47th week of 2021 patent applcation highlights part 72 |
Patent application number | Title | Published |
20210367954 | SYSTEM AND METHOD FOR TRANSACTION AUTHENTICATION - Embodiments of the disclosure provide a method, system, and server for authenticating transactions. In an example, the server includes instructions that process a transaction initiation message received from a first communication device, instructions that transmit a security message to a trusted communication device in response to processing the transaction initiation message, where the security message comprises a time-sensitive code, instructions that receive and process a response message to the security message, where the response message includes a location identifier that describes a location of the trusted communication device and/or call history of the trusted communication device, which may be configured to include call content extracted from a call monitored at the trusted communication device. Some or all of the information in the response message can be used for purposes of identifying a possibly fraudulent transaction. | 2021-11-25 |
20210367955 | SCRUBBER FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS TARGETTING MOBILE NETWORKS - A device includes a processor and a memory. The processor effectuates operations including receiving signaling messages traversing a first interface or a second interface from the network traffic, translating the signaling messages into one or more events, detecting one or more anomalies by analyzing the one or more events, determining whether the one or more anomalies is indicative of an attack on a telecommunications network and performing a remediation action to the signaling messages resolving the attack when the one or more anomalies is indicative of an attack on the telecommunications network. | 2021-11-25 |
20210367956 | CYBER ATTACK COVERAGE - A target system is verified against one or more security threats. A selection of a threat type for an attack vector for verifying defensive capabilities of a target system is received via a user interface. A selection of one or more selectable parameters for delivery of the threat type to the target system is received via the user interface. In response to selection of the threat type and the selected parameters, a base binary executable and a library comprising functions for generating attack vectors is accessed. One or more functions from the library are added to the base binary executable based on the selected threat type and the selected parameters. A payload is generated that implements the selected threat type and the selected parameters in a delivery format based on the selected parameters. | 2021-11-25 |
20210367957 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a processor configured to judge whether access from a subject terminal to a subject host is insecure communication based on: a degree of threat of the subject host, the degree of threat of the subject host being obtained as a result of inputting information indicating the subject host into a first learning unit, the first learning unit having performed first learning by using learning data so as to learn to output a degree of threat of a host in response to inputting of information indicating the host, information indicating a host and whether the host is a threat being used as the learning data; and a degree of abnormality of access from the subject terminal, the degree of abnormality of access from the subject terminal being obtained as a result of inputting a communication history of the subject terminal into a second learning unit, the second learning unit having performed second learning by using a communication history of a terminal as learning data so as to learn to output a degree of abnormality of access from the terminal. | 2021-11-25 |
20210367958 | AUTONOMIC INCIDENT RESPONSE SYSTEM - An autonomic incident response system (AIRS) that can be used within any cyber system (computing systems, network devices, applications, cyber-physical systems, data, and files). If a cyber system is attacked, the cyberattack pattern type can be seamlessly identified by the AIRS along with the method used to launch the attack, the vulnerability that was exploited, the impact and consequence of the attack, and finally the recovery actions that can be taken automatically or semi-automatically to stop the attack or mitigate its impact on cyber system operations. | 2021-11-25 |
20210367959 | MALICIOUS SOFTWARE DETECTION AND MITIGATION - An example method includes obtaining, by a processor on an end user device, from an operating system of the end user device, a permission to access the operating system by a malicious software management application, receiving, by the processor via the malicious software management application from the operating system, a first set of click information indicative of a set of clicks detected by an input-output interface of the end user device and a second set of click information indicative of a set of clicks detected by a web browser of the end user device, identifying, by the processor via the malicious software management application based on the first and second sets of click information, a presence of a click generating application on the end user device, and initiating, by the processor via the malicious software management application based on the presence of the click generating application, a mitigation action. | 2021-11-25 |
20210367960 | NAME TRANSLATION MONITORING - Systems, methods, and related technologies for analyzing traffic based on naming information are described. In certain aspects, name information and address information from a name translation response are stored. The name information is associated with a device based on the device sending a communication to an address associated with the name information. | 2021-11-25 |
20210367961 | MAPPING A VULNERABILITY TO A STAGE OF AN ATTACK CHAIN TAXONOMY - In an embodiment, a semantic model and a semantic model training method that obtains a textual description of one or more features associated with a first vulnerability that has been used in one or more attacks. Text is parsed from the first textual description in accordance with one or more rules. The system determines a first label for the first vulnerability that is associated with one or more of a plurality of stages of an attack chain taxonomy. The model is generated or refined to map the parsed text to the first label associated with the one or more stages of the attack chain taxonomy. | 2021-11-25 |
20210367962 | AUTOMATIC INFORMATION SECURITY RISK ASSESSMENT - The invention relates to a method for the automatic assessment of information security risks, especially for the automatic assessment of information security risks in an information technology, IT, infrastructure, and to a corresponding system for the automatic information security risk assessment. | 2021-11-25 |
20210367963 | Automated Risk Assessment Module with Real-Time Compliance Monitoring - Techniques are disclosed for usage-tracking of various information security (InfoSec) entities for tenants/organization onboarded on an instant multi-tenant security assurance platform. The InfoSec entities include policies, procedures, controls and evidence tasks. A policy or procedure is enforced by implementing one or more controls, and the collection of one or more evidence tasks proves/verifies the implementation of a control. The InfoSec entities are linked to each other across the platform and accrue a number of benefits for the tenants. These include generating a security questionnaire response (SQR), defining a readiness project and an audit project, sharing InfoSec entities encompassing the various products of a tenant, automating risk assessment, automatic collection of evidence tasks for verifying the implementation and/or operational state/status of various mitigating controls, etc. | 2021-11-25 |
20210367964 | SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE - Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious threat analysis, and identification and reporting of potential and real threats present on an enterprise computer system. Specifically, embodiments are directed to a system that securely identifies and maps sensitive information from computers across the enterprise. Secure and sensitive information may be internally encrypted and analyzed for indicators of compromise, threatening behavior, and known vulnerabilities. The remote, agent-less collection, analysis, and identification process can be repeated periodically to detect and map additional sensitive information over time, and may delete itself after completion to avoid detection. | 2021-11-25 |
20210367965 | DISTRIBUTED SCANNING - A distributed system of scanning nodes is provided job portions to collectively scan network systems numbering in the tens of thousands and beyond million across the Internet. A scanning controller creates the job portions to fulfill a scanning request. The scanning controller creates the job portions based on availability of scanning nodes and a size of the scanning request (i.e., number of network addresses indicated by the request). The scanning controller creates each job portion with scanning instructions for an available scanning node to execute on a selected set of the network addresses indicated in the request, with each job portion having a different set of addresses to scan and being independently executable. | 2021-11-25 |
20210367966 | SYSTEMS AND METHODS FOR NETWORK SECURITY - Disclosed are implementations, including a method that includes monitoring dataflow streams in a network comprising multiple computing nodes, and determining network security characteristics for a dataflow stream, from the monitored dataflow streams, relating to security, authentication, and access events for accessing, via the dataflow stream, one or more of the multiple nodes. The method further includes determining potential violations by the dataflow stream of security policies defined for operation of the network, access functionality for the network, or identity attributes used by the network, based, at least in part, on the determined network security characteristics for the dataflow stream, and based on network-operation data comprising one or more of network security data, network identity data, and network access data. The network-operation data is stored in one or more data storage units in the network, and is configured to manage network access and operation for the multiple computing nodes. | 2021-11-25 |
20210367967 | A METHOD AND APPARATUS FOR DEFENDING AN HTTP FLOOD ATTACK - A method for defending an HTTP flood attack includes: when a first protection strategy is used for protection, detecting a protection performance of the first protection strategy; and when the protection performance of the first protection strategy does not meet requirements, using a second protection strategy for the protection, where a protection level of the second protection strategy is higher than a protection level of the first protection strategy. | 2021-11-25 |
20210367968 | ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK - The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed. | 2021-11-25 |
20210367969 | FOOTPRINT DATA TO PREVENT MAN-IN-THE-MIDDLE ATTACKS - Systems and methods are disclosed for preventing relay or replay attacks using time-stamped, localized footprint data. An access device may receive, from one or more beacon transmitters, a plurality of broadcast messages, each broadcast message, of the plurality of broadcast messages, comprising a timestamp and a unique identifier for a beacon transmitter, of the one or more beacon transmitters. The access device may store the timestamps and the unique identifiers. The access device may receive, from a user device, an access request comprising timestamps and unique identifiers corresponding to a subset of the broadcast messages received by the access device. The access device may verify that the stored timestamps and unique identifiers match the timestamps and unique identifiers received from the user device. Based on the verifying, the access device may authenticate the access request. | 2021-11-25 |
20210367970 | SYSTEMS AND METHODS FOR END-USER SECURITY AWARENESS TRAINING FOR CALENDAR-BASED THREATS - Systems and methods are described for providing calendar-based simulated phishing attacks to users of an organization. Initially, a context is identified for a calendar-based simulated phishing attack directed towards a user. An electronic calendar invitation for the calendar-based simulated phishing attack is then generated using the context. Thereafter, the electronic calendar invitation may be communicated to an electronic calendar of the user. | 2021-11-25 |
20210367971 | PHISHING ATTEMPT SEARCH INTERFACE - Systems, methods, and media are used to identify phishing attacks. A notification of a phishing attempt with a parameter associated with a recipient of the phishing attempt is received at a security management node. In response, an indication of the phishing attempt is presented in a phishing attempt search interface. The phishing attempt search interface may be used to search for additional recipients, identify which recipients have been successfully targeted, and provide a summary of the recipients. Using this information, appropriate security measures in response to the phishing attempt for the recipients may be performed. | 2021-11-25 |
20210367972 | ONE-WAY TRANSFER DEVICE WITH SECURE REVERSE CHANNEL - A data diode provides a flexible device for collecting data from a data source and transmitting the data to a data destination using one-way data transmission across a main channel. On-board processing elements allow the data diode to identify automatically the type of connectivity provided to the data diode and configure the data diode to handle the identified type of connectivity. Either or both of the inbound and outbound side of the data diode may comprise one or both of wired and wireless communication interfaces. A secure reverse channel, separate from the main channel, allows carefully predetermined communications from the data destination to the data source. | 2021-11-25 |
20210367973 | ONE-WAY TRANSFER DEVICE WITH SECURE REVERSE CHANNEL - A data diode provides a flexible device for collecting data from a data source and transmitting the data to a data destination using one-way data transmission across a main channel. On-board processing elements allow the data diode to identify automatically the type of connectivity provided to the data diode and configure the data diode to handle the identified type of connectivity. Either or both of the inbound and outbound side of the data diode may comprise one or both of wired and wireless communication interfaces. A secure reverse channel, separate from the main channel, allows carefully predetermined communications from the data destination to the data source. | 2021-11-25 |
20210367974 | CERTIFICATE AUTHORIZATION POLICY FOR SECURITY PROTOCOL AND DATA MODEL CAPABLE DEVICES - A system for data processing, comprising a management controller operating on a processor and configured to load and execute one or more algorithms that provide the function of transmitting a request to a managed device using a Security Protocol and Data Model (SPDM) protocol and to receive a response from the managed device. A system management bus and security policy system operating on the processor is configured to execute one or more algorithms to process the response from the managed device to apply an SPDM security policy to the response. | 2021-11-25 |
20210367975 | APPLICATION SECURITY FOR SERVICE PROVIDER NETWORKS - Systems, methods, and apparatuses may include a network onboarding manager for configuring network security features at application hosting sites of a service provider network, for instance, as part of a procedure for deploying an application onto the service provider network. The network onboarding manager may generate a security profile for the application. The security profile may include information indicating a security posture of the application with respect to network security features needed to deploy the application, which the system may use to generate and send configuration data to the hosting sites. One or more operations may be performed based on a user input received at a developer portal (e.g., via a user interface), or automatically based on one or more API calls made by the network onboarding manager and/or based on one or more security profile templates. | 2021-11-25 |
20210367976 | METHOD AND SYSTEM FOR DATA LOSS PREVENTION MANAGEMENT - A method may include obtaining, from a user device, a first feedback from a first predetermined party regarding a data loss prevention (DLP) event through a graphical user interface (GUI). The method may further include determining whether the DLP event is authorized using the first feedback. The method may further include transmitting, automatically in response to determining that the DLP event is not authorized, a request for a second feedback by a second predetermined party using the GUI. The second predetermined party may be selected for the request automatically according to a routing queue. The method may further include obtaining, in response to transmitting the request for the second feedback, a selection of a security action regarding the DLP event using the GUI. The method may further include transmitting, automatically in response to the selection of the security action, a command that initiates the security action. | 2021-11-25 |
20210367977 | SYSTEM AND METHOD FOR REMOTE WIPE - A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container running on a target client device associated with the user and having a managed cache storing content managed by or through the server computer may, in response to the remote wipe message or notification, deleting the managed content or a portion thereof from its managed cache. The managed container may send back an acknowledgement or message to the server computer that it had completed the remote wipe. The remote wipe functionality can avoid having to deal with individual applications running on the client device and therefore can eliminate the complexity of having to deal with individual applications. Furthermore, the remote wipe can be done independently of the local operating system and without affecting non-managed information/applications on the client device. | 2021-11-25 |
20210367978 | METHOD DEVICE AND SYSTEM FOR POLICY BASED PACKET PROCESSING - Provided are methods, apparatus, and system for policy based wide area network. A network of network appliances is configured with a policy configuration. Each network appliance is configured to validate each wide area network packet against the policy configuration. The validation can include verifying that the packets meet the SD-WAN network segment requirements and security rules including verifying that the source and destination address of the packet meet the firewall zone requirements. Each wide area network packet contains a policy header that is checked by the sending and receiving network appliance against the policy configuration. | 2021-11-25 |
20210367979 | CyberSecurity System Having Security Policy Visualization - A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a computer-implemented method for implementing security policies in a secured network, including: retrieving a set of rules of a security policy; analyzing the set of rules of the security policy using one or more Satisfiability Modulo Theory (SMT) operations to reduce a dimensionality of the security policy; and generating a visual presentation on a user interface using results of the SMT operations, where the visual presentation includes visual indicia representing one or more targeted policy dimensions with respect to one or more fixed policy dimensions. In at least one embodiment, two or more security policies are presented with visual indicia representing differences between the security policies, including representations of one or more targeted policy dimensions with respect to one or more fixed policy dimensions. | 2021-11-25 |
20210367980 | DETERMINING RELEVANT SECURITY POLICY DATA BASED ON CLOUD ENVIRONMENT - The disclosed technology is directed towards returning security policy requirements data based on user input that identifies a cloud environments, a service model, first or third party responsibilities, and/or code deployment information. A user provides answers to straightforward, generally non-expert questions directed to the user's cloud environment, first or third party responsibilities, and/or code deployment information for the user's scenario, e.g., technical workload. The answers result in determining which architecture layers apply (are in-scope architecture layers) relevant to the user's scenario. The in-scope architecture layers map to security requirements maintained in a security policy data store. The security requirements are returned (e.g., as a list) in response to the user's answers. | 2021-11-25 |
20210367981 | Anonymization Overlay Network For De-Identification Of Event Proximity Data - A server computing device configured to receive, via an anonymization network and from a first mobile computing device that determines a location from a set of locations of the first mobile computing device is within a threshold distance of an event, a proximity indication that a first user associated with the first mobile computing device is proximate to the event; in response to receiving an indication of a remittance for the event from a second user, generate an association between the remittance and the event; in response to receiving descriptive data that is descriptive of the event, send the descriptive data to a second mobile computing device of the second user; and in response to receiving an indication to release the remittance, send a message that executes a transaction that transfers at least a portion of the amount of the remittance to an account associated with the first user. | 2021-11-25 |
20210367982 | HOSTED CONFIDENTIAL DISCUSSION SYSTEM - Examples described herein generally relate to a system for providing a live multi-party session. The system may include a participant interface that displays a programmed screen including a plurality of questions on a participant device, each question including at least one selectable response. At least one of the selectable responses includes a text box configured to receive a freeform response and a display area configured to show responses to the question from other participants, each participant identified by a randomized name. The system may include a host user interface including: a navigation panel that displays a name of each of a plurality of programmed screens and indicates the programmed screen displayed to the participants; a participant panel indicating how many of the questions each participant has completed; and an response panel indicating, for each question, selected responses of the participants. | 2021-11-25 |
20210367983 | NETWORK CALL METHOD, SERVER, CALL TERMINAL, NETWORK CALL SYSTEM, AND STORAGE MEDIUM - A network call method, a server, a call terminal, a network call system, and a storage medium are provided. The network call method includes: receiving a reservation request transmitted by a call reservation terminal, the reservation request including a first communication identifier of a first call terminal; generating a chat room identifier of a chat room in a social network application; generating a call reservation notification, the call reservation notification including an access link generated according to the chat room identifier; and transmitting the call reservation notification to a communication client of the first call terminal according to the first communication identifier of the first call terminal. | 2021-11-25 |
20210367984 | MEETING EXPERIENCE MANAGEMENT - Provided is a method that includes receiving one or more current network parameters associated with at least one participant of a plurality of participants in a meeting. The method further includes predicting one or more features of the meeting to be enabled and/or disabled for the at least one participant based on the one or more current network parameters and a machine learning (ML) model associated with the at least one participant, wherein the ML model is trained based on the one or more previous network parameters, associated with the at least one participant, received during a previous meeting attended by the at least one participant. The method further includes modifying a user interface of the meeting being presented to the at least one participant based on the one or more predicted features of the meeting, wherein the UI enables participation of the at least one participant in the meeting. | 2021-11-25 |
20210367985 | IMMERSIVE TELEPRESENCE VIDEO CONFERENCE SYSTEM - A video conferencing system ( | 2021-11-25 |
20210367986 | Enabling Collaboration Between Users - Provided is a method and system for enabling collaboration between users. The method is implemented by a collaborative canvas application executing on an electronic device including one or more processors. The method includes creating an interactive collaboration session amongst a plurality of users. The method includes receiving one or more interactions associated with a plurality of applications from the plurality of users. The plurality of applications are initiated within the interactive collaboration session. Each of the plurality of applications are accessed natively by each of the plurality of users. The method includes synchronizing in real-time each of the one or more interactions received from the plurality of users for enabling collaboration between the plurality of users. | 2021-11-25 |
20210367987 | Live Broadcast Network Using Musical Encoding to Deliver Solo, Group or Collaborative Performances - A broadcast network designed to deliver a unique musical experience for consumers by receiving and processing elemental musical events that accurately describe an artist's performance or composition but contain no information about the actual sound or light at the originating location, and broadcasting these events in the form of musical commands to a number of listeners, who each experience these performances through artificial sound and images generated at their own location. | 2021-11-25 |
20210367988 | DEVICE AND METHOD FOR TRANSMITTING OR RECEIVING MEDIA RESOURCE IDENTIFICATION INFORMATION IN COMMUNICATION SYSTEM - The present invention relates to a device and method for transmitting or receiving media resource identification (MRI) information for managing traffic of a service in a communication system. A method for transmitting information associated with content provision in a communication system according to an embodiment of the present invention comprises the steps of: acquiring content configuration information and transmission scheme information for a content; generating media resource identification information including scheduling information and the transmission scheme information according to each content type on the basis of the content configuration information and the transmission scheme information; and transmitting the media resource identification information. | 2021-11-25 |
20210367989 | ANCHORS FOR LIVE STREAMS - An application on a viewer client device receives a user input to access a live stream, sends a request to access the live stream, presents information allowing a user to indicate a first anchor of a plurality of anchors of the live stream, the first anchor corresponding to a timestamp for starting a portion of the live stream, receives the live stream and data indicating the timestamp corresponding to the first anchor of the live stream, and displays the live stream beginning at the timestamp corresponding to the first anchor of the live stream. | 2021-11-25 |
20210367990 | Media Downlink Transmission Control Method and Related Device - A media downlink transmission control method and a related device, the method including receiving a remote media reception message sent by an authorized terminal, where the remote media reception message includes a target user identifier, determining a first target media stream based on the remote media reception message, and sending the first target media stream to a destination terminal corresponding to the target user identifier. | 2021-11-25 |
20210367991 | SYSTEM AND METHOD FOR SENDING AND RENDERING AN IMAGE BY A DEVICE BASED ON RECEIVER'S CONTEXT - A system and method for sending an image to a user device based on the context of a user of the device are provided. An image to be sent to a user device may be obtained. The context of the user may be determined. The image may be analyzed to detect and prioritize objects in the image based on the context of the user. The image may be encoded such that objects are rendered on the user device in an order based on the prioritization. The encoded image may be sent to the user device. | 2021-11-25 |
20210367992 | CACHING MEDIA IN A MEDIA FLING SYSTEM - Aspects of the disclosure relate to a content (e.g., media) transfer or fling platform system and method. In a media fling platform system, media items may be cached at a rendering device prior to any selection of media items to fling. The determination of which media to cache may be based on a variety of factors including a user fling history, a currently viewed media item, and a navigation point in the media files. A fling request may take priority over caching, and the fling request may interrupt any caching processes. | 2021-11-25 |
20210367993 | METHODS AND DEVICES FOR EFFICIENT ADAPTIVE BITRATE STREAMING - Methods and systems for a content server to select sets of video streams having different encoding parameters for transmitting the sets of video streams to a media device are disclosed herein. In some embodiments, a method for transmitting video streams for a media program from a server to a media device includes: selecting, by the server, first encoding parameters including a first bitrate for a first set of video streams for the media program based on a first estimated bandwidth capacity for a network linking the server and the media device, transmitting the first set of video streams from the server to the media device, determining, by the server, second encoding parameters including a second bitrate for a second set of video streams for the media program, and transmitting the second set of video streams from the server to the media device. | 2021-11-25 |
20210367994 | JOINING AND DIMENSIONAL ANNOTATION IN A STREAMING PIPELINE - Disclosed are embodiments for providing batch performance using a stream processor. In one embodiment, a method is disclosed comprising receiving, at a stream processor, an event, the stream processor including a plurality of processing stages; generating, by the stream processor, an augmented event based on the event, the augmented event including at least one additional field not appearing in the event, the additional field generated by an operation selected from the group consisting of a join or dimensional annotation operation; and emitting, by the stream processor, the augmented event to downstream consumer. | 2021-11-25 |
20210367995 | METHODS, SYSTEMS AND MEDIA FOR ASSOCIATING MULTIPLE USERS WITH A MEDIA PRESENTATION DEVICE - Methods, systems, and media for associating multiple users with a media presentation device are provided. In some embodiments, the method comprises: receiving first user preferences; receiving second user preferences; receiving requests to associate the first user preferences and the second user preferences, respectively, with a media presentation device; causing the first user preferences and the second user preferences to be associated with identifying information of the media presentation device; receiving, from the media presentation device, a request to present a slideshow of images based on user preferences and identifying information of the first user device and a third user device; determining that the first user preferences are associated with the media presentation device; determining that user preferences of the third user device are not associated with the media presentation device; and causing content based on the first user preferences to be presented by the media presentation device. | 2021-11-25 |
20210367996 | Loading a Web Page in a Telecommunication Network Using an Access Point Server - An internet protocol (IP) access point sends, to a requesting device, a modified version of a first web page comprising first modifications made in accordance with policy handling information, and receives, from the requesting device, a request for a second web page. Responsive to detecting that the request for the second web page comprises one or more of the first modifications, the IP access point sends a modified version of the second web page comprising second modifications made in accordance with the policy handling information to the requesting device. | 2021-11-25 |
20210367997 | PROVIDING CONTENT TO CO-LOCATED DEVICES WITH ENHANCED PRESENTATION CHARACTERISTICS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A user of an initiating device is identified. Profile information for the identified user is located. The initiating device includes a display for presenting content to the user. An indication is received from an application running on the initiating device of an intent by the user to receive a first content item on a separate but co-located presentation device having enhanced presentation characteristics for presenting content. Additional content items are selected for delivery along with the first content item. The selection includes identifying a second different content item based on the profile information for the identified user and the enhanced presentation characteristics. The first and second different content items are delivered directly to the co-located presentation device without delivering the first and second different content items to the initiating device. | 2021-11-25 |
20210367998 | SYSTEMS AND/OR METHODS FOR DYNAMICALLY CONFIGURING AND EVALUATING RULES WITH DYNAMIC AND/OR USER INPUTS AT RUNTIME - Certain example embodiments relate to web applications. In certain example embodiments, an instance of a web application is executed using a client device. In response to the instance being started up, metadata is retrieved using a service embedded in the application and invoked at a bootstrap hook. The metadata is associated with earmarked programmatic elements in the application. At the client device and using an evaluation service injected into operation of the instance, one or more configured rules are evaluated against input. The rules are definable in relation to the earmarked programmatic elements using the retrieved metadata. They specify behavior of the web application and are dynamically (re)configurable while the instance of the web application is running. The (re)configured rules are dynamically effective without requiring web application redeployment, even if (re)configured while the instance of the web application is running. The instance is controllable responsive to the evaluation. | 2021-11-25 |
20210367999 | ANALYTE DATA RETRIEVER - Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include receiving, at a first processing system including a user interface, an installation package including a plug-in and code configured to provide at the first processing system an interface between a sensor system configured to measure an analyte concentration level in a host and a second processing system; storing, by the first processing system, the installation package in a location based on a role of a user initiating the installation of the code; installing the plug-in for the user interface to enable the plug-in to control one or more aspects of an installation of the code; and initiating, by at least the plug-in, the installation of the code at the first processing system to provide the interface. Related systems, methods, and articles of manufacture are also disclosed. | 2021-11-25 |
20210368000 | REMOTE SUPPORT DEVICE - A portable remote support device comprises a processing unit, a network communication unit configured to communicate with a cloud service, a video capturing unit, at least one video input port and at least one output port. The processing unit is configured to communicate video signals received via the video input port to the cloud service via the network communication unit, and to emulate pointing device signals and/or keyboard signals received via the network communication unit on said at least one output port. The portable remote support device is configured to obtain unique secure tokens. | 2021-11-25 |
20210368001 | SYSTEM AND METHOD FOR CROSS PLATFORM DOCUMENT SHARING - This invention discloses a novel system and method for automatically managing the movement of document files from a first document storage sub-system to a second document storage sub-system, tracking such movement and applying security policies before the movement is completed. | 2021-11-25 |
20210368002 | INTELLIGENT ROUTING OF MEDIA ITEMS - In certain embodiments, automated routing of media items between user devices may be facilitated. In some embodiments, a routing computer system may automatically obtain images or videos from one or more sources. The routing computer system may perform object recognition on the contents of the images or videos to identify individuals or other objects in the images or videos. The routing computer system may assign first and second images or videos of the images or videos to a first media item group based on (i) the first and second images or videos having similar metadata and (ii) the object recognition identifying an individual or object in the first image or video and an individual or object in the second image or video that are similar to each other. The routing computer system may automatically transmit the first image or video to one or more user devices based on the assignment. | 2021-11-25 |
20210368003 | Data Capture on a Serial Device - A system and a method are provided for enabling a user to connect a serial port of a device server to a serial device, query and capture data and settings pertaining to the serial device such that the device server can communicate and exchange data with the serial device without requiring customized programming. The device server may periodically query and capture user-specified data from the serial device. A poll configuration feature may be used to specify one or more commands which the device server will periodically query from the serial device. The response to each poll may be further sliced into a multiplicity of smaller portions according to user-specified filter rules. The captured data may be presented to other users online by way of a Web Manager, and the device server may establish machine-to-machine communications by way of XML and a Command Line Interface. | 2021-11-25 |
20210368004 | OPTIMIZED INTERNET ACCESS IN A MULTI-SITE SOFTWARE-DEFINED NETWORK FABRIC - Presented herein are techniques to provide an endpoint in a multi-site Software-defined network (SDN) fabric with an Internet access route that is optimal for the specific site in which the endpoint is located. In particular, a control plane node in a first site of a multi-site SDN fabric registers a border node in the first site as a Default Egress Tunnel Router (ETR) for Internet access or unknown endpoint identifier (EID) of the first site. The first site includes at least one endpoint. The control plane node receives a request for Internet access for the at least one endpoint and provides a dynamically-selected Internet access route via a same or different virtual instance (e.g., Virtual Routing and Forwarding (VRF) function(s), Virtual Private Network(s) (VPNs), Virtual Networks (VNs), etc.) for Internet traffic sent by the at least one endpoint. | 2021-11-25 |
20210368005 | GROUP-BASED COMMUNICATION APPARATUS CONFIGURED TO IMPLEMENT OPERATIONAL SEQUENCE SETS AND RENDER WORKFLOW INTERFACE OBJECTS WITHIN A GROUP-BASED COMMUNICATION SYSTEM - Various embodiments of the present invention are directed to an improved group-based communication apparatus that is configured to render one or more workflow interface objects to a group-based communication apparatus in association with an operational sequence set returned by a query. The group-based communication apparatus is configured to detect a workflow trigger event associated with a workflow identifier, retrieve an operational sequence set based upon at least the workflow identifier from a group-based communication workflow repository, initiate the operational sequence set, and cause rendering of one or more workflow interface objects to the group-based communication interface. In some embodiments, the operational sequence sets are associated with a group-defined template. | 2021-11-25 |
20210368007 | EQUIPMENT, DATA TRANSMISSION METHOD AND PROGRAM - A device includes a memory; and a processor configured to execute first determining, for each data item generated in the device, a priority upon transmitting said each data item to an information processing apparatus, based on one or more rules set in advance; second determining, for said each data item, whether or not it is necessary to transmit said each data item to the information processing apparatus, based on the priority determined for said each data item; and transmitting a data item to the information processing apparatus among data items generated in the device for a predetermined period of time, the data item being determined by the second determining that it is necessary to transmit the data item to the information processing apparatus. | 2021-11-25 |
20210368008 | NETWORK RESOURCE ACCESS - Examples associated with network resource access are described. One example method includes initiating a set of parallel connection requests to a network resource. The connection requests are generated using data retrieved from respective members of a set of resource identifiers. The resource identifiers specify connection information for accessing the network resource. A connection to the network resource is established based on a first responding member of the set of connection requests. Connection requests not associated with the first responding member of the set of connection requests are terminated. The network resource is accessed using the connection established based on the first responding member of the set of connection requests. | 2021-11-25 |
20210368009 | SYSTEMS AND METHODS TO RETAIN EXISTING CONNECTIONS SO THAT THERE IS NO CONNECTION LOSS WHEN NODES ARE ADDED TO A CLUSTER FOR CAPACITY OR WHEN A NODE IS TAKEN OUT FROM THE CLUSTER FOR MAINTENANCE - Described embodiments provide systems and methods for pushing session information to a newly joined node in a cluster of nodes. In the cluster, each node may maintain a session table of existing sessions. One or more nodes may detect a new node has joined the cluster. Each node, responsive to the detection, may apply a hash function on a tuple of each session of the existing sessions in the session table of the node to determine whether one or more existing sessions are identified to be owned by the new node as a result of the hash function. Each node, responsive to identifying that one or more sessions are to be owned by the new node, may push corresponding session information to the new node. The new node may become configured to receive a packet corresponding to the one or more sessions and to process the packet. | 2021-11-25 |
20210368010 | COMPUTER IMPLEMENTED METHOD AND A COMPUTER SYSTEM FOR NAMING A VENUE - A computer implemented method ( | 2021-11-25 |
20210368011 | SYSTEMS AND METHODS FOR PROVIDING LOCATION-BASED CASCADING DISPLAYS - Systems and methods for facilitating user interaction such as within a social network are described. In one implementation, location-based display of images and/or other information associated with other users or entities may be provided. The information may be provided in association with mapping or other positional data or information such as personal interests. | 2021-11-25 |
20210368012 | SYSTEM AND METHOD FOR TOKEN DOMAIN CONTROL - A method for providing a token code in conjunction with a value token is disclosed. The token code serves as a shared secret for authenticating the use of the value token. Multiple token holders can possess the same value token, but each token holder may have a different token code for use with the value token. | 2021-11-25 |
20210368013 | METHODS AND SYSTEMS FOR PROVISIONING A USER PROFILE ON A MEDIA PROCESSOR - Aspects of the subject disclosure may include, for example, detecting a plurality of mobile devices in proximity to a device. Further embodiments can include identifying a user identifier associated with each of the plurality of mobile devices resulting in a plurality of user identifiers. Additional embodiments can include obtaining a user profile associated with each of the plurality of user identifiers resulting in a plurality of user profiles. Also, embodiments can include identifying a first user profile having a first priority among the plurality of user profiles. Further embodiments can include provisioning the first user profile on a media processor or set top box and providing media content for presentation on a display according to the first user profile. Other embodiments are disclosed. | 2021-11-25 |
20210368014 | SYSTEMS AND METHODS FOR CONTENT AUDIENCE ANALYSIS VIA ENCODED LINKS - The present disclosure is directed to systems and methods for analyzing content audience by generating respective encoded links for content publishers, determining, for each content publisher, statistics related to user interactions with encoded links, and providing user-specific or aggregate information based on the statistics. The server of a content audience analysis system receives multiple interactions with encoded links generated by the content audience analysis system and linked to resources of a first content publisher. The server may identify from the multiple interactions, multiple cookies assigned to unique client devices. The server may identify second content publishers having resources that were accessed by the client devices corresponding to the multiple cookies via encoded links generated by the server. The server may provide to the first content publisher, data corresponding to the second content publishers having resources accessed by client devices that also accessed the resources of the first content publisher. | 2021-11-25 |
20210368015 | Machine Learning for Personalized, User-Based Next Active Time Prediction - Techniques performed by a data processing system for predicting availability of a user include receiving, from a first computing device over a network connection, a first request for predicted availability of a first user to participate in an online communication session, wherein the first request includes an identifier associated with the first user and a time period for the predicted availability of the user, in response to receiving the first request, determining a first predicted availability of the first user over the predicted time period using a first machine learning model trained with user information from a plurality of data sources, the user information being indicative of when the user is likely to be available to participate in the online communication session, and sending, to the first computing device over the network connection, availability information including the first predicted availability of the first user. | 2021-11-25 |
20210368016 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND STORAGE MEDIUM - In a state where a communication session between a terminal device and a mediating unit is established, an information processing device transmits information in accordance with a processing request generated by the mediating unit based on input data of the terminal device so that an output based on the transmitted information is performed in the terminal device. The information processing device receives the processing request from the mediating unit, obtains guide information in accordance with the processing request, and intermittently and sequentially transmits a plurality of pieces of process information and, in a case where the communication session is disconnected before transmission of all the process information is completed, transmits information for executing an output in accordance with a transmission situation of process information when the communication session is disconnected to the terminal device. | 2021-11-25 |
20210368017 | METHOD AND SYSTEM OF PUSHING VIDEO VIEWFINDER - The present disclosure describes techniques of pushing information associated with the at least one location that is associated with a video. The disclosed techniques comprises obtaining video data, wherein the video data comprise a plurality frames of a video and information associated with the video; determining at least one location associated with at least one frame among the plurality of frames of the video based on comparing the video data with data included in a database; determining information associated with the at least one location; and pushing the information associated with the at least one location to a first computing device based on a time to point of playing the at least one frame among the plurality of frames of the video | 2021-11-25 |
20210368018 | PROXY COMMUNICATION SYSTEM THAT TRANSLATES CONTACT IDENTIFIERS - A proxy communication system translates contact identifiers. The proxy communication system maps one or more client device contact identifiers to one or more proxy contact identifiers from a pool of proxy contact identifiers. The proxy communication system may facilitate communication on behalf of the client device using the proxy contact identifier. The proxy communication system may also communicate with the client device on behalf of the target device using the client device contact identifier. In some implementations, the mapping may be state dependent, such as different mappings based on a target device contact identifier, recent communications between the client device and the target device, and so on. | 2021-11-25 |
20210368019 | TRANSMISSION DEVICE, TRANSMISSION METHOD, RECEPTION DEVICE, AND A RECEPTION METHOD - It is possible to enable a reception side to easily recognize that metadata is inserted into an audio stream. A metafile including meta information for acquiring an audio stream into which metadata is inserted through a reception device is transmitted. The identification information indicating that the metadata is inserted into the audio stream is inserted into the metafile. At the reception side, it is possible to easily recognize that the metadata is inserted into the audio stream based on the identification information inserted into the metafile. | 2021-11-25 |
20210368020 | SYSTEM AND METHOD FOR PROCESSING SUBSCRIPTION RELATED DATA - The present invention provides a system and method for processing subscription related data, wherein a subscription document of an existing subscription is received by a server via a user device. The subscription document is processed to extract pre-determined parameters; and primary parameters are obtained from service provider servers and secondary parameters are obtained from third party servers. The pre-determined parameters are correlated with the primary parameters and the secondary parameters and a customized output is generated. The customized output may be a comparative analysis of particulars of the existing subscription and new subscriptions. | 2021-11-25 |
20210368021 | GENERATING PHYSICAL PRODUCT CUSTOMIZATION PARAMETERS BASED ON ANALYSIS OF INPUT MEDIA - An enhanced product recommendation service observes a user engaging in an activity to automatically recommend products that facilitate performance of the activity. Photographs and/or video of the user performing the activity may be analyzed to identify an output that results from the activity and/or an activity task sequence that includes multiple tasks associated with completing the activity. Then, the enhanced product recommendation service may identify a product that is usable to generate the output(s) of the activity and/or complete the activity without performing one or more individual tasks of the activity task sequence. The product may be an existing product. Alternatively, the product may be a customized product that is designed based on observing the user engage in the activity. Physical measurements of the customized product may be determined based on various measurements determined by analyzing the photographs and/or video of the user performing the activity. | 2021-11-25 |
20210368022 | SERVER, METHOD OF CONTROLLING SERVER, AND PROGRAM - Provided is a system that includes circuitry that transmits first image data to a second communication terminal in response to a first request for image transmission from a first communication terminal; transmits second image data to the first communication terminal in response to a second request for image transmission from the second communication terminal; and transmits, in a case that the first request for image transmission and the second request for image transmission are a predetermined combination, third image data corresponding to the predetermined combination to the first communication terminal and the second communication terminal. | 2021-11-25 |
20210368023 | SCENARIO PROFILE BASED PARTITIONING AND MANAGEMENT OF APPLICATION CODE - Method, systems and apparatuses may provide for technology that divides an application into a plurality of portions that are each associated with one or more functions of the application and determine a plurality of transition probabilities between the plurality of portions. Some technology may also receive at least a first portion of the plurality of portions, and receive a relation file indicating the plurality of transition probabilities between the plurality of portions. | 2021-11-25 |
20210368024 | CLOUD DRIVEN APPLICATION LAUNCHER FOR EXECUTION AND CONTROL OF APPLICATIONS IN COMPUTING DEVICES - Conventionally, application launchers have limited their functionality to provide shortcut ways for searching/executing pre-configured applications and fail to provide a uniform user experience and usability across computing systems and applications installed therein. Currently, applications in such computing systems are manual controlled, which is time consuming and thus lack in security during accessing content. Present disclosure provides a cloud driven application launcher (CDAL) that is installed in client device. Once the computing device is configured with latest configurations, the client device serves as a master device wherein the master device creates, in an offline mode, an ad hoc network wherein other client devices connect to master device for upgrading version of applications comprised in client devices to a corresponding version of applications in master device. The master device and client devices are synchronized by the CDAL and a uniform user interface (UI) is enabled for the master device and client devices. | 2021-11-25 |
20210368025 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2021-11-25 |
20210368026 | DATA TRANSMISSION DEVICE, PROGRAM, AND SYSTEM - The data transmission device ( | 2021-11-25 |
20210368027 | SIGNALING FOR RELAYING PRIOR TO DECODING - Certain aspects of the present disclosure provide techniques for signaling that relayed packets include information generated prior to decoding (e.g., pre-decoded samples, such as log-likelihood ratios (LLRs)). A method that may be performed by a first wireless node (e.g., a relay node such as a repeater user equipment (UE), a network entity such as an access point (AP), base station (BS) or next generation NodeB (gNB), or another node) includes determining at least one first packet to be transmitted to a second node includes pre-decoded first information about a second packet and providing an indication to the second node that the first packet includes pre-decoded first information. | 2021-11-25 |
20210368028 | PROCESSING DATA IN A NETWORK - A method of processing data in a network is disclosed. The method comprises transmitting, from a first server to a second server, first information characterising a first predefined format according to which first data is stored at a first data store; obtaining, at the second server, mapping information characterising a mapping of the first predefined format onto a second predefined format different to the first predefined format; generating, at the second server, based on the first information and the mapping information, second information for converting data in the first predefined format into data in the second predefined format; transmitting, from the second server to the first server, the second information; and parsing, at the first server, using the second information, the first data stored at the first data store, to generate data in the second predefined format. Apparatuses are also disclosed. | 2021-11-25 |
20210368029 | PATH CONTROL BY END HOSTS IN NETWORKS - One embodiment described herein provides a system and method for path control in a network. During operation, in response to determining that a path-control condition is met, an end host in the network can determine an offset value to be applied to a packet header of a packet, modify the packet header by applying the determined offset value, and forward the packet based on the modified packet header. | 2021-11-25 |
20210368030 | COMPACT TIMESTAMP, ENCODERS AND DECODERS THAT IMPLEMENT THE SAME, AND RELATED DEVICES, SYSTEMS AND METHODS - Compact timestamps and related methods, systems and devices are described. An encoder is configured to generate compact timestamps of the disclosure by sampling states of linear feedback shift registers (LFSRs). A decoder may be configured to determine timing information responsive to the compact timestamps. | 2021-11-25 |
20210368031 | EVENT GENERATION IN RESPONSE TO NETWORK INTENT FORMAL EQUIVALENCE FAILURES - Systems, methods, and computer-readable media for receiving an indication of an equivalence failure, the equivalence failure corresponding to one or more models of network intents. The indication of the equivalence failure is analyzed and one or more constituent intents that caused the equivalence failure are identified, wherein the one or more constituent intents are associated with a model of the one or more models of network intents. The granularity of the equivalence failure and the identified one or more constituent intents is determined, and an event for external consumption is generated, the event based at least in part on the equivalence failure, the granularity of the equivalence failure, and the identified one or more constituent intents. | 2021-11-25 |
20210368032 | ROTATING SHAFT MECHANISM AND MOBILE TERMINAL - In a rotating shaft mechanism and a foldable mobile terminal, connecting rods and swing arms are rotatably connected to a main shaft assembly, and the swing arms and the connecting rods rotate around different axes, so that the swing arms and the connecting rods rotate and slide relative to each other. During folding, the connecting rods or the swing arms drive the two support plates to rotate towards each other, the support plates and the main shaft assembly enclose folding space for accommodating a flexible display of the mobile terminal in a folded state, so that the bending effect of the flexible display is improved, and two housings of the mobile terminal fit almost seamlessly in the folded state. | 2021-11-25 |
20210368033 | ELECTRONIC DEVICE WITH METAL FRAME ANTENNA - An electronic device is provided. The electronic device includes a housing and a connection part. The housing includes a first housing portion that includes a first side face, and a second housing portion that includes a second side face. The connection part connects the first housing portion and the second housing portion. A first conductive member extends along at least a portion of the first side face, a first non-conductive member is disposed on the first side face, a second conductive member extends along at least a portion of the second side face, a second non-conductive member is disposed on the second side face, and when the second housing portion faces the first housing portion, the first non-conductive member and the second non-conductive member are substantially aligned. | 2021-11-25 |
20210368034 | Display Apparatus and Operating Method Thereof - Embodiments of the present disclosure provides a display apparatus and an operating method of the display apparatus. The display apparatus includes an apparatus body, a first display screen and a device module, the first display screen and the device module are arranged on the apparatus body, the device module includes a second display screen and a functional device, the functional device is positioned in a non-light-exiting direction of the second display screen, the first display screen and the device module are rotatable relatively, so that the first display screen and the second display screen are positioned on an identical side of the display apparatus. | 2021-11-25 |
20210368035 | DISPLAY SYSTEM WITH A FLEXIBLE DISPLAY - A display system includes a continuous flexible display, two book halves, two main display supports, and a movement synchronizing coupling. The two book halves is connected to each other via a hinge mechanism. The hinge mechanism has two hinges, and each hinge is rotatable about respective axis. Each of the two main display supports connects to one of the two book halves and is configured to support the flexible display. The coupling is connected to the two main display supports and rotating about a rotation axis that is parallel to the axis of hinge to enable a synchronized movement of the two main display supports. | 2021-11-25 |
20210368036 | COMPUTING SYSTEM THAT GENERATES A PREDICTED ROUTINE OF A USER - Described herein are technologies related to generating a predicted routine of a user of a mobile computing device. Location entries generated by the mobile computing device are processed to generate visit entries, wherein the visit entries are representative of visits made by the user to places over several days. An input sequence of states is constructed based upon the visit entries, wherein each state has a place identifier assigned thereto, and further wherein each state corresponds to a time interval of predefined length. A predicted routine of the user is generated based upon the input sequence of states. | 2021-11-25 |
20210368037 | METHOD AND DEVICE FOR ACTIVATING OPERATING SYSTEM OF MOBILE TERMINAL - A method and a device for activating an operating system of a mobile terminal. The method includes steps of: activating, when a gravity sensor provided on a first display screen of the mobile terminal is in a first state, a first operating system of the mobile terminal corresponding to a first display screen to illuminate the first display screen; activating, when the gravity sensor is in a second state, a second operating system of the mobile terminal corresponding to a second display screen to illuminate the second display screen. | 2021-11-25 |
20210368038 | MOBILE COMPUTING INTERVENING SYSTEM - A mobile computing intervening system is described. The system may include a primary user computing device running a user application and at least one group user computing device running a user application and coupled to the primary user computing device. The system may operate to establish a geofence and automatically generate a signal to deactivate user computing devices, such as smartphones, within the geofence. This may be done for a certain period of time or until the primary user computing device ends the operation of the system. Families at dinner, students in class, employees in a workplace, and/or other social gatherings/environments may use this application to promote distraction free family time, class time, employment time, etc. by being unplugged from mobile computing devices. | 2021-11-25 |
20210368039 | CUSTOMIZING TEXT MESSAGES IN MODIFIABLE VIDEOS OF MULTIMEDIA MESSAGING APPLICATION - A system for customizing text messages in modifiable videos of a multimedia messaging application (MMA) is provided. In one example embodiment, the system includes a processor and a memory storing processor-executable codes, wherein the processor is configured to analyze recent messages of a user in the MMA to determine a context of the recent messages; determine, based on the context, a customized text message; select, based on the context, a list of relevant modifiable videos from a database configured to store modifiable videos, the modifiable videos being associated with preset text messages; replace the preset text messages in the relevant modifiable videos with the customized message; and render the list of relevant modifiable videos for viewing and selecting by the user, the rendering including displaying the customized text message in the relevant modifiable videos. | 2021-11-25 |
20210368040 | CALL SET UP FAILURE RATE METRIC AND COMMUNICATION NETWORK OPTIMIZATION BASED THEREON - A computer-implemented method includes generating at least one call detail record for each call initiated on a communication network, aggregating the call detail records generated over a predetermined time period to provide an aggregated call detail record, and calculating a call set up failure rate for the calls from the aggregated call detail record, wherein the call set up failure rate is a measure of the amount of calls that failed prior to ringing at a called party's device. The computer-implemented method further includes adjusting parameters of the communication network when the call set up failure rate is above a threshold. | 2021-11-25 |
20210368041 | SYSTEMS AND METHODS FOR AUTHENTICATION AND FRAUD DETECTION - Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud. | 2021-11-25 |
20210368042 | HANDLING CALLS ON A SHARED SPEECH-ENABLED DEVICE - In some implementations, an utterance that requests a voice call is received, the utterance is classified as spoken by a particular known user, the particular known user is determined to be associated with a personal voice number, and in response to determining that the particular known user is associated with a personal voice number, the voice call is initiated with the personal voice number. | 2021-11-25 |
20210368043 | MANAGING SPOOFED CALLS TO MOBILE DEVICES - Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network. | 2021-11-25 |
20210368044 | Originating Group Text Calls in a Contact Center - A dialing list comprising call records can be processed by a call handling component(s) in a contact center in various dialing modes. A call record may be processed to originate a voice call, where the agent manually dials the call as a voice telephone call. In another embodiment, one or more call records can be processed to originate a SMS text call or group text call, where the agent also determines when the call(s) originates. The agent is presented with a graphical user interface tailored to the dialing mode. The dialing mode used may be defined by the dialing list the call record is retrieved from, information from within the call record itself, application of a rule, or input from the agent. The dialing mode may be altered under certain conditions. When the call is originated, various compliance oriented tests, including calling windows and call attempts, are performed. | 2021-11-25 |
20210368045 | ACCELERATING PRE-PRODUCTION FEATURE USAGE - Traditionally, when a feature is updated or a new feature is released, the feature undergoes internal testing and validation before external distribution. However, some features may receive proportionately less internal usage than customer usage reflected externally. Low internal usage of features can lead to weak telemetry data, which can allow code regressions (e.g., bugs) to go undetected until the features are released to customers. Accordingly, accelerated internal feature usage is provided to mirror external customer usage. Highly used features are dynamically identified and, any deficiencies in internal feature usage are identified. Tenant sites estimated to generate at least a portion of the deficiency in feature usage are identified. These sites may be migrated or replicated to internal validation rings to generate additional internal feature usage. By increasing internal testing and validation, the stability and reliability of feature releases are increased, thereby improving customer experience and satisfaction with the software product. | 2021-11-25 |
20210368046 | SHARED CALL STATE FOR RELATED CALLS - Techniques for determining a global state for multiple related calls are disclosed. A first call between a first device and a second device is established, where the first call is assigned a user call identifier. A second call between the first device and a third device is established. A shared call operation is established by assigning the user call identifier to the second call. The user call identifier is assigned to the second call in addition to already being assigned to the first call. A first status of the first call and a second status of the second call are determined. The first status and the second status are used to determine a global state of the shared call operation. The global state of the shared call operation is updated in response to one or both of the first status or the second status changing. | 2021-11-25 |
20210368047 | SERVER, PRINTER, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIA STORING COMPUTER READABLE INSTRUCTIONS FOR SERVER AND PRINTER - A server may receive remaining amount information related to a remaining amount of color material in a first color material cartridge from a printer on which the first color material cartridge is mounted, and send specific information to an external device in a case where the remaining amount of the color material in the first color material cartridge indicated by the remaining amount information is equal to or less than a first remaining amount threshold. The specific information is for changing a state of the printer from a state in which the printing process by using a second color material cartridge to be mounted is restricted to a state in which the printing process by using the second color material cartridge is permitted. | 2021-11-25 |
20210368048 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - In an information processing system including an information processing server and a multifunction machine, the information processing server transmits print instruction information instructing printing of teaching material content and an answerer ID to the multifunction machine. Upon receiving the print instruction information, the multifunction machine generates teaching material content printed material, reads a print surface of answered teaching material content printed material, and transmits read data corresponding to a read image. The information processing server acquires the answerer ID from the received read data and performs processing for providing the read image for a terminal device of a person concerned having a predetermined relationship with an answerer having the acquired answerer ID. | 2021-11-25 |
20210368049 | SYSTEM, CONTROL METHOD OF SYSTEM, TERMINAL DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - It is to provide technology for enabling printing based on password-protected print data held at the image forming device to be performed in simple method from an external terminal. The terminal device transmits a print instruction including user information of a user of the terminal device to the image forming device in a case where near field communication with the image forming device is established. The image forming device identifies print data corresponding to the user information included in the print instruction from among a plurality of held print data and controls printing based on the identified print data on the basis of a password for printing. | 2021-11-25 |
20210368050 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM - An image processing apparatus including: a determination unit configured to determine a similar form similar to scanned image for each of a plurality of scanned images; and a display control unit configured to perform control such that a list of the plurality of scanned images is displayed on a display unit, wherein scanned images of which the determined similar form are same are displayed together in the list. | 2021-11-25 |
20210368051 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus, a information processing method and a non-transitory computer readable medium are provided. The information processing apparatus includes a processor that acquires data by an image capturing unit, wherein an image of an operation target and an image of an authentication object are obtained from the data, displays the image of the operation target and the image of the authentication object simultaneously in different display areas based on the data, and performs a display according to a result of authentication based on a combination of the operation target and the authentication object. | 2021-11-25 |
20210368052 | IMAGE READING APPARATUS AND IMAGE FORMING SYSTEM - An image reading apparatus includes a first conveyance roller, a second conveyance roller, a first conveyance guide, a second conveyance guide configured to move between an opposed position being opposed to the first conveyance guide and a retracting position being retracted from the opposed position, and an image reading unit opposed to the first conveyance guide and configured to move to a width direction orthogonal to the sheet conveyance direction and read an image information on a sheet. The second conveyance guide is configured to move to the retracting position in response to the image reading unit moving to the width direction and reading an image information on the sheet. | 2021-11-25 |
20210368053 | IMAGE FORMING SYSTEM, IMAGE FORMING APPARATUS, AND INFORMATION PROCESSING APPARATUS - An image forming system includes: an image forming apparatus; and a recording material information detecting apparatus provided outside the image forming apparatus, wherein the recording material information detecting apparatus includes a recording material information detector that detects recording material information about a recording material, and the image forming apparatus includes: an image former; an operation detector; and a hardware processor. | 2021-11-25 |
20210368054 | IMAGE READING APPARATUS CAPABLE OF DETERMINING WHETHER MISSING PART OF DOCUMENT IMAGE OCCURS BASED ON EDGE SHAPE OF AT LEAST ONE OF LEADING AND TRAILING EDGES OF DOCUMENT IMAGE - An image reading apparatus includes an image reading device and a control device. The image reading device performs image reading of an original document to generate a read image. The control device includes a processor and functions, through the processor operating in accordance with a control program, as an edge shape detector and a missing part determiner. The edge shape detector uses as a target image the read image or an image obtained by subjecting the read image to predetermined image processing and detects an edge shape of at least one of a leading edge and a trailing edge of a document image corresponding to the original document in the target image. The missing part determiner determines, based on the detected edge shape, whether or not a missing part of the document image has occurred. | 2021-11-25 |