43rd week of 2017 patent applcation highlights part 73 |
Patent application number | Title | Published |
20170310681 | Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication - A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in a header of the message. The message is then sent to a recipient and the frame type used to perform a policy check. | 2017-10-26 |
20170310682 | System and Method for Surrogate Locational Determination - Surrogate locational determination may rely on a surrogate device to provide a locational fix. When a device lacks an accurate geo-location system, communication may be established with a nearby surrogate device. The surrogate device is queried for an accurate location, such as that determined by a global positioning system receiver. Because the surrogate device is geographically proximate, the location determined by the global positioning system receiver may serve as a proxy or substitute for the local fix of the device. | 2017-10-26 |
20170310683 | COMPUTER SECURITY BASED ON HIERARCHICAL CACHE LATENCY SIGNATURE AUTHENTICATION - A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by the processor from a main memory. The processor is integrated within a computer terminal. The processor performs operations that include generating a hierarchical cache latency signature vector by repeating for each of a plurality of buffer sizes, the following: 1) allocating in the main memory a buffer having the buffer size; 2) measuring elapsed time for the processor to read data from buffer addresses that include upper and lower, boundaries of the buffer; and 3) storing the elapsed time and the buffer size as an associated set in the hierarchical cache latency signature vector. The operations further include communicating through a network interface circuit a computer identification message containing computer terminal identification information generated based on the hierarchical cache latency signature vector. | 2017-10-26 |
20170310684 | METHOD AND DEVICE FOR AVOIDING MANIPULATION OF A DATA TRANSMISSION - A method and device for avoiding manipulation of a data transmission. A message containing a message authentication code is received at a processing unit, the message from the processing unit is transferred to a hardware module, a check value as a function of the received message is computed in the hardware module, the received message authentication code and the check value are compared in the hardware module, a result of the comparison is transferred from the hardware module to the processing unit as an output variable, the message authentication code received in the message from the processing unit is checked in the processing unit based on the output variable. | 2017-10-26 |
20170310685 | Method for Transmitting Verification Information and Terminal - A method for transmitting verification information includes: detecting, by a first terminal, whether a condition for performing a verification operation is satisfied; generating, by the first terminal, a verification information obtaining request if the condition for performing a verification operation is satisfied, where the verification information obtaining request is used to request a second terminal to feed back verification information; sending, by the first terminal, the verification information obtaining request to the second terminal; receiving, by the first terminal, a verification information obtaining response returned by the second terminal, where the verification information obtaining response includes the verification information; and sending, by the first terminal, the verification information to a server, where the verification information is used for the server to verify the first terminal | 2017-10-26 |
20170310686 | LABELING NETWORK FLOWS ACCORDING TO SOURCE APPLICATIONS - An enterprise security system is improved by instrumenting endpoints to explicitly label network flows according to sources of network traffic. When a network message from an endpoint is received at a gateway, firewall, or other network device/service, the network message may be examined to determine the application on the endpoint that originated the request, and this source information may be used to control routing or other handling of the network message. | 2017-10-26 |
20170310687 | BOTNET DETECTION SYSTEM AND METHOD - A botnet detection system and method are provided. The method includes the steps of: retrieving a network log file of a computer device; refining the network log file according to a device alive-time record of the computer device and a network white list to obtain a plurality of individual network log files, wherein each individual network log file records time information, a source IP address of the computer device, and an individual destination IP address; and analyzing a plurality of connection intervals of the source IP address connecting to the individual destination IP address in each individual network log file to determine whether the computer device exhibits connection behavior that indicates infection by a botnet malware. | 2017-10-26 |
20170310688 | SYSTEM AND METHOD FOR SECURING AN ELECTRONIC CIRCUIT - A system for securing an electronic circuit including: plural regions, activity of each of which may be controlled; plural sensors integrated into the electronic circuit, each sensor being sensitive to variations in manufacturing process and to provide a measurement representative of a local activity of the electronic circuit; a processing unit including an integrity verification module configured to: determine, based on the measurements provided by the sensors, and for each of the regions, a partition of the sensors between sensors affected and sensors not affected by an activation of the region; compare each of the partitions with a model partition to detect possible presence of a hardware Trojan horse liable to infect the electronic circuit. The system can carry out an authentication of the electronic circuit by its intrinsic physical characteristics by response to a challenge or by generation of a key. | 2017-10-26 |
20170310689 | AUTOMATICALLY GENERATING NETWORK RESOURCE GROUPS AND ASSIGNING CUSTOMIZED DECOY POLICIES THERETO - A cyber security system comprising circuitry of a decoy deployer planting one or more decoy lateral attack vectors in each of a first and a second group of resources within a common enterprise network of resources, the first and second groups of resources having different characteristics in terms of subnets, naming conventions, DNS aliases, listening ports, users and their privileges, and installed applications, wherein a lateral attack vector is an object of a first resource within the network that has a potential to be used by an attacker who discovered the first resource to further discover information regarding a second resource within the network, the second resource being previously undiscovered by the attacker, and wherein the decoy lateral attack vectors in the first group conform to the characteristics of the first group, and the decoy lateral attack vectors in the second group conform to the characteristics of the second group. | 2017-10-26 |
20170310690 | DOMAIN LEVEL THREAT DETECTION FOR INDUSTRIAL ASSET CONTROL SYSTEM - A normal space data source stores, for each of a plurality of threat nodes, a series of normal values that represent normal operation of an industrial asset control system, and a threatened space data source stores a series of threatened values. A model creation computer may generate sets of normal and threatened feature vectors. The computer may also calculate and output at least one decision boundary for a threat detection model based on the normal and threatened feature vectors. The plurality of threat nodes may then generate a series of current values from threat nodes that represent a current operation of the asset control system. A threat detection computer may receive the series of current values from threat nodes, generate a set of current feature vectors, execute the threat detection model, and transmit a threat alert signal based on the current feature vectors and at the least one decision boundary. | 2017-10-26 |
20170310691 | SELF ORGANIZING LEARNING TOPOLOGIES - In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics of host devices in the network. The networking device forms the host devices into device clusters dynamically based on the first set of feature vectors. The networking device generates a second set of feature vectors using information regarding traffic associated with the device clusters. The networking device models interactions between the device clusters using a plurality of anomaly detection models that are based on the second set of feature vectors. | 2017-10-26 |
20170310692 | DETECTING ENDPOINT COMPROMISE BASED ON NETWORK USAGE HISTORY - In the context of network activity by an endpoint in an enterprise network, malware detection is improved by using a combination of reputation information for a network address that is accessed by the endpoint with reputation information for an application on the endpoint that is accessing the network address. This information, when combined with a network usage history for the application, provides improved differentiation between malicious network activity and legitimate, user-initiated network activity. | 2017-10-26 |
20170310693 | LOCAL PROXY DETECTION - Protocol suites such as hypertext transfer protocol (HTTP) using secure socket layer (SSL) can facilitate secure network communications. When using this type of secure communication, network addresses are typically expressed as numeric internet protocol addresses rather than the human-readable uniform resource locators (URLs) that are entered into a browser address bar by a human user. This property can be exploited to differentiate between secure and insecure communications, and to detect certain instances where a malicious proxy has been deployed to intercept network traffic with an endpoint. | 2017-10-26 |
20170310694 | MALICIOUS COMMUNICATION PATTERN EXTRACTION APPARATUS, MALICIOUS COMMUNICATION PATTERN EXTRACTION METHOD, AND MALICIOUS COMMUNICATION PATTERN EXTRACTION PROGRAM - A malicious communication pattern extraction apparatus extracts communication patterns of traffic group of malwares, and replaces the values of predetermined field with variation in a traffic group with a wild card. Further, the malicious communication pattern extraction apparatus classifies pieces of malware having similar communication patterns in the traffic group into the same cluster, and for each cluster, extracts, as a malicious communication pattern, a communication pattern group having an appearance rate in a traffic group of respective pieces of malware in the cluster, the appearance rate being equal to or larger than a predetermined value. Thereafter, the malicious communication pattern extraction apparatus eliminates, from the extracted malicious communication patterns, any malicious communication pattern having a conformance rate to a traffic group not infected with malware, the conformance rate being equal to or larger than a predetermined value. | 2017-10-26 |
20170310695 | INFORMATION REPORTING FOR ANOMALY DETECTION - In one embodiment, a first device in a network receives traffic flow data from a plurality of devices in the network. The traffic flow data from at least one of the plurality of devices comprises raw packets of a traffic flow. The first device selects a set of reporting devices from among the plurality of devices based on the received traffic flow data. The first device provides traffic flow reporting instructions to the selected set of reporting devices. The traffic flow reporting instructions cause each reporting device to provide sampled traffic flow data to an anomaly detection device. | 2017-10-26 |
20170310696 | PROVIDING APPLICATION-SPECIFIC THREAT METRICS - Assessment of threat risks associated with a given mobile device application (app) on a device type specific basis, so that the threat assessment is specific to a particular device type that is suitable for running the given app. The assessed device-type-specific risk is represented as device-type-specific risk metadata, which is associated as metadata with the given app. For example, the metadata may be stored along with the given app in a common repository that includes many apps. In some embodiments, the device-type-specific risk metadata is generated and stored comprehensively for all apps and device types used in an enterprise. The device-type-specific risk assessment, and corresponding device-type-specific risk metadata, may be based upon run time behavior of the given app on a given device type. | 2017-10-26 |
20170310697 | NETWORK ANOMALY DETECTION - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity. | 2017-10-26 |
20170310698 | Validating Strength Values For Account Security Questions - A device, system, and method validates strength values for security questions associated with an online account. The method performed by an online service server includes receiving a security question data from a user device, the security question data being utilized for a user authentication to access an account of a user. The method includes performing a search, using third party sources, to generate search result data, the search result data being indicative of an availability value of responses to the security question data. The method includes determining a strength value of the security question data based on the search result data. | 2017-10-26 |
20170310699 | HIERARCHICAL SCANNING OF INTERNET CONNECTED ASSETS - A system for hierarchical scanning includes an interface and a processor. The interface is to receive an indication to scan using a payload; provide the payload to a set of addresses on a set of ports; and receive a set of responses. Each response is associated with an address and a port. The processor is to: for each response of the set of responses: determine whether a follow-up probe exists associated with the response; and in the event the follow-up probe exists associated with the response: execute the follow-up probe on the address and the port associated with the response; and store the set of data received in response to the follow-up probe in a database. | 2017-10-26 |
20170310700 | SYSTEM FAILURE EVENT-BASED APPROACH TO ADDRESSING SECURITY BREACHES - A method includes: detecting a potential security breach associated with at least one component of a network environment; in response to detecting the potential security breach, determining a restorable state of the at least one component, wherein the restorable state is a state prior to the potential security breach; restoring the at least one component to the restorable state; and resuming operation of the at least one component of the network. Corresponding systems and computer program products are also disclosed. | 2017-10-26 |
20170310701 | MICROCHECKPOINTING AS SECURITY BREACH DETECTION MEASURE - A method includes: deploying at least one shadow system in association with each of one or more components of a network environment; periodically recording a state map of each active component of the network environment and a corresponding state map of the shadow system(S) associated therewith; periodically comparing the recorded state map of each active component with the corresponding recorded state map of the shadow system(s) associated therewith; determining whether a deviation exists with respect to the recorded state map of each active component and the corresponding recorded state map of the shadow system(s) associated therewith; determining whether the deviation is greater than a predetermined deviation threshold; and declaring a security breach regarding the active component(s) for which the deviation was determined to be greater than the predetermined deviation threshold. Corresponding systems and computer program products are also disclosed. | 2017-10-26 |
20170310702 | Biology Based Techniques for Handling Information Security and Privacy - A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action. | 2017-10-26 |
20170310703 | DETECTING TRIGGERING EVENTS FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS - An endpoint in an enterprise network is monitored, and when a potential trigger for a distributed denial of service (DDoS) attack is followed by an increase in network traffic from the endpoint to a high reputation network address, the endpoint is treated as a DDoS service bot and isolated from the network until remediation can be performed. | 2017-10-26 |
20170310704 | THREAT ENGAGEMENT AND DECEPTION ESCALATION - Provided are methods, network devices, and computer-program products for a network deception system. The network deception system can engage a network threat with a deception mechanism, and dynamically escalating the deception to maintain the engagement. The system can include super-low, low, and high-interaction deceptions. The super-low deceptions can respond to requests for address information, and requires few computing resources. When network traffic directed to the super-low deception requires a more complex response, the system can initiate a low-interaction deception. The low-interaction deception can emulate multiple devices, which can give the low-interaction deception away as a deception. Hence, when the network traffic includes an attempted connection, the system can initiate a high-interaction deception. The high-interaction more closely emulates a network device, and can be more difficult to identify as a deception. The high-interaction deception can fully engage a network threat, and can be initiated only as needed. | 2017-10-26 |
20170310705 | RESPONSIVE DECEPTION MECHANISMS - Provided are methods, network devices, and computer-program products for dynamically configuring a deception mechanism in response to network traffic from a possible network threat. In various implementations, a network deception system can receive a packet from a network. The network deception system can determine an intent associated with the packet by examining the contents of the packet. The network deception system can further configure a deception mechanism to respond to the intent, for example with the appropriate network communications, software or hardware configuration, and/or data. | 2017-10-26 |
20170310706 | Tunneling For Network Deceptions - Provided are systems, methods, and computer-program products for providing network deceptions using a network tunnel. In various implementations, a network device on a first network can be configured as a projection point. A projection point can be configured as one endpoint of a network tunnel. The other end of the network tunnel can terminate at a deception center. The deception center can host a second network, where the second network includes network devices configured as deception mechanisms. By assigning a deception mechanism a network address from the first network, the network address and the network tunnel enable the deception mechanism to appear as a node in the first network. | 2017-10-26 |
20170310707 | NETWORKED SECURITY SYSTEM - Disclosed are multi-tenant networked security systems and methods. The system includes a central server, a first user application provided on a first computing device, and a second user application provided on a second computer device, wherein the first and second computing devices are communicatively linked with the central server. The system further includes a persistent network key generated by the central server and based at least in part on a unique request identifier and a transient physical key generated by the first user application and based at least in part on the network key, wherein the network key is received by the first user application. The second user application is configured to communicate with the central server to analyze the network key and the physical key in order to verify that a user of the first user application possesses an ingress permission to an access point. | 2017-10-26 |
20170310708 | SECURE LABELING OF NETWORK FLOWS - An enterprise security system is improved by instrumenting endpoints to explicitly label network flows with cryptographically secure labels that identify an application or other source of each network flow. Cryptographic techniques may be used, for example, to protect the encoded information in the label from interception by third parties or to support cryptographic authentication of a source of each label. A label may provide health, status, or other heartbeat information for the endpoint, and may be used to identify compromised endpoints, to make routing decisions for network traffic (e.g., allowing, blocking, rerouting, etc.), to more generally evaluate the health of an endpoint that is sourcing network traffic, or for any other useful purpose. | 2017-10-26 |
20170310709 | CLOUD BASED SECURITY USING DNS - A cloud-based security method using Domain Name System (DNS) includes receiving a request from a user device at a DNS server; performing a security check on the request based on a policy look up associated with the user device; responsive to the policy look up, performing a DNS security check on the request; and responsive to the DNS security check, performing one of allowing the request to the Internet; blocking the request based on the policy; and providing the request to inline inspection based on the policy, wherein the request is one of allowed to the Internet or blocked based on the inline inspection. | 2017-10-26 |
20170310710 | METHOD AND APPARATUS FOR PROVIDING PRIVACY MANAGEMENT IN MACHINE-TO-MACHINE COMMUNICATIONS - A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy. | 2017-10-26 |
20170310711 | SYSTEM AND METHOD FOR INTERCEPTION OF IP TRAFFIC BASED ON IMAGE PROCESSING - Methods and systems for monitoring communication traffic in communication networks, such as Internet Protocol (IP) traffic transferred over the Internet or over a wireless network. The disclosed techniques identify communication traffic that is associated with target individuals, by extracting digital images from the traffic and recognizing target individuals who appear in the images. A correlation system monitors communication sessions that are conducted in a communication network to identify known target individuals who appear in images. Upon recognizing a target individual in an image extracted from a certain session, the system correlates this target user with one or more of the communication identifiers used in the session. The system automatically identifies IP addresses or other identifiers that are used by target individuals, and enable subsequent tracking of such identifiers. | 2017-10-26 |
20170310712 | Intelligent Transducers for Transforming Signals in Complex Computing Networks - This disclosure is directed to an intelligent transducer for transforming a first event signal received from an input signal system into a second event signal transmitted to an output signal system by using a first event signal-specific transformation signal received from one or more disparate application signal systems and sensing an attribute of the first event signal-specific transformation signal. | 2017-10-26 |
20170310713 | Establishing And Managing Connections For Real Time Communications - Methods and systems related to supporting real time communications are disclosed. In one type of a real time communication session, prior to an offer and acceptance to perform real time communications, a communication channel may be established between a caller device and a callee device. Information related to addresses of the caller and callee devices can be contained in, or pointed to, by a Universal Resource Locators (URLs) for the caller and callee devices. A network computing device may communicate messages relating to establishing and maintaining the communication channel between the caller and callee devices. In a scenario where the network computing device becomes unavailable, another network computing device can use the URLs and other channel information that may be stored in the database, to handle messages. In one embodiment, messages identify the caller or callee devices, to which each message is directed, using target URLs (caller and callee URLs), which reduces the need to access information related to the intended target. | 2017-10-26 |
20170310714 | SYSTEM AND METHOD FOR INTERACTIVE AND REAL-TIME VISUALIZATION OF DISTRIBUTED MEDIA - A method for providing control and visualization of media. A first media stream having an initial resolution is received from a source computer; the first media stream is rescaled to generate a second media stream with a second resolution; the second media source stream is transmitted to a destination computer; after receiving instructions from the destination computer indicating a selection of the second media stream, the stream is rescaled in accordance with the received rescaling information, to generate a third media stream with a third resolution, which is transmitted to the destination computer. | 2017-10-26 |
20170310715 | NOTIFYING RESPONSE SENDER OF MALFORMED SESSION INITIATION PROTOCOL (SIP) RESPONSE MESSAGES - A method, computer program product, and computer system for notifying a response sender of a malformed SIP response message. The method includes, producing a special ACK message after receiving a malformed response message from a SIP server. The special ACK message contains a correction of the determined malformation, and is sent to the SIP server for correction by the SIP server. | 2017-10-26 |
20170310716 | AUTO-GENERATION OF ACTIONS OF A COLLABORATIVE MEETING - A method for identifying and initiating actions of a meeting. The method includes a computer processor monitoring a meeting where monitoring the meeting includes receiving input from at least a first computing device. The method further includes identifying a plurality of metadata triggers associated with the received input of meeting. The method further includes identifying an occurrence of a first metadata trigger of the plurality of metadata triggers associated with the received input of the meeting. The method further includes analyzing a first portion of the received input of the meeting that includes an occurrence of the first metadata trigger and identifying a first action associated with the first metadata trigger. The method further includes determining a response criterion of the first metadata trigger. The method further includes responding to a determination that the first metadata trigger includes a response criterion indicating immediate action by initiating the first action. | 2017-10-26 |
20170310717 | SYSTEM AND METHOD FOR INSTANTIATING A HIDDEN SECONDARY CHAT SESSION FOR A PRIMARY CHAT SESSION - A method, computer program product, and computer system for identifying a first message sent between a first user computing device and a second user computing device. A primary chat thread may be generated between the first user computing device and the second user computing device, wherein the primary chat thread may include the first message. A state of one or more attributes of the primary chat thread displayed on a graphical user interface on the first user computing device may be identified. A second message sent between the first user computing device and the second user computing device in the primary chat thread may be identified. The second message may be streamed over a network to a secondary chat thread between the first user computing device and a third user computing device when the state of the one or more attributes of the primary chat thread is in a first state. The second message sent between the first user computing device and the second user computing device in the primary chat thread may be transmitted without streaming the second message to the secondary chat thread between the first user computing device and the third user computing device when the state of the one or more attributes of the primary chat thread is in a second state. | 2017-10-26 |
20170310718 | METHOD AND APPARATUS FOR PROVIDING SERVICE CONTINUITY IN MBSFN SERVICE BOUNDARY AREA - The present specification provides a method and an apparatus for a terminal to maintain continuity of multimedia broadcast multicast service (MBMS) service in a multicast broadcast single frequency network (MBSFN) service boundary area. The terminal receives, from a first cell, an MBMS cell list including information about an MBSFN area. The first cell is a cell where the terminal provides the MBMS service via an MBMS bearer. The terminal performs the MBMS service via a unicast bearer of a second cell on the basis of the received MBMS cell list. | 2017-10-26 |
20170310719 | Multi-Hop Small Cell Auto Discovery for Software Defined Networking-Enabled Radio Access Network - Concepts and technologies are described herein for multi-hop small cell auto discovery for software-defined networking (“SDN”)-enabled radio access networks (“RANs”). According to one aspect of the concepts and technologies disclosed herein, a small cell RAN node can include a network backhaul link connected to a further small cell radio access network node operating within a RAN controlled, at least in part, by a SDN controller. The small cell RAN node can generate an enhanced OFDP multicast message that includes a SDN characteristic for the SDN controller to use, at least in part, to discover the small cell RA node as operational within the RAN. The small cell RAN node can send the enhanced OFDP multicast message over the network backhaul link in an attempt to provide the SDN characteristic to the SDN controller so SDN controller can discover the small cell RAN node as operational within the RAN. | 2017-10-26 |
20170310720 | Non-DSG Mechanisms for Aligning Client Devices with Their Multicast Data Flows in a DOCSIS Network Environment - Video messaging may be provided. First, a bootstrap message including a system address may be transmitted by a high level device. A user device may receive the bootstrap message from the high level device and obtain system data from the system address contained in the received bootstrap message. The user device may then determine a service group in which the user device is deployed. Next, the user device may determine, from the obtained system data, a sub-system address corresponding to the determined service group. The user device may then obtain sub-system data from the sub-system address. | 2017-10-26 |
20170310721 | REDISTRIBUTING BROADCASTED CONTENT - A server device may receive content that was transmitted using a broadcast technique; track a quantity of user devices that have entered a particular area after the content has been received by the server device; determine, based on the tracking, that the quantity of user devices meets or exceeds a threshold quantity; and redistributing, by the server device and based on the determining, the content to one or more of the user devices that have entered the particular area after the content has been received by the server device. | 2017-10-26 |
20170310722 | METHODS AND APPARATUS FOR PROVIDING ALTERNATIVE CONTENT - Methods and apparatus that facilitate providing alternative content to customer devices in systems supporting DASH streaming are described. Various features relate to dynamically modifying and providing media presentation description (MPD) information to customer devices. MPD information is used by customer devices to obtain media content, e.g., program content and/or alternative content. The client device, e.g., a IP content playback device, switches between a mode used during playing of program segments in which an in-band EMSG is used to trigger a request for an MPD update and a mode of operation used during the playing of additional or alternative content segments during which the client device will periodically request MPD information. By limiting requests for MPD information during normal program segments to requests triggered by an EMSG the number of update requests can be minimized or reduced as compared to other approaches where requests for updated MPD information are made periodically. | 2017-10-26 |
20170310723 | STREAMING MEDIA STATE MACHINE - The described technology is directed towards having multiple paths through streamed media content, such as a video. The content may be represented as a state machine of states, in which each state corresponds to one or more periods of one or more segments, and transitions to one or more other states. When a state is able to transition to different states, one or more criteria may be used to select one of the transition paths to a next state. Segments corresponding to unknown paths (where the transition decision is not yet available) may be selected and streamed for buffering via a multiple path buffering mechanism. | 2017-10-26 |
20170310724 | SYSTEM AND METHOD OF PROCESSING MEDIA DATA - A method for processing media data includes determining at least one target feature and determining corresponding effect relating to the at least one target feature. Media data is received from a sender. Once the at least one target feature is detected in the media data, the corresponding effect relating to the at least one target feature is applied to the media data. | 2017-10-26 |
20170310725 | ELECTRONIC MEDIA DISTRIBUTION SYSTEM - A system and method for sharing electronic content. A sending user can specify one or more criteria that a recipient memory device must have to store the content. The sending user can also specify a digital rights management control that can be associated with the content. The content can be transferred to the recipient if the recipient memory device has the specified properties. Software at the recipient can ensure that the content is handled in accordance with the digital rights management controls specified by the sender. | 2017-10-26 |
20170310726 | Stream-based data deduplication using directed cyclic graphs to facilitate on-the-wire compression - Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. As such, a decoding peer does not need to maintain a symmetric library for the origin. Rather, if the peer does not have the chunks in cache that it needs, it follows a conventional content delivery network procedure to retrieve them. In this way, if dictionaries between pairs of sending and receiving peers are out-of-sync, relevant sections are then re-synchronized on-demand. The approach does not require that libraries maintained at a particular pair of sender and receiving peers are the same. Rather, the technique enables a peer, in effect, to “backfill” its dictionary on-the-fly. On-the-wire compression techniques are provided to reduce the amount of data transmitted between the peers. | 2017-10-26 |
20170310727 | MEDIA ASSET STREAMING OVER NETWORK TO DEVICES - Streaming of a media asset from a cloud server computer to a media playback device is disclosed. In an embodiment, a list of media assets stored in the cloud server computer is sent over network from the cloud server computer to a portable device. In another embodiment, the list is transferred via close-range communication to the portable device from the media playback device which received the list from the cloud server computer over network. In the embodiments, a media asset is started streaming over network from the cloud server computer to the media playback device responsive to selection of one of the listed media assets at the portable device. In some embodiments, streaming is redirected from the portable device to the media playback device responsive to a user's operation or in case of disconnection. | 2017-10-26 |
20170310728 | MEDIA ASSET STREAMING OVER NETWORK TO DEVICES - Streaming of a media asset from a cloud server computer to a media playback device is disclosed. In an embodiment, a list of media assets stored in the cloud server computer is sent over network from the cloud server computer to a portable device. In another embodiment, the list is transferred via close-range communication to the portable device from the media playback device which received the list from the cloud server computer over network. In the embodiments, a media asset is started streaming over network from the cloud server computer to the media playback device responsive to selection of one of the listed media assets at the portable device. In some embodiments, streaming is redirected from the portable device to the media playback device responsive to a user's operation or in case of disconnection. | 2017-10-26 |
20170310729 | MAXIMUM SUSTAINABLE ENCODING BIT RATES FOR VIDEO DOWNLOADS - Described embodiments include a system that includes a network interface and a processor. The processor is configured to identify, via the network interface, a state of congestion in a communication channel between a base station belonging to a cellular network and a client device, to calculate, responsively to the state of congestion, a maximum sustainable encoding bit rate (MSEBR) for a video that is being downloaded by the client device, from a server, via the communication channel, the video being encoded at a plurality of different predefined bit rates, and to inhibit the client device, in response to calculating the MSEBR, from downloading a segment of the video that is encoded at any one of the predefined bit rates that exceeds the MSEBR. Other embodiments are also described. | 2017-10-26 |
20170310730 | METHOD FOR NEGOTIATING CODECS IN IP NETWORKS - A codec negotiation method may include issuance by a first terminal, belonging to a first IP domain/network, of an offer message specifying, a list of codecs referred which said first terminal is capable of using for communicating with a second terminal, belonging to a second IP domain/network. The offer may be intercepted by a transit device situated on the signaling path between the first and second domains/networks. The transit device may determine a revised offer, and send the revised offer to the second terminal. The second terminal may determine a response including a list of more than one codecs that are contained in the revised offer and that the second terminal is capable of using, and sends the response to the transit device. The transit device may determine a provisional revised response, so as to comply with a certain priority criterion selected by the operators of the domains/networks in question. | 2017-10-26 |
20170310731 | MANAGING CONCURRENT STREAMING OF MEDIA STREAMS - A system and method are provided for managing a concurrent streaming of a first media stream ( | 2017-10-26 |
20170310732 | COMMUNICATION DEVICE, INFORMATION PROCESSING DEVICE, PROGRAM, AND READER/WRITER PROVIDING SYSTEM - A communication device is provided. The communication device includes an IC chip configured to read out information stored in an external device; and a communication unit configured to download an agent via a network, wherein the agent includes an application software configured to operate the IC chip as a reader, and wherein a role is provided as data associated with the application software in which at least part of a processing of the reader is performed by the agent, and wherein the communication device is configured to read out the information from the external device and to perform a predetermined processing based on the information. | 2017-10-26 |
20170310733 | ANALYTE DATA RETRIEVER - Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include receiving, at a first processing system including a user interface, an installation package including a plug-in and code configured to provide at the first processing system an interface between a sensor system configured to measure an analyte concentration level in a host and a second processing system; storing, by the first processing system, the installation package in a location based on a role of a user initiating the installation of the code; installing the plug-in for the user interface to enable the plug-in to control one or more aspects of an installation of the code; and initiating, by at least the plug-in, the installation of the code at the first processing system to provide the interface. Related systems, methods, and articles of manufacture are also disclosed. | 2017-10-26 |
20170310734 | METHOD FOR ANALYZING PERFORMANCE OF NETWORK APPLICATION PROGRAM IN SOFTWARE DEFINED NETWORKING ENVIRONMENT, APPARATUS THEREFOR, AND COMPUTER PROGRAM THEREFOR - A method, an apparatus, and a computer program for analyzing performance of a network application program are provided. The method for analyzing performance of a network application program which operates at a controller in a software defined networking (SDN) environment may include receiving identification information of the application program, flow information, and network configuration information of a network controlled by the controller, emulating a virtual network using the network configuration information, executing the virtual network using the flow information, measuring a time, when a virtual controller processes a flow, on a function basis, extracting information corresponding to the identification information of the application program from the measured result, and analyzing a performance degradation factor of the application program using the extracted information. According to an embodiment, a network manager automatically searches for a critical path and a hotspot using a conventional profiling scheme. | 2017-10-26 |
20170310735 | ACCESSING HARDWARE DEVICES USING WEB SERVER ABSTRACTIONS - In the new architecture, a client that desires access to a piece of hardware sends HTTP requests to a device server. The server receives a HTTP requests, accesses a device on behalf of the client, and send the device's response back to the client in the form of an HTTP response. This architecture has three primary advantages. First, it offers a clean interface for clients where all devices are accessed as if they are web servers. Second, it helps make devices more secure whereby clients can be prevented from accessing hardware directly, and all device access is forced through the narrow HTTP access protocol and checked for compliance with a desired security policy. Third, since HTTP allows local and remote servers to be contacted, the proposed architecture makes it easy for clients to communicate with devices that are not physically co-resident with the client but which are accessible via a network connection. | 2017-10-26 |
20170310736 | METHOD AND SYSTEM FOR SHARING FILE BETWEEN MOBILE TERMINALS - A method and system for sharing a file between mobile terminals is provided. When a first mobile terminal detects an operation of sharing a file with a second mobile terminal, the first mobile terminal establishes a connection with the second mobile terminal by broadcasting an SSID sequence, and transmits a file that needs to be shared to the second mobile terminal. Accordingly, the first mobile terminal can directly share a file with the second mobile terminal by only one operation step, which brings convenience to a user. | 2017-10-26 |
20170310737 | SYSTEMS AND METHODS FOR DOWNLOADING FILES - Systems according to various embodiments use a file download widget to facilitate the download of one or more files from one or more servers associated with a website. In particular embodiments, the file download widget may be used to facilitate the download of one or more particular files that are associated with the widget directly to a content management system, such as a synched or non-synched cloud-based content management system. In various embodiments, this may: (1) allow the user to download files for later use without storing the downloaded files on the user's computing device; and (2) allow the user to complete the download of files by initiating the transfer of files and then logging off of the website (and/or powering down their computing device) before the transfer of files is complete, which may result in a more convenient and enjoyable download process. | 2017-10-26 |
20170310738 | CONFIGURATION CHANGE REALIZATION ASSESSMENT AND TIMELINE BUILDER - Techniques disclosed herein provide an approach for assessing configuration change realization and building timelines. In one embodiment, an event parser parses relevant log(s) of a computing system to identify events of interest therein and associated tasks. Examples of tasks include publishing a firewall or persisting a firewall rule, each of which may involve multiple events in a particular order. Upon identifying an initial event of a task, the event parser instantiates a state machine associated with the task to verify the occurrence of subsequent events in the task in the appropriate order. The event parser may verify whether configuration changes made by a user have been realized in the system based on the completion of tasks associated with the configuration changes. In addition, data associated with tasks may be persisted in a datastore and used to generate reports. | 2017-10-26 |
20170310739 | COMMUNICATION APPARATUS CAPABLE OF REFERRING TO TRANSMISSION JOB HISTORY, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR - A communication apparatus that enables to refer to transmission history information in response to settings of use proprieties for transmission methods. A recording unit records a history of a transmission job executed by the communication apparatus as transmission history information that includes a transmitting destination at least. A setting unit sets a use propriety of each of the transmission methods. A determination unit determines whether reference to the transmission history information is permitted in response to the use propriety of each of the transmission methods set by the setting unit and the transmitting destination included in the transmission history information, when a user instructs to refer to the transmission history information. | 2017-10-26 |
20170310740 | Method, Apparatus, and System for Distributing Information in Graphic Code - A method, an apparatus, and a system for distributing information in a graphic code. The method includes acquiring an identification code in a selected graphic code; sending to a server a first update request including the identification code when the identification code does not exist; receiving first response information fed back by the server; starting, according to the application program identifier in the first response information, an application program corresponding to the application program identifier. When an identification code of a graphic code does not exist in an electronic device, an application program identifier corresponding to the identification code is requested from a server, and an application program corresponding to the application program identifier is started. Thus, a probability that information in a graphic code can be successfully processed is relatively high, and a success rate of identifying a graphic code is improved. | 2017-10-26 |
20170310741 | DATA CAPTURE ON A SERIAL DEVICE - A system and a method are provided for enabling a user to connect a serial port of a device server to a serial device, query and capture data and settings pertaining to the serial device such that the device server can communicate and exchange data with the serial device without requiring customized programming. The device server may periodically query and capture user-specified data from the serial device. A poll configuration feature may be used to specify one or more commands which the device server will periodically query from the serial device. The response to each poll may be further sliced into a multiplicity of smaller portions according to user-specified filter rules. The captured data may be presented to other users online by way of a Web Manager, and the device server may establish machine-to-machine communications by way of XML and a Command Line Interface. | 2017-10-26 |
20170310742 | CLOUD BASED PEER ASSISTED UPDATES IN A DEVICE MANAGEMENT ENVIRONMENT - Peer assisted updates can be provided in a device management environment. When it is desired to deploy an update to a group of managed devices, an update command can be sent to a first set of managed devices in the group instructing these managed devices to download the update. Once these managed devices have downloaded and installed the update, they will notify the management server. In response, the management server can instruct these managed devices to remain awake so that they may each function as a master device or repository for deploying the update to other managed devices in the group. The management server can then send update commands to the other managed devices instructing them to download the update from one of the managed devices that is now acting as a master device. This process can be repeated until all managed devices in the group have been updated. | 2017-10-26 |
20170310743 | SIGNAL GENERATING METHOD, SIGNAL GENERATING UNIT, AND NON-TRANSITORY RECORDING MEDIUM STORING COMPUTER PROGRAM - One aspect of the present disclosure relates to a signal generating method for generating a visible light signal. A signal generating method includes: a step SD | 2017-10-26 |
20170310744 | ANYCAST ROUTING TECHNIQUES IN A NETWORK - Aspects of the present disclosure involve systems, methods, computer program products, and the like, for managing the distribution of content and/or communications from a telecommunications or computer network to an end user of the network. In general, the system receives a request for content from a user of the network and analyzes the request to determine an estimated geographic region and/or an access network associated with the requesting device. Based on the determined geographic region or access network, a networking device returns a specific anycast IP address from which the content may be received. In this manner, the content providing network may utilize multiple anycast IP addresses within the network to provide content to one or more end users of the network. The specific anycast IP address is provided to an end user device to obtain the requested content. | 2017-10-26 |
20170310745 | DEPLOYMENT OF A NETWORK RESOURCE BASED ON A CONTAINMENT STRUCTURE - Systems and methods for the deployment of network resource information based on a containment structure are herein disclosed as comprising, in an implementation, determining, using a configuration item representative of a resource within the configuration management database, a first set of properties associated with a resource type, wherein the first set of properties comprises a subset of the global property set, determining a second set of properties based on deployment rules, such as a containment relationship defining properties included within a parent configuration item of the configuration management database, wherein the second set of properties comprises a subset of the first set of properties, provisioning the resource with the second set of properties, and communicating the provisioned resource for activation within the computer network. In an implementation, a deployment agent can be configured to provision a resource with the second set of properties. | 2017-10-26 |
20170310746 | SYSTEM FOR COMMUNICATING WITH SELECT GROUP(S) OF USERS AND METHODS OF USE - A computer-implemented method for communicating with select group(s) of users comprising executing the steps of providing a network, a database, an server running a business rules engine and communicating with said database, at least one first computer apparatus having a display and a network connection to communicate with said server, at least one second computer apparatus having a display and a network connection to communicate with said server, and a notification server configured to enable communication between a service provider via said at least one first computer apparatus and a service requestor via said at least one second computer apparatus and storage of said communication in said database; wherein said business rules engine is configured to enable searching of service providers by said service requestor, communicating between said service provider and said service requestor, selecting of said service provider, and scheduling of service to be performed by said service provider. | 2017-10-26 |
20170310747 | AUTONOMOUS DECENTRALIZED PEER-TO-PEER TELEMETRY - An approach for enabling autonomous decentralized peer-to-peer telemetry (ADEPT). A first ADEPT peer senses ADEPT peers to interconnect where the ADEPT peers are identified as ADEPT light peer, ADEPT standard peer and ADEPT peer exchange based on respectively increasing IoT device capability. The first ADEPT peer sends and receives requests to interconnect to the ADEPT peers based on messaging. The first ADEPT peer transfers files where the files are distributed toward peer-to-peer networks, creating peer consensus and interconnecting the first ADEPT peer to the ADEPT peers based on the peer consensus. ADEPT peers execute transactions and contracts by decentralized peer to peer consensus network and consensus ledger to enable autonomous device coordination. | 2017-10-26 |
20170310748 | APPARATUS AND METHODS FOR PROVIDING NETWORK SECURITY ON A MOBILE PLATFORM - The disclosure describes components, apparatus and methods for providing network security between computing devices and/or networks on mobile platforms such as aircraft. One such apparatus may comprise: a first memory configured for data communication with a first computing device of the mobile platform; a second memory configured for data communication with a second computing device of the mobile platform; and a controller. The controller may be configured to detect a change in data stored In the first memory and cause the change in data stored in the first memory to be reflected in the second memory by causing data transfer from the first memory to the second memory. Data transfer between the first memory and the second memory may be conducted using a non-internet protocol. | 2017-10-26 |
20170310749 | METHODS AND APPARATUS FOR FLIGHT BRIEFING DATA SYNCHRONIZATION - A method for managing a flight briefing data system is provided. The method establishes, by a central computer system, a first communication connection with an electronic device and a second communication connection with an aircraft onboard avionics unit; transmits, by the central computer system, flight briefing data via the first communication connection and the second communication connection, wherein the flight briefing data comprises at least a plurality of Notices to Airmen (NOTAMs) associated with a pending flight; receives, by the central computer system, altered flight briefing data; and synchronizes the central computer system, the electronic device, and the aircraft onboard avionics unit, by transmitting the altered flight briefing data via the first communication connection and the second communication connection. | 2017-10-26 |
20170310750 | METHOD AND SYSTEM FOR RECONSTRUCTING A SLOT TABLE FOR NFS BASED DISTRIBUTED FILE SYSTEMS - A method and a system for reconstructing a slot table for Network File System (NFS) based distributed file systems are provided herein. The method includes: receiving a retried request from a client at a node of the distributed file system; in a case that the retried request is of a re-enter idempotent type, processing the request again; in a case that the retried request is file state related, checking in already opened file handles if they are open with exactly same properties already exist for the particular client, and if found, returning the file handle information to the client as if it was just opened by it; and in a case that the retried request is of a non-idempotent type attempting to perform the operation again, wherein if the source file does not exist, checking the existence of the expected outcome, and replying with a success. | 2017-10-26 |
20170310751 | SYSTEM AND METHOD FOR CLOUD STORAGE DEVICE DETECTION - A document processing system includes an embedded controller that has both a local area network interface for receiving documents over an associated network and a wireless personal area network interface for communicating with mobile computing devices using BLUETOOTH low power communications. The embedded controller transmits broadcasts message to nearby mobile computing devices that send responses to the broadcast messages. Based on the RSSI of a received response, the embedded controller can determines whether a particular mobile computing device is in close proximity, indicating that a user is present at the document processing system. The embedded controller sends identification data associated with the document processing system to the mobile computing device. The user of the mobile computing device selects the document processing system to print a document, and the mobile computing device uses the identification data to route the document to the document processing system over a wireless local area network. | 2017-10-26 |
20170310752 | Utilizing a Content Delivery Network as a Notification System - In one embodiment, a method includes receiving, at a server of a content delivery network (CDN), an updated client-resource file, where the updated client-resource file is an updated version of a current client-resource file identified by a particular uniform resource identifier (URI) of the CDN. The method further includes receiving a request from a first client device to access the particular URI. The method also includes providing to the first client device the updated client-resource file. | 2017-10-26 |
20170310753 | Content Management System for Distribution of Content - In one embodiment, a method includes receiving a request from a client device, the request including one or more device dimensions associated with the client device. The method further includes identifying a set of one or more content profiles, where each identified content profile is associated with one or more content-profile dimensions that are compatible with the received device dimensions. The method also includes determining whether a previously created content manifest corresponds to the identified set of content profiles. The method also includes, in response to a determination that a previously created content manifest corresponds to the identified set of content profiles, sending to the client device a uniform resource identifier (URI) identifying a resource that includes the previously created content manifest. | 2017-10-26 |
20170310754 | SELECTING MEMORY FOR DATA ACCESS IN A DISPERSED STORAGE NETWORK - A method begins by a processing module of a dispersed storage and task (DST) execution unit receiving a data request for execution by the DST execution unit, the data request including a slice name associated with an encoded data slice of the data request. The method continues with the processing module generating a scoring resultant corresponding to each of a plurality of memories of the DST execution unit, in accordance with a ranking function and the slice name. The method continues with the processing module selecting one of the plurality of memories of the DST execution unit in accordance with a mapping function and executing the data request utilizing the one of the plurality of memories of the DST execution unit. | 2017-10-26 |
20170310755 | PROCESSING OF NETWORK COMMUNICATION BETWEEN A TELECOMMUNICATIONS NETWORK AND AT LEAST ONE USER EQUIPMENT VIA REALIZING, WITHIN THE TELECOMMUNICATIONS NETWORK, NETWORK FUNCTIONS VIRTUALIZATION - A method for processing of network communication between a telecommunications network and at least one user equipment includes: subscription data, session data and/or call state data required to be available to at least a first virtual network function instance are transmitted, by a shared database functionality, to the first virtual network function instance; in case of at least a change being applied to the subscription data, session data and/or call state data, the changed subscription data, session data and/or call state data or an updated version of the subscription data, session data and/or call state data is transmitted, by the first virtual network function instance, to the shared database functionality; and in case of a failure of and/or a transfer of the functionality of the first virtual network function instance, a second virtual network function instance resumes the functionality of the first virtual network function instance. | 2017-10-26 |
20170310756 | HIGH PERFORMANCE IP PROCESSOR USING RDMA - An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. | 2017-10-26 |
20170310757 | Migrating Data In Response to Changes In Hardware or Workloads At A Data Store - Embodiments are directed to modifying storage capacity within a data store and to modifying resiliency for a data store. In one scenario, a computer system receives a request to move data. The computer system may determine that data is to be moved from an allocation on one data store to a new allocation on another data store. The computer system may create a new allocation on the other data store, where the new allocation is configured to receive data from the first data store. The computer system then moves the data to the new allocation on the second data store as data I/O requests are received at the first data store. Data store access requests are synchronized with the data movement by directing the data store access requests to the first data store, to the second data store or to both data stores depending on the type of access request. | 2017-10-26 |
20170310758 | VEHICLE RADAR SYSTEM WITH A SHARED RADAR AND COMMUNICATION SYSTEM - A shared radar and communication system for a vehicle includes capabilities for radar detection and communication with vehicles equipped with similar systems. The radar system is equipped with pluralities of transmit antennas and pluralities of receive antennas. The radar transmits a signal modulated with spread codes that are information bits. A receiver discriminates the signals sent from own transmitters and multiple reflections to detect objects of interest. In addition, the receiver discriminates signals transmitted from different systems on other vehicles. This requires the receiving system to have knowledge of the codes transmitted by the other vehicle. The receiving system determines the information bits sent by the other vehicle. If multiple radar systems on multiple vehicles use different sets of codes (but known to each other), the multiple systems can create a communication infra-structure in addition to radar detection and imaging. | 2017-10-26 |
20170310759 | MULTI-USER APPLICATION EXECUTING IN USER PRIVILEGE MODE - A method and system for providing a multi-user application executing in a user privilege mode with access to resources of multiple users is described. The multi-user application identifies a first user and a second user of the multi-user application. The multi-user application retrieves an access token for the first user and an access token for the second user. Each access token provides evidence of authorization to access a resource in accordance with access rights of the user. The multi-user application accesses resources by providing one of the access tokens as evidence of authorization to access the resource in accordance with the access rights of the user. The multi-user application can thus access resources of multiple users without having to execute in a system privilege mode. | 2017-10-26 |
20170310760 | METHOD FOR DYNAMIC RETENTION OF HTTP SESSION INFORMATION AND WEB APPLICATION SERVER AND WEB SERVER USING THE SAME - A web server is provided. The web server includes a communication part for receiving an HTTP request from an entity connected by network and communicating with at least one WAS; and a processor for performing at least one of (i) a process of transmitting the HTTP request received from the entity to a specific WAS selected among the at least one WAS and then receiving information on an HTTP session corresponding to the specific WAS from the specific WAS when receiving an HTTP response from the specific WAS in response to the HTTP request, thereby retaining the information on the HTTP session and (ii) a process of transmitting a PING signal and then receiving the information on the HTTP session corresponding to the specific WAS from the specific WAS when receiving a PONG signal in response to the PING signal, thereby retaining the information on the HTTP session. | 2017-10-26 |
20170310761 | FIRST TERMINAL APPARATUS, SERVER APPARATUS, AND CONTROL METHOD - Provided is a communication control method of controlling transmission of audio data based on priority in a session for audio communications established between communication terminals. A server notifies a communication terminal of priority that can be used in a session for audio communications established between communication terminals, and a terminal apparatus notifies the server apparatus of priority when performing transmission, thus making it possible to control transmission of audio data based on the priority by UE | 2017-10-26 |
20170310762 | Method and Apparatus for Multipath Communication - In accordance with an example embodiment of the present invention, there is provided a method, comprising exchanging connectivity information, setting up a connection, determining that a correspondent node has at least one access in an inactive state, and transmitting a request to the correspondent node to activate at least one of the at least one access in an inactive state. The setting up may be done based on the exchanged connectivity information. | 2017-10-26 |
20170310763 | SYSTEM AND METHOD FOR SESSION RESTORATION AFTER NODE FAILURE - A system and method for restoring a session state of a client device has been provided. The system comprises a memory with instructions executable by a processor to receive a first request from the client device, where the first request is a first type of request and is associated with a new session of the client device; process the first request without persisting a session state of the new session in the database node; receive a second request from the client device, where the second request is a first instance of a second type of request and is associated with the new session; and in response to determining to restore a persisted session state, restore the persisted session state for the client device from the database node, and assign the persisted session state as the session state of the new session of the client device. | 2017-10-26 |
20170310764 | FAULT TOLERANT, CONTENT DOWNLOAD SYSTEM CROSS-REFERENCE TO RELATED APPLICATIONS - A network device to mitigate interruptions in content downloading from a content server to a client device in a client-server network is disclosed. The device includes a recovery module (RM) to migrate a data transfer connection from a first server to a second server responsive to detection of an interruption in data transfer from the first server. The migrated data transfer connection may include an instruction associated with an amount of data transferred prior to the interruption in data transfer. | 2017-10-26 |
20170310765 | SYSTEM AND METHOD FOR LOCATION-BASED ACCESS TO DOCUMENT PROCESSING DEVICES - A system and method for location-based document processing device selection includes a device including a processor, memory and a network interface. The device is configured for data communication with a plurality of identifiable multifunction peripherals. The memory stores contact data mapping each multifunction peripheral to at least one designated contact. The device is further configured to receive status data from each of the multifunction peripherals and to store received status data in the memory. An analytical engine calculates list data from stored status data. The device selectively generates alerts corresponding to identified multifunction peripherals in accordance with an analysis of the list data. The device communicates the alerts to at least one designated contact in accordance with each identified multifunction peripheral and the contact data. The system thus supplies users, such as print users or service technicians, listings or mappings of proximate devices for use or servicing. | 2017-10-26 |
20170310766 | SERVICE STATE DETERMINING METHOD FOR SERVICE PROCESSING DEVICE AND SCHEDULING DEVICE - The embodiments of the present application provide a service state determining method for a service processing device and a scheduling device. In the method, the scheduling device can determine the service state of the service processing device by sending the service request to the service processing device and determining to receive the response message returned by the service processing device for the service request, thus, the scheduling device can allocate the service processing device for this service request according to the service state of the service processing device subsequently, thereby avoiding the problem that the service processing device allocated for the service request by the scheduling device cannot process this service request, ensuring that the service requested by the service request can be normally realized, improving the safety and stability of the network and improving user's experience. | 2017-10-26 |
20170310767 | SYSTEMS AND METHODS FOR ENABLING ACCESS TO THIRD PARTY SERVICES VIA A SERVICE LAYER - An M2M Service Layer is expanded to access the services of third parties and exchange data with these third parties. The M2M Service Layer is then able to act as a proxy between M2M Devices and the third party services. The M2M Service Layer is able to present a single/consistent interface, or API, to the M2M Device and hide the details of the third party service provider from the M2M Device. | 2017-10-26 |
20170310768 | Wireless end-user device with wireless modem power state controlpolicy for background applications - A wireless end-user device has a wireless wide-area network (WWAN) modem. One or more processors classify whether an application associated with an Internet access request is interacting with a user. At a time when the application is classified as not interacting with a user, a power state control policy is enforced to allow, disallow, or delay the Internet access request to follow a temporal policy profile for changes in modem power state. | 2017-10-26 |
20170310769 | Location-Based Content Aggregation and Distribution - In one embodiment, a method includes storing one or more content postings that each include data representative of one or more content instances. Each content posting is associated with one or more first users. The method also includes storing one or more data records associating one or more geographic locations with accessing of the content instances. The method also includes selectively sending one or more of the content postings for display on an access device associated with a second user based on a past geographic location of the access device. | 2017-10-26 |
20170310770 | SYSTEM AND METHOD FOR CLOUD COMPUTING ON-DEMAND DYNAMIC SERVICE MANAGEMENT ENGINE - The present arrangement is a system for connecting consumers with services. The system has a mobile application management platform for supporting connection with a plurality of third party service providers. A display module provides an interface for displaying interaction with the third party service providers in an integrated arrangement. The consumer requests at least two services offered by a plurality of the mobile application platforms of the third party service providers. A processor parses the service request and assembles at least one combination of at least the two services, based on a coordination of an optimized combination of the two services based on time and cost so as to allow the consumer to select and initiate a corresponding request for the combination to at least said two services. A fulfillment module configured to complete ordering of the transaction with both the consumer, the fulfillment module sending service request to the third party service providers, based on information received from the scheduling unit regarding the completion time of each service while each service is being performed. | 2017-10-26 |
20170310771 | APPLICATION PROGRAMMING INTERFACE FOR RENDERING PERSONALIZED RELATED CONTENT TO THIRD PARTY APPLICATIONS - A system includes an ingestion component configured to receive a request from an entity for content related to a content item and a user identity. The request has a content identifier representative of the content item and a token. A request processing component of the system is configured to access a database associated with the system and identify the content item and the user identity using the content identifier and the token, wherein the database has information associating the token with the user identity and associating the content identifier with the content item. In response to identification of the content item and the user identity, the request processing component directs a recommendation engine associated with the system to identify the content related to the content item and the user identity. Information identifying the content related to the content item and the user identity is then transmitted back to the entity. | 2017-10-26 |
20170310772 | INFERRING THE LOCATION OF USERS IN ONLINE SOCIAL MEDIA PLATFORMS USING SOCIAL NETWORK ANALYSIS - Described is a system for inferring the location of users in online social media platforms using social network analysis. A social network is first extracted from data from at least one social media platform. A mapping is generated from each user to the user's estimated geographical location in the social network, resulting in an estimated location mapping. A mapping is generated from each user to the user's known geographical location, if known, resulting in a known location mapping. The estimated location mapping is updated to match the known location mapping. The location for each user j in the known location mapping is updated in a current estimated location mapping. The final geographical locations of users connected with j are estimated using a geometric median metric. Finally, the final estimated geographical locations of users connected with j are mapped into the social network. | 2017-10-26 |
20170310773 | Location-Based Open Social Networks - Systems and methods for open social networks configured for a location or place. In an aspect, a map shows up after an app is started at user's device. Local networks are arranged accessible via interactive network icons on the map. Local networks are also arranged accessible to remote users via map or website link. In another aspect, user number or post quantity is displayed beside network icon on a map. In yet another aspect, posts generated by local and remote users are presented in separate windows. Furthermore, social network is searchable via keyword or category in map setting. | 2017-10-26 |
20170310774 | SCALABLE DATA ENRICHMENT FOR CLOUD STREAMING ANALYTICS - A method is described of pre-processing real-time data to be processed by one or more real-time analytics services. The method includes: receiving, at a stateless ingress node, data from one or more client devices; transforming the data in real-time at the stateless ingress node; determining in real-time, at the stateless ingress node, a real-time analytics service for the transformed data; and forwarding in real-time the transformed data to the determined real-time analytics service for stateful processing. | 2017-10-26 |
20170310775 | APPARATUS AND METHODS FOR PROVIDING RECOMMENDATIONS BASED ON ENVIRONMENTAL DATA - Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed. | 2017-10-26 |
20170310776 | Implicit Geolocation of Social Networking Users - In one embodiment, one or more computing systems receive a request for a location prediction for a user from a service. The computing systems access one or more real-time location signals and one or more aggregated location signals. The aggregated location signals may comprise one or more previous location signals. The computing systems may then generate one or more location predictions from the one or more real-time location signals and the one or more aggregated location signals, and calculate a single location prediction for the user from the one or more location predictions. The computing systems may then send, in response to the request, the single location prediction for the user to the requesting service. | 2017-10-26 |
20170310777 | ADJUSTING PROMINENCE OF A PARTICIPANT PROFILE IN A SOCIAL NETWORKING INTERFACE - An approach is described for adjusting prominence of a participant profile in a social networking interface. An associated system may include a processor and a memory storing an application program, which, when executed on the processor, performs an operation that may include receiving an activity stream update of the participant and calculating a relevancy score based on content in the activity stream update. The operation further may include adjusting a visibility level of the participant profile in the social networking interface based upon the calculated relevancy score. Adjusting the visibility level may include increasing the visibility level of the participant profile upon determining that the calculated relevancy score is greater than or equal to a first predefined threshold value. Adjusting the visibility level further may include decreasing the visibility level of the participant profile upon determining that the calculated relevancy score is less than a second predefined threshold value. | 2017-10-26 |
20170310778 | System and Method for Expiring Advertisement Spaces in Syndicated Feeds - A system and method for managing advertisements in a syndicated feed is described. One embodiment includes a method for expiring an advertisement space in a feed. This method includes the following actions: receiving a data item associated with a feed from a publisher; determining whether an advertisement space should be associated with the data item; inserting a markup of the advertisement space into the data item; providing the data item for a user; receiving a request from the user to view the advertisement corresponding to the advertisement space and the data item; determining whether the data item is older than a threshold age; providing an advertisement to the user if the data item is not older than a threshold age, wherein the advertisement is viewable in the advertisement space; and providing a blank advertisement to the user if the data item is older than a threshold age. | 2017-10-26 |
20170310779 | FACILITATING CONTENT ACCESSIBILITY VIA DIFFERENT COMMUNICATION FORMATS - Methods and systems for facilitating content accessibility via different communication formats are provided. According to one embodiment, information indicative of one or more communication formats via which a client device is capable of communication is stored on a client device by (i) sending the client device a web page having embedded therein test content associated with a first protocol stack and/or a second protocol stack; and (ii) based on a response to the test content received from the client device, determining communication capabilities of the client device. A result of the determination is stored within a browser cookie, which is sent to the client device. A content request is received from the client device that includes the browser cookie. The client device is redirected to a server device appropriate for the communication capabilities of the client based at least in part on the browser cookie. | 2017-10-26 |
20170310780 | Multi-Delivery-Method Policy-Controlled Client Proxy - A system for providing a multi-delivery-method policy-controlled client proxy is disclosed. The system may receive a request for a network service from a client. Based on the request for the network service, the system may detect the presence of a client proxy associated with the client. If client proxy is detected, the system may provide a data object that includes information that indicates that the client proxy is a primary source for content that may be requested by the client. The system may redirect, based on the data object, a request for the content received from the client to the client proxy. The system may then obtain, via the client proxy, the content by utilizing a delivery method that is selected based on a policy. Finally, the system may provide, via the client proxy, the content to the client. | 2017-10-26 |