US Pat. No. 10,116,904

FEATURES IN VIDEO ANALYTICS

HONEYWELL INTERNATIONAL I...

1. A video analytics function for streaming video from a video source arranged to monitor a field of view (FOV) that modifies a compression level of an object of interest (“object”) within the FOV, the video analytics function embodied as a set of instructions on a non-transitory computer readable medium, the video analytics function executable by a computer and implementing the following steps:reconstructing the FOV comprising the streaming video for viewing at an end-user interface;
receiving end-user commands at the end-user interface to define an object field encompassing the object within the FOV based on a monitoring priority for the object;
defining the compression level for the object including partial compression or full compression that fully masks the object;
compressing the streaming video within the object field according to the compression level;
monitoring the FOV of the streaming video;
analyzing first data associated with the FOV of the streaming video for a detectable event including movement and a direction of a person in the FOV; and
automatically decreasing the compression level of the object field in response to a detected event, wherein the detected event includes the movement of the person within the object field.

US Pat. No. 10,116,903

APPARATUS AND METHOD FOR RECOGNITION OF SUSPICIOUS ACTIVITIES

AIC Innovations Group, In...

1. A medication administration confirmation apparatus, comprising:a display for displaying a first set of one or more instructions to a user encouraging proper performance of one or more steps of a medication administration sequence;
a video capture device operable to capture one or more video sequences of a user administering medication in response to the displayed one or more instructions;
an audio capture device operable to capture one or more audio sequences of the user administering medication;
a memory operable to store the captured one or more video sequences and the captured one or more audio sequences; and
a processor operable to analyze at least one of the stored video sequences to identify one or more predetermined indications of suspicious activity on behalf of the user, operable to mark the at least one of the stored video sequences as including suspicious activity, operable to analyze at least one of the stored audio sequences to determine one or more additional indications of suspicious activity on behalf of the user, and to cause the display to display one or more further instructions to the user encouraging proper performance of the one or more steps of the medication administration sequence in response to the identification of one or more predetermined indications of suspicious activity.

US Pat. No. 10,116,902

PROGRAM SEGMENTATION OF LINEAR TRANSMISSION

Comcast Cable Communicati...

1. A method comprising:determining, by a computing device and based on content scheduling information associated with a media stream:
content from the media stream, wherein the content comprises non-commercial content and commercial content; and
a content type associated with the non-commercial content;
determining, based on the content type, one or more expected visual elements corresponding to the content type;
determining, based on a comparison between the one or more expected visual elements and the content from the media stream, a non-commercial portion of the content from the media stream;
determining that a quantity of repeating elements in a second portion of the content from the media stream satisfies a threshold, wherein the second portion is different from the non-commercial portion; and
storing, after determining that the quantity satisfies the threshold, an updated version of the content from the media stream, wherein the updated version omits one or more of the repeating elements.

US Pat. No. 10,116,901

BACKGROUND MODIFICATION IN VIDEO CONFERENCING

Avatar Merger Sub II, LLC...

30. A non-transitory processor-readable medium having instructions stored thereon, which when executed by one or more processors, cause the one or more processors to implement a method, comprising:receiving a video including a sequence of images;
identifying at least one object of interest in one or more of the images;
detecting at least one shape unit and a position vector of the at least one object of interest, and an intensity vector of the at least one shape unit, the at least one shape unit representing a parameter of a face of the at least one object of interest and the position vector corresponding to a rotation around three axes and a translation along the axes;
tracking the at least one object of interest in the video, wherein the tracking is based on the at least one shape unit, the position vector, and the intensity vector;
identifying a background in each of the images by separating the at least one object of interest from each image based on the at least one shape unit, the position vector, and the intensity vector;
modifying the background in each of the images, thereby generating a modified background; and
generating a modified video which includes the at least one object of interest and the modified background.

US Pat. No. 10,116,900

METHOD AND APPARATUS FOR INITIATING AND MANAGING CHAT SESSIONS

APPLE INC., Cupertino, C...

1. A machine-implemented method performed by at least one machine for initiating a video chat session, the method comprising:in response to a request for starting a single group video chat among a plurality of members, determining whether all members have a chat service account with the same chat service provider;
initiating multiple group video chats among the members in response to determining that not all of the plurality of members have a chat service account with the same chat service provider, wherein each member has at least one chat service account to participate in at least one of the multiple group video chats; and
after the multiple group video chats have started, merging the multiple group video chats into the single group video chat using communication among the members of the multiple group video chats, without involving at least one chat server associated with the chat service provider of at least one of the plurality of members.

US Pat. No. 10,116,899

METHOD AND APPARATUS FOR FACILITATING SETUP, DISCOVERY OF CAPABILITIES AND INTERACTION OF ELECTRONIC DEVICES

LOGITECH EUROPE, S.A., L...

1. A system for configuring and/or controlling one or more electronic devices, comprising:a beacon generation system that comprises:
a first processor;
a wireless transceiver that is configured to transmit a beacon signal that comprises beacon information; and
non-volatile memory having the beacon information stored therein, and also a number of instructions which, when executed by the first processor, causes the beacon generation system to perform operations comprising:
receive an input from a first electronic device or a user;
wirelessly transmit the beacon information to a first electronic device after receiving the input from the first electronic device or the user,
wherein the beacon information includes information that is used by a software application running on the first electronic device to:
select a second electronic device out of a plurality of external electronic devices; and
initiate communication with the second electronic device.

US Pat. No. 10,116,895

SIGNAL DISPLAY OUTPUT METHOD, APPARATUS, AND SYSTEM

Huawei Technologies Co., ...

1. A signal display output method, comprising:receiving, by a TV box expansion device, a radio television signal by using a radio frequency port, wherein the radio television signal comprises a first television signal and a second television signal;
performing, by the TV box expansion device, demodulation processing on the radio television signal to obtain a to-be-decoded digital signal, comprising:
performing, by the TV box expansion device, demodulation processing on the first television signal to obtain a to-be-decoded first digital signal, and performing demodulation processing on the second television signal to obtain a to-be-decoded second digital signal;
sending, by the TV box expansion device, the to-be-decoded digital signal to an Internet Protocol (IP) TV box for decoding processing on the to-be-decoded digital signal to obtain a decoded digital signal for display output, comprising:
sending, by the TV box expansion device, the to-be-decoded first digital signal and the to-be-decoded second digital signal to the Internet Protocol (IP) TV box; and
receiving and storing, by the TV box expansion device, a decoded second digital signal sent by the IP TV box.

US Pat. No. 10,116,894

RETAIL OUTLET TV FEATURE DISPLAY SYSTEM

Sony Corporation, Tokyo ...

1. A system, comprising:at least one computer memory with instructions executable by a processor; and
a processor configured for communicating with a display device and to execute the instructions which when executed by the processor configure the processor to:
send feature presentation images thereto to the display device in a loop in a first sequence of feature presentation images at least while the display device is energized in a retail outlet, and
disable feature presentation in response to a user entering a setup mode of the display device, the setup mode being accessed from an initial menu and entry of the setup mode from the initial menu being used as a signal to disable the feature presentation, a menu entry being provided in the setup mode to reenable the feature presentation.

US Pat. No. 10,116,892

BITLINE BOOST FOR FAST SETTLING WITH CURRENT SOURCE OF ADJUSTABLE BIAS

OmniVision Technologies, ...

1. A fast settling output line circuit, comprising: a photodiode (PD) (202) adapted to accumulate image charges in response to incident light; at least one transfer (TX) transistor (204) coupled between the PD (202) and a floating diffusion (FD) (208) to transfer the image charges from the PD (202) to the floating diffusion (FD) (208), wherein a transfer (TX) gate voltage (206) controls transmission of the image charges from a TX receiving terminal (207) of the TX transistor to the FD (208); a reset (RST) transistor (210) coupled to supply a reset FD voltage (VRFD) to the FD (208), wherein a reset (RST) gate voltage (212) controls the RST transistor; a source follower (SF) transistor (216) coupled to receive a voltage of the FD (208) from a SF gate terminal and provide an amplified signal to a SF source terminal (218); a bitline enable transistor (226) coupled to link between a bitline (224) and a bitline source node (BLSN) (230), wherein a bitline enable voltage (228) controls the bitline enable transistor (226); a current source generator (231) coupled to connect between the BLSN (230) and a ground (AGND), wherein the current source generator (231) sinks adjustable current from the BLSN (230) to the AGND through a cascode transistor (232) and a bias transistor (242) controlled by a cascode control voltage (234) and a bias control voltage (244); a cascode hold capacitor (250) coupled between the cascode control voltage (234) and the AGND; a bias hold capacitor (252) coupled between the bias control voltage (244) and the AGND; and a bias boost driver (255) coupled to control the cascode control voltage (234) and the bias control voltage (244).

US Pat. No. 10,116,889

IMAGE SENSOR WITH TWO-DIMENSIONAL SPLIT DUAL PHOTODIODE PAIRS

OmniVision Technologies, ...

1. An image sensor, comprising:an array of split dual photodiode (DPD) pairs arranged into a plurality of first groupings and a plurality of second groupings, wherein each first grouping of the array of split DPD pairs consists entirely of either first-dimension split DPD pairs or entirely of second-dimension split DPD pairs, wherein each first grouping of the array of split DPD pairs consisting of the first-dimension split DPD pairs is adjacent to an other first grouping of the array of split DPD pairs consisting of the second-dimension split DPD pairs, wherein the first-dimension is orthogonal to the second-dimension, wherein each one of the split DPD pairs is coupled to sense both phase information and image information from incident light;
a plurality of floating diffusion (FD) regions arranged in each first grouping of the split DPD pairs; and
a plurality of transfer transistors, wherein each one of the plurality of transfer transistors is coupled to a respective photodiode of a respective split DPD pair, and is coupled between the respective photodiode and a respective one of the plurality of FD regions.

US Pat. No. 10,116,882

DISPLAY APPARATUS FOR SUPERIMPOSING AND DISPLAYING IMAGES

CASIO COMPUTER CO., LTD.,...

1. A display apparatus comprising:a display unit; and
a processor that is configured to:
perform control for superimposing and displaying a plurality of images in the display unit such that at least one of the plurality of images can be observed through one or more other images distinguishably;
designate one or more of the plurality of images; and
detect a user manipulation performed for the plurality of images,
wherein the process performs control for changing the designated one or more images spatially or temporally according to the detected user manipulation while keeping the plurality of images superimposed and displayed.

US Pat. No. 10,116,880

IMAGE STITCHING METHOD AND IMAGE PROCESSING APPARATUS

SINTAI OPTICAL (SHENZHEN)...

1. An image processing device, comprising:a first lens;
a second lens, wherein the first lens and the second lens respectively captures at least one first image and at least one second image, and locations of the first lens and the second lens slightly differ;
a first microphone;
a second microphone, wherein the first microphone and the second microphone are respectively attached on the first lens and the second lens for capturing a first audio track and a second audio track;
a memory unit, for storing an image stitching program; and
a processor, for executing the image stitching program to perform the steps of:
utilizing the image processing device to receive a first video file and a second video file, wherein the first video file comprises the at least one first image and the first audio track, and the second video file comprises the at least one second image and the second audio track;
calculating delay time between a first acoustic feature of the first audio track and a second acoustic feature of the second audio track and synchronizing the first image and the second image according to the delay time;
converting the synchronized first image and synchronized the second image into a first adjusted image and a second adjusted image, respectively; and
performing an image stitching process on the first adjusted image and the second adjusted image to generate a stitched image.

US Pat. No. 10,116,879

METHOD AND APPARATUS FOR OBTAINING AN IMAGE WITH MOTION BLUR

Alcatel Lucent, Boulogne...

1. Method for obtaining an image containing a portion with motion blur, comprising:controlling at least one camera to take a first, second and third picture in a determined order of an object and a background, such that said first picture is taken with a first exposure time, said second picture with a second exposure time, and said third picture with a third exposure time, said second exposure time being longer than said first and said third exposure time, such that said second picture contains a blurred image of the background and/or the object if said object and/or said background is moving with respect to said at least one camera;
generating a final image containing at least a portion of said blurred image of the second picture as well as a portion derived from said first and/or third picture using said first, second and third picture,
wherein generating of the final image comprises:
using the first and the third picture to determine a shape and a position of the object in said first and said third picture;
isolating the at least a portion of the blurred image from the second picture, using the position and shape of the object in the first and third picture; and
combining the isolated at least a portion of the blurred image with a portion derived from the first and/or third picture to obtain the final image.

US Pat. No. 10,116,877

IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD

Canon Kabushiki Kaisha, ...

1. An image processing apparatus comprising:one or more processors; and
a memory storing instructions which, when the instructions are executed by the one or more processors, cause the image processing apparatus to function as:
an obtaining unit configured to obtain a first image and a second image;
a determination unit configured to determine a partial area of the first image as a composite area to be combined with the second image; and
a combining unit configured to combine the second image with the composite area,
wherein the determination unit determines the composite area based on distance information with regard to a plurality of partial areas of the first image, and
wherein the determination unit further sets a prohibited area in the first image, and does not set, among the plurality of partial areas, a partial area that overlaps the prohibited area as the composite area.

US Pat. No. 10,116,876

IMAGE CAPTURING METHOD AND APPARATUS, WITH REDUCED SATURATION AND IMPROVED SIGNAL-TO-NOISE RATIO BASED ON A DYNAMIC RANGE

CANON KABUSHIKI KAISHA, ...

1. An image capturing apparatus comprising:an image capturing unit including an image sensor that captures an object image and output image data; and
at least one processor that performs the operations of the following units by executing instructions stored in at least one memory;
an adjustment unit configured to adjust an exposure of the image capturing unit;
a detection unit configured to, in a case where the image data which is based on a signal outputted from the image sensor is saturated, detect a signal level corresponding to a highest level of incident light outputted from the image sensor after the exposure is reduced by the adjustment unit so as to reduce the saturation; and
a control unit configured to, in a case where the exposure is reduced, preferentially select a method having a faster response speed with respect to an exposure change instruction among a plurality of methods for changing the exposure,
wherein the control unit adjusts an exposure so as to reduce the saturation based on a dynamic range corresponding to before reducing the exposure and a maximum dynamic range that can be set in the image capturing apparatus.

US Pat. No. 10,116,875

IMAGE PICKUP APPARATUS AND METHOD FOR CONTROLLING THE SAME TO PREVENT DISPLAY OF A THROUGH IMAGE FROM BEING STOPPED WHEN A SHUTTER UNIT IS NOT COMPLETELY OPENED

Olympus Corporation, Tok...

1. An image pickup apparatus comprising:an image pickup device including an imaging plane on which imaging pixels are arranged;
a shutter unit which adjusts an amount of light incident upon the imaging plane;
an image pickup control unit which drives the shutter unit and picks up a still image by the image pickup device, captures a first through image by the image pickup device when the shutter unit is opened, and picks up a second through image including a light-shielded area by the image pickup device, the light-shielded area being formed by shielding part of light incident upon the imaging plane by the shutter unit when the shutter unit is partly light-shielded; and
a display control unit which causes a display device to display a through image using at least the first through image and the second through image,
wherein the display control unit superimposes a superimposing image on the light-shielded area of the second through image to cause the display device to display a through image based on the second through image on which the superimposing image is superimposed,
wherein the display control unit includes an advice display unit which superimposes an advice display on the second through image as the superimposing image during a period from when the still image is completely picked up until at least the shutter unit is opened.

US Pat. No. 10,116,874

ADAPTIVE CAMERA FIELD-OF-VIEW

MICROSOFT TECHNOLOGY LICE...

1. A display device, comprising:a display;
a movable mount;
a camera having an optical field-of-view;
an orientation sensor; and
a controller configured to receive image output from the camera, select, based on the image output, a first clipped field-of-view of the camera to thereby capture a target within the first clipped field-of-view, and in response to a change in an orientation of the camera identified by output from the orientation sensor, select, based on the image output and the output from the orientation sensor, a second clipped field-of-view to thereby capture the target within the second clipped field-of-view, the first and second clipped field-of-views being subsets of the optical field-of-view and being angularly offset from each other.

US Pat. No. 10,116,872

IMAGE CAPTURING APPARATUS, METHOD, AND PROGRAM WITH OPERATION STATE DETERMINATION BASED UPON ANGULAR VELOCITY DETECTION

Sony Corporation, Tokyo ...

1. An image capturing apparatus comprising:an angular velocity detection unit configured to respectively detect angular velocities of movement of the image capturing apparatus at a plurality of times;
an operation determination unit configured to determine a panning operation state of the image capturing apparatus based on the detected angular velocities at the plurality of times, the determined panning operation state being one of a plurality of predetermined classifications of panning operation states; and
a zoom control unit configured to perform zoom control based on the determined panning operation state.

US Pat. No. 10,116,871

TUNNEL LINING SURFACE INSPECTION SYSTEM AND VEHICLE USED FOR TUNNEL LINING SURFACE INSPECTION SYSTEM

WEST NIPPON EXPRESSWAY EN...

1. A tunnel lining surface inspection system wherein, while a vehicle is travelling in a tunnel, a tunnel lining surface image is photographed and is processed into an image used for inspecting the tunnel lining surface, the system comprising:a plurality of line sensors mounted in the vehicle, having a photography range of one side face in both side faces of the tunnel lining surface, which photography images of each area along a circumferential direction of the tunnel lining surface,
a fixing member mounted in a lodging space of the vehicle, on which the plurality of line sensors arranged along the circumferential direction of the tunnel lining surface and fixed so that the one side face in the both side faces of the tunnel lining surface can be photographed,
a drive axis mounted in the fixing member for fixing the plurality of line sensors to a first photography position where one side face in the both side faces of the tunnel lining surface can be photographed and for fixing the plurality of line sensors to a second photography position where the other side face in the both side faces of the tunnel lining surface can be photographed, which rotates the fixing member in the circumferential direction of the tunnel lining surface,
a first image processing unit capturing imaging data having been photographed by the plurality of line sensors, and
a second image processing unit processing the imaging data having been captured in the first image processing unit, wherein
the first image processing unit, while the plurality of line sensors being fixed in the first photography position after the drive axis being driven to the left and the fixing member being rotated to the left side in the circumferential direction of the tunnel lining surface, performs processing of capturing a first imaging data having been photographed by the plurality of line sensors, showing one side face in the both side faces of the tunnel lining surface, and, while the plurality of line sensors being fixed in the second photography position after the drive axis being driven to the right and the fixing member being rotated to the right side in the circumferential direction of the tunnel lining surface, performs processing of capturing a second imaging data having been photographed by the plurality of line sensors, showing the other side face in the both side faces of the tunnel lining surface, and
the second image processing unit performs processing of selecting the imaging data forming the identical span of the tunnel lining surface in the first imaging data and the second imaging data according to each span of the tunnel lining surface, and performs image synthesis processing to obtain the images showing both side faces of the tunnel lining surface according to each span of the tunnel lining surface.

US Pat. No. 10,116,869

IMAGE PICKUP APPARATUS AND DISPLAY CONTROL METHOD

Sony Corporation, (JP)

1. An image processing apparatus comprising:circuitry configured to:
detect an edge of an input image; and
control display of an output image based on the input image and a highlight signal, in which the highlight signal is generated based on the detected edge of the input image and the highlight signal is displayed in a color set for a predetermined range of a level of an edge that a detection level of the detected edge is within.

US Pat. No. 10,116,868

DISPLAY-INTEGRATED USER-CLASSIFICATION, SECURITY AND FINGERPRINT SYSTEM

QUALCOMM Incorporated, S...

1. An apparatus comprising:an electronic display, having a display cover glass with a front surface that includes a viewing area, and a fingerprint reading area within the viewing area;
a first planar light guide; and
at least one photosensing element configured to:
detect received scattered light, the received scattered light resulting from interaction of light with an object in at least partial optical contact with the front surface within the fingerprint reading area;
register, within a field of view of the photo sensing element, multiple images of the object, each of the multiple images corresponding to light that is scattered at a respective angle from the object and that undergoes a respective number of internal reflections within the first planar light guide before being detected by the photosensing element; and
output, to a processor, image data of the multiple images; wherein
the respective angle and the respective number of internal reflections is different for each of the multiple images; and
the processor is configured to recognize, from the image data, a fingerprint of a user of the electronic display.

US Pat. No. 10,116,867

METHOD AND APPARATUS FOR DISPLAYING A LIGHT FIELD BASED IMAGE ON A USER'S DEVICE, AND CORRESPONDING COMPUTER PROGRAM PRODUCT

Thomson Licensing, Issy-...

1. A method for displaying at least one light field based image on a user's device, wherein the method comprisesdisplaying said image focused according to at least one focusing parameter determined as a function of a movement of said device by a user,
wherein said displayed image is a slice image determined as an intersection of a focal stack with an intersection plane depending on at least one movement parameter of said device
wherein said focal stack comprises a set of focused images of a scene, where two consecutive focused images are spaced a sampling interval apart from each other in the focal stack, and wherein the method also comprises:
adjusting said sampling interval as a function of a layout of said scene;
determining the focal stack as the set of consecutive focused images spaced an adjusted sampling interval apart from each other.

US Pat. No. 10,116,864

IMAGING APPARATUS, IMAGING DISPLAY CONTROL METHOD, AND PROGRAM

Sony Corporation, Tokyo ...

1. An image processing apparatus for controlling an image capturing apparatus, the image processing apparatus comprising:a memory; and
a processor configured to
control, during a capturing operation of images by the image capturing apparatus, display of an area indication indicating a range of an area for moving the image capturing apparatus, at least part of the images captured within the range being used for generating a synthetic image having a field of view wider than that of the images,
control, during the capturing operation, display of a reference position indication indicating a position within the range of an identified subject identified by user operation with the area indication associated with the synthetic image, and
display an instruction indicating a direction that the image capturing apparatus should be moved based on the position of the subject.

US Pat. No. 10,116,863

SCANNING WITH FRAME AVERAGING

Goodrich Corporation, Ch...

1. A method of obtaining image data comprising:scanning an imaging area with an imaging device while obtaining multiple overlapping images of the imaging area; and
transforming the overlapping images by performing frame averaging on the overlapping images to produce at least one enhanced image of the imaging area, wherein transforming the overlapping images by performing frame averaging is performed automatically at a coarse level to produce the at least one enhanced image, and further comprising:
transforming the overlapping images by performing super resolution frame averaging on at least one portion of the at overlapping images to produce at least one super resolution image of the imaging area wherein the at least one super resolution image has a finer sampling than the at least one enhanced image.

US Pat. No. 10,116,862

IMAGING APPARATUS

OLYMPUS CORPORATION, Tok...

1. An image generation apparatus comprising:a first imaging circuit that acquires first image data;
a second imaging circuit that acquires second image data;
a control circuit that searches a region corresponding to the first image data from the second image data;
a designating circuit that limits a region in the second image data corresponding to the first image data by a touch operation designating a limited region in the second image data corresponding to the first image data; and
a communication circuit that is provided in the second imaging circuit, transmits, upon receipt of an information acquiring operation, information obtained by analyzing the limited region or the corresponding region in the second image data to a server, and receives information relating to the first image data from the server.

US Pat. No. 10,116,861

GUIDED IMAGE CAPTURE USER INTERFACE

Ricoh Company, Ltd., Tok...

1. A computer-implemented method comprising:generating a first user interface configured to receive and present product information for an item including dimensions of the item;
receiving a first image;
generating a second user interface to present a template, the template including a bounding box sized to match the dimensions of the item, the second user interface configured to present the bounding box overlaid over a second image;
receiving input to capture a portion of the second image within the bounding box;
responsive to the input to capture the portion of the second image, generating a third user interface to present the first image and the captured portion of the second image as variants of a face of the item; and
storing the captured portion of the second image as a variant of the face of the item and the information of the item in a database.

US Pat. No. 10,116,860

IMAGING OPERATION GUIDANCE DEVICE AND IMAGING OPERATION GUIDANCE METHOD

OLYMPUS CORPORATION, Tok...

1. An imaging operation guidance device, comprising:an image sensor that obtains a current image;
an attitude sensor that measures motion of the image sensor;
a memory that stores at least one previous image and an operation history for the image sensor; and
a controller that is communicatively coupled to the image sensor, the attitude sensor and the memory, wherein the controller:
stores measurements from the attitude sensor in the memory,
identifies an object of interest that is located in the at least one previous image that is missing from the current image, and
determines guidance instructions for obtaining a future image based on the operation history and the measurements from the attitude sensor, wherein the guidance instructions are determined to restore the object of interest to the future image.

US Pat. No. 10,116,859

IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD THAT PRESENT ASSIST INFORMATION TO ASSIST PHOTOGRAPHING

OLYMPUS CORPORATION, Tok...

1. An image processing apparatus comprising:a display;
a memory; and
a hardware processor which, under control of a program stored in the memory, controls execution of processes comprising:
an image acquisition process which acquires image data;
a photographic information acquisition process which acquires photographic information concerning the image data;
a scene/subject discrimination process which discriminates a photographic scene or a subject in the image data based on the photographic information;
an assist information retrieval process which retrieves assist information concerning a lens in accordance with a discrimination result of the photographic scene or the subject;
a lens information acquisition process which acquires lens information which is information indicating a relationship between a corresponding lens and a user;
an assist information priority setting process which sets a priority of pieces of assist information to be displayed on the display in accordance with the acquired lens information; and
a display process which displays the retrieved assist information on the display,
wherein the assist information comprises lens-related assist information which includes at least one of a sample image showing an example corresponding to the lens, a type of the lens used to acquire the sample image, a specification of the lens used to acquire the sample image, and a setting of the lens used to acquire the sample image,
wherein the lens information includes at least one of information indicating whether the corresponding lens is mounted in an imaging apparatus which acquires the image data, information indicating that the corresponding lens has been mounted in the imaging apparatus which acquires the image data, and information indicating whether the user possesses the corresponding lens, and
wherein the lens information further includes information indicative of a time of purchasing the corresponding lens, information indicative of a time of mounting the corresponding lens in the imaging apparatus for a first time, and information indicative of a number of pieces of image data acquired by using the corresponding lens.

US Pat. No. 10,116,858

IMAGING APPARATUS, CONTROL METHOD THEREOF, PROGRAM, AND RECORDING MEDIUM

Canon Kabushiki Kaisha, ...

1. An imaging apparatus comprising:an optical system that includes a focus adjustment lens that operates to move forward and backward in an optical axis direction in a predetermined movable area;
an imaging element that has an imaging plane capable of being curved and that captures an image of a subject formed via the optical system;
an evaluation unit that determines an evaluation value indicating a degree of in-focus of an image signal output from the imaging element based on the image signal;
an adjustment unit that adjusts, based on the evaluation value, a position of the focus adjustment lens to, among positions in the predetermined movable area, a position with the highest evaluation value; and
a control unit that performs control of the curvature of the imaging plane for correcting an image plane curve in the optical system and that performs control of the curvature of the imaging plane for bringing the image signal into focus, wherein
in a case where the adjustment unit adjusts the position of the focus adjustment lens to an end portion of the predetermined movable area, the control unit performs the control of the curvature of the imaging plane for bringing the image signal into focus on a priority basis.

US Pat. No. 10,116,857

FOCUS ADJUSTMENT APPARATUS, CONTROL METHOD OF FOCUS ADJUSTMENT APPARATUS, AND IMAGING APPARATUS

Canon Kabushiki Kaisha, ...

1. A focus adjustment apparatus comprising:an imaging unit configured to convert light from an optical system to an electric signal by photoelectric conversion and output an image signal for imaging and a pair of parallax image signals in a focus detection area;
a focus detection unit configured to detect a defocus amount using the pair of parallax image signals;
a control unit configured to control adjustment of a focus position of the optical system based on the defocus amount;
a first determination unit configured to determine whether the imaging unit is imaging a subject with a repetitive pattern in the focus detection area; and
a second determination unit configured to determine whether a degree of image blurring is equal to or more than a predetermined degree of blurring using at least one of the image signal for imaging and the pair of parallax image signals, wherein
when the first determination unit determines that the imaging unit is imaging a subject with a repetitive pattern in the focus detection area and the second determination unit determines that the degree of image blurring is equal to or more than the predetermined degree of blurring, the control unit moves a focus lens in the optical system to acquire a new defocus amount.

US Pat. No. 10,116,856

IMAGING APPARATUS AND IMAGING METHOD FOR CONTROLLING A DISPLAY WHILE CONTINUOUSLY ADJUSTING FOCUS OF A FOCUS LENS

Olympus Corporation, Tok...

1. An imaging apparatus that carries out a focus adjustment operation by moving a focus lens based on an image signal of an image sensor for forming a subject image, comprising:a focus controller that generates an evaluation value by extracting given signal components from the image signal, and carries out focus adjustment by calculating position of the focus lens where the evaluation value becomes a peak;
a display that displays an image based on image data generated from the image signal of the image sensor; and
a controller that executes to display an image using the display by generating image data based on an image signal that has been acquired during a focus adjustment operation where continuous focus adjustment is executed by the focus controller, wherein
the controller, as initial image display after commencement of the continuous focus adjustment operation, executes display using the display based on image data acquired when a movement position of the focus lens is within a predetermined vicinity of a predicted in-focus position that is based on a history of at least one past in-focus position of the focus lens when an in-focus position was reached in the past, from among image data that has been acquired during the focus adjustment operation, and
from commencement of the continuous focus adjustment operation until the movement position of the focus lens is within the predetermined vicinity of the predicted in-focus position, an image based on image data generated from the image signal is not displayed on the display section.

US Pat. No. 10,116,855

AUTOFOCUS METHOD FOR MICROSCOPE AND MICROSCOPE COMPRISING AUTOFOCUS DEVICE

CARL ZEISS MICROSCOPY GMB...

1. A microscope for imaging a sample, the microscope comprising:an image detector,
an objective, which has a focal plane lying in a sample space and images the sample space onto the image detector, wherein the position of the focal plane in the sample space is adjustable, and
an autofocus device having:
a light modulator which is adapted to generate a luminous modulation object that is intensity-modulated periodically along one direction and to additionally generate a luminous comparison object which extends along the direction of the modulation object,
an autofocus illumination optical unit which projects the modulation object and the comparison object to the sample space such that a projection of the modulation object and a projection of the comparison object are formed in the sample space,
a separate autofocus camera,
an autofocus imaging optical unit which images the projection of the modulation object and the projection of the comparison object onto the separate autofocus camera,
a control device which receives signals of the separate autofocus camera and is adapted:
to determine from the signals of the autofocus camera an intensity distribution which the projection of the image of the modulation object has along the direction, and an intensity distribution, which the projection of the image of the comparison object has along the direction, and
to evaluate the intensity distribution of the image of the projection of the comparison object, and to generate a corrected intensity distribution of the image of the projection of the modulation object based on the evaluated intensity distribution, in which corrected intensity distribution effects of reflectivity variations in the sample space are reduced or eliminated,
wherein the control device is further adapted to generate a focus control signal based on the corrected intensity distribution, which focus control signal defines the adjustment of the location of the focal plane when imaging the sample to the image detector.

US Pat. No. 10,116,854

PHOTOELECTRIC CONVERSION APPARATUS, SWITCHING AN ELECTRIC PATH BETWEEN A CONDUCTIVE STATE AND A NON-CONDUCTIVE STATE

1. A photoelectric conversion apparatus, comprising:a sensor cell unit comprising a photoelectric conversion unit, an amplification unit, a select switch, and a reset switch, the amplification unit comprising an input node and an output node;
an output line;
a signal processing unit; and
a control unit,
wherein the output node is electrically connected to the signal processing unit via the select switch and via the output line in this order,
wherein an electrical path between the output node and the output line is switched between a conductive state and a non-conductive state by the select switch,
wherein the input node is electrically connected to the photoelectric conversion unit, and is electrically connected to the signal processing unit via the reset switch and via the output line in this order,
wherein an electric path between the input node and the output line is switched between a conductive state and a non-conductive state by the reset switch,
wherein the control unit is configured to control the select switch to be in a conductive state in a period in which the reset switch is in a conductive state, and
wherein the sensor cell unit further comprises a switch, and a capacitance element electrically connected to the input node via the switch.

US Pat. No. 10,116,853

INTEGRATED SENSOR AND LENS ASSEMBLY WITH DIFFERENTIAL THREADS ADJUSTMENT

GoPro, Inc., San Mateo, ...

1. An integrated image sensor and lens assembly comprising:an image sensor substrate comprising an image sensor;
a lens mount affixed to the image sensor substrate and comprising a tube portion and a base portion, the tube portion having a channel and extending from the base portion in a direction of an optical axis substantially perpendicular to a focal plane, the lens mount comprising a first thread having a first pitch forming a first spiral on an inner surface of the tube portion;
a tube adapter extending into the channel of the tube portion, the tube adapter comprising a second thread on an exterior surface of the tube adapter, the second thread reciprocal to the first thread and having the first pitch, the first and second threads securing the tube adapter within the lens mount, the tube adapter further comprising a third thread having a second pitch different than the first pitch, the third thread forming a second spiral on an inner surface of the tube adapter; and
a lens barrel housing a set of lenses for directing light to the image sensor, the lens barrel having a threaded portion extending into the tube adapter, and the threaded portion comprising a fourth thread on an exterior surface of the lens barrel reciprocal to the third thread and having the second pitch, the third and fourth threads securing the lens barrel within the tube adapter,
wherein the lens barrel is configured to rotate about the optical axis,
wherein rotation of the tube adapter with respect to the lens barrel and the lens mount causes linear movement of the lens barrel and the lens mount with respect to the tube adapter in a same direction along the optical axis,
wherein a magnitude of a difference between the first pitch and the second pitch is smaller than the first pitch and the second pitch, and
wherein an upper subsection of the lens mount and a lower subsection of the lens barrel are unthreaded.

US Pat. No. 10,116,852

CONTROL DEVICE, CONTROL SYSTEM, CONTROL METHOD AND PROGRAM

Sony Corporation, Tokyo ...

1. A remote camera control device comprising:a communication circuit configured to transmit an operation request to an external camera device, and to selectively transmit a sensor information to the external camera device; and
a control circuit configured to access a product information of the external camera device, and in a case that the external device does not include a local sensor, cause the communication circuit to transmit the sensor information to the external camera device.

US Pat. No. 10,116,851

OPTIMIZED VIDEO DENOISING FOR HETEROGENEOUS MULTISENSOR SYSTEM

SAGEM DEFENSE SECURITE, ...

1. A method for temporal denoising of a sequence of images, said method comprising:/a/ capturing, by a first sensor, a sequence of first images corresponding to a given scene, each first image being divided into elements each associated with a corresponding area of said first image,
/b/ capturing, by a second sensor of a type different from the type of the first sensor, a sequence of second images corresponding to said given scene, each second image corresponding to a first image, each second image being divided into elements each associated with a corresponding area of said second image, each pair of element and associated area of the second image corresponding to a pair of element and associated area of the corresponding first image, and
/c/ obtaining, by calculation circuitry, a first sequence of images derived from the sequence of first images and a second sequence of images derived from the sequence of second images,
/d/ obtaining, by the calculation circuitry, for each area of each of the images of the first and second sequences of images, an associated weight,
/e/ obtaining, by the calculation circuitry, a first weighted sequence of images, in which each element of each image is equal to the corresponding element of the first sequence of images weighted by the weight associated with the area associated with said corresponding element, and a second weighted sequence of images, in which each element of each image is equal to the corresponding element of the second sequence of images weighted by the weight associated with the area associated with said corresponding element,
/f/ obtaining, by the calculation circuitry, a sequence of enhanced images resulting from combining sequences of images comprising the first weighted sequence of images and the second weighted sequence of images,
/g/ obtaining, by the calculation circuitry, a motion estimation based on the obtained sequence of enhanced images,
/h/ obtaining, by the calculation circuitry, based on the calculated motion estimation, a spatial alignment of the images of a sequence of images to be displayed derived from sequences of images corresponding to the given scene and comprising the sequence of first images and the sequence of second images,
/i/ a temporal denoising, by the calculation circuitry, based on the determined spatial alignment of the sequence of images to be displayed.

US Pat. No. 10,116,845

IMAGING DEVICE

Ricoh Company, Ltd., Tok...

1. An imaging device comprising:an imaging unit having an imager configured to image a subject, and a holder configured to hold the imager at one end thereof;
a housing including a recess formed in a first surface thereof, and configured to house the imaging unit, the housing being a housing for a video conferencing device; and
a hinge having a hinge member housed in the recess pivotally coupled to the housing around an axle extending approximately in parallel with the first surface inside the recess of the housing, wherein
the imaging unit pivots around the axle via the hinge between a housing position at which the imaging unit is housed inside the recess of the housing and a projecting position at which the imaging unit is projected from the recess of the housing,
wherein:
the imager includes an imaging element having a rectangular shape with a 16:9 aspect ratio, a lens configured to introduce external light into the imaging element, and a lens hood mounted at an outer periphery of the lens, the imaging element disposed inside of the housing,
the lens hood projects from a surface of the lens by a distance to allow the imager to introduce light for imaging a subject from the lens into the imaging element and to block unnecessary light introduced from the lens into the imaging element,
a shape of the lens hood is substantially rectangular, and has an aspect ratio substantially the same as the aspect ratio of the imaging element, and
the substantially rectangular shape of the lens hood has substantially the same shape as the rectangular shape of the imaging element in both a horizontal and a vertical dimension.

US Pat. No. 10,116,844

CAMERA MODULE HAVING BASE WITH MENTAL SUBSTRATE, CONDUCTIVE LAYERS AND INSULATION LAYERS

TDK TAIWAN CORP., Yangme...

1. A camera module, comprising:a lens driving mechanism;
a lens unit, disposed on the lens driving mechanism;
a circuit board, comprising:
a metal member;
a metal wire;
an insulation layer, disposed between the metal member and the metal wire; and
an image sensor, disposed on the circuit board and electrically connected to the metal wire, wherein the lens driving mechanism can drive the lens unit to move relative to the image sensor, and the image sensor can catch the light through the lens unit; and
a base, disposed between the image sensor and the lens unit, comprising:
a metal substrate;
a first conductive layer, electrically connected to the lens driving mechanism; and
a first insulation layer, disposed between the metal substrate and the first conductive layer.

US Pat. No. 10,116,840

ARRAY CAMERA, ELECTRICAL DEVICE, AND METHOD FOR OPERATING THE SAME

LG ELECTRONICS INC., Seo...

1. A method for operating an array camera comprising a plurality of camera modules, the method comprising:acquiring images through the camera modules;
when a size of a first object present in the acquired images is equal to or greater than a predetermined size, extracting a first image acquired by a first camera module and a second image acquired by a second camera module, the first camera module and the second camera module being two adjacent camera modules selected from among the plurality of camera modules;
calculating first distance information regarding the first object based on the first image and the second image; and
when a size of a second object present in the acquired images is less than the predetermined size, extracting a third image acquired by a third camera module and a fourth image acquired by a fourth camera module, the third camera module and the fourth camera module being two spaced apart camera modules selected from among the plurality of camera modules;
calculating second distance information regarding the second object based on the third image and the fourth image.

US Pat. No. 10,116,837

SYNCHRONIZED LOOK-UP TABLE LOADING

Hewlett-Packard Developme...

1. A printing device comprising:a processor to process a print job that is received from a computing device;
processor memory operatively connected to the processor and comprising multiple buffers, each buffer to store a look-up table;
additional memory configured to store a plurality of look-up tables for processing the print job; and
a memory controller operatively connected to the additional memory, the memory controller to:
in response to processing of the print job reaching a buffer trigger row of the print job, use look-up metadata stored in the additional memory to identify a next look-up table from among the plurality of look-up tables, wherein the processing of the print job is performed using an initial look-up table of the plurality of look-up tables;
dynamically load the next look-up table into a next buffer of the processor memory while processor continues to process the print job using the initial look-up table in a current buffer of the processor memory; and
continue processing the print job using the next look-up table after a target row of the print job is reached.

US Pat. No. 10,116,836

IMAGE PROCESSING APPARATUS, IMAGE CAPTURING APPARATUS, LENS APPARATUS, IMAGE PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An image processing apparatus comprising:an acquirer configured to acquire information related to a lateral chromatic aberration; and
a corrector configured to correct an image to reduce the lateral chromatic aberration based on the information related to the lateral chromatic aberration,
wherein the information related to the lateral chromatic aberration includes a first component related to a design value, a second component related to a manufacturing error,
wherein each of the first component and the second component is a rotationally symmetric component.

US Pat. No. 10,116,835

INFORMATION PROCESSING APPARATUS AND METHOD THAT MANAGE LOG INFORMATION

Ricoh Company, Ltd., Tok...

1. An information processing apparatus, comprising:a first memory; and
a processor coupled to the first memory, and configured to
obtain log information related to a job having been executed in response to an instruction by a user, the log information including a management code selected by the user and user identification information of the user;
modify the obtained log information by modifying the user identification information included in the obtained log information such that the user is not specified by the log information; and
store the modified log information in a second memory,
wherein the modified user identification information is included in the modified log information stored in the second memory, and
wherein the user identification information that is not modified is not included in the modified log information stored in the second memory.

US Pat. No. 10,116,834

IMAGE READING APPARATUS AND METHOD, WITH A MOVABLE LIGHT REFLECTING SURFACE

PFU LIMITED, Kahoku-Shi,...

1. An image reading apparatus comprising:an image capturing device for capturing an image of a document;
a light source;
a movable light reflecting surface having a white color;
a driving device for moving the light reflecting surface between a first position at which the light reflecting surface reflects light from the light source and a second position at which the light reflecting surface does not reflect light from the light source; and
a control circuit for controlling the driving device to move the light reflecting surface,
wherein the control circuit determines whether an image obtained by the image capturing device is a white reference image and determines, as the first position, a position where the white reference image is detected when the control circuit moves the light reflecting surface from the second position to the first position; and determines, as the second position, a position where the light reflecting surface is moved by a predetermined distance from the first position without using an image obtained by the image capturing device, when the control circuit moves the light reflecting surface from the first position to the second position.

US Pat. No. 10,116,833

IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD AND PROGRAM FOR ANIMATION DISPLAY

Sony Semiconductor Soluti...

1. An image processing device comprising:a memory unit storing image data;
a reduction scaler unit configured to reduce image data of an input image or maintain a current size of the image data, and store the image data into the memory unit; and
an enlargement scaler unit configured to enlarge the image data stored in the memory unit or maintain a current size of the image data, and output the image data as image data of an output image,
wherein
the reduction scaler unit converts a resolution of the input image to an intermediate resolution in accordance with first parameters related to an image to be supplied from the enlargement scaler unit, the intermediate resolution being a resolution for performing writing on the memory unit, and
the enlargement scaler unit converts the intermediate resolution of a memory-held image read from the memory unit to a resolution of the output image, in accordance with second parameters related to an image to be supplied from the reduction scaler unit.

US Pat. No. 10,116,832

INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND RECORDING MEDIUM

Canon Kabushiki Kaisha, ...

1. A control method of an information processing device that communicates with a communication device and includes at least one processor configured to execute the control method, the method comprising:accepting a predetermined operation by a user;
not executing control to execute newly transmission processing for transmitting wirelessly, to the communication device by a first communication standard, information about an external device outside the communication device and outside the information processing device, and communicating with the communication device via the external device in a case where the predetermined operation is accepted, in a state that the external device is connected to the information processing device by a second communication standard different from the first communication standard and the communication device is connected to the external device by the second communication standard, and
communicating with the communication device via the external device after the control to execute newly the transmission processing is executed based on the predetermined operation in a case where the predetermined operation is accepted, in a state that the communication device is not connected to the external device by the second communication standard, the external device being connected to the information processing device by the second communication standard
wherein after the control to execute newly the transmission processing is executed, the communication device connects to the external device by the second communication standard based on the information about the external device, the information being transmitted to the communication device as a result of the transmission processing being executed newly.

US Pat. No. 10,116,831

MANAGEMENT SERVER CONFIGURED TO EXTRACT INFORMATION INDICATING AN AVAILABILITY OF AN IDENTIFIED IMAGE FORMING APPARATUS, INFORMATION PROCESSING METHOD, SYSTEM AND RECORDING MEDIUM

Ricoh Company, Ltd., Tok...

1. A management server comprising:a memory and a processor, the memory containing computer readable code that, when executed by the processor, configures the processor to,
authenticate a user of at least one image forming apparatus based on information on the user from an information processing apparatus,
accumulate print data from the information processing apparatus,
acquire availability information and history information from the at least one image forming apparatus, the availability information indicating whether the at least one image forming apparatus is online and idle, and the history information indicating a tally of past usage of the at least one image forming apparatus by the user,
generate a preferred list of preferred image forming apparatuses from among a plurality of image forming apparatuses connected to the management server based on the availability information and the history information,
acquire device information from the preferred image forming apparatuses,
transmit the device information to the information processing apparatus prior to receiving a printing request to print the accumulated print data such that the user is provided with the device information of the preferred image forming apparatuses prior to executing location-free (LF) printing from a user interface of one of the plurality of image forming apparatuses, and
perform the location-free (LF) printing by transmitting the accumulated print data to the one of the plurality of image forming apparatuses in response to receipt of the printing request from the one of the plurality of image forming apparatuses.

US Pat. No. 10,116,829

INFORMATION PROVIDING SYSTEM BY DATA RELAYING APPLICATION

STAR MICRONICS CO., LTD.,...

1. An information providing system using a data relaying application comprising a printing application which receives a first data generated by another application executed by a mobile, converts the first data into a second data for printing, and outputs the second data to a printer, the information providing system comprising:an application activating unit which issues an application binding command to activate the printing application in response to a print instruction given by a user of the mobile, the application binding command designating the printing application and including a predetermined information acquiring command designated according to an information acquisition parameter set by the user of the mobile;
a printing execution controlling unit of the printing application which controls execution of printing by the printer;
a print result information acquiring unit of the printing application which acquires a print result information from the printer, the print result information representing success or failure of the execution of printing:
an additional information acquiring unit of the printing application which acquires an additional information on at least one of the printer and the printing application according to the predetermined information acquiring command included in the application binding command; and
an information providing unit of the printing application which provides the mobile with the print result information acquired by the print result information acquiring unit and the additional information acquired by the additional information acquiring unit by displaying the print result information and the additional information together on a screen of the mobile.

US Pat. No. 10,116,828

IMAGE COMMUNICATION APPARATUS, CONTROL METHOD THEREOF, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An image communication apparatus capable of image communication to an external line and an extension line, the apparatus comprising:a memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
designate a transmission destination of image data,
append an external line number if the designated transmission destination is the external line,
transmit the image data in accordance with one of the designated transmission destination and the transmission destination to which the external line number is appended,
when a transmission of the image data is performed in accordance with the transmission destination to which the external line number is appended, individually record, as history information for the transmission, the designated transmission destination and the external line number,
set a number as the external line number;
register the transmission destination included in the history information to an address book if the external line number included in the history information and the set number match, and
display that the external line number is changed if the external line number included in the history information and the set number do not match when the history information is selected for the address book.

US Pat. No. 10,116,827

IMAGE FORMING APPARATUS

KYOCERA Document Solution...

1. An image forming apparatus comprising:a reading section configured to read a plurality of images from a document; and
an image forming section configured to form the plurality of read images on a sheet, wherein
the plurality of images include a first image having a first color and a second image having a second color that is different from the first color,
the image forming section forms the first image on a first main side of the sheet and the second image on a second main side of the sheet, the first main side being one of two opposite sides of the sheet, the second main side being the other of the two opposite sides of the sheet,
the first image shows a question,
the second image shows an answer to the question,
when the sheet is folded such that a part of the sheet covers the second image, the second image is visible at the first main side through the part of the sheet,
the image forming section forms the first image on the first main side and the second image on the second main side in such a manner that the first image and the second image visible at the first main side through the part of the sheet when the sheet is folded such that the part of the sheet covers the second image do not overlap each other and form the same content as the plurality of images, and
the image forming section forms a third image in a region of the first main side to prevent a mirror image of the second image from being visible at the first main side through the sheet when the sheet is not folded, the region of the first main side overlapping a region where the second image is formed, the third image covering and hiding the entirety of the mirror image of the second image.

US Pat. No. 10,116,826

METHOD AND APPARATUS FOR AUTOMATICALLY RESUMING A PRINT JOB FROM PORTABLE MEMORY DEVICE

Xerox Corporation, Norwa...

1. A method for automatically printing a document in a document printing system, comprising:detecting, by a processing device of a print device, a trigger event by determining that a portable memory device has become communicatively connected to a port of the print device;
upon detecting the trigger event, by the processing device:
accessing a document file stored in the portable memory device, wherein the document file comprises a digital representation of a document to be printed,
detecting whether a configuration file associated with the document file is stored in the portable memory device,
if the configuration file exists in the portable memory device, automatically printing the document file by:
determining that the configuration file contains information about an interrupted print job of the document file,
extracting, from the configuration file, at least a page number of the document at which an interruption of the interrupted print job occurred, and
causing a print engine of the print device to automatically resume the interrupted print job from the page number of the document at which the interruption occurred.

US Pat. No. 10,116,824

METHOD AND IMAGE FORMING APPARATUS FOR GENERATING WORKFLOW OF IMAGE FORMING JOB

S-Printing Solution Co., ...

1. A method of generating a workflow of an image forming job, the method comprising:providing a first list of selectable first functions;
receiving a user input for selecting a first function from the first list;
running an application for executing the selected first function to provide a user interface (UI) for receiving setting values for the selected first function;
storing the received setting values for the selected first function;
determining output data of the selected first function;
determining, based on the output data of the selected first function, a second list of selectable second functions that are continuously executable to the selected first function;
providing the second list;
receiving a user input for selecting a second function from the second list; and
generating a workflow to sequentially execute the selected first function based on the received setting values for the selected first function and the selected second function,
wherein the second list of selectable second functions is determined based on whether input data of the second functions corresponds to the output data of the selected first function.

US Pat. No. 10,116,823

CLEANING DEVICE THAT REMOVES TONER AND PAPER POWDER, AND IMAGE FORMING APPARATUS

KYOCERA Document Solution...

1. A cleaning device comprising:a removal roller rotating around a first rotary shaft extending widthwise of an image carrier while making contact with the image carrier to remove a toner and a paper powder remaining on the image carrier;
a collecting roller making contact with the removal roller while rotating around a second rotary shaft parallel to an axial direction of the first rotary shaft to collect the toner and the paper powder on the removal roller;
a blade extending in parallel to an axial direction of the second rotary shaft, the blade making contact with the collecting roller to scrape off the toner and the paper powder on the collecting roller; and
a toner storage section being partitioned from the removal roller and the collecting roller by a seal extending in parallel to the first rotary shaft and the second rotary shaft, the toner storage section storing the toner and the paper powder collected by the collecting roller and scraped off by the blade, wherein
the removal roller and the collecting roller have no relationship such that a rotation speed or a diameter of one of the removal roller and the collecting roller is an integral multiple of a rotation speed or a diameter of another one of the removal roller and the collecting roller,
provided on an outer circumferential surface of the collecting roller in a circumferential direction of the collecting roller are: a first outer circumferential region having a predefined first surface roughness and extending in the axial direction of the second rotary shaft; and a second outer circumferential region having a greater predefined second surface roughness than the first surface roughness and extending in the axial direction of the second rotary shaft, and
a width of the second outer circumferential region in the circumferential direction is smaller than a width of the first outer circumferential region in the circumferential direction.

US Pat. No. 10,116,822

OPTICAL SCANNING DEVICE AND IMAGE FORMING APPARATUS INCLUDING THE SAME

KYOCERA DOCUMENT SOLUTION...

1. An optical scanning device comprising:a housing having light emitting ports extending in a predetermined direction;
a transparent cover that closes the light emitting ports;
a cleaning member that slidably contacts with a surface of the transparent cover to clean the surface;
a holding member that holds the cleaning member; and
a movement mechanism that allows the holding member to reciprocally move along the transparent cover in the predetermined direction,
wherein the holding member has an inside/outside double structure including an inner boss member that receives power from the movement mechanism and an outer boss member that internally receives the inner boss member and is longer than the inner boss member, and
the outer boss member reaches a moving end and stops earlier than the inner boss member, and subsequently the inner boss member moves in the outer boss member, reaches the moving end and stops.

US Pat. No. 10,116,821

IMAGE FORMING APPARATUS WHICH CAN REDUCE POWER CONSUMPTION

Konica Minolta, Inc., Ch...

1. An image forming apparatus comprising:a hardware circuit for image forming, which includes an image forming unit to form images and an image forming control unit to control the image forming unit, and
a hardware circuit for communication, which includes a communication unit to perform communication with external devices and a communication control unit to control the communication unit, wherein
both the circuit for image forming and the circuit for communication have a common IP (Internet Protocol) address as an IP address published to users of the image forming apparatus, and
the circuit for communication further includes an electric power control unit to control electric power supply to the circuit for image forming and electric power supply to the circuit for communication, being independent of each other.

US Pat. No. 10,116,820

IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING SAME, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An image forming apparatus comprising:a processor; and
a memory storing instructions, when executed by the processor, causing the image forming apparatus to function as:
an input unit configured to input image data;
a printing unit configured to print an image based on the image data input by the input unit;
a control unit configured to determine if the image forming apparatus is operating in a first mode or a second mode,
wherein if the control unit determines the image forming apparatus is operating in a first mode then perform control to print by the printing unit an image generated from the image data input by the input unit, and
wherein if the control unit determines the image forming apparatus is operating in a second mode then print by the printing unit an image obtained by adding a predetermined pattern image to the image generated from the image data input by the input unit; and
an operation unit including a display and accepting unit,
wherein if the image forming apparatus operates in the second mode, display a confirmation screen to a user prior to printing to accept selection regarding whether to perform printing in the second mode in response to operation performed to start printing the image.

US Pat. No. 10,116,819

DOCUMENT CONVEYING APPARATUS

PFU LIMITED, Kahoku-Shi,...

1. A document conveying apparatus comprising:a document tray;
a driving module for generating a first driving force;
a first conveying roller for conveying a document stacked at a lowermost position, which is one of a plurality of documents stacked on the document tray;
a second conveying roller, provided at a downstream side with respect to the first conveying roller in a document conveying direction for conveying said document stacked at the lowermost position;
a separation roller provided at the downstream side with respect to the second conveying roller in the document conveying direction for separating the document from the plurality of stacked documents;
a driving force transmission mechanism for transmitting the first driving force to a driving shaft of the first conveying roller, a driving shaft of the second conveying roller, and a driving shaft of the separation roller;
a first blocking mechanism provided between the first conveying roller and the driving shaft of the first conveying roller for blocking a second driving force transmitted to the first conveying roller by the driving shaft of the first conveying roller so that the second driving force is not transmitted to the first conveying roller, after a rear edge of the document conveyed by the first conveying roller passes the first conveying roller and a next document to be subsequently conveyed comes into contact with the first conveying roller; and
a third conveying roller provided at the downstream side with respect to the separation roller in the document conveying direction, wherein
a period of time for blocking the second driving force is set to be equal to or less than a period of time for conveying the document for a distance between the separation roller and the third conveying roller.

US Pat. No. 10,116,817

IMAGE FORMING APPARATUS AND IMAGE FORMING SYSTEM INCORPORATING SAME

RICOH COMPANY, LTD., Tok...

1. An image forming apparatus comprising:a display including a touch panel display screen to display a preview image before an image is formed on a recording medium;
an operation position detector to detect a series of operation positions on the touch panel display screen displaying the preview image, the detected series of operation positions forming a handwritten additional image;
a display controller to display on the display screen, a composite image including both the preview image and the handwritten additional image superimposed on the preview image; and
an image forming unit to form, on the recording medium, a post-addition image corresponding to the composite image, including both the preview image and the handwritten additional image, displayed on the display screen,
wherein each of a vertical length and a horizontal length of the display screen is equal to or greater than a length of a long side of a maximum size recording medium on which an image is to be formed by the image forming unit.

US Pat. No. 10,116,815

DISPLAY APPARATUS THAT ENSURES REDUCED OPERATION LOAD OF USER, AND IMAGE FORMING APPARATUS

KYOCERA Document Solution...

1. A display apparatus comprising:a display that has a touch panel function;
a first display controller that performs a control such that a first button image and a first character image are displayed on the display, the first button image having a first region enclosed by a first line, the first button image detecting a touch within the first region to be transferred to a setting input screen for receiving a predetermined setting, the first character image being arranged in the first region, the first character image indicating a content of the first button image;
a detection unit that detects a request for an enlargement of a display of the first button image by an operation on the display;
a determining unit that determines whether an enlargement ratio is equal to or more than a predetermined value when the request for the enlargement of the display of the first button image is detected by the detection unit; and
a second display controller that performs a control such that a second button image and a second character image are displayed on the display when the determining unit determines that the enlargement ratio is equal to or more than a predetermined value, the second button image being located on an inner side of the first region enlarged with the enlargement ratio, the second button image having a second region enclosed by a second line, the second button image detecting a touch within the second region to accept the input of the predetermined setting on the setting input screen, the second character image indicating a content of the predetermined setting in the first region.

US Pat. No. 10,116,814

ELECTRONIC APPARATUS AND DISPLAY CONTROL METHOD FOR ELECTRONIC APPARATUS

Seiko Epson Corporation, ...

11. A display control method for an electronic apparatus which is able to communicate with an external server via a network,wherein the electronic apparatus includes a communication interface which receives external server screen information from the external server, a printing section which executes printing on a medium, an operable mechanism which accommodates the medium prior to printing and includes a medium accommodating section which is attachable and detachable with respect to a main body of the electronic apparatus, a display which displays a screen, a control device which controls the display state of the display, and a memory which stores internal screen information in advance, the external server screen information being screen information of an operation screen for controlling the electronic apparatus by a user operation, and
the control device is provided with an internal screen information output circuit that outputs the internal screen information which is screen information that relates to the screen which is displayed on the display, the internal screen information being received from an internal server and not being received from the external server,
the display control method comprising:
causing the control device to execute
a first display step of displaying a first screen that is based on the external server screen information that is received from the external server on the display,
a second display step of displaying a second screen that is based on the internal screen information which is received from the internal server on the display,
a state change sensing step of sensing, by a state change sensing circuit, a change in state of the operable mechanism that is caused by an operation of the operable mechanism,
a switching step of switching, by a display control circuit, from the first display step to the second display step such that the display control circuit ends the first display step to end displaying of the first screen and starts the second display step to display the second screen upon the change in state of the operable mechanism being sensed in the state change sensing step while the first screen is displayed on the display,
a step of acquiring, by the display control circuit, the internal screen information which relates to a screen according to the aspect of the change in state of the operable mechanism from the internal screen information output circuit, and displaying the second screen that is based on the internal screen information on the display when the second display step is executed according to the execution of the switching step, the internal screen information being screen information of a setting screen for setting an attribute of the medium that is set in the medium accommodating section whose change in state is sensed while executing the first display process.

US Pat. No. 10,116,810

IMAGE-OUTPUTTING APPARATUS FOR OUTPUTTING NOTIFICATION IMAGE SENT FROM SERVER

Brother Kogyo Kabushiki K...

1. A server comprising;a network interface configured to communicate with an image-outputting apparatus, the image-outputting apparatus being configured to receive user operations including a login operation, the login operation being performed by a user to which an account is assigned, the image-outputting apparatus being configured to determine whether or not the login operation is accepted, the image-outputting apparatus being configured to determine what type of machine operation is permitted for the logged user on the basis of the account used for the accepted login operation, the image-outputting apparatus being configured to transmit query information and device information to the server, the query information being for querying the server whether notification data to be transmitted to the image-outputting apparatus exists, the device information including a login information indicating the account used by the user logged in to the image-outputting apparatus;
a storage capable of storing the notification data for transmission to the image-outputting apparatus; and
a controller configured to:
receive the query information via the network interface;
in response to receiving the query information, (a) determine whether or not the notification data is stored in the storage;
in response to determining in (a) that the notification data is stored in the storage, receive the device information via the network interface;
(b) determine whether or not the login information included in the device information indicates a specific account, the specific account being assigned to an authorized user; and
in response to determining in (b) that the login information included in the device information indicates the specific account, (c) transmit an output instruction to the image-outputting apparatus via the network interface, the output instruction being for controlling the image-outputting apparatus to output a notification image represented by the notification data.

US Pat. No. 10,116,807

METHOD AND APPARATUS FOR MANAGING SUBSCRIPTION TO POLICY COUNTERS

Telefonaktiebolaget LM Er...

1. A method, performed in a Policy and Charging Rules Function (PCRF), for managing subscription to policy counters maintained at an Online Charging System (OCS), wherein the PCRF is operable to communicate with the OCS over an Sy reference point, the method comprising:receiving a Multiple Users subscription trigger from a network operator, the Multiple Users subscription trigger identifying a reference network policy and a subject network policy; and
sending a Spending Limit Request (SLR) command to the OCS, the SLR command specifying an identifier of a subject policy counter for the subject network policy and specifying application of the SLR command with respect to the subject policy counter to all ongoing Sy sessions between the PCRF and the OCS which already include a subscription to a policy counter for the reference network policy.

US Pat. No. 10,116,805

APPARATUSES AND METHODS FOR DETERMINING USAGE OF A WIRELESS COMMUNICATION SERVICE

10. A method comprising:receiving user input at a user interface displayed by a wireless device, the wireless device configured to access a communication service, wherein the user input designates a user profile; and
after receiving the user input, receiving a selection at the wireless device to initiate a session of the communication service, and responsive to the selection:
generating, at the wireless device, a message associated with the session of the communication service, wherein the message includes a particular identifier of the user profile, wherein the particular identifier indicates that the session is to be billed to a first billing account of a plurality of billing accounts associated with the wireless device, each billing account of the plurality of billing accounts associated with a respective identifier; and
transmitting the message from the wireless device via a wireless network to a network element, wherein the messages is configured to instruct the network element to initiate the session and to cause the session to be billed to the first billing account based on the particular identifier in the message.

US Pat. No. 10,116,804

SYSTEMS AND METHODS FOR POSITIONING A USER OF A HANDS-FREE INTERCOMMUNICATION

Elwha LLC, Bellevue, WA ...

1. A hands-free intercommunication system for automatically connecting a user to an entity of interest, the system comprising:a user-tracking sensor that determines a location of the user;
a directional microphone that measures vocal emissions by the user, wherein the measured vocal emissions include identifying the entity of interest with which the user would like to communicate;
a communication interface that communicatively couples the directional microphone and a directional sound emitter to a communication device of the entity of interest, wherein the communication interface determines whether to couple the communication device of the entity of interest to the user based on the location of the user; and
a directional sound emitter that delivers audio received at the communication device of the entity of interest to the user, wherein the directional sound emitter emits audio received the entity of interest using a plurality of inaudible ultrasonic sound waves that frequency convert to produce audible audio corresponding to the received audio the entity of interest for the user at the location of the user.

US Pat. No. 10,116,803

SYSTEM AND METHOD OF REROUTING A TOLL FREE TELEPHONY CALL IN THE EVENT OF THE FAILURE TO CONNECT TO THE TARGET TELEPHONY STATION

1. A method of re-routing a toll free telephony call by a telephony service provider computing machine (Provider Machine) comprising:populating a first routing database with a plurality of target station identifiers, each associated with a target telephony station, and at least one carrier identification code (CIC) routing code associated with each said target station identifier;
populating an auxiliary routing database with one or a plurality of said target station identifiers that match at least one or more said target station identifiers in said first routing database and further populating said auxiliary routing database with one or plurality of alternative routing codes per said target station identifier, where at least one of said alternative routing codes is an alternative routing code different from said CIC routing code in said first routing database;
receiving at said Provider Machine said toll free telephony call containing a called target station identifier;
having said Provider Machine automatically access from said first routing database one or a plurality of said CIC routing codes associated with said called target station identifier;
having said Provider Machine automatically access from said auxiliary routing database one or a plurality of said routing codes associated with said called target station identifier;
using one said CIC routing code accessed from said first routing database as a primary routing code to automatically route said toll free telephony call from said Provider Machine to an electronic routing machine associated with said primary routing code;
routing said toll free telephony call from said electronic routing machine to said target telephony station associated with said called target station identifier;
receiving a call completion status indicator at said Provider Machine from said electronic routing machine; and
using as an alternate routing code at least one said routing code differing from said primary routing code to automatically re-route said toll free telephony call from said Provider Machine to an alternate electronic routing machine associated with said alternate routing code in the event said call completion status indicator reveals to the Provider Machine said toll free telephony call did not successfully connect to said target telephony station.

US Pat. No. 10,116,802

IP CARRIER PEERING

1. A system to interconnect carrier communication systems, the system comprises:a communication client, the communication client configured to:
receive a request, including an e.164 number, to connect an IP (Internet protocol) call from equipment of a first carrier to equipment of a second carrier;
modify a query to a private ENUM (tElephone NUmber Mapping) to include an intercarrier ENUM apex-based domain with an associated DNS (domain name server) forwarding zone, wherein the associated DNS forwarding zone includes a primary internet address of a tier 2 ENUM of the second carrier;
automatically forward the modified query to the equipment of the second carrier to retrieve a routing record from the second carrier; and
route the IP call to the equipment of the second carrier using the routing record.

US Pat. No. 10,116,799

ENHANCING WORK FORCE MANAGEMENT WITH SPEECH ANALYTICS

1. A method for generating an agent work schedule, the method comprising:performing, by a speech or text analytics module hosted on a processor, analytics on a plurality of recorded interactions with a plurality of contact center agents;
detecting, based on the analytics, specific utterances in the recorded interactions;
classifying, on the processor, the recorded interactions into a first plurality of interaction reasons and a first plurality of interaction resolution statuses, wherein the classifying is based on the detected specific utterances;
computing, on the processor, based on the classifying of the recorded interactions, a first agent effectiveness of a first agent and a second agent effectiveness of a second agent of the plurality of agents, wherein the first agent effectiveness and the second agent effectiveness correspond to an interaction reason of the first interaction reasons, the first agent effectiveness being higher than the second agent effectiveness;
forecasting, on the processor, a demand of the contact center agents for a first time period for handling interactions classified with the interaction reason;
generating, on the processor, the agent work schedule for the first time period based on the forecasted demand and the first agent effectiveness and the second agent effectiveness, wherein the agent work schedule includes a first number of agents scheduled to work during the first time period that is larger than a second number of agents scheduled to work during the first time period, the first number of agents including the first agent with the first agent effectiveness, and the second number of agents including the second agent with the second agent effectiveness;
detecting an interaction having the interaction reason during the first time period;
routing, by an electronic switch, the detected interaction to a particular agent selected from the first and second number of agents;
analyzing, on the processor, a second plurality of recorded interactions, the analyzing including classifying the second plurality of recorded interactions into a second plurality of interaction reasons and a second plurality of interaction resolution statuses; and
forecasting, on the processor, a demand of the contact center agents for a second time period for handling the second interaction reasons without forecasting a demand for handling an obsolete interaction reason included in the first plurality of interactions reasons, the second time period being different from the first time period.

US Pat. No. 10,116,794

DETERMINING AN ACTIVE STATION BASED ON MOVEMENT DATA

1. A method for determining an active contact center station for an agent in a contact center system, wherein the contact center system comprises a plurality of contact center stations, based on sensor data, the method comprising the steps of:receiving, by a processor of the contact center system, movement data from a mobile device associated with the agent;
matching, by the processor of the contact center system, the movement data from the mobile device associated with the agent with a previously stored pattern of movement associated with one of the plurality of contact center stations associated with the agent; and
automatically updating, by the processor of the contact center system, one of the plurality of contact center stations to active, wherein the update is based on the movement data and matched pattern of movement, and wherein the agent is not logged into the contact center system.

US Pat. No. 10,116,793

METHOD AND SYSTEM FOR LEARNING CALL ANALYSIS

1. A method for communication learning in a telecommunication system, wherein the telecommunication system comprises at least an automated dialer, a telephony service module, a database, and a media server operatively coupled over a network for exchange of data there between, the method comprising the steps of:a. selecting, by the automated dialer, a contact from the database, the contact being associated with a telephone number and one or more acoustic fingerprints;
b. retrieving, by the telephony service module, from the database, the one or more acoustic fingerprints and the telephone number associated with the contact;
c. initiating, by the automated dialer, a communication with the contact based on the telephone number, the communication generating audio;
d. analyzing, by the media server, the audio for matches to any of the one or more of the acoustic fingerprints, wherein matches are not identified;
e. routing, via an electronic routing device by the telephony service module, the communication to an agent device associated with an agent for determining whether or not the communication comprises a speech recording;
f. receiving, from the agent device, a signal indicating the communication comprises a speech recording;
g. requesting, by the automated dialer, new acoustic fingerprints from the media server for the speech recording and associating the new acoustic fingerprints with the contact in the database; and
h. disconnecting the communication with the contact after receiving the signal indicating the communication comprises the speech recording.

US Pat. No. 10,116,792

ADDING ADDITIONAL INFORMATION TO CALLER ID INFORMATION

Verizon Patent and Licens...

1. A device, comprising:one or more processors to:
identify caller information;
compare the caller information to one or more criteria to determine that the caller information satisfies the one or more criteria,
the one or more criteria including one or more of:
a time of day,
a time range,
a ranking, or
whether the caller information is associated with any reporting to or action taken by a governmental body;
modify the caller information, to create modified caller information, based on the caller information satisfying the one or more criteria,
when modifying the caller information, the one or more processors are to:
add, to a caller number field or a caller name field of the caller information, at least one character that indicates that the caller information satisfies the one or more criteria; and
provide the modified caller information in a manner that facilitates determining how to handle a request to establish a connection with a called party device.

US Pat. No. 10,116,788

DETECTING NOTABLE EVENTS AND ANNOTATING MULTIMEDIA DATA BASED ON THE NOTABLE EVENTS

Verizon Patent and Licens...

1. A method comprising:providing, by a processor, a user interface configured to allow a user to select at least one type of sensor data associated with capturing multimedia content;
receiving, by the processor and via the user interface, a selection from the user identifying a first type of the at least one type of sensor data;
capturing, by the processor, multimedia content;
collecting, by the processor, the first type of sensor data associated with the multimedia content;
identifying, by the processor and based on the first type of sensor data, a portion of the multimedia content that is associated with an event;
outputting, by the processor, the portion of the multimedia content to a display; and
outputting, by the processor, at least some of the first type of sensor data to the display concurrently with the portion of the multimedia content.

US Pat. No. 10,116,786

APPARATUS FOR CONTROLLING A MULTIMEDIA MESSAGE IN A USER EQUIPMENT OF A WIRELESS COMMUNICATION SYSTEM AND METHOD THEREOF

LG ELECTRONICS INC., Seo...

1. A mobile terminal for controlling at least two message interfaces, comprising:a touchscreen: and
a controller configured to:
cause the touchscreen to display a first message interface displaying messages transmitted from the mobile terminal to a first device and displaying messages received at the mobile terminal from the first device, wherein the messages of the first message interface are enumerated in a chat format in accordance with a time sequence;
cause the touchscreen to display a second message interface displaying messages transmitted from the mobile terminal to a second device and displaying messages received at the mobile terminal from the second device wherein each of the first and second message interfaces is each of individual message windows;
cause the touchscreen to display in a queue region a first item representative of content associated with a selected message displayed in the first message interface; and
cause the touchscreen to display in the queue region a second item representative of content associated with a selected message displayed in the second message interface,
wherein the queue region is displayed to be adjacent to the first and second message interfaces,
wherein the first and second message interfaces are each independently scrollable in first and second opposing directions,
wherein the first and second items in the queue region are displayed chronologically according to when they are copied from a respective one of the first or second message interface to the queue region, regardless of which of the first or second message interface they are copied from,
wherein the first item displayed in the queue region includes a text of the selected message of the first message interface, and
wherein the second item displayed in the queue region includes a text of the selected message of the second message interface.

US Pat. No. 10,116,784

CAMERA CAPABLE OF COMMUNICATING WITH OTHER COMMUNICATION DEVICE

NIKON CORPORATION, Tokyo...

1. A cellular phone capable of telephone-calling with an external device, the cellular phone comprising:an antenna by which the cellular phone communicates with the external device;
a lens;
an image sensor that outputs an image signal from an image formed on the image sensor by the lens;
a display;
a loudspeaker; and
a processer electrically connected to the antenna, the image sensor, the display and the loudspeaker, wherein:
the processor controls the display to display an announcement of an incoming call from the external device after receiving a calling signal via the antenna, and
in a case that the calling signal is received during operation of the image sensor, the processor permits communication between the cellular phone and the external device via the antenna and using the loudspeaker and a microphone of the cellular phone after the announcement of the incoming call is displayed by the display and after the processor receives an instruction from an input device of the cellular phone to allow starting of the telephone-calling with the external device.

US Pat. No. 10,116,783

PROVIDING AND USING A MEDIA CONTROL PROFILE TO MANIPULATE VARIOUS FUNCTIONALITY OF A MOBILE COMMUNICATION DEVICE

1. A mobile communication device comprising:a processor; and
a memory storing instructions that, when executed by the processor, cause the processor to perform operations comprising
sending, to a network node via a communications network, a query for a media control profile associated with the mobile communication device,
in response to the query, receiving, from the network node via the communications network, the media control profile associated with the mobile communication device, wherein the media control profile comprises a first audible volume setting assigned to a first calling party and a second audible volume setting assigned to a second calling party, and wherein the first audible volume setting is different from the second audible volume setting,
changing a functionality of the mobile communication device to comply with the media control profile,
in response to receiving an incoming call from the first calling party, altering, in compliance with the media control profile, a volume of a media file playing on the mobile communication device to be in accordance with the first audible volume setting assigned to the first calling party as set forth in the media control profile while playing an audible notification of the incoming call from the first calling party, and
in response to receiving an incoming call from the second calling party, altering, in compliance with the media control profile, the volume of the media file playing on the mobile communication device to be in accordance with the second audible volume setting assigned to the second calling party as set forth in the media control profile while playing an audible notification of the incoming call from the second calling party.

US Pat. No. 10,116,781

METHOD, DEVICE AND COMPUTER-READABLE MEDIUM FOR CONTROLLING A DEVICE

XIAOMI INC., Beijing (CN...

1. A method for controlling a device, applied to a control device, the method comprising:receiving an identifier display instruction, the identifier displaying instruction being generated when a lock screen of the control device is touched along a predetermined path;
acquiring a device identifier of a corresponding controlled device according to log-in status of a user account on the control device, wherein acquiring a device identifier of a corresponding controlled device according to log-in status of a user account on the control device comprises:
transmitting a first request for acquiring an identifier to a router connected to the control device, the first request for acquiring an identifier being used to trigger the router to feed back a device identifier of each controlled device connected to the router;
receiving the device identifier fed back by the router;
transmitting a second request for acquiring an identifier to a cloud server if the user account has logged-in on the control device, the second request for acquiring an identifier being used to trigger the cloud server to feed back a device identifier of each controlled device bound to the user account; and
receiving the device identifier fed back by the cloud server;
performing a duplication removing operation to the device identifier fed back by the router and the device identifier fed back by the cloud server;
displaying, after the duplication removing operation, the acquired device identifier of each controlled device on the lock screen; and
transmitting a control instruction to a controlled device corresponding to a selected device identifier after the selected device identifier is determined.

US Pat. No. 10,116,780

QUICK COMMUNICATION METHOD AND DEVICE, AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A quick communication method, comprising:displaying a quick communication key on a lock screen interface of a terminal;
invoking a shortcut panel according to an operation triggered by a user on the quick communication key, wherein the shortcut panel includes contact information of a part or all of contact objects from a contact list in the terminal, and the contact objects included in the shortcut panel are selected from the contact list of the terminal according to contact frequencies of contact objects in the contact list;
receiving a contact object selected by the user;
communicating with the contact object, a type of a communication between the user and the contact object being one of a calling type and a messaging type; and
after communicating with the contact object selected by the user, according to a pre-stored correspondence relationship between the type of the communication and an increment frequency value, increasing the contact frequency of the contact object selected by the user by the increment frequency value corresponding to the type of the communication;
wherein,
a shortcut list is further included in the terminal, and the shortcut list stores, separately from the contact list, identifiers and contact information of the contact objects included in the shortcut panel, the contact information comprising at least one of a phone number or a contact name;
invoking a shortcut panel comprises:
loading the shortcut list in the terminal to the shortcut panel;
obtaining an identifier and contact information corresponding to a portrait of the contact object from the shortcut list of the terminal;
obtaining the portrait of the contact object corresponding to the identifier from the contact list in the terminal according to the identifier corresponding to the portrait of the contact object; and
binding the portrait of the contact object with the contact information of the contact object, and loading the portrait of the contact object to the shortcut panel; and
the shortcut panel displaying portraits of the contact objects is invoked by a single triggering action from the lock screen interface,
wherein the method further comprises:
receiving a message informing a change to contact information of a contact object in the contact list, wherein the message carries an identifier corresponding to the changed contact object;
determining whether the changed contact object is included in the shortcut list according to the identifier carried in the message; and
in response to determining that the changed contact object is included in the shortcut list, updating contact information of the changed contact object in the shortcut list using the contact information of the changed contact object in the contact list.

US Pat. No. 10,116,777

MOBILE TERMINAL

LG Electronics Inc., Seo...

1. A mobile terminal comprising:a frame including a front surface in which a display device is provided;
a window disposed on a surface of the display device; and
a front case configured to cover a predetermined area of the window,
wherein the window includes:
a first window layer having a front surface and a rear surface, the front surface being exposed to outside of the mobile terminal;
a second window layer, larger than the first window layer, and the second window layer having a front surface and a rear surface, wherein the front surface of the second window layer includes a first area disposed to face the rear surface of the first window layer and a second area, the front case to cover the second area of the front surface of the second window layer around the first area, and the rear surface of the second window layer to face a surface of the display device; and
an optical clear adhesive (OCA) provided between the first window layer and the second window layer;
wherein a thickness of the first window layer is approximately twice a thickness of the second window layer.

US Pat. No. 10,116,774

HARDWARE PROTOCOL STACK WITH USER-DEFINED PROTOCOL APPLIED THERETO AND METHOD FOR APPLYING USER-DEFINED PROTOCOL TO HARDWARE PROTOCOL STACK

LSIS CO., LTD., Anyang-s...

1. A hardware protocol stack to which a user-defined protocol is applied, comprising:a register unit in which header information is stored;
a comparison unit configured to compare header information of a received frame with the header information stored in the register unit to determine whether the header information is matched to the other;
an interface logic unit configured to determine a process of the received frame on the basis of a comparison result of the comparison unit; and
a logic process unit configured to process data of the received frame based on a logic according to the header information when the frame process method, which is determined in the interface logic according to the header information stored in the register unit and being matched to the header information of the received frame, is a processing of a frame,
wherein the logic according to the header information includes a unit designation of the data according to the header information;
wherein the unit designation of the data is performed such that the logic process unit sets a basic offset and a size unit of the data when receiving a request for writing payload data in a specific region of the data and then stores payload in the basic offset by expanding the payload to be corresponded to the set size unit of the data.

US Pat. No. 10,116,773

PACKET PROCESSING METHOD AND RELATED DEVICE THAT ARE APPLIED TO NETWORK DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A packet processing method applied to a network device, wherein K classifiers and S network service processors are loaded into a memory of the network device, wherein the K classifiers comprise a classifier x and a classifier y, wherein K and S are integers greater than 1, and wherein the method comprises:acquiring, by the classifier x, P packet identifiers from a queue area a corresponding to the classifier x and is in a network adapter receiving queue;
acquiring, by the classifier x and based on the P packet identifiers, P packets corresponding to the P packet identifiers;
determining, by the classifier x and based on the P packets, flow queue identifiers corresponding to the P packets;
distributing, by the classifier x, packet description information corresponding to the P packets to flow queues corresponding to the determined flow queue identifiers corresponding to the P packets, wherein packet description information corresponding to a packet i in the P packets is distributed to a flow queue corresponding to a determined flow queue identifier corresponding to the packet i, wherein the packet i is any one packet in the P packets, and wherein the packet description information corresponding to the packet i comprises a packet identifier of the packet i;
processing, by Si network service processors in the S network service processors and based on the packet description information corresponding to the P packets and is distributed to the flow queues, the P packets;
sending the P processed packets;
acquiring, by the classifier y, Q packet identifiers from a queue area b corresponding to the classifier y and is in the network adapter receiving queue;
acquiring, by the classifier y and based on the Q packet identifiers, Q packets corresponding to the Q packet identifiers;
determining, by the classifier y and based on the Q packets, flow queue identifiers corresponding to the Q packets;
distributing, by the classifier y after the classifier x distributes the packet description information corresponding to the P packets to the flow queues corresponding to the determined flow queue identifiers corresponding to the P packets, packet description information corresponding to the Q packets to flow queues corresponding to the determined flow queue identifiers corresponding to the Q packets, wherein packet description information corresponding to a packet m in the Q packet is distributed to a flow queue corresponding to a determined flow queue identifier corresponding to the packet m, wherein the packet m is any one packet in the Q packets, wherein the packet description information corresponding to the packet m comprises a packet identifier of the packet m, wherein Q and P are positive integers, and wherein a time at which the Q packets are enqueued to the queue area b in the network adapter receiving queue is later than a time at which the P packets are enqueued to the queue area a in the network adapter receiving queue;
processing, by Sj network service processors in the S network service processors and based on the packet description information corresponding to the Q packets and is distributed to the flow queues, the Q packets; and
sending the Q processed packets, wherein an intersection set between the Si network service processors and the Sj network service processors is a null set or a non-null set.

US Pat. No. 10,116,772

NETWORK SWITCHING WITH CO-RESIDENT DATA-PLANE AND NETWORK INTERFACE CONTROLLERS

Cavium, Inc., San Jose, ...

1. A network interface apparatus, comprising:a semiconductor chip comprising a packet input processor, a packet output processor, and a network interface controller; wherein
a network facing inbound interface of the network interface controller is communicatively coupled to a network facing interface of the packet output processor via a first hardware loopback entity;
a network facing outgoing interface of the network interface controller is communicatively coupled to a network facing interface of the packet input processor via a second hardware loopback entity; and
at least one medium access controller, communicatively coupled to network facing inbound and outgoing interfaces of the network interface controller, the network facing interface of the packet output processor, and the network facing interface of the packet input processor.

US Pat. No. 10,116,771

DATA TRANSMISSION VIA FRAME RECONFIGURATION

Sprint Spectrum L.P., Ov...

1. A method for transmitting data via frame reconfiguration, the method comprising:mapping, by a source node, a plurality of data bits to a corresponding plurality of frame configurations, each of the plurality of frame configurations comprising a sequence of uplink and downlink subframes;
generating, by the source node, a pattern of frame configurations based on a data string to be transmitted to a target node, the pattern comprising one or more frame configurations of the plurality of frame configurations corresponding to bits within the data string; and
broadcasting, from the source node, the pattern of frame configurations,
wherein the target node is configured to identify the pattern of frame configurations and decode the data string.

US Pat. No. 10,116,770

IMAGE PROCESSING APPARATUS BASED ON OPEN PLATFORM AND PROTOCOL CONVERSION METHOD USED FOR THE SAME

Hanwha Techwin Co., Ltd.,...

1. An image processing system comprising:a network camera configured to capture an original image of an object;
a detector configured to detect a speed of movement of the object;
an image processing apparatus comprising at least one processor to implement:
an open platform-compatible unit configured to determine a protocol that is used by a video analysis application installed in or connected to the image processing apparatus, select channel information from among channel information about the original image, channel information about an encoded image of the original image, and channel information about a decoded image of the encoded image, according to the determined protocol, and receive the selected channel information; and
a protocol conversion unit configured to process an input image to comply with the determined protocol, based on the channel information that is received at the open platform-compatible unit,
wherein the open platform-compatible unit selects and receives the channel information about the original image based on the speed detected by the detector being over a predetermined threshold, and the open platform-compatible unit selects and receives the channel information about at least one from among the encoded image and the decoded image based on the speed detected by the detector being under the predetermined threshold.

US Pat. No. 10,116,768

CONTROL SYSTEM, CONTROL METHOD, AND COMMUNICATION DEVICE

FUJITSU LIMITED, Kawasak...

1. A control system comprising:a server including a first processor and a first memory; and
a plurality of communication devices including a second processor, respectively,
wherein
the first memory is configured to store first mode information for each user,
the first mode information is associated with a mode of an application, the first mode information being selected from among a plurality pieces of mode information of the mode for distinguishing a function executed by same operation from another function for the application,
the first processor is configured to transmit a respective first mode information of a user to the plurality of communication devices operated by the user, and
the second processor is configured to:
receive the first mode information,
obtain second mode information set to the mode of the application installed to a communication device among the plurality of communication devices,
record an operation content related to mode information change performed on the communication device, and
determine whether the second mode information set to the mode of the application is switched to the first mode information, based on the operation content, the first mode information, and the second mode information.

US Pat. No. 10,116,766

ASYNCHRONOUS AND IDEMPOTENT DISTRIBUTED LOCK INTERFACES

Amazon Technologies, Inc....

1. A system, comprising:one or more hardware processors and memory configured to:
receive a queue-for lock request from a client, wherein the queue-for-lock request comprises an indication of an element to be locked;
in response to receiving the queue-for-lock request, provide, to the client, a reference to a first asynchronous operation, wherein the first asynchronous operation is asynchronous to processes executing on the client;
perform, after providing the reference to the first asynchronous operation, the first asynchronous operation comprising insertion of a lock request on behalf of the client into a queue of waiters for a lock on the element;
receive a request from the client for a result of the first asynchronous operation, the request including the reference to the first asynchronous operation;
in response to receiving the request for the result of the first asynchronous operation, transmit to the client a notification of insertion of the lock request into the queue of waiters, wherein the notification comprises a reference to a second asynchronous operation comprising granting of a lock on the element to the client, wherein the second asynchronous operation is distinct from the first asynchronous operation and asynchronous to processes executing on the client; and
perform the second asynchronous operation comprising granting the lock on the element to the client.

US Pat. No. 10,116,765

NEEDS-MATCHING NAVIGATOR SYSTEM

1. A Matching Navigator System (MNS), said system including:a computer server including a memory storing a user profile, said user profile including:
a user-specific wellbeing criteria database, wherein said wellbeing criteria database includes a plurality of data elements representing predetermined wellbeing attributes, as well as data elements representing user-specific weightings for said predetermined wellbeing attributes,
wherein said MNS monitors data from searches and site visits made using said MNS, compares said data from searches and site visits to said user-specific weighting for said wellbeing attributes, and adjusts said user-specific weighting for said wellbeing attributes based on said data from searches and site visits made using said MNS;
a user-specific wellbeing orientation database, wherein said wellbeing orientation database includes a plurality of data elements representing predetermined wellbeing preference data and user-specific weightings for said predetermined wellbeing preference data,
wherein said user-specific weightings for said predetermined wellbeing preference data are determined using an initial electronic survey presented to a user by said MNS for self-quantification by said user; and
a user-specific reading level data, wherein said MNS monitors data from searches and site visits made using said MNS, wherein said MNS determines a user-specific reading level associated with said data from said searches and site visits and records said reading level as said user-specific reading level data;
a solution database, stored in memory on a computer server, wherein said solution database includes a solution data set corresponding to a predetermined potential user search query and a solution-specific electronic survey,
wherein said solution data set includes a plurality of data elements representing predetermined solution attributes,
wherein said data elements represent third-party quantified solution attributes that are quantified based on a plurality of third party user ratings collected from solution-specific electronic survey information received from a plurality of third parties in response to said solution-specific electronic survey,
wherein said data elements representing third-party quantified solution attributes are determined by averaging said plurality of third party user ratings for said predetermined solution attributes;
a computerized user interface, said computerized user interface receiving a search query from said user,
wherein, when said search query from said user is determined by said MNS to correspond to said solution data set, said MNS retrieves said solution-specific electronic survey and transmits said solution-specific electronic survey to said computerized user interface for display to said user,
wherein said computerized user interface receives user-specific weightings from said user for said solution attributes included in said solution-specific electronic survey;
wherein said MNS:
retrieves said plurality of data elements representing predetermined wellbeing attributes, as well as data elements representing user-specific weightings for said predetermined wellbeing attributes from said user-specific wellbeing criteria database;
retrieves said plurality of data elements representing predetermined wellbeing preference data and said user-specific weightings for said predetermined wellbeing preference data from said user-specific wellbeing orientation database; and
adjusts said user-specific weightings based on the data elements retrieved to determine user-specific adjusted weighting data for said solution attributes,
wherein said MNS:
generates a series of link selections based at least in part on matching said user-specific adjusted weighting data for said solution attributes with said data elements representing third-party quantified solution attributes , and
said user-specific reading level; and
a Graphical Link Organizer (GLO) representing a user interface displaying a plurality of user-activatable links to organized search results, wherein said GLO includes:
a first row of links, wherein said first row of links includes links to search results that have been determined to be at the user-specific reading level of said user based on said user-specific reading level data;
a second row of links, wherein said second row of links includes links to search results that have been determined to be above the user-specific reading level of said user based on said user-specific reading level data;
a third row of links, wherein said third row of links includes links to search results that have been determined to be below the user-specific reading level of said user based on said user-specific reading level data;
a first column intersecting said first row of links, said second row of links, and said third row of links, wherein said first column displays links determined using said plurality of data elements representing predetermined wellbeing attributes, as well as data elements representing user-specific weightings for said predetermined wellbeing attributes, wherein said links of said first column are also categorized into said first row of links, said second row of links, and said third row of links; and
a second column intersecting said first row of links, said second row of links, and said third row of links, wherein said second column displays links determined using said plurality of data elements representing predetermined wellbeing preference data and user-specific weightings for said predetermined wellbeing preference data, wherein said links of said second column are also categorized into said first row of links, said second row of links, and said third row of links.

US Pat. No. 10,116,764

METHOD FOR STATE BASED SNAPSHOT DIFFERENCE WITH RESTART CAPABILITY

EMC IP Holding Company LL...

1. A data management device, comprising:a buffer; and
a processor programmed to:
select an unprocessed full key,
generate a buffer entry based on a difference between an entry of a local snapshot specified by the unprocessed full key and an entry of a previous local snapshot specified by the unprocessed full key,
make a first determination that a lookup key entry associated with the unprocessed full key is different than a lookup key entry associated with a processed full key, and
in response to the first determination, add the generated buffer entry to the buffer after processing the buffer.

US Pat. No. 10,116,763

METHOD FOR OPERATING A CACHE ARRANGED ALONG A TRANSMISSION PATH BETWEEN CLIENT TERMINALS AND AT LEAST ONE SERVER, AND CORRESPONDING CACHE

Thomson Licensing, Issy-...

1. A method for operating a cache arranged between client terminals and at least one server, said cache being configured to receive requests from client terminals for at least a first representation of a segment of a multimedia content available in a plurality of representations, wherein the method comprises:receiving, in a first period of time, a plurality of requests for a given segment from client terminals, each request specifying one first representation and at least one alternative representation of said given segment, said given segment being not stored yet in said cache;
determining a score of relevancy for each representation of said given segment specified in the plurality of requests received during the first period of time, the score of relevancy associated with a requested representation of said given segment corresponding to a number of times said requested representation is specified in the plurality of requests received by the cache, wherein, each representation of a received request having a priority level, the number of times a representation is requested is weighted by a first factor depending on the priority level of said representation;
selecting, as a main relevant representation of said given segment, a representation with a highest score of relevancy amongst the determined scores of relevancy, wherein the main relevant representation is the representation with the highest score;
requesting, by said cache, said main relevant representation of the given segment from a remote server.

US Pat. No. 10,116,761

MULTI-DELIVERY-METHOD POLICY-CONTROLLED CLIENT PROXY

1. A system, comprising:a memory that stores instructions;
a processor that executes the instructions to perform operations, the operations comprising:
detecting, based on a request for a network service, a client proxy associated with a client, wherein the client proxy is detected based on a port at which the client proxy executes on a device that is executing the client;
providing, to the client, a data object including information indicating that the client proxy is a primary source for content requested by the client;
redirecting, based on the data object, a request for the content from the client to the client proxy;
obtaining, via the client proxy, the content by utilizing a delivery method that is selected based on a policy; and
providing, via the client proxy, the content to the client.

US Pat. No. 10,116,760

ACTIVE DATA PUSH SYSTEM AND ACTIVE DATA PUSH METHOD

DELTA ELECTRONICS, INC., ...

1. An active data push system comprising:a plurality of human-detection devices respectively detecting a plurality of zones, and sending a trigger signal when detecting entrance of a human user of a mobile device into one of the zones; and
a management system connected to the human-detection devices and comprising a processing device, the processing device comprising a status-detection module and an alarm module connected to the status-detection module,
wherein
the management system recognizes the zone corresponding to the trigger signal when receiving the trigger signal, the management system retrieves a plurality of basic data of a plurality of electronic devices installed in the recognized zone, and transmits the retrieved basic data to the mobile device via a network,
the status-detection module detects whether the electronic devices are abnormal, and
the alarm module determines whether the zone corresponding to the trigger signal is consistent with the zone in which the abnormal electronic device is installed, and transmits an alarm message to the mobile device when determining that the zone corresponding to the trigger signal is consistent with the zone in which the abnormal electronic device is installed.

US Pat. No. 10,116,759

METHOD, APPARATUS AND COMPUTER FOR IDENTIFYING STATE OF USER OF SOCIAL NETWORK

HUAWEI TECHNOLOGIES CO., ...

1. A method for identifying a state of a user of a social network, the social network comprising an activated user, a non-activated user, and a silent user, a state of the silent user being unstable, the silent user finally becoming the activated user or the non-activated user, and the identification method comprising:acquiring a user-event similarity of the user regarding a new event;
identifying whether the user is the silent user or the non-activated user according to the user-event similarity; and
determining whether the silent user or the non-activated user on the social network is finally in an activated state or a non-activated state by:
determining a state of an associated user of the silent user or the non-activated user in a previous iteration, the associated user referring to a user that has a follow relationship with the user;
determining, according to the state of the associated user in the previous iteration, a probability that the silent user or the non-activated user changes to the activated state;
determining a total quantity of associated users of the silent user that are currently in the activated state; and
determining whether the silent user is finally in the activated state or the non-activated state according to the total quantity and a threshold of the silent user, the threshold being a real number existing for the silent user and ranging between zero and one, the threshold being related to a difficulty level at which the user is activated, determining whether the silent user is finally in the activated state or the non-activated state according to the total quantity and the threshold comprising comparing the total quantity with the threshold, the silent user being finally in the activated state when the total quantity is greater than or equal to the threshold, the silent user being finally in the non-activated state when the total quantity is less than the threshold, and behavior of the user in the social network being analyzed based on the determination whether the user is finally in the activated state or the non-activated state.

US Pat. No. 10,116,757

LOCATION-BASED OPEN SOCIAL NETWORKS

1. An apparatus having stored executable instructions, comprising:1) at least one computing system being operable to implement a social networking system, said social networking system arranged to implement a plurality of social networks;
2) said plurality of social networks each arranged to be associated with a location and accessible without registration requirements;
3) said social networking system arranged to select one or more of said plurality of social networks after receiving info that a given program is in operation and it is determined that the one or more social networks each have a predetermined geographic area which covers a location of a user; and
4) said social networking system arranged to send to said user information about the one or more social networks, wherein said information includes one or more post quantities which correspond to the one or more social networks, each of the one or more post quantities represents a number of posts which are posted in one of the one or more social networks in a given time period.

US Pat. No. 10,116,756

TECHNIQUES TO FACILITATE RECOMMENDATIONS FOR NON-MEMBER CONNECTIONS

Microsoft Technology Lice...

1. A method for providing recommended social networking connections, the method comprising:on a computer-based social networking service, executing computer program instructions which cause one or more computer processors to perform the operations of:
determining a set of connection candidates based upon information gathered about a member of the social networking service, the connection candidates in the set of connection candidates are not already members of the social networking service, the information gathered about the member including at least one of: information from email accounts of the member, blog posts of the member, electronic calendar entries of the member, associated websites of the member, social networking profiles of the member on a second social networking service;
executing a machine learning algorithm to determine a relevance score for each particular connection candidate in the set of connection candidates based upon a plurality of signals gathered by the social networking service, the plurality of signals identifying with a subscore a likelihood that the member knows the particular connection candidate, wherein the subscore is based on points automatically assigned to similarities between the member and the particular connection candidate; and
presenting, on a display, to the member the set of connection candidates ordered based upon relevance scores.

US Pat. No. 10,116,754

DYNAMIC CONFIGURATION OF INTERFACE IDENTIFIERS

Comcast Cable Communicati...

1. A method comprising:maintaining a plurality of identifiers for a first interface and a second interface of a computing device based on the first interface and the second interface being connected to a network;
assigning, by the computing device and to the first interface, a first identifier of the plurality of identifiers;
causing transmission, via the first interface, of a first request to access a device on the network, the first request comprising the first identifier;
receiving, by the computing device and from the network and after the causing transmission of the first request, a code;
determining, based on a comparison of the received code to a first predetermined code associated with the first interface, that the first interface uses a protocol not supported by the device on the network;
re-assigning, based on the determining that the first interface uses a protocol not supported by the device on the network, the first identifier to the second interface;
causing transmission, via the second interface and based on the determining that the first interface uses a protocol not supported by the device on the network, of a second request to access the device on the network;
determining, after the causing transmission of the second request, that the second interface is not connected to the network; and
removing the first identifier from being assigned to the second interface.

US Pat. No. 10,116,751

CONTEXT AWARE TRANSACTIONS PERFORMED ON INTEGRATED SERVICE PLATFORMS

West Corporation, Omaha,...

1. A method, comprising:receiving, via a receiver device, user input information to access an application, the user input information including at least one action request provided by a user device;
wherein the user input information is a part of a contextual history information identifying a first session;
creating a second session responsive to receiving a user inquiry;
generating a response message to the at least one action request based on the contextual history information and the user inquiry;
forwarding the response message to the user device via a transmitter device via the second session; and
generating at least one additional response based on a third party application, the at least one additional response comprising a reminder that is derived from previous user transactions and the contextual history information.

US Pat. No. 10,116,750

MECHANISM FOR HIGHLY AVAILABLE RACK MANAGEMENT IN RACK SCALE ENVIRONMENT

Intel Corporation, Santa...

1. A method for managing rack resources in a data center rack, comprising:employing first and second Rack Management Modules (RMMs) to manage power and thermal zones in a rack including a plurality of pooled system drawers, each pooled system drawer associated with a respective power zone including one or more power sensors and one or more power control devices and a respective thermal zone including one or more thermal sensors and one or more thermal devices;
implementing one of the first and second RMM as an initial master RMM and the other RMM as an initial slave RMM;
when an RMM is being implemented as a master RMM,
monitoring the power and thermal zones in the rack by,
receiving power data from one or more power sensors for each power zone;
receiving thermal data from one or more thermal sensors for each thermal zone; and
communicating with at least one of,
one or more power control devices for each of one or more power zones to control power in that power zone; and
one or more thermal devices for each of one or more thermal zones to control operation of the one or more thermal devices;
maintaining power and thermal zone state information for each pooled system drawer; and
periodically synchronizing power zone and thermal zone state information between the master RMM and the slave RMM;
detecting a fail-over condition for the master RMM, and in response thereto,
implementing the initial slave RMM as a new master RMM;
resetting the initial master RMM; and
implementing the initial master RMM as a new slave RMM.

US Pat. No. 10,116,749

METHOD FOR PROVIDING FLIGHT MANAGEMENT SYSTEM DATA TO PERIPHERAL DEVICES

The Boeing Company, Chic...

1. A flight management system (102), comprising:a processor (104);
a memory (106) comprising a volatile memory;
operational software (108);
a network communication device;
a flexible data interface (112) stored in the memory (106), executable by the processor (104) and configured for:
providing an abstract data interface layer (113);
retrieving, via the abstract data interface layer (113), transient data stored in the volatile memory of the flight management system (102), wherein the abstract data interface layer (113) identifies a location of the transient data in the volatile memory, wherein the flexible data interface (112) is configured to retrieve the transient data without interfering with the operational software (108) of the flight management system (102); and
transmitting, via the network communication device, the transient data to a peripheral device (124) in network communication with the flight management system (102).

US Pat. No. 10,116,748

VEHICLE-BASED MULTI-MODAL INTERFACE

Microsoft Technology Lice...

1. A computer-implemented method comprising:establishing a connection between a mobile device and an in-vehicle information/entertainment system;
receiving a communication from the mobile device, the communication being associated with an input of a first modality type comprising a voice communication that was received by the mobile device, the input comprising a query and associated with accomplishing a task of playing music;
listing a plurality of songs meeting the query;
receiving input of a second modality type that is different from the first modality type, the input of the second modality type selecting a song from the plurality of songs meeting the query and being associated with performing the task of playing music;
performing the task of playing music, wherein the task comprises playing the song;
during performance of the task, interrupting the task and presenting a user interface comprising an option selectable via a third modality type comprising touch that is different from the first and second modality types on the in-vehicle information/entertainment system associated with a different task; and
responsive to receiving selection of the option via the third modality type comprising touch, performing the different task;
wherein three different input modalities are used to engage the in-vehicle information/entertainment system by way of the mobile device: the first modality type comprising the voice communication, the second modality type, and the third modality type comprising touch and different from the first and second modality types.

US Pat. No. 10,116,746

DATA STORAGE METHOD AND NETWORK INTERFACE CARD

HUAWEI TECHNOLOGIES CO., ...

1. A data storage method, comprising:acquiring, by a network interface card, unsolicited data;
buffering, in a direct memory access (DMA) manner, the unsolicited data into a double data rate (DDR) synchronous dynamic random access memory (SDRAM) of the network interface card, the unsolicited data being to-be-stored data, for which a corresponding destination address is not acquired, among data received by the network interface card;
acquiring, by the network interface card, a destination address corresponding to the unsolicited data; and
writing, in the DMA manner, the unsolicited data into storage space that corresponds to the destination address corresponding to the unsolicited data.

US Pat. No. 10,116,744

SYSTEM AND METHOD FOR PROVIDING MANAGEMENT NETWORK COMMUNICATION AND CONTROL IN A DATA CENTER

DELL PRODUCTS, LP, Round...

1. An information handling system, comprising:a host processing complex to instantiate a hosted processing environment;
a first managed element; and
a baseboard management controller to manage the managed element out of band from the hosted processing environment, wherein the baseboard management controller:
stores console information for a plurality of management consoles, wherein the console information includes a mapping to each of the management consoles, and wherein a first one of the management consoles directs the baseboard management controller to manage the first managed element;
provides the console information to a mobile management device;
receives a first direction from the mobile management device based upon the console information in response to providing the console information to the mobile management device;
provides the first direction to the first management console;
receives first management information from the first management console to direct the baseboard management controller to manage the first managed element based upon the first management information; and
stores the console information in an entry of a console table.

US Pat. No. 10,116,743

STORAGE CAPACITY FORECASTING BY CAPABILITY SETS

INTERNATIONAL BUSINESS MA...

1. A method, comprising:defining multiple storage capabilities for a set of storage resources, the storage resources comprising storage space;
defining a plurality of storage services, each of the storage services comprising one or more of the storage capabilities for a subset of the storage resources;
configuring a software defined storage (SDS) system comprising the defined storage services;
receiving, by the SDS system, a request to forecast an amount of the storage space comprising one or more of the storage capabilities that will be available at a specified future time; wherein receiving the request comprises receiving an input from a user indicating the specified future time and the one or more of the storage capabilities that will be available at the specified future time;
identifying one or more of the storage services comprising the one or more storage capabilities; and
computing, for the identified one or more storage services, a predicted amount of the storage space at the specified future time.

US Pat. No. 10,116,742

SCALABLE APPROACH TO MANAGE STORAGE VOLUMES ACROSS HETEROGENOUS CLOUD SYSTEMS

International Business Ma...

1. A method for managing heterogeneous cloud data storage systems, the method comprising:defining rules that govern storing of data in one or more of a plurality of heterogeneous cloud data storage systems;
receiving first-type data and second-type data from one or more user computers;
determining a respective priority for each of the first-type data and the second-type data, the priority of the first-type data is different than the priority of the second-type data;
sending the first-type data to a first queue for storage thereat and the second-type data to a second queue for storage thereat according to the determined priority; and sending the first-type data and the second-type data from the first or second queue according to the defined rules for storage into the plurality of heterogeneous cloud data storage systems;
applying different rules of the defined rules to the heterogeneous cloud data storage systems;
splitting at least one of the first-type data and the second-type data by applying defined rule; and encrypting the split data before storing the split data at the plurality of heterogeneous cloud data storage systems,
and storing the split data at a cloud storage system whose resource usage to store the split data is lowest among the plurality of heterogeneous cloud data storage systems;
exchanging the applied different rules between the heterogeneous cloud data storage systems; and
updating rules corresponding to the heterogeneous cloud data storage systems with the exchanged rules,
wherein a processor connected to a memory is being configured to perform: the defining rules, the receiving first-type data and second type data, the determining a respective priority, the sending the first-type data to a first queue, and the sending the first-type data and the second-type data,
wherein an amount of data processing time assigned to the first queue for storing and sending the first-type data is different than an amount of data processing time assigned to the second queue for storing and sending the second-type data.

US Pat. No. 10,116,741

PEER-TO-PEER NETWORK IMAGE DISTRIBUTION HIERARCHY

CISCO TECHNOLOGY, INC., ...

1. A method for upgrading first and second sets of network devices with an upgrade defined by a set of files, the first and second sets of devices at least partially overlapping, the method comprising:allocating the set of files of the upgrade into a plurality of sub-portions of the upgrade, including a first portion with a first file of the set of files and a second portion with a second file of the set of files;
receiving, at a file server, identification of a first network device as a root device within a first hierarchal order of the first set of network devices, and identification of a second network device as a root device within a second hierarchal order of the set of network devices;
first assigning the first file from the set of files to the first network device for distribution to the first set of network device;
second assigning the second file from the set of files to the second network device for distribution to the second set of devices;
first transmitting, by a file server, the first file but not the second file from the set of files to the first network device, wherein transmitting the first file to the first network device causes the first file to be distributed to each network device in the first set of network devices according to the first hierarchical ordering; and
second transmitting, by the file server, the second file but not the first file from the set of files to the second network device, wherein transmitting the second file to the second network device causes the second file to be distributed to each network device in the set of network devices according to the second hierarchical ordering;
wherein a third network device within both the first and second sets of network devices will receive the first file as relayed from the first network device and the second file as relayed from the second network device;
wherein the first and second transmitting individually transmit sub-portions of the upgrade, such that the third network device receives the upgrade in separate pieces from different hierarchical orders.

US Pat. No. 10,116,740

PEER-TO-PEER NETWORK PRIORITIZING PROPAGATION OF OBJECTS THROUGH THE NETWORK

MICROSOFT TECHNOLOGY LICE...

1. A method for transferring digital content items in a peer-to-peer network in which a plurality of nodes participate, comprising:receiving requests for receipt of one or more digital content items from a plurality of requesting nodes belonging to the peer-to-peer network;
assessing a capacity of the requesting nodes to upload data;
allocating network resources available to the peer-to-peer network for delivering the digital content items or chunks thereof to the requesting nodes, the network resources including a specified number of simultaneous connections, between a sending node and the plurality of requesting nodes, that are available to the sending node for uploading the digital content items or chunks thereof to the plurality of requesting nodes, and an amount of total bandwidth available to the sending node; and
sending the digital content items or chunks thereof from the sending node to the requesting nodes over the peer-to-peer network in accordance with the network resources that are allocated to each of the requesting nodes;
receiving an additional request from an additional requesting node other than the plurality of requesting nodes for the digital content items or chunks thereof such that a number of requesting nodes requesting the digital content items or chunks thereof from the sending node exceeds the specified number of simultaneous connections available to the sending node;
in response to receiving the additional request:
determining respective connection speeds of the plurality of requesting nodes and the other requesting node;
selecting a number of requesting nodes having fastest network connection speeds for uploading data from the plurality of requesting nodes and the additional requesting node, the selected number of the requesting nodes less than or equal to the specified number of simultaneous connections until the total maximum bandwidth available to the sending node is reached;
allocating network resources to the number of requesting nodes selected from the plurality of requesting nodes and the additional requesting node; and
deallocating the network resources to a remainder of requesting nodes from the plurality of requesting nodes and the additional requesting node that are not included in the selected number of requesting nodes.

US Pat. No. 10,116,739

METHOD FOR ENABLING POINT-TO-POINT TRANSMISSION AND NETWORK CONNECTING DEVICE

THROUGHTEK TECHNOLOGY (SH...

1. A method for enabling a host device to perform point-to-point transmission, comprising:storing a device identification representing an external device in the external device, wherein the external device is connected to the host device;
providing a point-to-point program instruction to be installed on the host device; and
providing a server that is remote from the host device and the external device, wherein when the host device is connected to the external device and installed with the point-to-point instruction, the host device sends the device identification to the server, the server derives a unique identification by calculating the device identification with a function, and the server sends the unique identification to the host device, wherein the host device informs the server with connection data and the unique identification,
the unique identification being used to identify the host device in a point-to-point transmission network; and
wherein the server provides the connection data of the host device to a point-to-point device so that the point-to-point device is connected to the host device with a point-to-point connection,
wherein the external device is a wireless router for establishing a wireless network for the point-to-point device and queried by the point-to-point device to establish the point-to-point connection according to the point-to-point instruction.

US Pat. No. 10,116,738

DETECTING ANOMALOUS CONDITIONS IN A NAME SERVER NETWORK

Level 3 Communications, L...

1. A method comprising:receiving from a subscriber, via a web-based graphical user interface, one or more policies for distribution of service requests to one or more servers in a subscriber server network;
monitoring an operational status of at least some of a plurality of name servers in a name server network that provides hostname resolution services for the one or more servers in the subscriber server network;
based on said monitoring, when an error or anomalous condition is detected at a particular name server of the name server network, creating a policy to indicate the status of the particular name server, wherein the policy is taken into account when resolving hostnames using the name server network; and
sending an alert regarding the error or anomalous condition detected at a particular name server to the subscriber via the web-based graphical user interface.

US Pat. No. 10,116,735

SERVICE MIGRATION ACROSS CLUSTER BOUNDARIES

MICROSOFT TECHNOLOGY LICE...

1. A computer-implemented method for migrating services between clusters, the method comprising:copying artifacts from a first instance of a service that is running on a first cluster;
creating, based on the copied artifacts, a second instance of the service on a second cluster;
stopping a selected first portion of the first instance of the running service on the first cluster, wherein a second portion of the first instance is running; and
in accordance with the selected first portion of the first instance of the running service on the first cluster being stopped, starting a corresponding third portion of the second instance created on the second cluster based on a portion of the copied artifacts, each of the second portion and the third portion collectively providing the service.

US Pat. No. 10,116,734

DATA PURGE DISTRIBUTION AND COHERENCY

Fastly, Inc., San Franci...

1. A method of operating a content delivery network, wherein the content delivery network comprises a plurality of content delivery nodes that cache content, the method comprising:in a first content delivery node of the content delivery network, receiving a content request from a second content delivery node of the content delivery network, wherein the content request comprises a request for second content to replace first content and a revision indicator of the first content;
in the first content delivery node and when the revision indicator of the first content indicates an earlier revision than third content stored in the first content delivery node, then transferring the third content as the second content for delivery to the second content delivery node;
in the first content delivery node and when the revision indicator of the first content indicates a same revision or a later revision as the third content stored in the second content delivery node, then requesting fourth data from a data node and transferring fourth data as the second data for delivery to the second content delivery node;
in the second content delivery node, receiving a purge instruction to purge the first content stored in the second content delivery node and responsively purging the first content;
in the second content delivery node and in response to the purge instruction, transferring the content request for delivery to the first content delivery node of the content delivery network; and
responsive to the content request, in the second content delivery node, receiving the second content for storage in the second content delivery node.

US Pat. No. 10,116,732

AUTOMATED MANAGEMENT OF RESOURCE ATTRIBUTES ACROSS NETWORK-BASED SERVICES

Amazon Technologies, Inc....

1. A system, comprising:a plurality of compute nodes comprising one or more respective hardware processors and memory and implementing a plurality of different network-based services of a provider network, wherein a plurality of respective resources are implemented at the plurality of different network-based services for a plurality of clients of the provider network;
a provider network interface for the provider network, wherein the interface is implemented by one or more computers comprising respective hardware processors and memory;
a resource tag service of the plurality of different network-based services, wherein the resource tag service is implemented by one or more hardware processors and memory of one or more of the plurality of compute nodes and configured to:
receive, from a client of the plurality of clients via the provider network interface, a request to add at least one resource tag to select resources of the respective plurality of resources implemented for the client at the provider network according to resource metadata selection criteria specified in the request to add the at least one resource tag to the select resources;
in response to the receipt of the request to add the at least one resource tag to the select resources:
evaluate resource metadata maintained for the respective plurality of resources implemented at the plurality of different network-based services according to the resource metadata selection criteria in order to identify one or more resources of the respective plurality of resources as the select resources based at least in part on the one or more resources satisfying the resource metadata selection criteria; and
apply the at least one resource tag to the identified one or more resources of the plurality of resources to be maintained as part of the resource metadata for the plurality of resources implemented at the plurality of different network-based services;
receive an indication of a new resource implemented at one of the plurality of different network-based services;
determine that resource metadata maintained for the new resource satisfies the resource metadata selection criteria; and
in response to the determination that the resource metadata maintained for the new resource satisfies the selection criteria, apply the at least one resource tag to the new resource to be maintained as part of the resource metadata for the new resource.

US Pat. No. 10,116,730

PROCESSING METHOD, COMPUTER DEVICES, COMPUTER SYSTEM INCLUDING SUCH DEVICES, AND RELATED COMPUTER PROGRAM

Myriad Group AG, Zurich ...

1. A processing method in a system comprising a first device and a plurality of second devices arranged to be connected with the first device via a data link, each second device being a user terminal and arranged to receive batches of data from an associated user to be sorted into N categories, the method comprising:performing an algorithm determination operation at said first device to build a sorting algorithm for sorting batches of data received by each second device into N categories, wherein said algorithm determination operation is performed according to the following (i) and (ii):
(i) generating a data sample for each of the N categories; and
(ii) according to data received by the first device for the data sample, determining within the first device the sorting algorithm according to consecutive iterations of a definition algorithm executed in the first device;
downloading, from the first device, the sorting algorithm for storage in each of the second devices;
executing, within each second device, the sorting algorithm in order to determine a respective category from among the N categories for each batch of data received by the second device; and
selectively triggering an action according to the category determined for said received batch of data,
wherein the sorting algorithm comprises sorting rules, each sorting rule being associated with one from among the N categories, each sorting rule including at least one logic sequence aiming to selectively associate at least one determined key element with a given category,
wherein the first device is a server, the plurality of second devices are user terminals connected to a platform of services through a telecommunications network, and the batches of data received by each user terminal are data entered on that user terminals and transmitted on the network to the platform of services, wherein:
the sorting algorithm determines, for each user terminal, a respective category from among the N categories, according to the data entered on the user terminal and transmitted on the network to the platform of services, and
during the step (i), the data sample is a sample of user terminals formed for each of the N categories, the data entered on the user terminals and transmitted on the network by the user terminal to the platform of services further being transmitted to the server.

US Pat. No. 10,116,728

SYSTEM AND METHOD FOR TRANSFERRING DATA USING A DIRECTIONAL TOUCH GESTURE

Dell Products, LP, Round...

1. A method comprising:receiving, at an information handling system, a selection of a file;
requesting, by the information handling system, nearby information handling systems in response to the selection of the file;
receiving coordinate information and contact information for the nearby information handling systems from a server, wherein the nearby information handling systems are limited to information handling systems located within a same room of a building as the information handling system based on X, Y coordinates of the room creating a virtual backstop to prevent a file from being passed beyond the X, Y coordinates of the room, and the coordinate information includes X, Y coordinates of the nearby information handling systems within the room, wherein the nearby information handling systems include first, second, and third information handling systems, wherein the server includes a processor to store a map of the building in a memory of the server, to map locations of rooms within the building using a coordinate system and the map of the building, and to store the locations of the rooms on the map in the memory;
dividing the room into a plurality of sectors based on the coordinate information for each of the first, second, and third information handling systems and information about the information handling system, wherein a size of each of the sectors of the room is equal to a size of the other sectors of the room, wherein a first sector is defined to include the first information handling system, a second sector is defined to include the second information handling system, and a third sector is defined to include the third information handling system;
receiving a pass file indicator including a flick action; and
in response to the pass file indicator being aligned with the first sector, sending the file to the first information handling system of the first sector.

US Pat. No. 10,116,727

EMBEDDABLE WEB ANALYTICS TRACKING VIA MOCK ENVIRONMENT

SAP SE, Walldorf (DE)

1. A method implemented at least in part by a computer, the method comprising:receiving an indication of navigation to a locally-hosted web page at a client system, wherein the locally-hosted web page has one or more webpage properties;
staging a mock environment in the client system, wherein the mock environment comprises a set of properties that mimic visitation to the locally-hosted web page, wherein one or more properties of the set of properties are altered to be different from the webpage properties of the locally-hosted web page;
embedding an analytics snippet into the mock environment instead of the locally-hosted web page, wherein the analytics snippet is isolated within the mock environment; and
executing the analytics snippet embedded in the mock environment, wherein executing causes the analytics snippet to report, to an analytics server, analytics of a visitation to the locally-hosted web page based on the properties of the mock environment instead of the webpage properties of the locally-hosted web page, and wherein the analytics snippet reporting includes the altered properties under the mock environment.

US Pat. No. 10,116,724

MANAGING MULTIPLE DYNAMIC MEDIA STREAMS

Microsoft Technology Lice...

1. A computer-implemented method for monitoring multiple dynamic media streams playing concurrently on a client computer system having a processor, the method comprising:receiving, by the processor, media information that describes multiple multi-bitrate streams, wherein each of the multiple multi-bitrate streams is encoded at multiple bitrates;
receiving, by the processor, a priority indication for at least a first multi-bitrate stream of the multi-bitrate streams, the priority indication indicating a greater priority of the first multi-bitrate stream of the multi-bitrate streams relative to other multi-bitrate streams;
receiving, by the processor, at least two of the multi-bitrate streams described by the received media information and performing concurrent playback of the at least two multi-bitrate streams in the client computer system, wherein the at least two of the multi-bitrate streams includes the first multi-bitrate stream and a second multi-bitrate stream having a lower priority to the first multi-bitrate stream;
monitoring, by the processor, the at least two multi-bitrate streams during playback; and
upon detecting over utilization of client resources in the client computer system during playback of the first and second multi-bitrate streams, reducing, by the processor, a bitrate of playback of the second multi-bitrate stream such that the first multi-bitrate stream can use at least some of the client resources concurrently consumed by the second multi-bitrate stream.

US Pat. No. 10,116,723

CAMPUS CONTENT DISTRIBUTION SYSTEMS AND METHODS

The DIRECTV Group, Inc., ...

1. A method of streaming content to electronic devices, the method comprising:receiving, using one or more antennas, radio frequency (RF) signals including content broadcast via satellite;
using a plurality of tuner modules, tuning to predetermined channels of the RF signals to produce a plurality of tuned signals from the RF signals, each of the tuned signals corresponding to content of one of the predetermined channels;
demodulating the tuned signals to form demodulated signals, respectively;
decoding the demodulated signals to form decoded signals, respectively;
encoding the decoded signals to produce sets of transcoded signals for each of the predetermined channels, respectively, each of the sets of transcoded signals including (i) at least one signal having a first bit rate that is less than a second bit rate of the one of the tuned signals of the respective one of the predetermined channels having first content and (ii) at least one other signal corresponding to the first content for displaying the first content of the respective one of the channels;
using a server, packetizing the sets of transcoded signals for the predetermined channels according to Internet Protocol (IP) to produce packetized signals, respectively; and
transmitting, using the server, a computer network, and a plurality of access points, selected ones of the packetized signals to electronic devices using multicast Internet Protocol.

US Pat. No. 10,116,722

APPARATUS, SYSTEM, AND METHOD FOR MULTI-BITRATE CONTENT STREAMING

DISH TECHNOLOGIES LLC, E...

1. An apparatus including a microprocessor and a memory, for multi-bitrate content streaming, the apparatus comprising:a timeline module configured to receive a broadcaster defined programming lineup of media content available over a network, the broadcaster defined programming lineup defining a time each of the media content is available over the network, the media content comprising a plurality of streamlets representative of a portion of the media content, each of the plurality of streamlets of the media content having a substantially similar duration of time, and each of the plurality of streamlets of the media content contains an encoded representation of content encoded and compressed to varying bitrates, wherein the encoded content include two or multi-pass encoding, the timeline nodule configured to periodically request updates to the broadcaster defined programming lineup at least one data module configured to maintain multi-bitrate streamlet information for the plurality of streamlets;
a capture module configured to receive the media content from a publisher, decompressing the media content when arrives having been encoded and converts the media content into raw audio and/or video; and
a client module configured to request streamlets for playback of media content based upon the time each of the plurality of streamlets is available over the network according to the broadcaster defined programming lineup at one of the plurality of bitrates based upon a current read ahead margin, a minimum safety margin, and a performance ratio across a plurality of received streamlets, the performance ratio based upon time intervals between successive receive times for the plurality of received streamlets, wherein the client module is configured to request replacement for at least a portion of the media content based upon instructions within the broadcaster defined programming lineup.

US Pat. No. 10,116,721

REDUNDANCY CONTROL IN STREAMING CONTENT ENCODER POOLS

Amazon Technologies, Inc....

1. A system to manage video content encoding, the system comprising:a plurality of virtual machines forming a pool of encoders, wherein individual virtual machines of the pool of encoders are configured to obtain an input video stream and generate an encoded output video stream, and wherein at least one of the plurality of virtual machines is configured to generate a redundant output video stream in addition to the encoded output video stream;
at least one content packager device configured to package the encoded output video stream into a packaged content stream and transmit the packaged content stream to a set of content output devices; and
a pool manager implemented by one or more processors and configured with computer-executable instructions to:
obtain information associating demand information for the packaged content stream to desired numbers of virtual machines within the pool of encoders;
obtain monitoring information regarding transmission of the packaged content stream to the set of content output devices;
determine a demand for the packaged content stream based at least in part on the monitoring information;
identify, based on the demand for the packaged content stream and the demand information for the packaged content stream to desired numbers of virtual machines within the pool of encoders, an appropriate number of virtual machines within the pool of encoders; and
transmit instructions to the pool of encoders to modify a number of virtual machines within the pool to match the appropriate number of virtual machines.

US Pat. No. 10,116,720

REDIRECTS DURING MANIFEST FILE CONFIGURATION AND SERVING OF VIDEO SEGMENT FILES

DLVR, INC., Phoenix, AZ ...

1. A system for configuring and providing manifest files for adaptive streaming video, the system comprising:a manifest file serving system including one or more computer servers, each said computer server in the manifest file serving system comprising:
a processing unit including one or more processors; and
memory coupled with and readable by the processing unit and storing therein a set of instructions which, when executed by the processing unit, causes the one or more computer servers of the manifest file serving system to:
receive a request for a manifest file corresponding to an adaptive streaming video from a requesting device;
select multiple different content delivery networks to serve different portions of the requested adaptive streaming video, including a first content delivery network corresponding to a first domain and a second content delivery network corresponding to a second domain;
determine an interspersing pattern of universal resource locators (URLs) for the manifest file, the determined interspersing pattern of URLs specifying that a first subset of URLs corresponding to a first subset of video segment files to be served by the first content delivery network, are to be interspersed among a second subset of URLs corresponding to a second subset of video segment files to be served by the second content delivery network;
determine that at least the second content delivery network is to be accessed indirectly via redirect messages from an external computer system outside of the second content delivery network;
configure a manifest file corresponding to the requested adaptive streaming video, wherein the configured manifest file includes (a) the first subset of uniform resource locators (URLs) directed to the first domain to be served by the first content delivery network, and (b) the second subset of URLs, wherein the second subset of URLs is directed to a computer system configured to respond to requests from requestors for a plurality of the second subset of URLs with redirect messages instructing the requestors to request a different corresponding URL within the second domain to be served by the second content delivery network, and wherein the first subset of URLs are interspersed in the manifest file among the second subset of URLs; and
transmit the configured manifest file comprising the interspersed first and second subsets of URLs to the requesting device.

US Pat. No. 10,116,719

CUSTOMIZED DASH MANIFEST

Amazon Technologies, Inc....

1. A method, comprising:obtaining, at one or more servers, manifest data representing playback options of media content at a plurality of quality levels, each of the playback options being associated with a corresponding plurality of media fragments;
ascertaining, by the servers from the manifest data, locations of initialization fragments of media content files corresponding to the playback options;
retrieving, by the servers, the initialization fragments of the media content files corresponding to the playback options at the corresponding locations;
parsing, by the servers, the initialization fragments of the media content files corresponding to the playback options to obtain initialization metadata;
generating, by the servers, a Dynamic Adaptive Streaming over HTTP (DASH) manifest file that includes the initialization metadata, at least a portion of the manifest data, and per-fragment metadata for the plurality of media fragments of the media content, the DASH manifest file being configured to enable a client device to initiate playback of the media content without downloading the initialization fragments, the per-fragment metadata including a quality value associated with a first byte range for a corresponding media fragment of the plurality of media fragments;
receiving, by the servers, an indication that a client device has requested the media content; and
providing, by the servers, the DASH manifest file.

US Pat. No. 10,116,717

PLAYLIST COMPILATION SYSTEM AND METHOD

Intel Corporation, Santa...

1. A cellular client electronic device that is capable, when the cellular client electronic device is in operation, of communicating with a remote server system via at least one network, the at least one network comprising at least one Internet network, the cellular client electronic device comprising:a display for use, at least in part, in displaying media-related information;
at least one processor; and
storage capable of storing, at least in part, client application instructions that are capable of being executed, at least in part, by the at least one processor, the client application instructions, when executed, at least in part, by the at least one processor resulting, at least in part, in the cellular client electronic device being capable of performing operations comprising:
receiving, at least in part, via a user interface of the cellular client electronic device, at least one user input that requests, at least in part, accessing of at least one server-suggested media playlist generated, at least in part, by the remote server system based, at least in part, upon user media preference data and user media history data, the user media preference data to be provided, at least in part, by a user of the cellular client electronic device, the at least one server-suggested media playlist being capable of being stored, at least in part, in the cellular client electronic device and/or in the remote server system, the at least one server-suggested media playlist being capable of comprising at least one listing that indicates, at least in part, media data items that are to be played in a sequence defined, at least in part, by the at least one media playlist, the media data items being capable of comprising at least one media data item and at least one other media data item; and
receiving, at least in part, via the user interface, at least one additional user input that requests playing, at least in part, of the at least one server-suggested media playlist, the playing, at least in part, of the at least one server-suggested media playlist being capable of being based, at least in part, upon at least one media stream to be received, at least in part, from the remote server system via the at least one network, for use in the playing of the at least one server-suggested media playlist;
wherein:
the at least one media stream is to be provided, at least in part, by the remote server system to the cellular client electronic device based, at least in part, upon whether the user of the cellular client electronic device is a subscriber of at least one subscription-based service associated, at least in part, with the remote server system, the remote server system being capable of providing at least one relatively reduced service, relative to the at least one subscription-based service, for a non-subscriber of the at least one subscription-based service;
the cellular client electronic device is capable, when the cellular client electronic device is in the operation, of downloading, at least in part, from the remote server system for storing, at least in part, in the storage, the at least one media data item and/or the at least one other media data item, the at least one media data item and the at least one other media data item when stored in the storage being usable by the user only so long as the user remains subscribed to the at least one subscription-based service;
the remote server system is capable of providing the at least one server-suggested media playlist to another client electronic device associated with the user;
the at least one server-suggested media playlist is capable of being modified, at least in part, based upon at least one further user input provided via the user interface, to generate at least one modified media playlist; and
the remote server system is also capable of synchronizing, at least in part, across the cellular client electronic device and the another client electronic device, the at least one modified media playlist.

US Pat. No. 10,116,716

REAL TIME OPTIMIZED CONTENT DELIVERY FRAMEWORK

INTERNATIONAL BUSINESS MA...

1. A method, comprising:storing by a content delivery system a video comprising a plurality of original segments and a plurality of replacement segments, wherein each replacement segment in the plurality of replacement segments is associated with an original segment in the plurality of original segments;
replacing by the content delivery system a first original segment in the plurality of original segments with a first associated replacement segment in the plurality of replacement segments based on a characteristic of the first original segment, a characteristic of the first associated replacement segment and a characteristic of a first viewer;
replacing by the content delivery system a second original segment in the plurality of original segments with a second associated replacement segment in the plurality of replacement segments based on a characteristic of the second original segment, a characteristic of the second associated replacement segment and a characteristic of a second viewer, wherein the second viewer is different from the first viewer;
streaming by the content delivery system the plurality of original segments with the first original segment replaced by the first associated replacement segment and the second original segment replaced by the second associated replacement segment to a first device configured to be viewed by the first viewer and the second viewer;
receiving by the content delivery system from the first viewer a viewing preference for the second viewer; and
replacing by the content delivery system a third original segment in the plurality of original segments with a third associated replacement segment in the plurality of replacement segments based on the viewing preference for the second viewer so that the third associated replacement segment is streamed to the device configured to be viewed by the viewers instead of the third original segment.

US Pat. No. 10,116,715

ADAPTING ENCODED BANDWIDTH

Microsoft Technology Lice...

1. A method of determining an encoding rate, comprising:determining a plurality of bandwidth measurements of a network path between a first device and a second device based on data communication over the path;
determining a maximum bandwidth of the network path based on the plurality of bandwidth measurements;
setting a bandwidth cap based on a first percentage of the maximum bandwidth in response to the maximum bandwidth meeting a first criterion, and setting the bandwidth cap based on a second different percentage of the maximum bandwidth in response to the maximum bandwidth meeting a second criterion;
determining a minimum bandwidth of the network path based at least in part on the plurality of bandwidth measurements;
determining an encoding rate of an encoder to be between the bandwidth cap and the minimum bandwidth;
encoding data based on the determined rate; and
transmitting the encoded data over the network path.

US Pat. No. 10,116,714

APPARATUS AND METHOD FOR ON-DEMAND MULTI-DEVICE SOCIAL NETWORK EXPERIENCE SHARING

1. A method, comprising:receiving, by a processor of a service provider of a communication network that provides a communication service, a request from a mobile endpoint device of a user to share a video of a live event at a commercial venue that the user is capturing;
establishing, by the processor, a first video session with the mobile endpoint device of the user, the first video session containing the video of the live event at the commercial venue that the user is capturing, wherein the establishing is performed in response to determining that the mobile endpoint device has rights for sharing the video of the live event at the commercial venue;
receiving, by the processor, at least one social media connection of the user for receiving the video;
sending, by the processor, a notification to each social media connection of the at least one social media connection that the video is available;
receiving, by the processor, a request from at least one of the at least one social media connection to access the video; and
establishing, by the processor, a second video session with an endpoint device of the at least one of the at least one social media connection to provide the video.

US Pat. No. 10,116,713

SYSTEM AND METHODS FOR CONTENT STREAMING WITH A CONTENT BUFFER

JAMDEO CANADA, LTD., Ont...

1. A method for content streaming with an intermediate content buffer, the method comprising:detecting, by a content buffer of a device, a request for network content from a player, wherein the request is a network communication detected by the content buffer and the request for network content is directed to a server, wherein the request includes a data range;
creating, by the content buffer of the device, a playlist and virtual segments for the network content in response to the request;
requesting, by the content buffer, a first virtual segment of the playlist for the network content from the server based on the data range;
identifying, by the content buffer of the device, associated network content, wherein the associated network content is associated with the network content requested by the player;
pre-downloading, by the content buffer of the device, associated network content for the player based on the identifying, wherein the content buffer requests associated network content from the server based on a second virtual segment of the playlist for the associated network content;
and
providing, by the content buffer of the device, the associated network content to the player based on the pre-downloading.

US Pat. No. 10,116,711

DETERMINING AND PROVIDING DATA RELATED TO COLLABORATION EVENT

Lenovo Enterprise Solutio...

1. A method comprising:determining, by a computing device, a collaboration event regarding a plurality of users, regardless of whether an actual collaboration is in fact occurring among the users;
determining, by the computing device, data related to the collaboration event, as data that at least a predetermined percentage of the users have in common, regardless of whether the data is in fact related to the actual collaboration; and
providing, by the computing device, the data related to the collaboration event to at least one of the users participating in the collaboration event,
wherein determining the collaboration event comprises one of:
receiving locations of devices of the users and determining that the locations are identical within a threshold, the computing device determining the collaboration event responsive to determining that the locations are identical within the threshold;
determining that communication devices of the users are currently engaging in a common communication session, the computing device determining the collaboration event responsive to determining that the communication devices are currently engaging in the common communication session.

US Pat. No. 10,116,710

SESSION PARAMETERS IN THE PERIODIC ASSISTANCE DATA DELIVERY

Nokia Technologies Oy, E...

1. A method comprising:receiving, by a device, periodic assistance data associated with periodic assistance data delivery session;
receiving, by the device, modified session parameters in a provide message of the periodic assistance data delivery session, the provide message comprising an information element in which the modified session parameters are received, and an identification that identifies an assistance data stream affected by the modified session parameters, wherein the session parameters comprise at least one of frequency information regarding how often a payload of the assistance data is delivered, and duration information regarding how long the periodic assistance data delivery session will last; and wherein the modified session parameters override previous session parameters received by the device via a previous message with the previous session parameters;
continuing of the receiving, by the device, periodic assistance data of the periodic assistance data delivery session based on the modified session parameters.

US Pat. No. 10,116,709

SYSTEMS AND METHODS FOR OPTIMIZING APPLICATION DATA DELIVERY OVER THIRD PARTY NETWORKS

STAR2STAR COMMUNICATIONS,...

1. A method for optimizing communication sessions through one or more networks comprising a plurality of communication nodes operatively connected to a plurality of network edge devices, comprising the steps of:receiving at a particular network edge device a predetermined list of possible communication nodes in the one or more networks through which communication sessions may be routed, and receiving one or more business rules relating to optimizing communication sessions;
processing the one or more business rules at the particular network edge device to determine one or more actions to be taken by the particular network edge device to obtain information relevant to optimization of communication sessions;
performing the one or more actions dictated by the one or more business rules via the particular network edge device, wherein at least one of the one or more actions comprises classifying each of the possible communication nodes based on communication session type, wherein a communication session type is a particular class of communication traffic of one or more classes of communication traffic that can be routed by each of the possible communication nodes;
receiving information relating to optimization of communication sessions at the particular network edge device as a result of performance of the one or more actions dictated by the one or more business rules, wherein the information relating to optimization of communication sessions includes an indication of at least one communication session type for which each of the possible communication nodes is configured; and
generating a prioritized list of the possible communication nodes based on the information relating to optimization of communication sessions and based on the one or more business rules, wherein the prioritized list of possible communication nodes includes a list of communication nodes classified by at least one communication session type.

US Pat. No. 10,116,708

SIP SIGNALLING

Metaswitch Networks Limit...

1. A SIP call server running software for initialising and managing SIP calls and configured to establish a UDP connection with a client via a firewall in which a UDP pinhole may only be opened by messages sent from the client side of the firewall, the server comprising:a hardware input port for receiving TCP SIP INVITE messages sent in order to establish a call with a call initiator;
a response message generator for generating at least one TCP response message in response to receipt of a TCP SIP INVITE message, the at least one TCP response message specifying UDP as the new transport protocol wherein said at least one TCP response message is one of a SIP 180 message and a SIP 200 message; and
a hardware output port for sending said at least one TCP response message to the call initiator.

US Pat. No. 10,116,707

ELECTRONIC MESSAGING EXCHANGE

1. A method for secure electronic message exchange, comprising:authenticating, by a wireless terminal, an inmate of an institution when the inmate attempts to login to the wireless terminal, wherein the wireless terminal is isolated from an internet;
generating, by the wireless terminal, an electronic message for a user based on input from the inmate, the user being external to the institution;
transmitting, by the wireless terminal, the electronic message to a control platform using a wireless connection, wherein the control platform is located outside the institution, and the wireless terminal is coupled to the control platform;
receiving, by the control platform, the electronic message from the wireless terminal;
performing, by the control platform, an automated security scan of the electronic message;
authenticating, by the control platform, the user by determining whether the user is an approved contact for the inmate;
based on the automated security scan and the authentication of the user, forwarding, by the control platform, the electronic message to a secure platform, and forwarding a notification associated with the electronic message to a device associated with the user;
receiving, by the secure platform, a login request from the device associated with the user in response to receiving the notification associated with the electronic message;
approving the login request from the user;
providing, by the secure platform, secure web-based access to the user upon approval of the login request; and
facilitating, by the secure platform, a subsequent electronic message conversation between the inmate and the user using the secure web-based access, wherein the secure platform is integrated within the control platform.

US Pat. No. 10,116,706

INTER-DOMAIN REPLICATION OF SERVICE INFORMATION

INTERNATIONAL BUSINESS MA...

1. A method, comprising:performing an automated conversion between a local service definition format and a remote service definition format defined respectively within first and second independent enterprise information technology (IT) management domains using a federated gateway within each of the first and second independent enterprise IT management domains that bridges service definition formatting differences between the first and second independent enterprise IT management domains; and
dynamically performing, during transmission of a service request from a service consumer application executing within the first independent enterprise IT management domain to a remote service provider application in the second independent enterprise IT management domain, real-time service call translation from the local service definition format to the remote service definition format using the federated gateway within each of the first and second independent enterprise IT management domains.

US Pat. No. 10,116,705

IMPLEMENTING SECURITY IN A SOCIAL APPLICATION

INTERNATIONAL BUSINESS MA...

1. A system for implementing security in social applications, comprising hardware processing resources communicating with hardware memory resources to implement:an inference engine to infer a closeness level, based on a closeness policy, between a first user having a user's profile on a social application and a second user having an existing connection in the social application to the first user, the inference engine to assign a score to the inferred closeness level; and
a security implementation engine to implement a security level, based on said score, that is individualized to said second user, the security level dictating a corresponding set of security mechanisms to be applied to communications received by the first user from the second user such that the security level applied to the second user corresponds to the inferred closeness level.

US Pat. No. 10,116,704

METHOD AND SYSTEM FOR RAPID ACCREDITATION/RE-ACCREDITATION OF AGILE IT ENVIRONMENTS, FOR EXAMPLE SERVICE ORIENTED ARCHITECTURE (SOA)

Object Security LLC, Pal...

1. A computer-implemented method for managing and analyzing security requirements, the method comprising:reading from a model information source, at least one security implementation model indicating security implementation policy characteristics;
reading from the model information source at least one requirement model indicating requirement policy characteristics;
at least partially automatically relating the read security implementation model and the read requirements model and at least partially automatically determining a correspondence between the security implementation model and the requirements model by analyzing correspondence between security implementation policy characteristics and requirements policy characteristics, the correspondence indicating that a requirement defined in the requirement model match with security policies implemented by controls defined by the security implementation model;
at least partially automatically generating evidence based on the determination of the correspondence between the security implementation model and the requirements model; and
storing, transmitting and/or displaying the generated evidence.

US Pat. No. 10,116,702

SECURITY POLICY UNIFICATION ACROSS DIFFERENT SECURITY PRODUCTS

Cisco Technology, Inc., ...

1. A computer-implemented method comprising:displaying multiple icons, each icon representing an actor or a resource in a networking environment;
defining a generic security policy by receiving user input in the form of a line drawn between a first icon representing an actor and a second icon representing a resource to control abilities between the actor and the resource, wherein the line represents: that abilities between the actor and the resource are allowed or denied when the line has a first characteristic and a second characteristic, respectively; that traffic between the actor and the resource is to be monitored or is not to be monitored when the line has a third characteristic and a fourth characteristic that include respective colors of the line that indicate that the traffic is to be monitored or is not to be monitored, respectively; and a level of security risk when the line has a fifth characteristic that includes a color of the line that represents the level of the security risk;
translating the generic security policy to multiple native security policies each of which is based on a corresponding one of multiple native policy models associated with corresponding ones of multiple security devices; and
supplying data descriptive of the multiple native security policies to the corresponding ones of the security devices to configure the corresponding ones of the security devices to implement the native security policies.

US Pat. No. 10,116,699

SYSTEMS AND METHODS FOR NETWORK SECURITY

United Services Automobil...

1. A computer-implemented method, comprising:obtaining a whitelist of resource access sources that are allowed to use a particular resource access account to access a particular resource on a computer resource;
detecting an access attempt to the particular resource;
identifying a source, from which the access attempt originated, and a resource access account used in the access attempt;
determining, by referencing the whitelist, if the source, from which the access attempt originated, is allowed to use the resource access account used in the access attempt; and
performing one or more mitigation tasks if the source, from which the access attempt originated, is not allowed to use the resource access account used in the access attempt, wherein the one or more mitigation tasks comprises restricting access to the particular resource by the source, from which the access attempt originated, only after a threshold number of access attempts are performed by the source, from which the access attempt originated, using the resource access account.

US Pat. No. 10,116,698

MANAGING NETWORK FIREWALL CONFIGURATION UTILIZING SOURCE LISTS

Amazon Technologies, Inc....

1. A method for managing network-based communications comprising:obtaining a set of network firewall configuration information for configuring a network firewall on behalf of a customer from a plurality of sources, wherein individual network configuration information is provided by a source different from a network point of presence;
parsing the set of network firewall configuration information to identify a list of network address information, the list of network address information associated with one or more source network address ranges;
processing the list of network address information, wherein processing the list of network address information includes prioritizing the list of network address information based on a size of source network address range in the list of network address information and a weight of a source of the network firewall configuration information, wherein the prioritized list is ordered such that a larger source network address range is listed before and has a higher priority relative to a smaller source network address range;
processing the prioritized list of network address information to limit a number of network address ranges in the prioritized list of network address information to be below a maximum threshold;
generating network firewall configuration information for the network firewall on behalf of the customer based on the prioritized list of network address information, wherein the generated network firewall configuration information causes communications from a network address that is included in the prioritized list to be blocked; and
causing the network firewall to be configured based on the generated network firewall configuration information.

US Pat. No. 10,116,697

SYSTEM AND METHOD FOR GEOFENCING

Open Text SA ULC, Halifa...

1. A method, comprising:downloading, by a client device of a server computer, a managed container from a network source, the managed container written in a programming language native to the client device and comprising a managed cache and an application framework with an execution engine that provides a runtime environment for applications associated with backend systems running in an enterprise computing environment;
receiving, over a network by the managed container embodied on a non-transitory computer memory of the client device, an application retrieved from an application repository by the server computer, the application repository and the server computer residing in the enterprise computing environment outside of a firewall, the application hosted or required by a backend system operating in the enterprise computing environment behind the firewall;
storing the application in the managed cache of the managed container on the client device, the storing performed by the managed container;
managing, by the managed container, the application and content stored in the managed container in accordance with one or more rules, the one or more rules including a geolocking or geofencing rule propagated from the backend system through the firewall to the server computer to the managed container on the client device;
displaying an icon for the application in a user interface of the managed container on the client device;
providing, by the managed container on the client device, a secure shell or runtime environment for running the application when the icon for the application is selected or invoked from within the user interface of the managed container;
receiving, by the managed container on the client device, a request for content from the application running in the secure shell or runtime environment provided by the managed container on the client device;
determining, by the managed container on the client device, whether the client device is located within a specified geographical location that is secure for viewing the content;
permitting, by the managed container on the client device to the application running in the secure shell or runtime environment provided by the managed container on the client device, access to the content if the client device is located within the specified geographical location that is secure for viewing the content;
denying or restricting, by the managed container on the client device based at least in part on the geolocking or geofencing rule, access by the application to the content requested by the application if the client device is not located within the specified geographical location that is secure for viewing the content; and
automatically deleting the content from the managed cache if the client device is outside of the specified geographical location for a predetermined amount of time and, after the predetermined amount of time has passed, the client device has not made a connection to the server computer or returned to within the specified geographical location.

US Pat. No. 10,116,694

NETWORK SIGNALING INTERFACE AND METHOD WITH ENHANCED TRAFFIC MANAGEMENT DURING SIGNALING STORMS

Markport Limited, Dublin...

1. A signaling interface controller (DSC) for a communications network, the signaling Interface controller comprising a processor and a non-transitory computer-readable medium comprising software code that causes said processor to:(a) dynamically manage signaling traffic by real time processing with execution of a self-learning algorithm to make a decision per signaling message as to how to handle each of a plurality of incoming signaling messages during a signaling message storm before attempting to perform tasks for signal delivery to a destination peer, and
(b) dynamically calculate and use per-message values to execute the self-learning algorithm by, for each signaling message of a plurality of signaling messages executing operations of:
calculating a dynamic network user value (Fdu) according to criteria associated with nature of said signaling message;
providing a current network user value (Fcu) by modifying said dynamic network user value (Fdu) according to a base network user value (Fbu);
providing a signal value (Fsig) by modifying the current network user value (Fcu) according to a message base value (Fbsig) identifying importance of said signaling message in relation to others of said plurality of signaling messages;
providing a dynamic average peer value (Fp) for a peer by computing an average of a plurality of signal values (Fsig) addressed to said peer; and
making said decision according to comparison of the signal value (Fsig) and the dynamic average peer value (Fp).

US Pat. No. 10,116,693

SERVER USING PROOF-OF-WORK TECHNIQUE FOR HARDENING AGAINST DENIAL OF SERVICE ATTACKS

EMC IP Holding Company LL...

1. A method of operating a server device in connection with a human interaction service provided to client devices, comprising:generating, by the server device, an array of hash values by iterating first cryptographic hashing operations, each operation generating a respective hash value of the array and taking as input a respective preceding hash value of the array generated by a respective preceding operation;
receiving, by the server device, a client request containing a proof-of-work value, the proof-of-work value reflecting a count of multiple searches of the same array of hash values at the client device until encountering a predetermined stop value in the array;
performing, by the server device, one search of the array beginning with the last-generated hash value, the one search including iterated second cryptographic hashing operations each taking as inputs (1) the proof-of-work value received from the client device, and (2) a respective intermediate value generated in a respective preceding operation;
comparing, by the server device, a last-generated intermediate value of the one search to the predetermined stop value to generate a verification result; and
when the verification result is positive, then performing further processing of the client request by the server device to provide the human interaction service to a client device that provided the client request, and when the verification result is negative, then refraining from the further processing of the client request;
wherein each of the second cryptographic hashing operations includes generating a respective index to be used to select a hash value of the array in a next succeeding operation, the index being generated by masking a predetermined number of bits of a respective hash value retrieved by the operation, the predetermined number corresponding to an address length for the array.

US Pat. No. 10,116,692

SCALABLE DDOS PROTECTION OF SSL-ENCRYPTED SERVICES

Arbor Networks, Inc., Bu...

1. A system for mitigating network attacks within encrypted network traffic, the system comprising:a cloud based Distributed Denial of Service (DDoS) mitigation service having a plurality of attack management devices;
one or more attack mitigation devices communicatively coupled to a protected network and to the cloud based DDoS mitigation service, wherein the one or more attack mitigation devices are configured and operable to decrypt the encrypted network traffic received from the DDoS mitigation service and destined to the protected network to form a plurality of decrypted network packets, analyze the plurality of decrypted network packets to detect one or more attacks by determining which decrypted network packets are associated with network attacks, generate, in response to detecting the one or more attacks, one or more attack signatures corresponding to the one or more detected attacks and send the generated one or more attack signatures to the one or more attack management devices utilizing cloud-signaling network protocols to push the attack signatures to the plurality of cloud based attack management devices wherein the one or more attack mitigation devices are further configured and operable to re-encrypt only decrypted network packets not associated with the one or more detected network attacks and to send the re-encrypted packets to the protected network; and
wherein the one or more attack management devices are configured and operable to block encrypted network traffic matching the one or more attack signatures from reaching the protected network without needing to decrypt incoming encrypted traffic received from one or more external devices.

US Pat. No. 10,116,690

SYSTEM AND METHOD FOR THE PROTECTION OF COMPUTERS AND COMPUTER NETWORKS AGAINST CYBER THREATS

1. A computing system comprising:an inner core system, including:
an inner core computing system including a processor, used for performing computing tasks, and
inner core system storage used to store data used by the inner core computing system when performing the computing tasks;
protected internet data storage, including:
a protected storage area for downloaded data and software that is downloaded from a network, and
a quarantine block that inspects the downloaded data and software for malware before the downloaded data and software is transferred to the inner core system storage; and,
a cell array interface that interfaces between the network and the inner core system, wherein the cell array interface includes a plurality of cells, each cell in the plurality of cells including:
a processor, and
memory;
wherein, when data or software is downloaded from the network to the computing system, a selected cell from the plurality of cells receives the downloaded data or software and places the downloaded data or software into the protected storage area where the quarantine block inspects the downloaded data and software for malware, the downloaded data or software not being transferred to the inner core system storage unless and until the quarantine block certifies the downloaded data or software as being free from malware;
wherein each cell in the plurality of cells is certified as either clean from malware or potentially infected by malware; and,
wherein the selected cell is selected from among those cells in the plurality of cells that are currently certified as clean from malware.

US Pat. No. 10,116,689

NEUTRALIZING PROPAGATION OF MALICIOUS INFORMATION

International Business Ma...

10. An apparatus, said apparatus comprising:at least one processor; and
a non-transitory computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising:
computer readable program code configured to identify, using a directed acyclic graph, malicious information spreading in an information-exchange network;
computer readable program code configured to classifying at least one topic of the malicious information;
computer readable program code configured to determine a potential sub-network for future spread of the malicious information based on the at least one topic classified, wherein the determining is based on a relationship between the potential sub-network and at least one entity that received the malicious information; and
computer readable program code configured to attenuate a potential future spread of the malicious information via at least one of:
automatically propagating a countervailing message to the potential sub-network; and
prompting manual intervention for propagating the countervailing message to the potential sub-network and, in response to the manual intervention, propagating the countervailing message to the potential sub-network.

US Pat. No. 10,116,687

MANAGEMENT OF ADMINISTRATIVE INCIDENT RESPONSE BASED ON ENVIRONMENTAL CHARACTERISTICS ASSOCIATED WITH A SECURITY INCIDENT

Splunk Inc., San Francis...

1. A method of managing service level agreements (SLAs) for security incidents in a computing environment, the method comprising:identifying a rule set for a security incident of the security incidents wherein the rule set is associated with one or more action recommendations to be taken against the security incident;
identifying a default SLA for the security incident based on the rule set, wherein the default SLA comprises a default hierarchy of administrators for the security incident;
obtaining environmental characteristics related to the security incident, wherein the environmental characteristics comprise at least a severity level of the security incident;
determining a modified SLA for the security incident based on the environmental characteristics, wherein the modified SLA comprises a second hierarchy of administrators for the security incident, and wherein the modified SLA is based on the severity level of the security incident;
providing the one or more action recommendations to administrators based on the second hierarchy of administrators of the modified SLA; and
obtaining input from at least one administrator in the second hierarchy of administrators regarding at least one action recommendation of the one or more action recommendations.

US Pat. No. 10,116,686

SYSTEMS AND METHODS FOR SELECTIVELY INSULATING A PROCESSOR

1. A method for protecting a computer processor system from a harmful communication session from a network linked to the processor system, by interrupting a stream of damaging data from the network, wherein the processor system includes a processor, the method comprising:disconnecting the processor from the network in response to a first event, wherein disconnecting the processor disrupts the continuity of the harmful communication session from the network to the processor, wherein the first event comprises no activity from a human operator interacting with the processor system for a random amount of time and the first event occurs independently of any data available to the processor system; and
resuming communication to the network by connecting the processor to the network in response to a second event, wherein both the first event and the second event are controlled by the processor system independent from the contents of the data received from the network.

US Pat. No. 10,116,685

SECURITY KEY DERIVATION IN DUAL CONNECTIVITY

Sun Patent Trust, New Yo...

1. A secondary base station apparatus, comprising:a transmitter, which, in operation, transmits a change request of a secondary security key to a master base station when a value of a COUNT exceeds a threshold value, wherein the secondary security key is a security key for the secondary base station apparatus;
a receiver, which, in operation, receives from the master base station an updated secondary security key, the updated secondary security key being derived at the master base station using an incremented freshness counter and a currently active security key of the master base station, without refreshing the current active security key of the master base station; and
control circuitry, which, in operation, computes a new encryption key for communication with a mobile terminal using the updated secondary security key.

US Pat. No. 10,116,683

COMPUTER SECURITY VULNERABILITY ASSESSMENT

OPSWAT, INC., San Franci...

1. A method comprising:receiving, by a computerized system, a binaries-to-vulnerabilities database, formed from a binaries-to-products database and a product-to-vulnerabilities database, that provides a correspondence between binary data and vulnerability data, the binary data including first binary hashes formed from a hash technique using strings of bits extracted from at least a portion of binary-level files of software products;
establishing, by the computerized system, a communication connection to a target device;
receiving, by the computerized system, binary files from the target device;
generating, by the computerized system, second binary hashes formed from the same hash technique using strings of bits extracted from at least a portion of the binary files;
scanning, by the computerized system using the binaries-to-vulnerabilities database, the second binary hashes to find matches between the second binary hashes and the first binary hashes; and
determining, by the computerized system, a known security vulnerability of the target device based on 1) results of the scanning and 2) the correspondence between the binary data and the vulnerability data.

US Pat. No. 10,116,682

SYSTEM AND METHOD FOR EVALUATING AND ENHANCING THE SECURITY LEVEL OF A NETWORK SYSTEM

SPHERIC SECURITY SOLUTION...

1. A method for evaluating a security level of a network system, the method being implemented by one or more processors and comprising:identifying a plurality of security elements of the network system;
determining a security architecture of the network system based on the identified plurality of security elements;
wherein determining the security architecture includes implementing a security model that identifies a plurality of pre-determined relationships as between individual security elements in the plurality of security elements, in connection with possible types of threats to the network system and one or more types of assets that can be exposed as a result of a breach;
evaluating the security architecture to determine an evaluation for the network system, the evaluation identifying a monetary value for a risk to the security network as a result of one or more security elements being breached;
determining a set of recommendations based at least in part on the evaluation, each recommendation in the set of recommendations identifying a new component to add to the security network to improve the evaluation of the security architecture;
wherein determining the set of recommendations includes determining the new component based at least in part on both the cost for implementing the new component on the network system as compared to the monetary value for the breach if the new component is not implemented; and
outputting the evaluation to a user, wherein the output includes the determined set of recommendations.

US Pat. No. 10,116,681

METHOD OF DETECTING SHARED VULNERABLE CODE

Denim Group, Ltd.

1. A method of detecting and analyzing vulnerable code shared between at least two applications comprising the steps of:creating a consolidated vulnerability database populated with at least one vulnerability testing result from each of the at least two applications wherein in each vulnerability result comprises a vulnerability type, filename, line number, and data/control flow elements;
identifying at least one shared vulnerability by:
comparing a first vulnerability testing result with the remaining vulnerability testing results within the consolidated vulnerability database and recording any vulnerability type, filename and line number matches as vulnerability location matches; and
comparing the number of data/control flow elements of the first vulnerability testing result with the remaining vulnerability testing results within the consolidated vulnerability database and recording any matches as data/control flow element matches;
analyzing the at least one shared vulnerability by:
assigning a confidence to the shared vulnerability based on the vulnerability location matches and the data/control flow element matches;
assigning a severity to the shared vulnerability type; and
assigning a criticality to each of the at least two applications from which the shared vulnerability originated from; and
creating a database of shared vulnerabilities wherein each shared vulnerability is risk-ranked and confidence-scored based on the confidence, the severity, and the criticality.

US Pat. No. 10,116,677

METHOD AND SYSTEM FOR UNIQUELY IDENTIFYING A USER COMPUTER IN REAL TIME USING A PLURALITY OF PROCESSING PARAMETERS AND SERVERS

THREATMETRIX PTY LTD, Ch...

1. A method for distinguishing a compromised client device from a masquerading device, the method comprising:capturing, by a hardware processor of one or more servers, a plurality of attributes from a network device connecting to a web service, each of the attributes representing a parameter, the plurality of parameters uniquely identifying the network device from a plurality of other networks devices;
maintaining the network device free from any software programs associated with the capturing of the plurality of attributes;
determining, by the hardware processor, a device identifier based on a programmatic transformation of the plurality of attributes captured from the network device;
comparing, by the hardware processor, the device identifier against at least one existing device identifier determined by the hardware processor, wherein the at least one existing device identifier is generated based on a programmatic transformation of a plurality of attributes captured from a respective device; and
determining, by the hardware processor, if the network device is compromised based at least in part the comparison between the device identifier and an existing device identifier.

US Pat. No. 10,116,676

APPARATUS AND METHODS FOR DATA COLLECTION, ANALYSIS AND SERVICE MODIFICATION BASED ON ONLINE ACTIVITY

Time Warner Cable Enterpr...

1. A method performed by a processing apparatus of an online service provider for modifying services based on collected data relating to online activity comprising:collecting a plurality of data;
using a computerized process to create data structures corresponding to a plurality of activity records for a plurality of subscribers based at least in part on the plurality of data, the data structures corresponding to the plurality of activity records being representative of online activity of the plurality of subscribers;
applying a weighting factor to individual ones of the data structures corresponding to the plurality of activity records, the applying of the weighting factor comprising (i) applying a negative weighting factor to the individual ones of the data structures corresponding to the plurality of activity records that are categorized as a negative activity type, and (ii) applying a positive weighting factor to the individual ones of the data structures corresponding to the plurality of activity records that are categorized as a positive activity type;
compiling an aggregate score for an individual subscriber based at least in part on the weighted data structures corresponding to the plurality of activity records;
comparing the aggregate score of the individual subscriber to a pre-determined threshold value; and
modifying services provided to the individual subscriber based at least in part on a result of the comparison of the aggregate score to the pre-determined threshold value.

US Pat. No. 10,116,674

FRAMEWORK FOR EXPLAINING ANOMALIES IN ACCESSING WEB APPLICATIONS

Citrix Systems, Inc., Fo...

1. A method for characterizing anomalous network traffic, comprising:receiving, by a device intermediary to a plurality of clients and a plurality of servers, network traffic, the network traffic including an anomaly;
determining, by the device, whether the network traffic satisfies at least one of the rules of a univariate policy based on a respective single independent network traffic feature, a first anomaly explanation associated with satisfying the at least one of the rules of the univariate policy;
determining, by the device, responsive to determining that the network traffic does not satisfy at least one of the rules of the univariate policy, that the network traffic satisfies a multivariate policy including a plurality of anomaly explanation tests, a second anomaly explanation associated with satisfying at least of the plurality of anomaly explanation tests;
selecting, by the device, responsive to determining that the network traffic satisfies the multivariate policy, the second anomaly explanation; and
generating, by the device, an anomaly explanation output including the selected second anomaly explanation.

US Pat. No. 10,116,673

SYSTEM AND METHOD FOR UPLOADING AND VERIFYING A DOCUMENT

STATE FARM MUTUAL AUTOMOB...

1. A computer implemented method comprising:receiving, at a first data server, a file uploaded from a client device, wherein the file is associated with an insurance company event;
determining, by a malware module of the first data server, whether the file contains a computer security threat;
transmitting the file to a second data server when it is determined that the file does not contain a computer security threat;
determining, by a conversion module of the second data server, whether the file is supported;
converting, by the conversion module of the second data server, the file into a converted file when it is determined that the file is not supported, wherein the converted file is supported;
flagging the converted file for association with an insurance company event; and
transmitting, by a hardware processor, the converted file to a permanent storage server.

US Pat. No. 10,116,672

DISTRIBUTED DENIAL-OF-SERVICE ATTACK DETECTION BASED ON SHARED NETWORK FLOW INFORMATION

International Business Ma...

1. A computer-implemented method for detecting distributed denial-of-service (DDoS) attacks, the computer-implemented method comprising:monitoring, by a first data processing system, current local network flow information corresponding to data packets received by the first data processing system via the network;
recording, by the first data processing system, the current local network flow information in a local flow information table;
generating, by the first data processing system, a current local network flow information message containing the current local network flow information;
computing, by the first data processing system, a hash value of the current local network flow information message;
broadcasting, by the first data processing system, the current local network flow information message to a plurality of randomly selected data processing systems connected to the network based on the hash value of the current local network flow information message, wherein each data processing system has a corresponding node, and each node shares their respective local flow information with other data processing nodes randomly;
analyzing, by a first data processing system, current aggregated flow information for a defined period of time, wherein the current aggregated flow information is a real-time current snapshot of an amount of network data packets flowing to the second data processing system from a plurality of different data processing systems via the network for the defined period of time, and the defined period of time represents a predetermined time interval threshold for when the first data processing system (i) transmits the current local network flow information recorded in the local flow information table to randomly selected other data processing systems connected to the network, and (ii) aggregates current local network flow information messages received from the other data processing systems;
determining, by the first data processing system, whether network flow increased above a defined flow threshold value to a second data processing system connected to a network within the defined period of time based on the analyzing of the current aggregated flow information;
responsive to the first data processing system determining that the network flow has increased above the defined flow threshold value to the second data processing system connected to the network within the defined period of time, determining, by first the data processing system, that the second data processing system is under a DDoS attack and transmitting a notification to the second data processing system indicating that the second data processing system is under a DDoS attack;
determining, by the first data processing system, whether the network flow increased above the defined flow threshold value to the first data processing system, itself, within the defined period of time based on the analyzing of the current aggregated flow information; and
responsive to the first data processing system determining that the network flow has increased above the defined flow threshold value to the first data processing system, itself, within the defined period of time, determining, by the first data processing system, that the first data processing system is under the DDoS attack, and performing, by the first data processing system, mitigation steps to halt the DDoS attack on the first data processing system.

US Pat. No. 10,116,671

DISTRIBUTED DENIAL-OF-SERVICE ATTACK DETECTION BASED ON SHARED NETWORK FLOW INFORMATION

International Business Ma...

1. A data processing system for detecting distributed denial-of-service (DDoS) attacks, the data processing system comprising:a bus system;
a storage device connected to the bus system, wherein the storage device stores program instructions; and
a processor connected to the bus system, wherein the processor executes the program instructions to:
monitor, by a first data processing system, current local network flow information corresponding to data packets received by the first data processing system via the network;
record, by the first data processing system, the current local network flow information in a local flow information table;
generate, by the first data processing system, a current local network flow information message containing the current local network flow information;
compute, by the first data processing system, a hash value of the current local network flow information message;
broadcast, by the first data processing system, the current local network flow information message to a plurality of randomly selected data processing systems connected to the network based on the hash value of the current local network flow information message, wherein each data processing system has a corresponding node, and each node shares their respective local flow information with other data processing nodes randomly;
analyze current aggregated flow information for a defined period of time, wherein the current aggregated flow information is a real-time current snapshot of an amount of network data packets flowing to the second data processing system from a plurality of different data processing systems via the network for the defined period of time, and the defined period of time represents a predetermined time interval threshold for when the first data processing system (i) transmits the current local network flow information recorded in the local flow information table to randomly selected other data processing systems connected to the network, and (ii) aggregates current local network flow information messages received from the other data processing systems;
determine whether network flow increased above a defined flow threshold value to a second data processing system connected to a network within the defined period of time based on analyzing the current aggregated flow information;
determine that the second data processing system is under a DDoS attack in response to determining that the network flow has increased above the defined flow threshold value to the second data processing system connected to the network within the defined period of time and transmit a notification to the second data processing system indicating that the second data processing system is under a DDoS attack;
determine, by the first data processing system, whether the network flow increased above the defined flow threshold value to the first data processing system, itself, within the defined period of time based on the analyzing of the current aggregated flow information; and
responsive to the first data processing system determining that the network flow has increased above the defined flow threshold value to the first data processing system, itself, within the defined period of time, determine, by the first data processing system, that the first data processing system is under the DDoS attack and perform, by the first data processing system, mitigation steps to halt the DDoS attack on the first data processing system.

US Pat. No. 10,116,670

EVENT SPECIFIC RELATIONSHIP GRAPH GENERATION AND APPLICATION IN A MACHINE DATA PROCESSING PLATFORM

SPLUNK INC., San Francis...

1. A method comprising:receiving, by a computer system, raw machine data produced by an information technology environment, the raw machine data indicative of activity of one or more components of the information technology environment;
wherein the received raw machine data include a plurality of data units, wherein the raw machine data in each data unit of the plurality of data units includes data indicative of an activity, entities that participated in the activity, and a timestamp for the activity;
for each data unit of the plurality of data units, by the computer system,
identifying a relationship between the entities indicated in the data unit, the relationship indicative of the activity indicated in the data unit, and
annotating, by using a data structure corresponding to a graph, the raw machine data in the data unit to incorporate data indicative of the relationship into the raw machine data in the data unit; and
providing, to an anomaly detection module, each of the plurality of data units including annotated raw machine data, for detection of a security-oriented anomaly in the information technology environment,
wherein the anomaly detection module is in a real-time path or a batch path, and wherein information regarding identified security-oriented anomalies is shared between the real-time path and the batch path.

US Pat. No. 10,116,669

DETECTING AND MITIGATING WARDRIVING

CA, Inc., New York, NY (...

1. A method comprising:based on detecting a first device attempting to access a network through a wireless access point,
instructing the first device to emit a light; and
activating a set of light detection sensors to detect light emitting from the first device, wherein the set of light detection sensors are distributed throughout a physical space; and
based on determining that light corresponding to the first device was not detected by at least one of the set of light detection sensors,
notifying the wireless access point that the first device was not detected;
determining, by the wireless access point, that the first device is unauthorized to access the network; and
securing the network against access by the first device.

US Pat. No. 10,116,668

SYSTEM AND METHOD FOR ENHANCED DISPLAY-SCREEN SECURITY AND PRIVACY

International Business Ma...

1. A security method comprising: assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor, wherein when the communication includes keywords in a sequence wherein the sequence of fragments includes changing an order of letters in each word of the communication except for a first and last letter of the word, and designated as being sensitive when the sensitivity value is greater than a threshold sensitivity level, and when the communication does not include said keywords designated as being sensitive, the sensitivity values is less than the threshold sensitivity level; formatting said communication for display, wherein when said sensitivity value exceeds the threshold sensitivity level, the communication is parsed into a sequence of fragments; and transmitting the communication as the sequence of fragments when said sensitivity value exceeds the threshold sensitivity level.

US Pat. No. 10,116,667

SYSTEM FOR CONVERSION OF AN INSTRUMENT FROM A NON-SECURED INSTRUMENT TO A SECURED INSTRUMENT IN A PROCESS DATA NETWORK

BANK OF AMERICA CORPORATI...

1. A system for validating resource availability using a block chain distributed network, the system comprising: a memory device with computer-readable program code stored thereon: a communication device; a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to:generate an availability check configuration for confirming resource availability from an originating entity by receiving information corresponding to available resources associated with the user and updating real time resource availability of user resources on a distributed ledger shared between one or more nodes, wherein the resources associated with the user are processed to the distributed ledger as a token representing a user name and account number comprising the resource availability, wherein the token is associated with the account number via a resource application associated with a financial institution;
receive, physically or electronically, an instrument for resource distribution usage by a user, wherein the instrument is received at the one or more nodes associated with the block chain distributed network;
extract and read data from a scanned or electronic copy of the instrument including a resource distribution amount and a user associated with the instrument, wherein the data is stored at the one or more nodes;
integrate the one or more nodes of the block chain distributed network into resource distribution channel systems to identify available resources associated with the user and provide a real-time resource availability of fluctuations to the distributed ledger validate the instrument against the block chain distributed network, wherein validating the instrument confirms instrument validity for the resource distribution;
confirm resource availability for the resource distribution amount of the instrument by generating a confirmation issued by the originating entity;
marking on the distributed ledger of the block chain distributed network the resource distribution amount required as unavailable;
convert the instrument to a validated secure instrument based on marking on the block chain distributed network the resource distribution amount as unavailable;
and communicate the converting to a receiver of the instrument for completion of the resource distribution.

US Pat. No. 10,116,666

SECURE DEBUG TRACE MESSAGES FOR PRODUCTION AUTHENTICATED CODE MODULES

Intel Corporation, Santa...

1. A computer-implemented method comprising:defining an authenticated code module (ACM) extension module, implemented at least partly in one or more of configurable logic or fixed functionality logic hardware, using an entry of a Firmware Interface Table (FIT) that contains a starting address of the ACM extension module, wherein the starting address is located outside of a protected boot block to enable secure output of debug messages and limit an amount of information potentially revealed about the ACM; and
extending a capability of an authenticated code module (ACM) by using the ACM extension module while reducing a boot block footprint of the ACM.

US Pat. No. 10,116,665

SECURED DISTRIBUTED COMPUTING ACROSS MULTIPLE FIREWALLS

THE BOEING COMPANY, Chic...

1. A method comprising:authenticating a user, by a computing device in a first private domain of an information network, by validating authentication information provided by the user when logging into the first private domain;
generating, by the computing device based on successfully validating the authentication information provided by the user when logging into the first private domain, a user identifier (“ID”) for the user;
providing, by the computing device, the user ID identifier (“ID”) to the user;
providing to the user, by the computing device, a first session ID;
receiving from the user, by the computing device,
a service call for a first analytic service residing in the first private domain, the service call including the user ID and the first session ID;
verifying, by the computing device, the first session ID received in the service call;
verifying, by the computing device, the user ID received in the service call;
providing, by the computing device, via a public domain of the information network, a service message for a second analytic service residing in a second private domain of the information network, the service message including the user ID, the first session ID, and job information for the second analytic service;
receiving, by the computing device, via the public domain, a first verification message from the second private domain, the first verification message including the user ID, the first session ID, and a second session ID;
validating, by the computing device, the user ID and the first session ID included in the first verification message;
providing, by the computing device, via the public domain, a second verification message, the second verification message including the user ID, the first session ID, and the second session ID; and
receiving, by the computing device, via the public domain, a response message from the second private domain, the response message including information determined by the second analytic service based on the job information in the service message.

US Pat. No. 10,116,664

AUTHORIZATION POLICY FOR GROUP-CENTRIC SECURE INFORMATION SHARING

1. An authorization engine for enforcing a group-centric secure authorization policy, the authorization engine comprising:a processor accessible by a user and configured to execute instructions;
a memory containing an access-limited object and further containing executable instructions configured to instruct the processor to execute a stateful security policy, including the operations:
define a group;
receive a join command wherein the user joins the group as a member;
receive a leave command wherein the user leaves the group;
receive an add command wherein the object is added to the group as to be in the group;
receive a remove command wherein the object is removed from the group; and
authorize the user to access the object only when the user is a member of the group and the object is in the group;
wherein the stateful security policy is based on an authorization equivalent to a stateless security policy;
wherein the stateful security policy is configured to enforce well-formedness constraints including:
the object cannot both be added to the group and removed from the group within the same state;
the user cannot both join the group and leave the group within the same state;
two types of operations cannot both occur in the same state for the user or the object;
after joining the group, the user cannot join again unless the user has left the group since joining the group;
after being added to the group, the object cannot be added to the group again unless it has been removed from the group since joining the group;
the user cannot leave the group when the user is not already a member of the group; and
the object cannot be removed from the group unless the object is already in the group; and
wherein the stateful security policy further sorts operations by time and provides an order of precedence wherein:
when add and join occur in the same state, add follows join;
when join and remove occur in the same state, join follows remove;
when add and leave occur in the same state, add follows leave; and
when remove and leave occur in the same state, there is no fixed precedence.

US Pat. No. 10,116,655

HYBRID DATA MANAGED LOCK SYSTEM

Schlage Lock Company LLC,...

1. A method, comprising:programming a user key with new access rights information including an activation date and an expiration date for access privileges for a particular user key;
determining, with a lock device, whether the user key is authorized to update the lock device based on data in the user key;
performing, by the lock device, a set of data checks on data stored in the user key;
updating a memory of the lock device with the new access rights information in response to a determination that the user key is authorized to update the lock device and the set of data checks indicates that (i) the user key is associated with a facility of the lock device, (ii) the user key is associated with the lock device, and (iii) the user key includes a serial number of a previous user key authorized to access the lock device, wherein the user key is a smart card; and
writing data to the user key by the lock device that indicates whether one or more other lock devices have not yet been updated.

US Pat. No. 10,116,649

P2P CONNECTING AND ESTABLISHING METHOD AND COMMUNICATION SYSTEM USING THE SAME

THROUGHTEK TECHNOLOGY (SH...

1. An establishing method for a P2P connection, applied to a link server, for establishing a P2P connection between a client device and a remote device, the establishing method comprising:receiving, by the link server, a connection request from the client device, wherein the connection request is for requesting to be connected to the remote device;
detecting, by the link server, a validation token in a network packet from the client device according to the connection request; and
executing, by the link server, a connection verifying procedure when the validation token from the client device is detected to be valid, wherein the connection verifying procedure comprises:
receiving a first validation code and a first address information of the client device from the client device;
reading a second address information of the remote device and a second validation code of the remote device from a storage unit; and
sending the received first validation code and the received first address information of the client device to the remote device and sending the read second address information of the remote device and the read second validation code to the client device, so as to establish the P2P connection between the client device and the remote device according to the first address information, the first validation code, the second address information, and the second validation code.

US Pat. No. 10,116,648

USER AUTHENTICATION

EMC IP Holding Company LL...

1. A method comprising steps of:receiving a request to access a first application on a device;
determining a level of sensitivity associated with the first application in response to receiving the request, wherein the level of sensitivity is represented by a first sensitivity value;
determining that access has previously been granted to a second application on the device or on another device, wherein the second application is different to the first application;
determining a differential between the first sensitivity value and a second sensitivity value in connection with the second application, wherein the differential describes a difference in sensitivity between the first and second applications;
determining that the first sensitivity value is within a predetermined sensitivity value range;
selecting an authentication method for use as part of an authentication operation in connection with the request, wherein the selection of the authentication method is based on the determined differential and the said determination that the first sensitivity value is within the predetermined sensitivity value range; and
applying the selected authentication method in connection with the request as part of an authentication operation that determines whether to grant the request to access the first application on the device;
wherein the steps are performed by at least one processing device comprising a processor coupled to a memory.

US Pat. No. 10,116,647

UNIFIED PROVISIONING OF APPLICATIONS ON DEVICES IN AN ENTERPRISE SYSTEM

Oracle International Corp...

1. A method comprising:determining, based on a user role associated with an identity of a user, an account enabling the identity to access a first resource, wherein the first resource is accessible from a first device using a first application, wherein the first device is registered for the identity of the user;
configuring, by a computer system, the first application with connection information that enables the first application to connect the first device to a first target system based on the account, wherein the first target system provides access for the first resource according to the account;
configuring, by the computer system, the first application with access information that permits the first application to access the first resource, wherein the access information is based on access permitted to the identity by the account; and
transmitting the first application to the first device upon configuring the first application with the connection information and the access information.

US Pat. No. 10,116,646

SOFTWARE-DEFINED NETWORK THREAT CONTROL

Sprint Communications Com...

1. A method of operating a Software-Defined Network (SDN) data-plane machine that stores flow data and a physically-embedded, read-only, hardware-trust key, the method comprising:a southbound transceiver receiving hardware-trust challenge data transferred by a hardware-trust controller;
a data processing system processing the hardware-trust challenge data based on the physically-embedded, read-only, hardware-trust key to generate hardware-trust response data;
the southbound transceiver transferring the hardware-trust response data for delivery to the hardware-trust controller;
a user data transceiver receiving user data;
the data processing system directing the user data transceiver to route the user data based on the flow data;
the user data transceiver routing the user data responsive to the direction from the data processing system;
the southbound transceiver receiving modification data from an SDN controller;
the data processing system determining that the SDN controller is authorized by the hardware-trust controller to modify the flow data and modifying the flow data based on the modification data responsive to the authorization from the hardware-trust controller;
the southbound transceiver receiving other modification data from another SDN controller;
the data processing system determining that the other SDN controller is not authorized by the hardware-trust controller to modify the flow data and responsively generating flow modification failure data for the other SDN controller; and
the southbound transceiver transferring the flow modification failure data for the other SDN controller for delivery to the hardware-trust controller.

US Pat. No. 10,116,645

CONTROLLING USE OF ENCRYPTION KEYS

Amazon Technologies, Inc....

1. A system-on-chip, comprising:a processor;
a fuse-based memory storing:
information for deriving a first public key for a first asymmetric key pair; and
one or more current key version numbers, each associated with a corresponding secondary public key;
wherein, in a secure boot process, the processor is configured to:
load a digital certificate that includes a secondary public key for a second asymmetric key pair and a key version number associated with the secondary public key;
authenticate the digital certificate using the first public key;
compare a key version number for the secondary public key provided by the digital certificate with a corresponding current key version number in the fuse-based memory;
if the key version number for the secondary public key is lower than the current key version number, determine that the secondary public key is not a trusted public key; and
if the key version number for the secondary public key is equal to or higher than the current key version number, determine that the secondary public key is a trusted public key;
wherein the processor is configured to replace an old secondary public key with a new trusted secondary public key if the key version number for the new secondary public key is equal to or higher than the current key version number.

US Pat. No. 10,116,643

VIRTUALIZED DATA STORAGE AND MANAGEMENT OF POLICY AND CREDENTIAL DATA SOURCES

Oracle International Corp...

1. A method comprising:receiving, at a computer system, using an interface for accessing a plurality of storage systems, a data request for credential information from a single sign-on service of one or more single sign-on services, wherein the credential information is stored at one of the plurality of storage systems, and wherein the data request includes one or more criteria for obtaining the credential information from the single sign-on service;
identifying, using one or more credential criteria identified in the data request based on the one or more criteria, a storage system associated with the data request, wherein the one or more credential criteria are generated for the credential information;
selecting, from a plurality of plug-ins, a plug-in corresponding to the identified storage system, wherein the plug-in is selected based on a type of storage system, and wherein the plug-in converts the data request according to the type of storage system; and
sending, to the single sign-on service for which the data request is received, data associated with the data request, the data being obtained from the identified storage system.

US Pat. No. 10,116,642

IDENTITY MANAGEMENT OVER MULTIPLE IDENTITY PROVIDERS

KONY, INC., Orlando, FL ...

1. A method comprising:requesting a backend service from multiple backend services by a requesting device;
exposing the requested backend service through a call in by a gateway service using a token mapped to the requested backend service, without exposing any of the backend services directly to the requesting device; and
providing, via identity services, a credential vault for a user to store a crypographic hash of a password and username that is used in conjunction with a valid identity token to leverage passwords for non-authorized legacy systems that the user may be required to login to retrieve data or leverage services,
wherein the gateway service directly calls in and is exposed to the requested backend services using the token and a token template, and
wherein the identity services comprise an identity management system which manages identities of plural devices through the use of tokens which are recognized by the backend services when passed by the gateway service.

US Pat. No. 10,116,640

IMAGE PROCESSING SYSTEM, IMAGE PROCESSING DEVICE, AND AUTHENTICATION METHOD

RICOH COMPANY, LIMITED, ...

1. An image processing system comprising:a first image processing device;
one or more second image processing devices; and
a server device, wherein
the first image processing device comprises:
memory storing computer-readable instructions; and
one or more processors configured to execute the computer-readable instructions such that the one or more processors are configured to perform operations including,
receiving an input of first authentication information for authenticating a user based on a first authentication method;
authenticating on an own device by using the first authentication information; and
using the one or more second image processing devices, and
transmitting, when a function of the one or more second image processing devices is to be operated, the first authentication information to the one or more second image processing devices, and transmitting, when authentication to only a second image processing device of a plurality of image processing devices based on the first authentication information has failed, a transmission request of authentication method information indicating a second authentication method of the second image processing device to the second image processing device, the authentication to which based on the first authentication information has failed; and wherein
the server device includes:
memory storing computer-readable instructions; and
one or more processors configured to execute the computer-readable instructions such that the one or more processors are configured to perform operations including,
transmitting, when receiving the first authentication information from the first image processing device, the first authentication information to the one or more second image processing devices, and transmitting, when receiving an authentication result based on the first authentication information from each of the one or more second image processing devices, the authentication result to the first image processing device.

US Pat. No. 10,116,638

METHOD AND DEVICE FOR UPLOADING DATA TO SOCIAL PLATFORM

TENCENT TECHNOLOGY (SHENZ...

1. A method for uploading data to a social platform, comprising:setting a plugin into an application program, wherein the plugin integrates multiple Application Program Interfaces (API) corresponding to multiple social platforms, each API possessing a publishing function provided by at least one of the multiple social platforms;
after the plugin is set into the application program, opening, by the application program, a page;
receiving a request for uploading data associated with the opened page in response to an icon corresponding to the plugin being selected on the user interface of the application program;
obtaining data to be uploaded according to the request;
after obtaining the data to be uploaded, determining at least two social platforms for uploading the data based on user selection among the multiple social platforms whose APIs are integrated by the plugin; and
simultaneously uploading the data to the at least two social platforms through one or more corresponding API integrated by the plugin,
wherein setting the plugin into the application program comprises:
adding an attribute of the plugin into a declaration file of the application program, the declaration file being directed to an operating system running the application program; and
configuring the plugin to inherit an abstract class specified in an SDK of the application program.

US Pat. No. 10,116,637

SECURE TELECOMMUNICATIONS

Wickr Inc., San Francisc...

1. A system, comprising:a processor configured to:
receive, at a first device via a control channel, a secure telecommunication request from a second device, wherein the secure telecommunication request includes at least one of a first meeting identifier and a first meeting key;
transmit, from the first device, the meeting identifier to a communication server, via a communication channel that is separate from the control channel, to obtain encrypted communication data;
receive, at the first device, encrypted communication data from the communication server;
decrypt, by the first device, the encrypted communication data using the first meeting key;
provide the decrypted communication data to a user of the first device; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,116,636

APPARATUS AND METHOD FOR SECURE TRANSMISSION AVOIDING DUPLICATE DATA

FUJITSU LIMITED, Kawasak...

1. A communication device, comprising:a memory; and
a processor coupled to the memory and configured to, upon receiving, from another communication device, a sequence of information sets respectively corresponding to a sequence of data-segments, each information set including at least a pair of a segment identifier identifying a data-segment and an encryption key for decoding an encrypted data-segment that is generated from the data-segment by using the encryption key, determine, for each of the sequence of information sets, whether the encrypted data-segment corresponding to the segment identifier is held in the memory in association with the segment identifier, wherein:
in a first case where a first sequence of information sets respectively corresponding to a first sequence of data-segments destined for a first destination and including a first data-segment is received, the first sequence of information sets including a first information set that corresponds to the first data-segment and includes a triplet of a first segment identifier identifying the first data-segment, a first encryption key, and a first encrypted data-segment generated by encrypting the first data-segment with the first encryption key, while the first encrypted data-segment is not held in the memory in association with the first segment identifier, the processor performs a first reception process including:
acquiring the first encrypted data-segment from the first sequence of information sets,
storing the acquired first encrypted data-segment in the memory in association with the first segment identifier without storing the received first encryption key in the memory so as to block the first encryption key from being read by unauthorized access to the memory,
restoring the first data-segment by decoding the first encrypted data-segment with the first encryption key that is obtained from the first information set included in the received first sequence of information sets, and
outputting the restored first data-segment to the first destination as the first data-segment of the first sequence of data-segments; and
in a second case where a second sequence of information sets respectively corresponding to a second sequence of data-segments destined for a second destination and including a second data-segment identical to the first data-segment is received, the second sequence of information sets including a second information set that corresponds to the second data-segment identical to the first data-segment and includes a pair of the first segment identifier and the first encryption key without including the first encrypted data-segment therein, while the first encrypted data-segment is held in the memory in association with the first segment identifier, the processor performs a second reception process including:
acquiring, from the memory, the first encrypted data-segment associated with the first segment identifier,
restoring the first data-segment by decoding the first encrypted data-segment with the first encryption key that is obtained from the second information set included in the received second sequence of information sets, and
outputting the restored first data-segment to the second destination as the second data-segment of the second sequence of the data-segments so as to avoid redundant transmission of the second data-segment for the second destination, which is identical to the first data-segment for the first destination, between the communication device and the another communication device.

US Pat. No. 10,116,635

MOBILE-BASED EQUIPMENT SERVICE SYSTEM USING ENCRYPTED CODE OFFLOADING

OTIS ELEVATOR COMPANY, F...

1. A mobile-based equipment service system applied by a user, the mobile-based equipment service system comprising:a remote server including a computer processor, a non-transitory storage medium, an application executed by the computer processor and stored in the non-transitory storage medium, a user authentication database stored in the non-transitory storage medium and applied by the application;
a mobile device including a user interface, the mobile device being configured to send a user authentication message initiated by the user via the user interface to the remote server, wherein the application is configured to verify the user by comparing the user authentication message to the user authentication database, and once verified, develop and effect the sending of an encrypted blob to the mobile device in response to the user authentication message;
at least one equipment controller including a computer processor, a non-transitory storage medium, executable code, executed by the computer processor and stored in the non-transitory storage medium;
at least one site, wherein each site of the at least one site includes at least one respective equipment controller of the at least one equipment controller, and the encrypted blob is secured by the remote server via a site specific private key associated with a respective site of the at least one site, the authentication message including user credentials and a selected site of the at least one site selected by the user, wherein the computer processor of the equipment controller is configured to receive the encrypted blob and the executable code is configured to decrypt the encrypted blob received from the mobile device and utilizing the site specific private key.

US Pat. No. 10,116,634

INTERCEPTING SECURE SESSION UPON RECEIPT OF UNTRUSTED CERTIFICATE

A10 Networks, Inc., San ...

1. A system for intercepting a secure session, the system comprising:a network device configured to:
intercept a first secure data session, wherein the first secure data session is established between a client device and a server device via a security gateway;
establish a second secure data session between the server device and the security gateway;
receive a first secure session request from the client device over the first secure data session;
receive a server certificate from the server device over the second secure data session, the server certificate being associated with the first secure session request;
determine that the server certificate is untrusted;
in response to the determining that the server certificate is untrusted, generate a gateway certificate based on the server certificate;
provide the gateway certificate to the client device, wherein the client device determines that the gateway certificate is untrusted and determines, based on a security policy, whether to proceed with the first secure data session; and
receive first secure content from the client device over the first secure data session; and
a processor being in operative connection with the network device, wherein the processor is configured to:
create first encrypted secure content using the first secure content and the server certificate from the server device; and
send or cause sending the first encrypted secure content to the server device over the second secure data session.

US Pat. No. 10,116,633

SYSTEMS AND DEVICES FOR HARDENED REMOTE STORAGE OF PRIVATE CRYPTOGRAPHY KEYS USED FOR AUTHENTICATION

BANK OF AMERICA CORPORATI...

1. A system for hardened remote storage of private cryptography keys and authentication, the system comprising:a storage device comprising a first computing platform including:
a first memory configured to store one or more private cryptography keys, and
a first processor in communication with the first memory, wherein the first processor is configured to:
receive user configuration inputs that define (i) one or more tamper-related signals and (ii) a threshold amount for each of the one or more tamper-related signals, wherein meeting or exceeding the threshold amount results in deletion of the one or more private cryptography keys from the first memory,
generate the one or more private cryptography keys,
provide for the private cryptography keys to be accessible to a computing node in communication with the storage, while the computing node is executing an authentication routine without having to communicate the private cryptography keys to the computing node, and
in response to receiving at least one of the one or more tamper-related signals and determining that the threshold amount associated with the at least one of the tamper-related signals has been met or exceeded, delete the one or more private cryptography keys from the first memory; and
the computing node that is remote from the storage device and comprising a second computing platform including:
a second memory configured to store the authentication routine, and
a second processor in communication with the second memory, wherein the second processor is configured to, in response to sending data to the storage device, receive a verification result from the storage device, and execute the authentication routine to authenticate a user based at least in part on the verification result.

US Pat. No. 10,116,632

SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURE AND COMPRESSED TRANSMISSION OF GENOMIC DATA

New York University, New...

1. A non-transitory computer-accessible medium having stored thereon computer-executable instructions for generating at least one compressed genetic sequence, wherein, when a computer arrangement executes the instructions, the computer arrangement is configured to perform procedures comprising:(a) obtaining at least one reference sequence;
(b) obtaining a particular sequence read for at least one genetic sequence from a sequence platform;
(c) comparing the particular sequence read to the at least one reference sequence;
(d) storing the particular sequence read only if the particular sequence read does not match the at least one reference sequence; and
(e) generating the at least one compressed genetic sequence by repeating procedures (b)-(d) for further sequence reads which are different from the particular sequence read.

US Pat. No. 10,116,630

SYSTEMS AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT

Bitdefender IPR Managemen...

1. A client system comprising a hardware processor and a memory, the hardware processor configured to execute a virtual machine, an introspection engine, and a network filter, the introspection engine and the network filter executing outside of the virtual machine, wherein:the virtual machine is configured to carry out a communication session with a remote party, the communication session comprising a handshake message followed by an encrypted payload, wherein the handshake message contains an encryption parameter used by the client system to derive an encryption key, and wherein the encrypted payload is encrypted with the encryption key;
the network filter controls a network adapter of the client system and is configured to intercept the handshake message and in response, transmit a notification to the introspection engine; and
the introspection engine is configured to:
infer an occurrence of a first session event of the communication session according to the notification,
identify within the memory a target memory page according to whether a content of the target memory page has changed between the occurrence of the first session event and an occurrence of a second session event of the communication session, and
in response, transmit the content of the target memory page to a decryption engine configured to decrypt the encrypted payload according to the content.

US Pat. No. 10,116,629

SYSTEMS AND METHODS FOR OBFUSCATION OF DATA VIA AN AGGREGATION OF CLOUD STORAGE SERVICES

Carbonite, Inc., Boston,...

1. A method for obfuscation of data via an aggregation of cloud storage services, comprising: identifying, by a synchronization client of a client device, a file for transfer to an aggregation of a plurality of cloud storage services; extracting, by the synchronization client using a comb filter, a first subset of the file by skipping elements of the file to extract every nth element; transmitting, by the synchronization client, the first subset of the file to a first cloud storage service of the plurality of cloud storage services; extracting, by the synchronization client using the comb filter, a second subset of the file by skipping elements of the file to extract every nth element, offset by one, wherein in the extracting of the first subset and the extracting of the second subset, n is selected to avoid having a whole number relationship to a width of a memory read bus used by the synchronization client; transmitting, by the synchronization client, the second subset of the file to a second cloud storage service of the plurality of cloud storage services; and transmitting, by the synchronization client, metadata of the file and an identification of the first subset, first cloud storage service, second subset, and second cloud storage service, to a third cloud storage service.