53rd week of 2020 patent applcation highlights part 80 |
Patent application number | Title | Published |
20200412741 | ACCESS MANAGEMENT SYSTEM WITH A PRE-COMMIT VERIFICATION ENGINE - Methods, systems, and computer storage media for providing resource policy management based on a pre-commit verification engine are provided. Pre-commit verification operations are executed to simulate committing a policy, in a distributed computing environment, for test request instances, without actually committing the policy. In operation, a policy author communicates a policy and one or more test request instances. Based on the policy and the test request instances, an access control manager simulates committing the policy for the test request instances to the computing environment. Simulating committing the policy for test request instances is based on an existing set of policies including a live version of the policy and contextual information corresponding to the policy and the test request instances for the computing environment in which the policy will be applied. Based on simulating committing the policy without committing the policy, policy verification results for the policy are generated and communicated. | 2020-12-31 |
20200412742 | Method for Restricting Memory Write Access in IoT Devices - Disclosed herein is a method of a communication device, wherein the communication device is configured to operate in connection with an access node associated with a wireless communication network. The method comprises receiving a first data packet comprising a write request for writing code and/or data to a non-volatile memory comprised in the communication device and determining whether a second data packet comprising an identifier associated with the first data packet is received. When it is determined that the second data packet comprising the identifier is received, the method comprises extracting the identifier from the second data packet, wherein the identifier is a radio access layer parameter, determining whether the identifier is trusted, determining whether the identifier is validated when it is determined that the identifier is trusted and accepting at least a subset of the write request when it is determined that the identifier is trusted and validated. Also disclosed is an arrangement of a communication device, method and arrangement of an access node and, a communication device, an access node and computer program product. | 2020-12-31 |
20200412743 | DETECTION OF AN ADVERSARIAL BACKDOOR ATTACK ON A TRAINED MODEL AT INFERENCE TIME - Systems, computer-implemented methods, and computer program products that can facilitate detection of an adversarial backdoor attack on a trained model at inference time are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a log component that records predictions and corresponding activation values generated by a trained model based on inference requests. The computer executable components can further comprise an analysis component that employs a model at an inference time to detect a backdoor trigger request based on the predictions and the corresponding activation values. In some embodiments, the log component records the predictions and the corresponding activation values from one or more layers of the trained model. | 2020-12-31 |
20200412744 | Malicious Advertisement Protection - There is disclosed in one example an advertisement reputation server, including: a hardware platform including a processor and a memory; a network interface; and an advertisement reputation engine including instructions encoded in memory to instruct the processor to: receive via the network interface a plurality of advertisement instances displayed on client devices; extract from the advertisement instances an advertiser identifier; analyze one or more advertisements associated with the advertiser identifier to assign an advertiser reputation; and publish via the network interface advertisement reputation information derived from the reputation for the advertisement identifier. | 2020-12-31 |
20200412745 | DETECTING MALICIOUS THREATS VIA AUTOSTART EXECUTION POINT ANALYSIS - The system collects startup commands associated with network-attached computing devices. A startup command is automatically executed by a device on which the startup command is stored upon startup of the device and is associated with a device identifier for the device. For each startup command, a corresponding command tag is determined for the startup command using a verb list. Using the device identifier associated with each startup command and the command tag determined for each startup command, a proportion of the plurality of devices is determined that are associated with each command tag. Based on the determined proportion of the plurality of devices that are associated with each command tag, a suspicious command tag is determined. A report is stored that includes the suspicious command tag, suspicious startup command(s) associated with the suspicious command tag, and the device identifier associated with each suspicious startup command. | 2020-12-31 |
20200412746 | SYSTEMS AND METHODS FOR INTERCEPTING MALICIOUS MESSAGES BASED ON APPLICATION PRIORITY - Disclosed herein are systems and method for intercepting malicious messages for training a malware detection classifier. In an exemplary aspect, an application selection module may select, from a plurality of applications, an application for execution in an execution environment based on a priority level of the application. During the execution of the selected application, a network interception module may monitor network activity comprising information about data being sent and received over a network connected to the execution environment and storing the network activity in memory of the execution environment (e.g., in a network activity log). A message selection module may subsequently extract, from the stored network activity, an electronic message, in response to determining that the electronic message corresponds to the selected application, may storing the electronic message in a message database used for training the malware detection classifier. | 2020-12-31 |
20200412747 | System and Method for Cyber Security Threat Detection - A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system includes one or more collector engines. Each of the collector engines includes a service and an agent operating on a corresponding system endpoint of the system endpoints. The service is configured to take a first snapshot of the corresponding system endpoint. The first snapshot includes event activity information associated with the system endpoint. The agent is configured to take a second snapshot of the corresponding system endpoint. The second snapshot includes behavioral activity information associated with the corresponding system endpoint. The system further includes an aggregator engine configured to aggregate the first snapshot and the second snapshot from each of the system endpoints into an aggregated snapshot. The system further includes one or more analytics engines configured to: generate and store baseline profiles associated with the system endpoints based on a previously received aggregated snapshot, receive the aggregated snapshot from the aggregator engine, determine deviation values for each of the system endpoints based on the received aggregated snapshot and the stored baseline profiles, and generate, for each of the system endpoints, a cumulative risk value based on the deviation values. The system further includes one or more alerting engines configured to determine whether to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the cumulative risk value. | 2020-12-31 |
20200412748 | ABNORMALITY CAUSE SPECIFICATION SUPPORT SYSTEM AND ABNORMALITY CAUSE SPECIFICATION SUPPORT METHOD - [Problem] An abnormality cause route in a network can be efficiently specified, and labor and a cost required for work can be reduced. | 2020-12-31 |
20200412749 | NETWORK PROBE AND METHOD OF PROCESSING MESSAGE - The invention relates to a method of processing messages in a Factory Automation, FA, architecture comprising a FA network comprising at least one device, and an external network, said method being implemented by a network probe and comprising: intercepting ( | 2020-12-31 |
20200412750 | METHOD AND SYSTEM FOR DETECTING AND MITIGATING HTTPS FLOOD ATTACKS - A method for detecting hypertext transfer protocol secure (HTTPS) flood denial-of-service (DDoS) attacks. The method estimating traffic telemetries of at least ingress traffic directed to a protected entity; providing at least one rate-base feature and at least one rate-invariant feature based on the estimated traffic telemetries, wherein the rate-base feature and the rate-invariant feature demonstrate a normal behavior of HTTPS traffic directed to the protected entity; evaluating the at least one rate-base feature and the at least one rate-invariant feature with respect to at least one baseline to determine whether the behavior of the at least HTTPS traffic indicates a potential HTTPS flood DDoS attack; and causing execution of a mitigation action when an indication of a potential HTTPS flood DDoS attack is determined. | 2020-12-31 |
20200412751 | SIEM SYSTEM AND METHODS FOR EXFILTRATING EVENT DATA - Embodiments provide for a security information and event management (SIEM) system utilizing distributed agents that can intelligently traverse a network to exfiltrate data in an efficient and secure manner. A plurality of agent devices can dynamically learn behavioral patterns and/or service capabilities of other agent devices in the networking environment, and select optimal routes for exfiltrating event data from within the network. The agent devices can independently, selectively, or collectively pre-process event data for purposes of detecting a suspect event from within the network. When a suspect event is detected, agent devices can select a target device based on the learned service capabilities and networking environment, and communicate the pre-processed event data to the target device. The pre-processed event data is thus traversed through the network along an optimal route until it is exfiltrated from the network and stored on a remote server device for storage and further analysis. | 2020-12-31 |
20200412752 | SYSTEMS AND METHODS FOR DETECTING CYBERSECURITY THREATS - A system for detecting anomalies is provided. The system includes a computer system including at least one processor in communication with at least one memory device. The computer system receives communications from a remote computer platform. The at least one processor is programmed to execute real-time a simulation model of the remote computer platform. The simulation model simulates inputs and outputs of the remote computer platform based on real-time data. The at least one processor is also programmed to receive one or more outbound communications transmitted from the remote computer platform, generate one or more outputs of the simulation model, compare the one or more outbound communications transmitted from the remote computer platform to the one or more outputs of the simulation model, detect one or more differences based on the comparison, and generate an output based on the one or more differences. | 2020-12-31 |
20200412753 | ABNORMALITY DETECTION DEVICE - Provided is an abnormality detection device that can detect an abnormality caused by transmission of invalid communication data quickly and with a reduced processing load. A relay includes a distribution buffer for receiving a message frame and a control unit that obtains a value related to a transmission interval for an irregular frame among the message frames received by the distribution buffer, determines that the message frame transmitted irregularly is abnormal when the obtained value related to the transmission interval is equal to or less than a predetermined threshold, and outputs the determination result that the message frame is abnormal. | 2020-12-31 |
20200412754 | SYSTEM AND METHOD FOR COMPREHENSIVE DATA LOSS PREVENTION AND COMPLIANCE MANAGEMENT - A system and method to identify and prevent cybersecurity attacks on modern, highly-interconnected networks, to identify attacks before data loss occurs, using a combination of human level, device level, system level, and organizational level monitoring. | 2020-12-31 |
20200412755 | NETWORK SECURITY - Various example embodiments relate generally to providing security for a communication network based on detection and mitigation of an attack in the communication network. Various example embodiments supporting attack detection and mitigation may be configured to support detection and mitigation of an attack in a communication network based on distributed collection of network traffic information at network elements and analysis of aggregated network traffic information at a network controller for determining whether a traffic anomaly indicative of an attack on the communication network is detected. Various example embodiments supporting attack detection and mitigation may be configured to support detection and mitigation of an attack in a communication network based on use of traffic records for supporting the collection, aggregation, and analysis of network traffic information. | 2020-12-31 |
20200412756 | COMMUNICATION CONTROL DEVICE, ANOMALY DETECTION ELECTRONIC CONTROL UNIT, MOBILITY NETWORK SYSTEM, COMMUNICATION CONTROL METHOD, ANOMALY DETECTION METHOD, AND RECORDING MEDIUM - A communication control device connects an engine ECU to a network and includes: a communicator that receives a message from the engine ECU and transmits the message to the network, and receives a message from the network and transmits the message to the engine ECU; a transmission ID list holder that holds a transmission ID list including a transmission ID included in the message from the engine ECU; and a controller that controls the communicator and the transmission ID list holder. When the transmission ID included in the message from the engine ECU is not in the transmission ID list, the controller adds the transmission ID to the transmission ID list and transmits information related to the transmission ID list to the network. | 2020-12-31 |
20200412757 | NETWORK SECURITY SYSTEM AND METHOD FOR PREEMPTIVELY IDENTIFYING OR REMEDIATING SECURITY VULNERABILITIES - A system, a method, and a computer program for analyzing network security data from diverse data sources to predict and remediate a vulnerability at a node in a computer network, comprising receiving network security data from a plurality of data sources, extracting feature vectors from the received network security data, applying a machine learning model to the extracted feature vectors to generate a weighted vulnerability value, predicting a computing resource vulnerability at a node in the computer network based on the weighted vulnerability value, and transmitting the predicted computing resource vulnerability to a computing device which is configured to remediate the predicted computing resource vulnerability. | 2020-12-31 |
20200412758 | COMPREHENSIVE RISK ASSESSMENT - Systems, methods, and related technologies for determining a comprehensive risk score or value are described. The risk score determination may include selecting an entity communicatively coupled to a network and determining a cyber-attack likelihood value and a cyber-attack impact value associated with the entity. A cyber-attack risk may then be determined based on the cyber-attack likelihood value and a cyber-attack impact value associated with the entity. An operational failure likelihood value and an operational failure impact value associated with the entity can be determined. An operational failure risk based on the operational failure likelihood value and the operational failure impact value associated with the entity can be determined. A risk value may then be determined for the entity based on the cyber-attack risk and the operational failure risk and the risk value for the entity can be stored. | 2020-12-31 |
20200412759 | CYBERSECURITY PENETRATION TEST PLATFORM - A method, system and non-transitory computer-readable medium used for testing a plurality of circuits to determine open surfaces are disclosed. The method includes: receiving one or more of attack techniques, and known open surfaces; carrying out attacks on a circuit to determine vulnerable surfaces of the circuit; determining when new open surfaces exist in the circuit; updating an attack plan based on the new open surfaces; carrying out the attack plan; generating a report of the open and vulnerable surfaces; and updating a repository to include new attack techniques against newly discovered open surfaces of the circuit. | 2020-12-31 |
20200412760 | REGION-BASED PRIORITIZATION FOR MITIGATING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS - The disclosed embodiments provide a system for mitigating a distributed denial-of-service (DDoS) attack. During operation, the system analyzes application layer in historical traffic to an online system to determine historical volumes of member traffic from a set of regions to the online system, wherein the member traffic is generated by members of the online system. Next, the system calculates allocations of query rates for the set of regions based on the historical volumes of member traffic from the set of regions. During a DDoS attack, the system outputs the allocations of the query rates for use in blocking different portions of the requests from different regions in the set of regions to the online system. | 2020-12-31 |
20200412761 | DYNAMIC RATE LIMITING FOR MITIGATING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS - The disclosed embodiments provide a system for mitigating a distributed denial-of-service (DDoS) attack. During operation, the system analyzes application layer data in historical traffic to an online system to determine a historical volume of member traffic from an Internet Protocol (IP) address to the online system, wherein the member traffic is generated by members of the online system. Next, the system calculates a rate limit for a set of requests from the IP address to the online system based on the historical volume of member traffic from the IP address. During a DDoS attack, the system outputs the rate limit for use in blocking a subset of the requests from the IP address to the online system. | 2020-12-31 |
20200412762 | PROTECTING USERS FROM PHISHING ATTEMPTS - Systems and methods for anti-phishing include determining that a user interface corresponding to a current web address has authentication input fields. A current hash value is generated based on a subset of a plurality of input characters that have been input into an authentication input field. The current hash value is compared to mapped hash values. If the current hash value matches one or more of the mapped hash values, a web address mapped to the matched, mapped hash value is identified. The mapped web address is compared to the current web address to determine whether they match. An alert is displayed in response to determining whether there is a match between the current web address and the mapped web address. | 2020-12-31 |
20200412763 | GRAPH-BASED POLICY REPRESENTATION SYSTEM FOR MANAGING NETWORK DEVICES - Systems and methods are provided for managing network devices using policy graph representations. In some embodiments, the method includes receiving configurations for a plurality of network devices; extracting one or more policies from the configurations; extracting a label hierarchy from the configurations, the label hierarchy describing an organization of nodes in a network comprising the network devices; generating a connectivity of a network comprising the network devices based on the one or more policies and the label hierarchy; generating a policy graph representation of the connectivity of the network; and displaying the policy graph representation of the connectivity to a user. | 2020-12-31 |
20200412764 | REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC) - Systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application are provided. According to one embodiment, a management service retrieves information regarding multiple network elements that are associated with an enterprise network and extracts parameters of the monitored network elements from the retrieved information. The management service prioritizes the monitored network elements by determining a severity level associated with security-related issues of the network elements and generates various monitoring views that summarize in real time various categories of potential security-related issues detected by the SOC. Further, the management service assigns a priority to each monitoring view and displays a video on the display device that cycles through monitoring views in accordance with their respective assigned priorities. | 2020-12-31 |
20200412765 | ACCESS MANAGEMENT SYSTEM WITH A MULTI-ENVIRONMENT POLICY - Methods, systems, and computer storage media for providing access to computing environments based on a multi-environment policy are provided. The a multi-environment policy is configurable to define rules that have provider-controlled and customer-controlled computing environment parameters for approving access to provider-controlled computing environments and customer-controlled computing environments. In operation, a request associated a computing environment are received. The computing environment is associated with a multi-environment policy. The multi-environment policy is configurable to define the rules based on access vectors having grouped computing environment aspects for control and visibility associated with accessing computing environments. Based on the request, a determination whether the request is for a provider-controlled or a customer-controlled computing environment is made. Based on the multi-environment policy, approval-request parameters of an approval-request are communicated to receive approval-request response values. And, based on receiving the approval-request response values, a request response indicating approval or denial of the request is communicated. | 2020-12-31 |
20200412766 | MANAGING CYBERSECURITY VULNERABILITIES USING BLOCKCHAIN NETWORKS - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for cybersecurity vulnerability management. One of the methods includes receiving a vulnerability report indicating a cybersecurity vulnerability by a blockchain network. The blockchain network provides access to the vulnerability report to an administration server. A vulnerability verification report indicating a verification of the cybersecurity vulnerability from the administration server is received by the blockchain network. The blockchain network stores information of the cybersecurity vulnerability into a vulnerability record that is stored on the blockchain network. The blockchain network provides access to the vulnerability record to a service provider, and receives a notification indicating a resolution to the cybersecurity vulnerability from the service provider. | 2020-12-31 |
20200412767 | HYBRID SYSTEM FOR THE PROTECTION AND SECURE DATA TRANSPORTATION OF CONVERGENT OPERATIONAL TECHNOLOGY AND INFORMATIONAL TECHNOLOGY NETWORKS - A system and method for monitoring, protecting, and transporting data on convergent networks of information (IT) and operational technologies (OT). The system and method provide a complete hybrid on-premise/cloud-based cybersecurity solution that includes analyst tools, host and network visibility, data provenance, and threat adaptation and mitigation while simultaneously providing an optional upstreaming pseudonymized feed of data for additional insight and optimization. The system and method comprise monitoring tools providing information regarding cybersecurity, asset information, and network topology which may further be used to identify, report, and adapt to malicious actors and actions within an organization's network. Furthermore, the system and method may comprise cyber physical graphs and other transformative metadata visualizations delivering contextual and visual information to quantifiably enhance machine and human operations and decisions. | 2020-12-31 |
20200412768 | PRE-SIGNED URLS WITH CUSTOM POLICIES FOR DATA ACCESS IN AN OBJECT STORAGE SYSTEM - A method for execution by an access layer of an object storage system includes In various embodiments, a processing system of an access layer of an object storage system includes at least one processor and a memory that stores operational instructions, that when executed by the at least one processor cause the processing system to receive a request message from a requesting entity via a network, where the request message includes a pre-signed URL. A set of custom policy parameters are extracted from the pre-signed URL. Policy verification data is generated by comparing each attribute of a determined set of attributes of the access request to a corresponding custom policy parameter of the set of custom policy parameters. An access indicated in the request message is executed in response to the policy verification data indicating that each attribute compares favorably to the corresponding custom policy parameter. | 2020-12-31 |
20200412769 | METHOD AND APPARATUS FOR INTERWORKING OF CLOUD PLATFORM AND SECURITY TOOLS - A method for interworking of a security tool and a cloud platform includes checking whether there is a record of confirming or applying security related to a target identifier when a cloud platform client calls a platform interface module, determining whether to interwork with the security tool when the record of confirming or applying security related to the target identifier is not present, requesting a resource required for running the security tool to the cloud platform when the security tool is invoked, and obtaining the resource from the cloud platform and storing the same. | 2020-12-31 |
20200412770 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ESTABLISHING A COMMUNICATION SESSION BETWEEN A PUBLIC SWITCHED TELEPHONE NETWORK (PSTN) ENDPOINT AND A WEB REAL TIME COMMUNICATIONS (WEBRTC) ENDPOINT - A method for establishing a communication session between a public switched telephone network (PSTN) endpoint and a Web real time communications (WebRTC) endpoint includes receiving, by a PSTN microservice (MS), a session initiation protocol (SIP) based signaling message from a PSTN endpoint and acquiring, by the PSTN MS, endpoint context attribute information from the SIP based signaling message. The method further includes generating, by the PSTN MS, a WebRTC based signaling message that includes an address identifier of an associate endpoint (AE) that is associated with the context attribute information and transmitting, by the PSTN MS, the WebRTC based signaling message to the AE to initiate a call session between the PSTN endpoint and the AE. | 2020-12-31 |
20200412771 | SEAMLESS COMMUNICATION RESOURCE TRANSITION BETWEEN A GROUP-BASED COMMUNICATION SYSTEM AND AN EXTERNAL COMMUNICATION SYSTEM - Method, apparatus and computer program product for seamless communication resource transition are described herein. | 2020-12-31 |
20200412772 | AUDIO SOURCE ENHANCEMENT FACILITATED USING VIDEO DATA - Systems and methods for audio signal enhancement facilitated using video data are provided. In one example, a method includes receiving a multi-channel audio signal including audio inputs detected by a plurality of audio input devices. The method further includes receiving an image captured by a video input device. The method further includes determining a first signal based at least in part on the image. The first signal is indicative of a likelihood associated with a target audio source. The method further includes determining a second signal based at least in part on the multi-channel audio signal and the first signal. The second signal is indicative of a likelihood associated with an audio component attributed to the target audio source. The method further includes processing the multi-channel audio signal based at least in part on the second signal to generate an output audio signal. | 2020-12-31 |
20200412773 | METHOD AND APPARATUS FOR GENERATING INFORMATION - Embodiments of the present disclosure provide a method and apparatus for generating information, and relate to the field of cloud computation. The method may include: receiving a video and an audio of a user that are sent by a client by means of instant communication; generating user feature information and text reply information according to the video and the audio; generating a control parameter and a reply audio for a three-dimensional virtual portrait according to the user feature information and the text reply information; generating a video of the three-dimensional virtual portrait by means of an animation engine based on the control parameter and the reply audio; and transmitting the video of the three-dimensional virtual portrait to the client by means of instant communication, for the client to present to the user. | 2020-12-31 |
20200412774 | MULTIPOINT CONFERENCING SESSIONS MULTIPLEXED THROUGH PORT - A conferencing computing device, including memory storing one or more dispatch data structures. The conferencing computing device may further include a processor configured to receive a plurality of input packets at a shared port from a plurality of sender computing devices. Based on input packet data and the one or more dispatch data structures, the processor may add each input packet to an input queue bound to the shared port. The processor may transmit the input packets to a plurality of application program instances associated with the input queues. The processor may generate a plurality of output packets at the application program instances. The processor may add each output packet to an output queue associated with the application program instance at which that output packet was generated. The processor may, through the shared port, transmit the output packets to a plurality of recipient computing devices. | 2020-12-31 |
20200412775 | MAINTAINING COMMUNICATION WITH CONFERENCING COMPUTING DEVICE - A conferencing computing device, including memory storing one or more dispatch data structures. The conferencing computing device may further include a processor configured to, at a port, receive, from a sender computing device, a first input packet including first input packet data and a second input packet that includes a copy of the first input packet data, via a first communication channel and a second communication channel, respectively. Based on the input packet data and the one or more dispatch data structures, the processor may add the input packets to a queue of a transport provider bound to the port. The processor may transmit the input packets to an application program instance associated with the queue. The processor may determine that the first communication channel or the second communication channel is disconnected and may maintain communication with the sender computing device through the port via a remaining communication channel. | 2020-12-31 |
20200412776 | Apparatus and Method for Managing Events in a Computer Supported Collaborative Work Environment - Aspects of the subject disclosure may include, for example, participating in a communication session over a network with a second communication device that is remote from the communication device where the communication session includes a computer supported collaborative work environment utilizing a non-baton passing protocol, presenting content at a display device where the content is presented by the second communication device at a second display device, receiving first user input at the user interface where second user input is received by the second communication device where a conflict resolution is applied to events associated with the first and second user input, and presenting adjusted content at the display device. Other embodiments are disclosed. | 2020-12-31 |
20200412777 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - An information processing apparatus, an information processing system, and an information processing method. The information processing apparatus manages a detected user as a participant, accepts selection of a shared site from the detected user, and suggests one or more candidates of participant to be managed based on the selected shared site. | 2020-12-31 |
20200412778 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - An information processing apparatus, an information processing system, and an information processing method. The information processing apparatus detects a user, acquires schedule information of the user based on the detected user, and suggests one or more shared sites to use according to the schedule information. | 2020-12-31 |
20200412779 | METHODS AND SYSTEMS FOR PROVIDING SUPPLEMENTARY INFORMATION ON A VIRTUAL WHITEBOARD - Methods and systems for providing supplementary information on a virtual whiteboard. One system includes an electronic computing device including a display and an electronic processor communicatively coupled to the display. The electronic processor is configured to generate a virtual whiteboard on the display and receive an input via the display. The input illustrates a site of an incident. The electronic processor is further configured to identify the site of the incident. The electronic processor is further configured to generate supplementary information about the site of the incident as a function of context information associated with the incident. The electronic processor is further configured to display, on the virtual whiteboard on the display, the supplementary information. | 2020-12-31 |
20200412780 | AUTOMATED VIDEO POSITIONING DURING VIRTUAL CONFERENCING - Provided is a method, computer program product, and virtual conferencing system for automatically positioning a video thumbnail within an area on a display during a virtual conferencing session. A processor may receive a data stream of a virtual conferencing session. The data stream includes visual data associated with a presentation. The processor may analyze the visual data to identify a blank space area in the visual data. The processor may display the visual data to one or more users of the virtual conferencing session. The processor may display a video thumbnail of a presenter in the blank space area. | 2020-12-31 |
20200412781 | GAMIFIED VIRTUAL CONFERENCE WITH NETWORK SECURITY TRAINING OF NETWORK SECURITY PRODUCTS - Systems and methods for demonstrating network security products in a virtual conference and providing training to attendees of a network security training session in the virtual conference through the use of gamification are provided. A server generates a dedicated virtual environment for a particular attendee. A three-dimensional (3D) user interface for the virtual conference is presented on a display of the particular attendee, which represents a simulated conference environment with each network security product being demonstrated as a virtual booth represented in the conference environment. A game client causes the particular attendee to navigate in the 3D user interface to a first virtual booth to access a first learning objective relating to demonstration of a first network security product corresponding to the first booth. A progress report, which is maintained by the server, is used to notify regarding other learning objectives that are of potential interest to the particular attendee. | 2020-12-31 |
20200412782 | Providing Related Content using a Proxy Media Content Item - A server system receives an indication of a media content item from a device and determines a first set of values that correspond to characteristics of the indicated media content item. The method further includes analyzing a defined set of media content items to identify a proxy content item. The identified proxy media content item has a second set of values that meets similarity criteria for the first set of values. The method includes generating, from the defined set of media content items, a result set of media content items that are associated with the proxy media content item. The method also includes determining a result set of users of the media content provider associated with the result set of media content items and transmitting, to the device of the user, information associated with the result set of users of the media content provider. | 2020-12-31 |
20200412783 | CONGESTION RESPONSE FOR TIMELY MEDIA DELIVERY - In examples of the present invention, delivery of a segment of content is done using an initial congestion window, preferably chosen to give a delivery rate that ensures timely delivery of that segment. However, under high levels of packet loss, the delivery rate may not be sufficient. Hence, at any stage during delivery of a segment, the actual delivery rate is measured, and used, together with the previous congestion window size, the amount of content segment data still to be delivered, and the time left for delivery, to calculate an updated congestion window. The remainder of the segment is then delivered using this revised congestion window. | 2020-12-31 |
20200412784 | CONTENT DELIVERY CONTROL APPARATUS, CONTENT DELIVERY CONTROL METHOD, PROGRAM, AND CONTENT DELIVERY CONTROL SYSTEM - The present disclosure relates to a content delivery control apparatus, a content delivery control method, a program, and a content delivery system capable of achieving commonality of conditions associated with transcoding at the time of content delivery in different CDNs and supporting a standard upload interface. | 2020-12-31 |
20200412785 | Generating a Live Media Segment Asset - A system is provided for generating a live media segment asset. A first programming schedule that references one or more pre-encoded media assets and/or one or more live input streams is published. A request that comprises one or more identifiers is received. Based on the one or more identifiers in the received request, manifest data and indexed metadata associated with one or more media segments from at least an indexed media content is inserted to a live media segment asset manifest. The indexed media content comprises the one or more pre-encoded media assets and/or one or more live input streams. Accordingly, based on the insertion of the manifest data and indexed metadata associated with the one or more media segments stream from at least the indexed media content referenced in the first programming schedule, and one or more context parameters, the live media segment asset is generated. | 2020-12-31 |
20200412786 | DYNAMIC PLAYOUT BUFFER FOR DISPARATE LIVE MEDIA OUTPUT STREAM - A system is provided for publishing first programming schedule that references at least one or more pre-encoded media assets and/or one or more live input streams, and comprises one or more playout buffer features enabled via one or more constraints and rights. Each playout buffer feature of the one or more playout buffer features is associated with corresponding number of media segments that represents the one or more pre-encoded media assets and/or one or more live input streams. A request is received that comprises at least a stream identifier and at least an additional parameter. In accordance with a playout buffer feature from the one or more playout buffer features and at least the additional parameter, manifest data and indexed metadata of one or more media segments associated with stream identifier is inserted to first disparate live media output stream manifest and first disparate live media output stream is generated. | 2020-12-31 |
20200412787 | SYSTEMS AND METHODS FOR MEDIA QUALITY SELECTION OF MEDIA ASSETS BASED ON INTERNET SERVICE PROVIDER DATA USAGE LIMITS - Systems and methods are disclosed herein for media quality selection of media assets based on internet service provider data usage limits. One disclosed technique herein discusses receiving a data usage limit from an internet service provider. The data usage limit includes maximum data usage for particular user account data. A media asset is selected from a media streaming server that includes a plurality of qualities having respective data sizes (e.g., for video quality—4K, 1080p, etc.) A determination is made whether a selected data size from a selected quality of the plurality of qualities of the selected media asset exceeds remaining data of the received data usage limit. If so, a request is transmitted to the to the media streaming server to retrieve the selected media asset with a quality having a data size smaller than the respective data size. | 2020-12-31 |
20200412788 | ASYNCHRONOUS WORKFLOW AND TASK API FOR CLOUD BASED PROCESSING - A method, computer program, and computer system is provided for asynchronous Network-Based Media Processing (NBMP) request processing. A function call corresponding to an NBMP request to a workflow manager is received. A hypertext transfer protocol (HTTP) status code is returned based on receiving the function call, and the request is performed at a later time, whereby a response to the request is performed asynchronously. | 2020-12-31 |
20200412789 | SYSTEM AND METHOD FOR COMPONENT BASED WEB SERVICES DEVELOPMENT - A web services development platform includes one or more processors and memory coupled storing instructions that cause the processors to receive a web service component arranged on a design surface of the web services development platform to implement a web service for a computer application. The web service component includes predefined code to support a plurality of methods for the web service. The processors display a plurality of properties associated with the web service component on an object viewer of the web services development platform. The processors receive an input via the object viewer enabling one or more allowed actions properties from among the plurality of properties, where each of the allowed actions properties corresponding to a method from among the plurality of methods for the web service. The processors configure the web service component based on, at least in part, the selected one or more allowed actions properties to enable the first web service component to process incoming requests at runtime according to the enabled ones of the allowed actions properties for the first web service component. | 2020-12-31 |
20200412790 | SYSTEMS AND METHODS FOR PROVIDING A PERSONALIZED VISUAL DISPLAY MULTIPLE PRODUCTS - Systems and methods for providing a personalized visual display of multiple products are provided. A described method includes receiving product information for a set of multiple products and user information for a particular user or user device and selecting a plurality of the multiple products estimated to be most relevant to the particular user or user device based on the product information for the set of multiple products and the user information for the particular user or user device. The method further includes generating a personalized visual display of the selected products including product images for multiple of the selected products. All of the products in the personalized visual display may be associated with the same content provider. The method further includes causing the personalized visual display to be presented via the user device. | 2020-12-31 |
20200412791 | MECHANISM FOR DISTINGUISHING BETWEEN CONTENT TO BE SERVED THROUGH FIRST OR SECOND DELIVERY CHANNELS - Described herein are methods, apparatus and systems for selectively delivering content through one of two communication channels, one being origin to client and the other being from or through a CDN to client. Thus a client may choose to request content from a CDN and/or from an origin server. This disclosure sets forth techniques for, among other things, distinguishing between which channel to use for a given object, using the CDN-client channel to obtain the performance benefit of doing so, and reverting to the origin-client channel where content may be private, sensitive, corrupted, or otherwise considered to be unsuitable from delivery from and/or through the CDN. | 2020-12-31 |
20200412792 | BLUETOOTH TRANSMISSION CONTROL METHOD, CONTROL SYSTEM, AND STORAGE MEDIUM - A Bluetooth transmission control system, a control system and a storage medium are provided. The Bluetooth transmission control method comprises: establishing a Bluetooth connection with a file receiving device by a mobile terminal, and the mobile terminal initiating a Bluetooth file transmission operation to the file receiving device; detecting whether the mobile terminal synchronously turns on a Bluetooth music playback operation or not; negotiating a file transmission timeout period with the file receiving device by the mobile terminal based on a detection result; and transmitting a file to the file receiving device by the mobile terminal. | 2020-12-31 |
20200412793 | LINK FILE SHARING AND SYNCHRONIZATION - A content management system can receive, from a client device, a link including an address to a network resource. The content management system can then store a link file including the link, and provide the link file on a first page of a website. Next, in response to an input received from a browser application at the client device, the content management system can extract the address from the link file and provide a second page on the website displaying the address from the link file and a graphical element configured to receive a request from the browser application to navigate to the address. In response to receiving the request from the browser application, the content management system can then instruct the browser application to navigate to the address. | 2020-12-31 |
20200412794 | SYSTEMS AND METHODS FOR COMMUNICATING WITH A UNIQUE IDENTIFIER - A system for device communication is disclosed. The system may include one or more memory devices storing instructions and one or more processors configured to execute the instructions to transmit a first unique identifier to a wave device, and receive a second unique identifier from the wave device. Further, the first unique identifier may exclusively identify a person, and the second unique identifier may exclusively identify a first wave receiver associated with a person, an entity, a place, or an object. In addition, at least the first unique identifier may be transmitted to the wave device based on an indication of a proximity between the first person and the first wave receiver. | 2020-12-31 |
20200412795 | MERGE TREES FOR COLLABORATION - Disclosed embodiments provide for collaborative access to a distributed data structure. The disclosed embodiments include collaboration participant devices or instances that each represent a distributed data structure via a tree data structure. The collaboration participants perform operations on the distributed data structure and communicate these operations to each other via a serialization service. The tree structure maintained by each of the collaboration participants stores unacknowledged operations and also collaboration participant specific length information for collaboration participants. Once a particular operation has been acknowledged by each of the collaboration participants, this is communicated to all of the participants by the serialization service. The collaboration participants may then perform maintenance on a portion of the tree structure represented the acknowledged operation. For example, nodes of the tree representing adjacent data in the distributed data structure may be combined, or data removed by an acknowledged operation may be removed from the tree. | 2020-12-31 |
20200412796 | Distributed Transaction Management In A Network Service Layer - Distributed Service Layer Transactions (DSLTs) may be supported by a DSLT service at a service layer of a communications network to offload applications from the burden of managing the processing of DSLTs. | 2020-12-31 |
20200412797 | Reduction of Adjacent Rack Traffic in Multi-Rack Distributed Object Storage Systems - An example system may include a first rack including a first access node and a second rack including a second access node and a storage node. The first and second racks are included within a multi-rack distributed storage system. The first access node is configured to receive over a connection with a client a first request for an object data. The connection with the client is uniquely identified by a connection ID independent of source and destination addresses and ports. The first access node is further configured to determine object data locality details of the object data and relocate the connection to the second access node in the second rack when the object data locality details of the object data indicate the object data is located within the second rack. | 2020-12-31 |
20200412798 | Connection Load Distribution in Distributed Object Storage Systems - An example system comprises a first access node in a first rack configured to engage in a connection with a client, and a second access node in a second rack. The first and second racks form a multi-rack distributed storage system. The system includes a distributed database including a first load indicator designating a first processing load of the first access node and a second load indicator designating a second processing load of the second access node. The distributed database is accessible to the first and second access nodes. The system further includes a connection relocation manager configured to relocate the connection with the client from the first access node to the second access node when the second processing load is less than the first processing load. | 2020-12-31 |
20200412799 | WIRELESS NETWORK CLOUD COMPUTING RESOURCE MANAGEMENT - A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers. | 2020-12-31 |
20200412800 | Stream-based data deduplication with peer node prediction - Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. As such, a decoding peer does not need to maintain a symmetric library for the origin. Rather, if the peer does not have the chunks in cache that it needs, it follows a conventional content delivery network procedure to retrieve them. In this way, if dictionaries between pairs of sending and receiving peers are out-of-sync, relevant sections are then re-synchronized on-demand. The approach does not require that libraries maintained at a particular pair of sender and receiving peers are the same. Rather, the technique enables a peer, in effect, to “backfill” its dictionary on-the-fly. On-the-wire compression techniques are provided to reduce the amount of data transmitted between the peers. | 2020-12-31 |
20200412801 | Content Distribution Using Ad Hoc Mesh Networks - Aspects discussed herein relate to systems, apparatuses, and methods for providing content distribution via a breadth-first approach for peer-to-peer file sharing in a temporary ad hoc mesh network. For example, a peer-to-peer orchestrator may receive requests for the same asset from multiple mobile devices, determine which of the mobile devices are likely to travel along the same route at the same time, group them together and cause transmission of different asset parts of the requested asset to different mobile devices in the group. If the mobile devices in the group lose connection with the peer-to-peer orchestrator, they may form an ad hock mesh network and retrieve asset parts from one another. If the group reconnects with a peer-to-peer orchestrator, additional asset parts of the asset may be transmitted to the group and the process may repeat so that each mobile device may obtain each of the asset parts. | 2020-12-31 |
20200412802 | METHODS, DEVICES AND COMPUTER READABLE MEDIUMS FOR DATA SYNCHRONIZATION - Embodiments of the present disclosure relate to methods, devices and computer readable mediums for data synchronization. A method comprises in response to receiving, at a first processor, a first request to synchronize data, initiating, to a second processor, a first remote direct memory access (RDMA) operation for transmitting the data between a first cache in the first processor and a second cache in the second processor. The method further comprises in response to completion of the first RDMA operation, writing the data into a first persistent storage device coupled to the first processor. The method further comprises transmitting, to the second processor, a command to instruct the second processor to commit the data to a second persistent storage device coupled to the second processor. Moreover, the method further comprises detecting, from the second processor, an acknowledgement for the command, the acknowledgement indicating that the data is synchronized between the first and second processors. | 2020-12-31 |
20200412803 | SYSTEM AND METHOD FOR EFFICIENT VIRTUALIZATION IN LOSSLESS INTERCONNECTION NETWORKS - Systems and methods for supporting efficient virtualization in a lossless interconnection network. An exemplary method can provide, one or more switches, including at least a leaf switch, a plurality of host channel adapters, wherein each of the host channel adapters comprise at least one virtual function, at least one virtual switch, and at least one physical function, a plurality of hypervisors, and a plurality of virtual machines, wherein each of the plurality of virtual machines are associated with at least one virtual function. The method can arrange the plurality of host channel adapters with one or more of a virtual switch with prepopulated local identifiers (LIDs) architecture or a virtual switch with dynamic LID assignment architecture. The method can assign each virtual switch with a LID. The method can calculate one or more linear forwarding tables based at least upon the LIDs assigned to each of the virtual switches. | 2020-12-31 |
20200412804 | DIRECT FILE SEND FROM STORAGE TO END CLIENT BY TRANSFERRING SOCKET INFORMATION TO THE STORAGE - A method begins by sending, by a user computing device of a storage network, a read request regarding data to a host computing device of the storage network in accordance with a transport layer protocol, where the read request includes data retrieval information associated the data. The method continues with determining, by the host computing device, a storage entity of the storage network that is storing the data based on the data retrieval information. The method continues with sending, by the host computing device, socket information and data retrieval information to the storage entity. The method continues with sending, by the storage entity, the data directly to the user computing device in accordance with the socket information and using the session identifier. | 2020-12-31 |
20200412805 | COMMUNICATION SYSTEM AND COMMUNICATION METHOD - A construction unit of a conversion device constructs a VPN connected to a VNF in a cloud platform, and a distribution unit distributes a default route designating the conversion device as a transmission destination to a router and another conversion device, and distributes a redirect route to the VNF to which the conversion device belongs to the router. A transfer instruction unit of a controller provides an instruction of a transfer destination of a packet to the conversion device connected to the same cloud platform, the VNF, or another controller. A transfer unit of the conversion device transfers the packet to a recent VNF in the processing order of a chain where the VNF is in the same cloud platform, and transfers the packet to a conversion device connected to the VNF where the VNF is in a cloud platform that is different from the same cloud platform. | 2020-12-31 |
20200412806 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR MANAGEMENT OF DATA DELETION REQUESTS BASED ON GEOGRAPHICALLY DISTRIBUTED DATA - Systems, apparatuses, methods, and computer program products are provided for managing geographically distributed data storage in a group-based communication system and for servicing deletion requests related thereto. In some embodiments, an apparatus physically located in a first geographic area defined by a first geographic boundary is provided. In embodiments, upon determining that an entity identifier associated with a message is associated with a geographic data storage policy, the apparatus is configured to transmit a geographic data residency message package comprising message data of the message to a geographic data residency server physically located within a second geographic area defined by a second geographic boundary. The second geographic area is associated with the geographic data storage policy. In some embodiments, the apparatus is configured to update the message data of the message with residency token data received from the geographic data residency server. | 2020-12-31 |
20200412807 | SESSION CONTROL APPARATUS, SESSION CONTROL METHOD, AND PROGRAM - A session control apparatus, a session control method, and a session control program may maintain a quality of input data output to a processing module. A processing module has a defined condition regarding a quality of the input data. The session control apparatus includes a selection unit and a switching unit. The selection unit selects a second device when the input data fails to satisfy the condition. The switching unit switches a first device that outputs the input data to the processing module to the second device selected by the selection unit. | 2020-12-31 |
20200412808 | APPLICATION ENVIRONMENT FOR SENSORY NETWORKS - In various example embodiments, a system and method are provided for a service data platform. The service data platform includes an application management API configured to receive software uploaded by a third party using a management application API. The service data platform also includes a plurality of graph servers configured to identify a group of lighting nodes to distribute the uploaded software and determine the uploaded software is safe for deployment to the identified group of lighting nodes. The service data platform further includes a device manager configured to distribute, using an administrative API, the uploaded software to the identified group of lighting nodes. | 2020-12-31 |
20200412809 | MONITORING SYSTEM WITH LOW POWER DATA ACQUISITION - A system for monitoring electrical properties with lower power data acquisition. | 2020-12-31 |
20200412810 | IoT Analytics Edge Application on IoT Gateway - IoT devices within a commercial real-estate or residential building environment may be connected through networks, such as a Building Automation and Control network (BACnet). Systems and methods according to this disclosure provide automatic discovery of IoT devices and relationships in commercial real-estate and residential buildings and integration of the BACnet devices into the digital twin of the building. In some implementations, an IoT gateway is configured to translate the communication received from the BACnet to an IoT cloud platform and configured to normalize the data across the different security platforms into a consistent format which enables integration and interoperability of the different building system platforms that may otherwise be operating in isolation from each other. Systems and methods according to the present disclosure provide edge based analytics and control of IoT BACnet devices based on defining conditions and rules, and provide integration of multiple building systems in the context of commercial real-estate and residential buildings. | 2020-12-31 |
20200412811 | ADAPTIVE REAL-TIME STREAMING FOR AUTONOMOUS VEHICLES - Systems and methods provide for adaptive real-time streaming of Autonomous Vehicle (AV) data. In some embodiments, the AV can receive a request from the remote computing system for real-time streaming of a first type of AV data and adaptively streaming a second type of AV data when one or more streaming conditions are satisfied. The first type of AV data and the second type of AV data can be captured as raw data by sensors, actuators, transducers, and other components of the AV. The AV can stream the first type of AV data to the remote computing system in real-time for a first time period. When the AV determines the streaming conditions are satisfied, the AV can automatically determine the second type of AV data to stream to the remote computing system in real-time for a second time period. | 2020-12-31 |
20200412812 | INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE - An information processing method for an electronic device includes obtaining orientation information of the electronic device, determining an area having a specified angle based on the orientation information, identifying one or more Internet of Things (IoT) device in the area, determining that the electronic device has an authority to display information of the one or more IoT device, and receiving and displaying the information of the one or more IoT device. | 2020-12-31 |
20200412813 | VEHICLE CONTROL SYSTEM - A vehicle control system includes a controller configured to control communication between or among plural vehicle devices that control movement of a single vehicle system or a multi-vehicle system via a network that communicatively couples the vehicle devices. The controller also is configured to control the communication using a data distribution service (DDS) and with the network operating as a time sensitive network (TSN). The controller is configured to direct a first set of the vehicle devices to communicate using time sensitive communications, a different, second set of the vehicle devices to communicate using best effort communications, and a different, third set of the vehicle devices to communicate using rate constrained communications. | 2020-12-31 |
20200412814 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - An information processing device ( | 2020-12-31 |
20200412815 | MANAGEMENT SYSTEM, MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND STORAGE MEDIUM STORING PROGRAM - After receiving from a device a request to register the device, a management apparatus issues service-specific identification information for identifying the device in a server that provides a service, and manages the issued service-specific identification information in association with the service. The management apparatus issues common service-specific identification information for grouped services among a plurality of services. | 2020-12-31 |
20200412816 | Methods and Systems of Configuring Electronic Devices - A system of configuring a new device may include a new device that is not configured with one or more settings. The new device includes a short range communication transmitter and programming instructions configured to cause the new device to operate in a discoverable mode. The system includes an existing device that is configured with the settings, and that includes a short range communication receiver and programming instructions. The programming instructions are configured to cause the existing device to receive instructions to set up the new device, in response to receiving the instructions, detect, by the short range communication receiver, a presence of the new device by detecting the broadcast signal within a communication range of the short range communication receiver, and in response to detecting the presence of the new device, transmit at least a portion of the one or more settings directly to the new device. | 2020-12-31 |
20200412817 | REAL-TIME SUGGESTED ACTIONS BASED ON USER PROFILE ATTRIBUTES - Techniques are disclosed relating to generating real-time suggested actions for a user based on their user profile attributes. In various embodiments, a server system may select, in real-time, a particular action to suggest to a user based on profile attributes associated with a user account of the user. The server system may then provide a message indicative of this particular action to a user device associated with the user. In some embodiments, the server system may then receive an indication that the user has initiated the particular action. In response to this indication, the server system may update the profile attributes associated with the user account to indicate that the user has initiated the particular action. Using these updated profile attributes, the server system may then select, in real-time, an updated action to suggest to the user that is different from the particular action. | 2020-12-31 |
20200412818 | SYSTEM AND METHOD FOR SCALABLY TRACKING MEDIA PLAYBACK USING BLOCKCHAIN - Systems and methods for tracking media file playback are provided. A request to upload a media file and metadata associated with the media file is received. Next, the media file and metadata is uploaded via a blockchain protocol. Next, a request to play the media file is received from a client device or a digital service provider (DSP) platform. The request to play the media file is validated via the blockchain protocol. Upon validating the request to play the media file, the media file is transmitted for playback at the client device or DSP platform. Last, the number of times the media file is played is tracked via the blockchain protocol. | 2020-12-31 |
20200412819 | SYSTEM AND METHOD FOR CONTINUOUS TRACKING OF MEDIA PLAYBACK USING BLOCKCHAIN - Systems and methods for continuous tracking of media file playback. First, transaction data from a platform stream is received. The transaction data corresponds to a request to play a media file from an end user, as well as continuous play information. Next, the transaction data is verified. Then, the verified transaction data is signed using a cryptographic signature. Next, it is determined whether the transaction data corresponds to a valid blockchain transaction. If the transaction data corresponds to a valid blockchain transaction, the valid blockchain transaction is recorded to a blockchain. Last, the transaction data and the cryptographic signature are transmitted to one or more validation nodes. | 2020-12-31 |
20200412820 | SYSTEM AND METHOD FOR CONTINUOUS TRACKING OF MEDIA PLAYBACK USING BLOCKCHAIN - Systems and methods for continuous tracking of media file playback. First, transaction data from a platform stream is received. The transaction data corresponds to a request to play a media file from an end user, as well as continuous play information. Next, the transaction data is verified. Then, the verified transaction data is signed using a cryptographic signature. Next, it is determined whether the transaction data corresponds to a valid blockchain transaction. If the transaction data corresponds to a valid blockchain transaction, the valid blockchain transaction is recorded to a blockchain. Last, the transaction data and the cryptographic signature are transmitted to one or more validation nodes. | 2020-12-31 |
20200412821 | METHOD AND SYSTEM FOR OPTIMIZED ONLINE PRESENCE TRACKING - A computer implemented method and apparatus for optimized online presence tracking. The method comprises receiving, from a user device, a request to open a communication connection; in response to receiving the request, opening the communication connection using a native communication protocol function; receiving a message from the user device comprising data that identifies a desired presence level; and in response to receiving the message, upserting presence tracking information to a cache server for use by one or more interested servers. | 2020-12-31 |
20200412822 | Providing Related Content Using a Proxy Media Content Item - A server system receives an indication of a media content item from a device and determines a first set of values that correspond to characteristics of the indicated content item. The server system analyzes a defined set of content items to identify a proxy media content item. The identified proxy media content item has a second set of values that meets similarity criteria for the first set of values. The server system determines, based on analysis of a plurality of sets of media content items, a result set of one or more media content items that are related to the proxy media content item. The server system provides information associated with the result set of media content items to the device of the user. | 2020-12-31 |
20200412823 | Modular Telecommunication Edge Cloud System - A telecommunications edge cloud (TEC) element comprising a plurality of TEC hardware components comprising a computing component that includes one or more processors, a storage component that includes a memory, a networking component, with the TEC device being deployed between a client and a packet network, the computing component being configured to manage a computing resource in the computing component, a networking resource in the networking component, and a storage resource in the storage component, allocate the computing resource for a first application of the plurality of different applications, execute the first application using the computing resource, allocate the networking resource for a second application of the plurality of different applications, execute the second application using the networking resource, allocate the storage resource for a third application of the plurality of different applications, execute the third application using the storage resource. | 2020-12-31 |
20200412824 | PROVIDER NETWORK CONNECTIVITY MANAGEMENT FOR PROVIDER NETWORK SUBSTRATE EXTENSIONS - A first service of a provider network obtains an identification of one or more substrate addressable devices included in an extension of the provider network. Based on the identification, a launch of one or more compute instances within the provider network is initiated. The one or more compute instances are to connect the provider network to the extension of the provider network across at least a third-party network by receiving a first control plane message directed to a first substrate addressable device of the one or more substrate addressable devices, by updating a message state data store based at least in part on the first control plane message, and by sending a second control plane message to the first substrate addressable device via a secure tunnel. | 2020-12-31 |
20200412825 | CONNECTION POOLING FOR SCALABLE NETWORK SERVICES - Systems and methods are described for providing connection pools between source network devices and a target, connection-limited service. Each connection pool can facilitate connections between source devices and the target service, while ensuring that connections to the connection-limited service do not exceed a defined limit. A connection manager service can initialize a connection pool for a target service on request by a client device, and provide an identifier for the connection pool to the client device. Source network devices can then transmit operations for the target service to the connection manager service, which can route the operations to an appropriate connection pool based on the identifier. | 2020-12-31 |
20200412826 | ACCELERATING DYNAMIC CONTENT DELIVERY IN A CONTENT DELIVERY NETWORK - A technique for accelerating dynamic content delivery in a content delivery network. In some embodiments of the invention, responsive to a request that is sent by a client and that is for dynamic content, a client-proxy hosted in a datacenter of a CDN sends the request to a “forwarder-proxy” hosted in another datacenter of the same CDN. The forwarder-proxy, responsive to the request for dynamic content, forwards the request to an origin server and does not cache the dynamic content. The datacenter selected for the forwarder-proxy is one that is “close” to the origin server in terms of round-trip time (RTT) to improve network performance for requests for dynamic content. | 2020-12-31 |
20200412827 | METHOD FOR CACHING DATA AND FORWARDING DEVICE - The present application discloses a method for caching data. The method includes: a controller calculates a local caching gain of first content for each forwarding device on the first content delivery path, wherein a local caching gain of the first content of an i | 2020-12-31 |
20200412828 | BYPASS DELIVERY POLICY BASED ON THE USAGE (I/O OPERATON) OF CACHING MEMORY STORAGE IN CDN - A request router is disclosed for a multi-tier Content Delivery Network (CDN), each tier corresponding to a hierarchical layer of the CDN. The request router includes processing circuitry configured to: receive, from a first delivery node of a hierarchical layer of the CDN, a routing request to bypass the first delivery node for content delivery to a user equipment; and as a result of receiving the routing request to bypass the first delivery node for the content delivery to the user equipment, select at least a second delivery node for the content delivery to the user equipment. | 2020-12-31 |
20200412829 | Data Caching For Cloud Services - Methods and systems for caching data for resources using a shared cache are described herein. The data may be stored in a configuration service, in the resources, or in the shared cache. The data stored in the configuration service may be modified. The data stored in the resources and in the shared cache may be updated according to the modified data in the configuration service. The data stored in the configuration service, in the resources, or in the shared cache may be used based on an operation mode. | 2020-12-31 |
20200412830 | Intermediated Retrieval of Networked Content - Methods, systems, computer-readable media, and apparatuses may provide for the intermediated retrieval of applications on a network. A computing device may be configured to receive an application from an application server on a network. Based on, for example, the network conditions between the computing device and the application server, the computing device may query a plurality of intermediary servers. Based on a decision that, for example, the network conditions between the computing device, application server, and a selected intermediary server are better than the network conditions between the computing device and the application server, the computing device may cause the application to be retrieved by a host application of the selected intermediary server. The host application may process and transmit the application to the computing device. The computing device may display the processed application and transmit user input corresponding to the processed application to the intermediary server. | 2020-12-31 |
20200412831 | SYSTEM FOR OFFLINE PROCESSING OF ORGANIZATIONAL NETWORKS - A method may include presenting a graphical user interface (GUI) configured to define a network for analysis, the GUI including: a first portion configured to define a network boundary of an organizational network graph (ONG) in a dataset; a second portion configured to define a beginning time and ending time for the network analysis; and a third portion configured to define a set of one or more graph metrics for vertices in the ONG; retrieving a portion of the dataset based on the network boundary, beginning time, and ending time; transmitting instructions to a distributed computing platform to generate the set of graph metrics on the portion of the dataset; and storing the generated set of graph metrics as associated with the network analysis. | 2020-12-31 |
20200412832 | METHOD AND SYSTEM FOR EDGE COMPUTING NETWORK INTERFACING - A method, a device, and a non-transitory storage medium are described in which a mobile edge computing service is provided. The mobile edge computing service provides for the hosting of a function of an application in a mobile edge computer network, and another function of the application to be hosted in a network external from the mobile edge computer network. The mobile edge computing service includes an on-boarding service that obtains subscription information and policies. The mobile edge computing service also includes network resource availability and security measure verifications. | 2020-12-31 |
20200412833 | REDIRECTION HANDLING - A method performed by a user plane, UP. The method includes determining whether a redirect message should be sent to a user equipment, UE, that has transmitted a first message intended for a first server, wherein the determining comprises: i) receiving a message transmitted by the first server and determining, based on the message, whether a redirect message should be sent to the UE or ii) detecting a timeout with respect to the first server; and, as a result of determining that redirect message should be sent to the UE, sending to the UE the redirect message, wherein the redirect message is configured to cause the UE to send a second message to a second server. | 2020-12-31 |
20200412834 | Centralized Automation System For Service Management - A system configured to remotely control a server includes a management data store configured to store information about a service hosted by the server. The information is stored in a service record. The system includes a configuration module configured to generate a configuration file for the service. The configuration file includes a location of a script local to the server. The configuration module stores the configuration file in the management data store. The system includes a remote execution module configured to push the configuration file stored in the management data store to the server, locally execute the script on the server, and receive a result of the execution of the script from the server. The system includes an operator portal configured to present a user interface to an operator. The user interface includes a visual representation of the received result of the execution of the script from the server. | 2020-12-31 |
20200412835 | SCHEDULING METHOD, SCHEDULER, STORAGE MEDIUM, AND SYSTEM - This disclosure provides a scheduling method, a scheduler, a storage medium, and a system, and belongs to the field of communications technologies. The method includes: obtaining an association relationship diagram and data distribution information, where each node in the association relationship diagram indicates one piece of data, and each directed edge is used to indicate an operation request for obtaining, through calculation based on data indicated by a source node, data indicated by a destination node; sequentially positioning, according to a preset node sorting policy, an operation request corresponding to a traversed node to any server in which data indicated by the traversed node is located; and sequentially scheduling at least one operation request indicated by the at least one directed edge to a server to which the at least one operation request is positioned. The method could be used to reduce the cross-node data transmission, and improving calculation efficiency | 2020-12-31 |
20200412836 | DYNAMIC COMPUTATION IN AN INFORMATION CENTRIC NETWORK - Systems and techniques for dynamic computation in an information centric network (ICN) are described herein. An interest packet to perform a computation may be received at a first interface of an ICN node. The ICN node may then perform a lookup in a forwarding information base (FIB) to identify a second interface to forward the interest packet. The interest packet may be forwarded on the second interface. Upon receipt of a data packet on the second interface in response to the interest packet, the ICN node may update an entry in the FIB for the second interfaces with a processing payload included in the data packet. The ICN node may then transmit the data packet downstream towards the originator of the interest packet. | 2020-12-31 |
20200412837 | EFFICIENT AND EXTENSIVE FUNCTION GROUPS WITH MULTI-INSTANCE FUNCTION SUPPORT FOR CLOUD BASED PROCESSING - A method, computer program, and computer system is provided for multi-instance Network-Based Media Processing (NBMP) function execution. A function call corresponding to an NBMP request is received. A function is retrieved from among a function group having a function descriptor, the retrieved function corresponding to the received function call. One or more instances of the retrieved function are executed. | 2020-12-31 |
20200412838 | AUTOMATED DELIVERY OF MEDICAL DEVICE SUPPORT SOFTWARE - Embodiments of the present invention include a portable medical device with an integrated web server. The portable medical device is configured to establish a communication session with a user device. The integrated web server is configured to load software onto the user computing device for exchanging data with the portable medical device. | 2020-12-31 |
20200412839 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2020-12-31 |
20200412840 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2020-12-31 |