a template for configuration data of each type of network device. | 2021-10-21 |
20210329005 | Authenticated transmission of data content over a communication link - Described embodiments relate generally to methods for communication between a first computer and a second computer over a network and to computers configured to detect a corruption of such communication. Particular embodiments apply to streamed video and/or audio data transmitted from one party to another or between both parties. Embodiments are generally concerned with communication techniques that allow determination of whether communication between the two parties may have been corrupted, for example by an unauthorised third party. | 2021-10-21 |
20210329006 | APPLYING BLOCKCHAIN TO A SENSOR TRACKER - A method and a computer network of interconnected computer nodes, one assigned a role of a deployer node, the deployer node creating and executing a rule-based block, and assigning others of the computer nodes a role of sensor node or a role of display node. The deployer node maintains addresses of the sensor nodes and the display nodes, the sensor nodes add sensor track data to create linked blocks, and the display nodes read the sensor track data in the linked blocks. The rule-based block includes a sensor add rule which checks that only computer nodes assigned the role of the deployer node can assign a computer node the role of sensor node. The rule-based block includes a sensor track data add rule which checks that only the computer nodes assigned the role of sensor node can request to add new sensor track data to create the linked blocks. | 2021-10-21 |
20210329007 | Method of Using Sequential Email Numbering to Detect an Email Phishing Attempt or Fraudulent Email Within an Email Domain - Herein is disclosed a method of verifying the authenticity of emails sent within an email domain from a first email application of a sender to a second email application of a recipient, the emails each having a sender's email address, a receiver's email address, and a user-accessible field for receiving content. The content of the user-accessible field is visible to the recipient upon opening an email inbox in the second email application. The method includes the steps of first identifying the receiver for an email to be sent by the sender. A current sequence marker for the receiver is then generated. The current sequence marker represents a next sequence identifier in a sequence of emails between the sender and the receiver. The current sequence marker is then inserted into the user-accessible field of the email and the email is then sent. | 2021-10-21 |
20210329008 | Identity Verification Method and Apparatus - A first apparatus sends a first random number to a second apparatus, where a vehicle carries the first apparatus and a first set. The second apparatus belongs to the first set. The first set further includes a third apparatus. The first apparatus communicates with the third apparatus using the second apparatus. The first apparatus receives a first message from the second apparatus. The first message includes first verification information to perform identity verification on the second apparatus. The first verification information is based on identity information of the second apparatus and the first random number. The first apparatus determines, based on the first verification information and the first random number, that the identity verification on the second apparatus has succeeded. | 2021-10-21 |
20210329009 | INFORMATION SHARING METHODS, APPARATUSES, AND DEVICES - Examples in this application disclose information sharing methods, media, and systems. One example computer-implemented method includes identifying, in a trusted execution environment (TEE), a transaction for invoking a smart contract, where the transaction is a first transaction initiated by a first institution or a second transaction initiated by a second institution, the first transaction comprise a first user identity of a first user and encrypted data of the first user, and the second transaction comprise a second user identity of a second user, updating accumulative invoking information for the smart contract based on the transaction, determining whether the updated accumulative invoking information satisfies an execution condition for the smart contract, executing the smart contract to obtain a user verification result to verify data of the second user, and sending the user verification result to the second institution. | 2021-10-21 |
20210329010 | Data Loss Prevention incident forwarding - A cloud-based security system includes a plurality of enforcement nodes connected to one another; a central authority connected to the plurality of enforcement nodes; and a Data Loss Prevention (DLP) service executed between the plurality of enforcement nodes, wherein the DLP service includes one or more DLP rules based on one or more DLP engines for a tenant, and wherein, for the DLP service, a first enforcement node is configured to monitor traffic of a user of the tenant, detect a DLP rule violation based on the one or more DLP rules, and forward DLP incident information to a second enforcement node, and the second enforcement node is configured to transmit the DLP incident information to a server for the tenant, including both DLP triggering content that cause the DLP rule violation and DLP scan metadata. | 2021-10-21 |
20210329011 | ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK - The disclosed embodiments include a software-defined security (SDS) service that can monitor runtime behavior of a network of nodes of a wireless network and detect anomalous activity indicating contamination of the network of nodes, where the contamination includes unauthorized instructions designed to damage or interrupt a function of the network of nodes. The SDS service can dynamically coordinate a blacklist and a whitelist, where the blacklist includes an indication of contaminated assets and the whitelist includes an indication of non-contaminated assets. The contaminated assets are isolated with a cleanroom environment, where the security resources sanitize the contaminated assets. Then, indications of the decontaminated assets are moved from the blacklist to the whitelist, and the use of the security resources are dynamically adjusted according to a load ratio between the whitelist and the blacklist. | 2021-10-21 |
20210329012 | DISTRIBUTED DIGITAL SECURITY SYSTEM - A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests. | 2021-10-21 |
20210329013 | DISTRIBUTED DIGITAL SECURITY SYSTEM - A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests. | 2021-10-21 |
20210329014 | DISTRIBUTED DIGITAL SECURITY SYSTEM - A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests. | 2021-10-21 |
20210329015 | METHODS AND APPARATUS TO IDENTIFY SUSPICIOUS ELECTRONIC COMMUNICATION BASED ON COMMUNICATION HISTORY - Example apparatus to process an electronic communication includes a trusted communication identifier including a contact identifier to compare sender information from the electronic communication to contact information from a contact datastore, determine that a communication has not previously been sent from a recipient of the electronic communication to the sender of the electronic communication when the sender information from the electronic communication is not found in the contact datastore, and in response to determining that the communication has not been previously sent, provide an alert message that the sender information from the electronic communication is unknown. The trusted communication identifier further including a user action determiner to store the sender information from the electronic communication in the contact datastore when a response to the electronic communication has been sent. | 2021-10-21 |
20210329016 | CYBER DEFENSE SYSTEM - In one aspect, a computer-implemented method of detecting network security threats comprises the following steps: receiving at an analysis engine events relating to a monitored network; analysing the received events to identify at least one event that meets a case creation condition and, in response, creating a case in an experience database, the case being populated with data of the identified at least one event; assigning a threat score to the created case based on the event data; matching at least one further event to the created case and populating the case with data of the at least one further event, the threat score assigned to that case being updated in response; and in response to the threat score for one of the cases meeting a significance condition, rendering that case accessible via a case interface. | 2021-10-21 |
20210329017 | METHOD AND DEVICE FOR DETECTING COMPROMISE OF A TARGET BY A SIDE ATTACK - A method for detecting a side attack of a target by a user comprising a step of recording data relating to a so-called sensitive file, the sensitive file being a configuration file of the target; a step of primary connection of the user on a proxy gateway to establish a secondary connection of the proxy gateway on the target; a step of verification of the integrity of the sensitive file, subsequently to the step of secondary connection of the proxy gateway on the target and when the integrity of the sensitive tile is determined as compromised by the step of verification of the integrity of the sensitive file, and a step of detection of a side attack of the target by the user. | 2021-10-21 |
20210329018 | GENERATION OF A CONTINUOUS SECURITY MONITORING EVALUATION REGARDING A SYSTEM ASPECT OF A SYSTEM - A method includes determining, by an analysis system, a system aspect of a system for a continuous security monitoring evaluation. The method further includes determining, by the analysis system, at least one evaluation perspective and at least one evaluation viewpoint for use in performing the continuous security monitoring evaluation on the system aspect. The method further includes obtaining, by the analysis system, continuous security monitoring data regarding the system aspect in accordance with the at least one evaluation perspective and the at least one evaluation viewpoint. The method further includes calculating, by the analysis system, a continuous security monitoring rating as a measure of system continuous security monitoring maturity for the system aspect based on the continuous security monitoring data, the at least one evaluation perspective, the at least one evaluation viewpoint, and at least one evaluation rating metric. | 2021-10-21 |
20210329019 | TECHNIQUES FOR SECURING VIRTUAL MACHINES - A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority. | 2021-10-21 |
20210329020 | DETECTION RULE GROUP ADJUSTMENT APPARATUS AND COMPUTER READABLE MEDIUM - An erroneous detection amount obtaining unit ( | 2021-10-21 |
20210329021 | ON-DEMAND SECURITY LAYER FOR A 5G WIRELESS NETWORK - The disclosed embodiments include a method performed by a wireless network to dynamically provision security resources during runtime execution of a service environment. The security resources are distributed across cell sites that provide coverage areas for multiple wireless devices (WDs) in multiple service environments. The cell sites are monitored during runtime execution of the multiple service environments to detect risk levels that indicate a vulnerability to the wireless network. When an elevated risk level is detected for a particular cell site, security resources of the security layer are dynamically provisioned for the particular cell site to safeguard the entire wireless network. Hence, the provisioned security resources can include a security resource from a different cell site. | 2021-10-21 |
20210329022 | SYSTEMS, METHODS, AND STORAGE MEDIA FOR CONDUCTING SECURITY PENETRATION TESTING - Methods, systems, and computer-readable media are disclosed herein that conduct security penetration testing. In accordance with embodiments, a security extension is run in a web browser in order to record a user interface workflow and to generate a test script of the user interface workflow. The test script is executed in an application in order to perform penetration testing of the user interface workflow, in some embodiments. Based on the outcomes of the penetration testing, a security report may be generated in order to identify one or more security vulnerabilities in the user interface workflow. | 2021-10-21 |
20210329023 | MULTI-TIERED SECURITY ANALYSIS METHOD AND SYSTEM - Methods, systems, and computer readable media for providing computer security analysis are described. In some implementations, a system providing computer security analysis comprises one or more processors coupled to a non-transitory computer readable storage having software instructions stored thereon configured to cause the one or more processors to: perform a Markov Decision Process (MDP) as part of a cyber-attack mechanism and a Discrete Time Markov Chain (DTMC) process as part of a cyber-defense mechanism, preferably, the cyber-attack and cyber-defense system is modeled as MDP whereas the security analyst SA is modeled as DTMC; synchronize the cyber-attack mechanism with the cyber-defense mechanism through an attack-defense synchronization action; and synchronize an update action, wherein the attack-defense synchronization action includes initiating the DTMC process, and wherein the synchronization of the update action results from one or more actions taken by the DTMC process. | 2021-10-21 |
20210329024 | Method and System for security assessment of IoT devices | 2021-10-21 |
20210329025 | ENTERPRISE CYBER SECURITY RISK MANAGEMENT AND RESOURCE PLANNING - A system includes a memory to store network-related security policies and procedures associated with an enterprise, a display and at least one device. The device is configured to monitor enterprise activity associated the enterprise's networked and determine, based on the enterprise activity, whether the enterprise is complying with the security policies and procedures. The device is also configured to calculate a risk exposure metric for an asset of the enterprise based on the enterprise activity and whether the enterprise is complying with the security policies and procedures, and output, to the display, a graphical user interface (GUI) identifying the risk exposure metric. The device may also be configured to receive, via the GUI, an input to initiate a change with respect to at least one of the enterprise's networked devices or initiate the generation of a plan to make a change to at least one of the networked devices. | 2021-10-21 |
20210329026 | RECONSTRUCTING MISSING COMPLEX NETWORKS AGAINST ADVERSARIAL INTERVENTIONS - Methods, systems, devices and apparatuses for reconstructing a network. The network reconstruction system includes a processor. The processor is configured to determine an unknown sub-network of a network. The unknown sub-network includes multiple unknown nodes and multiple unknown links. The processor is configured to determine the unknown sub-network based on a known sub-network that has multiple known nodes and multiple known links, a network model and an attacker's statistical behavior to reconstruct the network. The processor is configured to determine one or more network parameters of the network. The network processor is configured to provide a probability of an outcome of an input or observation into the network or into a second network that has the one or more network parameters of the network. | 2021-10-21 |
20210329027 | PROOF OF WORK BASED ON COMPRESSED VIDEO - An approach is provided that transmits a compressed video file and a work unit to various clients, receiving, from at least one of the clients. A proof of work submission is received from one of the clients with the proof of work being a result of one or more computations performed by the client on a rendered form of the compressed video file. The approach determines whether the proof of work submission is acceptable. If the proof of work submission is acceptable, then a block is added to a set of blocks included in a blockchain. | 2021-10-21 |
20210329028 | COOPERATIVE MITIGATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS ORIGINATING IN LOCAL NETWORKS - Example methods, apparatus, systems and articles of manufacture to implement cooperative mitigation of distributed denial of service attacks originating in local networks are disclosed. An example network element disclosed herein is to detect a first distributed denial of service attack associated with first network traffic received by an Internet service provider network, the first network traffic originating from a first device connected to a local network. The disclosed example network element is also to implement a threat signaling client to transmit first information describing the first distributed denial of service attack to a threat signaling server implemented by a local network router of the local network, and receive second information from the threat signaling server of the local network, the second information to provide a notification when the first network traffic associated with the first distributed denial of service attack has been mitigated. | 2021-10-21 |
20210329029 | DETECTING SPOOFING IN DEVICE CLASSIFICATION SYSTEMS - In various embodiments, a device classification service obtains device telemetry data indicative of declarative attributes of a device in a network and indicative of behavioral attributes of that device. The device classification service labels the device with a device type, based on the device telemetry data. The device classification service detects device type spoofing exhibited by the device using a model that models a relationship between the declarative attributes and the behavioral attributes. The device classification service initiates, based on the device type spoofing, a mitigation action regarding the device. | 2021-10-21 |
20210329030 | Device, System, and Method of Detecting Vishing Attacks - Devices, systems, and methods of detecting a vishing attack, in which an attacker provides to a victim step-by-step over-the-phone instructions that command the victim to log-in to his bank account and to perform a dictated banking transaction. The system monitors transactions, online operations, user interactions, gestures performed via input units, speed and timing of data entry, and user engagement with User Interface elements. The system detects that the operations performed by the victim, follow a pre-defined playbook of a vishing attack. The system detects that the victim operates under duress or under dictated instructions, as exhibited in irregular doodling activity, data entry rhythm, typographical error introduction rhythm, unique posture of the user, alternating pattern of listening to phone instructions and performing online operations via a computer, and device orientation changes or spatial changes that characterize a device being used to perform an online transaction while also talking on the phone. | 2021-10-21 |
20210329031 | HONEYPOT HOST - The present invention relates to a honeypot host ( | 2021-10-21 |
20210329032 | ON-DEMAND WIRELESS DEVICE CENTRIC SECURITY FOR A 5G WIRELESS NETWORK - The disclosed embodiments include a method performed by a wireless network to mitigate a security risk arising from an application-layer transaction and contextual scenario of a wireless device (WD). A security resource can be maintained inactive by default and configured for on-demand activation in response to a security risk associated with the WD. The method can include monitoring the WD for application-layer transactions and contextual scenarios, and detecting a security risk relative to a particular type of a application-layer transaction and a contextual scenario of the WD. In response to detecting the security risk, the security resource is activated to support the application-layer transaction while safeguarding the entire wireless network. In response to detecting a change to the application-layer transaction or the particular contextual scenario, the security resource for the WD can be deactivated. | 2021-10-21 |
20210329033 | CYBERSECURITY MATURITY DETERMINATION - An example operation may include one or more of receiving data from a plurality of sources associated with an entity, clustering the data into security-related topics, determining, via one or more machine learning models, maturity values of the entity for the security-related topics, respectively, and generating recommendations to improve the determined maturity values of the entity, wherein the maturity values relate to a level of security of the entity with respect to the security-related topics. | 2021-10-21 |
20210329034 | Centralized Validation of Email Senders Via EHLO Name and IP Address Targeting - A DNS server receives from a receiving email system, a DNS query for an email domain stored at the DNS server, the DNS query including identifying information of a sender of an email. The DNS server extracts the identifying information of the email sender from the DNS query and identifies one of a plurality of delivering organizations from the information. The DNS server determines whether the identified delivering organization is authorized to deliver email on behalf of the email domain. In response to determining that the identified delivering organization is authorized to deliver email on behalf of the email domain, the DNS server generates a target validation record based on the identity of the authorized delivering organization and the email domain, the target validation record including one or more rules indicating to the receiving email system whether the delivering organization is an authorized sender of email for the email domain. | 2021-10-21 |
20210329035 | RETROSPECTIVE LEARNING OF COMMUNICATION PATTERNS BY MACHINE LEARNING MODELS FOR DISCOVERING ABNORMAL BEHAVIOR - Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner. | 2021-10-21 |
20210329036 | Reconciliation Digital Facilitators in a Distributed Network - A method for use in a hybrid network ecosystem comprising an enterprise network and a reconciliation network, the method comprising generating, by at least one first computing node in the enterprise network or the reconciliation network, a first digital facilitator, wherein the first digital facilitator enables a first device to use a private key to access data associated with a distributed ledger operation. The method also comprises transmitting, via the reconciliation network, the data from the first computing device to a second computing device, wherein the first computing device and the second computing device are connected via the reconciliation network. | 2021-10-21 |
20210329037 | COMPUTER IMPLEMENTED METHOD AND APPARATUS FOR MANAGEMENT OF NON-BINARY PRIVILEGES IN A STRUCTURED USER ENVIRONMENT - Methods and systems to manage permissions in a structured user-environment which provide a User Interface (UI) that provides a simple, intuitive administration to apply permissions at the user and group level to data in the structured user-environment. The UI also provides feedback to the administrator as to the inheritance path of each user and/or group as well as links between permissions, allowing the administrator to determine how a user or group was granted or denied access to a permission or resource. | 2021-10-21 |
20210329038 | QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT - Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings. The foregoing techniques may be extended for security baseline compliance determinations, IoT device compliance determinations and compliance determinations for other types of devices, such as devices utilized by business partners of the enterprise that utilize the enterprise's network. | 2021-10-21 |
20210329039 | Securing Method for Lawful Interception - A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key. | 2021-10-21 |
20210329040 | REAL-TIME MEDIA STREAMS - Disclosed are systems, methods, and non-transitory computer-readable media for providing real-time media streams. A cloud-based communication platform receives an incoming communication request to establish a communication session and executes a set of communication instructions associated with the incoming communication request. The set communication instructions includes a command to execute a real-time media stream in relation to the communication session. The command includes data designating a network destination to receive the real-time media stream. The cloud-based communication platform initiates the communication session between client devices and initiates the real-time media stream to the network destination. The real-time media stream concurrently transmitting at least a portion of the media transmitted between the client devices to the network destination. | 2021-10-21 |
20210329041 | USER OF IDENTITY SERVICES TO AUTO-DISCOVER SUBSCRIBERS OF SOCIAL NETWORKING SITES - Techniques are disclosed for initiating game sessions between subscribers to online gaming services when account IDs of those subscribers are unknown. Such techniques permit a first user to select a second user with whom to play a game from information readily at hand, such as a contact manager that the first user maintains. The first user's device may send a resolution request message to an identity services server that includes contact information of the second user. Contact information may include network-based information regarding the second user, such as the user's e-mail address or phone number. The identity services server may resolve the contact into an account ID. Thereafter, a game launch request may be sent to the game server, which includes the account identifier resolved by the identity services server. An invitation message may be sent to a terminal of the second user to participate in the game and the game may be started. These techniques do not require that the first user possess the second user's account ID at the game server. | 2021-10-21 |
20210329042 | ROUTING OF DATA INCLUDING MULTIMEDIA BETWEEN ELECTRONIC DEVICES - Rerouting apparatus for rerouting data including multimedia data. The apparatus is for association with electronic equipment and allows for routing the data to a device regarded as the most convenient for playing the media. The apparatus comprises an announcer device for indicating to surrounding equipment that associated equipment is available for rerouting, thereby to enable receipt of rerouted communications therefrom, and a scout device for scanning surroundings of the associated equipment to find out about compatible equipment in the vicinity, thereby to reroute communications thereto. The apparatus may be attached to any device having data processing capability, to enable rerouting of data and communications therebetween. | 2021-10-21 |
20210329043 | COMMUNICATION EXCHANGES AND METHODS OF USE THEREOF - An exemplary specifically programmed electronic communications exchange which includes at least the following specifically programmed components: a specifically programmed computer processor that is configured to at least perform, in real-time, the following: causing, via a computer network, to display a company personalized communications set-up graphical user interface configured to allow a representative of a company to dynamically define a plurality of company communications attributes; causing, via the computer network, to display a consumer communications set-up graphical user interface configured to allow a consumer to dynamically define a plurality of consumer communications preference attributes; automatically matching the company to the consumer based at least in part on: the plurality of company communications attributes and the plurality of consumer communications preference attributes; and automatically and electronically delivering a plurality of electronic communications, from or on behalf of the company, to the consumer. | 2021-10-21 |
20210329044 | GROUP COMMUNICATIONS PLATFORM - A group communications platform facilitates that sharing of an application environment with other users. The platform may receive a request to initiate a group session for a local user and a remote user. An out-of-process network connection with a system communication channel between a local computing device associated with the local user and a remote computing device associated with the remote user may be established for the group session. A system call may be received from a local instance of a first application on the local computing device to transfer local data to a remote instance of the first application on the remote computing device via the out-of-process network connection. The local data may be transferred to the remote instance of the first application on the remote computing device via the out-of-process network connection and the system communication channel. The local data may include state data of the local instance of the first application for updating a state of the remote instance of the first application. | 2021-10-21 |
20210329045 | METHOD AND SYSTEM FOR CONDUCTING REMOTE COMMUNICATIONS AT A FUNERAL HOME - A method for conducting remote communications at a funeral home in accordance with one or more aspects of the present disclosure is presented. The method includes providing a first video conference system positioned in a funeral home. A second video conference system is positioned in a vehicle structure remotely located from the funeral home. The vehicle structure is operable to have vehicles driven into and out of the vehicle structure. A communication link is established between the first and second video conference systems. One or more family members are enabled to gather at the funeral home for a funeral service of a loved one. One or more passengers are driven in a first vehicle into the vehicle structure. While the one or more passengers remain in the first vehicle, the one or more passengers and the one or more family members communicate via the communication link. | 2021-10-21 |
20210329046 | TWO-LEVEL CACHE ARCHITECTURE FOR LIVE VIDEO STREAMING THROUGH HYBRID ICN - A method is provided that is performed by a smart network interface card (SmartNIC) that is in communication with a host device that serves as a forwarder in an Hybrid Information-Centric Network (hICN). The method includes storing in a memory of the SmartNIC, mapping information that maps a subset of names of content contained in a content store that is stored in a memory of the host device to corresponding addresses of the content. The method further includes receiving at the SmartNIC, from a requester, an interest that includes a name, and determining whether the name of the interest is included in the mapping information stored in the SmartNIC. The method includes processing the interest based on whether the name of the interest is contained in the mapping information stored in the memory of the SmartNIC. | 2021-10-21 |
20210329047 | METHOD, APPARATUS, ELECTRONIC DEVICE AND STORAGE MEDIUM FOR ACQUIRING PROGRAMS IN LIVE STREAMING ROOM - The disclosure relates to methods, apparatuses, electronic devices, and storage media for acquiring programs in a live streaming room. The method includes acquiring a program acquisition condition and triggering to save live streaming room data of a user account as a target program in response to detecting that a live streaming behavior of the user account meets the program acquisition condition, to provide the target program to an associated user account of the user account. | 2021-10-21 |
20210329048 | MOBILE SOCIAL NETWORK FOR SHARING MEDIA CAPTURED RECENTLY - A mobile social network is provided for sharing media captured recently. The mobile social network includes an application server that receives, from a downloader mobile device, a request for media associated with a geographic location. The application server sends a media inquiry to one or more uploader mobile devices near the geographic location. The media inquiry includes information from the request for media. The application server receives a digital media file in response to the media inquiry. The digital media file includes metadata having an authentic capture time of the media associated with the geographic location. The application server generates a results summary, including a status of the digital media file based on the authentic capture time of the media. The application server sends the results summary to the downloader mobile device. | 2021-10-21 |
20210329049 | ADAPTIVE BITRATE OPTIMIZATION UPON VIDEO STREAMING INITIALIZATION - Devices, methods, and program products are provided enabling Adaptive Bitrate (ABR) optimization upon initialization of a streaming video session. In embodiments, the method includes launching a streaming media interface application in response to user input. Substantially concurrently with application launch, the client media receiver further transmits a request over a communications network to a streaming media server for a sample video stream. As the video stream is received, the client media receiver plays the sample video stream as, for example, a background process. When subsequently receiving user input selecting streaming content for end user viewing, the client media receiver determines an optimized ABR setting based upon a recent ABR value of the sample video stream. The client media receiver transmits a request to the streaming media server for user-selected content stream at the optimized ABR setting and then presents the content stream for end user viewing. | 2021-10-21 |
20210329050 | METHOD AND APPARATUS FOR STREAM DESCRIPTOR BINDING IN A STREAMING ENVIRONMENT - A method, apparatus and computer program product provide a stream binding mechanism that supports stream data pulling and pushing in a distributed or cloud based streaming environment. The method, apparatus and computer program product receive a stream register message associated with a stream from a streaming entity. The stream register message includes a binding descriptor. The method, apparatus and computer program product transmit a create connection message to a stream broker. The method, apparatus and computer program product transmit an endpoint message including a set of connection parameters of an endpoint to the streaming entity. The method, apparatus and computer program product receive a query for the stream from a stream processing node. And the method, apparatus and computer program product transmit a response to the query to the stream processing node. The response includes a set of connection parameters of the stream broker. | 2021-10-21 |
20210329051 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR THE DIRECTING AND DISTRIBUTING OF MEDIA CONTENT - A system, method, and computer program product are provided for selecting media content to be streamed; selecting a distribution channel to direct the streaming of the media content; and distributing the media content to the distribution channel. Additional systems, methods, and computer program products are also presented. | 2021-10-21 |
20210329052 | POINT CLOUD DATA TRANSMISSION APPARATUS, POINT CLOUD DATA TRANSMISSION METHOD, POINT CLOUD DATA RECEPTION APPARATUS AND POINT CLOUD DATA RECEPTION METHOD - Disclosed herein is a point cloud data transmission method including encoding point cloud data, encapsulating the point cloud data, and transmitting point cloud data. Disclosed herein is a point cloud data reception method including receiving point cloud data, decapsulating the point cloud data, and decoding the point cloud data. | 2021-10-21 |
20210329053 | MULTIMODAL TRANSFER BETWEEN AUDIO AND VIDEO STREAMS - The present disclosure is directed to systems and methods for multimodal transition among devices connected to a plurality of different networks. A device may be presenting a multimedia item in a first mode (e.g., an audiovisual mode) on a first device. A transition event may occur, prompting the systems and methods described herein to initiate a transition request to transition the multimedia item from a first device to a second device. The second device may be analyzed to determine the constraints of the device (e.g., storage, hardware/software, connectivity strength, etc.). The first mode of the multimedia item may also be analyzed. Based on the analysis of the multimedia item in the first mode and the second device, the multimedia item may be converted from a first mode to a second mode (e.g., an audio-only mode of the multimedia item) and subsequently displayed on the second device. | 2021-10-21 |
20210329054 | CUSTOMIZING MEDIA ITEMS FOR PLAYBACK ON ALTERNATIVE PLAYBACK DEVICES PAIRED WITH A USER DEVICE - A user device receives a first media item that is associated with a second media item. The device determines that a playback state for the device indicates that the device is paired with an alternative playback device. The device sends the playback state in a request for the second media item, receives the second media item in a first format for playback on the user device and in a second format for playback on the alternative playback device. The device determines whether the playback state of the device is the same. The device displays a first graphical representation of the second media item in the first format on the user device if the user device is no longer paired with the alternative playback device and displays a second graphical representation of the second media item in the second format on the user device if the user device is still paired with the alternative playback device. | 2021-10-21 |
20210329055 | DEVICE AND METHOD FOR TRANSMITTING POINT CLOUD DATA, DEVICE AND METHOD FOR PROCESSING POINT CLOUD DATA - Disclosed herein are a point cloud data transmission method including encoding point cloud data, and transmitting a bitstream containing the point cloud data, and a point cloud data processing method including receiving a bitstream containing point cloud data, and decoding the point cloud data. | 2021-10-21 |
20210329056 | RELAY DEVICE AND RELAY METHOD OF VOICE SIGNAL - [Problem] When a communication apparatus that is the communication partner is called via a relay device, the transmission control mode of a voice signal can be switched according to the capability of the communication partner. | 2021-10-21 |
20210329057 | Initial Bitrate For Real Time Communication - A method for determining an initial bitrate for a communication includes receiving a communication request to establish a digital communication between a first user device and a second user device associated with a plurality of features including a geographical identifier identifying a geographical location associated with the first user device, a first network type connection associated with the first user device, a second network type connection associated with the second user device, and an average bitrate for a previous digital communication of the first user device. The method includes determining, using an initial bitrate predictor model configured to receive the plurality of features as feature inputs, an initial bitrate for the digital communication between the first user device and the second user device, and establishing the digital communication between the first user device and the second user device at the determined initial bitrate. | 2021-10-21 |
20210329058 | SYSTEMS AND METHODS FOR ESTABLISHING, USING, AND RECOVERING UNIVERSAL DIGITAL IDENTIFIERS - Disclosed herein are systems and methods for establishing, using, and recovering universal digital identifiers. In an embodiment, a system establishes a universal identifier (ID) associated with a user and a device of the user. The universal ID is universal with respect to a plurality of distinct entities, has at least a suspended state and an unsuspended state, and initially is in the unsuspended state. The system transmits the universal ID to the device of the user. Thereafter, the system detects an ID-suspension event in connection with the universal ID, and responsively suspends the universal ID, including placing the universal ID in the suspended state. After suspending the universal ID, the system completes an ID-recovery process for the universal ID, and responsively unsuspends the universal ID, including placing the universal ID in the unsuspended state. | 2021-10-21 |
20210329059 | NETWORK SECURITY SYSTEM AND METHOD FOR OPERATING SAME - Provided is a network security system including a communication interface that transmits a request for a preset option field value to a Dynamic Host Configuration Protocol (DHCP) server, receives a preset option field value corresponding to the request for the preset option field value from the DHCP server, transmits a request for a preset file to a Trivial File Transfer Protocol (TFTP) server, and receives a preset file corresponding to the request for the preset file from the TFTP server, and a processor that designates a preset location and the preset file of the TFTP server based on the preset option field value, wherein the preset file includes a file different from a file specified in the preset option field value by the DHCP. | 2021-10-21 |
20210329060 | SCRIPTING SUPPORT FOR DATA IDENTIFIERS, VOICE RECOGNITION AND SPEECH IN A TELNET SESSION - Methods of adding data identifiers and speech/voice recognition functionality are disclosed. A telnet client runs one or more scripts that add data identifiers to data fields in a telnet session. The input data is inserted in the corresponding fields based on data identifiers. Scripts run only on the telnet client without modifications to the server applications. Further disclosed are methods for providing speech recognition and voice functionality to telnet clients. Portions of input data are converted to voice and played to the user. A user also may provide input to certain fields of the telnet session by using his voice. Scripts running on the telnet client convert the user's voice into text and is inserted to corresponding fields. | 2021-10-21 |
20210329061 | IN-NETWORK COMPUTE ASSISTANCE - A method and apparatus for performing operations by network interface cards in a network of computers. A network interface card is configured to receive a message and to interpret the message to identify a primitive operation to be performed. The primitive operation is one of a plurality of primitive operations that are performed to perform an operation. The primitive operation is performed by the network interface card and a trigger signal is generated in response to performing the primitive operation. The trigger signal is interpreted to identify a triggered message. The triggered message identifies a next one of the plurality of primitive operations to be performed. The triggered message is transmitted back to the network interface card or to another network interface card in the network for processing. | 2021-10-21 |