US Pat. No. 10,798,280

CONTROL DEVICE, CAMERA SYSTEM, AND PROGRAM

Sony Corporation, Tokyo ...

1. A control device, comprising:a processing circuit configured to generate a birds-eye view image from a plurality of captured images, each captured image of the plurality of captured images being in a different viewing direction; and
a control circuit configured to receive a first selection input to select one of a wide- view image and the birds-eye view image, and to control display in a monitoring process, based on the first selection input, of the wide-view image, the birds-eye view image, and a first captured image different from the wide-view image and the birds-eye view image, wherein
a viewing angle of the wide-view image is larger than a viewing angle of the first captured image being displayed,
the birds-eye view image is not rotated in response to receiving a second selection input to change a viewing direction of the first captured image,
when the birds-eye view image is selected, the control circuit controls a simultaneous display of the first captured image, the birds-eye view image and viewing direction information of the first captured image,
the viewing direction information of the first captured image indicating a viewing direction of the first captured image from a center of the birds-eye view image,
the viewing direction of the first captured image is selected based on the second selection input,
the birds-eye view image is generated from the plurality of captured images including images corresponding to each of selectable viewing directions,
the first captured image shows at least a part of an object located around the center of the birds-eye view image, and
the first captured image is an image from the plurality of captured images that make up the birds-eye view image.

US Pat. No. 10,798,279

MOBILE DEVICE CASE FOR CAPTURING DIGITAL IMAGES

Moment Inc, Seattle, WA ...

1. An auxiliary optical assembly for a mobile device that includes a miniature camera module, comprising:a lens attachment interface comprising a mobile device case including a case housing that defines a lens attachment aperture and is configured for coupling around a periphery of a mobile device that includes a miniature camera module; and
an auxiliary lens assembly that includes:
a lens holder,
an auxiliary lens coupled to the lens holder, and
a coupling interface that is configured for coupling with the lens attachment interface when coupled to said mobile device that includes said miniature camera module;
wherein the coupling interface is configured in accordance with said lens attachment interface to stably couple and align said auxiliary lens along the optical path of the miniature camera module;
wherein the coupling interface is configured both to permit a light source of the miniature camera module of the mobile device to illuminate an object to be captured and to receive light reflected from the object to travel along the optical path of the miniature camera module to a built-in image sensor of the miniature camera module of the mobile device,
wherein the lens attachment interface comprises an interface detail co-molded with material forming the case and at least partially overlapping and defining said lens attachment aperture;
wherein said case housing includes a case processor and electrical circuitry that are configured to detect the presence of the auxiliary lens when said lens is coupled stably in said optical alignment with said miniature camera module; and
wherein said a case processor and electrical circuitry are disposed within said case housing such that a center of gravity is approximately balanced at an image capture grip location of the case housing when said auxiliary lens is coupled thereto.

US Pat. No. 10,798,278

ULTRAVIOLET MIRROR DEVICE AND METHOD THEREFOR USING PORTABLE TERMINAL

UNION COMMUNITY CO., LTD....

1. An ultraviolet mirror device that includes a lens unit and an image sensor to generate a digital image of a subject and is connected to a portable terminal having a display unit, the device comprising:an ultraviolet filtering unit provided in a front portion or a rear portion of the lens unit to allow ultraviolet light to pass therethrough and thus enter the image sensor;
an image processing unit providing the portable terminal with multiple digital images generated at a predetermined frame rate per second by the image sensor and thus allowing a moving image to be regenerated in the display unit; and
a casing mounted on the portable terminal in such a manner as to capture an image of the subject positioned in front of the display unit, whereby the display unit is used as a mirror,
wherein the ultraviolet filtering unit includes:
a first filter allowing the UVA region to pass therethrough;
a second filter provided in parallel to the first filter to allow the UVB region to pass therethrough; and
a filter transfer unit transferring at least one selected from the first filtering unit and the second filtering unit to the front portion or the rear portion of the lens unit.

US Pat. No. 10,798,277

METHOD FOR MANUFACTURING CAMERA MODULES AND A CAMERA MODULE ARRAY

Robert Bosch GmbH, Stutt...

10. A method for manufacturing a camera module array, which includes at least four camera modules, the method comprising:manufacturing an array of camera modules, each of the camera modules being made by performing the following:
mounting an image sensor on a circuit carrier;
applying a protective layer to the circuit carrier;
wherein the image sensor is not covered by the protective layer and the protective layer forms an optical system holder, which holds the circuit carrier, on which is mounted the image sensor, and
wherein the camera module includes the circuit carrier, the image sensor and the optical system holder;
wherein the camera modules are mechanically connected to one another, the circuit carriers of the camera modules are connected to one another, and the circuit carrier is formed by a cohesive conductor foil, and
wherein the camera module array is fabricated on the conductor foil and is made up of the at least four camera modules, the camera modules being situated in rows and columns.

US Pat. No. 10,798,276

FIXED-FOCUS CAMERA MODULE AND MANUFACTURING METHOD THEREFOR

Ningbo Sunny Opotech Co.,...

1. A fixed-focus camera module, comprising:a photosensing component;
an optical lens assembly, comprising at least two group units, wherein the respective group units are assembled in cooperation with each other, and optical axes of the group units are consistent; and
a lens base, wherein the optical lens assembly is packaged at a top end of the lens base such that the optical lens assembly protrudes outward from the lens base, and the optical lens assembly is kept in a photosensing path of the photosensing component,
wherein each of the group units comprises a bearing component and at least one lens, and the lens is mounted to the bearing component.

US Pat. No. 10,798,275

HOLDING APPARATUS FOR A VEHICLE

1. A holding apparatus for a vehicle; comprising:a first element which is attachable to the vehicle;
a second element which is movably connected to the first element via a bearing mechanism;
an image capture unit which is attached to the second element and which is configured to capture a capture area around the vehicle, wherein the image capture unit is a camera device and/or a sensor device; and
a signal unit which is configured to detect the position of the first element relatively to the second element;
wherein the signal unit comprises:
a signal device which is configured to output a signal (S), and
a signal transmitter which is configured to operate the signal device dependent on a position of the first element to the second element such that it outputs the signal (S),
wherein the position of the first element to the second element comprises an operating position in which the image capture unit captures a defined capture area such that the vehicle driver can identify, whether to view the defined capture area, and
wherein the signal device is arranged in the first element and the signal transmitter is arranged in the second element.

US Pat. No. 10,798,274

BODY MOUNTED CAMERA SYSTEM

1. A body mounted camera system comprising:a band structure having an inner surface configured to face toward a user's head, an outer surface configured to face away from the user's head, and an interior cavity between the inner surface and the outer surface;
at least one camera within the interior cavity, the at least one camera comprising a lens exposed through the outer surface of the band structure;
a controller within the interior cavity for controlling the at least one camera, the controller comprising an interconnection module configured to connect to an outside device;
a power source within the interior cavity configured to power the controller and the at least one camera;
electrical connections connecting the controller, the power source, and the at least one camera;
an opening in the band structure through which the at least one camera, the controller, the power source, and the electrical connections can be removed; and
wherein the at least one camera, the controller, the power source, and the electrical connections are circumferentially arranged within the interior cavity of the band structure.

US Pat. No. 10,798,273

PARKING GUIDANCE CAMERA APPARATUS AND METHOD OF INSTALLING THE SAME

IDIS CO., LTD., Daejeon-...

1. A parking guidance camera apparatus comprising:a camera main body including a main body housing, a pan tilt camera module partially inserted into a camera mounting hole of the main body housing, a holder configured to support the pan tilt camera module on the main body housing so that the pan tilt camera module is laterally panned and vertically tilted, and a pan tilt gimbal configured to fix the pan tilt camera module in a state in which a panning angle and a tilting angle of the pan tilt camera module are adjusted;
a parking guidance light detachably attached to a lower portion of the main body housing; and
an installation bracket configured to install the camera main body at a set location in a parking lot,
wherein the pan tilt gimbal includes an elastic pad configured to fix or release the pan tilt camera module as the elastic pad is in close contact with or separated from a lower surface of the pan tilt camera module in a state of facing the lower surface of the pan tilt camera module in the main body housing, an operation lever having an outer portion hinge-coupled to the holder to be vertically tilted in a state in which the elastic pad is seated on an upper surface of the outer portion in the main body housing, and a fixing knob having an upper portion screw-coupled to an inner portion of the operation lever to vertically tilt the operation lever according to a rotating direction thereof so that the elastic pad is in close contact or separated from the pan tilt camera module, and having a lower end portion covered by the parking guidance light in a state of being exposed to a lower portion of the main body housing,
wherein the camera main body further includes at least one tilt camera module supported by the main body housing to be vertically tilted in a state of being partially inserted into a camera mounting hole of the main body housing, and a tilt gimbal configured to fix the tilt camera module in a state in which a tilting angle of the tilt camera module is adjusted,
wherein the tilt gimbal includes an elastic block configured to fix or release the tilt camera module as the elastic block is in close contact with or separated from a lower surface of the tilt camera module in a state of facing the lower surface of the tilt camera module in the main body housing, an elevation block supported by the main body housing to be elevated in a state in which the elastic block is seated, and a fixing knob having an upper portion screw-coupled to the elevation block to elevate the elevation block according to a rotating direction thereof so that the elastic block is in close contact with or separated from the tilt camera module, and having a lower end portion covered by the parking guidance light in a state of being exposed to the lower portion of the main body housing.

US Pat. No. 10,798,272

ARTILLERY SHELL-SHAPED INFORMATION GATHERING DEVICE

HANWHA DEFENSE CO., LTD.,...

1. A shell-type monitoring apparatus comprising: a body; a gas storage provided in the body and configured to store a gas; a variable volume portion provided on the gas storage in the body, the variable volume portion having a volume that varies based on an amount of the gas supplied from the gas storage; a photographing unit provided in the body and configured to move in the body; and a moving flow path provided in the body and configured to supply the gas in the variable volume portion to the photographing unit to move a camera on the photographing unit.

US Pat. No. 10,798,271

DETECTING ERRORS IN THE TIMING BETWEEN SUBTITLES AND SHOT CHANGES

NETFLIX, INC., Los Gatos...

1. A computer-implemented method, comprising:determining that a first subtitle is positioned at a first temporal location within a sequence of frames of an audiovisual program, wherein:
a first shot change occurs at a second temporal location within the sequence of frames, and
the first subtitle has a first temporal edge coincident with the first temporal location;
determining that the first temporal edge does not satisfy a timing guideline relative to the first shot change;
computing a plurality of timing errors associated with the first subtitle, wherein each timing error in the plurality of timing errors indicates a distance between:
a different location within the sequence of frames relative to the shot change, and
the first temporal location;
determining, based on a difference between at least a subset of the plurality of timing errors, a second temporal edge for the first subtitle that satisfies the timing guideline relative to the first shot change; and
causing, via a processor and based on the second temporal edge, the first subtitle to be positioned at a third temporal location within the sequence of frames.

US Pat. No. 10,798,270

SYNCHRONIZING MEDIA IN MULTIPLE DEVICES

Sling Media Pvt. Ltd., B...

1. A system, comprising a processor and a memory, the memory storing instructions executable by the processor to:receive first and second media units with respective first and second time stamps that are assigned based on a first clock cycle time and a data transmission rate parameter defined as a rate of streaming media data per time unit; and
assign an adjusted time stamp to the second media unit based on the first clock cycle time, a second clock cycle time, the first time stamp, and the data transmission rate.

US Pat. No. 10,798,269

SYSTEM COMPRISING A SERVER FOR PROVIDING A SERVICE TO AN IMAGE FORMING APPARATUS, AND AUTHENTICATION THEREOF

Brother Kogyo Kabushiki K...

1. A communication system configured to perform data communication with a service providing apparatus on an Internet, the communication system comprising:an image processing apparatus:
a server on the Internet; and
an information processing terminal device comprising:
a terminal-side storage;
a first network interface;
a user interface; and
a first controller configured to:
accept, via the user interface, an instruction to perform a preparation process to connect the image processing apparatus with the service providing apparatus;
in response to accepting the instruction to perform the preparation process via the user interface, transmit transmission request information via the first network interface, the transmission request information being for requesting transmission of authentication information, the authentication information representing authorization to perform data communication with the service providing apparatus;
wherein the image processing apparatus comprises:
an image processor;
a second network interface;
an operation interface; and
a second controller configured to:
accept, via the operation interface, an instruction to perform data communication with the service providing apparatus;
in response to accepting the instruction to perform data communication with the service providing apparatus, transmit communication request information to the server via the second network interface, the communication request information being for requesting the server to perform data communication with the service providing apparatus;
receive acquisition instruction information from the server via the second network interface, the acquisition instruction information being for instructing the image processing apparatus to receive the authentication information; and
perform data communication with the service providing apparatus via the second network interface, and
wherein the server comprises:
a third network interface configured to communicate with an external device via the Internet; and
a third controller configured to:
in response to receiving the communication request information from the image processing apparatus via the third network interface, transmit the acquisition instruction information to the image processing apparatus via the third network interface.

US Pat. No. 10,798,268

IMAGE PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM FOR SWITCHING A SHOW-THROUGH REMOVAL PROCESS BASED ON A HALFTONE-DOT REGION

CANON KABUSHIKI KAISHA, ...

1. An image processing apparatus comprising:a reader that reads an image of an original; and
a processor or a circuit that obtains a variance value of signal values of pixels included in the image of the original read by the reader,
wherein the processor or the circuit determines whether the read image has a halftone-dot region based on the variance value,
wherein, in a case where it is determined that the read image has the halftone-dot region, the processor or the circuit executes a first removal process for removing show-through of the original, the first removal process being a removal process for which the obtained variance value is used, and
wherein in a case where it is not determined that the read image has the halftone-dot region, the processor or the circuit executes a second removal process for removing show-through of the original, the second removal process being a removal process for which the obtained variance value is not used.

US Pat. No. 10,798,267

IMAGE PROCESSING TO SET OUTPUT PIXEL VALUES SUBJECT TO EDGE OR THIN LINE CORRECTION

CANON KABUSHIKI KAISHA, ...

1. An apparatus comprising:a first correction unit configured to detect an edge part of an input image and correct a pixel value in the detected edge part;
a second correction unit configured to detect a thin line in the input image and correct a pixel value in the detected thin line; and
an output unit configured to set a pixel value such that in a case where a pixel is subjected to pixel value corrections by both the first correction unit and the second correction unit, the pixel value is set to be equal to a greater one of a pixel value obtained as result of the correction by the first correction unit and a pixel value obtained as a result of the correction by the second correction unit.

US Pat. No. 10,798,266

IMAGE PROCESSING APPARATUS, PRINTING APPARATUS, AND IMAGE PROCESSING METHOD FOR PERFORMING HALFTONE PROCESSING ON DIVIDED IMAGES

Seiko Epson Corporation, ...

1. An image processing apparatus which performs halftone processing of an image, the image processing apparatus comprising:a processor configured to execute a plurality of units including
an image receiving unit which receives a plurality of pieces of image data corresponding to a plurality of divided images obtained by dividing the image; and
a plurality of halftone processing units which perform halftone processing of processing each of the plurality of pieces of image data to generate dot data representing presence or absence of dot formation and in which at least two halftone processing units simultaneously perform at least a part of processing for the at least two pieces of image data, wherein
each of the halftone processing units performs complex error diffusion method processing of matching at least a part of the dot data obtained by performing halftone processing using an error diffusion method for a gradation value in which an error diffusion of each pixel of the divided image is completed with a determination result of a dither method,
a boundary shape of a divided image is one of
(1) a shape along directions respectively parallel to a direction and another direction intersecting the direction in which the halftone processing is performed for the divided image,
(2) a shape along a direction oblique to at least one of a direction and another direction intersecting the direction in which the halftone processing is performed for the divided image, and
(3) a shape that randomly changes in a direction in which the halftone processing is performed for the divided image.

US Pat. No. 10,798,265

IMAGE READING DEVICE AND IMAGE FORMING APPARATUS

FUJI XEROX CO., LTD., To...

1. An image reading device comprising:an image reading unit that reads an image while moving in a sub-scanning direction;
a casing that houses the image reading unit, and having an oblong hole;
a guiding member that is movable relative to the casing in the sub-scanning direction and guides the casing in the sub-scanning direction, and having a boss; and
an endless member to which the casing is fixed and that endlessly travels between a starting position and a terminal position in the sub-scanning direction,
wherein the boss is disposed in the oblong hole.

US Pat. No. 10,798,264

IMAGE SCANNING APPARATUS AND METHOD FOR SCANNING THEREOF

Hewlett-Packard Developme...

1. An image scanning apparatus, comprising:a lighting unit to irradiate a light onto a manuscript using a light emitting diode (LED) light source;
a scan unit to generate a scan image by scanning image information of a manuscript using light reflected by the manuscript; and
a processor to control the lighting unit to irradiate the light onto the manuscript for a predetermined duty of a line exposure time during a movement process of the manuscript in a sub-scan direction,
wherein no light is irradiated onto the manuscript for a remainder of the line exposure time after the predetermined duty of the line exposure time.

US Pat. No. 10,798,263

PORTABLE SCANNER AND SCANNING METHOD THEREOF

HIMO, INC., Seoul (KR)

1. A portable scanner to generate a three dimensional (3D) image from a subject, the portable scanner comprising:a focus state output device to determine a present focus state with respect to a set focal length from a subject and to output the present focus state such that a user recognizes the present focus state,
wherein the focus state output device includes:
a first light emitting device to obliquely irradiate a focusing beam to a surface of the subject at a predetermined angle;
a sensor to sense a position of the focusing beam irradiated to the subject;
a focus state determining device to determine a focus state with respect to the set focal length based on the position of the focusing beam sensed in a region of interest of the subject; and
a second light emitting device to output the determined focus state in a form of a visible light, to the subject such that the user recognizes the determined focus state, the second light emitting device outputting the focus state in a form of at least one of a preset character, a preset sign, or mutually different colors.

US Pat. No. 10,798,262

IMAGE PROCESSING APPARATUS, IMAGE PROCESSING APPARATUS CONTROLLING METHOD, AND RECORDING MEDIUM

Ricoh Company, Ltd., Tok...

1. An image processing apparatus comprising:a first hardware memory configured to store image data generated by an image reader and program instructions; and
a processor configured to access the first hardware memory, wherein execution of the program instructions stored in the first hardware memory cause the processor to:
construct a first image processor configured to execute a first image processing on the stored image data one line at a time,
construct a second image processor configured to execute a second image processing on the image data one line at a time, the second image processor being constructed when implementing functional expansion;
connect the constructed first image processor and the constructed second image processor by a transfer path of the image data when implementing the functional expansion,
generate a first allowance signal to allow reading of a next line of the image data from the first hardware memory, according to an image processing time taken by the first image processing;
generate a second allowance signal to allow reading of the next line of the image data from the first hardware memory, according to an image processing time taken by the second image processing; and
output, to the processor, a third allowance signal to allow reading of the next line of the image data from the first hardware memory, based on the first allowance signal and the second allowance signal.

US Pat. No. 10,798,261

SYSTEMS AND METHODS FOR IDENTIFYING AND TRANSFERRING SHEETS

RIPCORD INC., Hayward, C...

1. A method for identifying a sheet, comprising:a) providing a sheet in a zone of detection, wherein one or more tools are configured to manipulate the sheet within the zone of detection;
b) vacating the one or more tools from the zone of detection, wherein a tool of the one or more tools is coupled to a positioning component, wherein the positioning component is configured to move itself and the tool coupled thereto outside the zone of detection;
c) detecting, by a sensor, one or more characteristics of the sheet to generate sensor data, wherein the one or more characteristics of the sheet are indicative of (i) an orientation and (ii) a position of the sheet in the zone of detection;
d) providing the sensor data to a controller; and
e) providing, by the controller, manipulation instructions to the one or more tools to manipulate the sheet, wherein the manipulation instructions are based at least in part on the orientation and the position of the sheet.

US Pat. No. 10,798,260

IMAGE FORMING DEVICE WITH ICON DISPLAY AND SYSTEM THEREOF

SHARP KABUSHIKI KAISHA, ...

1. An image forming device comprising:a display that displays a setting screen which includes a plurality of setting icons to which a first type setting and a second type setting are assigned to be different from each other for the image forming device,
wherein each of the plurality of setting icons is disposed in a matrix shape, and is disposed such that the first type setting is disposed to be different in a first direction and the second type setting is disposed to be different in a second direction which is different from the first direction, and
in each of the plurality of setting icons of the first type setting and the second type setting that are juxtaposed in the first direction, a text and an image related to content of the first type setting or the second type setting are included, the texts in the plurality of setting icons are identical between the first type setting and the second type setting, and the images in the plurality of setting icons are different between the first type setting and the second type setting.

US Pat. No. 10,798,259

INPUT DEVICE AND IMAGE FORMING APPARATUS

Konica Minolta, Inc., To...

1. An input device comprising:an operation panel that receives an operation input;
a vibration element that is mounted to the operation panel and that vibrates one or more regions of the operation panel in at least one vibration direction;
a vibration absorber that connects the operation panel to an apparatus main body and that absorbs a vibration of the operation panel; and
a CPU that causes the vibration element to vibrate based on the operation input, wherein the vibration element is mounted on a gravity center axis of the operation panel in the vibration direction such that the respective regions of the operation panel uniformly vibrate, and
the operation panel comprises a gravity center adjuster that, once a gravity center position of the vibration element changes, moves the gravity center position to a position overlapping the gravity center axis by a user operation.

US Pat. No. 10,798,258

INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, AND NON-TRANSITORY RECORDING MEDIUM STORING INSTRUCTIONS FOR EXECUTING AN INFORMATION PROCESSING METHOD

RICOH COMPANY, LTD., Tok...

11. An information processing system comprising:an information processing apparatus; and
a terminal communicably connected to the information processing apparatus,
the information processing apparatus including
a first memory storing a first plurality of instructions, and
a first processor configured to execute the first plurality of instructions to
extract character information from a first image using optical character recognition,
determine a status of a device based on an association between a predetermined status and a keyword included in the character information,
determine a solution for a failure occurring in the device based on the status of the device, and
transmit a message to the terminal indicating the solution, and
the terminal including
a second memory storing a second plurality of instructions, and
a second processor configured to execute the second plurality of instructions to
transmit the first image to the information processing apparatus, and
display on a display the message indicating the solution.

US Pat. No. 10,798,257

COMPUTER-READABLE MEDIUM, INFORMATION PROCESSING DEVICE, AND METHOD FOR SELECTING IMAGE PROCESSING APPARATUS

BROTHER KOGYO KABUSHIKI K...

1. A non-transitory computer-readable medium storing computer-readable program instructions that are executable by a processor coupled with an information processing device, the information processing device comprising a communication interface configured to communicate with one or more external apparatuses, the instructions being configured to, when executed by the processor, cause the processor to:determine, in response to receiving image data from another set of program instructions, whether a selected image processing apparatus is set;
in a case where it is determined that the selected image processing apparatus is not set, search for and find one or more image processing apparatuses communicable with the information processing device via the communication interface;
set a specified one of the found one or more image processing apparatuses as the selected image processing apparatus; and
cause the selected image processing apparatus to perform a particular kind of image processing.

US Pat. No. 10,798,256

SYSTEM AND METHOD FOR REMOTE FAX INTERCONNECT

etherFAX, LLC, Holmdel, ...

1. A facsimile communications environment for enabling transfer of at least one of (a) a document, (b) an origination identifier, and (c) data, comprising:first Distributed Facsimile Service Provider (DFSP), being structured to communicate with at least one cooperating facsimile capable peer system;
the first DFSP being further structured to receive routing information and at least one of (a) a document, (b) origination information, and (c) data from the at least one cooperating facsimile capable peer system destined for at least one non-cooperating facsimile capable peer system;
a second DFSP being structured to access at least one non-cooperating facsimile capable peer system;
the first DFSP being further structured to determine, upon reception by the first DFSP of the routing information, if the at least one non-cooperating facsimile capable peer system is accessible by the second DFSP;
the first DFSP being further structured to, upon determination that the at least one non-cooperating facsimile capable peer system is accessible by the second DFSP, transfer the received routing information and the at least one of (a) the document, (b) the origination information, and (c) the data to the second DFSP; and to delegate communications of the at least one of (a) the document, (b) the origination information, and (c) the data to the second DFSP.

US Pat. No. 10,798,255

IMAGE DATA GENERATION APPARATUS, INFORMATION PROCESSING SYSTEM, IMAGE DATA GENERATION METHOD, AND RECORDING MEDIUM

Ricoh Company, Ltd., Tok...

1. An image data generation apparatus, comprising:circuitry configured to
determine a particular image defect type present in a printed image;
store image processing association information in which a plurality of image defect types is stored in association with a plurality of different image processing operations, respectively;
store image defect association information in which the plurality of image defect types is stored in association with a plurality of different image patterns, respectively;
cause an image forming device to form a particular image pattern selected from the plurality of different image patterns in the stored image defect association information in accordance with the particular image defect type;
select particular image processing from the plurality of different image processing operations in the image processing association information, in accordance with the determined particular image defect type present in the printed image; and
generate processed image data by applying the particular image processing to image data corresponding to the particular image pattern, wherein in the processed image data, an image defect of the particular image defect type is more recognizable than in the image data corresponding to the particular image pattern.

US Pat. No. 10,798,254

SERVICE DESIGN CENTER FOR DEVICE ASSISTED SERVICES

HEADWATER RESEARCH LLC, ...

1. A method of operating a network provisioning system to provision wireless network service plans for a network provider network, the method comprising:obtaining and storing, a first service plan component and a second service plan component,
the first service plan component comprising (i) information specifying a first traffic classification filter for filtering network traffic events and (ii) information specifying a first network policy enforcement action to be taken when a network traffic event possesses a characteristic that matches the first traffic classification filter,
the second service plan component comprising (a) information specifying a second traffic classification filter for filtering network traffic events, and (b) information specifying a second network policy enforcement action to be taken when a network traffic event possesses a characteristic that matches the second traffic classification filter,
wherein the sets of network traffic event characteristics that respectively match the first and second traffic classification filters are overlapping but not identical in extent;
receiving a user selection to, for a grouping of the first service plan component and the second service plan component as both applicable to a given wireless service plan, create a prioritization of the first traffic classification filter over the second traffic classification filter;
processing the first service plan component, the second service plan component, and the prioritization to create a service plan provisioning instruction set applicable to at least one wireless device; and
deploying the service plan provisioning instruction set to one or more devices in a network, such that for a network traffic event associated with the at least one wireless device and that matches both the first and second traffic classification filters, the one or more devices perform the first network policy enforcement action and do not perform the second network policy enforcement action.

US Pat. No. 10,798,253

METHODS, DEVICES, AND COMPUTER PROGRAMS FOR ENABLING THE SPONSORING OF DATA CONNECTIVITY

Telefonaktiebolaget LM Er...

1. A method carried out in a telecommunication network for assisting a first user terminal in benefiting from a data connectivity, the method comprising:indicating, by a second user terminal to a connectivity donation server, that the second user terminal is willing to sponsor data connectivity of the first user terminal and that at least one restriction is to be imposed on how the sponsored data connectivity is to be used by the first user terminal, wherein the sponsored data connectivity by the second user terminal, is a part of data connectivity quota of the second user terminal;
transmitting, from the connectivity donation server to the second user terminal, a token; and
transmitting, from the second user terminal to the first user terminal, the token using proximity-based means;
wherein the at least one restriction comprises:
a restriction on a location of the first user terminal for benefiting from the sponsored data connectivity; and
a restriction on an access network or access networks, which the first user terminal has to connect to for benefiting from the sponsored data connectivity.

US Pat. No. 10,798,252

SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS

HEADWATER RESEARCH LLC, ...

1. A method of operating a wireless end user device comprising:storing on the wireless end user device one or more notification actions corresponding to one or more notification requests, the wireless end user device associated with a service plan having a limit on data usage of one or more wireless network services for one or more device applications;
detecting a device action that reflects a past or intended use of the one or more wireless network services by a given application of the one or more device applications;
enforcing a first traffic control policy applicable to the one or more wireless network services and the given application;
as a result of detecting the device action and the limit on data usage, triggering a notification request corresponding to one of the one or more notification actions, the one of the one or more notification actions causing the wireless end user device to present a notification message on a user interface of the wireless end user device, the notification message presenting information related to the limit on data usage to a device user.

US Pat. No. 10,798,251

DEVICE AND METHOD FOR IMPLEMENTING DATA SERVICE

HUAWEI TECHNOLOGIES CO., ...

1. A data service charging system, comprising:a first network-side device; and
a second network-side device,
wherein the first network-side device is configured to:
determine, based on a notification signaling from a user equipment (UE), that a data service switch of the UE is turned off; and
send first instruction information to the second network-side device when the data service switch of the UE is turned off, and
wherein the second network-side device is configured to:
receive the first instruction information from the first network-side device; and
skip charging for data packets of the UE according to the first instruction information.

US Pat. No. 10,798,250

MANAGEMENT SERVER, COMMUNICATION SYSTEM, NOTIFICATION METHOD AND PROGRAM

NEC CORPORATION, Tokyo (...

1. A management server comprising:at least one processor configured to implement:
an outgoing call detection unit configured to detect an outgoing call from a first communication terminal to a second communication terminal;
a connection control unit configured to cause the outgoing call detected by the outgoing call detection unit to arrive at the second communication terminal;
a call duration measurement unit configured to measure each time from when a phone call is started by the connection control unit, a duration of each phone call, between the first communication terminal and the second communication terminal; and
a notification unit configured to transmit, when the duration measured by the call duration measurement unit exceeds a predetermined duration before the phone call ends, a predetermined notification to a third communication terminal.

US Pat. No. 10,798,249

MANAGING LIVE VIDEO STREAM CONNECTIONS AND DATA USAGE

Live View Technologies, ...

1. A system, comprising:at least one camera; and
a back-end network including a database including an active viewers list, the back-end network configured to:
add an entry to the active viewers list in response to a request from a user device for a live video stream;
receive, via a first connection, the live video stream from the at least one camera over a wireless channel;
provide, via a second, different connection, the live video stream to one or more user devices including the user device;
maintain the entry in the active viewers list in response to receipt of a user activity checkin indicator from the user device within a predetermined time interval, the user activity checkin indicator indicating that a user of the user device is actively viewing the live video stream;
remove the entry from the active viewers list in response to a lack of receipt of the user activity checkin indicator within the predetermined time interval, the lack of receipt of the user activity checkin indicator indicating that the user of the user device is not actively viewing the live video stream;
monitor the active viewers list; and
terminate the first connection including the live video stream from the at least one camera to the back-end network in response to the active viewers list being empty.

US Pat. No. 10,798,248

SYSTEM AND METHOD FOR PROVISIONING TEMPORARY TELEPHONE NUMBERS

RingCentral, Inc., Belmo...

1. A computer-implemented method for using a temporary phone number, the method comprising:receiving, by a computing device, a schedule for changing a first temporary disposable phone number associated with a user account;
responsive to determining that the schedule has been met, determining whether a counter associated with the user account meets a predetermined threshold;
responsive to determining that the counter meets the predetermined threshold, changing the first temporary disposable phone number to a second temporary disposable phone number based on the schedule.

US Pat. No. 10,798,247

ACOUSTIC ECHO SUPPRESSION DEVICE AND ACOUSTIC ECHO SUPPRESSION METHOD

PANASONIC INTELLECTUAL PR...

16. An acoustic echo suppression method of suppressing acoustic echo in a room where a sound pick-up unit is installed, the method comprising:outputting a first sound signal obtained by updating an echo component included in a picked-up sound signal acquired by the sound pick-up unit at a first rate;
outputting a second sound signal obtained by updating the echo component included in the picked-up sound signal, at a second rate faster than that of the first rate, against a sudden variation in a sound field environment in the room;
detecting presence or absence of a variation in the sound field environment in the room; and
selecting one of the first sound signal and the second sound signal according to a detection result of the presence or absence of the variation in the sound field environment in the room and causing a voice output unit to output the selected sound signal.

US Pat. No. 10,798,246

CALL COLLISION RESOLUTION IN A COMMUNICATION NETWORK

Telecom Italia S.p.A., M...

1. A method for resolving a call collision in a communication network, said method comprising, at a network node of said communication network:receiving a first call request message from a first user device to set up a call from said first user device to a second user device;
determining that said second user device has in turn sent a second call request message to set up a call from said second user device to said first user device; and
based on said determining, routing said first call request message to a conference bridge.

US Pat. No. 10,798,245

METHOD AND APPARATUS FOR FACILITATING AGENT CONVERSATIONS WITH CUSTOMERS OF AN ENTERPRISE

1. A computer-implemented method for facilitating agent conversations with customers of an enterprise, the method comprising:receiving, by a processor, a request for a conversation with an agent, the request provided by a customer;
connecting the customer to a human agent by the processor in response to the receipt of the request for the conversation;
for an input provided by the customer during the conversation with the human agent, determining by the processor, whether a Virtual Agent (VA) is capable of providing a faster response to the input of the customer than the human agent; and
deflecting the conversation, by the processor, from the human agent to the VA to respond to the input of the customer based at least in part on the determination that the VA is capable of providing the faster response to the input of the customer than the human agent,
wherein the conversation is deflected back from the VA to the human agent for a subsequent input if it is determined that the VA is not capable of providing the faster response to the subsequent input of the customer than the human agent.

US Pat. No. 10,798,244

CONSUMER ELECTRONIC REGISTRATION, CONTROL AND SUPPORT CONCIERGE DEVICE AND METHOD

NexStep, Inc., San Jose,...

1. A non-transitory computer readable media, impressed with program instructions that, when executed on hardware, cause the hardware to execute a method of supporting a consumer device using a home control device in communication with a cloud-based device, the method including:receiving a first signal from a particular device to be supported, via a first two-way wireless, non-audio data channel used by the particular device to provide diagnostic related information to the home control device, wherein the first signal includes a device identifier that identifies the particular device;
responsive to a single user action directed to the hardware, automatically determining which of a plurality of service centers with which to initiate an interactive support session and initiating an interactive support session with the determined service center, wherein the determined service center supports the particular device, including automatically transmitting to the determined service center, via a second two-way non-audio data channel, identifier information from which the determined service center can uniquely identify the particular device;
conducting the interactive support session with the determined service center regarding the particular device using the home control device to capture a user's voice and to reproduce audio for the user to hear via a two-way audio channel; and
the interactive support session including relay of data via a third two-way non-audio data channel between the particular device and the service center simultaneously with the home control device capturing the user's voice and to reproducing the audio for the user to hear.

US Pat. No. 10,798,243

SYSTEM AND METHOD FOR AUTOMATICALLY VALIDATING AGENT IMPLEMENTATION OF TRAINING MATERIAL

1. A computer implemented method for testing an agent by a validation bot executed by a processor, the method comprising:a. sending training material, by the validation bot, to an agent;
b. at the same time that agents other than the agent are connected to customers, automatically initiating, by the validation bot, a session with an agent by providing a natural language phrase to the agent via a client media interface, wherein the client media interface is the same interface the agent uses to communicate with a customer, wherein, during the session, the validation bot pretends to be a real customer with which the agent is supposed to interact;
c. obtaining, by the validation bot, a reply from the agent;
d. interpreting the reply by a natural language engine which includes a machine learning module trained to classify agent replies into agent intents and mapping, by the validation bot, the reply of the agent to an agent intent, wherein the agent intent is a goal of the agent expressed by the agent during the session;
e. providing, by the validation bot, a response to the agent based on the mapped agent intent;
f. calculating, by the validation bot, a score of the agent according to scoring rules; and
g. providing, by the validation bot, the score of the agent to a user.

US Pat. No. 10,798,242

CALL VOLUME REDUCTION BASED UPON A PROPENSITY TO CALL IN CONNECTION WITH A REASON CODE

1. A device deployed in a telecommunication service provider network, the device comprising:a processor; and
a computer-readable storage medium storing instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising:
identifying a reason code associated with a plurality of calls from a plurality of customers to a customer call center;
determining a set of shared traits among the plurality of customers, wherein the set of shared traits is based upon first network event data and first customer account data associated with the plurality of customers;
determining a customer with a propensity to call score that exceeds a threshold score and with a customer profile that matches the set of shared traits, wherein the customer profile is based upon second network event data and second customer account data associated with the customer; and
delivering a customer service content associated with the reason code to the customer via a communication modality that is determined for the customer, in response to determining both that the propensity to call score exceeds the threshold score and that the customer profile matches the set of shared traits.

US Pat. No. 10,798,241

SYSTEM AND METHOD FOR DETERMINING UNWANTED CALL ORIGINATION IN COMMUNICATIONS NETWORKS

YouMail, Inc., Irvine, C...

1. A method, in a data processing system comprising a processor and a memory, for determining unwanted call origination, the method comprising:compiling a communication campaign database storing data of one or more communication campaigns, the one or more communication campaigns including a grouping of related fingerprints that identify a sequence of characters, audio or video speech associated with instances of a same likely communication campaign;
providing access to the data, the access provided to a communications service provider or carrier originating the one or more communication campaigns or owning an addresses identified as a source of communications associated with the one or more communication campaigns, wherein the access to the data is used by the communications service provider or carrier to generate feedback based on a determination that the one or more communication campaigns or the communications originated from users or accounts of the communications service provider or carrier; and
determining that the one or more communication campaigns are legitimate or illegitimate based on the feedback.

US Pat. No. 10,798,240

IDENTIFYING AND PROCESSING OF UNRETURNED CALLS IN IPBX

8x8, Inc., Campbell, CA ...

1. An apparatus comprising:a communications server;
a first processing circuit communicatively coupled to the communications server, the communications server being configured and arranged to route communications for a plurality of end-users having respective communication devices, wherein the respective communication devices each including communications circuitry being communicatively coupled to the communications server via a circuit-based communications network, the first processing circuit being configured and arranged to process data by: receiving messages that characterize device communications involving specific ones of the respective communication devices for which the communications server routed communications, and generating, from the messages, summary data for the device communications routed and involving the specific ones of the respective communication devices; and a second processing circuit communicatively coupled to the first processing circuit and configured and arranged to process the summary data by: retrieving, using a secondary data source, data relating to the routed communications and an indication of relative importance associated with the routed communications, and comparing the data as retrieved from the secondary data source and the indication of relative importance associated with the routed communications and, in response, generating data indicative of actions to be performed based in part on the indication of relative importance associated with the routed communications.

US Pat. No. 10,798,239

MULTI-DEVICE CALL NOTIFICATION SILENCING

Apple Inc., Cupertino, C...

1. A method for managing connections performed by a server, the method comprising:by the server:
receiving, from an external network, a notification indicating an incoming connection for a set of two or more associated user devices adapted to answer the incoming connection;
sending, to the set of two or more associated user devices, a notification of the incoming connection;
listening for communication from the set of two or more associated user devices;
receiving, from a first user device of the set of two or more associated user devices, an indication answering the incoming connection;
relaying the incoming connection to the first user device responsive to receipt of the indication answering the incoming connection; and
sending, to each user device of the set of two or more associated user devices other than the first user device via a first mode of communication, a push message comprising an indication that the incoming connection was answered,
wherein:
each of the two or more associated user devices are associated with a common user account, and
the first user device sends to at least one other associated user device a silencing command via a second mode of communication.

US Pat. No. 10,798,238

SYSTEM AND METHOD FOR TRACKING A MOBILE DEVICE USER

THE TRUSTEES OF PRINCETON...

1. A method for locating a user of a mobile device comprising:determining a location that the mobile device was connected to a wireless network based on a network status and internet protocol (IP) address of the mobile device;
compiling publicly-available auxiliary information related to the location the mobile device was connected to the wireless network;
classifying an activity of the user to driving, traveling on a plane, traveling on a train, or walking; and
estimating a current location of the user without accessing global positioning system (GPS) data based on the compiled publicly-available auxiliary information and one or more of sensory data and time zone data of the mobile device particular to the activity classification of the user;
wherein estimating a current location of the user is based on public maps, weather reports, air pressure, acceleration, and heading when the activity of the user is classified as walking.

US Pat. No. 10,798,237

AUTOMATED INDIVIDUAL SECURITY

INTERNATIONAL BUSINESS MA...

1. A method comprising:monitoring, by a computer system, for an activation condition through a monitoring interface of a wearable drone;
in response to detecting the activation condition through the monitoring interface, triggering, by the computer system, the wearable drone to release from an aesthetic attachment proximate to a user and hover a distance above the user of a height above a selected height threshold;
analyzing, by the computer system, a recording of content by the wearable drone to assess a particular threat level associated with the content from among a plurality of threat levels;
in response to the particular threat level exceeding a threat threshold, automatically sending, by the computer system, a communication to one or more emergency contacts;
in response to the particular threat level exceeding the threat threshold, determining, by the computer system, one or more specific actions associated with the particular threat level; and
performing, by the computer system, each of the one or more specific actions associated with the particular threat level, wherein at least one of the one or more specific actions comprises dynamically adjusting a position of the wearable drone to a second height above a second height threshold of at least a minimum height to avoid interception by another user.

US Pat. No. 10,798,236

AUTOMATED USER INFORMATION PROVISION USING IMAGES

PAYPAL, INC., San Jose, ...

1. A mobile phone, comprising:a chassis;
a camera included on the chassis;
a display device included on the chassis;
an input device included on the chassis;
a communication device included in the chassis;
a non-transitory memory included in the chassis; and
one or more hardware processors that are included in the chassis and that are coupled to the camera, the display device, the input device, the communication device, and the non-transitory memory, wherein the one or more hardware processors are configured to execute instructions from the non-transitory memory to cause the mobile phone to perform operations comprising:
analyzing, by the one or more hardware processors, a plurality of request sections in a digital information form;
determining, by the one or more hardware processors, a first type of information from the analyzing of the plurality of request sections in the digital information form;
displaying, using the display device, a plurality of documentation type identifiers associated with respective types of documentation;
displaying, using the display device, a request for at least one documentation information image based at least on the first type of information, wherein the request identifies at least one type of documentation that is to be included in the at least one documentation information image by highlighting at least one of the plurality of documentation type identifiers that corresponds to the at least one type of documentation;
receiving, from the camera, the at least one documentation information image that includes the at least one type of documentation with documentation information that corresponds to the highlighted at least one of the plurality of documentation type identifiers;
analyzing, by the one or more hardware processors, the at least one documentation information image to detect one or more subsets of the document information; and
automatically providing the one or more subsets of the document information to respective ones of the plurality of request sections in the digital information form that request the first type of information.

US Pat. No. 10,798,235

MODULAR MOBILE DEVICE SIDE BAR/BUTTONS

Intel Corporation, Santa...

1. A mobile device, comprising:a planar device body having a first side and a second side opposite the first side;
a first sidebar unit configured to be coupled to one of the first side of the planar device body or the second side of the planar device body, the first sidebar unit having a plurality of buttons arranged in a first button configuration;
a second sidebar unit having at least one second button arranged in a second button configuration different from the first button configuration, wherein the second sidebar unit is configured to be coupled to the other of the first side or the second side of the planar device body; and
a frame configured to receive the first sidebar unit and the second sidebar unit, the frame having a first frame contact on the first side of the planar device body and a second frame contact on the second side of the planar device body where each of the first frame contact and the second frame contact are configured to alternatively receive the plurality of buttons of the first sidebar unit and the at least one second button of the second sidebar unit.

US Pat. No. 10,798,234

STATIONERY STORAGE CAPABLE OF SOUND AMPLIFICATION OF MOBILE PHONE

1. A stationery storage for sound amplification of a mobile phone, comprising:a container, having an accommodation space in communication with the outside, one side of said container having an inclined surface, a bottom of said inclined surface extended outward with a groove, one side of said groove protruded with a plurality of spaced cover bodies, and a passage in communication with said groove formed between each said cover body and said groove;
wherein one end of each said cover body facing said inclined surface is a first end, another end thereof is second end, and said first end of said cover body is lower than said second end thereof, causing a top surface of said cover body to be formed into an inclined surface;
wherein the length of each said cover body is smaller than the one of a bottom of said groove, causing said second end of said cover body to be inclined;
wherein a plate body is configured between each two said adjacent cover bodies; and
wherein said plate body is an inclined surface, and the inclined angle of said inclined surface is larger than the one of each said first end.

US Pat. No. 10,798,233

MOBILE PHONE STATION

Plantronics, Inc., Santa...

1. A mobile phone station, comprising:a hardware processor;
a memory, a display, user-operable controls, and a Universal Serial Bus (USB) hub communicatively coupled to the hardware processor;
a wireless audio system, and accompanying antenna, communicatively coupled to the USB hub, the wireless audio system configured to form a wireless communications link with a smartphone;
a speakerphone, the speakerphone including a loudspeaker and a microphone located on a bottom of the mobile phone station, and wherein a foot disposed on the bottom of the mobile phone station is configured to isolate, at least in part, the microphone from direct sound output of the loudspeaker;
a charger communicatively coupled to the USB hub; and
an inductive coil configured to receive a charging voltage from the charger for wirelessly charging the smartphone.

US Pat. No. 10,798,232

PRESENTING A COLORING PATTERN BY A CASE OF A MOBILE DEVICE BASED ON RECEIVED CONTENT

International Business Ma...

1. A method of presenting a coloring pattern by a case of a mobile device based on received content, the method comprising:receiving, by the mobile device, content;
determining, based on the content, a coloring pattern;
generating, based on the coloring pattern and a plurality of magnetic fields generated within the mobile device by an inductive mesh, a heat pattern in the inductive mesh, wherein the inductive mesh is included within the mobile device; and
presenting, by a thermally activated material included in the case of the mobile device and in thermal contact with the inductive mesh, the coloring pattern.

US Pat. No. 10,798,231

LIGHT-EMITTING DEVICE HAVING MULTIPLE CURVED REGIONS

Semiconductor Energy Labo...

1. An electronic device comprising:a light-emitting device;
a power storage device; and
a member including a resin material,
wherein the light-emitting device comprises:
an insulator;
a first substrate over the insulator;
a transistor and a light-emitting element over the first substrate; and
a second substrate over the transistor and the light-emitting element, the second substrate comprising a region transmitting light from the light-emitting element,
wherein the second substrate comprises a flat region, and a first curved region and a second curved region that extend from opposite ends of the flat region and are curved to the first substrate side,
wherein the insulator comprises a region overlapping with the flat region, the first curved region, and the second curved region,
wherein the power storage device comprises a region overlapping with the first substrate with the insulator therebetween, and is covered with the member including the resin material, and
wherein the member including the resin material comprises a region overlapping with the flat region, the first curved region, and the second curved region.

US Pat. No. 10,798,230

FAULTY DISTRIBUTED SYSTEM COMPONENT IDENTIFICATION

Morgan Stanley Services G...

1. A computer-implemented method for detecting a communications network node malfunction, comprising:receiving and inputting into an LSTM neural network sequential time windows of data from a first data stream output by the communications network node; and
determining, after each time window, a probability that a presently-received time window of data from the first data stream represented an accurate copy of a subset from a second data stream, based on previously received time windows of data from the first data stream and on historical information from the second data stream; and
responsive to a determining that the probability exceeds a predetermined threshold, transmitting an electronic message to the communications network node to modify output of the communications network node and prevent any output of data by the communications network node that is not an accurate copy of a subset from a second data stream.

US Pat. No. 10,798,229

METHOD FOR TRANSMITTING A DATA MESSAGE TO AN ELECTRONIC RECEIVING DEVICE, RELATED ELECTRONIC TRANSMITTING DEVICE AND COMPUTER PROGRAM

THALES, Courbevoie (FR)

1. A transmission method for transmitting a data message to at least one receiving device, the method being implemented by an electronic transmitting device, the transmitting device and the at least one receiving device being connected via an avionics network on board an aircraft, at least one device from a portion of the transmitting device and the at least one receiving device being an avionics device on board the aircraft; the method including:the generation of a data message, the message comprising a message header and one or more data packet(s); and
the transmission of the generated message to the at least one receiving device;
wherein each packet comprises one or more data cluster(s), each cluster containing an identifier field including a unique identifier of the cluster, a size field including a size of the cluster, a payload data field, and each cluster being adapted to include one or more other data cluster(s), the one or more other data cluster(s) then forming the payload data field of said cluster and, wherein said identifier field further includes an identifier of an avionics functional domain, and wherein to each cluster is associated a single avionics functional domain.

US Pat. No. 10,798,228

METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROCESSING DATA

XILINX, INC., San Jose, ...

1. A method comprising:receiving, (i) from an application in a user space and (ii) at a protocol processing entity, within an operating system space, comprising computer executable instructions stored in a memory and executed by one or more processors, a request for data processed in accordance with a function, said request comprising function related information, said data, prior to said processing in accordance with said function, being stored at a location in a memory in the operating system space;
providing, by the protocol processing entity, said function related information and said location in said memory in the operating system space to an offload stack comprising computer executable instructions stored in a memory and executed by one or more processors; and
processing, by said offload stack executing within the operating system space, said data using said function related information,
wherein said offload stack has access to said location in said memory in the operating system space.

US Pat. No. 10,798,227

CENTRALIZED CHROMATIC PLURALIZING OF INTERNET OF THINGS (IOT) COMMUNICATION

International Business Ma...

1. A computer program product for pluralizing data packets of a stream of data from Internet connected devices by a computer comprising at least one processor, one or more memories, one or more computer readable storage media, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by the computer to perform a method comprising:receiving, by a computer, a plurality of incoming streams of data packets each containing a sensor data point from the Internet connected devices and a chromatic number;
parsing, by the computer, the incoming steam of data packets to extract events based on the chromatic number of the data packet;
sorting, by the computer, the extracted events based on the chromatic number within a period of time; and
analyzing and outputting, by the computer, data based on the period of time to create a new data packet based on the chromatic number.

US Pat. No. 10,798,226

BROADBAND FALLBACK FOR ROUTER

T-Mobile USA, Inc., Bell...

1. A router, comprising:a processor;
a memory communicatively coupled to the processor;
a first network interface coupled to the processor to enable communication between one or more user equipment (UE) and a network via a first broadband channel of the router;
a second network interface coupled to the processor to enable communication between the one or more UE and the network via a second broadband channel of the router;
an intelligence layer stored in the memory of the router, wherein the intelligence layer is executable by the processor to perform acts comprising:
determining that communication data is overflowing from an input buffer to an overflow buffer of the router;
in response to the communication data overflowing from the input buffer to the overflow buffer of the router, determining a first bandwidth capacity of the first broadband channel and a second bandwidth capacity of the second broadband channel as the router receives communication data from the one or more UE; and
adjusting, via the intelligence layer stored in the memory of the router, a ratio of communication data throughput between the first broadband channel of the router and the second broadband channel of the router based on a bandwidth allocation rule set stored in the memory of the router that routes the communication data according to the first bandwidth capacity of the first broadband channel and the second bandwidth capacity of the second broadband channel.

US Pat. No. 10,798,225

SIMULTANEOUS TRANSMISSION METHOD ACROSS MULTIPLE WIRELESS COMMUNICATION STANDARDS

NIPPON TELEGRAPH AND TELE...

1. A wireless communication system in which a wireless station including a plurality of standard controls corresponding respectively to a plurality of wireless communication standards sharing a frequency resource, such that the wireless station performs a random access process corresponding to each of the wireless communication standards, obtains a transmission opportunity from the frequency resource used by each wireless communication standard, and transmits a wireless frame, wherein:the wireless station includes a simultaneous transmissions management part
for each of the plurality of standard controls, setting a parameter for the random access process corresponding to each of the plurality of wireless communication standards, such that random access periods across the plurality of wireless communication standards are synchronized in time with each other,
controlling frequencies and transmission start timings based on the plurality of wireless communication standards, and
simultaneously transmitting wireless frames of each of the wireless communication standards using Frequency Division Multiple Access (FDMA), where the transmission opportunities are obtained by performing the random access process corresponding to each of the plurality of wireless communication standards under the control of the simultaneous transmissions management part.

US Pat. No. 10,798,224

METHODS AND APPARATUS FOR PREVENTING PACKET SPOOFING WITH USER SPACE COMMUNICATION STACKS

Apple Inc., Cupertino, C...

1. A method for validating packets for a user space communication stack, the method comprising:opening a link between user space and kernel space by the user space communication stack;
receiving packets from the user space to a first pool of resources in the kernel space;
writing verification information to a flow entry table in the kernel space upon with the opening of the link between the user space and the kernel space;
copying at least a portion of the received packets to a second pool of resources in the kernel space, subsequent to the writing of the verification information; and
validating the copied at least portion of the received packets based at least on a comparison of the written verification information in the flow entry table to corresponding metadata associated with the copied packets.

US Pat. No. 10,798,223

RELIABLE COMMUNICATIONS USING A POINT TO POINT PROTOCOL

Fungible, Inc., Santa Cl...

1. A network system comprising:a source device;
an Ethernet physical layer connection; and
a destination device connected to a destination host device, wherein the destination device is connected to the source device over the Ethernet physical layer connection, and
wherein the destination device is configured to:
receive a frame over the Ethernet physical layer connection from the source device by receiving, in order, an Ethernet preamble, an Ethernet start frame delimiter, a twelve-byte field, a two-byte type field, a data field, and a four-byte Ethernet frame check sequence calculated based on the frame, determine, based on the two-byte type field, that the frame is not to be interpreted as an Ethernet frame,
parse, from the twelve-byte field included within the frame, a frame sequence number, and
parse, from the twelve-byte field, an acknowledge sequence number and bandwidth allocation information,
wherein the bandwidth allocation information identifies a virtual channel and a credit number associated with the virtual channel.

US Pat. No. 10,798,222

APPARATUS FOR MANAGING SDN-BASED IN-VEHICLE NETWORK AND CONTROL METHOD THEREOF

HYUNDAI MOTOR COMPANY, S...

1. A control method of an apparatus for managing a software defined network (SDN)-based network, the method comprising:receiving a packet from an external source, by an SDN switch;
determining, by the SDN switch, whether the received packet is a packet corresponding to a new protocol that has not been used for access;
when the received packet is the packet corresponding to the new protocol, sending, by the SDN switch, a request to an SDN controller configured to control the SDN switch for analysis of the received packet;
analyzing, by the SDN controller, the received packet based on a plurality of heterogeneous protocol information items that are pre-stored in a first management unit;
forwarding protocol information corresponding to the received packet among the plurality of heterogeneous protocol information items, to the SDN switch; and
converting the received packet into a first frame based on a preset first protocol using the received protocol information and forwarding the first frame to a gateway in the SDN switch, by the SDN switch.

US Pat. No. 10,798,221

INFORMATION DISPLAY METHOD, TERMINAL, AND SERVER

Huawei Technologies Co., ...

1. An information display method comprising:transmitting, by an information aggregation application executing on a terminal, a content information request for a purchasable commodity to at least two or more content sources, wherein the content information request comprises, for each of the at least two or more content sources, at least two pieces of registered account information used by the content source to verify the terminal;
receiving, by the information aggregation application, content information for the purchasable commodity from the at least two or more content sources in response to the content information request;
converting, by the information aggregation application, the content information from an unstructured data format to a structured data format according to a rule corresponding to a content source from which the content information was received;
classifying, by the information aggregation application, the content information of the structured data format based on two or more classifications to obtain classified content information of the structured data format, wherein the two or more classifications include at least two of: a user identifier, a service type, and a content source; and
displaying, by the terminal, the classified content information comprising at least a first level display page and a second level display page,
the first level display page displaying a first part of the classified content information corresponding to a first of the two or more classifications and a link for accessing the second level display page, and
the second level display page displaying a second part of the classified content information of the purchasable commodity, wherein the first level display page or the second level display page includes a link for accessing a content source of the at least two or more content sources.

US Pat. No. 10,798,220

METHOD, DEVICE AND SYSTEM FOR INVOKING LOCAL SERVICE ASSEMBLY BY BROWSER

Alibaba Group Holding Lim...

1. A method implemented by a client terminal, the method comprising:receiving a request for establishing a communication connection based on a cross-domain communication protocol from a browser terminal;
performing a validity verification of the request; and
establishing the communication connection with the browser terminal based on the cross-domain communication protocol to allow the browser terminal to invoke a local service component, after the request passes the validity verification, the establishing the communication including:
pre-setting a port binding priority order of the client terminal to be consistent with a port selection priority order of the browser terminal;
selecting a port from a port list for binding according to the port binding priority order of the client terminal, the selecting including:
in response to determining that a first port on the port binding priority order of the client terminal and the port selection priority order of the browser terminal is occupied, prompting both the client terminal and the browser terminal to select a second port using the port selection priority order, the second port being next to the first port in the port binding priority order of the client terminal and the port selection priority order of the browser terminal; and
establishing the communication between the client terminal and the browser terminal by using the port.

US Pat. No. 10,798,219

SERVER AND SERVER CLIENT SYSTEM

HONDA MOTOR CO., LTD., T...

1. A server comprising:a processor;
a memory comprising a program; and
wherein the processor is configured to execute the program causing the server to perform
a first server arithmetic process comprising
assigning different unique identifiers for identifying each of a plurality of clients serving as mobile stations to each of the plurality of clients serving as mobile stations in response to a first use of a designated function or a designated application for detecting or setting a state in each of the plurality of clients,
recognizing a combination of a factor relating to states set or detected in each of the plurality of clients and the unique identifier, and
recognizing a first ending point state which is a target state set in a first client as an information terminal carried by a user, constituting the plurality of clients and a second ending point state serving as a state corresponding to the first ending point state detected in a second client, loaded into a vehicle moving according to a user's operation, constituting the plurality of clients, the second client being separate from the first client, as the factors which are determined whether or not having a designated relationship therebetween by a second server arithmetic process; and
the second server arithmetic process comprising
extracting, among the respective factors in the plurality of clients recognized by the first server arithmetic process, designated factors wherein the designated factors comprise the plurality of factors having the designated relationship thereamong,
associating a plurality of unique identifiers, wherein the combination comprises the associated unique identifiers and the designated factors,
storing the associated unique identifiers in the server storage device,
evaluating a degree of approximation among the respective factors in the plurality of clients recognized by the first server arithmetic process, and wherein the designated relationship comprises the degree of approximation with the plurality of factors being a reference value or more, and
providing, to the second client, a content or an application of an attribute of the first client which has the designated relationship with the second client.

US Pat. No. 10,798,218

ENVIRONMENT ISOLATION METHOD AND DEVICE

Alibaba Group Holding Lim...

1. An environment isolation method, applied to a Remote Procedure Call (RPC) client terminal, the method comprising:receiving, by the RPC client terminal, an environment isolation instruction from an environment isolation device connected to the RPC client terminal;
stopping, by the RPC client terminal, an automatic refresh of a routing address pool in the RPC client terminal,
replacing a current address in the routing address pool with a combined address, wherein the combined address is generated by the RPC client terminal by combining the current address in the routing address pool and an address in a preset manual address list;
generating, by the RPC client terminal, a valid target address based on the combined address in the routing address pool when receiving a service call request sent by a user;
sending, by the RPC client terminal, the service call request to an RPC server terminal corresponding to the valid target address; and
returning to the user a service processing result returned by the RPC server terminal.

US Pat. No. 10,798,217

SYSTEMS AND METHODS FOR PROTECTING AN IDENTITY IN NETWORK COMMUNICATIONS

NetAbstraction, Inc., Ch...

1. A non-transitory processor readable medium storing code representing instructions configured to be executed by a processor, the code comprising code to cause the processor to:define a first virtual private network that that includes a first virtual machine and a second virtual machine, the first virtual machine communicatively coupled to a source device and a second virtual machine;
define a routing table for the first virtual private network such that a first data unit from the source device is routed to the destination device via the first virtual private network;
automatically define a second virtual private network that includes a third virtual machine and a fourth virtual machine, the fourth virtual machine communicatively coupled to a destination device and a third virtual machine; and
define a routing table for the second virtual private network such that a second data unit from the source device is routed to the destination device via the second virtual private network.

US Pat. No. 10,798,216

AUTOMATIC PROVISIONING OF IOT DEVICES

Microsoft Technology Lice...

1. An apparatus for Internet of Things (IoT) communications, comprising:a first IoT device, including:
a memory adapted to store run-time data for the first IoT device; and
at least one processor that is adapted to execute processor-executable code that, in response to execution, enables the first IoT device to perform actions, including:
responsive to an initial boot, automatically sending identification information to a provisioning service endpoint stored in the first IoT device, wherein the identification information includes an identification (ID) of the first IoT device;
receiving cryptographic information from the provisioning service endpoint, wherein the cryptographic information is associated with an IoT hub selected from a plurality of IoT hubs based, in part, on the ID of the first IoT device;
automatically sending a message to the IoT hub in response to receiving the cryptographic information;
receiving a new configuration file and a firmware update from the IoT hub without requiring a user association; and
automatically installing the new configuration file and the firmware update.

US Pat. No. 10,798,215

HTTP RESPONSE FAILOVER IN AN HTTP-OVER-ICN SCENARIO

IDAC Holdings, Inc., Wil...

1. A method for use by in a first network access point (NAP) in an Information Centric Network (ICN), the method comprising:receiving a request for a Hypertext Transfer Protocol (HTTP) resource from a requestor, wherein the request for the HTTP resource comprises a fully qualified domain name (FQDN);
requesting the HTTP resource from a first server associated with the FQDN;
receiving an error message that the HTTP resource is not available from the first server;
publishing a message to a rendezvous point (RVZ), the message comprising a list of excluded node identifiers (NIDs) of one or more NAPs that have been previously contacted and have not provided the HTTP resource;
receiving a forwarding identifier (FID) of a second NAP from a topology manager (TM), wherein the second NAP is associated with a second server that is associated with the FQDN, and wherein a NID of the second NAP is not on the list of excluded NIDs;
requesting the HTTP resource from the second NAP;
receiving the HTTP resource from the second NAP; and
sending the HTTP resource to the requestor.

US Pat. No. 10,798,214

METHODS AND SYSTEMS FOR PERSONALIZING USER EXPERIENCE BASED ON PERSONALITY TRAITS

Spotify AB, Stockholm (S...

1. A method, comprisingat an electronic device associated with a media-providing service having one or more processors and memory storing instructions for execution by the one or more processors:
assigning one or more characteristics of media items to at least one respective personality trait of a plurality of personality traits, wherein the media items are provided by the media-providing service;
assigning one or more user behaviors to a first personality trait;
tracking behavior of a user;
determining that a tracked behavior of the user corresponds to a first user behavior of the one or more user behaviors;
assigning the first personality trait to the user based at least in part on determining that the tracked behavior of the user corresponds to the first user behavior; and
providing personalized content to the user in accordance with a determination that the degree to which the tracked behavior of the user corresponds to the first user behavior satisfies a threshold.

US Pat. No. 10,798,213

BUILDING A MULTI-TENANT PORTAL APPLICATION

International Business Ma...

1. A computer-implemented method comprisingvisually rendering a first virtual portal and a set of portal resources according to a portal-resource association specified in a resource association matrix;
identifying a set of server resources accessible from a portal server, the set of server resources excluding the set of portal resources;
determining a score for a first resource of the set of server resources;
visually rendering the first resource; and
associating the first resource with the first virtual portal in the resource association matrix by adding an identifier of the scored resource;
wherein:
the score for the first resource is determined based on a function F, where: sry=F (svpx, srfbz, ury, rry), and wherein:
sry=the score for the first resource,
svpx=a portal score value for the first virtual portal,
srfbz=a feedback score value for the first resource,
ury=a usage metric value for the first resource, and
rry=a reference metric value for the first resource.

US Pat. No. 10,798,212

MESSAGE PROCESSING APPARATUS AND METHODS

MASTERCARD INTERNATIONAL ...

1. An apparatus for processing messages, the apparatus comprising:a computer processor and a data storage device, the data storage device having a message transform module and a message provision module comprising non-transitory instructions executable by the processor to:
receive a producer message from a message producer, the producer message structured according to a producer message schema, the producer message schema defining a plurality of producer message fields;
transform the producer message to obtain a subscriber message, wherein transforming the producer message comprises applying a subscriber message transform comprising a set of rules for converting a message from the producer message schema to a subscriber message schema associated with a message subscriber, the subscriber message schema defining a plurality of subscriber message fields, wherein the set of rules populates each of the subscriber message fields with at least one value extracted from a corresponding at least one of the producer message fields, wherein the plurality of subscriber message fields differs from the plurality of producer message fields; and
provide the subscriber message to the message subscriber.

US Pat. No. 10,798,211

GENERATING ATTRIBUTE PREFERENCE MODELS BASED ON DISPARATE ATTRIBUTE SPECTRUMS

eBay Inc., San Jose, CA ...

1. A computer-implemented method, comprising:analyzing interest signals to identify a plurality of first attribute spectrums corresponding to a plurality of specimens of interest to a user, wherein individual first attribute spectrums define first values for a plurality of attributes in association with individual specimens of interest;
generating, based on the plurality of first attribute spectrums, an attribute preference model that indicates at least one preferred attribute range of the user in association with at least one of the plurality of attributes;
analyzing item category data with respect to an interest profile that corresponds to the user to select at least one candidate category from a plurality of item categories defined within the item category data, wherein individual candidate categories include individual item sets;
determining a plurality of second attribute spectrums corresponding to the at least one candidate category, wherein individual second attribute spectrums define second values for the plurality of attributes in association with individual items that are included within the individual item sets;
analyzing the plurality of second attribute spectrums based on the attribute preference model to designate a selected item from the individual item sets; and
communicating aspects of the selected item to the user.

US Pat. No. 10,798,210

HANDLING NOTIFICATIONS

Facebook, Inc., Menlo Pa...

1. A method comprising, by a server computing system:sending instructions to a personal computing device associated with a first user of an online social network hosted by a social networking system to display one or more notifications on a display screen of the personal computing device while the personal computing device is in a locked state, wherein the one or more notifications are associated with one or more operations of a second user of the online social network, and wherein the one or more operations are associated with one or more interactions of the second user with one or more previously published contents of the online social network associated with the first user;
receiving sensor data from the personal computing device to estimate a current user intention of the first user with respect to the personal computing device;
in response to estimating the current user intention, sending instructions to the personal computing device to present one or more selectable user publication responses for the first user to select adjacent to the one or more notifications while the personal computing device is in the locked state, each selectable user response being associated with at least one interaction to the one or more operations of the second user on the previously published content of the online social network;
receiving, from the personal computing device, user input comprising a selection of one or more of the selectable user publication responses on the personal computing device while the personal computing device is in the locked state;
receiving, from the personal computing device, an indication that the first user has performed an authorization event associated with the personal computing device; and
in response to the authorization event, retrieving the user input from the personal computing device for publication on the social-networking system in response to the selection of one or more of the selectable user publication responses adjacent to the one or more notifications while the personal computing device is in the locked state.

US Pat. No. 10,798,209

SMART PROXY ROTATOR

metacluster lt, UAB, Vil...

1. A computer-implemented method for identifying a threshold of a proxy provider, the method comprising:running a proxy rotator on a computing device connected to a network;
obtaining a proxy from a proxy provider by the proxy rotator;
utilizing a web scraper to:
establish a connection to a target server through the proxy;
receive content designated within a request through the connection;
provide performance and availability information of the proxy to the proxy rotator;
utilizing the proxy rotator to calculate a weight for the proxy provider; and
identifying a threshold of the proxy provider based on the calculated weight;
wherein the proxy rotator stops using a maximized proxy provider, at least for a period of time, when at least one configured maximum threshold is reached;
wherein the at least one configured maximum threshold is reached when a maximum number of concurrent connections is reached, a maximum error threshold is reached, or both the maximum number of concurrent connections is reached and the maximum error threshold is reached;
wherein the content is unreadable to the proxy rotator due to network transport layer or application layer encryption.

US Pat. No. 10,798,208

AVAILABILITY DATA CACHING IN MEETING SYSTEMS

Microsoft Technology Lice...

1. A method to provide availability data caching in meeting services, the method comprising:prior to receiving a meeting request from a user,
identifying, with a processor, a list of users likely to attend a meeting with the user, the list of users including a subset of users associated with the meeting services;
retrieving, with the processor, availability data for each of the users in the list from one or more servers; and
storing, with the processor, a copy of the retrieved availability data at a cache on a server associated with the user based on a caching policy, wherein the caching policy is set according to a number of meetings scheduled; and
in response to receiving a meeting request specifying a participant from the user,
providing, with the processor in response to the participant being included in the list of users, the availability data of the participant stored at the cache on the server associated with the user to a scheduling agent for scheduling a meeting based on the meeting request; and
submitting a call, with the processor in response to the participant not being included in the list of users, to a server associated with the participant for the availability data of the participant and providing the availability data of the participant to the scheduling agent for scheduling the meeting based on the meeting request after receiving a response to the call.

US Pat. No. 10,798,207

SYSTEM AND METHOD FOR MANAGING APPLICATION PERFORMANCE

NETAPP, INC., Sunnyvale,...

1. A storage controller comprising:a memory containing machine readable medium comprising machine executable code having stored thereon instructions for performing a method of managing application performance;
a processor coupled to the memory, the processor configured to execute the machine executable code to:
receive, by the storage controller having a first cache, storage requests from a plurality of first applications on a host computer, separate from the storage controller and having a second cache, via a network interface;
in response to receiving an accelerate command associated with a second application, the second application being one of the first applications, the accelerate command including a request to allocate more resources to the second application:
decrease a storage request latency target of the second application;
in response to determining that the decreased latency target is below a threshold:
cause a first partial share of the first cache assigned to the second application to be released;
cause a partial share of the second cache to be allocated as the first partial share, the second cache being faster than the first cache;
cause unlocked second partial shares of the second cache associated with others of the first applications that are not the second application to be decreased; and
cause the first partial share of the second cache allocated to the second application to be locked, the lock preventing an amount of the first partial share from being reduced by accelerate commands for the others of the first applications that are not the second application.

US Pat. No. 10,798,206

NETWORK CACHE ACCELERATOR

Alacritech, Inc., San Jo...

1. An apparatus comprising:a computer including a plurality of processors running a network file system above a Transmission Control Protocol (TCP) layer; and
a network interface connected to the computer by an input/output (I/O) bus, the network interface storing a plurality of TCP control blocks (TCBs), each of the TCBs corresponding to a different one of the processors and not corresponding to any other of the processors, each of the TCBs being identified by local and remote Internet Protocol (IP) addresses and TCP ports for which the local IP address is that of the computer and the remote IP address is that of a second computer.

US Pat. No. 10,798,205

CACHE SYSTEM FOR LIVE BROADCAST STREAMING

Facebook, Inc., Menlo Pa...

1. A computer-implemented method comprising:receiving a broadcast stream from a broadcaster device;
generating a broadcast manifest and a first manifest URL to associate with the broadcast manifest;
duplicating the first manifest URL by adding a textual token to the first manifest URL to produce a second manifest URL associated with the broadcast manifest;
generating a first set of video segment URLs relative to the first manifest URL and a second set of video segment URLs relative to the second manifest URL;
coalescing, by a cache system, content requests for the broadcast stream, wherein the content requests for the broadcast stream comprise requests for broadcast video content;
delaying processing of the coalesced content requests according to an exponential backoff algorithm involving repeatedly attempting to fetch a content object associated with the broadcast stream in exponential increasing intervals until successful; and
propagating the first manifest URL to a first set of potential viewers and the second manifest URL to a second set of potential viewers.

US Pat. No. 10,798,204

FILE BASED OR SINGLE MESSAGE BASED BULK OPERATION PROCESSING METHOD AND DEVICE

Alcatel Lucent, Nozay (F...

1. A file based or single message based bulk operation processing method performed by a processor, the method comprising:constructing a configuration file including at least header information and a content part, the header information including at least a section index, the section index including at least length information of each command to be sent, the content part including a plain file formed by organizing corresponding commands to be sent in an order of the section index;
sending, to a receiving terminal, bulk requests including information related to the configuration file;
receiving a response from the receiving terminal; and
transmitting the configuration file based on the response from the receiving terminal;
wherein the configuration file further includes a field indicating whether the section index can hold length information of all commands, and adding a section index so as to hold length information of all commands if the section index cannot hold length information of all commands.

US Pat. No. 10,798,203

METHOD AND APPARATUS FOR REDUCING NETWORK RESOURCE TRANSMISSION SIZE USING DELTA COMPRESSION

CLOUDFLARE, INC., San Fr...

1. A method, in a far end network optimizer of a proxy server, of supporting a delta compression technique for reducing network resource transmission size, the method comprising:receiving, from a near end network optimizer, a first HyperText Transfer Protocol (HTTP) request for a network resource on behalf of a client device;
in response to receiving the first HTTP request,
retrieving the requested network resource from an origin server that hosts the network resource,
transmitting, to the near end network optimizer, a first HTTP response including the retrieved network resource, and
storing the retrieved network resource as a first version of the requested network resource, regardless of a directive associated with the network resource that a cached version of the network resource is not to be used to respond to a future HTTP request for that network resource without successful revalidation with the origin server;
receiving, from the near end network optimizer, a second HTTP request for the network resource on behalf of the client device; and
in response to receiving the second HTTP request for the network resource,
retrieving a most current version of the network resource from the origin server,
transmitting, to the near end network optimizer, a second HTTP response including a set of one or more differences between the first version and the most current version of the network resource without transmitting the entire network resource, wherein transmitting the second HTTP response causes the near end network optimizer to transmit to the client device an updated version of the network resource that is generated by applying the set of differences to the first version of the network resource.

US Pat. No. 10,798,202

SECURITY SYSTEMS FOR MITIGATING ATTACKS FROM A HEADLESS BROWSER EXECUTING ON A CLIENT COMPUTER

Shape Security, Inc., Sa...

1. A method for improving security of a server computer interacting with a client computer, the method comprising:sending a set of one or more instructions to a browser at a client computer, wherein the set of one or more instructions define one or more checkpoints, wherein each checkpoint generates telemetry data indicating a state of the browser at a time when the checkpoint was reached by the browser;
receiving a set of telemetry data from the browser at the client computer, the set of telemetry data comprising telemetry data generated by one or more particular checkpoints of the one or more checkpoints;
determining, based on the set of telemetry data, whether the browser is legitimate or illegitimate.

US Pat. No. 10,798,201

REDIRECTING USB DEVICES VIA A BROWSER-BASED VIRTUAL DESKTOP INFRASTRUCTURE APPLICATION

Dell Products L.P., Roun...

1. A method, performed by a proxy of a virtual desktop infrastructure (VDI) application that executes within a browser on a client terminal, for redirecting a USB device that is connected to the client terminal to enable the USB device to be accessed in a remote session on a server, the method comprising:receiving, by the proxy and from an agent that executes on the server, a first USB request block (URB);
evaluating contents of the first URB to determine a USB function that the first URB defines and a handle that defines a target of the USB function;
determining that the handle is associated with a browser-based representation of a first USB device that is connected to the client terminal; and
invoking a function of the browser-based representation of the first USB device, the function corresponding to the USB function defined in the first URB.

US Pat. No. 10,798,200

PAYLOAD MATCHING VIA SINGLE PASS TRANSFORMATION OF HTTP PAYLOAD

VMWARE, INC., Palo Alto,...

1. A method of modifying web address strings in packet payloads, the method comprising:identifying an initial web address string in a payload of an initial packet destined for a recipient;
using a combined expression, which includes a plurality of individual expressions, to perform a matching operation on the initial web address string, wherein each individual expression comprises at least one match pattern and is associated with a replacement string, wherein using the combined expression comprises comparing each individual expression with the initial web address string to determine whether the match pattern of the individual expression matches any portion of the initial web address string;
identifying, based on the results of the matching operation, one or more portions of the initial web address string that match the combined expression;
constructing a new web address string by replacing any identified portion in the initial web address string with the replacement string associated with the individual expression comprising the match pattern that matched the identified portion; and
sending, to the recipient, a new packet with a payload that comprises the new web address string.

US Pat. No. 10,798,199

NETWORK TRAFFIC ACCELERATOR

Twin Prime, Inc., Redwoo...

1. A method, comprising:determining that a first proxy server, among a plurality of proxy servers, is closer than other proxy servers in the plurality of proxy servers to a particular content origin server;
receiving, by a second proxy server, among the plurality of proxy servers, a request from a user device for content from the particular content origin server, wherein the user device establishes a data connection for the request with the second proxy server via a control channel, the second proxy server is in a geographical area different than the first proxy server;
establishing, by the first proxy server, a connection with the particular content origin server; and
creating a persistent connection between the first proxy server and the second proxy server, wherein communications between the user device and the particular content origin server are routed through the persistent connection, wherein a set of persistent connections that have been created across geographies between proxy servers in the plurality of proxy servers form a dynamic overlay network.

US Pat. No. 10,798,198

SUBSCRIPTION AND NOTIFICATION SERVICE

Convida Wireless, LLC, W...

1. An apparatus with a subscription and notification service, the apparatus comprising:a processor; and
a memory coupled with the processor, the memory comprising executable instructions that when executed by the processor cause the processor to effectuate operations comprising:
obtaining a subscription request from a subscriber device to a first resource, wherein the subscription request comprises:
an event notification criteria that defines when a subscription and a notification service is to generate a notification event, and
instructions on when, how, or which notification should be recorded; detecting the event notification criteria has been met for the first resource; generating an event notification for the first resource;
transmitting a notification message to the subscriber device;
recording the notification message to a second resource on the apparatus based on instruction in the subscription request;
receiving a retrieval request to retrieve the recorded notification message stored in the second resource; and
based on the retrieval request, sending a response, wherein the response comprises content of the recorded notification message stored in the second resource.

US Pat. No. 10,798,197

LIFESCORE

ConsumerInfo.com, Inc., ...

1. A system for determining a score for a user, the system comprising:a data store configured to store information associated with a user;
a computing device in communication with the data store, the computing device configured to:
receive, from the user, an indication of a first life goal of the user;
receive a first score of the user based on a score algorithm, wherein the score algorithm generates the first score for the user based on information associated with the user;
identify an aspect that is used in the scoring algorithm to determine the first score, wherein the aspect corresponds to a characteristic of the first life goal;
determine a recommendation with respect to the aspect, wherein the recommendation suggests that the user provide additional information in order to increase the first score of the user;
provide the recommendation to the user to provide additional information related to the aspect in order to increase the first score of the user;
receive the additional information related to the aspect from the user, wherein the received additional information enables the system to access one or more third party databases that include information associated with the user related to the aspect;
receive third party data from at least a subset of the one or more third party databases based on the received additional information;
obtain an updated first score of the user based on the scoring algorithm using the third party data; and
identify a targeted advertisement offer based on the updated first score, wherein the targeted advertisement offer is related to the received first life goal of the user.

US Pat. No. 10,798,196

WIRELESS COMMUNICATION SYSTEM SELF-HEALING TRANSACTION STATE KEEPER

Sprint Communications Com...

1. A method of automatically adapting electronic content distribution, comprising:receiving event data by a message queue executed on a computer system, where the event data comprises batches of tuples and each tuple comprises a transaction identity and data associated with an event reported by an electronic device that receives distributed electronic content;
assigning a state to each batch in a first list at a message queue layer by a state management application executed on the computer system, where the state of a batch takes a value of not processed or processed;
retrieving a batch by a processing application executed on the computer system from the message queue while leaving the batch on the message queue;
processing the batch by the processing application, where the processing comprises one of incrementing a count in a memory store of the computer system, copying a final count from the memory store to a data store, or storing data in a cloud memory storage;
after processing the batch, sending a processed message that identifies the processed batch to the state management application by the processing application;
monitoring processed messages sent by the processing application to the state management application by a state keeper component that executes on the computer system within a processing layer to record processing of event data independently from the state management application and the first list maintained by the state management application at the message queue layer, wherein the monitoring comprises keeping a second list at the processing layer of identities of batches that have been processed;
searching the second list maintained by the state keeper component at the processing layer for an identity of a retrieved but not yet processed batch;
in response to finding the identity of the retrieved batch in the second list maintained by the state keeper component at the processing layer based on the searching, stopping processing of the retrieved batch by the processing application; and
assigning, in the first list, a processed value to the state of the retrieved batch that is found in the second list by the state keeper component,
whereby duplicated processing of batches is avoided.

US Pat. No. 10,798,195

FAST ROAMING WITH SHARED SERVICES IN ENTERPRISE FABRIC BASED NETWORKS

Cisco Technology, Inc., ...

1. A computing system, comprising: a processor; anda memory storing a program configured to, when executed by the processor, to perform an operation, the operation comprising:
determining that a host has roamed to a new endpoint in a network fabric, wherein the host is assigned to a first virtual network in the network fabric;
determining, using a virtual network policy table, that the host is permitted to communicate with a shared service, wherein the shared service is assigned to a second virtual network in the network fabric;
identifying a first endpoint in the network fabric connected to the shared service; and
pushing, in response to determining that the host has roamed, a notification to the first endpoint in the network fabric connected to the shared service, wherein the notification instructs the first endpoint to update a local routing cache to point to the new endpoint for a location of the host;
and wherein the virtual network policy table lists a plurality of virtual networks established in the network fabric and which other virtual network each of the plurality of virtual networks is permitted to communicate with, wherein at least one virtual network of the plurality of virtual networks is not permitted to communicate with another virtual network of the plurality of virtual networks in the network fabric.

US Pat. No. 10,798,194

WEBPAGE PUSHING METHOD, CLIENT, SERVER, AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

12. A webpage pushing server, comprising:one or more processors; and
memory storing instructions that when executed by the one or more processors, cause the one or more processors to perform the following:
receiving a page loading request originated at a client and sent by the client, wherein the page loading request includes each of the following:
a uniform resource locator (URL) of a main page,
an identifier of the client, and
an indication that the client has made additions or decreases in a local cache data allocated for the URL at the client;
acquiring the main page according to the URL of the main page comprised in the page loading request, and parsing the main page to acquire a key sub-resource for loading the main page;
returning the main page to the client;
searching for recorded cache change information of the client in a cache of the server according to the identifier of the client;
acquiring, in accordance with the indication received from the client as part of the page loading request and the recorded cache change information of the client, a key sub-resource that already exists in the client from the key sub-resource for loading the main page;
acquiring, according to the key sub-resource that already exists in the client, a key sub-resource that does not exist in the client from the key sub-resource for loading the main page;
pushing the key sub-resource that does not exist in the client to the client; and
refraining from pushing to the client the key sub-resource that already exists in the client.

US Pat. No. 10,798,193

SYSTEM AND METHOD FOR AUTOMATIC STORYLINE CONSTRUCTION BASED ON DETERMINED BREAKING NEWS

OATH INC., New York, NY ...

1. A method comprising:identifying, via a computing device over a network, an electronic message associated with a breaking news story being communicated to an account page of a user, said message comprising digital content associated with an event, said message further comprising information identifying users that have an interest in said content;
parsing, via the computing device, the identified message, and based on said parsing, identifying, via the computing device, characteristics of the content and user information comprised within the message;
analyzing, via the computing device, said content characteristics, and based on said analysis, determining, via the computing device, a category associated with said content of the breaking news story;
accessing, via the computing device, information associated with plurality of network platforms, each platform being separately located on the network, each platform comprising media messages that are digital communications sent by users via a respective platform;
searching, via the computing device, the media messages associated with each separate platform via a query defined by said category, and based on said searching, identifying a set of messages that correspond to said category;
extracting, via the computing device, digital content from each message in the set of messages, the extracted content corresponding to a development story such that the extracted content supplements the content of the breaking news story;
generating, via the computing device, a storyline message based on the extracted content and the content of the breaking news story message, said storyline message comprising said content of the breaking news story as seed content from which the extracted content is linked; and
communicating, via the computing device, the storyline message to the user and each of the interested users, said communication automatically causing the storyline message to be displayed on the account page of the user and an account page of each interested user.

US Pat. No. 10,798,192

METHODS AND APPARATUS TO IMPROVE USAGE CREDITING IN MOBILE DEVICES

The Nielsen Company (US),...

1. An apparatus comprising:a session identifier to:
identify a first request having a first source port number, from a device;
determine whether a second request, having a second source port number, is within a threshold number of ports from the first source port number; and
group the first and the second requests as a first session when the second source port number is within the threshold number of ports from the first source port number, wherein session windows including the threshold number of ports move to the highest and lowest source port numbers associated with a current session; and
an application identifier to identify an application associated with the first session.

US Pat. No. 10,798,191

PROCESSOR FOR ANALYZING HETEROGENEOUS DATA STREAMS ACROSS MULTIPLE MODES AND MULTIPLE PARTIES

Fuze, Inc., Boston, MA (...

1. A computer-implemented method, comprising:identifying an interaction event between at least two parties, the interaction event hosted by a remote server;
identifying a first communication mode from a first communication mode provider selected for the interaction event by the at least two parties from multiple communication modes provided by the remote server;
obtaining, from the remote server, an identification for each of the at least two parties, the identification being associated with the first communication mode;
identifying a duration of the interaction event for each of the at least two parties;
associating the interaction event with an asynchronous interaction event in a second communication mode from a second communication mode provider having a common identification with one of the at least two parties, the asynchronous interaction event stored in an entry of a database;
storing, in the entry of the database, a record of the interaction event that includes the first communication mode, the identification for each of the at least two parties, and the duration of the interaction event for each of the at least two parties;
providing access to at least a portion of the database selected by an authorized user other than the at least two parties;
receiving, from a user, a selection of a graphic display, and providing, to the user, an information from an interaction event represented by the graphic display;
removing the record of the interaction event upon request by one of the at least two parties;
correlating the identification for one of the two parties with a second identification based on a second communication mode used by one of the two parties; and
storing the second identification for the one of the at least two parties in the record of the interaction event.

US Pat. No. 10,798,190

TRACKING CHANGES TO CONTENT ON AN EXTERNAL SOURCE IN AN ONLINE SOCIAL NETWORK

Facebook, Inc., Menlo Pa...

1. A method comprising,accessing, by one or more computer systems associated with an online social network, a page of the online social network associated with a first user of the online social network, the page comprising an identifier of a third-party web site that is separate from and external to the online social network, the third-party web site being associated with an external server that hosts an external content on the third-party web site;
determining, by the one or more computer systems of the online social network, that a lifetime associated with a cached external content associated with the identifier exceeds a minimum lifetime, wherein the cached external content is from the third-party web site;
based on the determination that the lifetime associated with the cached external content exceeds the minimum lifetime, querying, by the one or more computer systems of the online social network, the external server associated with the third-party web site for update information associated with the first user using credentials associated with the first user;
receiving, by the one or more computer systems of the online social network, a response to the query from the external server associated with the third-party web site, the response comprising the update information associated with the first user;
based on the response from the external server, determining, by the one or more computer systems of the online social network, that the first user made an update on the third-party web site that is associated with the external content;
updating, by the one or more computer systems of the online social network, the page of the online social network associated with the first user to include a reference to the external content on the third-party web site based on the determination that the first user made the update on the third-party web site that is associated with the external content;
accessing, by the one or more computer systems of the online social network, a tracking preference of a second user of the online social network, the tracking preference comprising one or more types of content updates that the second user wants to track;
determining, by the one or more computer systems of the online social network, that the update made by the first user on the third-party web site is of the one or more types of content updates that the second user wants to track, according to the tracking preference of the second user; and
sending, by the one or computer systems of the online social network, a notification of the update to the page to the second user of the online social network.

US Pat. No. 10,798,189

SYSTEMS AND METHODS FOR PROVIDING OR REQUESTING AVIONICS SIMULATION DATA USING API ADAPTER

Honeywell International I...

9. A computer system for providing data for simulating avionics systems, the computer system comprisinga memory storing instructions; and
one or more processors configured to execute the instructions to perform operations including:
receiving, from a client device, a first message requesting information usable by the client device to simulate a functionality of an avionics system, the first message being in a web services data format;
converting the first message to an avionics protocol data format to obtain a first converted message;
providing the first converted message to a server application;
receiving, from the server application, a second message including the requested information, the second message being in the avionics protocol data format;
converting the second message to the web services data format to obtain a second converted message; and
providing, to the client device, the second converted message.

US Pat. No. 10,798,188

ELECTRONIC DEVICE AND METHOD FOR PROCESSING INFORMATION ASSOCIATED WITH DRIVING

Samsung Electronics Co., ...

1. An electronic device, comprising:a communication module comprising communication circuitry; and
a processor configured to:
receive, from an external electronic device functionally connected with the electronic device, a request associated with transferring a portion of one or more rights capable of controlling the electronic device, via the communication module;
in response to the request, cause to transfer the portion of the one or more rights to the external electronic device if it is determined that the electronic device is performing a function associated with a driving; and
in response to the request, restrict transferring the portion of the one or more rights to the external electronic device if it is determined that the electronic device is performing a function not associated with the driving.

US Pat. No. 10,798,187

SECURE SERVICE CHAINING

CISCO TECHNOLOGY, INC., ...

1. A method for service chaining, the method comprising:determining a service chain for processing a request from a client for content;
determining a capability identifying nodes of the service chain; and
transmitting, to the client, a redirect message having the capability,
wherein,
the redirect message includes a message and a name of the content,
the redirect message redirects the request to a first node of the service chain, and
the capability of the redirect message includes a service chain identifier identifying the service chain.

US Pat. No. 10,798,186

DYNAMIC GENERATION OF NETWORK ROUTING CONFIGURATION WITH SERVICE REQUIREMENTS

INTERNATIONAL BUSINESS MA...

1. A computer program product facilitating implementation of one or more quality of service requirements of a service provider application program by network routing, the computer program product comprising:a non-transitory computer-readable storage medium having program instructions embodied therewith, the program instructions being executable by a processor to perform a method comprising:
automatically establishing a network routing configuration for use in routing a client request from a public network to an appropriate service provider application program of a plurality of service provider application programs of a private network, the automatically establishing including generating one or more respective instructions to be executed by the network routing for the appropriate service provider application program of the plurality of service provider application programs, the one or more instructions being generated as part of the automatically establishing from one or more tags associated with the appropriate service provider application program, each tag identifying a quality of service requirement of the appropriate service provider application program to be implemented by the network routing on behalf of the appropriate service provider application program, wherein different service provider application programs of the plurality of service provider application programs of the private network have different quality of service requirements to be executed by the network routing on behalf of the different service provider application programs;
receiving the client request from the public network at the network routing;
identifying, by the network routing, the appropriate service provider application program of the plurality of service provider application programs of the private network;
based on the receiving and the identifying, executing, by the network routing, the one or more instructions associated with the appropriate service provider application program, along with routing the client request to the appropriate service provider application program, ensures that the quality of service requirement(s) of the appropriate service provider application program is implemented with respect to the client request at the network routing; and
wherein:
the automatically establishing references a service registry, each instance of a service provider application program of the plurality of service provider application programs registering with the service registry when started, and the service registry including for the appropriate service provider application program, the one or more tags indicative of the quality of service requirement(s) of the appropriate service provider application program to be implemented by the network routing on the behalf of the appropriate service provider application program; and
the automatically establishing comprises dynamically generating the network routing configuration for the plurality of service provider application programs of the private network referencing the service registry and a configuration template.

US Pat. No. 10,798,185

SYSTEMS AND METHODS FOR AUTOMATED SESSION IDENTIFIER PROPAGATION

Walmart Apollo, LLC, Ben...

1. A system, comprising:at least one processor operatively coupled with a datastore, the at least one processor configured to:
receive, from a user device, a request message comprising a request component uniform resource locator and a referral component;
determine that the request component uniform resource locator does not comprise a session identifier;
check the referral component for a session identifier;
produce a redirect uniform resource locator comprising a session identifier found in the referral component appended to a request component of the redirect uniform resource locator; and
send, to the user device, a redirection instruction comprising the redirect uniform resource locator, wherein the redirection instruction indicates that a resource requested by the request message has been temporarily moved to the redirect uniform resource locator.

US Pat. No. 10,798,184

SYSTEM AND METHOD FOR PROGRAMMING AN EMBEDDED SYSTEM

AutoAuto, LLC, Austin, T...

1. A method, comprising:pairing, at a remote device, a user device to a computer-controlled vehicle, wherein the user device is configured to communicate with the remote device using a first communication channel, wherein the computer-controlled vehicle is configured to communicate with the remote device using a second communication channel, wherein the pairing includes providing a randomly-generated alphanumeric code to the computer-controlled vehicle, receiving another alphanumeric code from the user device, and matching the randomly-generated alphanumeric code to the another alphanumeric code, and wherein the matching the randomly-generated alphanumeric code to the another alphanumeric code pairs the user device to the computer-controlled vehicle without providing an executable instruction to the computer-controlled vehicle;
after the pairing, receiving, at an input of the remote device and from the user device, a specific sequence of program code for operating the computer-controlled vehicle, wherein the specific sequence of program code received at the input of the remote device includes first content having a first format; and
transmitting, from an output of the remote device, the same specific sequence of program code received at the input of the remote device to the computer-controlled vehicle, wherein the computer-controlled vehicle is configured to execute the specific sequence of program code including the first content having the first format, and wherein the specific sequence of program code executed by the computer-controlled vehicle provides a complete set of instructions, independent of other instructions pre-loaded into a memory of the computer-controlled vehicle prior to the pairing, to cause the computer-controlled vehicle to perform an action.

US Pat. No. 10,798,183

TUNNELING PROTCOL AND GATEWAY FOR DISTRIBUTED COMPUTING ENVIRONMENTS

SAP SE, Walldorf (DE)

1. A computer-implemented method performed by at least one computing device that provides a distributed computing environment, the method comprising:receiving, at an application router executing in the distributed computing environment, a request from a gateway executing on a client computing device, wherein the request is to initiate communications between a client application executing on the client computing device and a server application that is associated with the client application and hosted by the distributed computing environment, wherein a first communication protocol that is not supported by the distributed computing environment is used by the client application and the associated server application;
based on determining, by the application router, that an available instance of the server application is not already executing in the distributed computing environment, launching the instance of the server application to execute in the distributed computing environment;
intercepting, by the application router, communications from the instance of the server application using the first communication protocol and communications from the gateway using a second communication protocol that is supported by the distributed computing environment, wherein the second communication protocol is not supported by the instance of the server application; and
in response to intercepting the communications, forwarding, by the application router, the intercepted communications from the instance of the server application to the gateway using the second communication protocol and the intercepted communications from the gateway to the instance of the server application using the first communication protocol.

US Pat. No. 10,798,182

APPLICATION FUNCTION CONTROL OF IP ADDRESS ALLOCATION

Cisco Technology, Inc., ...

1. A method comprising:establishing a first communication session between an application function (AF) and a user equipment (UE) assigned a first Internet Protocol (IP) address;
determining, by the AF, that the UE has changed location;
in response to determining that the UE has changed location, sending, by the AF, a request that the user equipment be assigned a second IP address, wherein the request comprises an indication of a particular network segment; and
establishing a second communication session between the AF and the UE assigned the second IP address.

US Pat. No. 10,798,181

STORAGE MEDIUM CONTAINING A PROGRAM, INFORMATION PROCESSING DEVICE, AND PROCESSING METHOD FOR DEPLOYING AN APPLICATION GENERATED TO A CLOUD ENVIRONMENT

CANON MARKETING JAPAN KAB...

1. A non-transitory computer-readable storage medium containing program which is executable by an information processing device configured to generate an application, the program causing the information processing device to function as:a definition information acquisition module configured to acquire definition information for generating the application;
a generation module configured to generate the application based on the definition information acquired by the definition information acquisition module;
a connection information acquisition module configured to acquire connection information to be used for connecting to a cloud environment;
a deployment module configured to deploy, in the cloud environment, the application generated by the generation module based on the connection information acquired by the connection information acquisition module;
a history information acquisition module configured to acquire multiple versions of the application deployed by the deployment module; and
a redeployment module configured to redeploy, in the cloud environment, one version of the application selected from the multiple versions of the application acquired by the history information acquisition module based on the connection information acquired by the connection information acquisition module.

US Pat. No. 10,798,180

SYSTEMS AND METHODS FOR OPTIMIZING INFORMATION COLLABORATION

Wells Fargo Bank, N.A., ...

1. A system comprising:at least one hardware processor; and
a memory storing instructions that, when executed by the at least one hardware processor, cause the at least one hardware processor to perform operations comprising:
receiving an initiation message associated with a collaboration event between a first user and a second user, the collaboration event initiated at a computing device associated with the first user and associated with collaborative content, the collaborative content including a document;
determining a target device from a pool of computing devices associated with the second user based on:
usage history of each computing device in the pool of computing devices; and
capabilities of each computer device in the pool of computing devices to present the collaborative content and complete a collaborative step of the collaboration event, the collaborative step including digitally signing the document;
determine a target venue from a plurality of venues on the target device;
initiating a collaboration session with the second user via the target device to complete collaborative step of the collaboration event; and
presenting the collaborative content to the second user via the target device in the target venue during the collaboration session to digitally sign the document.

US Pat. No. 10,798,179

SERVICE ENDPOINT INTERCONNECT IN A VIRTUAL PRIVATE GATEWAY

Amazon Technologies, Inc....

1. A system, comprising:a virtual private gateway (VGW) provisioning service, including a memory coupled to a processor, wherein the memory includes instructions that upon execution causes the VGW provisioning service to:
receive a request to establish a VGW from a customer of a service provider, the request specifying a service to be accessible through the VGW and a customer-configurable policy, wherein the customer-configurable policy restricts access to the specified service to requests sent via the VGW to the specified service, and wherein the service is provided by the service provider to the customer;
responsive to the request, instantiate a VGW virtual machine on a compute device, the VGW virtual machine including a VGW application configured to establish a secure tunnel over a public network to a remote node and to receive encrypted traffic from the remote node over the secure tunnel;
cause route data for the specified service to be provided to the VGW virtual machine, wherein the VGW application includes instructions that upon execution cause the VGW application to advertise the route data for the specified service over the secure tunnel; and
provide the customer-configurable policy to the identified service for compliance by the service.

US Pat. No. 10,798,178

SELECTING A USER PLANE FUNCTION (UPF) FOR LAYER 2 NETWORKS

CISCO TECHNOLOGY, INC., ...

1. A method for selecting a User Plane Function (UPF) in a communication network, the method comprising:receiving, by a Network Function (NF), User Plane Function (UPF) registration information for a plurality of UPFs, the registration information including a respective network attribute for each UPF;
associating, by the NF, each UPF with a corresponding network based on the respective network attribute;
mapping, by the NF, one or more User Equipment (UE) to the corresponding network based on a security policy to create a UE-to-network table;
receiving, by the NF, a request to establish a session for a subsequent UE, the request including a subsequent UE identifier;
determining, by the NF, an access permission for the subsequent UE to access the corresponding network based on the subsequent UE identifier and the UE-to-network table; and
selecting, by the NF, one UPF from the plurality of UPF to service the session for the subsequent UE based on the access permission, and an association between the one UPF and the corresponding network.

US Pat. No. 10,798,177

HVAC CONTROLLER WITH INTEGRATED WIRELESS NETWORK PROCESSOR CHIP

Johnson Controls Technolo...

1. A controller in a building management system (BMS), the controller comprising:an integrated wireless network processor chip comprising:
a wireless radio configured to communicate with one or more BMS devices;
a processor in communication with the wireless radio and located on a same chip as the wireless radio; and
memory in communication with the wireless radio and located on the same chip as the wireless radio and the processor, the memory comprising communication stacks configured to facilitate communication using a building automation and control network communications protocol and a Wi-Fi communications protocol, wherein the integrated wireless network processor chip provides the communication with the one or more BMS devices with a user device configured to access one or more of the BMS devices using an application installed on the user device;
wherein the integrated wireless network processor chip is configured to receive data from the one or more BMS devices via the wireless radio, format the data from the one or more BMS devices using the processor, and send the data from the one or more BMS devices via the wireless radio to the user device using the Wi-Fi communications protocol.

US Pat. No. 10,798,176

JOINT IOT BROKER AND NETWORK SLICE MANAGEMENT COMPONENT

NEC CORPORATION, Tokyo (...

1. A method for Internet of Things (IoT) traffic management in a communication network supporting a plurality of network slices, in particular a 5th generation wireless communication network, the method comprising:by a network slice management component, dynamically assigning network resources to a number of network slices, wherein one or more of the network slices are dedicated IoT network slices being adapted to enable IoT-related communications between an IoT platform and IoT devices or IoT gateways, and
by the network slice management component, interacting with an IoT broker associated with the IoT platform and, based on the interaction, performing actions with respect to an allocation of network resources to the number of network slices and/or triggering actions on the IoT broker with respect to a configuration of IoT data traffic;
wherein the interaction between the network slice management component and the IoT broker includes negotiation of IoT data traffic configuration requests of the network slice management component.

US Pat. No. 10,798,175

IOT CONTEXTUALLY-AWARE DIGITAL TWIN WITH ENHANCED DISCOVERY

CohesionIB, Chicago, IL ...

1. A method of generating a contextually-aware digital twin of a commercial real estate building comprising:receiving, by a computing device, information about an asset comprising one or more devices residing in one or more physical spaces associated with the commercial real estate building;
determining, by the computing device, and based on an identification of the one or more devices of the asset, one or more points corresponding to a sensor or an actuator of the one or more devices;
identifying, by the computing device, and based on the one or more points, at least one controller that serves the asset via the one or more points, wherein the at least one controller comprises a physical or logical entity;
determining, by the computing device, one or more networks, and one or more locations associated with the asset;
storing, by the computing device in a graph database, each of the asset, the one or more points, the at least one controller, the one or more networks, and the one or more locations as separate nodes of a graph representation of the commercial real estate building;
discovering, based on a received identification of a discovered device connected to an associated network, whether the discovered device is stored in the graph representation of the commercial real estate building;
when the discovered device is not stored in the graph representation, identifying a discovered point, a discovered controller, and a discovered location associated with the discovered device; and
modifying the graph representation in the graph database to include the discovered point the discovered controller, the discovered location, and the associated network.

US Pat. No. 10,798,174

SMART CITY SYSTEM ARCHITECTURE

CHENGDU QINCHUAN IOT TECH...

1. A smart city system architecture, whereinthe smart city system architecture comprises at least one smart city sub-system;
the at least one smart city sub-system comprises a functional system, a physical system, and an information system;
the functional system is a form of a function expression; the information system is a way of function implementation; and the physical system is a carrier providing a physical support for the function implementation;
the functional system has a five-platform structure, comprising an object platform, a sensor network platform, a management platform, a service platform, and a user platform; the physical system has a five-layer structure, comprising an object layer, a sensor network layer, a management layer, a service layer, and a user layer; and the information system has a five-domain structure, comprising an object domain, a sensing domain, a management domain, a service domain, and a user domain;
a function of each platform in the functional system is implemented through supports of physical entities in the physical system and an operation of information in the information system; and
the object platform of the functional system corresponds to the object layer in the physical system and the object domain in the information system; the sensor network platform of the functional system corresponds to the sensor network layer in the physical system and the sensing domain in the information system; the management platform of the functional system corresponds to the management layer in the physical system and the management domain in the information system; the service platform of the functional system corresponds to the service layer in the physical system and the service domain in the information system; and the user platform of the functional system corresponds to the user layer in the physical system and the user domain in the information system.

US Pat. No. 10,798,173

SYSTEM AND METHOD FOR FACILITATING A DATA EXCHANGE AMONGST COMMUNICATION DEVICES CONNECTED VIA ONE OR MORE COMMUNICATION NETWORKS

Voko Solutions Limited, ...

1. A system for facilitating data exchange amongst communication devices connected via one or more communication networks, the system comprising:a plurality of Internet of Things (IoT) devices;
a processor communicatively coupled with the plurality of IoT devices; and
a memory coupled with the processor, wherein the processor is configured to execute programmed instructions stored in the memory for
receiving data from one or more IoT devices of the plurality of IoT devices, wherein at least one IoT device of the plurality of IoT devices is classified into a class of a plurality of predefined classes based upon hardware configuration of the said at least one IoT device, wherein the data is associated with a first user, and wherein the data is received using at least one communication protocol;
reducing delay of multiple hops between IoT devices and the processor, and wherein the delay of multiple hops between the IoT devices and the processor is calculated based upon parameters comprising a transmission radius (r), a channel access probability (p), a node density (?) and a percentage of silent relay nodes (?), and wherein allocation of the processor to process the data received from at least one IoT device of the plurality of the IoT devices and the data received from the first user and second user is based on the delay of multiple hops;
processing the data in order to convert data into a normalized data, wherein the normalized data comprises data in various formats;
extracting information from the normalized data, wherein the information is extracted using a set of predefined business logic and business rules;
matching the information with a first set of rules defined by a second user to obtain matched data, wherein the first set of rules defined by the second user are received by the system through XMPP protocol, and wherein the first set of rules comprises one or more rules configured to define data delivery network channel interfaces, select a data product, a payment method and complete transaction of the data product;
generating one or more data products based on the matched data and a second set of rules defined by the first user, wherein the second set of rules defined by the first user are received by the system through XMPP protocol, and wherein the second set of rules comprises one or more rules configured to categorize the data, define data delivery methods, define product catalogue, define product price schedule, define product copyright terms, and finally publish the product on data;
storing the one or more data products into a product database of the memory; and
sending the one or more data products to the second user via a network.

US Pat. No. 10,798,172

DATA PROCESSING SYSTEM AND METHOD TO USE THE DATA PROCESSING SYSTEM

1. A data processing system to process multiple maritime navigational software applications on a ship, the data processing system comprising:a main hardware-server containing the multiple maritime navigational software applications operable from at least one client-workstation with a user interface, wherein the main hardware-server is configured to limit a function of the maritime navigational software applications on the client-workstation based on a user profile that includes whether a user is a ship owner, a manufacturer, or a crew member, or includes a job classification of the user; and
a subordinate hardware-server containing the multiple maritime navigational software applications, the subordinate hardware-server being configured to copy data processed by the multiple maritime navigational software applications on the main hardware-server based on outputs from multiple maritime navigational sensors from the main hardware-server to the subordinate hardware-server, wherein
the main hardware-server and the subordinate hardware-server are further configured to switch the main hardware-server into the subordinate hardware-server and switch the subordinate hardware-server into the main hardware-server, when the subordinate hardware-server completes an update of its multiple maritime navigational software applications, the update relating to navigational charts and/or navigational functionality;
the multiple maritime navigational sensors are connected to the main hardware-server via a first link, and connected to the subordinate hardware-server via a second link different from the first link;
the main hardware-server acquires the outputs from the multiple maritime navigational sensors through one of the first and second links;
the data processing system is configured as an Electronic Chart Display & Information System (ECDIS); and
the first link and the second link are data connections within the ECDIS.

US Pat. No. 10,798,171

SENSOR DATA ADVERTISEMENT VIA NETWORK IDENTIFIER IN SHARED SPACES

Dell Products, L.P., Rou...

1. An information handling system in communication with a plurality of networked sensors using one or more mesh networks, comprising:a network gateway in communication with the plurality of networked sensors wherein the network gateway detects the plurality of networked sensors and automatically classifies the plurality of networked sensors into a class of networked sensors according to a pre-established set of classes;
a network interface configured to:
broadcast a network identifier for a virtual network, the network identifier advertising the availability of the class of networked sensors of the plurality of networked sensors; and
direct a device attempting to access the virtual network to a splash page, the virtual network being separate from the one or more mesh networks; and
a processor configured to:
provide the splash page where a user can subscribe to information from the class of network sensors; and
provide sensor data from the network sensors to a subscribed user.

US Pat. No. 10,798,170

MULTI-THREADED SCANNING OF DISTRIBUTED FILE SYSTEMS

Commvault Systems, Inc., ...

1. A non-transitory computer-readable medium storing instructions that, when executed by a first computing device comprising one or more hardware processors, cause the first computing device to:by a data agent executing on the first computing device,
determine characteristics of a network used by the first computing device to communicate with a network storage system that stores data files accessible by the first computing device, wherein the data agent is associated with the data files;
based at least in part on the characteristics of the network, determine by the data agent an amount of scanning threads for scanning a network storage repository in the network storage system,
wherein the scanning identifies one or more data files that are stored at the network storage repository which are to be backed up at least in part by the data agent;
by the data agent, triggering the network storage system to initiate the amount of scanning threads of the network storage repository to identify the one or more data files to be backed up; and
wherein to determine the amount of scanning threads, the data agent balances an amount of time to complete the scanning of the network storage repository using the scanning threads with an amount of network resources to communicate results of the scanning.

US Pat. No. 10,798,169

PRIORITIZING RANGES TO REBUILD BASED ON NAMESPACE HEALTH

PURE STORAGE, INC., Moun...

1. A computing device comprising:an interface configured to interface and communicate with a dispersed or distributed storage network (DSN);
memory that stores operational instructions; and
processing circuitry operably coupled to the interface and to the memory, wherein the processing circuitry is configured to execute the operational instructions to:
detect one or more memory errors associated with one or more memory devices of one or more sets of storage units (SUs) within the DSN that distributedly store a set of encoded data slices (EDSs), wherein a data object is segmented into a plurality of data segments, wherein a data segment of the plurality of data segments is dispersed error encoded in accordance with dispersed error encoding parameters to produce the set of encoded data slices (EDSs);
process the one or more memory errors to generate a rebuilding priority level for at least some of the set of EDSs;
based on an EDS error that is detected based on scanning of the set of EDSs:
update the rebuilding priority level to generate an updated rebuilding priority level for the at least some of the set of EDSs; and
facilitate generation of at least one rebuilt EDS for the EDS error based on the updated rebuilding priority level.

US Pat. No. 10,798,168

STORING DATA IN DISTRIBUTED SYSTEMS

Alibaba Group Holding Lim...

1. A computer-implemented method executed by one or more processors, the method comprising:receiving, by the one or more processors, a request to update data stored on a distributed data storage system that comprises a primary server and a plurality of secondary servers, the request comprising data updates, the primary server being randomly selected;
sending, by the one or more processors, an update log instruction to the primary server and the plurality of secondary servers, wherein at least one of the primary server and the plurality of secondary servers records a log associated with the request;
determining, by the one or more processors, that a log operation was completed, wherein the log has been recorded by the primary server;
in response to determining that the log operation was completed by the primary server, randomly selecting, by the one or more processors, one of the plurality of secondary servers as a first secondary server of the plurality of secondary servers;
sending, by the one or more processors, a data storage instruction to the primary server and the first secondary server of the plurality of secondary servers wherein each of the primary server and the first secondary server stores the data updates; and
sending, by the one or more processors, a null-operation instruction to a second secondary server, wherein the null-operation instruction is used to instruct the second secondary server to perform no operation with respect to the data updates to reduce a number of copies of the data updates.

US Pat. No. 10,798,167

STORAGE ENHANCED INTELLIGENT PRE-SEEDING OF INFORMATION

INTERNATIONAL BUSINESS MA...

1. A method for data management across a network, the method comprising:performing, by an internet service provider (ISP), a network traffic signature analysis on outbound traffic sent from a client device via a local area network to which the client device is connected;
determining, by the ISP, a type of the client device, an operating system of the client device, and an application installed on the client device based on the network traffic signature analysis;
determining, by the ISP, a first application-critical or hardware-critical update that is appropriate for the client device based only on the type of the client device, the operating system of the client device, and the application installed on the client device;
determining, by the ISP, a time period of low utilization of the local area network by tracking a throughput of outbound traffic sent from the local area network;
pre-seeding, by the ISP, the first application-critical or hardware critical update to a customer premises equipment (CPE) during the time period of low utilization, wherein the CPE comprises a router or modem that connects the local area network to a wide area network;
storing, by the CPE, the first application-critical or hardware-critical update in a storage location associated with the CPE;
pre-seeding, by the ISP, a second application-critical or hardware-critical update to the CPE and storing the second application-critical or hardware-critical update in the storage location associated with the CPE; and
evicting, by the CPE, the first application-critical or hardware critical update from the storage location associated with the CPE upon determining that the first application-critical or hardware critical update is an outdated version of the second application-critical or hardware-critical update.

US Pat. No. 10,798,166

CONSOLIDATED PROCESSING OF STORAGE-ARRAY COMMANDS BY A SNAPSHOT-CONTROL MEDIA AGENT

Commvault Systems, Inc., ...

1. A method comprising:on a first computing device that comprises one or more processors and associated computer memory, executing a first media agent and an application that reads and writes primary data residing on a storage array;
on a second computing device that comprises one or more processors and associated computer memory, executing a second media agent that is in communication with the first media agent, wherein a first command device is configured on the second computing device for directly communicating operational commands to the storage array;
by the second media agent, based at least in part on using the first command device, providing indirect communications of operational commands between the first media agent and the storage array by:
transmitting a first operational command, received by the second media agent from the first media agent, to the storage array using the first command device;
wherein the first computing device is one of a plurality of first computing devices each executing a respective application, a data agent associated with the respective application, and a respective first media agent, and
further wherein each first computing device is configured with no command devices for directly communicating operational commands to the storage array; and
wherein the second media agent is configured with a plurality of command devices, including the first command device, for consolidating at the second media agent communications of operational commands originating from the first media agents and directed at the storage array.

US Pat. No. 10,798,165

TENANT DATA COMPARISON FOR A MULTI-TENANT IDENTITY CLOUD SERVICE

Oracle International Corp...

1. A method of replicating resources in a multi-tenant cloud system, the comprising:receiving a master resource, associated with a master account of the cloud system to be replicated, wherein the master resource comprises a master JavaScript Object Notation (JSON) object and comprises a plurality of master attributes;
generating a master resource metadata JSON by calculating hash values for each of the master attributes to generate master attribute level hashes and by calculating an aggregate of all of the hash values to generate a master resource level hash;
storing each master attribute of the master JSON object in a separate column of a master database table associated with the master account and store the master resource metadata JSON is in a separate hash column of the master database table;
replicating the master JSON object to create a replicated JSON object comprising a plurality of replicated attributes;
generating a replicated resource metadata JSON by calculating the hash values for each of the replicated attributes to generate replicated attribute level hashes and by calculating an aggregate of all of the hash values to generate a replicated resource level hash; and
storing each replicated attribute of the replicated JSON object in a separate column of a replicated database table associated with a replicated account of the cloud system and store the replicated resource metadata JSON in a separate hash column of the replicated database table.

US Pat. No. 10,798,164

TECHNIQUES FOR INTELLIGENT DEVICE COLLABORATION

Bose Corporation, Framin...

1. A computer-implemented method for managing computing devices on which end users consume media content, the method comprising:receiving, from each computing device of multiple computing devices, input indicative of a request to be included in a group;
coupling each computing device of the multiple computing devices to a processing system across a network communication channel;
coupling each computing device of the multiple computing devices to at least one other computing device of the multiple computing devices across a second network communication channel,
wherein each computing device transmits a first type of metadata over the network communication channel and a second type of metadata over the second communication channel; and
transmitting an instruction to at least one computing device of the multiple computing devices to impose a consistent global state across the group,
wherein the consistent global state causes the multiple computing devices to present media content to corresponding consumers substantially simultaneously.

US Pat. No. 10,798,163

COMMUNICATION TOOL FOR DATA TRANSFER

Alibaba Group Holding Lim...

1. A computer-implemented method for data transfer, the method being executed by one or more processors and comprising:receiving, by the one or more processors, an initiation request for initiating a service, the initiation request being generated by a user of a first communication group of a plurality of communication groups participating in a communication session using a communication tool;
receiving, by the one or more processors, a participation response from a plurality of users of the plurality of communication groups different from the first communication group, the plurality of users being included in a second communication group to which the user of the first communication group does not belong and each of the plurality of users in the second communication group is participating in the communication session, uses the communication tool and is open to communicate with the user of the first communication group;
determining, by the one or more processors, a participation result comprising service conditions associated with the user of the first communication group and the plurality of users of the second communication group; and
in response to determining the participation result, generating, by the one or more processors, a third communication group comprising target users for completing the service.

US Pat. No. 10,798,162

CLUSTER SYSTEM WITH FAIL-SAFE FALLBACK MECHANISM

TEXAS INSTRUMENTS INCORPO...

1. A system, comprising:a first subsystem comprising a graphic processing unit (GPU), the GPU configured to execute a high-level operating system (HLOS) and to render a first set of parameter data;
a second subsystem comprising an auxiliary core processor, the auxiliary core processor configured to execute a real-time operating system (RTOS) and to render a second set of parameter data;
a controller area network (CAN) coupled to a parameter data source input and to the first subsystem and the second subsystem;
a quality of service (QoS) monitor module, the QoS monitor module coupled to the first subsystem through a communication line, and to the second subsystem through another communication line, wherein the QoS monitor module is configured to select a selected set of parameter data to be the first set of parameter data or the second set of parameter data based on an availability and load of the first subsystem in accordance with a lag threshold and a stability threshold; and
a display coupled to the QoS monitor module, the display configured to display the selected set of parameter data.

US Pat. No. 10,798,161

METHOD AND SYSTEM FOR AUTOSCALING APPLICATIONS

PayPal, Inc., San Jose, ...

1. A system, comprisinga non-transitory memory storing instructions; and
a processor configured to execute the instructions to cause the system to:
determine a reference cluster of instances of an application in an application pool;
select a candidate instance from the reference cluster of instances;
increase live traffic routed to the candidate instance for a first period of time using a load balancer having a threshold defining a finite horizon of a number of step increases in the live traffic routed to the candidate instance;
monitor the candidate instance to determine whether the increasing the live traffic routed to the candidate instance for the first period of time results in an outlier metric of the application;
determine that the increase in live traffic routed to the candidate instance for the first period of time did not result in the outlier metric of the application;
in response to the determining that the increase in live traffic routed to the candidate instance for the first period of time fails to result in the outlier metric of the application, increase the live traffic routed to the candidate instance, using the load balancer, for a second period of time, wherein the live traffic routed to the candidate instance for the second period of time is greater than the live traffic routed to the candidate instance for the first period of time:
monitor the candidate instance to determine whether the increasing the live traffic routed to the candidate instance for the second period of time results in the outlier metric of the application;
determine that the increase in the live traffic routed to the candidate instance for the second period of time fails to result in the outlier metric and the number of step increases in the live traffic routed to the candidate instance using the load balancer has been exhausted; and
subsequent to the determination that the increase in live traffic routed to the candidate instance for the second period of time fails to result in the outlier metric and the number of step increases in live traffic routed to the candidate instance using the load balancer has been exhausted, restore a status of the candidate instance to a status that existed before the increasing the live traffic routed to the candidate instance for the first period of time.

US Pat. No. 10,798,160

RESOURCE MANAGEMENT IN A CLOUD ENVIRONMENT

MICRO FOCUS LLC, Santa C...

1. A system comprising:a processor; and
a non-transitory storage medium storing instructions executable on the processor to:
receive, from a source application, a first action trigger indicative of a physical presence or physical absence of a user at a geographical location;
retrieve an activity status for a resource of a plurality of resources in a cloud environment;
receive, from a biometric application, a second action trigger indicating that a biometric verification has been performed of the user; and
provide, based on the first action trigger, the second action trigger, and the activity status, a recommendation for deployment or non-deployment of the resource.

US Pat. No. 10,798,159

METHODS FOR MANAGING WORKLOAD THROUGHPUT IN A STORAGE SYSTEM AND DEVICES THEREOF

NetApp, Inc., Sunnyvale,...

1. A method, comprising:modifying, by a computing device, one or more packets received via a Transmission Control Protocol (TCP) connection with a client to replace a destination internet protocol (IP) address with a server IP address of a selected server, and to replace a source IP address with a logical IP address;
sending, by the computing device, an acknowledgement message to the client that closes a TCP receive window associated with the TCP connection to prevent the client from sending any subsequent packets before the TCP connection is transferred to the selected server;
transmitting, by the computing device, state information associated with the TCP connection and the modified one or more packets to the selected server to facilitate an exchange of data between the selected server and the client; and
terminating, by the computing device, the TCP connection upon receiving a TCP finish handshake message from the client.

US Pat. No. 10,798,158

NETWORK SYSTEM AND DECISION METHOD

INSTITUTE FOR INFORMATION...

1. A network system comprising:a plurality of Internet of Things (IoT) devices;
a plurality of computation servers; and
a plurality of gateways communicatively connected to the plurality of IoT devices and the plurality of computation servers, wherein at least one of the plurality of computation servers is configured to:
tag, according to a signal quality of a signal of the plurality of IoT devices, the plurality of IoT devices as a plurality of first devices and a plurality of second devices;
compute a device number of the first devices connected with each of the plurality of gateways, and compute a gateway number of the gateways which are capable of being connected to the second devices;
compute a load index associated with the device number and the gateway number of each of the plurality of gateways;
compute a transmission energy consumption index of a first link between each of plurality of gateways and each of the plurality of computation servers;
select, according to the load index and the transmission energy consumption index of each of the plurality of gateways, the gateways which are to perform communication; and
obtain a communication network, wherein the communication network comprises the plurality of first devices, the plurality of second devices, and the gateways as selected.

US Pat. No. 10,798,157

TECHNOLOGIES FOR TRANSPARENT FUNCTION AS A SERVICE ARBITRATION FOR EDGE SYSTEMS

Intel Corporation, Santa...

1. An edge gateway device for function as a service arbitration, the edge gateway device comprising:a hardware processor; and
one or more memory devices having stored therein a plurality of computer-readable instructions that, when executed by the hardware processor, cause the edge gateway device to establish:
a function execution interface to receive a function execution request from an endpoint device, wherein the function execution request is indicative of a function as a service (FaaS) function identifier;
a service provider manager to select a service provider device from a plurality of registered service provider devices based on the FaaS function identifier;
a transform manager to (i) program an accelerator of the edge gateway device with a transform function associated with the service provider device and (ii) execute the transform function with the accelerator to transform the function execution request to a provider request, wherein the provider request is compatible with the service provider device; and
a function execution manager to submit the provider request to the service provider device.

US Pat. No. 10,798,156

INTELLIGENT CONTENT DELIVERY NETWORKS

BRANDFOLDER, INC., Denve...

1. A system comprising:a content management server comprising:
a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library;
an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server; and
a controller that selects a group of assets from the library based on the HTTP request, identifies an asset that has a highest score within the group, and provides the identified asset in response to the HTTP request,
wherein the controller adjusts the scores based upon locations of the assets appearing on web pages of a website.

US Pat. No. 10,798,155

INTERACTIVE METHOD, USER TERMINAL, SERVER AND SYSTEM, COMPUTER STORAGE MEDIUM

Tencent Technology (Shenz...

1. A location based interactive method, comprising:acquiring, by a user terminal, a geographic coordinate of a user's location;
sending, by the user terminal, the acquired geographic coordinate to a location server;
in response to receiving the acquired geographic coordinate, searching, by the location server, for Points of Interest (POI's) corresponding to the acquired geographic coordinate according to a pre-created location database configured to store a relationship between geographic coordinates and POI's;
sending, by the location server, a POI list to the user terminal, wherein the POI list comprises multiple POI's corresponding to the geographic coordinate;
receiving and displaying, by the user terminal, the POI list from the location server;
in response to user selection of multiple POI's from the POI list displayed by the user terminal, triggering a group creating request to be sent to a login server, the group creating request carrying the multiple POIs selected by the user from the POI list wherein the login server is separate from and does not directly communicate with the location server;
in response to the group creating request, directly creating, by the login server, a group, the created group including multiple geographic locations corresponding to the multiple selected POI's;
sending, by the login server, the created group to the user terminal and providing, by the login server, intra-group interactive services to the user, wherein the intra-group interactive service comprises: searching for a location of another user within the group, inviting another user to join the group, receiving a request from another user for joining the group and allowing the another user to join the group, initiating an intra-group session, and allowing users within the group to jointly complete a POI sign-in;
receiving and displaying, by the user terminal, the created group;
in response to a user selection, triggering an intra-group interactive request to be sent to the login server based on the created group; and
providing, by the login server, the selected intra-group interactive service.

US Pat. No. 10,798,154

EXTENDED PARK MODE

Ford Global Technologies,...

1. A system comprising:a cloud service configured to
receive, over a wide-area network responsive to user input to a mobile device, an indication to transition a vehicle associated with the mobile device from a normal mode, in which a plurality of vehicle control modules of the vehicle are enabled to perform operations during key-off that incur key-off load on the vehicle, into an extended park mode, in which the plurality of vehicle control modules reduce their key-off loads on the vehicle compared to the normal mode by refraining from performing the operations, and
responsive to the indication, provide a message over the network to the vehicle configured to instruct operations to reduce the key-off loads of the plurality of vehicle control modules by transitioning from the normal mode to the extended park mode.

US Pat. No. 10,798,153

TERMINAL APPARATUS AND SERVER AND METHOD OF CONTROLLING THE SAME

Samsung Electronics Co., ...

1. A user terminal apparatus, comprising:a display;
a memory configured to store at least one instruction;
a communicator; and
a processor configured to control the user terminal apparatus based on the at least one instruction stored in the memory;
wherein the processor is further configured to:
in response to profile information of a second user being inputted by a first user, store the inputted profile information of the second user as local profile information in the memory,
receive shared profile information of the second user from a server through the communicator, and
control the display to display both the stored local profile information of the second user inputted by the first user in a first status and the shared profile information of the second user received from the server in a second status which is different from the first status,
wherein the first status is an activated status in which a function corresponding to a manipulation of the first user is executed, and
wherein the second status is an inactivated status.

US Pat. No. 10,798,152

MACHINE LEARNING USING COLLABORATIVE EDITING DATA

MICROSOFT TECHNOLOGY LICE...

1. A method comprising:identifying a first set of objects that are part of a document, the document created by an application, and the first set of objects placed in the document by a first user;
based on the first set of objects, determining, by the application, an intent of the first user for the document, wherein the intent of the first user corresponds to an end goal of the first user, the end goal of the first user is what the document is used for;
automatically adding, by the application, a second set of objects to the document according to the intent; and
based at least in part on the intent, configuring, by the application, permissions of the document to allow collaborative editing within the document between the first user and a second user to add a third set of objects to the document.

US Pat. No. 10,798,151

BROKERING FOR APPLICATION HOSTING COMPUTING RESOURCES OF MULTIPLE VENDOR-SPECIFIC PROVISIONED COMPUTING ENVIRONMENTS

Amazon Technologies, Inc....

1. A system, comprising:a broker module, executing on at least one server computer, the broker module configured to be coupled to a plurality of vendor-specific computing environments for receiving parameters associated with characteristics of the vendor-specific computing environments, the broker module further configured to receive application parameters, and to determine which of the plurality of vendor-specific environments is suitable for hosting an application associated with the application parameters, wherein the application parameters include an indication that the application is to be hosted simultaneously on two different vendor-specific environments of the plurality of vendor-specific environments, wherein the vendor-specifice environments that are determined by the broker module to be suitable for hosting the application includes a first vendor-specific environment and a second vendor-specific environment, and wherein the broker module is further configured to communicate to a client system a notification indicating the determined first and second vendor-specific environments.

US Pat. No. 10,798,150

METHOD AND APPARATUS FOR COORDINATING TASKS AMONG A PLURALITY OF USERS

HERE Global B.V., Eindho...

1. A computer implemented method for selectively transmitting a task request to one or more of a plurality of contact devices over a data network comprising:receiving, by a processing platform, a request to transmit a task request from a user of a user device, the task request specifying a task location and a predetermined time deadline for completing the task request;
determining the one or more contact devices from one or more contact lists that are associated with the user of the user device;
computing a probability distribution that indicates respective probabilities that the one or more contact devices will be in proximity of the user device before the predetermined time deadline;
selecting a subset of the contact devices based on the probability distribution;
processing respective geo-location information of the subset of the contact devices to determine a proximity of each contact device in the subset to the task location;
selecting at least one contact device from the subset based on the determined proximity of each contact device in the subset to the task location; and
transmitting the task request over the data network to the at least one contact device selected from the subset, wherein the task request is configured to initiate a presentation of the task request on a display of the at least one selected contact device.

US Pat. No. 10,798,149

FILE STORAGE, OBJECT STORAGE, AND STORAGE SYSTEM

HITACHI, LTD., Tokyo (JP...

1. A file storage that manages a file and that transfers the file to an object storage, comprising:a network interface section that transmits and receives data through a communication network;
a file system management section that manages the file; and
a file transfer section that splits the file into a plurality of parts and that transmits the plurality of parts to the object storage, wherein
when one of the parts already transmitted to the object storage is updated by the file system management section while the plurality of parts are being transmitted to the object storage, the file transfer section
requests the object storage to generate a temporary object that is a temporarily generated object containing the transmitted and updated part by combining the parts transmitted before update,
re-splits the file into a plurality of parts so that the transmitted and updated data and not-transmitted data are handled as parts different from a part containing transmitted and not-updated data, and
transmits the part containing the transmitted and updated data or the part containing the not-transmitted data to the object storage.

US Pat. No. 10,798,148

CONFIGURING NODES OF DISTRIBUTED SYSTEMS

SPLUNK INC., San Francis...

1. A computer-implemented method for configuring a distributed computer system comprising a plurality of nodes that includes at least a forwarder node configured to collect data from an input source, an indexer node configured to index the data, and a search head node configured to search the data, the method comprising:receiving one or more configuration files for each of the forwarder node, the indexer, and the search head node;
in response to receiving a first change, to the one or more configuration files, which impacts a configuration of the forwarder node, propagating the first change to the one or more configuration files to the forwarder node;
in response to receiving a second change to the one or more configuration files, which impacts a configuration of the indexer node, propagating the second change to the one or more configuration files to the indexer node;
in response to receiving a third change to the one or more configuration files, which impacts a configuration of the search head node, propagating the third change to the one or more configuration files to the search head node; and
providing progress information representative of progress in achieving consistency with a desired state of the distributed computer system, wherein at least one of the received first, second, or third change to the one or more configuration files indicates the desired state of the distributed computer system.

US Pat. No. 10,798,147

CONSTRAINT BASED CONTROLLED SEEDING

Microsoft Technology Lice...

1. A catalog service, comprising:memory configured to maintain an active peer list for a peer-to-peer network describing active peer devices and to track a data file composed of a set of sub-pieces for the peer-to-peer network;
a processing core having at least one processor configured to
receive, from a peer device of the peer-to-peer network, a constraint describing a user-defined data storage limit available for seeding a subset of the sub-pieces of the data file,
store the constraint received from the peer device, and
based at least on the constraint received from the peer device, assign a seed sub-piece of the data file to the peer device when executing a seed client to provide the seed sub-piece to a leeching client on the peer-to-peer network; and
a communication interface configured to direct the peer device to retain a persistent sub-piece on the peer device as the seed sub-piece for the peer device until a release event.

US Pat. No. 10,798,146

SYSTEM AND METHOD FOR UNIVERSAL TIMEOUT IN A DISTRIBUTED COMPUTING ENVIRONMENT

ORACLE INTERNATIONAL CORP...

1. A method for supporting universal timeout in a distributed computing environment, the method comprising:establishing a universal timeout period, the universal timeout period being associated with the execution of a block of code on a thread wherein the block of code comprises a plurality of sequential blocking functions including at least first, second and third blocking functions;
implementing the universal timeout feature using a try-with-resource statement of said block of code of said thread, wherein the universal timeout period comprises a resource of the try-with-resource statement;
executing the try-with-resource statement and initiating a thread local variable indicating a time period for completing the block of code;
calling the first blocking function;
referencing the thread local variable and setting a first timeout for the first blocking function less than or equal to the time period indicated by thread local variable;
executing the first blocking function;
reducing the time period indicated by the thread local variable by a time taken to execute the first blocking function and triggering an interrupt upon the universal timeout period being expired as indicated by the thread local variable;
calling the second blocking function;
referencing the thread local variable and setting a second timeout for the second blocking function less than or equal to the time period indicated by the thread local variable as reduced by the time taken to execute the first blocking function;
executing the second blocking function;
reducing the time period indicated by the thread local variable by a time taken to execute the second blocking function and triggering an interrupt upon the universal timeout period being expired as indicated by the thread local variable;
calling the third blocking function;
referencing the thread local variable and setting a third timeout for the third blocking function less than or equal to the time indicated by the thread local variable as reduced by the time taken to execute the first blocking function and second blocking function; and
executing the third blocking function.

US Pat. No. 10,798,145

ANALYZING DATA STREAMS

10. A method for evaluating contents of a data stream formed from a plurality of individual and discrete segments, the method comprising:receiving, from a user, a selected data stream to be analyzed;
fetching the selected data stream by requesting and receiving the plurality of segments that make up the selected data stream from a computer network;
generating a download record for one or more of the plurality of segments that contains data contemporaneously generated at the time the one or more of the plurality of segments are fetched by generating a parsing graph that contains metadata for each parsed layer of each segment and that includes a range map illustrating data flow between an input and an output of the parsed layers, the range map including a source byte range and a destination byte range between two parsed layers;
storing the fetched plurality of segments in a data store;
storing the download record in the data store associated with the fetched plurality of segments;
retrieving the stored fetched plurality of segments and download record;
comparing the stored fetched plurality of segments and download record against a ruleset;
generating one or more alerts based on the comparison;
generating a notification of the one or more alerts; and
forwarding the notification of the one or more alerts to the user.

US Pat. No. 10,798,144

DIRECTORY LIMIT BASED SYSTEM AND METHOD FOR STORING MEDIA SEGMENTS

ERICSSON AB, Stockholm (...

1. A method operating at an adaptive streaming packager node for facilitating scalable storage for media segments, the method comprising:segmenting a content program into a plurality of media segments;
configuring directory limit parametric information for the content program, the directory limit parametric information comprising one or more directory limit indicia that indicate a respective size corresponding to a maximum number of media segments that can be stored in each directory of a plurality of directories of a multi-directory file system associated with at least one media server;
constructing storage resource locators based on the directory limit parametric information for storing the media segments of the content program across the plurality of directories of the multi-directory file system associated with the at least one media server; and
storing the media segments at storage locations referenced by the storage resource locators, the storage locations distributed across one or more of the plurality of directories of the multi-directory file system associated with the at least one media server, wherein the storage resource locators are constructed using the one or more directory limit indicia.

US Pat. No. 10,798,143

SELECTION OF RESOLUTIONS FOR SEAMLESS RESOLUTION SWITCHING OF MULTIMEDIA CONTENT

DIVX, LLC, San Diego, CA...

1. A source encoder including a processor and a memory readable by the processor where the memory stores an encoding application that directs the processor to receive a primary video stream and to encode the primary video stream into a set of alternative video streams, where the encoding application is characterized by:select a primary resolution based on a given aspect ratio of the primary video stream;
determine a plurality of height and width combinations for the given aspect ratio from the primary resolution wherein each of the plurality of combinations is derived by:
selecting a first value for a first one of a height or width of a height and width combination,
applying the aspect ratio of the primary stream to the first value, and
rounding a result of the application of the aspect ratio to a nearest integer to determine a second value for a second one of the height and width of a height and width combination,
where the height and width of each combination is an integer number of pixels and is less than the corresponding width and height of the primary resolution and the width and height of the selected combinations have substantially the same aspect ratio as the primary aspect ratio;
determine whether the height and the width of each height and width combination of the plurality of height and width combinations are each whole number fractions of the height and the width of the primary resolution;
select a set of resolutions for the set of alternative video streams from the plurality of height and width combinations by:
determining a plurality of height and width combinations for each of a plurality of alternative aspect ratios, wherein a height and a width for each height and width combination of the plurality of height and width combinations for each of the plurality of alternative aspect ratios of a corresponding height and width combination are both determined to be whole number fractions of the alternative aspect ratio; and
selecting a set of common height and width combinations from the plurality of height and width combinations for the alternative aspect ratios, wherein:
each height and width combination of the set of common height and width combinations has a same particular width; and
the set of common height and width combinations are selected based on a number of alternative aspect ratios at which the plurality of height and width combinations for the alternative aspect ratio comprises a height and width combination with a given width; and
encode a set of alternative video streams from the primary video stream, where each of the alternative video streams is encoded at a different resolution from the set of resolutions and a different bitrate from other video streams in the set of alternative video streams.

US Pat. No. 10,798,142

METHOD, APPARATUS AND SYSTEM OF VIDEO AND AUDIO SHARING AMONG COMMUNICATION DEVICES

Intel Corporation, Santa...

1. A communication device, comprising:a processor;
a memory;
one or more non-transitory computer-readable media comprising a plurality of instructions stored thereon that, when executed by the processor, causes the communication device to:
encode a piece of audio into an audio bit stream;
extract 3D avatar data from a piece of video of a user of the communication device and generate an avatar data bit stream, wherein to extract the 3D avatar data comprises to extract one or more parameters indicative of an out-of-plane rotation or a z-axis translation of the user; and
generate synchronization information for synchronizing the audio bit stream with the avatar data bit stream,
wherein the synchronization information comprises a first time marker inserted in the audio bit stream, a second time marker inserted in the avatar data bit stream, and correlating information correlating the first time marker and the second time marker.

US Pat. No. 10,798,141

MULTIPLEXING DATA

Microsoft Technology Lice...

1. A method for preventing jitter in an audio stream, the method comprising:at a transmitting computing device, using one or more computer processors:
determining available end-to-end network bandwidth between the transmitting computing device and a recipient computing device, the recipient computing device being a recipient of the audio stream;
determining a maximum packet size for video packets of a video stream, the maximum packet size calculated based upon the available end-to-end network bandwidth and an audio sample rate of the audio stream, the maximum packet size determined so as to allow transmission by the transmitting computing device of at least one video packet between transmission of a first and second audio packet such that the second audio packet is received by the recipient computing device before the first audio packet can be completely played out at the audio sample rate;
creating a video packet from a video stream, the video packet being of a size that is less than or equal to the maximum packet size; and
causing the video packet to be transmitted to the recipient computing device between successive audio packets corresponding to the audio stream.

US Pat. No. 10,798,140

STREAM DATA RECORD READS USING PUSH-MODE PERSISTENT CONNECTIONS

Amazon Technologies, Inc....

1. A system, comprising:one or more computing devices of a data streams management service;
wherein the one or more computing devices include instructions that upon execution on a processor cause the one or more computing devices to:
determine that a first subscription request to provide a plurality of data records to a first stream processing application without polling the data streams management service has been submitted, wherein the first subscription request indicates at least (a) a first target partition of a data stream, (b) a position indicator within the first target partition;
cause a first set of one or more events to be detected at the first stream processing application, wherein an individual event of the one or more events corresponds to a transmission, via a first persistent network connection identified by a client-side component of the data streams management service for a first subscription established in response to the first subscription request, of contents of one or more data records of the first target partition starting from the position indicator;
in response to detecting that a first transfer throttling condition associated with the first subscription has been met,
identify a first time interval after which a transmission of an additional data record of the data stream partition is to be initiated; and
after the first time interval has elapsed, cause a second set of one or more events to be detected at the first stream processing application, wherein an individual event of the second set corresponds to a transmission, via the first persistent network connection, of contents of one or more data records of the data stream partition, including the additional data record; and
in response to detecting that a subscription expiration period of the first subscription has elapsed before contents of at least a particular data record of the first target partition have been transmitted, cause a subscription expiration event to be detected at the first stream processing application.

US Pat. No. 10,798,139

METHODS AND SYSTEMS FOR ACCESSING RELEVANT CONTENT

FACEBOOK, INC., Menlo Pa...

1. A method, comprising:at a server system having one or more processors and memory storing instructions for execution by the one or more processors:
sending links to a plurality of content categories for display on a user device associated with a user, wherein each content category corresponds to a respective subset of a plurality of content items, and wherein in response to a selection of a link to one of the content categories, the corresponding subset of the plurality of content items is sent for display on the user device;
selecting a group of content items from the plurality of content items according to determined relevance scores for the user based on one or more relevance criteria;
sending links to the content items in the group for display on the user device in a first order according to the relevance scores;
adjusting the relevance scores of one or more content items in the group according to user feedback; and
resending links to the content items in the group for display on the user device in a second order according to the adjusted relevance scores.

US Pat. No. 10,798,138

INSTANT CALLING METHOD, APPARATUS AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A real-time call method performed by a calling side, the calling side being a Voice over Internet Protocol (VoIP) terminal, the method comprising:initiating a multi-party voice call request to a signaling server, wherein terminals that are specified in the multi-party voice call request comprise a telephone terminal;
establishing a data channel according to a remote access address returned by the signaling server in response to the multi-party voice call request, the remote access address being returned to a gateway device corresponding to the specified terminals including the telephone terminal; and
performing a multi-party voice call based on establishment of data channels of the terminals according to the remote access address, wherein the telephone terminal establishes a data channel according to the remote access address.

US Pat. No. 10,798,137

COLLABORATIVELY CONTROLLING DISPLAY OF INFORMATION ACROSS MULTIPLE DISPLAYS

Polycom, Inc., San Jose,...

1. A method of collaboratively controlling display of content elements across multiple displays, utilizing a plurality of electronic devices and a plurality of display devices, the method comprising:accessing a plurality of electronic devices linked to a plurality of co-located display devices, wherein the plurality of electronic devices comprises a master electronic device and a plurality of second electronic devices, wherein the plurality of second electronic devices comprises a smart phone and a tablet computer, wherein the plurality of co-located display devices comprises a master display device and a plurality of second display devices, and wherein each of the plurality of second display devices comprises multiple display areas;
assigning a device identifier to each of the plurality of display devices such that said display devices are identifiable on a graphical user interface running on the master electronic device;
retrieving a unique ID for each of the multiple display areas such that each of the multiple display areas is identifiable on a graphical user interface displayed in a control window on the master display device;
displaying, in the control window on the master display device, a first set of content elements and a set of images corresponding to each of the multiple display areas, based on the unique ID for each of the multiple display areas;
selecting and transferring content elements from the first set of content elements to the plurality of second display devices, such that the selected and transferred content elements are displayed by, and advance in order across, the multiple display areas; and
selecting and transferring at least one content element from a second set of content elements on at least one of the plurality of second electronic devices to at least one of the second display devices such that one or more content elements displayed by at least one of the plurality of second display devices is replaced in the respective of the multiple display areas and one or more content elements displayed by at least one of the plurality of second display devices are advanced in order across the multiple display areas.

US Pat. No. 10,798,136

VOICE TRACK EDITOR

iHeartMedia Management Se...

1. An improved voice track editor including a plurality of display areas associated with a media station, the plurality of display areas configured to display information associated with an empty voice track slot included in both a master broadcast log and a station broadcast log, the master broadcast log further including adjacent media slots both prior to and subsequent to the empty voice track slot, the master broadcast log used by the media station as a basis for generating the station broadcast log, the station broadcast log including the empty voice track slot and the adjacent media slots both prior to and subsequent to the empty voice track slot, the improvement comprising:at least one display area displaying at least one object indicating whether:
a first media item specified by the adjacent media slot prior to the empty voice track slot in the master broadcast log matches a second media item specified by the adjacent media slot prior to the empty voice track slot in the station broadcast log;
a third media item specified by the adjacent media slot subsequent to the empty voice track slot in the master broadcast log is different than a fourth media item specified by the adjacent media slot subsequent to the empty voice track slot in the station broadcast log; and
a plurality of display areas associated with a plurality of media stations, the plurality of display areas including shaded display areas indicating, for each of the plurality of media stations, a recording status of a voice track associated with the empty voice track slot.

US Pat. No. 10,798,135

SWITCH CONTROLLER FOR SEPARATING MULTIPLE PORTIONS OF CALL

Tevnos LLC, San Francisc...

1. A computer-implemented method for providing access to an isolated portion of a call, the method comprising:separating a call into a first portion corresponding to a first endpoint and a second portion corresponding to a second endpoint based on audio generated at the first endpoint and the second endpoint-respectively;
providing the audio of both the first portion of the call and the second portion of the call to both the first endpoint and the second endpoint to establish the call;
verifying a request received from a third endpoint to access one of the first portion corresponding to the first endpoint and the second portion corresponding to the second endpoint;
isolating the first portion from the second portion, based on the request, to create an isolated requested portion of the call corresponding to one of the first portion and the second portion of the call; and
providing the third endpoint access to only the isolated requested portion of the call to inject audio into only the isolated requested portion of the call.

US Pat. No. 10,798,134

INTERNET PROTOCOL (IP) MULTIMEDIA SUBSYSTEM (IMS) BASED SESSION INITIATION PROTOCOL (SIP) CALL SETUP RETRY

Charter Communications Op...

1. A method to automatically retry Session Initiation Protocol (SIP) call setup in an Internet Protocol (IP) Multimedia Subsystem (IMS) based telecommunication network, comprising:sending, from an interrogating/serving-call session control function server of the IMS based telecommunication network, a SIP invite message generated by a call originating computing device to a telephony application server;
receiving, at the interrogating/serving-call session control function server, a first SIP error message from the telephony application server including a retry-after header indicating a retry-after value;
determining, by the interrogating/serving-call session control function server, whether alternative routes by which to send the SIP invite message are available in response to receiving the first SIP error message from the telephony application server including the retry-after header indicating the retry-after value;
storing, by the interrogating/serving-call session control function server, information associated with the SIP invite message in a memory in response to determining that the alternative routes by which to send the SIP invite message are not available or in response to receiving a second SIP error message;
determining, by the interrogating/serving-call session control function server, whether a SIP retry timer is greater than or equal to the retry-after value in response to storing the information associated with the SIP invite message in the memory;
generating, by the interrogating/serving-call session control function server, a new SIP invite message based at least in part on the information associated with the SIP invite message in the memory in response to determining the SIP retry timer is greater than or equal to the retry-after value;
sending, from the interrogating/serving-call session control function server, the new SIP invite message to the telephony application server; and
continuing call setup with the telephony application server in response to sending the new SIP invite message.

US Pat. No. 10,798,133

DATA PROCESSING SYSTEMS FOR DATA-TRANSFER RISK IDENTIFICATION, CROSS-BORDER VISUALIZATION GENERATION, AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A computer-implemented data processing method for generating a visualization of one or more data transfers between one or more data assets, the method comprising:identifying one or more data assets associated with a particular entity;
analyzing the one or more data assets to identify one or more data elements stored in the identified one or more data assets;
defining a plurality of physical locations and identifying, for each of the identified one or more data assets, a respective particular physical location of the plurality of physical locations;
analyzing the identified one or more data elements to determine one or more data transfers between the one or more data assets in different particular physical locations, wherein:
the one or more data assets comprise a first data asset and a second data asset; and
the one or more data transfers comprise a first data transfer between first data asset and the second data asset;
determining one or more attributes for each of the one or more data transfers;
generating a visual representation of a map comprising the plurality of physical locations;
generating an indicia for each of the one or more data assets that indicates the respective particular physical location of the plurality of physical locations for each of the one or more data assets;
generating a visual indication of the one or more data transfers between the one or more data assets based at least in part on the one or more attributes;
performing a data transfer assessment for the first data transfer based at least in part on applying the one or more attributes;
identifying one or more data transfer risks associated with the first data transfer, based at least in part on the one or more attributes;
calculating a risk score for the first data transfer based at least in part on the one or more data transfer risks associated with the first data transfer;
digitally storing the risk score for the first data transfer; and
modifying the visual representation such that the visual indication of the first data transfer reflects the risk score.

US Pat. No. 10,798,132

METHODS AND SYSTEMS FOR ENHANCING CYBER SECURITY IN NETWORKS

1. A computer-implemented method for enhancing security and preventing cyber-attacks on a network comprising:receiving, from a user equipment on the network, information including a source IP address and a destination IP address;
selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment;
creating, via a graphical user interface, a policy to prevent cyber-attacks such that traffic associated with the information of the user equipment is routed to the first VPN server;
provisioning the first VPN server to last a predetermined amount of time based on the created policy;
coordinating the created policy with a router on the network, with the traffic being sent to the first VPN server via the router; and
sending, after a predetermined condition is met, a request to the VPN service provider to transmit a second VPN server,
wherein the first VPN server terminates when the predetermined condition is met.

US Pat. No. 10,798,131

UNIVERSAL DATA PRIVACY CONTROL MANAGEMENT SYSTEM

1. A method of managing the authentication and distribution of digital content on a plurality of web sites, the method comprising:operating a content controller on a digital network gateway, the content controller responsive to signals from a plurality of authorization control modules;
wherein the digital network gateway is responsive to a combined authorization signal generated from the signals from the authorization control modules;
the digital network gateway gating personal information to a digital content distributor;
the digital content distributor digitally distributing the personal information to the plurality of web sites, wherein the content distributor is configured to inhibit the distribution based on a signal from the content controller;
receiving a navigation alert from a web browser with a privacy auditor that a website has been navigated to, triggering a website scan;
scanning the website for the personal information with the privacy auditor, and retrieving the personal information from the website and comparing the website against a pre-configured list of websites comprising the personal information;
comparing the personal information from the website against a stored personal information blockchain with a personal information validator;
generating a personal information alert on condition that a first incongruity arises from comparing the personal information from the website against the stored personal information blockchain;
retrieving website personal privacy settings from the website and utilizing a personal privacy validator to compare the website personal privacy settings against a stored personal privacy settings blockchain;
generating a privacy alert on condition that a second incongruity arises from comparing the web site personal privacy settings against the stored personal privacy settings blockchain;
comparing the website personal privacy settings against a personal privacy regulations blockchain with a jurisdictional validator and generating a jurisdictional alert on condition that a third incongruity exists; and
receiving at a privacy remediator the privacy alert, the personal information alert, and the jurisdictional alert, from the jurisdictional validator and the privacy auditor, and generating an ameliorative action for the personal information on the web site based on one or more of the alerts.

US Pat. No. 10,798,130

CONTROL OVER DATA RESOURCE UTILIZATION THROUGH A SECURITY NODE CONTROL POLICY EVALUATED IN THE CONTEXT OF AN AUTHORIZATION REQUEST

Vescel, LLC, Las Vegas, ...

1. A computer-implemented method for controlling a data resource of a datastore, using a computer processor and a physical memory, comprising:traversing a referent attribute of a first node of a non-hierarchical data structure referencing a security node,
wherein the security node comprises a protected resource of the security node that is at least one of a protected primitive and a protected referent referring to a second node of the non-hierarchical data structure;
receiving an authorization request from a device for utilization of the protected resource of the security node, the authorization request comprising a state dataset comprising one or more state attributes each having a state value associated with a state of the device at generation of the authorization request,
referencing a control policy that defines an authorized context in which the device is authorized to utilize the protected resource of the security node, the control policy comprising a control algorithm comprising one or more conditionals each comparing a control value range to a context value that is at least one of the state value of the one or more state attributes and an external value associated with a source other than the authorization request of the device;
wherein the control value range of each of the one or more conditionals specifies any one of a location of a computing device, a number of uses of the protected resource, a type of use of the protected resource, and a duration of use of the data of the protected primitive, and
wherein the context value of each of the one or more conditionals specifies any one of the location of the computing device, the number of uses of the protected resource, the type of use of the protected resource, and the duration of use of the data of the protected primitive;
extracting the control algorithm of the control policy from the security node;
retrieving each context value specified in the control algorithm from a context dataset that is at least one of the state dataset comprising each instance of the state value and the external dataset comprising each instance of the external value;
determining that the context dataset conforms with the authorized context by evaluating each of one or more conditionals of the control algorithm; and
authorizing utilization of the protected resource of the security node by the device when it is determined that the context dataset conforms to the authorized context defined by the control policy.

US Pat. No. 10,798,129

CONSTRAINT-BASED MULTIUSE CERTIFICATES

EBAY INC., San Jose, CA ...

1. A method performed via hardware processing circuitry, the method comprising:storing policies for network certificates, each policy specifying one or more computing resource consumption constraints and each network certificate associated with one or more domains;
identifying a network certificate covering operations of a network application based in part on the one or more domains associated with the identified network certificate;
identifying, from the identified network certificate, a stored policy enforced on applications covered by the identified network certificate, the stored policy including a constraint on computing resource consumption for network applications accessing a subdomain covered by the identified network certificate;
monitoring consumption of computing resources by the network application covered by the identified network certificate;
determining that the monitored consumption of computing resources by the network application satisfies the computing resource consumption constraint associated with the stored policy; and
authenticating the network application based at least in part on the computing resource consumption constraint being satisfied by the network application.

US Pat. No. 10,798,128

DISTRIBUTED AUTHENTICATION FOR SERVICE GATING

BlackBerry Limited, Wate...

1. A system that enforces a security policy in a message-based operating system, the system comprising:a processor; and
a memory having instructions executable by the processor to:
control access to an operating system authenticator, in response to an invocation of a microkernel call by a client that initiates a process manager function, in accordance with an access right retained in a microkernel;
receive a data object from the client containing encrypted authenticating information;
decrypt, by the operating system authenticator, the encrypted authenticating information;
verify, by the operating system authenticator, the client identity based on the authenticating information, including comparing the authenticating information against channel policy and comparing a timestamp of the authenticating information against a current time;
issue a token by the operating system authenticator, the token establishing the client's access to the services provided by the server; and
grant access to a server serving the client in the message-based operating system including a right to generate a persistent message channel between the client and the server, wherein the persistent message channel does not require exchange of the authenticating information or token with each message.

US Pat. No. 10,798,127

ENHANCED DOCUMENT AND EVENT MIRRORING FOR ACCESSING INTERNET CONTENT

Digital Guardian LLC, Wa...

1. A method, comprising:establishing, by a first browser executing on a device intermediary to a client and a server, a first model of content received from the server on the first browser;
transmitting, by the first browser, a message of the first model to a second browser executing on the client for establishing or updating a second model of the content on the second browser at the client for creating a mirrored copy of the first model on the device as the second model on the client;
applying, by the first browser, based on an event identifier received from the second browser, a security policy to a modification of the first model of the content, the event identifier corresponding to a user interaction with the content on the second browser at the client; and
determining, by the first browser according to the security policy applied to the modification of the first model based on the event identifier corresponding to the user interaction, whether to allow the second model on the second browser at the client to be modified.

US Pat. No. 10,798,126

ALTERNATE DISPLAY GENERATION BASED ON USER IDENTIFICATION

BANK OF AMERICA CORPORATI...

1. A system for providing alternative interfaces to unauthorized users, the system comprising:one or more memories having computer readable code stored thereon; and
one or more processors operatively coupled to the one or more memories, wherein the one or more processors are configured to execute the computer readable code to:
receive a request from a user to access a user interface;
receive an authentication credential from the user, wherein the authentication credential is received from one or more user computer systems;
determine when the user is an unauthorized user based on the authentication credential;
identify an alternative interface, wherein the alternative interface mimics the user interface;
provide the alternative interface to the unauthorized user for display on the one or more user computer systems;
monitor use of the alternative interface by the unauthorized user; and
capture unauthorized user information from the use of the alternative interface by the unauthorized user.

US Pat. No. 10,798,125

SYSTEM AND METHOD FOR NETWORK ENTITY ASSISTED HONEYPOT ACCESS POINT DETECTION

RELIANCE JIO INFOCOMM LIM...

1. A method for authenticating an access point, the method being performed by a network entity, the method comprising:receiving an authentication request for authenticating an access point (AP), from a user equipment, wherein
the user equipment is in a connected state with said access point,
the access point is, one of an authorized AP and a honeypot AP, connected with the user equipment,
the authentication request comprises a UE identifier, an AP identifier, and at least one parameter, and
the UE identifier corresponds to the user equipment and the AP identifier corresponds to one of the authorized AP and the honeypot AP;
comparing the AP identifier with a pre-configured list of AP identifiers to generate one of a positive response and a negative response;
transmitting one of a denial response and a verification request, wherein
the denial response, to release/suspend the connection with the honeypot AP, is transmitted to the user equipment in an event the negative response is generated, and
the verification request is transmitted to the authorized AP in an event the positive response is generated;
receiving one of a positive verification response and a negative verification response from the authorized AP;
transmitting one of a positive authentication response and a negative authentication response to the user equipment, wherein
the positive authentication response is transmitted, to maintain the connection with the authorized AP, in response to the positive verification response received from the authorized AP, and
the negative authentication response is transmitted, to release/suspend the connection with the honeypot AP, in response to the negative verification response received from the authorized AP.

US Pat. No. 10,798,124

SYSTEM AND METHOD FOR DETECTING SLOWLORIS-TYPE ATTACKS USING SERVER APPLICATION STATISTICS

Arbor Networks, Inc., We...

1. A computer-implemented method to detect a slowloris-type network attack, the method comprising:receiving data gathered by a server of a network over time, the data received including data about time spent reading by the server in response to requests from a plurality of clients received by the server;
tracking the data about the time spent reading by the server over time;
determining one or more characteristics about distribution of the data tracked;
tracking the one or more characteristics to determine whether there is an increase in the time spent reading, by the server, a larger portion of requests tracked;
identifying a change in the characteristics that indicates the presence of a slowloris-type network attack; and
performing an action, in response to the change, to at least one of generate an alert about the slowloris-type network attack, request mitigation of the slowloris-type network attack, and mitigate the slowloris-type network attack.

US Pat. No. 10,798,123

MALWARE DETECTION AND PREVENTION SYSTEM

Level 3 Communications, L...

1. A method for managing access to a public network, the method comprising:utilizing a control system to control a computing device to access a first node in the public network;
applying a personality profile to the computing device to access a second node in the public network, the personality profile comprising a plurality of inputs provided to the computing device to control a browser program displayed on a display of the computing device;
analyzing transmission of information between the computing device and the public network during accessing of the second node of the public network;
detecting an indication of a malware program stored in the public network accessible through the second node;
storing information of the malware program in a database based on the analyzed transmission of information between the computing device and the public network during accessing of the second node of the public network; and
creating malware prevention rules based on the information of the malware program.

US Pat. No. 10,798,122

PREVENTING EXECUTION OF PROGRAMS THAT ARE EMBEDDED IN EMAIL MESSAGES

Uber Technologies, Inc., ...

1. A system, comprising:a memory that stores instructions; and
a processor that executes the instructions to perform operations, the operations comprising:
receiving a first email message;
generating a second email message based on the first email message, wherein generating the second email message includes:
identifying a start tag within the first email message, the start tag indicating a beginning of an embedded function within the first email message;
identifying an end tag within the first email message, the end tag corresponding to the start tag and indicating an end of the embedded function;
comparing the start tag to a predefined list of tags to exclude; and
excluding the start tag, the embedded function, and the end tag in the second email message responsive to the start tag being included in the predefined list of tags to exclude;
providing access to both the first and second email messages to a recipient of the first email message; and
providing the second email message for display at a computing device of the recipient of the first email message.

US Pat. No. 10,798,121

INTELLIGENT CONTEXT AWARE USER INTERACTION FOR MALWARE DETECTION

FireEye, Inc., Milpitas,...

1. A non-transitory computer readable storage medium having stored thereon logic that, upon execution by one or more processors implemented within a network device, performs operations comprising:launching, by an actuation logic, an object within a virtual run-time environment;
selecting, by a control logic, an action profile based on metadata associated with the object, the metadata includes data identifying an object type corresponding to the object launched by the actuation logic and the action profile includes a collection of instructions or commands that performs one or more simulated user interactions in accordance with a set of rules prescribed for the action profile,
wherein the one or more simulated user interactions include (i) a first simulated interaction, conducted by an active simulated logic that operates in accordance with the selected action profile, to perform a simulated action in response to an event initiated by the object and (ii) a second simulated interaction, conducted by a passive simulated logic that operates in accordance with the selected profile, to perform a simulated action normally performed by a user during activation of the object and not responsive to a particular behavior by the object.

US Pat. No. 10,798,120

DYNAMIC DETECTION OF FIREWALL MISCONFIGURATIONS

AMAZON TECHNOLOGIES, INC....

1. A computer-implemented method, comprising:receiving a request to verify a configuration of a firewall port associated with a customer allocation of resources in a resource provider environment, the customer allocation including at least one virtual host machine and a corresponding host port;
obtaining, via at least one application programming interface (API) for the customer allocation, firewall state information for the firewall port, the firewall state information indicating either a permitted state or a denied state for the firewall port;
determining the firewall port is in the permitted state;
sending, through the firewall port, a test packet to the host port;
determining that an acknowledgement was not received for the test packet, thereby indicating that the host port is in a closed state; and
providing a notification regarding a mismatch between the permitted state of the firewall port and the closed state of the host port, the mismatch being indicative of a potential misconfiguration.

US Pat. No. 10,798,119

COMMAND INTERCEPTION

CMD WATCH SECURITY INC., ...

6. A method for intercepting commands issued to a host, the method comprising:receiving a command at the host;
invoking an overriding function which overrides an expected function callable on the host, the overriding function comprising instructions to transmit an indication of the command to a collector;
transmitting an indication of the command to the collector;
withholding execution of the command that invokes the expected function according to a local rule or a collector rule, the local rule comprising a local command signature, the collector rule comprising a collector command signature;
configuring the collector command signature for the collector rule; and
configuring the local command signature for the local rule and pushing the local command signature to the host.

US Pat. No. 10,798,118

SYSTEM AND METHOD FOR ANOMALY DETECTION IN DYNAMICALLY EVOLVING DATA USING HYBRID DECOMPOSITION

ThetaRay Ltd., Hod HaSha...

1. In a computer system, a method comprising:a) receiving data comprising a plurality of measurements m of multidimensional data points (MDDPs), each data point having n features wherein n?3, wherein m>>n and wherein the data forms a matrix A with size m×n and rank k;
b) applying randomized lower and upper triangular matrix (LU) decomposition to matrix A to obtain a dictionary D in the form of a matrix l×n, wherein k c) applying a kernel method to dictionary D to obtain an embedded dictionary D with a dimension lower than n by normalizing dictionary D to obtain a normalized Markov matrix with a respective dimension and reducing the respective dimension of the normalized Markov matrix to obtain embedded dictionary D; and
d) based on embedded dictionary D, classifying a MDDP or a newly arrived MDDP (NAMDDP) as an anomaly using a Gaussian mixture fit,
whereby the reduction in the number of measurements from m to l and further reducing the dimension n to a dimension lower than n reduces computer processing requirements, thereby enhancing anomaly detection performance.

US Pat. No. 10,798,117

SECURITY PROCESSING METHOD AND SERVER

PANASONIC INTELLECTUAL PR...

1. A security processing method, executed by a computer, for counteracting an anomalous frame transmitted on an on-board network of a single vehicle, the on-board network of the single vehicle joining multiple electronic control units installed inside the single vehicle that perform a communication of a frame inside the single vehicle, the security processing method comprising:acquiring, by the computer, information about multiple frames received on one or multiple on-board networks of one or multiple vehicles; and
assessing, by the computer, an anomaly level of the frame received on the on-board network of the single vehicle after the reception of the multiple frames, based on the acquired information about the multiple frames, wherein the anomaly level of the received frame is a degree to which said received frame is considered to be anomalous.

US Pat. No. 10,798,116

EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS

Palantir Technologies Inc...

1. A computer system configured to provide a dynamic user interface relating to visualization of alerts of malicious network activity, the computer system comprising:an electronic data structure configured to store a plurality of clusters of data items, wherein each cluster of data items represents a group of related malicious network activities; and
one or more hardware computer processors configured to execute code in order to cause the computer system to:
access the electronic data structure including the plurality of clusters of data items;
analyze the plurality of clusters of data items to determine, for each cluster of the plurality of clusters:
a type of malicious network activity represented by the cluster, and
a criticality of the malicious network activity represented by the cluster;
further analyze the plurality of clusters of data items to determine respective numbers of clusters of the plurality of clusters having each of a plurality of types of malicious network activity;
provide a dynamic user interface configured to display at least:
a first visualization indicating, for each type of malicious network activity of the plurality of types of malicious network activity, respective portions of the plurality of clusters having the type of malicious network activity; and
a second visualization indicating, for each cluster of the plurality of clusters, an alert corresponding to the cluster, wherein the alert visually indicates that criticality of the malicious network activity represented by the cluster; and
automatically order the alerts indicated in the second visualization based on the respective determined criticalities of malicious network activity represented by the clusters corresponding to the alerts.

US Pat. No. 10,798,115

APPARATUS AND METHOD FOR DETECTING MALICIOUS DEVICE BASED ON SWARM INTELLIGENCE

ELECTRONICS AND TELECOMMU...

1. A method for detecting a malicious device based on swarm intelligence, the method being performed using an apparatus for detecting a malicious device based on swarm intelligence, the method comprising:detecting a malicious device by causing at least one exploration ant to access a device swarm along movement routes in which pheromone trail values are taken into consideration, wherein the at least one exploration ant is generated in response to a detection request received from a security management server;
when the at least one exploration ant detects a suspicious device that is suspected to be a malicious device, causing the exploration ant to return along the movement routes in reverse order, and returning pheromone trail values generated by devices on the return movement routes to the malicious device detection apparatus; and
identifying whether the suspicious device is the malicious device by calculating an optimal solution based on a local information set that is generated by aggregating the pheromone trail values returned for respective movement routes,
wherein detecting the malicious device is configured to generate pheromone trail values for the movement routes using the pheromone update weights determined depending on the types of the exploration ants.

US Pat. No. 10,798,114

SYSTEM AND METHOD FOR CONSISTENCY BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK

Argus Cyber Security Ltd....

1. A system including a non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform security operations, the operations comprising:monitoring traffic on a first network portion of an in-vehicle communication network;
monitoring traffic on a second, different network portion of the in-vehicle communication network;
receiving a first message from the first network portion;
if a specific, second message was not received, from the second network portion, during a time interval that precedes a reception time of the first message or
if a specific, second message is not received, from the second network portion, during a time interval that follows the reception time of the first message, then determining that the first message is anomalous; and
if it is determined that the first message is anomalous, then performing at least one action.

US Pat. No. 10,798,113

INTERACTIVE GEOGRAPHIC REPRESENTATION OF NETWORK SECURITY THREATS

SPLUNK INC., San Francis...

1. A computerized method comprising:receiving event data associated with an organization's network, wherein the event data is comprised of machine data;
identifying one or more anomalies automatically determined from the event data;
identifying one or more threats to the organization's network, wherein threats are identified from and associated with one or more of the identified anomalies, and each threat is classified as being of a type from a set of types and is associated with a device participating in the threat, and wherein the device is associated with a geographical location;
causing display, in a graphical user interface, of identified threats on a geographical map, wherein each threat is depicted at a geographical location on the map corresponding to the location of the associated device; and
in response to receiving at least one user input associated with a depicted threat on the map via the graphical user interface, causing display of an identification of the classification of the type of the depicted threat and an identification of each anomaly associated with the depicted threat.

US Pat. No. 10,798,112

ATTRIBUTE-CONTROLLED MALWARE DETECTION

FireEye, Inc., Milpitas,...

1. A computerized method for authenticating access to a subscription-based service that detects a potential cyber-attack, the method comprising:receiving, by a cloud broker, service policy level information that includes at least an identifier of a sensor, the sensor being configured to (i) obtain one or more objects, (ii) perform a preliminary analysis on the one or more objects, and (iii) determine whether further analyses of the one or more objects is to be conducted in response to the sensor, during the preliminary analysis, determining that the one or more objects correspond to one or more suspicious objects associated with a potential cyber-attack;
receiving, by the cloud broker, information based on operational metadata, the operational metadata includes metadata that pertains to an operating state of one or more clusters of a plurality of clusters of the subscription-based service; and
using, by a cloud broker, both the service policy level information and the information based on the operational metadata in (i) selecting a cluster from the plurality of clusters to analyze the one or more objects submitted by the sensor and (ii) establishing a communication session between the sensor and the cluster via the cloud broker to transmit the one or more objects from the sensor to the cluster.

US Pat. No. 10,798,111

DETECTING INTRUSION ATTEMPTS IN DATA TRANSMISSION SESSIONS

International Business Ma...

1. A computer-implemented method comprising:identifying a data transmission session, said data transmission session associated with a display-oriented data transmission scheme, wherein said display-oriented data transmission scheme is block-oriented, transmitting said display-oriented data in blocks of data;
identifying one or more outbound data streams associated with said display oriented data transmission scheme of said data transmission session;
determining one or more transmission session characteristics associated with each of said one or more outbound data streams, wherein the one or more transmission session characteristics include geometric properties mapping presentation of said outbound data stream to a display screen;
determining one or more protected fields within said one or more outbound data streams, based on said one or more geometric properties associated with each of said one or more outbound data streams;
identifying an inbound data stream directed to said display-oriented data transmission scheme of said data transmission session;
simultaneously monitoring attempts to write to the one or more protected fields with determining new protected fields by monitoring outbound data streams;
determining whether said inbound data stream attempts to write to at least one of said one or more protected fields; and
in response to determining that said inbound data stream attempts to write to at least one of said one or more protected fields, determining an intrusion detection report, which includes identification of a source of said inbound data stream, wherein said intrusion detection report comprises:
one or more intrusion notifications;
one or more intruding client identifications;
one or more intruding inbound data stream identifications; and
one or more outbound data stream identifications.

US Pat. No. 10,798,110

METHOD AND SYSTEM FOR IDENTIFYING NETWORK LOOPS

Alibaba Group Holding Lim...

1. A method, comprising:determining that a first data packet has a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address, comprising:
comparing the TTL of the first data packet with a first preset threshold value; and
in response to a comparison result that the TTL of the first data packet does not exceed the first preset threshold value, determining that the first data packet has a TTL that at least meets the first condition;
within a time period after the determining of the first data packet having a TTL that at least meets the first condition, identifying a plurality of second data packets that are to be transmitted to the same destination IP address as the first data packet; and
determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets, comprising:
determining whether a TTL of a second data packet at least meets a second condition, comprising:
comparing the TTL of the second data packet with a second preset threshold value, wherein the second preset threshold value is lower than the first preset threshold value; and
in response to a comparison result that the TTL of the second data packet does not exceed the second preset threshold value, determining that the TTL of the second data packet at least meets the second condition; and
in response to a determination that the TTL of the second data packet at least meets the second condition, determining that the network loop exists for the destination IP address, comprising:
determining whether a first sequence number of the second data packet matches a second sequence number of another second data packet; and
in response to determination that the first sequence number matches the second sequence number, omitting a determination that the network loop exists; and
in response to a determination that the network loop exists for the destination IP address:
recording the destination IP address in a loop diversion blacklist; and
stopping diversion of data packets in the network traffic that are to be transmitted to the destination IP address.

US Pat. No. 10,798,109

ADAPTIVE TRUST PROFILE REFERENCE ARCHITECTURE

Forcepoint LLC, Austin, ...

1. A computer-implementable method for generating and managing an adaptive trust profile, comprising:monitoring a plurality of electronically-observable actions of an entity, the plurality of electronically-observable actions of the entity corresponding to a respective plurality of events enacted by the entity, the entity comprising a user entity;
converting the plurality of electronically-observable actions of the entity to electronic information representing the plurality of actions of the entity;
generating the adaptive trust profile based upon the plurality of actions of the entity, the adaptive trust profile being generated by an adaptive trust profile system, the adaptive trust profile comprising a collection of information describing an identity of the entity and an associated behavior of the entity, the adaptive trust profile system executing on a hardware processor of an information handling system;
determining, via the adaptive trust profile system, whether an event of the plurality of events enacted by the entity is of analytic utility, the event being of analytic utility indicating an entity behavior associated with the event represents a security risk;
generating, via the adaptive trust profile system, contextual information about the event based upon an entity profile, the contextual information comprising information relating to a particular entity behavior;
deriving, via the adaptive trust profile system, a meaning from the contextual information associated with the event, the meaning including an inference of an intent of the entity associated with the event; and,
updating, via the adaptive trust profile system, the adaptive trust profile of the entity based upon the contextual information about the event and the intent of the entity associated with the event.

US Pat. No. 10,798,108

APPARATUS AND METHOD FOR A MULTI-ENTITY SECURE SOFTWARE TRANSFER

Marvell Asia Pte, Ltd., ...

1. A method for a multi-entity secure software transfer, comprising:configuring a first communication interface controller at a first hardware entity and a second communication interface controller at a second hardware entity to disallow all external access to the respective first hardware entity and the second hardware entity except a communication link configuration access;
establishing a communication link between the first hardware entity and the second hardware entity subsequent to the configuring;
receiving the secure software at the first hardware entity from the second hardware entity via the communication link;
writing the secure software to a temporary storage at the first hardware entity;
copying the secure software from the temporary storage to a secure storage at the first hardware entity;
retrieving from a non-volatile storage at the first hardware entity a public key; and
authenticating the secure software in the secure storage using the public key.

US Pat. No. 10,798,107

APPLICATION PLATFORM WITH FLEXIBLE PERMISSIONING

PayPal, Inc., San Jose, ...

1. A system, comprising:a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising:
receiving an application programming interface (API) call from an application server, wherein the API call is associated with a transaction request being processed through the application server for an end-user;
accessing a plurality of transactions processed through the application server based on one or more API calls to the system;
determining, from a plurality of access levels, an access level for the API call based on the plurality of transactions; and
processing the API call for the application server according to the determined access level.

US Pat. No. 10,798,106

SYSTEM FOR PROVIDING LAYERED SECURITY

1. A first system, comprising:a memory that stores instructions;
a processor that executes the instructions to perform operations, the operations comprising:
enabling a device ecosystem to access a first portion of a second system based on a confidence score of the device ecosystem satisfying a first threshold for a specific level of access for accessing the first portion of the second system;
determining if the confidence score satisfies a second threshold for accessing a second portion of the second system, wherein the second threshold is different from the first threshold;
preventing the device ecosystem from accessing the second portion of the second system if the confidence score does not satisfy the second threshold;
providing the device ecosystem with access to the second portion of the second system if the confidence score does satisfy the second threshold;
adjusting a validation requirement for accessing the second portion of the second system in response to a different device ecosystem attempting to access the second system, wherein the validation requirement is adjusted based on types of devices in the different device ecosystem;
determining, if the confidence score does not meet the first threshold, if a third device is in proximity with a first device and a second device of the device ecosystem; and
adjusting the confidence score if the third device is in proximity with the first device and the second device.