US Pat. No. 10,142,580

CAPTURING DEVICE, CAPTURING SYSTEM AND CAPTURING METHOD

SONY CORPORATION, Tokyo ...

1. A vehicle camera system comprising;an image sensor configured to be mounted on a vehicle, the image sensor, when power to the vehicle camera system is changed over from a powered off state to a powered on state, capturing first image data having a field of view that includes an external field of view,
a processor operable when the vehicle camera system is in its powered on state and configured to:
generate second image data from the first image data, a field of view of the second image data being smaller than the field of view of the first image data,
output to a display unit at least one of the first image data and the second image data,
wherein the first image data is output when the vehicle camera system is changed over to the powered on state, and
wherein the second image data is output when a user performs an input select operation while the first image data is displayed on the display unit.

US Pat. No. 10,142,577

COMBINATION REMOTE CONTROL AND TELEPHONE

1. An improved television remote control and an improved base station of the type in which an infrared handheld television remote control apparatus, for use with a television, has a plurality of push buttons having a channel key, a volume key, a menu key, and numbers zero through nine keys, wherein the improvement comprises: said infrared handheld television remote control apparatus and said base station each comprising: a built-in firmware based dedicated microprocessor communicating with a land line cordless telephone provider providing telephone communications to third parties, an infrared remote control transceiver; an infrared radiator and an infrared sensor, each connected to said infrared remote control transceiver; a wireless cordless telephone transceiver; a wireless land line telephone antenna connected to said wireless cordless telephone transceiver; a Wi-Fi and Bluetooth transceiver; a Wi-Fi and Bluetooth antenna connected to said Wi-Fi and Bluetooth transceiver; a combination television remote control and telephone keypad communicating with said built-in firmware based dedicated microprocessor; a touch screen display communicating with said built-in firmware based dedicated microprocessor; a microphone communicating with said built-in firmware based dedicated microprocessor; a loud speaker, said built-in firmware based dedicated microprocessor communicating with said loud speaker; a power source powering said built-in firmware based dedicated microprocessor, said infrared remote control receiver, said wireless cordless telephone transceiver, and said Wi-Fi and Bluetooth transceiver; a housing, said built-in firmware based dedicated microprocessor, said infrared remote control transceiver, said wireless telephone transceiver, said Wi-Fi and Bluetooth transceiver, and said power source within said housing; said combination television remote control and telephone keypad and said touch screen display mounted to said housing and accessible from the exterior of said housing; said touch screen display and said combination television remote control and telephone keypad, which comprises television remote control keypad keys and telephone alphanumeric keypad keys, communicating with said built-in firmware based dedicated microprocessor to direct said handheld combination television remote control and wireless telephone apparatus to communicate with a remote television, a remote set top box, a wireless telephone system provider, a wireless network, a Bluetooth device, and a base station combination television remote control and wireless telephone apparatus and a switch; said handheld combination television remote control and wireless telephone apparatus switching from a television mode to a telephone mode and vice versa to control said remote television and/or said remote set top box; and retrieve information therefrom, and to originate and/or receive telephone calls; transmit and/or receive Internet information via said wireless cordless network of said land line telephone provider while communicating with the Internet through said land line telephone system provider; wherein further said remote control apparatus and said base station each use said dedicated firmware microprocessor to control the base station combination television remote control and wireless land line telephone apparatus communicating with the land line telephone system provider wherein further said remote control apparatus and said base station further comprise an infrared handheld television remote control apparatus mount and charger, said base station firmware based dedicated microprocessor communicating with said land line telephone transceiver and with said infrared handheld television remote control apparatus and a second infrared transceiver and a second RF cordless transceiver, said infrared handheld television remote control apparatus and said base station communicating with a handheld audio output device locator and locating said infrared handheld television remote control apparatus; a microphone and a loudspeaker built into the infrared handheld television remote control apparatus, which communicate audio signals to and from the infrared handheld television remote control apparatus, said wireless transceiver built into the infrared handheld television remote control apparatus, which communicates with the land line telephone system provider via the base station combination television remote control and wireless land line telephone apparatus and vice versa, said base station combination television remote control and wireless land line telephone apparatus each communicating with each other through the land line telephone system provider; said infrared handheld television remote control apparatus and said base station communicating with said television and controlling said television; said base station and said infrared handheld television remote control apparatus communicating with said third party via the cordless land line telephone system and a television projector built into the infrared handheld television remote control apparatus; said remote control apparatus firmware based dedicated microprocessor built into the infrared handheld television remote control apparatus, processes wireless signals received from the television into television display signals compatible with the television projector built into the infrared handheld television remote control apparatus, which projects live television.

US Pat. No. 10,142,575

IN-PIXEL DIFFERENTIAL TRANSCONDUCTANCE AMPLIFIER FOR ADC AND IMAGE SENSOR ARCHITECTURE

CMOSIS BVBA, Antwerp (BE...

1. An image sensor comprising:a first die with a pixel array comprising a plurality of pixels, each pixel of the pixel array having a pixel structure comprising:
a photosensitive device for sensing incident light and for outputting an analog signal,
a first node for receiving the analog signal,
a charge transfer transistor coupled to the photosensitive device;
an in-pixel sampling stage with a first sampling switch coupled to the charge transfer transistor and to a first electrode of a sampling capacitor of the in-pixel sampling stage and a second sampling switch coupled to the first electrode of the sampling capacitor and to the first node; and
a first in-pixel part of an analog-to-digital converter (ADC) for outputting at least one current signal, the first in-pixel part of the ADC being a differential transconductance amplifier with a first differential input connected to the first node for receiving the analog signal present on the first node, and a second differential input for receiving a reference signal;
a second die with a second part of the ADC, wherein the first die and the second die are stacked together; and
at least one output bus connected between the first in-pixel part of the ADC on the first die and the second part of the ADC on the second die,
wherein the first in-pixel part of the ADC is adapted to output the at least one current signal to the at least one output bus, and
the second part of the ADC is adapted to receive the at least one current signal and to generate a digital signal, the digital signal being an analog-to-digital conversion of the analog signal.

US Pat. No. 10,142,574

IMAGING DEVICE, IMAGING SYSTEM, AND MOVING OBJECT

Canon Kabushiki Kaisha, ...

1. An imaging device comprising:a plurality of pixels arranged in a plurality of rows and a plurality of columns, each pixel including a photoelectric conversion portion, a first charge holding portion, and a second charge holding portion,
wherein, during a first period, electric charges generated at the photoelectric conversion portion are held, the first charge holding portion holds electric charges generated at the photoelectric conversion portion in a second period that does not succeed the first period and having a duration different from the first period,
wherein the second charge holding portion holds electric charges generated at the photoelectric conversion portion in a third period that does not overlap with the first period and the second period, and
wherein a first charge holding period during which the electric charges generated at the photoelectric conversion portion in the first period and the electric charges generated at the photoelectric conversion portion in the second period are held by the first charge holding portion and a second charge holding period during which the electric charges generated at the photoelectric conversion portion in the third period are held by the second charge holding portion overlap each other.

US Pat. No. 10,142,573

PHOTOELECTRIC CONVERSION APPARATUS AND PHOTOELECTRIC CONVERSION SYSTEM

CANON KABUSHIKI KAISHA, ...

1. A photoelectric conversion apparatus comprising:a photoelectric conversion element;
a differential pair including a first transistor configured to receive a signal based on an electric charge generated in the photoelectric conversion element and a second transistor configured to receive a reference signal; and
a current mirror circuit including a third transistor electrically connected to the second transistor and a fourth transistor having a gate connected to a gate of the third transistor and electrically connected to an output node,
wherein the output node is a different node from a drain of the first transistor.

US Pat. No. 10,142,569

IMAGING DEVICE, IMAGING METHOD, AND IMAGE PROCESSING PROGRAM

FUJIFILM Corporation, To...

1. An imaging device comprising:a multiple-property lens that includes a first area having a first property and a second area having a second property different from the first property;
an image sensor that has a first light receiving element having a first microlens and a second light receiving element having a second microlens having a different focusing degree from the first microlens, the first light receiving element on which a luminous flux passing the first area of the multiple-property lens and a luminous flux passing the second area of the multiple-property lens are incident in crosstalk with each other through the first microlens and the second light receiving element having a different crosstalk ratio due to having a different focusing degree from the first light receiving element and on which the luminous flux passing the first area of the multiple-property lens and the luminous flux passing the second area of the multiple-property lens are incident in crosstalk with each other through the second microlens being two-dimensionally arranged; and
a crosstalk removal processing unit that removes a crosstalk component from each of a first crosstalk image acquired from the first light receiving element of the image sensor and a second crosstalk image acquired from the second light receiving element to generate a first image and a second image respectively having the first property and the second property of the multiple-property lens.

US Pat. No. 10,142,567

METHODS AND APPARATUS FOR TRUE HIGH DYNAMIC RANGE (THDR) TIME-DELAY-AND-INTEGRATE (TDI) IMAGING

Massachusetts Institute o...

1. An image sensing system comprising:a digital focal plane array (DFPA) to generate a time-delay-and-integrate (TDI) image over a plurality of integration periods, the DFPA comprising a counter array to store counts representing photons detected over the plurality of integration periods; and
a processor, operably coupled to the DFPA, to non-destructively read at least one intermediate count from the counter array during at least one intermediate integration period in the plurality of integration periods and to adjust the TDI image based at least in part on the at least one intermediate count.

US Pat. No. 10,142,566

ROLLING READOUT TYPE CAMERA AND IMAGING METHOD FOR USING THE SAME

HAMAMATSU PHOTONICS K.K.,...

1. An imaging method for using a rolling readout type camera including a light receiving section in which a plurality of pixel rows are arranged, comprising:setting a first parameter for setting a time interval of start timing of signal readout period of each of adjacent pixel rows;
setting a first count of a driving clock defining a time interval of start timing of signal readout period of each of adjacent pixel rows based on the set first parameter; and
controlling signal readout of each of pixel rows based on the set first count.

US Pat. No. 10,142,563

ELECTRONIC APPARATUS, METHOD FOR CONTROLLING ELECTRONIC APPARATUS, AND CONTROL PROGRAM

NIKON CORPORATION, Tokyo...

1. An electronic apparatus comprising:an imaging sensor including:
a plurality of first pixels each including a first photoelectric converter that converts light into charge and a first circuit that is connected to the first photoelectric converter;
a plurality of second pixels each including a second photoelectric converter that converts light into charge and a second circuit that is connected to the second photoelectric converter;
a first region that includes the first photoelectric converters arrayed in a first direction and a second direction crossing the first direction;
a second region that is different from the first region and includes the second photoelectric converters arrayed in the first direction and the second direction;
a first control line that receives a first control signal for controlling the first circuits respectively corresponding to each of the arrayed first photoelectric converters; and
a second control line that is different from the first control line and receives a second control signal for controlling the second circuits respectively corresponding to each of the arrayed second photoelectric converters; and
a generator that generates first image data based on first signals output from the first pixels and generates second image data based on second signals output from the second pixels.

US Pat. No. 10,142,560

CAPTURING AND PROCESSING OF IMAGES INCLUDING OCCLUSIONS FOCUSED ON AN IMAGE SENSOR BY A LENS STACK ARRAY

FotoNation Limited, (IE)...

1. A camera array, comprising:a plurality of cameras configured to capture images of a scene, where each camera comprises:
optics comprising at least one lens element and at least one aperture; and
a sensor comprising a two-dimensional array of pixels and control circuitry for controlling imaging parameters;
a processor configured by software to:
capture a plurality of images from different viewpoints using the plurality of cameras, where each image captured by the plurality of cameras includes pixels that are occluded in at least one other image captured by the plurality of cameras; and
normalize the plurality of images based upon calibration data to enable scan-line based parallax searches;
measure parallax between the normalized images by adaptively comparing the similarity of neighborhoods of pixels for different parallax-induced shifts along scan-lines;
identify occluded pixels based upon the measured parallax information;
generate a depth map using the measured parallax information;
select at least one distance as an “in best focus” distance; and
blur an image produced by the camera array based upon the “in best focus” distance and distance information from the depth map.

US Pat. No. 10,142,559

PIXEL SIGNAL TRANSFER DEVICE AND METHOD THEREOF AND CMOS IMAGE SENSOR INCLUDING THE SAME

SK Hynix Inc., Gyeonggi-...

1. A pixel signal transfer device, comprising:a transfer block coupled to a pixel, suitable for transferring a pixel output voltage outputted from the pixel according to an amount of a charge generated from the pixel;
a conversion gain adjusting block including an amplification transistor; and
a correction block coupled between the transfer block and the conversion gain adjusting block, suitable for correcting the pixel output voltage using a threshold voltage of the amplification transistor,
wherein the conversion gain adjusting block adjusts a conversion gain of the corrected pixel output voltage outputted from the correction block,
wherein the conversion gain adjusting block includes:
a first resistor coupled to a second power supply voltage reduced by a reference voltage,
a second resistor coupled to a ground power supply voltage, and
the amplification transistor coupled between the first resistor and an output node of the conversion gain adjusting block, and
wherein the conversion gain is adjusted according to the first resistor and the second resistor.

US Pat. No. 10,142,557

IMAGE PICKUP APPARATUS, IMAGE PICKUP METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER PROGRAM

Olympus Corporation, Tok...

1. An image pickup apparatus comprising a processor configured of hardware, the processor being configured to function as:a pixel-shift processing circuit and actuator configured to perform pixel shift photographing in a certain focus position to acquire a plurality of image data and perform pixel-shift combination processing of the acquired plurality of image data to generate pixel-shift combined image data;
a depth processing circuit configured to cause the pixel-shift processing circuit and actuator to perform processing on a plurality of focus positions, cause the pixel-shift processing circuit and actuator to generate a plurality of pixel-shift combined image data in different focus positions, and perform depth combination processing of the plurality of pixel-shift combined image data to generate an image having large depth of field; and
a focused-region extracting circuit configured to calculate sharpness of each pixel in the image and extract a focused region according to the sharpness in at least one of the plurality of focus positions, wherein
the pixel-shift processing circuit and actuator performs, concerning a focus position where the focused region is extracted, the pixel-shift combination processing concerning only a partial image region including the focused region.

US Pat. No. 10,142,556

CAMERA FLASH LIGHT DIRECTION MANAGEMENT

INTERNATIONAL BUSINESS MA...

1. A system for controlling a flash direction, comprising:a substrate including plural cavities;
a membrane over the substrate; and
a light emitting element over membrane;
wherein each one of the plural cavities is configured to be selectively pressurized and depressurized independent of other ones of the plural cavities;
the light emitting element is aimed in a first direction when none of the plural cavities is pressurized;
the light emitting element is aimed in a second direction, different than the first direction, when a first subset of the cavities is pressurized.

US Pat. No. 10,142,555

CAMERA FLASH LIGHT DIRECTION MANAGEMENT

INTERNATIONAL BUSINESS MA...

1. A system for controlling a direction of a light emitting element, comprising:a substrate including a cavity, a first fluid passageway, and a second fluid passageway;
a membrane attached to the substrate;
a light emitting element arranged over and attached to the membrane; and
a fluidics system configured to selectively deform the membrane which alters an orientation of the light emitting element relative to the substrate.

US Pat. No. 10,142,553

CAMERA AND LIGHT SOURCE SYNCHRONIZATION FOR OBJECT TRACKING

INTEL CORPORATION, Santa...

1. An imaging device for camera and light source synchronization, the imaging device comprising:an image processing module to detect a current location of an object in a captured image generated by the imaging device;
a location prediction module to predict a next location of the object in a next captured image, generated by the imaging device, based on (i) the current location of the object and (ii) historical data that identifies previously detected locations of the object in corresponding previously captured images generated by the imaging device; and
an illumination module to (i) determine an illumination interval defining a period of time during which a light source of the imaging device is to illuminate a set of sensor lines of the imaging device during the capture of the next captured image based on the predicted next location of the object, wherein the set of sensor lines corresponds with the predicted next location of the object and (ii) activate the light source of the imaging device to illuminate only the set of sensor lines of the imaging device that was determined to correspond to the predicted next location of the object throughout the determined illumination interval, wherein to active the light source comprises to sequentially expose each sensor line of the set of sensor lines of the imaging device to capture the next captured image.

US Pat. No. 10,142,552

IMAGE PROCESSING APPARATUS THAT CORRECTS CONTOUR, CONTROL METHOD THEREFOR, STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR, AND IMAGE PICKUP APPARATUS

CANON KABUSHIKI KAISHA, ...

1. An image processing apparatus comprising:a tone correction unit configured to perform a predetermined tone correction process in a part of a luminance range of an image obtained as a result of photographing;
a contour correction unit configured to perform a contour correction process that corrects a contour of an object in the image; and
a control unit configured to control the contour correction unit to perform a first contour correction process in a first part of the luminance range where the tone correction unit does not perform the predetermined tone correction process in the image, and to perform a second contour correction process, which is lower in a degree of correction than the first contour correction process, in a second part of the luminance range where the tone correction unit performs the predetermined tone correction process in the image.

US Pat. No. 10,142,550

EXTENDING A FOCUS SEARCH RANGE IN AN IMAGING SYSTEM INCLUDING A HIGH SPEED VARIABLE FOCAL LENGTH LENS

Mitutoyo Corporation, Ka...

1. A method for controlling an imaging system comprising: a high speed variable focal length (VFL) lens having a first operating resonant frequency that provides a periodically modulated first optical power variation having a relatively larger amplitude, and having a second operating resonant frequency that provides a periodically modulated second optical power variation having a relatively smaller amplitude and that provides relatively low aberration in the imaging system; a lens controller; and a camera configured to provide images for the imaging system,the method comprising:
providing an extended focus range demand signal to the lens controller;
in response to the extended focus range demand signal, configuring the lens controller to operate the VFL lens at the first operating resonant frequency to provide the first optical power variation, and thereby provide a first relatively larger focus range for the imaging system;
providing an accurate image demand signal to the lens controller; and
in response to the accurate image demand signal, configuring the lens controller to operate the VFL lens at the second operating resonant frequency to provide the second optical power variation, and thereby provide a second relatively smaller focus range and low aberration images for the imaging system.

US Pat. No. 10,142,549

IMAGE CAPTURING APPARATUS AND IMAGE SMOOTH ZOOMING METHOD THEREOF

LUXVISIONS INNOVATION LIM...

1. An image smooth zooming method adapted to an image capturing apparatus having a wide-angle lens and a telephoto lens, wherein a field of view (FOV) size of the wide-angle lens is larger than a FOV size of the telephoto lens, the image smooth zooming method comprising the following steps:capturing a wide-view image and a tele-view image by the wide-angle lens and the telephoto lens respectively according to a capturing setting, wherein the capturing setting comprises a zoom scale;
detecting displacements of the wide-angle lens and the telephoto lens when capturing the wide-view image and the tele-view image by using a motion sensor;
capturing images within reduced FOVs respectively from the captured wide-view image and tele-view image according to the detected displacements of the wide-angle lens and the telephoto lens, wherein centers of the reduced FOVs are at positions where the view centers of the wide-angle lens and the telephoto lens are reversely shifted by the displacements respectively;
calculating ratios of the FOV sizes of the wide-angle lens and the telephoto lens to the zoom scale respectively and zooming the captured wide-view image and tele-view image to fit the zoom scale according to the ratios;
aligning the zoomed wide-view image and tele-view image according to a shift between view centers of the wide-angle lens and the telephoto lens; and
overlapping the zoomed and aligned wide-view image and tele-view image to output an overlapped image fitting the zoom scale.

US Pat. No. 10,142,548

DIGITAL CAMERA WITH MULTIPLE PIPELINE SIGNAL PROCESSORS

CALLAHAN CELLULAR L.L.C.,...

1. A device comprising:a plurality of arrays of photodetectors, including:
a first array of photodetectors to sample an intensity of light at a wide field of view for a first integration time; and
a second array of photodetectors to sample an intensity of light at a narrow field of view for a second integration time; and
signal processing circuitry, coupled to the first and second arrays of photodetectors, configured to generate a composite image using data which is representative of the intensity of light sampled by the first array of photodetectors at the wide field of view and data which is representative of the intensity of light sampled by the second array of photodetectors for the narrow field of view.

US Pat. No. 10,142,545

IMAGE STABILIZING APPARATUS, ITS CONTROL METHOD, IMAGE PICKUP APPARATUS, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An image stabilizing apparatus comprising:one or more processors; and
a memory storing instructions which, when executed by the one or snore processors, cause the image stabilizing apparatus to function as:
a detecting unit configured to detect a motion vector in each of a plurality of areas made by dividing a motion vector detecting frame set in each of a plurality of images sequentially output from an imaging unit; and
a control unit configured to determine a motion vector of an object in the detected motion vector and to perform an image stabilization control based on the motion vector of the object,
wherein the control unit determines a size of the object based on the motion vector of the object,
wherein the control unit does not change the motion vector detecting frame when determining that the object is larger than a predetermined size, and
wherein the control unit changes the motion vector detecting frame when determining that the object is smaller than the predetermined size.

US Pat. No. 10,142,538

LIDAR ASSISTED FOCUSING DEVICE

REDROCK MICROSYSTEMS, LLC...

1. A focusing device for a camera having a lens and a field of view, the focusing device comprising:a LIDAR module having a scanning area greater than the field of view of the camera;
a camera interface;
a controller having a user interface with a display, the controller communicably coupled to the LIDAR module and the camera interface, wherein the controller receives data from the LIDAR module, displays a location of one or more targets within the scanning area along with an indication of the field of view of the camera using the data from the LIDAR module via a user interface, receives a target selection from the displayed target(s) via the user interface, determines a focus setting using the LIDAR data, the target selection and a camera operational data, and sends the focus setting to the camera interface; and
the camera interface receives the focus setting and drives the lens of the camera to focus on the target selection using the focus setting.

US Pat. No. 10,142,536

CAMERA USING PREVIEW IMAGE TO SELECT EXPOSURE

Monument Peak Ventures, L...

1. An image processing device comprising:an image sensor configured to provide initial sensor image data and final sensor image data;
a lens configured to expose an image of a scene onto the image sensor;
a processor configured to:
process the initial sensor image data to select one of a plurality of pre-determined scene types, wherein the pre-determined scene types include at least one scene type selected from the group including high-contrast scene, low-contrast scene, sky scene, night scene, color-saturated scene, and text/document scene; and
cause an exposure control system to adjust the exposure level for a final image according to the selected scene type; and
the exposure control system configured to adjust the exposure level for capturing the final image on the image sensor by setting, according to signals from the processor, the exposure level for the final image to be a default scene exposure level changed by a pre-determined relative exposure level corresponding to the selected scene type, where the relative exposure level change is an increase in exposure if the scene type is low-contrast scene, night scene, or text/document scene, and a decrease in exposure if the scene type is high-contrast scene, sky scene, or color-saturated scene.

US Pat. No. 10,142,535

VEHICLE CAMERA SYSTEM

Cobra Electronics Corpora...

1. A system for use in a vehicle including a vehicle camera that interfaces with a mobile communication device that is separate from said vehicle camera, the system comprising:said vehicle camera comprising:
a) a camera display that provides a visual output,
b) an imaging component, which captures at least one image and creates an image file,
c) a memory component designed to electronically store said image file,
d) a camera communication element configured to communicate over a short-range communication standard, and
e) wherein said vehicle camera is designed without a location determination capability; and
said mobile communication device comprising:
a) a user interface that receives inputs from a user and communicates information to said user,
b) a location determination component configured to determine a geographic location of the mobile communication device, and
c) a short-range communication element configured to communicate over said short-range communication standard, wherein said short-range communication element communicates with said camera communication element over said short-range communication standard, and
d) a wide-area communication element configured to communicate over a wide-area communication standard; and
wherein said mobile communication device exchanges data with said vehicle camera, wherein said geographic location of said mobile communication device is compiled with said image file to create a location identified image file, and wherein said data comprises a timestamp and said location identified image file includes said timestamp, and
wherein said data comprises a prediction of an alert level associated with said geographic location of said mobile communication device, and wherein said camera display communicates said prediction to said user, and
wherein said mobile communication device receives said prediction from a remote server over the wide-area communication standard and communicates said prediction to said vehicle camera over the short-range communication standard, and wherein the remote server analyzes a plurality of data entries associated with said geographic location of the mobile communication device to generate said prediction.

US Pat. No. 10,142,534

IMAGE-CAPTURING AND IMAGE-DISTRIBUTING SYSTEM FOR AUTOMATICALLY OR MANUALLY CAPTURING IMAGE OF USER CARRYING MOBILE COMMUNICATION TERMINAL

bianconero, Inc., Osaka ...

1. An image-capturing and image-distributing system comprising:a near field wireless signal transmitting station;
a user-carried mobile communication terminal;
an image-capturing device associated with an image-capturing area; and
an image server;
wherein the near field wireless signal transmitting station is configured to:
transmit a near field wireless signal containing encrypted image-capturing condition information via a near field wireless communication in order to identify that a user has entered the image-capturing area;
wherein the user carried mobile communication terminal is configured to:
receive and decrypt the near field wireless signal containing the encrypted image-capturing condition information,
determine that the user has entered the image-capturing area based on the near field wireless signal containing the encrypted image-capturing condition information, and
transmit an image-capturing request including a user presence area within the image-capturing area to the image-capturing device based on determining that the user has entered the image-capturing area;
wherein the image-capturing device is configured to:
capture an image of the user presence area based on the image-capturing request, and
transmit acquired image data associated with the image to the image server;
wherein the image server is configured to:
store the acquired image data in correlation with an image-capturing location and an image-capturing time/date, and
transmit the acquired image data to the user-carried mobile communication terminal in response to receiving a download request from the user-carried mobile communication terminal which designates the image-capturing location and the image-capturing time/date.

US Pat. No. 10,142,532

CAMERA FOR VEHICLE VISION SYSTEM

MAGNA ELECTRONICS INC., ...

1. A camera module for a vision system for a vehicle, said camera module comprising:a circuit element, said circuit element including an imager and associated circuitry, wherein said circuit element includes electrical connecting elements;
a lens mounting element for holding a lens assembly, said lens assembly including at least one optical element;
wherein said lens mounting element is disposed at said circuit element and said at least one optical element is optically aligned with said imager of said circuit element;
an inner molding formed over and around said circuit element and over a portion of said lens mounting element so that said inner molding and said lens mounting element substantially encase said circuit element;
wherein said inner molding comprises a first molded polymer molded at a first molding pressure;
wherein said inner molding has an aperture established at said electrical connecting elements of said circuit element;
a connector element disposed at said aperture so as to be in electrical contact with said electrical connecting elements of said circuit element;
an outer shell molded over and around said inner molding and over another portion said lens mounting element so as to encase said inner molding;
wherein said outer shell comprises a second molded polymer injection molded at a second molding pressure;
wherein said second molding pressure is greater than said first molding pressure;
wherein said outer shell comprises a connector portion that surrounds said connector element, and wherein said connector element is accessible at said connector portion of said outer shell; and
wherein said connector portion is configured to connect to a connector end of a wire harness to electrically connect the connector end of the wire harness to said connector element to establish electrical connection between the wire harness and said electrically connecting elements of said circuit element.

US Pat. No. 10,142,530

SYSTEM AND METHOD FOR TAKING HIGH RESOLUTION PHOTOGRAPHS AND VIDEOS USING A MOBILE DEVICE MOUNT WITH ILLUMINATION

JIGSAW INFORMATICS, INC.,...

1. An illumination system on which a mobile device containing a camera is mounted, the system comprising:a universal device mount capable of securely mounting a mobile device of a variety of sizes;
an illuminator capable of providing lighting for use with the mobile device;
a viewport configured relative to the universal device mount such that the viewport is capable of permitting the mobile device camera to view an object for the purpose of using the camera;
electronics to operate and control the illuminator; and
a battery capable of powering the illuminator.

US Pat. No. 10,142,529

IMAGING APPARATUS AND METHOD FOR MANUFACTURING IMAGING APPARATUS

HAMAMATSU PHOTONICS K.K.,...

1. An imaging device comprising:a heat-dissipating base having an opening at a center;
a flexible substrate, arranged on one surface side of the base, the one surface side of the base being a tilted surface that forms a depression having the opening as a bottom part, the flexible substrate comprising:
an opening communicating with the opening of the base; and
a plurality of arrangement pieces disposed in concentric rows about the opening of the base;
a plurality of light sources for emitting light toward a subject to be imaged, one of the plurality of arrangement pieces being disposed between each of the plurality of light sources and the tilted surface of the one surface side of the base, each of the plurality of light sources having an optical axis that intersects a center axis of the opening of the base; and
an image sensor, arranged coaxially with the center axis of the opening of the base, for capturing at a deep part of the opening of the base a light image from the subject.

US Pat. No. 10,142,527

DISPLACEMENT SENSOR AND CAMERA MODULE HAVING THE SAME

LG ELECTRONICS INC., Seo...

1. A camera module comprising:a housing including a light transmission portion at one side;
a lens module, packaged in the housing, transferring incident light through the light transmission portion to a first direction;
an image sensor, converting light passed through the lens module to a digital signal;
a first frame located inside the housing;
a second frame located inside the housing;
a first coil formed at the first frame, wherein a first voltage is applied to the first coil;
a second coil formed at the first frame, wherein a current of a second voltage flows in the second coil to correspond to a voltage of the first frame if the first voltage is applied to the first coil;
a conductor coupled to the second frame; and
a detector for calculating a relative position between the first frame and the second frame by monitoring the second voltage,
wherein a size of the second voltage is reduced if the second coil is moved closer to the conductor.

US Pat. No. 10,142,526

SELF-ALIGNING MULTI-PART CAMERA SYSTEM

Microsoft Technology Lice...

1. A multi-part electronic device, comprising:a first camera part mounted within a surrounding first resilient camera mount on a first device part; and
a second camera part mounted within a surrounding second resilient camera mount on a second device part, the first and second device parts being coupled together by a common hinged joint,
wherein in an open mode of the device, at least one of the first and second camera parts is positioned in a protruded position protruding relative to a surrounding surface, wherein in a closed mode of the device in which the first and second camera parts are rotated towards each other to overlap about the common hinged joint, at least one of the first camera part or the second camera part is adjustably mounted such that contact between the first camera part and the second camera part urges the at least one camera part in the protruded position to withdraw inwardly, aligns the first camera part and the second camera part within a selected angular deviation between respective optical axes and reduces tilt between the first and second camera parts relative to their respective surrounding surfaces.

US Pat. No. 10,142,523

ENDOSCOPE AND CYLINDRICAL STRUCTURE FOR ENDOSCOPE

OLYMPUS CORPORATION, Tok...

1. An endoscope comprising:an insertion section having (1) a longitudinal axis, (2) a distal end, (3) an internal circumferential surface that defines a hole with an opening in the distal end and extending from the opening along the longitudinal axis, (4) a first projection projecting inwardly in a radial direction from the internal circumferential surface, and (5) a second projection projecting inwardly in a radial direction from the internal circumferential surface that is (a) spaced from the first projection and (b) located between the first projection and the distal end;
a cylindrical member (1) disposed in the hole, (2) extending along the longitudinal axis, (3) having an external circumferential surface, and (4) having a first outward flange provided on the external circumferential surface that extends outwardly from the external circumferential surface; and
an elastic member provided on the external circumferential surface of the cylindrical member and located between the first projection and the second projection; wherein:
the outward flange has end portions that (1) are opposed to each other in a circumferential direction of the longitudinal axis and (2) define a first cutout;
the first projection is disposed in the first cutout; and
the elastic member (1) is elastically deformable and configured to slide over the second projection when the cylindrical member is inserted into the hole of the insertion section and (2) interacts with the second projection to urge the cylindrical member away from the distal end of the insertion section.

US Pat. No. 10,142,522

USER FEEDBACK FOR REAL-TIME CHECKING AND IMPROVING QUALITY OF SCANNED IMAGE

ML Netherlands C.V., Ams...

1. A method of processing an image of an object acquired with a hand-held electronic device, the method comprising, with at least one processor:identifying a region in the image having characteristics representative of an undesired item, wherein identifying the region comprises detecting sub-regions characteristic of the undesired item and a shadow cast by the undesired item; and
correcting the image by:
generating a patch for the region; and
providing a corrected image with the region replaced with the patch.

US Pat. No. 10,142,520

SINGLE COLOR BACKGROUND MIXED RASTER CONTENT (MRC)

XEROX CORPORATION, Norwa...

9. An image processing system for generating a mixed raster content (MRC) format file for single background color image document, the image processing system comprising:an input device for receiving an input document;
a processor, coupled to the input device;
a segmentation module, coupled to the processor, to segment the input document into an image layer and a text layer; and
a compression module, coupled to the processor, to:
determine whether the image layer comprising a single background color;
upon affirmative determination, generate a new text layer with a background color mask, wherein the image layer is converted into the new text layer;
compress the text layer and the new text layer using a compression scheme;
integrate the compressed the text layer and the new text layer to generate an image data in the MRC file format; and
store the generated image data in a memory device.

US Pat. No. 10,142,518

IMAGE READING APPARATUS AND IMAGE FORMING SYSTEM FOR PERFORMING ACCURATE IMAGE CORRECTION

Konica Minolta, Inc., Ch...

1. An image reading apparatus comprising:a colorimeter structured to colorimetrically measures an image formed on a sheet based on an optical spectrum in a visible light range;
a reference plate located in a position facing the colorimeter with a chromatic reflecting surface;
a temperature detection unit structured to detect a temperature of the reference plate;
a determination unit structured to determine whether or not functioning of the colorimeter itself is in a normal condition based on the temperature of the reference plate detected by the temperature detection unit and the optical spectrum in the visible light range.

US Pat. No. 10,142,517

IMAGE FORMING APPARATUS, PRINT SYSTEM, METHOD FOR CONTROLLING IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING PRINT SYSTEM, AND STORAGE MEDIUM STORING PROGRAM

Canon Kabushiki Kaisha, ...

1. An image forming apparatus to communicate with an external device which manages print data, the image forming apparatus comprising:at least one processor;
a job notification receiving unit implemented by the at least one processor and configured to receive a job notification;
an operation panel configured to receive a user input operation of a user operating the operation panel;
a job acquisition unit implemented by the at least one processor and configured to acquire print data and to monitor receipt of a job notification at the same time as monitoring receipt of a user input operation;
a printer configured to print a job;
a determination unit implemented by the at least one processor and configured to determine a number of user input operations received after the image forming apparatus is started up; and
a controller configured to perform control,
wherein, in a case where the job notification receiving unit receives, from the external device, the job notification first after start-up of the image forming apparatus, the controller performs control so that the job acquisition unit acquires unacquired print data from the external device,
wherein, in a case where print data is ready to be acquired from the external device and no job notification encouraging acquisition of the print data is received from the external device first after start-up of the image forming apparatus,
the controller performs control so that, in a case where the determination unit determines that a first user input operation is received after the image forming apparatus is started up, the job acquisition unit transmits a data acquisition request regarding the job to the external device and, in response, acquires unacquired print data from the external device, and
the controller performs control so that, in a case where the determination unit determines that a second or subsequent user input operation is received after the image forming apparatus is started up, a data acquisition request regarding the job is not transmitted to the external device and print data is not again acquired from the external device in response to the second or subsequent user input operation.

US Pat. No. 10,142,516

IMAGE READING DEVICE AND IMAGE FORMING APPARATUS

KYOCERA Document Solution...

1. An image reading device comprising:a loading section configured to receive loading of a document and an identification medium;
a reader configured to read the document and the identification medium; and
a document feeder configured to convey the document to the reader, wherein
the loading section includes:
a first loading section configured to receive loading of the identification medium; and
a medium restriction section configured to restrict a position of the identification medium loaded on the first loading section,
the first loading section is plate-shaped contact glass facing a bottom surface of the document feeder,
the medium restriction section is disposed adjacent to the first loading section and faces the bottom surface of the document feeder,
the document being conveyed by the document feeder has opposite end portions and a central portion between the opposite end portions, the opposite end portions respectively including opposite ends of the document in a direction perpendicular to a conveyance direction of the document, and
only the central portion, among the opposite end portions and the central portion, of the document conveyed to the reader by the document feeder comes in contact with the medium restriction section.

US Pat. No. 10,142,515

IMAGE FORMING APPARATUS AND ABNORMALITY DETERMINATION METHOD

Canon Kabushiki Kaisha, ...

1. An image forming apparatus comprising:an input unit configured to input image data;
an image forming unit configured to form an image on a recording material based on the image data input by the input unit;
a reading unit configured to read the image formed on the recording material by the image forming unit; and
a control unit configured to, based on the input image data and the image read by the reading unit, acquire a plurality of change amounts from the read image,
wherein the plurality of change amounts includes a change amount of an image in a conveyance direction of a recording material and a change amount of an image in a direction perpendicular to the conveyance direction, and
wherein the control unit determines a type of an abnormal image based on the plurality of acquired change amounts.

US Pat. No. 10,142,514

IMAGE READING SYSTEM AND IMAGE READING DEVICE THEREIN

Brother Kogyo Kabushiki K...

1. An image reading system comprising an image reading device and an image storage device,wherein the image reading device comprises:
a reading unit configured to read an original document on a pixel-to-pixel basis and generate image data including color difference data and luminance data;
a converting unit configured to convert the image data to transmission data, the image data being compressed in converting to the transmission data;
a determining unit configured to determine whether the image data is color data, gray data, or binary data, and configured to generate determination data indicating a result of the determination; and
a transmission unit configured to transmit the transmission data and the determination data to the image storage device; and
wherein the image storage device comprises:
a storage unit;
a receiving unit configured to receive the transmission data and the determination data both transmitted by the transmission unit; and
an image processing unit configured to perform:
when the determination data indicates that the image data is the color data, storing the transmission data in the storage unit;
when the determination data indicates that the image data is the gray data, decompressing the transmission data to regenerate the image data, and storing the luminance data in the storage unit without storing the color difference data; and
when the determination data indicates that the image data is the binary data, decompressing the transmission data to regenerate the image data, converting the luminance data of the regenerated image data to black-white image data, and storing the black-white image data in the storage unit,
wherein the determining unit comprises:
a dividing unit configured to divide the image data corresponding to one page of the original document into a plurality of blocks, each of the plurality of blocks including a plurality of pixels;
a color block determining unit configured to perform:
determining, when a total number of achromatic pixels contained in the block is less than or equal to a first threshold, that the block is a color block, the achromatic pixel subject to having a color difference falling within a prescribed range;
a color page determining unit configured to determine, when the total number of the color blocks contained in the image data is greater than or equal to a first prescribed quantity, that the image data is the color data;
a monochrome block determining unit configured to determine, when a total number of first pixels and second pixels is less than or equal to a second threshold, that the block is a gray block, the first pixel having a luminosity value greater than or equal to a first luminosity value, the second pixel having a luminosity value less than or equal to a second luminosity value, the second luminosity value being smaller than the first luminosity value;
a monochrome page determination unit configured to perform:
when a total number of the gray blocks is greater than a second prescribed quantity, determining that the image data is the gray data; and
when the total number of the gray blocks is less than or equal to the second prescribed quantity, determining that the image data is the binary data; and
a decision unit configured to decide:
to generate the determination data indicating that the image data is the color data, in response to the determination that the image data is the color data; and
to generate the determination data indicating that the image data is one of the gray data and the binary data, in response to the determination that the image data is the gray data or the determination that the image data is the binary data.

US Pat. No. 10,142,513

IMAGE FORMING APPARATUS THAT CORRECTS POSITION CORRECTION OF IMAGE FORMED ON SHEET

Canon Kabushiki Kaisha, ...

2. An image forming apparatus comprising:a reader having a carriage that moves in a predetermined direction and illuminates an original, the reader being configured to read the original to generate original image data;
an image forming unit configured to form an image on a sheet based on the original image data;
a memory configured to store a correction condition for reducing a read error of the reader; and
a processor configured to perform tasks comprising:
(1) a test image forming task that controls the image forming unit to form a test image on the sheet, wherein the test image is used for detecting a position of an image to be formed on the sheet by the image forming unit;
(2) a generation task that generates a conversion condition based on read data related to the test image formed on the sheet and the correction condition stored in the memory, wherein the read data is output by the reader; and
(3) a conversion task that converts the image data based on the conversion condition,
wherein the image forming unit forms an output image on the sheet based on the converted image data.

US Pat. No. 10,142,507

INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM

KYOCERA DOCUMENT SOLUTION...

1. An information processing apparatus, comprising:a management system that detects a user operation and acquires information input by the operation as setting data to be supplied to an electronic apparatus; and
a setting system that
acquires a software module including a first sub-module and a second sub-module,
collectively supplies the first sub-module included in the acquired software module to a plurality of electronic apparatuses, the first sub-module being to be installed in each of the plurality of electronic apparatuses to allow each of the plurality of electronic apparatuses to execute a particular function,
acquires a response from each of electronic apparatuses, that have successfully installed the first sub-module, out of the plurality of electronic apparatuses to which the first sub-module is supplied, the response indicating that the first sub-module has been successfully installed, and
executes the second sub-module included in the acquired software module
to cause the management system to acquire the setting data, the setting data being necessary for each of the electronic apparatuses to execute the first sub-module, and
to collectively supply the setting data acquired by the management system to the electronic apparatuses, that have successfully installed the first sub-module.

US Pat. No. 10,142,506

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD

RICOH COMPANY, LTD., Tok...

1. An information processing apparatus, comprising:a control device that receives an operation instruction according to user input; and
a main body that operates according to a request transmitted from the control device, wherein
the main body includes a non-volatile memory and circuitry, the non-volatile memory stores control device configuration information that is related to at least resolution information of the control device, of list information that is a list of a plurality of items of control device information, when a power supply of the main body is off;
the circuitry controls the control device and performs processing for initialization of the control device according to the control device configuration information, when the power supply of the main body transitions from an OFF state to an ON state,
wherein a memory in the main body of the information processing apparatus, to store control device configuration information corresponding to only a portion of an extended display identification data (EDID), the portion being information that provides resolution information of the control device of the information processing apparatus needed for initialization, the control device configuration information being obtained from the EDID as list information that is the list of a plurality of items of control device information regarding a specification of the control device;
the circuitry in the main body generates dummy list information that is a dummy of the list information using the control device configuration information, and initializes the control device based on the dummy list information,
wherein the circuitry performs the initialization of the control device by setting at least resolution and operation frequency to the control device.

US Pat. No. 10,142,505

MULTI-FUNCTION PRINTER

KABUSHIKI KAISHA TOSHIBA,...

1. A multi-function printer method comprising:preparing the mode of the multi-function printer between a power-saving mode and a print mode in a printer engine unit of a multi-function printer;
arranging a first microphone to a third microphone at intervals on a single plane, in a staggered manner close to a floor, the first microphone to the third microphone are in the multi-function printer;
determining positions of sound sources by a control section according to a time difference between sound sources that are captured by the first microphone to the third microphone, the time difference between the arrival of the sound sources indicating a user approaching the multi-function printer;
determining sound source location positions by the control section, based on a distance calculation operation using coordinates of the microphones, the distances between footprint coordinates and the microphones, footstep sound arrival times, and transmission velocity of sound; and
causing the print engine to be switched from the power-saving mode to the print mode depend on a decrease in the time difference between sound sources.

US Pat. No. 10,142,504

IMAGE FORMING APPARATUS

KYOCERA Document Solution...

1. An image forming apparatus comprising a feed tray having a placement surface on which a sheet is placed, whereinthe feed tray includes:
a fixed table;
an extension table capable of being pulled out along and being accommodated in the fixed table; and
a sensor disposed on the fixed table and configured to detect whether or not the sheet is placed on the extension table in a situation in which the extension table is pulled out,
the sensor is an optical transmission or reflective sensor,
the feed tray includes an actuator that moves according to whether or not the sheet is placed on the extension table, transmission of projected light being blocked or allowed in the sensor according to movement of the actuator,
the actuator includes a protruding member capable of protruding from and receding below the placement surface of the extension table, and
the protruding member protrudes from or recedes below the placement surface of the extension table according to whether or not the sheet is placed on the extension table.

US Pat. No. 10,142,501

IMAGE PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An image processing apparatus including a Web server and capable of communicating with an information processing apparatus including a Web browser via a network, the image processing apparatus comprising:a display;
one or more memories storing a display setting of the display in association with user identification information about a user permitted to log in to the image processing apparatus, the display being capable of displaying a screen based on the display setting of the display stored in the one or more memories in association with user identification information about a user that has logged in to the image processing apparatus; and
one or more processors that execute a set of instructions to:
receive user identification information from the Web browser of the information processing apparatus;
obtain the display setting of the display stored in association with the received user identification information in the one or more memories; and
transmit a Web screen based on the obtained display setting to the information processing apparatus.

US Pat. No. 10,142,500

INFORMATION PROCESSING APPARATUS THAT PERFORMS TWO SEPARATE AND DIFFERENT SEARCH OPERATIONS FOR A DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An information processing apparatus connected to an external access point, the information processing apparatus comprising:one or more processors operating to:
cause a first search to be performed so that a first device that is not in a state of being connected to the external access point and that has a function of an access point is searched for;
cause a second search to be performed so that a second device that is already in a state of being connected to the external access point is able to be searched for, wherein the second search is a different search operation than the first search; and
cause a display unit to display first information regarding the first device found by the first search and second information regarding the second device found by the second search,
wherein, in a case where the first information displayed on the display unit is designated, processing for connecting the first device to the external access point is performed based on the designation of the first information,
wherein, in a case where the second information displayed on the display unit is designated, processing for connecting the second device to the external access point is not performed based on the designation of the second information, and
wherein the external access point is provided outside of the information processing apparatus, the first device, and the second device.

US Pat. No. 10,142,496

MOBILE DEVICE IMAGE CAPTURE AND IMAGE MODIFICATION INCLUDING FILTERS, SUPERIMPOSING AND GEOFENCED COMMENTS IN AUGMENTED REALITY

IP Holdings, Inc., Palo ...

1. A non-transitory computer readable storage medium that stores a set of instructions that are executable by at least one processor of a mobile device to cause the mobile device to perform a method comprising:obtaining one or more images captured by an application utilizing an image acquisition device;
identifying one or more sections of the one or more images showing an object and a background;
creating at least one modified view based on changes to the one or more sections of the one or more images; and
displaying the at least one modified view on the application.

US Pat. No. 10,142,495

METHOD AND APPARATUS FOR SIMPLIFIED DEVICE DATA COLLECTION

Kabushiki Kaisha Toshiba,...

1. A data collector controller for control of monitoring activity of networked multifunction peripherals comprising:a user interface including a display and a user input;
a memory including data corresponding to a plurality of interactive user configuration screens;
a processor configured to selectively render the configuration screens on the display and receive corresponding user input, the configuring screens setting device user interaction including,
a network address field configured to receive user supplied network address information,
a user selection option for commencing a network connectivity test,
a user selection option for specification of device certification certificates,
a user selection option for modification of device certification certificates,
a user selection option for modification of a device time zone,
a field for changing network settings, and
a user selection for testing discovery, registration or data transfer mechanism for multifunction peripheral device data collection; and
a data storage configured to store user selection data received via rendered configuration screens,
wherein the processor is further configured to output stored user selection data as configuration data for data collection from the multifunction peripherals.

US Pat. No. 10,142,493

ONLINE CHARGING SYSTEM (OCS) CONTROLLED MEDIA POLICY

Conversant Wireless Licen...

1. A method comprising:receiving, at an apparatus, a registration message from a user apparatus;
downloading, at the apparatus, subscription information from a Home Subscriber Server (HSS), the HSS storing subscription information about a user associated with the user apparatus;
after the subscription information is downloaded from the HSS at the apparatus, transmitting, from the apparatus to a second apparatus, a credit control message, the credit control message comprising a request for a balance associated with the user, wherein the second apparatus is an Online Charging System (OCS);
receiving, at the apparatus from the second apparatus, a credit control response message, the credit control response message based at least in part on a determination of a balance associated with the user and indicating at least one allowed media component; and
transmitting, from the apparatus, a reply to the registration message indicating a media control policy based on the credit control response message, the media control policy indicating a set of available services and a set of unavailable services.

US Pat. No. 10,142,492

MANAGING NETWORK DATA CONSUMPTION OF APPLICATIONS ON CELLULAR COMPUTER NETWORKS ON ONE OR MORE SERVER COMPUTERS

LotusFlare, Inc., Sunnyv...

1. A computer system comprising:a memory persistently storing a set of instructions;
one or more processors coupled to the memory, wherein the one or more processors execute the set of instructions, which causes the one or more processors to track and limit data consumption per application by causing the one or more processors to:
receive, at an intermediary server computer, a first plurality of requests associated with a first user, a first operator, and a first application; and
for each request in the first plurality of requests, determine a size of the request, and add the size of the request to a first running total associated with the first user, the first operator, and the first application;
receive, from a remote client computer, at the intermediary server computer, a first request that comprises one or more values that identify the first user, the first application, a first application server computer;
determine that the first request is associated with the first operator;
determine that the first request is a first size; and
determine whether the first size plus the first running total is greater than a first threshold associated with the first user, the first operator, and the first application;
in response to determining that the first size plus the first running total is not greater than the first threshold:
increment the first running total associated with the first user, the first operator, and the first application by the first size;
send the first request to the first application server computer;
in response to determining that the first size plus the first running total is greater than the first threshold:
send, to the remote client computer, a limit notification indicating that the first user can no longer send data from the first application using the first operator;
terminate the first request without sending the first request to the first application server computer and without terminating other requests to other application servers associated with the first user, first operator, and applications other than the first application.

US Pat. No. 10,142,491

SUPPORT SYSTEM FOR CELLULAR BASED RESOURCE SHARING SERVICE

International Business Ma...

1. A cellular resource sharing support system, comprising:a behavior analysis system that collects usage data from a set of mobile devices in a cellular network;
a subscription manager that computationally generates offers to mobile device owners to avail excess compute resources of the mobile devices to a resource sharing services system;
a device manager that tracks the real-time availability and usage of participating mobile devices that are associated with the mobile device owners that have accepted the offers to avail the excess compute resources; and
an account manager that calculates and provides a compensation to the mobile device owners that have accepted the offers to avail the excess compute resources of the participating mobile devices to the resource sharing services system,
wherein each offer generated for a mobile device owner is based on collected usage data of an associated mobile device, and
wherein the offer requires the mobile device owner to avail a predetermine percentage of the excess compute resources of the associated mobile device for a predetermined amount of time provided that an average utilization of the associated mobile device falls below a predetermined threshold for a predetermined period of time.

US Pat. No. 10,142,487

PERSONALIZED REMINDERS

Microsoft Technology Lice...

1. A method being performed by one or more computing devices including at least one processor, the method for determining an instance of an event unaddressed by a user, the method comprising:receiving sensor data from one or more sensors, at least some of the sensors on a user device associated with the user;
determining an occurrence of a first communication event from the first set of sensor data;
monitoring the sensor data for indications of user activity following the first communication event to determine a first set of response information;
determining a set of one or more previously occurring communication events that are similar to the first communication event;
based on the set of one or more previously occurring communication events, determining a set of information indicative of user activity associated with and occurring following the one or more previously occurring communication events, the determined set of information indicative of user activity forming a second set of response information;
based on a comparison of the first set of response information and the second set of response information, determining that the first communication event is unaddressed; and
providing an indication of the first communication event as an unaddressed event.

US Pat. No. 10,142,486

TRANSPARENT CONTACT TRANSFER SYSTEM

Amazon Technologies, Inc....

1. A system comprising:computer-readable memory storing executable instructions; and
one or more processors in communication with the computer-readable memory and configured by the executable instructions to at least:
connect a telephone call from a customer device to a first agent device;
generate data representing a customer contact associated with the telephone call, wherein the data representing the customer contact indicates a post-contact process is assigned to a first agent using the first agent device;
receive, from the first agent device, a search term representing an aspect of the customer contact;
select a second agent based at least partly on a correspondence of the search term with data representing an expertise of the second agent;
cause presentation, by the first agent device, of a first user interface indicating that transfer of the customer contact is pending until acceptance by the second agent;
cause presentation, by a second agent device associated with the second agent, of a second user interface for accepting transfer of the customer contact, wherein the second agent device presents the second user interface concurrently with the first agent device presenting the first user interface;
receive, from the second agent device, data representing acceptance of transfer of the customer contact;
cause presentation, by the first agent device, of a third user interface indicating that transfer of the customer contact has been accepted;
transfer the telephone call from the customer device to the second agent device; and
modify the data representing a customer contact to indicate that the post-contact process is assigned to the second agent.

US Pat. No. 10,142,484

NEARBY TALKER OBSCURING, DUPLICATE DIALOGUE AMELIORATION AND AUTOMATIC MUTING OF ACOUSTICALLY PROXIMATE PARTICIPANTS

Dolby Laboratories Licens...

1. A method of reducing the effects of cross talk pickup of at least a first audio conversation by multiple audio input devices provided in an audio conferencing environment, the audio conferencing environment including multiple users participating by means of a series of associated audio input devices for the provision of audio input, and a series of audio output devices for the output of audio output streams to the multiple users, with the audio input and output devices being interconnected to a mixing control server for the control and mixing of the audio inputs from each audio input devices to present a series of audio streams to the audio output devices, the method including the steps of:(a) monitoring the series of audio input devices for the presence of a duplicate audio conversation input from at least two input audio sources in an audio output stream, the monitoring comprises, in the audio input from at least one of the at least two input audio sources, distinguishing background audio indicative of one or more background users from nearfield audio of a nearfield user; wherein the background audio is distinguished from the nearfield audio by determining a correlation of voice activity based on predetermined information and
(b) where a duplicate audio conversation input is detected, determining whether to suppress the presence of the duplicate audio conversation input in the audio output stream.

US Pat. No. 10,142,483

TECHNOLOGIES FOR DYNAMIC AUDIO COMMUNICATION ADJUSTMENT

Intel Corporation, Santa...

1. A telecommunications device for adaptive audio communications, the telecommunications device comprising:a session data collection module to collect session data of a communication session between a user of the telecommunications device and at least one other user of a remote telecommunications device communicatively coupled to the telecommunications device, wherein the communication session includes an audio stream;
a session adjustment management module to (i) determine a session context of the communication session based on the collected session data, (ii) compare the collected session data to session data of a previously stored session context, (iii) determine whether the collected session data includes an anomaly based on a result of the comparison, (iv) identify, in response to a determination that the anomaly was detected, a previously learned response to the detected anomaly, and (v) adjust a portion of the audio stream of the communication session and a setting of the telecommunications device based on the identified previously learned response to the anomaly.

US Pat. No. 10,142,482

METHOD AND APPARATUS FOR PROVIDING AMBIENT SOCIAL TELEPHONY

1. A method for notifying a particular user, the method comprising:monitoring, by a processor, an ongoing conference call;
detecting, by the processor, a triggering event during the ongoing conference call registered for the particular user, wherein the particular user is not a participant in the ongoing conference call, wherein the ongoing conference call is not scheduled for the particular user, wherein the triggering event comprises a key gesture of interest to the particular user that is pre-registered by the particular user and detected during the ongoing conference call between other users on the ongoing conference call; and
notifying, by the processor, the particular user to receive a recorded portion of the ongoing conference call in response to detecting the pre-registered triggering event.

US Pat. No. 10,142,481

VOICEMAIL TRANSMISSION UTILIZING SIGNALS ASSOCIATED WITH RADIO BAND FREQUENCIES

INTERNATIONAL BUSINESS MA...

1. A method for sending a voicemail indication to a recipient, the method comprising:receiving a voicemail message for the recipient;
receiving a configurable status parameter for controlling notification and controlling delivery of the voicemail message, said configurable status parameter comprising a send function status, a hold function status, and a selectable parameter for a designated radio frequency band; and
transmitting a voicemail notification indicator to a recipient receiver via the designated radio frequency band based on the configurable status parameter, said designated radio frequency band being one of an amplitude modulated frequency or a frequency modulated frequency that is solely associated with the recipient.

US Pat. No. 10,142,480

MESSAGE STORAGE

Microsoft Technology Lice...

1. A computer-implemented method comprising:receiving user-consumable messages directed to at least one destination user;
marking a first set of the user-consumable messages as consumed messages based on detecting user interaction to engage in one or more of viewing or listening to the first set of the user-consumable messages;
marking a second set of the user-consumable messages as unconsumed messages based on not detecting user interaction to engage in one or more of viewing or listening to the second set of the user-consumable messages;
storing the consumed messages and the unconsumed messages in a storage device; and
executing, by a processing system, logic to separately process the consumed messages and the unconsumed messages by applying a first retention policy to the consumed messages and a second retention policy to the unconsumed messages such that the first retention policy and the second retention policy are separately applied to the user-consumable messages and the first retention policy and the second retention policy are implemented independent of one another.

US Pat. No. 10,142,477

SYSTEM AND METHOD FOR SOCIAL MESSAGE CLASSIFICATION BASED ON INFLUENCE

1. A method for prioritizing processing of interactions and routing prioritized interactions at a contact center, the method comprising:generating, by a processor associated with the contact center, an interaction to be prioritized for processing, the interaction being based on data received over a data network via a media channel associated with the contact center;
identifying, by the processor, a person associated with the interaction;
identifying, by a processor, an influence level of the person associated with the interaction;
identifying, by the processor, actionability of the interaction by performing pattern matching against an actionable model and a non-actionable model, wherein the interaction is identified as actionable in response to identifying the interaction as calling for a response by the contact center, and non-actionable in response to identifying the interaction as not calling for a response by the contact center; and
prioritizing, by the processor, the interaction for processing based on the actionability of the interaction and the influence level of the person associated with the interaction,
wherein the prioritizing comprises:
in response to identifying the actionability of the interaction as actionable, ignoring, by the processor, the interaction in response to the influence level being below a first threshold; and
in response to identifying the actionability of the interaction as non-actionable, distributing, by the processor, the interaction to an agent device in response to the influence level being above a second threshold, the second threshold being greater than or equal to the first threshold, wherein the distributing the interaction to the agent device comprises:
transmitting, by the processor, a link to an end user device of the person associated with the interaction, the link being configured to initiate a new interaction session; and
initiating, by the processor, the new interaction session between the agent device and the end user device, in response to actuation of the link.

US Pat. No. 10,142,476

CALL RECONNECTION

UJET, Inc., San Francisc...

1. A method comprising:receiving a call at a call center system from a client device of a caller;
automatically connecting, by caller connection logic, the client device of the caller to a conference line;
automatically connecting, by the agent connection logic, a call agent to the conference line;
determining, by disconnection analysis logic, that a party to the conference line was disconnected from the conference line, the party to the conference line being one of the client device of the caller and the call agent; and
automatically initiating, by reconnection logic, a reconnecting of the party to the conference line.

US Pat. No. 10,142,475

CUSTOMER JOURNEY MANAGEMENT

1. A method of using a predictive model to manage customer journeys, the method comprising using one or more processors in a computer server:receiving a previously created predictive model for determining a dependent variable representing a customer journey score for a customer based on a combination of independent variables representing data relating to the customer;
receiving data defining a plurality of customer journeys, each customer journey comprising a succession of logged events representing a historical trail of previous actions performed by a particular customer in a computing system, each event corresponding to an interaction at an interaction point between a customer device and a server or other device;
at each of a plurality of interaction points of a particular customer in a customer journey:
retrieving from computer data storage a combination of independent variables representing objective and survey data relating to the customer;
using the predictive model to determine the dependent variable representing the customer journey score for the particular customer at the interaction point based on the combination of independent variables representing objective and survey data relating to the customer;
determining if the dependent variable representing the customer journey score is above a threshold; and
if the dependent variable representing the customer journey score is above the threshold, sending suggested action rules to the customer device.

US Pat. No. 10,142,471

SYSTEM AND METHOD FOR CALL PROGRESS DETECTION

1. A contact center system, comprising:an outbound server device configured to make a call to a callee; and
a media device configured to:
receive an audio signal based on the call;
determine a Mel-frequency cepstral coefficient for the received audio signal;
match the Mel-frequency cepstral coefficient for the audio signal to a Mel-frequency cepstral coefficient for a pre-recorded carrier message;
determine a content of the audio signal based on the match;
distinguish the match based on a stage of the call in which the match occurred; and
take an action based on the content of the audio signal and the stage of the call in which the match occurred.

US Pat. No. 10,142,469

EMERGENCY 9-1-1 PORTAL AND APPLICATION

1. A system, comprising:a computer aided prioritization (CAP) system in communication with a computer aided dispatch (CAD) system, a customer premises equipment (CPE), and a computer aided event module (CAEM) including an abandoned call processing method (ACPM), and configured to provide operations comprising:
receive a possible abandoned call for an emergency event;
determine that at least one of the possible abandoned call includes an audible voice and the possible abandoned call is associated with a user input;
determine, by the CAP system, at least one of an event priority and an event type associated with the possible abandoned call;
determine, by the CAEM, that the possible abandoned call is associated with at least one of an activated phone number and a de-activated phone number according to an automatic number identification (ANI) database;
in response to the possible abandoned call being associated with the activated phone number, at least one of:
initiate a re-bid to the activated phone number,
send a message to the activated phone number, and
establish a caller location of the possible abandoned call;
in response to the possible abandoned call being associated with the de-activated phone number, establish the caller location of the possible abandoned call; and
selectively route, by the CAP system or the CAEM based on at least one of the audible voice determination and the user input determination, the possible abandoned call to at least one of the computer aided dispatch (CAD) system, the customer premises equipment (CPE), and the computer aided event module (CAEM).

US Pat. No. 10,142,468

METHODS AND SYSTEMS FOR CUSTOMIZING INTERACTIVE VOICE RESPONSE CALLS

UNITED SERVICES AUTOMOBIL...

1. An interactive voice response (IVR) system comprising:one or more processors; and
a computer readable storage medium having instructions stored thereon, which when executed by the one or more processors cause the IVR system to:
receive a call from a caller;
determine an enrollment status in an account information service of the caller;
in response to a determination of the enrollment status of not enrolled:
determine a time period between the call and a time that the caller was previously presented with an enrollment offer to enroll in the account information service;
in response to determining that the time period exceeds an enrollment offer wait period:
present the enrollment offer for the account information service to the caller,
wherein the enrollment offer includes a customized selection of account information service preferences;
receive, from the caller, selections of the account information service preferences; and
enroll the caller in the account information service by generating a customized account information plan based on the selection of the account information service preferences.

US Pat. No. 10,142,467

METHOD AND SYSTEM FOR MANAGING TELECOMMUNICATIONS

1. A method for managing telecommunications comprising:receiving, by a communication system, a telecommunication from over a communications network, from a calling entity;
a server associating data with the calling entity;
the server selecting a consumer to receive the telecommunication, the selecting based on a correlation of data associated with the calling entity and data received from each consumer, from a selected plurality of consumers generated in real time for the said telecommunication;
the server determining a first amount associated with the telecommunication for being charged to the calling entity;
the server automatically transmitting the telecommunication from the calling entity over the communications network, to a telecommunication receiving device associated with the selected consumer, such that the selected consumer is anonymous to calling entity; and,
the server determining whether the telecommunication is chargeable to the calling entity.

US Pat. No. 10,142,466

SYSTEMS AND METHODS FOR SPECIAL CALLED NUMBER CALL HANDLING

Sonus Networks, Inc., We...

1. A method comprising:determining, by a second communication initiation application of a user equipment (UE), if a communication initiation attempt by a first communication initiation application of the UE has been made to a predetermined communication destination identifier using a first communication network;
determining, by the second communication initiation application of the UE if it is determined that a communication initiation attempt has been made by the first communication initiation application to the predetermined communication destination identifier, if the communication initiation attempt by the first communication initiation application of the UE has not been successful in placing the UE in communication with a terminal associated with the predetermined communication destination identifier using the first network; and
initiating, by the second communication initiation application of the UE if it is determined that a communication initiation attempt has been made by the first communication initiation application to the predetermined communication destination identifier and if it is determined that the communication initiation attempt has not been successful in placing the UE in communication with the terminal, communication handling processing to facilitate placing the UE in communication with the terminal associated with the predetermined communication destination identifier using a second network.

US Pat. No. 10,142,465

PROVIDING SENDER IDENTIFICATION INFORMATION

Microsoft Technology Lice...

1. A mobile apparatus comprising:a display;
at least one sensor;
at least one processor, and
at least one memory storing program instructions that, when executed by the at least one processor, cause the mobile apparatus to:
receive a communication event;
cause output of a temporary indication of the communication event instead of providing sender identification information relating to the communication event on the display;
detect, with the at least one sensor, that a distance between the mobile apparatus and a user is less than a distance threshold; and
based at least on detecting that the distance between the mobile apparatus and the user is less than the distance threshold, cause a display of the sender identification information on the display to replace the temporary indication.

US Pat. No. 10,142,464

SYSTEMS AND METHODS FOR AUTHENTICATING A CALLER

UNITED SERVICES AUTOMOBIL...

18. An authentication system comprising:one or more processors; and
a computer readable storage medium having instructions stored thereon, which when executed by the one or more processors cause the authentication system to:
receive a call from a device associated with a caller;
in response to receiving the call, begin a first session through a first channel associated with the caller;
determine an identity of the caller based at least in part on characteristics of the device;
determine whether a qualified device is associated with the caller;
in response to the qualified device being associated with the caller, send, via a communications network, a request for authentication credentials in a push notification to the qualified device;
in response to sending the push notification, begin a second session though a second channel associated with the caller;
send a first portion of a code through the second channel;
send a second portion of the code through a third channel, wherein the authentication credentials comprise the first portion of the code and the second portion of the code; and
in response to receiving and verifying the authentication credentials, authenticate the caller to the call.

US Pat. No. 10,142,463

METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS

Pindrop Security, Inc., ...

1. A method of determining a threat score of a call traversing a telecommunications network, comprising:receiving, by a network application platform, outer edge data from a signal from originating carrier signaling facilities at an originating side of the call;
receiving, by the network application platform, terminating edge data from a signal from a telecommunications network node at a terminating side of the call;
analyzing, by the network application platform, the outer edge data against the terminating edge data to determine a threat score representing a degree of a threat of the call; and
redirecting, by the network application platform, the call to a new destination in response to the threat score.

US Pat. No. 10,142,459

METHOD AND SYSTEM FOR MANAGING MULTIMEDIA ACCESSIBLITY

1. A method, comprising:storing, by a processing system including a processor, instructions for executing adjustment techniques for modifying user input, wherein first adjustment techniques include amplifying selective frequencies for a first degree of impairment and translating user input into first sign language images for a second degree of impairment, wherein second adjustment techniques include translating user input from sign language images into synthesized audio speech, wherein the second degree of impairment is more severe than the first degree of impairment, and wherein the first adjustment techniques includes one of modifying one of a size, color or font of text or replacing a word with another word based on a determined cognitive impairment;
detecting, by the processing system, a communication session between a first end user device and a second end user device;
determining, by the processing system, a first impairment associated with a first user of the first end user device and a second impairment associated with a second user of the second end user device;
determining, by the processing system, a degree of impairment for the second impairment;
receiving, by the processing system, a first user input captured at the first end user device and a second user input captured at the second end user device during the communication session;
selecting, by the processing system, a selected adjustment technique from among the first adjustment techniques according to the degree of impairment for the second impairment;
accessing, by the processing system, an impairment profile for the first user, wherein the impairment profile includes an audiogram for the first user, and wherein the selective frequencies that are amplified are selected based on the audiogram;
adjusting, by the processing system, the second user input according to the impairment profile to generate adjusted second user output;
adjusting, by the processing system, the first user input according to the impairment profile and then applying the selected adjustment technique to generate adjusted synthesized audio speech as adjusted first user output; and
providing, by the processing system, the adjusted first user output to the second end user device and the adjusted second user output to the first end user device during the communication session.

US Pat. No. 10,142,458

DEVICE FOR JAMMING A CELLULAR PHONE WITHIN A VEHICLE

1. A vehicle safety apparatus comprising:wherein the vehicle safety apparatus comprises a safety device, an automobile, and a blocked device;
wherein the safety device is installed in the vehicle;
wherein the vehicle safety apparatus is configured for use with a vehicle;
wherein the vehicle safety apparatus is configured for use with one or more personal data devices;
wherein the vehicle safety apparatus limits the operation of the blocked device;
wherein each of the one or more personal data devices is a handheld electronic device;
wherein the blocked device is a personal data device that is selected from the one or more personal data devices;
wherein the blocked device connects to the safety device in such a manner that the safety device is able to limit the operation of the blocked device;
wherein the vehicle is a motorized device that transports people and cargo over a road network;
wherein the vehicle is further defined with an engine control module, an ECM connection, a neutral safety switch, a vehicle electrical system and a transmission;
wherein the engine control module is a programable electronic device that optimizes the operation of the engine of a vehicle;
wherein the engine control module monitors the operating status of the vehicle;
wherein the engine control module interfaces with external electronic devices to share information about the vehicle and to receive instructions regarding the operation of the vehicle;
wherein the ECM connection is a physical port that forms an electrical connection between the engine control module and the safety device;
wherein the neutral safety switch is a sensor that determines the setting of the transmission of the vehicle;
wherein the neutral safety switch is monitored by the engine control module;
wherein the status of the neutral safety switch is shared with the safety device;
wherein the safety device draws electrical power from the vehicle electrical system;
wherein the safety device is an electrical device that is installed within the vehicle;
wherein by limiting the operation of the blocked device is further meant that all remaining visual and text based functions of the blocked device are disabled while the vehicle is in operation;
wherein the safety device creates a first wireless communication link with the personal data devices contained within the one or more personal data devices with the exception of the blocked device;
wherein the safety device establishes a second wireless communication link with a publicly available commercial wireless network;
wherein the safety device comprises a logic module, a first communication device, a second communication device, an ECM connector, a PDD plug, and a housing;
wherein the logic module, the first communication device, the second communication device, the ECM connector, and the PDD plug are electrically interconnected;
wherein the logic module, the first communication device, the second communication device, the ECM connector, and the PDD plug are contained within the housing.

US Pat. No. 10,142,457

SYSTEM AND METHOD FOR LIMITING USAGE OF A WIRELESS COMMUNICATION DEVICE

Artifex Software Inc., S...

1. A method for limiting usage of at least one feature of a wireless communication device within a vehicle, comprising:determining whether said vehicle is in a restricted state;
transmitting a disabling wireless signal from a first wireless transmission device toward a first designated region only when said vehicle is in said restricted state, said first designated region including an interior of said vehicle;
transmitting an enabling wireless signal from a second wireless transmission device toward a second designated region only when said vehicle is in said restricted state, said second designated region being a subset of said interior of said vehicle;
determining by a processor within said wireless communication device whether said disabling and enabling wireless signals have been received from said first and second wireless transmission devices, respectively;
disabling by said processor said at least one feature of said wireless communication device when only said disabling wireless signal is received during a period of time when both said disabling and enabling wireless signals are being transmitted; and
maintaining by said processor said at least one feature of said wireless communication device in an enabled state when both said disabling and enabling wireless signals are received during said period of time when both said disabling and enabling wireless signals are being transmitted;
wherein said at least one feature of said wireless communication device is not disabled when both said disabling and enabling wireless signals are received during said period of time when both said disabling and enabling wireless signals are being transmitted.

US Pat. No. 10,142,455

METHOD AND APPARATUS FOR RENDERING GEOGRAPHIC MAPPING INFORMATION

HERE Global B.V., Veldho...

1. A method for rendering geographic mapping information, the method comprising:determining, utilizing at least one interface, a large-scale document associated with at least one mobile device,
wherein the determined large-scale document includes mapping information, navigation information, document information or a combination thereof;
determining, utilizing at least one processor, a virtual surface associated with the determined large-scale document,
wherein the determined virtual surface includes geographic mapping information of the large-scale document for active display within a user viewing interface of the mobile device and other geographic mapping information of the determined large-scale document that is not actively displayed within the user viewing interface;
determining one or more interactions with a physical surface, utilizing at least one optical sensor associated with the at least one mobile device to generate optical data gathered by the optical sensor;
mapping the determined one or more interactions with the physical surface with respect to the determined virtual surface;
determining at least part of the other geographic mapping information to become actively displayed within the user viewing interface based on the determined one or more interactions with the physical surface, the mapping and from the optical data gathered by the optical sensor generated through the interactions with the physical surface,
wherein the determined one or more interactions include, at least in part, at least one movement of the at least one device with respect to the physical surface for presenting the other geographic mapping information in the user viewing interface; and
rendering the determined at least part of the other geographic mapping information in the user viewing interface of the at least one mobile device based, at least in part, on the mapped one or more interactions.

US Pat. No. 10,142,454

METHOD FOR PROVIDING A CUSTOMIZED USER INTERFACE FOR GROUP COMMUNICATION AT A COMMUNICATION DEVICE

MOTOROLA SOLUTIONS, INC.,...

1. A method for providing a customized user interface for group communication at a communication device, the method comprising:determining, by an electronic processor, a list of communication groups with which a user identifier of the communication device is registered;
identifying, by the electronic processor, a communication group type for each of the communication groups in the list, wherein the communication group type identified for each communication group is based at least in part on service capabilities of the respective communication group;
assigning, by the electronic processor, a set of communication group types for the user identifier, the set of communication group types including the identified communication group type for each of the communication groups in the list;
determining, by the electronic processor, a type of group communication application to be configured at the communication device;
generating, by the electronic processor, one or more graphical user interface (GUI) elements as a function of the set of communication group types and the type of group communication application; and
configuring, by the electronic processor, the group communication application including the generated GUI elements at the communication device for supporting group communication associated with the user identifier, wherein the GUI elements are selected from the group consisting of notification of group communication type supported by the group communication application, view control providing a filtered list of communication groups with same group communication type, group representation to visually distinguish the communication groups based on group communication type, and interoperability control element to allow for switching between group communication applications.

US Pat. No. 10,142,453

USER INTERFACE FOR A COMPUTING DEVICE

Canonical Limited, Dougl...

1. A smartphone, tablet or other computing device comprising:(a) a touch sensitive display having a left edge, a top edge, a right edge, and a bottom edge;
(b) one or more processors;
(c) computer memory;
(d) an operating system computer program stored in the computer memory and configured to be executed by the one or more processors and including instructions for
detecting a swipe gesture from the left edge of the display when the device is locked and when the display is a welcome screen, and,
in response to the detected swipe gesture continuously extending from the left edge for a distance greater than a distance triggering a first response, triggering a second response of unlocking the device and displaying a home screen with a search bar;
wherein the welcome screen includes a pictorial infographic or a data visualization that graphically depicts a circular arrangement of thirty small dots, each dot indicating an activity or a state by modifying a size of a semi-translucent circle adjacent to and associated with each dot, each activity or state indicated by each dot relating to the device or one or more of its users, each activity or state being assigned a specific one of the thirty small dots.

US Pat. No. 10,142,452

MOBILE TERMINAL UNLOCK METHOD

GUANGZHOU ZHIJING TECHNOL...

1. A mobile terminal unlock method, comprising:obtaining a trigger signal for unlock, and generating a first password according to the trigger signal;
generating a corresponding unlock signal according to a preset correspondence between the unlock signal and the first password and with reference to the first password, and sending the corresponding unlock signal;
obtaining an unlock password that is obtained by means of parsing by a user according to the unlock signal;
matching the unlock password with the first password;
determining whether the unlock password is consistent with the first password; and
when a determining result is yes, unlocking a password lock; or
when a determining result is no, obtaining a trigger signal for unlock again;
wherein the method further comprises:
when a quantity of times of obtaining a trigger signal for unlock exceeds a maximum quantity of unlock error times, prompting the user to use an external unlock apparatus to obtain a password, wherein the maximum quantity of unlock error times is a total quantity of times that the mobile terminal user is allowed to enter an incorrect password and that is preset by the mobile terminal user;
after the user connects the external unlock apparatus to the mobile terminal as prompted, obtaining, by the external unlock apparatus, an international mobile equipment identity (IMEI) of the mobile terminal, and prompting the user to enter a six-place password;
after the user enters a six-place password, concatenating, by the external unlock apparatus, the international mobile equipment identity and the six-place password into a twenty-one place verification code; contrasting the twenty-one place verification code with a preset verification code stored in the external unlock apparatus; and if the two are consistent, obtaining, by the external unlock apparatus, the unlock password of the mobile terminal from the mobile terminal; and
contrasting, by the external unlock apparatus, the obtained unlock password with an unlock password stored in the external unlock apparatus; and when a contrast result is matched, sending the stored unlock password to the mobile terminal, so that the mobile terminal performs unlock according to the unlock password sent by the external unlock apparatus; or when a contrast result is unmatched, replacing the stored unlock password with the obtained unlock password, and sending the obtained unlock password to the mobile terminal, so that the mobile terminal performs unlock according to the unlock password sent by the external unlock apparatus.

US Pat. No. 10,142,450

CUSTOM MOBILE TELECOMMUNICATION DEVICE CONFIGURATION MANAGEMENT

Sprint Communications Com...

1. A user equipment (UE), comprising:at least one processor;
a non-transitory memory; and
a custom configuration manifest handling application stored in the non-transitory memory that, when executed by the processor:
retrieves a first custom configuration manifest from a custom configuration manifest server during device activation with a network, where the first custom configuration manifest identifies a first access point name,
configures the UE based on the first custom configuration manifest, including installing preferred applications on the UE without providing authentication credentials,
in response to the UE no longer being provisioned to receive wireless communication service from the network, receives a message to retrieve a second custom configuration manifest, where the second custom configuration manifest identifies a second access point name, and where the second access point name is different than the first access point name, and
reconfigures the UE to use the second access point name.

US Pat. No. 10,142,449

ELECTRONIC DEVICE WITH ROTATABLE BATTERY COVER

Fu Tai Hua Industry (Shen...

1. An electronic device comprising:a casing defining a receiving space in a back surface thereof, the receiving space being defined on an edge portion of the back surface, the receiving space configured for receiving a battery therein; and
a cover rotationally secured in the receiving space;
wherein the cover in a closed state is fully received in the receiving space to secure the battery;
wherein the cover in a first open state is at a 90 degree angle relative to the casing, the cover in the first open state is able to support the electronic device at an angle to be viewed and to uncover the battery to release heat from the battery;
wherein the cover in a second open state is at a 180 degree angle relative to the casing to uncover the battery to release heat from the battery; and
wherein the cover is rotatable between the closed state, the first open state, and the second open state;
wherein the cover comprises an axle received in a through hole defined in the cover, the axle received in the receiving space to rotationally secure the cover in the receiving space;
wherein the receiving space comprises a first wall and a pair of second walls, opposite ends of the axle being secured in the pair of second walls;
wherein each of the pair of second walls has a receiving hole defined therein, each end of the axle is received in a corresponding receiving hole to rotationally secure the axle in the receiving groove; wherein a first groove is defined in the back surface, the first groove comprises a first opening and a second opening, the first opening is defined on the back surface, and the second opening is defined on the first sidewall;
wherein the casing comprises a latching member and a first elastic member, the latching member and the first elastic member are received in the first groove, the latching member is L-shaped and protrudes through the first opening and the second opening, a first end of the first elastic member is fixed to the latching member, a second end of the first elastic member is fixed to an inner wall of the first groove;
wherein a notch is defined in an edge portion of the cover adjacent to the first groove, the latching member is elastically latched in the notch when the cover is in the closed state, the latching member is moved by an external force to unlatch from the notch to allow the cover to be rotated.

US Pat. No. 10,142,447

SYSTEM HAVING A PROTOCOL INDEPENDENT CONFIGURATION ENVIRONMENT

Honeywell International I...

1. A protocol independent mechanism for configuring one or more devices of a Heating Ventilation and Air Conditioning (HVAC) system, the mechanism comprising:a first device having a first protocol;
a second device having a second protocol; and
generic data points defined under the first device to store network variable values; and
wherein:
the first device has a first configuration in accordance with the first protocol and exporting the generic points defined under the first device stores the network variable values to retain the first configuration;
importing the network variable values for the second device obtains the first configuration of the first device that is conveyed to the second device such that the generic points defined under the first device are mapped and updated for generic points defined under the second device providing the second device with a second configuration in accordance with the second protocol; and
the generic data points hide a network variable interface configuration from a user.

US Pat. No. 10,142,445

CREATION, PUBLICATION AND DISPLAY OF CONTENT ON A SOCIAL MEDIA NETWORK

International Business Ma...

1. A method for publishing content on a social media network, said method implemented by a processor of a computing system, the method comprising steps of:receiving, in real-time by the processor, a request to publish content selected by a user; identifying, in real-time by the processor, an associated user to jointly publish the content selected by the user,
comparing, in real-time by the processor, the content with a repository of stored information about the associated user;
calculating, in real-time by the processor, as a function of the comparing step, a probability that the content selected by the user would be published independently by the associated user on the social media network;
computing, in real-time by the processor, a number of joint content viewers shared by the user and the associated user;
determining the probability, in real-time by the processor, as having a value greater than or equal to a pre-specified threshold value, wherein the pre-specified threshold value is a confidence interval having a level of confidence greater than or equal to a level of confidence selected by the user; and
in response to the determining, automatically publishing, in real-time by the processor, the content as a joint publication on the social media network, accessible for viewing by the joint-content viewers.

US Pat. No. 10,142,443

SYSTEM AND METHOD FOR AUTOMATICALLY INTEGRATING A DEVICE IN A NETWORKED SYSTEM

PHILIPS LIGHTING HOLDING ...

1. A method for automatically integrating a lighting device in a networked lighting system, the method comprising:detecting a new lighting device to be integrated in the networked lighting system,
determining a reference lighting device of the networked lighting system by comparing lighting capabilities of the new lighting device with lighting devices in the networked lighting system, the reference lighting device having lighting capabilities similar to that of the new lighting device, and
copying functionality of the reference lighting device to the new lighting device,
wherein determining the reference device of the networked system comprises determining a disconnected lighting device of the networked lighting system, disconnected from the networked system, and further comprises determining the lighting capabilities of the disconnected lighting device.

US Pat. No. 10,142,442

METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR ENABLING A DOWNLOADABLE SERVICE TO ACCESS COMPONENTS IN A MOBILE DEVICE

MASTERCARD INTERNATIONAL ...

1. A system for enabling a downloadable service to access components in a mobile device, the system comprising:a network server supporting a downloadable service application that, when executed by a processor of the network server, is configured to:
receive a capabilities object from a mobile device, wherein the capabilities object includes information that identifies a most recent state of at least one hardware component on the mobile device;
generate personalized downloadable service content based on the most recent state of the at least one hardware components in the received capabilities object, wherein the most recent state of the at least one hardware component indicates whether the at least one hardware component is active and available for use by the mobile device; and
provide the personalized downloadable service content to the mobile device, wherein the personalized downloadable service content is configured to access the at least one hardware component on the mobile device, wherein the personalized downloadable service content includes personalized web page content including one or more displayed web page interface options for utilizing the at least one hardware component, wherein the personalized web page content is modified prior to being sent to the mobile device by the network server to include at least one embedded protocol handler based on the at least one hardware component indicated to be active and available by the capabilities object that is received from the mobile device.

US Pat. No. 10,142,440

ENFORCED REGISTRY OF COOKIES IN A TIERED DELIVERY NETWORK

INTERNATIONAL BUSINESS MA...

1. A method, by a processor, for enforced registry of cookies in a computing network, comprising:extracting information of a cookie at a reverse proxy providing access to an application server, including extracting at least a path and cookie name from a set-cookie header information of the cookie at the reverse proxy;
obtaining cookie registration rules provided to the registry by an application on the application server such that the registry enables the reverse proxy to enforce compliance with the cookie registration rules for each cookie requesting access to the application;
comparing the extracted information of the cookie against the cookie registration rules provided to the registry by the application; and
suppressing the cookie from being relayed to the application upon determining the extracted information is non-compliant with the cookie registration rules while relaying the cookie to the application upon determining the extracted information is compliant with the cookie registration rules.

US Pat. No. 10,142,439

GENERATION OF APPLICATION CONTROL BLOCKS FOR AN IMS DATABASE USING A CACHE MEMORY

CA, Inc., New York, NY (...

1. A method comprising:performing by a processor of a database server:
intercepting an operating system supervisor call to a secondary storage device, the operating system supervisor call comprising a request for information from the secondary storage device for information associated with an information Management System (IMS) database being embodied in the secondary storage device;
determining whether the information that was requested is stored in a cache memory embodied in a primary storage device;
retrieving the information that was requested responsive to determining that the information that was requested is stored in the cache memory;
executing the operating system supervisor call to perform a read of the secondary storage device to obtain the information that was requested responsive to determining that the information that was requested is not stored in the cache memory;
storing the information that was requested in the cache memory responsive to executing the operating system supervisor call to obtain the information that was requested, wherein the information that was requested comprises IMS Database Definition (DBD) information stored in an IMS DBD library on the secondary storage device; and
generating an IMS Access Control Block (ACB) by merging the IMS DBD information with IMS Program Specific Block (PSB) information.

US Pat. No. 10,142,438

INTERMEDIATE DESTINATION MODULE FOR COMMUNICATION OF INTERACTION DATA WITH DISPARATE INTERMEDIATE DESTINATIONS

SAP SE, Walldorf (DE)

1. A processor-implemented system for transmitting documents via a computer network, comprising:at least one processor; and
a non-transitory computer readable media having computer executable instructions stored therein, which when executed by the at least one processor, causes the system to perform operations comprising:
receiving, via a network interface, interaction data from a first entity, the interaction data based on an interaction between the first entity and a second entity, wherein communicating from the first entity to the second entity requires transmitting the interaction data to a particular intermediate destination according to a predetermined data format:
determining the particular intermediate destination for the interaction data by querying a database to:
identify the particular intermediate destination associated with the second entity; and
identify data submission process steps for the particular intermediate destination, the data submission process steps include the predetermined data format and a particular protocol; and
generating intermediate interaction data from the interaction data according to the predetermined data format; and
transmitting the intermediate interaction data to the particular intermediate destination according to the particular protocol,
wherein the interaction data is further transmitted from the intermediate destination to the second entity, further wherein the database stores a plurality of destination records for a plurality of destinations reachable over a network and when the respective intermediate destination or the respective data submission process for any of the plurality of destinations changes, a respective database record in the database is updated to reflect the change.

US Pat. No. 10,142,437

PRIORITISING SIP MESSAGES

Metaswitch Networks Limit...

1. A method for prioritising forwarding of SIP messages in a network element, comprising the steps of:reading an opaque parameter of a received SIP message, the opaque parameter being related to one or more of a command sequence (CSeq) number of the received SIP message and a CSeq number of a further SIP message;
determining a priority of the received SIP message using the outcome of a comparison, the comparison being based on the opaque parameter of the received SIP message and a further parameter of the received SIP message;
wherein the further parameter is a CSeq number of the received SIP message; and
controlling forwarding of the received SIP message based on the determined priority.

US Pat. No. 10,142,436

ENHANCED MODE CONTROL OF CACHED DATA

Microsoft Technology Lice...

1. A device comprising:a cache storing data that is accessible to a plurality of client devices over a network;
a processor;
a memory having instructions stored thereon that, when executed by the processor, cause the device to:
determine that a broadcast server is in a first state in which the broadcast server is capable of broadcasting;
operate the device in a broadcast mode during which a portion of the data stored in the cache is updated in response to receiving a data update or a notification of the data update from the broadcast server, the data update or the notification of the data update identifying the portion of the data;
determine that the broadcast server has changed from the first state to a second state in which the broadcast server is incapable of broadcasting; and
switch operation of the device from the broadcast mode to a timer mode during which another portion of the data stored in the cache is updated in response to a cache time period elapsing, wherein the device communicates directly with one or more storage devices to fetch new cache data useable to update the other portion of the data stored in the cache while operating in the timer mode.

US Pat. No. 10,142,433

CLIENT DEVICE, DATA COMMUNICATION SYSTEM, DATA COMMUNICATION METHOD, AND PROGRAM

Mitsubishi Electric Corpo...

1. A client device comprising:a communication interface configured to communicate with a server; and
a client-device central processing unit (CPU) configured to execute a program stored in a client-device memory to provide:
a compression necessity determiner configured
to determine a necessity of compression of to-be-uploaded data to be uploaded to the server, and
to determine a necessity of compression of to-be-downloaded data to be downloaded from the server in response to a download request when content of the to-be-uploaded data indicates the download request to the server;
a data compressor configured to compress the to-be-uploaded data in a predetermined scheme when the compression necessity determiner determines that the compression of the to-be-uploaded data is necessary;
a data acquirer configured to acquire, from the communication interface, data transmitted from the server;
a decompression necessity determiner configured to determine a necessity of decompression of downloading data when the data transmitted from the server contains the downloading data;
a data decompressor configured to decompress the downloading data in a predetermined scheme when the decompression necessity determiner determines that the decompression of the downloading data is necessary; and
a data sender configured
to send, when the compression necessity determiner determines that the compression of the to-be-uploaded data is unnecessary, to the communication interface data in which a header is added to the to-be-uploaded data,
to send, when the compression necessity determiner determines that the compression of the to-be-uploaded data is necessary, to the communication interface data in which a header is added to the to-be-uploaded data compressed by the data compressor, the header containing information indicating that the to-be-uploaded data is compressed data, and
to store, in the header, information requesting compression of data when the compression necessity determiner determines that the compression of the to-be-downloaded data is necessary,
wherein the compression necessity determiner is configured to determine the necessity of compression of the to-be-downloaded data based on a size of the to-be-downloaded data and a decompression presence-absence time table in which a data size, a total processing time obtained by adding a processing time by the data decompressor to a processing time by the data acquirer when the downloading data is decompressed, and a processing time by the data acquirer when the downloading data is not decompressed are associated with one another.

US Pat. No. 10,142,432

REDIRECTION OF A SESSION INITIATION PROTOCOL INVITE

QUALCOMM Incorporated, S...

1. A method for wireless communication, comprising:receiving, by a multi-subscriber identification module user equipment (multi-SIM UE), a session initiation protocol (SIP) INVITE from a first user equipment (UE) requesting to establish a SIP session on a first network, the SIP INVITE including a first network address of the multi-SIM UE that is associated with a first SIM of the multi-SIM UE;
determining that a redirection criterion is satisfied; and
based at least in part on determining that the redirection criterion is satisfied, transmitting, by the multi-SIM UE in response to the SIP INVITE received from the first UE, a SIP redirection response including a second network address of the multi-SIM UE on a second network that is associated with a second SIM of the multi-SIM UE.

US Pat. No. 10,142,431

REAL-TIME INFORMATION FEED

1. A method in a server for providing a query application in response to service requests received from a client device over a wide area computer network, comprising:receiving from the client device an initial service request for the query application;
in response to the initial service request, sending to the client device one or more sets of instructions configurable in the client device to provide object models executable in a runtime engine of the client device for: (i) receiving input data from a user of the client device, (ii) sending the input data to the server in a further service request for the query application, (iii) receiving from the server a response to the further service request, and (iv) processing the response to the further service request for output to the user, wherein the object model for processing the response to the further service request executes concurrently with any of the object models for receiving input data, for sending the input data and for receiving from the server a response to the further service request; and
receiving one or more further service requests from the client device and sending to the client device responses to the further service requests.

US Pat. No. 10,142,429

WEB PRESENCE MANAGEMENT SYSTEM

CONDUCTOR, INC., New Yor...

1. A method for generating web presence data of an entity, the method comprising, by a web presence processor:receiving a request to generate the web presence data relating to the entity;
receiving first service data, wherein the first service data relates to a first web asset of the entity, the first web asset is among a first set of web assets indexed by a first marketing channel, and the first marketing channel is configured to produce a first search result;
receiving second service data, wherein the second service data relates to a second web asset of the entity, the second web asset is among a second set of web assets indexed by a second marketing channel, the second marketing channel is different from the first marketing channel, the second set of web assets is different from the first set of web assets, and the second marketing channel is configured to produce a second search result;
generating the web presence data from the first service data and the second service data, wherein at least some of the first service data and the second service data is transformed into at least some of the web presence data, and wherein the web presence data is configured to indicate one or more keywords and respective track status of the one or more keywords;
generating audience data that includes profile data of users of the first and second marketing channels; and
causing an output of the web presence data on a display to display the web presence of the entity across multiple channels.

US Pat. No. 10,142,428

OBSERVATION-BASED USER PROFILING AND PROFILE MATCHING

Invent.ly, LLC, Woodside...

1. A device for recording user behavior, comprising:one or more sensors configured to observe behaviors of a user; and
a communication module configured to communicate to/from an application server, wherein (i) said application server forms a user profile of said user based on said behaviors observed by said sensors, (ii) said user profile is used classify said user into a group with respect to at least one of a plurality of domains, (iii) said classification of said user is based on a plurality of scale factors applied to said observed behaviors, (iv) said scale factors are updated based on evaluating said classification of said user over time and (v) said application server is configured to match said user to one or more other users based on said group.

US Pat. No. 10,142,427

SYSTEMS AND METHODS FOR SERVICE AND SESSION CONTINUITY IN SOFTWARE DEFINED TOPOLOGY MANAGEMENT

HUAWEI TECHNOLOGIES CO., ...

1. A method for migration of a session from a first user plane function (UPF) to a second UPF, the session being associated with a first network path from a User Equipment (UE) to the first UPF via an access node communicative with the UE, the method comprising:selecting, by a session management component, the second UPF for communication with the User Equipment (UE);
sending, by the session management component, a session redirection setup request to the second UPF, the session redirection setup request including information identifying the first UPF;
receiving, by the session management component, a response from the second UPF to the session redirection setup;
sending, by the session management component, instructions for instantiation of a second network path, said path from the UE to the second UPF via the access node; and
sending, by the session management component, instructions to the access node, to migrate the session from the first UPF to the second UPF.

US Pat. No. 10,142,426

SYSTEM AND METHOD FOR IDENTIFYING COMMUNICATION SESSION PARTICIPANTS BASED ON TRAFFIC PATTERNS

VERINT SYSTEMS LTD., Her...

1. A method for identifying communication devices that serve as endpoints in the same communication session and for establishing correlations between the users of the communication devices, the method comprising:monitoring a plurality of traffic flows exchanged over a communication network;
determining respective temporal traffic features for the monitored traffic flows;
identifying communication devices that participate in a same communication session, by finding a match among respective temporal traffic features of the traffic flows exchanged by the communication devices;
wherein determining the temporal traffic features comprises generating a respective compressed-form signature for each of the traffic flows, and wherein finding the match comprises comparing among signatures of at least some of the traffic flows exchanged by the communication devices; and
wherein finding the match comprises matching the temporal traffic features between an inbound traffic flow of a first communication device and an outbound traffic flow of a second communication device.

US Pat. No. 10,142,425

SESSION RELIABILITY FOR A REDIRECTED USB DEVICE

Wyse Technology L.L.C., ...

17. A virtual desktop infrastructure environment comprising:a proxy that is configured to execute on a client; and
an agent that is configured to execute on a server, the proxy and agent interacting to establish a remote session including to redirect a device to the server for use within the remote session;
wherein, when the remote session is disconnected, the proxy and the agent are each configured to enable I/O requests pertaining to the device to be resumed after the remote session is restored by performing the following:
queuing any I/O requests pertaining to the device that are received after the remote session is disconnected;
waiting for a specified amount of time after the remote session is disconnected; and
when the remote session is restored prior to the specified amount of time elapsing, sending the queued I/O requests over the restored remote session.

US Pat. No. 10,142,424

TWO-LEVEL CLOUD SYSTEM MIGRATION

Empire Technology Develop...

1. A method performed by a system that includes a processor, the method comprising:facilitating establishing a first communication link between the system and a source device, wherein the source device comprises a plurality of data sets;
receiving, via the first communication link, at least a data set of the plurality of data sets, from the source device, by intercepting communications between a communication device and the source device;
storing at least the data set to a data store;
while receiving by the system the at least the data set, facilitating establishing a second communication link between the system and one or more communication devices for replacement of a direct communication link between the source device and the one or more communication devices,
wherein establishing the second communication link, while receiving by the system the at least the data set, facilitates continued access to the data set or another data set, by the one or more communication devices, via the second communication link;
receiving, via the second communication link, a request for the data set or the other data set of the plurality of data sets, wherein the request is received from a communication device of the one or more communication devices; and
processing the request received from the communication device of the one or more communication devices, wherein the processing the request comprises:
determining that the other data set is absent in the data store of the system;
receiving, based on the determination, the other data set from the source device via the first communication link by using an identifier of the communication device to communicate with the source device, wherein the usage of the identifier of the communication device facilitates the source device to determine that the request is received from the communication device; and
transferring, via the second communication link, at least a portion of the other data set to the communication device in response to the request, wherein the transferring is performed by the system using the identifier of the source device;
wherein the processing the request comprises initiating replication of a network service that is transparent to the communication device.

US Pat. No. 10,142,423

ACTIVE COMMUNICATION SESSION HANDOVER BETWEEN DIRECT AND RELAYED CONNECTIONS

Apple Inc., Cupertino, C...

1. A method for managing connections for an active communication session by a secondary wireless device, the method comprising:by the secondary wireless device:
engaging in a communication session with a remote device via a non-cellular wireless network, wherein the communication session directly terminates on the secondary wireless device;
determining performance of the non-cellular wireless network;
when the performance of the non-cellular wireless network does not satisfy a performance criterion and a primary wireless device is in proximity to the secondary wireless device:
providing an indication to the primary wireless device to cause the primary wireless device to transfer the communication session to terminate on the primary wireless device, wherein packets for the communication session are relayed via the primary wireless device to and from the secondary wireless device; and
blocking direct termination of communication sessions via the non-cellular wireless network at the secondary wireless device for at least a designated period of time by at least deregistering from an Internet Protocol Multimedia Subsystem (IMS) core network element;
after expiration of a timer associated with the designated period of time, re-evaluating performance of connections via the non-cellular wireless network; and
when the performance of the connections via the non-cellular wireless network satisfy the performance criterion after the expiration of the timer, allowing direct termination of communication sessions via the non-cellular wireless network at the secondary wireless device by at least re-registering with the IMS core network element.

US Pat. No. 10,142,422

CLUSTERING WEBSOCKET COMMUNICATIONS WITH CONFIGURABLE MASTER-SLAVE SERVERS

SAP SE, Walldorf (DE)

1. A computer-implemented method comprising:providing a document service storing server cluster information including a first cluster;
a first server receiving a first input specifying the first cluster;
in response to the first input, the first server referencing the document service to create a first master websocket handler and provide a first server address in the server cluster information;
a second server receiving a second input specifying the first cluster;
in response to the second input, referencing the document service to create a first slave websocket handler storing the first server address; and
causing the first slave websocket handler to establish a first websocket channel with the first master websocket handler using the first server address.

US Pat. No. 10,142,421

METHODS, SYSTEMS, AND RELATED ARCHITECTURES FOR MANAGING NETWORK CONNECTED DEVICES

Google LLC, Mountain Vie...

2. A device management system that manages a plurality of electronic devices over a network, comprising:a registration server configured to execute on one or more computers that receives metadata associated with an electronic device over a public network portion of the network and provisions an entry in a device registration pool referenced by the metadata that includes a device identifier and a public network address associated with the electronic device awaiting to be paired with a management account, wherein the device identifier identifies the electronic device and a public network address used by the electronic device to communicate over the public network portion of the network to the device management system;
an update server configured to execute on the one or more computers that attempts to update software of each of the electronic devices registered with the registration server if newer versions of the software exist than is currently running on each of the electronic devices corresponding to each entry in the device registration pool;
a pairing server configured to execute on the one or more computers that facilitates associating the electronic device with a management account and authorizes communication with the electronic device using the management account;
a front end user-interface server configured to execute on the one or more computers that facilitates generation of a user-interface for accessing one or more electronic devices from a computer device accessing the management account on the device management system; and
a backend server configured to execute on the one or more computers that manages access to data related to electronic devices registered with the device management system and organizes information received over the network related to conditions that are controlled or monitored by the registered electronic devices.

US Pat. No. 10,142,420

ON-BOARD WEB SERVER TELEMATICS SYSTEMS AND METHODS

Ford Global Technologies,...

1. A method comprising:receiving a request, including a vehicle identifier, for a network address of a web server of a vehicle;
accessing a database to retrieve a telephone number of the vehicle associated with the vehicle identifier;
sending a wake-up message, to the telephone number, requesting wake-up of the web server;
receiving a wake-up response from the vehicle including the network address of the web server; and
returning the network address responsive to the request.

US Pat. No. 10,142,419

ERASURE CORRECTING CODING USING DATA SUBSETS AND PARTIAL PARITY SYMBOLS

SANDISK TECHNOLOGIES LLC,...

1. A method comprising:receiving data that includes a set of data symbols;
determining multiple proper subsets of the set of data symbols, the multiple proper subsets including a first proper subset of the set of data symbols and a second proper subset of the set of data symbols, wherein the first proper subset includes a third proper subset of the first proper subset and a fourth proper subset of the first proper subset; and
generating a set of parity symbols based on the set of data symbols using an erasure correcting code, wherein the set of parity symbols includes a first parity symbol that is generated based on the first proper subset and further includes a second parity symbol that is generated based on the third proper subset,
wherein the first parity symbol enables recovery of a first data symbol of the first proper subset independently of the second proper subset, and
wherein the second parity symbol enables recovery of a second data symbol of the third proper subset independently of the fourth proper subset.

US Pat. No. 10,142,418

STORAGE MANAGEMENT DEVICE, STORAGE MANAGEMENT METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

FUJITSU LIMITED, Kawasak...

1. A storage management device comprising:a memory; and
a controller that acquires load information on a storage area group that includes a plurality of storage areas, and stores the load information in the memory,
calculates an entire bandwidth of the storage area group based on the acquired load information on the storage area group,
holds coefficients indicating rates of proportional distribution in an equation for calculating each individual bandwidth allocated to each of the plurality of storage areas at each process of the calculating,
acquires coefficients corresponding to a notified process upon receiving a notification of an executed process using the each of the plurality of storage areas,
calculates each individual bandwidth using acquired coefficients by performing a proportional distribution method and an equal distribution method, and
allocates each of the individual bandwidths to each of the storage areas.

US Pat. No. 10,142,416

METHODS FOR FACILITATING PLANNED DATA CONTAINER TRANSITIONS AND DEVICES THEREOF

NETAPP, INC., Sunnyvale,...

1. A method, comprising:mirroring, by a source computing device, dirty data to a destination computing device, the dirty data corresponding to storage operations not yet committed to one or more storage devices of an aggregate to be transitioned;
releasing, by the source computing device, ownership of the storage devices subsequent to mirroring the dirty data to the destination computing device; and
performing, by the source computing device, teardown processing for the aggregate subsequent to releasing ownership of the storage devices.

US Pat. No. 10,142,415

DATA MIGRATION

Hewlett Packard Enterpris...

1. A process for migrating data, comprising:analyzing data to be migrated from a first device, to identify data blocks containing content that is the same at an abstraction layer in the data;
constructing a content map having a plurality of entries respectively corresponding to a plurality of unique contents found at the abstraction layer, wherein each of the entries includes a list of one or more addresses at which the unique content corresponding to the entry can be found in the first device;
sending the unique contents from the first device to a second device;
writing the unique contents in the second device at addresses selected based on the content map and using the abstraction layer in the second device;
monitoring changes in the data that occur while analyzing the data, constructing the content map, sending the unique contents, and writing the unique content;
constructing a change map identifying the changes; and
correcting the contents in the second device to reflect the changes,
wherein correcting the contents comprises:
(a.) reading the change map from a monitor that constructs the change map;
(b.) resetting the monitor to begin monitoring of further changes to the data and begin constructing of a new change map;
(c.) in response to the change map most recently read from the monitor being empty, ending the migration process; and
(d.) in response to the change map most recently read from the monitor not being empty, correcting the data in the second device to reflect the changes in the change map most recently read from the monitor.

US Pat. No. 10,142,414

METHOD AND DEVICE FOR SHARING PICTURE

Xiaomi Inc., Beijing (CN...

1. A method for sharing a picture on a cloud server, comprising:identifying, by a cloud server comprising a memory and a processor in communication with the memory, a face feature in each picture in a cloud album in the cloud server;
performing, by the cloud server, a face cluster on the identified face feature in the each picture in the cloud album to obtain at least one face album, each of the at least one face album comprising pictures having a same face feature;
creating, by the cloud server, a shared album based on the at least one face album;
determining, by the cloud server, whether a picture to be synchronized to the shared album is present in a first terminal;
when it is determined that the picture to be synchronized to the shared album is present in the first terminal, determining, by the cloud server, whether a face feature in the picture corresponds to a predefined face feature in a first list, the first list being locally stored in the first terminal and including one or more predefined face features relating to people associated with the shared album; and
when it is determined that the face feature in the picture corresponds to the predefined face feature in the first list, storing, by the cloud server, the picture in the shared album.

US Pat. No. 10,142,413

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND COMMUNICATION CONTROL METHOD

Ricoh Company, Ltd., Tok...

10. A method of controlling communication in an information processing system, the method comprising:receiving, by an information processing apparatus, first data from an apparatus in the information processing system;
displaying, by a user interface of the information processing apparatus, a screen image;
receiving, by the user interface, second data that is stroke data input upon the screen image by a user of the user interface;
determining, by processing circuitry of the information processing apparatus, a transfer priority according to a data type of the first data and the second data and a source of the first data and the second data, wherein the processing circuitry grants the second data received via the user interface a higher priority than the first data received via the data receiver;
transferring the screen image to one or more apparatuses, including the apparatus from which the first data is received;
transferring the first data, and the second data to the one or more apparatuses in accordance with the transfer priority of the first data and the second data;
determining, after expiration of a predetermined data transfer period, whether data to be transferred during the predetermined data transfer period was not transferred during the predetermined data transfer period;
modifying, the processing circuitry when the data was not transferred during the predetermined data transfer period, the transfer priority of the data to be a higher priority than that of other data to be transferred to next; and
transferring the data having the modified transfer priority preferentially to the one or more apparatuses.

US Pat. No. 10,142,412

MULTI-THREAD PROCESSING OF SEARCH RESPONSES

Splunk Inc., San Francis...

1. A method, comprising:transmitting, by a computer system, a search request to a plurality of search peers of a data aggregation and analysis system;
receiving a plurality of data packets from the plurality of search peers;
parsing, by a first processing thread of the computer system, one or more data packets of the plurality of data packets, to produce a partial response to the search request; and
processing, by a second processing thread of the computer system, the partial response to produce a memory data structure representing an aggregated response to the search request.

US Pat. No. 10,142,411

DYNAMIC SWARM SEGMENTATION

Microsoft Technology Lice...

1. A system configured to identify peers for a plurality of clients to facilitate obtaining updates for the plurality of clients, the system comprising:one or more processors;
one or more computer-readable media coupled to the one or more processors;
wherein the one or more processors and one or more computer-readable media are configured to implement a peer determination service, wherein the peer determination service is configured to:
identify a dataset associated with the plurality of clients, the dataset comprising a plurality of byte ranges;
identify, for each given client of the plurality of clients, one or more byte ranges of the plurality of byte ranges of the dataset that each given client has already obtained;
identify, for each given client of the plurality of clients, one or more byte ranges of the plurality of byte ranges of the data set that each given client needs to obtain; and
based on the identification of byte ranges, organize the plurality of clients into a plurality of groups, each group both including one or more clients and corresponding to a different node of a hierarchical graph, each given node being associated with one or more byte ranges of the plurality of byte ranges of the dataset, such that each client of a group corresponding to the given node has already obtained or needs to obtain at least one byte range of the one or more byte ranges associated with the given node, at least one client of each group being configured to act as a peer to other clients of the group, the hierarchical graph comprising a plurality of nodes that range from one or more nodes having a smallest number of byte ranges to one or more nodes having a largest number of byte ranges, such that the hierarchical graph can be traversed from the one or more nodes having the smallest number of byte ranges to the one or more nodes having the largest number of byte ranges.

US Pat. No. 10,142,410

MULTI-MODE REMOTE COLLABORATION

Raytheon Company, Waltha...

1. A method for providing information for a collaboration between a remote communication device and a device connected to an internal network, the method comprising:determining a location of the remote communication device by at least one of a global positioning system (GPS), low frequency (LF) atomic time radio, earth magnetic signature, internet protocol (IP) address, and cell phone tower triangulation;
identifying regulations regarding communication from the internal network to the remote device based on the determined location and a location of the internal network;
identifying a bandwidth of a remote network, different from the internal network, to which the remote communication device is connected, the remote network communicatively accessible by the internal network;
estimating a battery life of the remote device and an amount of time the remote device can communicate with the device of the internal network using each of voice over internet protocol (VOIP) communication, hypertext transfer protocol (HTTP) communication, text communication, voice communication, video communication, and augmented reality communication;
selecting, based on the estimated battery life and the amount of time the remote device can communicate, a communication protocol including one of VOIP communication, HTTP communication, text communication, voice communication, video communication, and augmented reality communication;
configuring the remote device to transmit and receive communications in a manner compliant with the identified regulations and the selected communication protocol; and
transmitting VOIP communications, HTTP communications, text communications, voice communications, video communications, or augmented reality communications to the remote device based on the selected communication protocol, the estimated battery life and the identified bandwidth.

US Pat. No. 10,142,409

SYSTEM AND METHOD FOR IMPLEMENTING PNRP LOCALITY

Microsoft Technology Lice...

1. A method, comprising:determining, by one or more processors of a computing system, one or more network latencies between a host node and one or more peer nodes, wherein determining the one or more network latencies comprises probing at least one publisher of an address of a peer node and storing probe results in a cache; and
determining, by the one or more processors, a set of network coordinates of the host node in a coordinate space at least partly based on the one or more network latencies, the determining including:
determining whether the cache comprises probe results indicating one or more network latencies for at least d+1 peer nodes of the one or more peer nodes, d being an integer representing a dimensionality of the coordinate space; and
based at least partly on a first determination that the cache does not comprise the probe results indicating the one or more network latencies for the at least d+1 peer nodes, estimating the set of network coordinates of the host node; or
based at least partly on a second determination that the cache does comprise the probe results indicating the one or more network latencies for the at least d+1 peer nodes, calculating the set of network coordinates of the host node using d+1 network latencies.

US Pat. No. 10,142,408

HARDWARE LOADING ADJUSTING METHOD AND RELATED ELECTRONIC DEVICE

Winstron Corporation, Ne...

1. A hardware loading adjusting method, comprising:performing a first thread for receiving and decompressing the compressed data, to generate and to store decompressed data to a first storage module by a first speed;
performing a second thread for storing the decompressed data to a second storage module by a second speed; and
adjusting a ratio between the size of the compressed data and the decompressed data stored in the first storage module and the size of the first storage module according to the relationship between the first speed and the second speed.

US Pat. No. 10,142,406

AUTOMATED DATA CENTER SELECTION

Amazon Technologies, Inc....

1. A method for selecting a data center of a Program Execution Service (PES) platform, the method comprising:under control of a PES platform that includes a number of data centers, at least some of the number of data centers capable of providing a user with access to one or more computing resources hosted by said at least some of the number of data centers, at least some of the computing resources including compute nodes comprising virtual desktops that enable the user to access a plurality of services provided by the PES platform:
receiving a request at the PES platform to obtain access to a computing resource from a computing device of the user;
determining, from the number of data centers, a set of data centers that include the computing resource;
identifying a plurality of data centers from the set of data centers based, at least in part, on a latency factor of each of the plurality of data centers;
selecting a data center from the plurality of data centers using a tie breaking factor, the tie breaking factor based at least in part on a utilization rate for the data centers of the plurality of data centers;
accessing access rules associated with an entity, the access rules specifying rules for distributing computing resource access of different users of a group of users at the entity among different instances of the computing resource, the group of users one of multiple groups of users, and the group of users including the user, wherein the access rules specify for a first group of users from the multiple groups of users: 1) an amount of users permitted to access a first instance of the computing resource; 2) that no more than a first amount of users from the first group of users share physical computing resources; and 3) that users exceeding the first amount of users from the first group of users be assigned to a second instance of the computing resource, wherein each group of users is associated with a different role at the entity thereby reducing a number of users associated with a particular role that lose access to the computing resource when access to the first instance of the computing resource is lost, and wherein at least one user from a second group of users from the multiple groups of users is permitted to access the first instance of the computing resource;
determining whether granting the user of the computing device access to the computing resource at the data center will violate the access rules;
in response to determining that the access rules will be violated, selecting an alternative data center from the plurality of data centers, and
in response to determining that the access rules will not be violated by granting the user of the computing device access to the computing resource at the data center, granting the user of the computing device access to the computing resource at the data center.

US Pat. No. 10,142,404

INTER-PLATFORM MANAGEMENT OF COMPUTING RESOURCES

International Business Ma...

1. A computer-implemented method comprising:identifying a requesting virtual server residing on a primary computing platform, the requesting virtual server associated with a requesting client;
identifying a donating virtual server residing on the primary computing platform, the donating virtual server associated with a donating client;
identifying an external virtual server residing on a secondary computing platform outside the primary computing platform, the external virtual server associated with the requesting client;
determining a first resource exchange between the requesting virtual server and the donating virtual server, the first resource exchange including a total donation amount from the donating virtual server to the requesting virtual server; and
determining a second resource exchange between the external virtual server and a second virtual server residing on the secondary computing platform, the second virtual server associated with the donating client, the second resource exchange including a total adjustment amount from the external virtual server to the second virtual server;
wherein:
upon execution of the first resource exchange and the second resource exchange, the total donation amount is equal to the total adjustment amount.

US Pat. No. 10,142,403

METHOD AND APPARATUS FOR FACILITATING PARALLEL DISTRIBUTED COMPUTING

1. A computer-implemented method for facilitating parallel distributed computing, comprising:receiving at a receiving node from a requesting node an operator o1 and unevaluated expressions e1, e2, . . . , ek,
wherein k>0, and
wherein the requesting node is desiring a response to the request comprising an evaluated expression which corresponds to the result of applying the operator o1 to the unevaluated expressions e1, e2, . . . , ek;
sending to a node a1 unevaluated expression e1, sending to a node a2 unevaluated expression e2, . . . , and sending to a node ak unevaluated expression ek;
receiving at the receiving node from node a1 evaluated expression p1 in response to sending node a1 unevaluated expression e1, receiving from node a2 a evaluated expression p2 in response to sending node a2 unevaluated expression e2, . . . , and receiving from node ak evaluated expression pk in response to sending nodeak unevaluated expression uk;determining an operator o2 and unevaluated expressions c1, c2, . . . , cn based on the operator o1 and evaluated expressions p1, p2, . . . , pk, wherein n>2;
sending to a node f1 unevaluated expression c1, sending to a node f2 unevaluated expression c2, . . . , and sending to a node fn unevaluated expression cn;
receiving at the receiving node from node f1 evaluated expression g1 in response to sending node f1 unevaluated expression c1, receiving from node f2 a evaluated expression g2 in response to sending node f2 unevaluated expression c2, . . . , and receiving from node fn evaluated expression gn in response to sending node fn unevaluated expression cn;
determining an evaluated expression r based on the operator o2 and evaluated expressions g1, g2, and . . . gn; and
sending to the requesting node evaluated expression r, thus producing a result that indicates a response to receiving from the requesting node an operator o1 and expressions e1, e2, . . . , ek.

US Pat. No. 10,142,402

METHODS AND APPARATUSES FOR SENDING PROMPT MESSAGE TO CLOSE A MOVABLE ARTICLE

Xiaomi Inc., Beijing (CN...

8. An apparatus for sending a prompt message, comprising:a processor;
a memory configured to store an instruction executable by the processor;
wherein the processor is configured to:
receive a status of a movable article corresponding to a sensor;
obtain a working status of an air cleaner bound with the sensor when the movable article corresponding to the sensor is in an open status;
detect whether the working status of the air cleaner is an on status; and
send the prompt message to a user in a predetermined manner when it is detected that the working status of the air cleaner is the on status, wherein the prompt message is configured to indicate the user to close the at least one of the movable article in a room containing the air cleaner or to turn off the air cleaner.

US Pat. No. 10,142,400

CONTEXT-SENSITIVE INFORMATION RETRIEVAL

1. A system comprising:a processor; and
a memory, wherein the memory contains instructions that, when executed by the processor, cause the processor to:
receive from a first entity, over a wide area network, feature information for a feature of an application;
store the feature information in a first field of a first file;
receive from a second entity different from the first entity, over the wide area network, an address to a help topic associated with the feature information;
store the address in association with the feature information, in a second field of the first file;
receive a request from an application over a data communication network, wherein the request is transmitted in response to a command by a user in a contact center to receive help related to the feature of the application;
receive context information associated with the request, wherein the context information includes information gathered by the application in response to user interaction with the application, the context information including information on the user accessing the application and an identification of the feature, the context information further including user profile information, the user profile information including a language preference of the user;
select information to be output based on the received context information, wherein the instructions that cause the processor to select information to be output include instructions that cause the processor to:
retrieve over the wide area network the first file storing the address associated with the feature identified in the received context information;
invoke the address in the first file stored in association with the feature identified in the received context information, and retrieve, over the wide area network, help content identified by the address, the help content being stored in a second file different from the first file;
identify, based on the received context information, information specific to the user accessing the application;
customize the retrieved help content based on the identified information specific to the user; and
transmit to the application, as the selected information, the customized help content.

US Pat. No. 10,142,399

MINIMAL DOWNLOAD AND SIMULATED PAGE NAVIGATION FEATURES

MICROSOFT TECHNOLOGY LICE...

1. A server computer comprising:at least one processor device; and
a memory, operatively connected to the at least one processor, storing instructions, which when executed, cause the at least one processor device to:
receive an electronic page request from a user computer, the received electronic page request comprising a request to navigate from a previously rendered electronic page to a target electronic page;
determine whether to implement a normal page navigation operation or a minimal download operation, wherein the minimal download operation operates to provide a difference package associated with the previously rendered electronic page and the target electronic page;
provide, to the user computer in response to determining to implement the minimal download operation, a layer of indirection for page scripts and page objects of the previously rendered electronic page, wherein the layer of indirection provides controlled disconnect of events associated with the page scripts and the page objects of the previously rendered electronic page;
generate the difference package with information associated with differences between the previously rendered electronic page and the target electronic page, wherein the information comprises a representation of rendered contents to be updated on the previously rendered electronic page, the representation comprising an array of input fields associated with the previously rendered electronic page and the target electronic page; and
provide the difference package to the user computer, wherein the difference package enables the user computer to initiate page load events and execute the page scripts using the layer of indirection, thereby simulating the page load for the target electronic page.

US Pat. No. 10,142,398

METHOD AND SYSTEM FOR FILE TRANSFER OVER A MESSAGING INFRASTRUCTURE

International Business Ma...

1. A system for file transfer over a messaging infrastructure, comprising:a source for sending a file, including:
means for dividing the file into multiple portions including a first portion and at least one subsequent portion;
means for creating a message including a multiplicity of headers and payloads with an individual one of the headers and an individual one of the payloads for each of the multiple portions of the file, each of the payloads including a corresponding one of the multiple portions and being associated with a corresponding one of the message headers, wherein the one of the headers of a message for the first portion includes a hash for the first portion included in the message for the first portion, and the one of the headers of a message for any subsequent portion includes two different hashes:
a first hash summarizing a first state of the file up to, but not including, a current one of the portions included in the message for the subsequent portion, the first state indicating a state of the file that is required in order to add the current one of the portions to the file when recreating the file at a target computing device;
a second hash summarizing a second state of the file up to and including a current one of the portions included in the message for the subsequent portion, the second state indicating a state of a recreated file after having added the current portion to the file at the target computing device; and
means for sending each created message to the target computing device by way of a message queue,
wherein each of the payloads is filled from an end of free space available in the message so that space allocated for each of the headers is able to grow at a head of the message, while file data grows from a tail of the message allowing a single fixed size buffer to be used without moving data within the message as file portions are added.

US Pat. No. 10,142,397

NETWORK FILE TRANSFER INCLUDING FILE OBFUSCATION

International Business Ma...

1. A method, said method comprising:selecting, by a server computer, a re-ordering scheme from one or more re-ordering schemes for re-ordering chunks of an original file, wherein N denotes the total number of chunks in the original file, and wherein N is at least 2;
dividing, by the server computer, the file into the chunks;
after said dividing the file into the chunks, re-ordering, by the server computer, the chunks according to the selected re-ordering scheme to form an obfuscated file comprising the re-ordered chunks, wherein the selected re-ordering scheme specifies for each chunk in the original file a position of said each chunk in the obfuscated file, and wherein said re-ordering comprises performing N iterations such that in iteration I the position of chunk I in the obfuscated file is determined to be the position of chunk I specified in the selected re-ordering scheme, for I=1, 2, . . . N; and
sending, by the server computer to a client computer, the obfuscated file, using Hypertext Transfer Protocol (HTTP) Chunked Transfer Encoding, along with a scheme access reference consisting of a decoding key that points to the selected re-ordering scheme and enables the client computer to access and decode the selected re-ordering scheme,
wherein the method does not use a conventional encrypted file transfer in which a file to be sent unencrypted uses an encrypted secure transport, and
wherein the method does not use a conventional encrypted file transfer in which a file to be sent encrypted is encrypted before being sent and is decrypted after being sent.

US Pat. No. 10,142,396

COMPUTERIZED SYSTEM AND METHOD FOR DETERMINING AND COMMUNICATING MEDIA CONTENT TO A USER BASED ON A PHYSICAL LOCATION OF THE USER

OATH INC., New York, NY ...

1. A method comprising:receiving, at a computing device over a network, a request for a media file from a device of a user, said request comprising global positioning (GPS) data associated with the device at the time the request is communicated from the device to the computing device;
determining, via the computing device, a geographic location associated with the device of the user, said determination comprising parsing, via the computing device, the received request, identifying, based on said parsing, the GPS data included in the received request, and determining the geographic location referenced by the GPS data;
accessing, via the computing device, a collection of media files associated with a media platform;
parsing, via the computing device, each media file included in said collection, and based on said parsing, identifying metadata associated with each media file;
analyzing, via the computing device, the identified metadata of each media file using the determined geographical location as a query, and based on said analysis, identifying a first media file from the collection that is associated with said geographic location;
analyzing, via the computing device, the first media file, and based on said analysis, identifying a first user that uploaded the first media file to the media file platform, said first user being different than said user from which the request was received;
searching, via the computing device, the collection using an identity of the first user as a query, and based on said searching, identifying a set of media files within the collection that are associated with the first user;
determining, via the computing device, a number of media files the first user has uploaded to said media platform over a predetermined period of time, each media file associated with the geographic location;
comparing, via the computing device, said determined number to an activity threshold;
determining, via the computing device, a difference between a first timestamp of an initially uploaded media file by the first user and a most recently uploaded media file;
comparing, via the computing device, said determined difference to a time threshold;
determining, via the computing device, a classification of the first user, said classification determination comprising:
classifying the first user as a local when the activity threshold and the time threshold are both satisfied; and
classifying the first user as a tourist respective to the geographic location when only one of the activity threshold and time threshold are satisfied;
further analyzing, via the computing device, each media file in said set of media files of the first user, and determining, based on said analysis, visual content information and social metric information for each media file in the set;
determining, via the computing device, a score for each media file in the set based on the determined visual content information and social metric information of the respective media file;
ranking, via the computing device, each media file in the set based on the determined score, wherein the media files in the set with higher scores are ranked higher than those with lower scores;
determining, via the computing device, a subset of media files to be communicated to the user based on said classification of the first user; and
automatically communicating, via the computing device, said subset of the ranked media files of the first user to the user device in response to said request.

US Pat. No. 10,142,395

ACCESSING HARDWARE DEVICES USING WEB SERVER ABSTRACTIONS

Microsoft Technology Lice...

1. A method for accessing remote hardware devices, the method comprising:receiving by a web browser, configured to accept application programming interface (API) calls from a requesting application for initiating hardware device access, a Hypertext Transfer Protocol (HTTP) request via the API;
transmitting by the web browser the HTTP request to a remote hardware device server configured to provide access to a remote hardware device, the HTTP request including a request for establishing an authenticated session with the remote hardware device, the remote hardware device server being local to the remote hardware device;
upon establishment of the authenticated session, in response to a first API call from the requesting application for an action to be taken with respect to the remote hardware device, the web browser transmitting an HTTP request, including commands corresponding to the action to be taken with respect to the remote hardware device, to the remote hardware device server; and
receiving by the web browser a second API call from the requesting application for enabling the requesting application to receive at least one event notification related to the remote hardware device from the remote hardware device server.

US Pat. No. 10,142,393

COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. A communication apparatus comprising:an acquisition unit configured to acquire information regarding a number of Hypertext Transfer Protocol (HTTP) requests to be transmitted consecutively to another communication apparatus for communication with the another communication apparatus; and
a determination unit configured to determine a communication protocol,
wherein, in a case where the number of HTTP requests to be transmitted consecutively to the another communication apparatus is less than a threshold value, the determination unit is configured to determine a first communication protocol as a communication protocol to be used for communication with the another communication apparatus,
wherein, in a case where the number of HTTP requests to be transmitted consecutively to the another communication apparatus is not less than the threshold value, the determination unit is configured to determine a second communication protocol as a communication protocol to be used for communication with the another communication apparatus, and
wherein consecutive transmission of a plurality of HTTP requests based on a single transmission control protocol (TCP) connection is allowed in the second communication protocol.

US Pat. No. 10,142,391

SYSTEMS AND METHODS OF DIAGNOSING DOWN-LAYER PERFORMANCE PROBLEMS VIA MULTI-STREAM PERFORMANCE PATTERNIZATION

Quest Software Inc., Ali...

1. A method of diagnosing transient down-layer performance problems using virtual-meeting performance data, comprising, by a computer system:generating a time-based performance pattern of a plurality of virtual meetings of a communications platform executing in a computing environment, wherein the computing environment comprises a plurality of down-layer infrastructural resources that support meeting services of the communications platform and non-meeting services of other components of the computing environment;
determining, from the time-based performance pattern, at least one virtual-meeting attribute associated with relatively poor virtual-meeting performance as indicated by measured media-stream quality for the plurality of virtual meetings;
identifying virtual meetings, of the plurality of virtual meetings of the time-based performance pattern, that have the at least one virtual-meeting attribute associated with relatively poor virtual-meeting performance;
correlating, based at least partly on stored metadata, at least a subset of the identified virtual meetings to a particular down-layer infrastructural resource, of the plurality of down-layer infrastructural resources, that is at least partially responsible for executing each virtual meeting of the at least a subset;
examining a performance metric of the correlated at least a subset of virtual meetings that is illustrative of an infrastructural problem which is broader than the communications platform;
identifying a transient down-layer performance problem related to the particular down-layer infrastructural resource responsive to the examined performance metric satisfying a threshold; and
reporting the transient down-layer performance problem.

US Pat. No. 10,142,390

METHOD AND SYSTEM FOR PROVIDING CONTENT IN CONTENT DELIVERY NETWORKS

NEC CORPORATION, Tokyo (...

1. A method for providing content in content delivery networks having an upstream content delivery network, and a downstream content delivery network comprising at least two content delivery entities, wherein the upstream content delivery network and the downstream content delivery network are connected to each other and a user equipment is connected to the downstream content delivery network, the method comprising:receiving a request from the user equipment for a content stream for a content from the downstream content delivery network;
providing, by the upstream content delivery network, the content stream;
redirecting the content stream from the upstream content delivery network to a content delivery entity of the at least two content delivery entities in the downstream content delivery network, wherein the user equipment is connectable to the at least two content delivery entities;
providing, by the content delivery entity in the downstream content delivery network, the content stream to the user equipment, wherein the user equipment obtains an address of the content delivery entity in the downstream content delivery network from a manifest file generated by the upstream content delivery network; and
performing at least twice:
determining at least one of network information of the downstream content delivery network or user equipment information,
determining probabilities of optimized content stream performance to the user equipment for each of the at least two content delivery entities based on the determined at least one of network information of the downstream content delivery network or the user equipment information,
providing, by the upstream content delivery network, a next manifest file comprising an address of a different one of the at least two content delivery entities with a highest probability among the determined probabilities in response to a request from the user equipment that is triggered by meta-data included in a most recent manifest file that links to the next manifest file,
connecting the user equipment to the content delivery entity with the highest probability, and
redirecting the content stream to the content delivery entity with the highest probability for providing the content stream to the user equipment;
wherein time intervals are calculated for performing the steps that are performed at least twice using actual or previous user equipment information, wherein a time interval indicates how long a manifest file is valid.

US Pat. No. 10,142,389

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, COMMUNICATION TERMINAL, SERVER, AND CONTROL METHODS AND CONTROL PROGRAMS THEREOF

NEC Corporation, Tokyo (...

1. An information processing system, comprising:a communication device; and
a server,
wherein the communication device comprises:
a first memory storing first instructions; and
at least one first processor configured to execute first instructions load a file;
determine whether the communication device has an application that can process the loaded file and generate, from the processed file, output data in an outputtable data format to be output at the communication device;
when it has been determined that the communication device does not have the application, connect the communication device with the server via a wireless communication network and transmit, to the server, a first request with information used to generate the output data in the outputtable data format, of supplying the output data in the outputtable data format by processing the file and generating the output data from the processed file;
receive the output data in the outputtable data format, transmitted from the server connected via the wireless communication network in response to a second request transmitted to the server; and
output the received output data in the outputtable data format without any data conversions, and
wherein the server comprises:
a second memory storing second instructions; and
at least one second processor configured to execute the second instructions to:
acquire the file and the information used to generate the output data in the outputtable data format from the communication device in response to the first request received from the communication device;
select, in accordance with the acquired file and the acquired information, an application that can process the acquired file and generate the output data in the outputtable data format from the processed file;
execute the selected application to process the acquired file and to generate the output data in the outputtable data format from the processed file;
accumulate the generated output data in the outputtable data format in an accumulator; and
when receiving the second request from the communication device, transmit the generated and accumulated output data in the outputtable data format to the communication device via the wireless communication network.

US Pat. No. 10,142,387

DISTRIBUTED COORDINATION OF NETWORK ELEMENTS FOR PACKET ENCAPSULATION

Cisco Technology, Inc., ...

1. A method comprising:at each of a plurality of encapsulator devices comprising a master encapsulator device and one or more slave encapsulator devices, receiving a source stream of encoded packets in a first transport format;
at the master encapsulator device, generating a preliminary plan for converting the encoded packets of the source stream to packets of a master output stream in a second transport format for communication over a data network, wherein the preliminary plan identifies a plurality of the encoded packets of the source stream corresponding to each packet of the master output stream;
at the master encapsulator device, generating a preliminary mapping stream that comprises information identifying the plurality of the encoded packets of the source stream that are used to generate each of the packets of the master output stream according to the preliminary plan;
sending the preliminary mapping stream from the master encapsulator device to the one or more slave encapsulator devices;
receiving feedback from the one or more slave encapsulator devices, the feedback comprising an evaluation of the preliminary plan at the one or more slave encapsulator devices;
updating the preliminary plan with the feedback received from the one or more slave encapsulator devices to generate a finalized plan;
generating a finalized mapping stream that comprises updated information identifying an updated plurality of encoded packets of the source stream that are used to generate each of the packets of the master output stream according to the finalized plan;
sending the finalized mapping stream from the master encapsulator device to the one or more slave encapsulator devices; and
at each of the one or more slave encapsulator devices, using the updated information in the finalized mapping stream to generate a slave output stream according to the finalized plan, wherein each slave output stream is identical to the master output stream.

US Pat. No. 10,142,386

DETERMINING MANIFEST FILE DATA USED IN ADAPTIVE STREAMING VIDEO DELIVERY

DLVR, INC., Phoenix, AZ ...

1. A system for analyzing adaptive streaming video delivery performance, the system comprising:a first content delivery network (CDN), comprising one or more segment file servers, and further comprising:
a processing unit including one or more processors; and
memory coupled with and readable by the processing unit and storing therein one or more sets of instructions;
wherein the execution of the one or more sets of instructions by the one or more processors, causes the first CDN to:
receive, from a recipient device, a plurality of requests for a plurality of video segment files, each said request requesting a particular video segment file, wherein the plurality of video segment files correspond to a portion of a delivery of a first adaptive streaming video controlled by a first manifest file stored at the recipient device, wherein one or more other portions of the first adaptive streaming video are not delivered by the first CDN, but are delivered by one or more other CDNs operated separately from the first CDN;
determine one or more video streaming characteristics stored within the first manifest file stored on the recipient device, based on the requests for the video segment files received by the first CDN;
in response to each of the plurality of requests for a particular video segment file, transmit the particular requested video segment file to the recipient device, via the one or more segment file servers; and
collect data metrics corresponding to the transmission of the particular requested video segment files from the first CDN to the recipient device; and
a manifest file serving system including one more or servers, each server in the manifest file serving system comprising:
a processing unit including one or more processors; and
memory coupled with and readable by the processing unit and storing therein a set of instructions;
wherein the execution of the one or more sets of instructions by the one or more processing units, causes the one or more servers of the manifest file serving system to:
receive the data metrics corresponding to the transmission of the requested video segment files from the first CDN to the recipient device;
determine, based at least in part on the data metrics from the first CDN, one or more performance metrics associated with the one or more other CDNs operated separately from the first CDN;
receive a manifest file request for an adaptive streaming video from a client device;
select one or more CDNs to be referenced in a manifest file responsive to the manifest file request, based at least in part on the determined performance metrics associated with the other CDNs operated separately from the first CDN;
configure a manifest file including one or more Uniform Resource Locators (URLs) referencing video segment files corresponding to portions of the adaptive streaming video, wherein the video segment files referenced by the URLs are provided by the one or more selected CDNs; and
transmit the configured manifest file to the client device in response to the manifest file request.

US Pat. No. 10,142,385

MULTI-SERVICE INITIALIZATION FOR ADAPTIVE MEDIA STREAMING

QUALCOMM Incorporated, S...

1. A method for receiving media content in a communication device, comprising:receiving, by a processor of the communication device, an initialization segment associated with a first media broadcast in a first channel;
requesting, by the processor, a second media broadcast in a second channel that is different from the first channel;
receiving, by the processor, an indication that the initialization segment is also associated with the second media broadcast, wherein the received indication includes a notification that a frequency of the initialization segment is being changed or identifies a changed initialization segment frequency;
receiving, by the processor, initialization segments at the changed initialization segment frequency; and
processing, by the processor, the second media broadcast using the initialization segment at the changed initialization segment frequency.

US Pat. No. 10,142,384

DISTRIBUTING COMMUNICATION OF A DATA STREAM AMONG MULTIPLE DEVICES

1. A method comprising:associating, by executing an instruction with a processor of a distribution system, a sharing code including alphanumeric data with a shared connection, the shared connection to be established to distribute communication of a complete data stream among multiple devices, the associating of the sharing code with the shared connection being performed in response to a first request received from a first device;
transmitting, by executing an instruction with the processor, the sharing code from the distribution system to the first device in response to the first request;
receiving a second request including the sharing code from a second device different from the first device, the second request having been sent by the second device to a first network address of the distribution system;
splitting, by executing an instruction with the processor, the complete data stream into a plurality of partial data streams corresponding to respective portions of the complete data stream, the partial data streams to be transmitted from the distribution system to respective ones of the multiple devices, including the second device, to combine available bandwidths of the multiple devices to realize the shared connection; and
in response to receiving the second request including the sharing code from the second device, establishing, by executing an instruction with the processor, a data connection via which a first partial data stream corresponding to a first portion of the complete data stream is to be transmitted from the distribution system to the second device.

US Pat. No. 10,142,383

METHOD FOR DELIVERING MUSIC CONTENT TO A SMART PHONE

1974 PRODUCTIONS, INC., ...

1. A method of distributing media content using mobile communication devices, comprising:providing digital media access cards, the digital media access cards promoting selected media content and containing enciphered information;
allowing a user of a mobile communication device to be granted access to a digital media access card;
generating an identification number, the identification number associated with the selected media content;
deciphering the enciphered information to create deciphered information, the deciphered information allowing the user to access a web server associated with the digital media access cards with the user's mobile communication device and download application software enabling the user to access the selected media content with the user's mobile communication device, the deciphered information further including machine-readable code corresponding to the identification number, whereby the application software facilitates reading the machine readable code with the mobile communication device and transmitting the code to the web server with the mobile communication device;
receiving the identification number with the web server and using the identification number to locate a table value in a database wherein identification numbers from a plurality of media access cards are each associated with a table value corresponding to media content associated with the access cards; and
using the table value to identify a media code associated with the selected media content in a content server whereupon the media code is transmitted to the mobile communications device whereby the mobile communication device may transmit the media code to the content server, the content server transmitting the selected media content to the mobile communication device upon receiving the media code from the mobile communication device.

US Pat. No. 10,142,381

SYSTEM AND METHOD FOR SCALABLE CLOUD SERVICES

IntelliVision Technologie...

1. An event recognition system, said system comprising:an event recognition module:
a processor-controlled video camera;
a client computerized device;
a processor;
a non-transitory storage medium coupled to the processor;encoded instructions stored in the non-transitory storage medium, which when executed by the processor, causes the processor to:analyze a computed pixel value from at least one zone of at least one event-detected image frame captured from at least one processor-controlled video camera;reference said zone-specific value against at least one of a pre-defined or learned reference table of event-recognized computed pixel values;retrieve at least one of a recognized event from the reference table based on a threshold-grade match of least one of pixel values, zone-dependent pixel values, analysis of pixel values, metadata and, or a hash map, wherein said recognized event is at least one of a recognition of a face, person, group, object, movement, action, intrusion, specific location, vehicle, vehicle/license plate, impact, or aberrant sound; andtransmit at least any one of a single stream of the recognized event or a single stream of an audio-video sequence succeeding and, or preceding the recognized event, and including the recognized event, to a client device,wherein a contextual data comprising information of the recognized event is overlaid on the single stream; and in response to a determination that the processor-controlled video camera is improperly operating, transmit a status message indicating that the processor-controlled video camera is improperly operating to the client computerized device.

US Pat. No. 10,142,380

JOINING EXECUTABLE COMPONENT TO ONLINE CONFERENCE

Microsoft Technology Lice...

1. A system comprising: a user interface presentation component that causes, at least under one circumstance, a user interface to be presented on a display of the system, the user interface comprising at least:an online conference portion that shows a separate visualization for each of a plurality of participants in an online conversation that involves at least audio and video; and
a contacts portion that is visually separated from the online conference portion and that concurrently includes separate visualizations within the contacts portion for each of one or more individuals and each of one or more executable components that can be joined to the online conversation as participants, wherein each of the one or more executable components comprises computer executable code configured to cause an action associated with the executable component to occur within the online conversation when the executable component is joined to the online conversation as a participant of the online conversation; and
a joining component that joins participants into the online conversation when an instruction to join the participants into the online conversation is detected, wherein when an instruction to join a particular executable component of the one or more executable components from the contacts portion into the online conversation is detected, the joining component causes the particular executable component to be joined to the online conversation such that the action associated with the particular executable component occurs within the online conversation.

US Pat. No. 10,142,377

RELEVANCY IMPROVEMENT THROUGH TARGETING OF INFORMATION BASED ON DATA GATHERED FROM A NETWORKED DEVICE ASSOCIATED WITH A SECURITY SANDBOX OF A CLIENT DEVICE

FREE STREAM MEDIA CORP., ...

1. A system comprising:a client device capable of being associated with a plurality of networked devices through a computer network to:
process an embedded object,
constrain an executable environment in a security sandbox, and
execute a sandboxed application in the executable environment, the embedded object being processed through the sandboxed application; and
a relevancy-matching server to:
receive primary data generated from fingerprint data of each of the plurality of networked devices,
match the primary data with targeted data based on a relevancy factor,
search a storage for the targeted data, and
cause rendering of the targeted data through the embedded object processed through the sandboxed application of the client device,
wherein the primary data is any one of a content identification data and a content identification history.

US Pat. No. 10,142,376

METHOD, AND RELATED APPARATUS FOR RECOVERING CALLED SERVICE OF TERMINAL

Huawei Technologies Co., ...

1. A method for recovering a called service of a user terminal performed by a serving call session control function (S-CSCF), the method comprising:receiving a called request of the user terminal;
determining an initial proxy-call session control function (P-CSCF) entity with which the user terminal currently registers is faulty;
selecting an available P-CSCF for the user terminal;
notifying the available P-CSCF to trigger the user terminal to re-initiate IP Multimedia Subsystem (IMS) registration; and
delivering the called request to a re-registered P-CSCF to bear the called service of the user terminal after the user terminal completes the IMS registration.

US Pat. No. 10,142,375

CONTENT ENABLING SYSTEM

1. A system for remote acquisition of digital information, comprising:a content enabling device having a wireless interface for providing wireless connectivity to a content enabled region surrounding the content enabling device;
a sensory content apparatus or item for presenting sensory stimulus corresponding to digital content to a user of a mobile device, the mobile device being within the content enabled region configured to generate and transmit a token including at least one content ID parameter of a location of the mobile device in response to an actuation of the mobile device by the user at a specific time;
a content management server configured to store the digital content corresponding to the content enabling device and configured with a location of the content enabling device and an area of the content enabled region, the content management server being further configured to
receive the token from the mobile device,
determine if the location of the mobile device in the token is within the content enabled region, and
transmitting the digital content to the mobile device or a cloud based user account when the location of the mobile device is determined to be within the content enabled region.

US Pat. No. 10,142,372

METHODS AND SYSTEMS FOR PROTECTING A SECURED NETWORK

Centripetal Networks, Inc...

1. A method comprising:receiving, by a server and from a first computing device, a first security update comprising a first set of network addresses;
updating, by the server, one or more rules stored in a memory of the server to include the first set of network addresses;
receiving, by the server and from a second computing device, a second security update comprising a second set of network addresses;
determining, by the server, that the second set of network addresses includes at least a portion of network addresses included in the first set of network addresses;
responsive to determining that the second set of network addresses includes the at least a portion of network addresses included in the first set of network addresses:
identifying, by the server, the at least a portion of network addresses included in the first set of network addresses;
identifying, by the server, at least one of the one or more rules stored in the memory of the server that specifies a range of network addresses comprising the at least a portion of network addresses included in the first set of network addresses; and
updating, by the server, the at least one of the one or more rules to include one or more other network addresses included in the second set of network addresses;
transmitting, by the server and to at least one packet security gateway, at least one of the one or more updated rules:
causing executing, by the packet security gateway and on a packet by packet basis, one or more rules in time-shifted phases, wherein the executing comprises:
executing, by the at least one packet security gateway, a first rule during a first period of time based on a first subset of network addresses:
executing, by the at least one packet security gateway, a second rule during a second period of time based on a second subset of network addresses: and
executing, by the at least one packet security gateway, a third rule during a third period of time based on a third subset of network addresses,
wherein the first period of time is followed by the second period of time, and the second period of time is followed by the third period of time, and
wherein the first subset of network addresses is smaller than the second subset of network addresses, and the second subset of network addresses is smaller than the third subset of network addresses.

US Pat. No. 10,142,371

AUTHORIZATION POLICY CUSTOMIZATION AND AUTHORIZATION POLICY LOCKDOWN

ORACLE INTERNATIONAL CORP...

1. A computer-implemented method comprising:receiving, from an administrative computer within a cloud services environment, a request to upgrade a cloud service application associated with a plurality of authorization policy artifacts, wherein:
upgrading the cloud service application comprises upgrading the plurality of authorization policy artifacts,
the cloud service application is provided as a service to a plurality of companies,
the plurality of authorization policy artifacts comprise customized authorization policy artifacts that are customized for at least one of the plurality of companies, and
the plurality of authorization policy artifacts comprise non-customized authorization policy artifacts that are not customized for any of the plurality of companies;
in response to receiving the request to upgrade the cloud service application, analyzing the plurality of authorization policy artifacts to identify a first subset of the plurality of authorization policy artifacts comprising the non-customized authorization policy artifacts and a second subset of the plurality of authorization policy artifacts comprising the customized authorization policy artifacts;
upgrading the first subset of the plurality of authorization policy artifacts based on the analyzing the plurality of authorization policy artifacts;
requesting input for the second subset of the plurality of authorization policy artifacts based on the analyzing the plurality of authorization policy artifacts; and
upgrading the second subset of the plurality of authorization policy artifacts based on the input.

US Pat. No. 10,142,369

METHOD AND SYSTEM FOR PROCESSING A STREAM OF INFORMATION FROM A COMPUTER NETWORK USING NODE BASED REPUTATION CHARACTERISTICS

ThreatMETRIX PTY LTD, Ch...

1. A method, implemented in a computer system that includes at least one processor and at least one storage device, for determining a reputation of a node in a context using information received electronically from a plurality of submitters, the method comprising:receiving, using the at least one processor, first information about one or more nodes from a first submitter of the plurality of submitters and second information about one or more nodes from a second submitter of the plurality of submitters, the one or more nodes being associated with a network;
identifying, using the at least one processor, a first reputation of the first submitter in the context and a second reputation of the second submitter in the context from a knowledge base,
wherein a reputation of a submitter in a given context is based at least on assertions associated with past behavior of the submitter in the given context and attributes from each of the other submitters of the plurality of submitters, each assertion from each submitter of the other submitters of the plurality of submitters weighted by a reputation of the submitter in the given context;
calculating, using the at least one processor, a node reputation of the node in the context based upon at least the first reputation of the first submitter in the context and the first information received from the first submitter and the second reputation of the second submitter in the context and the second information received from the second submitter,
wherein the node reputation of the node in a context is determined by calculating a sum of assertions from the submitter with respect to the context weighted by each submitter's reputation in the context, wherein the node reputation is expressed as a rational number based on normalized assertions, wherein a normalized assertion is expressed as:

where A denotes an assertion, Asxc is an assertion submitted by a submitter S in a context C about node X, and Asic is an assertion submitted by submitter S about node i, i=1 to n, and n is an integer;
transferring, using the at least one processor, the node reputation to a user of the computer system, and
developing and/or updating a knowledgebase intrusion detection system by applying the calculated node reputation.

US Pat. No. 10,142,368

FACILITATING REMOTE ACCESS OF DEVICES IN A SECURE ENVIRONMENT

UNITED PARCEL SERVICE OF ...

1. A computer implemented method, operated via a computer memory, comprising:receiving via a first encrypted connection using a first protocol, at a computing device running an application belonging to a first domain, cross-domain communication comprising a request for instructions for a peripheral device belonging to a second domain distinct from the first domain, the instructions comprising instructions for printing that include a native command language of the peripheral device, wherein the peripheral device is connected to a user computing entity and comprises a printer, scanner or a scale;
providing, from the application to a server outside of the second domain, the request for instructions over a second connection using a second protocol, wherein the server is located in a third domain distinct from the first and second domain, the first protocol is Hyper Text Transfer Protocol Secure and the second protocol is a remote method invocation (RMI);
responsive to receiving the request at the server, providing, from the server to the application, shipping or labeling information comprising the instructions over the second connection using the second protocol; and
providing, to the user computing entity, the shipping or labeling information comprising the instructions over the first encrypted connection using the first protocol for facilitating package shipping and remote control of the peripheral device.

US Pat. No. 10,142,367

SYSTEM AND METHOD FOR CREATION, DEPLOYMENT AND MANAGEMENT OF AUGMENTED ATTACKER MAP

ILLUSIVE NETWORKS LTD., ...

1. A system for network surveillance to detect attackers, comprising:a deception management server within a network of resources, comprising a deployment module managing and planting one or more decoy lateral attack vectors in one or more of the resources in the network, wherein a lateral attack vector is an object in memory or storage of a first resource in the network that may be used to access a second resource in the network; and
one or more decoy servers accessible from resources in the network, each decoy server comprising:
an alert module that issues an alert when a specific resource in the network accesses the decoy server via one or more of the decoy lateral attack vectors planted in the specific resource by said deployment module; and
a delay module, purposely delaying incoming connections to the decoy server while a resource accesses the decoy server, in order to allow additional time to monitor activity on the decoy server.

US Pat. No. 10,142,366

METHODS, SYSTEMS AND DEVICES TO MITIGATE THE EFFECTS OF SIDE EFFECT URLS IN LEGITIMATE AND PHISHING ELECTRONIC MESSAGES

VADE SECURE, INC., San F...

1. A computer-implemented method, comprising:receiving and storing an electronic message, in a memory of a computing device coupled to a computer network, the electronic message containing a uniform resource locator (URL);
parsing the URL in the electronic message stored in the memory of the computing device and identifying at least one original parameter in the URL, the at least one original parameter comprising a sequence of characters;
determining a length of the at least one original parameter;
determining a statistical distribution of lowercase letters, uppercase letters and/or numbers of the at least one original parameter;
determining a type of the identified at least one original parameter, the determined type being one of a plurality of predetermined types of parameters only when the length of the at least one original parameter is determined to be at least a predetermined minimum length and when the statistical distribution is determined to be consistent with normal distributions of such lowercase letters, uppercase letters and/or numbers;
transforming the identified at least one original parameter according to one of a plurality of parameter transformation rules selected according to the determined type to generate at least one transformed parameter;
reassembling the URL by substituting the at least one transformed parameter for the at least one original parameter;
accessing, over the computer network, the website pointed to by the reassembled URL using the at least one transformed parameter if the reassembled URL meets a predetermined minimum criterion,
foregoing accessing the reassembled URL if the reassembled URL does not meet the predetermined minimum criterion; and
analyzing a response of the accessed website to the at least one transformed parameters to determine whether the URL is a side effect URL.

US Pat. No. 10,142,365

SYSTEM AND METHODS FOR RESPONDING TO CYBERSECURITY THREATS

The Boeing Company, Chic...

1. A cyber-security monitoring (CSM) computer device for responding to cybersecurity threats, said CSM computer device comprising a processor in communication with a memory, said processor configured to: monitor a virtual network including plurality of virtual machines; detect a cybersecurity threat to a first virtual machine of the plurality of virtual machines; generate a second virtual machine based on an uncompromised version of the first virtual machine; adjust the second virtual machine to resist the cybersecurity threat; disconnect the first virtual machine from the virtual network to prevent communication between the first virtual machine and the plurality of virtual machines included in the virtual network; connect the second virtual machine to the virtual network in place of the first virtual machine, and subsequent to the disconnect of the first virtual machine, spoof one or more commands from the first virtual machine in response to the cybersecurity threat.

US Pat. No. 10,142,364

NETWORK ISOLATION BY POLICY COMPLIANCE EVALUATION

Upguard, Inc., Mountain ...

1. A method comprising:maintaining, in an internal network, a plurality of internal nodes, each node of the plurality of internal nodes comprising a corresponding node configuration;
receiving, at the internal network, network traffic from an outside network;
analyzing, by a node of the internal network, the node configuration of a first node of the internal network and the received network traffic;
calculating, in real-time and based on the analysis of the node configuration, a network vulnerability score, the network vulnerability score measuring the vulnerability of the network to malicious action;
determining if the network vulnerability score is below a vulnerability threshold;
responsive to determining that the network vulnerability score is below the vulnerability threshold, isolating the internal network from the outside network by instructing a DNS server of the internal network to prevent resolution of DNS requests from the outside network; and
after isolating the internal network:
reconfiguring the first node of the internal network;
simulating the received network traffic on the isolated network including the reconfigured first node;
calculating a simulated network vulnerability score based on the simulated received network traffic and measuring the expected vulnerability of the network to malicious action if the network were not isolated from the outside network; and
in response to the simulated network vulnerability score exceeding the vulnerability threshold, reversing the isolation of the internal network from the outside network.

US Pat. No. 10,142,363

SYSTEM FOR MONITORING AND ADDRESSING EVENTS BASED ON TRIPLET METRIC ANALYSIS

Bank of America Corporati...

1. A system for monitoring and addressing events based on triplet metric analysis, the system comprising:one or more memory devices; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute computer-readable program code to:
transmit control signals to cause a vendor database system to continuously monitor a vendor database for a new data input and, in response to identifying the new data input, automatically transmit the new data input to the system, wherein the new data input comprises at least a threat actor, a threat means, and a targeted asset;
receive the new data input from the vendor database system, wherein the new data input comprises unformatted text of prose-form messages;
apply an optical character recognition process to the unformatted text of prose-form messages to extract and identify the threat actor, the threat means, and the targeted asset;
identify a threat actor value based on a comparison of the threat actor to an actor value database, wherein the threat actor value comprises a scalar representation of capabilities of the threat actor;
identify a threat means value based on a comparison of the threat means to a means value database, wherein the threat means value comprises a scalar representation of effectiveness of the threat means;
identify a targeted asset value based on a comparison of the targeted asset to an asset value database, wherein the targeted asset value comprises a scalar representation of exposure potential of the targeted asset;
calculate a threat-based exposure value with a threat-based exposure model that is based at least on the identified threat actor value, the identified threat means value, and the identified targeted asset value, wherein the threat-based exposure model comprises:
R=|avb|sin(?)sin(?)
wherein:
R is the threat-based exposure value calculated with the threat-based exposure model;
a is the identified threat actor value;
v is the identified threat means value;
b is the identified targeted asset value;
? is a degree of relation between the threat actor and the threat means; and
? is a degree of relation between the targeted asset and a combination of the identified threat actor and the identified threat means;
calculate a total threat-based exposure value as a sum of R and a plurality of different threat-based exposure values associated with different combinations of threat actors, threat means, and targeted assets;
in response to calculating the threat-based exposure value, transmit control signals configured to cause a computing device system associated with a user to display a three-dimensional representation of the threat-based exposure model;
receive, from the user interface of the computing device system associated with the user, instructions to print the threat-based exposure model; and
in response to receiving instructions to print the threat-based exposure model, transmit control signals configured to cause a three-dimensional printer system to print the threat-based exposure model.

US Pat. No. 10,142,362

CLOUD BASED SYSTEMS AND METHODS FOR DETERMINING SECURITY RISKS OF USERS AND GROUPS

Zscaler, Inc., San Jose,...

1. A method comprising:monitoring and managing, by one or more servers in a cloud-based security system, entities comprising users or groups of users via an in-line manner where the entities connect to the Internet through the cloud-based security system and where the cloud-based security system is external from the entities and associated enterprise networks, wherein the in-line manner comprises traffic between an entity and the Internet being processed through the cloud-based security system;
maintaining logs of transactions monitored through the cloud-based security system via the in-line manner;
obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions;
performing empirical scoring on normalizing the plurality of attributes for ranking risky entities, wherein the empirical scoring comprises categorizing violations detected via the in-line manner and based on security policy into categories and applying modifiable weightings thereto and determining a risk score as a weighted combination of normalized scores for each of the categories, wherein the categories are related to infections, malware, and suspicious behavior, wherein the weighted combination includes weights for severity of the categories and for length of time of infection of each category;
identifying the risky entities based on one of the empirical scoring and analytics; and
updating policies and/or monitoring for the risky entities in the cloud-based security system based on the identifying, wherein the updated policies adjust what functionality the risky entities are allowed to perform on the Internet enforced via the in-line manner by the cloud-based security system, and wherein the updated monitoring intensifies the monitoring via the cloud-based security system.

US Pat. No. 10,142,361

LOGIN CREDENTIAL ALERT SYSTEM

VISA INTERNATIONAL SERVIC...

1. A method comprising:receiving, by a first computer from an internet traffic monitoring computer, a decrypted username associated with a data breach at a first organization, wherein the internet traffic monitoring computer performed steps including:
receiving an encrypted username from a transaction computer, issuer computer, organization or other internet accessible resource provider, or third party computer,
decrypting the encrypted username to generate the decrypted username, and
transmitting the decrypted username to the first computer;
comparing, by the first computer, the decrypted username with previously received usernames from a plurality of organizations;
identifying, by the first computer, a second organization from the plurality of organizations at which the decrypted username is used;
encrypting, by the first computer, an alert using an encryption key; and
transmitting, by the first computer, the encrypted alert to a second computer associated with the second organization, the encrypted alert comprising the decrypted username, and the encrypted alert indicating that the decrypted username used at the second organization has been compromised for enhancing data security at the second organization.

US Pat. No. 10,142,360

SYSTEM AND METHOD FOR ITERATIVELY UPDATING NETWORK ATTACK MITIGATION COUNTERMEASURES

Arbor Networks, Inc., Bu...

1. A computer-implemented method to mitigate a malicious network attack, the method comprising:receiving an attack alert that a network attack has been detected;
saving a sample of captured network traffic in response to the attack alert;
playing back the sample while applying a playback countermeasure to the captured network traffic to block sample segments from the sample;
analyzing at least one of the blocked sample segments and throughput sample segments that are not blocked; and
adjusting the playback countermeasure in response to a result of the analyzing.

US Pat. No. 10,142,356

CHANNEL DATA ENCAPSULATION SYSTEM AND METHOD FOR USE WITH CLIENT-SERVER DATA CHANNELS

ShieldX Networks, Inc., ...

1. A method comprising:receiving, by a first security microservice, a first channel data encapsulation packet encapsulating a first encapsulation context and a first encapsulated data;
performing a security service on the first encapsulated data using the first encapsulation context, wherein the security service is one of a plurality of microservices used to secure traffic passing between applications and servers through a routing network;
receiving, by the first security microservice, a response from the second security microservice comprising a second security microservice context, a second timestamp, and a second load;
generating, by the first security microservice, a first timestamp and a first load, wherein the timestamps represent the duration of processing performed by the first and second microservices and the first and second loads represent the loading of the first and second microservices processing the encapsulated channel data, the loading being represented in either relative or absolute terms; and
transmitting, by the first security microservice, a response to the first channel data encapsulation packet, wherein the response includes the first timestamp and first load generated by the first security microservice, wherein the timestamp and load values are recorded to be used in load balancing decisions for future security service requests among microservices; and
wherein the first and second security microservices are implemented with computer-readable instructions stored in memory on a network security server, the memory coupled to one or more hardware processors executing the first and second security microservices.

US Pat. No. 10,142,355

PROTECTION OF TELECOMMUNICATIONS NETWORKS

TELUS Communications Inc....

1. A protection system for an internet service provider (ISP) network, wherein the ISP network is configured to relay packets between user devices connected to the ISP network and between the user devices and other internet devices, some of the user devices having threats that cause the respective user devices to send or receive threat-related packets, the protection system comprising:an evaluation engine, the evaluation engine being configured to receive input signals including:
network-based statistics obtained from ISP network devices of the ISP network;
information obtained from analysis of traffic on the ISP network by ISP security devices of the ISP network; and
details of threats on the user devices from a security application on the user devices;
the evaluation engine being configured to perform analytics on information contained within the input signals by reference to technical specifications and configuration information of the ISP network devices and the ISP security devices to assess an overall threat level posed to the ISP network or a portion of the ISP network by the threats and determine whether an active threat that affects the reliability or security of the ISP network either on its own or in combination with other active threats on the user devices exists on any user device of the user devices and to produce a trigger output when such an active threat to the ISP network has been determined; and
protection devices of the ISP network, each protection device being configured to be responsive to the trigger output to take an action towards protection of the ISP network by mitigating the effect of the active threat that affects the reliability or security of the ISP network.

US Pat. No. 10,142,354

CLOUD-BASED COMMUNICATION ACCOUNT SECURITY

1. A method comprising:receiving, by a computer system comprising a processor, over a network, a request to resolve a problem relating to a user device, wherein the request is received from one of a preinstalled application associated with the user device or from a user of the user device, and wherein the request comprises initial symptoms provided by the one of the preinstalled application associated with the user device or the user of the user device;
selecting, by the processor, based at least in part on the initial symptoms of the request provided by the one of the preinstalled application associated with the user device or the user of the user device, a diagnostic algorithm of a plurality of diagnostic algorithms to analyze data associated with the user device to identify symptoms of the problem and diagnose a cause of the symptoms identified, wherein the diagnostic algorithm, when executed by the processor, causes the processor to perform operations comprising
identifying applications that are generating traffic on the user device,
mapping network connections for the applications that are generating traffic on the user device, and
comparing the network connections for the applications that are mapped with preapproved network connections for the user device to diagnose at least one unapproved mapped network connection as the cause of the symptoms identified; and
searching, by the processor, to identify a solution to resolve the cause of the symptoms identified, wherein the solution to resolve the cause of the symptoms identified is based at least in part on diagnosis of the at least one unapproved mapped network connection as the cause of the symptoms identified.

US Pat. No. 10,142,353

SYSTEM FOR MONITORING AND MANAGING DATACENTERS

CISCO TECHNOLOGY, INC., ...

1. A system within a datacenter, comprising:two or more sensors configured to:
capture a packet;
describe the packet in a packet log;
send the packet log to a collector;
the collector being configured to:
receive the packet logs from the two or more sensors;
determine that the packet logs describe a connection between two endpoints in a datacenter;
describe the connection in a flow log; and
an analytics module configured to:
determine a status of the datacenter, using any connections in the flow log;
detect an attack that originated from within the datacenter from at least the determined status of the datacenter; and
modify, in response to the detected attack, a security policy of the datacenter.

US Pat. No. 10,142,352

CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT

International Business Ma...

1. A computer-implemented method for controlling a connection between a virtual machine and a physical device, the method comprising:receiving, by a virtual machine managing server, a connection request for connecting the physical device to the virtual machine;
in response to receiving the connection request, determining, by the virtual machine managing server, whether the virtual machine satisfies a first connection permission condition and whether the physical device satisfies a second connection permission condition, wherein the second connection permission condition comprises a setting of a configuration of the physical device and a setting of a context of the physical device comprising a physical location of the physical device and a current time, wherein the physical location of the physical device is based on an internet protocol (IP) address of the physical device;
in response to a determination that the virtual machine does not satisfy the first connection permission condition, changing, based on a first instruction sent from an endpoint managing server, a configuration of the virtual machine to satisfy the first connection permission condition;
in response to a determination that the physical device does not satisfy the second connection permission condition, changing, based on a second instruction sent from the endpoint managing server, the configuration of the physical device to satisfy the second connection permission condition;
in response to a determination that the virtual machine satisfies the first connection permission condition and that the physical device satisfies the second connection permission condition, accepting, by the virtual machine managing server, the received connection request to connect the physical device to the virtual machine;
in response to accepting the received connection request, establishing a connection between the virtual machine and the physical device;
in response to establishing the connection between the physical device and the virtual machine, dynamically detecting a change in at least one selected from the group consisting of: the configuration of the virtual machine, a context of the virtual machine, the configuration of the physical device, and the context of the physical device;
determining that the dynamically detected change does not satisfy at least one of the first connection permission condition or the second connection permission condition; and
in response to the determination of the dynamically detected change, disconnecting the connection between the virtual machine and the physical device.

US Pat. No. 10,142,348

ENHANCED DATA INTERFACE FOR CONTACTLESS COMMUNICATIONS

Visa International Servic...

1. A method comprising:receiving, by a hardware communication device, a request for available applets from a hardware device;
providing, by the hardware communication device, a list of available applets including trusted applet identifiers and untrusted applet identifiers to the hardware device;
receiving, by the hardware communication device, a selection of an untrusted applet identifier from the list and an entity identifier associated with the hardware device, wherein the selection of the untrusted applet identifier from the list is determined based on a highest priority applet of the available applets supported by the hardware device;
validating, by the hardware communication device, that the hardware device is authorized to access credentials associated with the selected untrusted applet identifier by comparing the entity identifier to a list of trusted entity identifiers; and
providing, by the hardware communication device, the credentials associated with the selected untrusted applet identifier to the hardware device.

US Pat. No. 10,142,347

SYSTEM FOR CENTRALIZED CONTROL OF SECURE ACCESS TO PROCESS DATA NETWORK

BANK OF AMERICA CORPORATI...

12. A method for supporting and controlling access to a private block chain within a private block chain distributed network, the method comprising:receiving, by one or more processing devices, a request from a user utilizing a node to access the private block chain, wherein the request includes received authentication credentials, wherein the private block chain network comprises a distributed network of nodes managed by one or more entities, wherein nodes from the distributed network of nodes are operatively coupled to each other, have at least a portion of a private ledger, and share information on the ledger through electronic communication, and wherein the received authentication credentials comprises user authentication credentials and node authentication credentials;
comparing, by the one or more processing devices, the received authentication credentials with stored authentication credentials for the user and the node;
allowing, by the one or more processing devices, the user to access the private block chain distributed network when the received authentication credentials meet the stored authentication credentials for the user and the node;
determining, by the one or more processing devices, one or more types of actions that the user is allowed to, or prevented from, taking based on the comparison of the received authentication credentials with the stored authentication credentials;
receiving, by the one or more processing devices, an indication that the user took an action for an event within the private block chain, wherein the action occurred on the node from the distributed network of nodes, and wherein the action is validating the event using event information on the private ledger of the node from the distributed network of nodes of the private block chain, storing the event information for the event on the private ledger of the node from the distributed network of nodes of the private block chain, or disseminating the event information for the event on the private ledger of the node to one or more other nodes of the distributed network of nodes of the private block chain; and
determining, by the one or more processing devices, limits, wherein the limits comprise one or more user limits, one or more node limits, one or more entity limits, one or more event limits, and one or more action limits;
comparing, by the one or more processing devices, the action taken and the user, the node, an entity associated with the user, and the event associated with the action to the limits, including the one or more user limits, the one or more node limits, the one or more entity limits, the one or more event limits, and the one or more action limits; and
allowing or denying, by the one or more processing devices, the action based on the determination of the one or more types of actions that the user is allowed to, or prevented from, taking based on the comparison of the received authentication credentials with the stored authentication credentials and based on the comparison of the action and the user, the node, the entity, and the event associated with the action to the limits.

US Pat. No. 10,142,346

EXTENSION OF A PRIVATE CLOUD END-POINT GROUP TO A PUBLIC CLOUD

CISCO TECHNOLOGY, INC., ...

1. A method of extending a private cloud to a public cloud, the method comprising:establishing, by an orchestrator, a virtual private network between a private cloud and a public cloud, wherein the private cloud is behind a firewall;
receiving, by the orchestrator, one or more access control lists provisioned by the private cloud;
determining, by the orchestrator, contracts between an end point group of the private cloud and an end point group of the public cloud based on the one or more access control lists;
extending, by the orchestrator, the end point group of the private cloud to the end point group of the public cloud across the virtual private network; and
monitoring and troubleshooting, by the orchestrator, the end point group of the public clouds and associated public endpoints of the public cloud.

US Pat. No. 10,142,343

UNAUTHORIZED ACCESS DETECTING SYSTEM AND UNAUTHORIZED ACCESS DETECTING METHOD

NIPPON TELEGRAPH AND TELE...

1. An unauthorized access detecting system, comprising:processing circuitry configured to
generate authentication information that is used to log in to a predetermined server,
set the generated authentication information generated on a predetermined analyzing host and cause a program to be analyzed to operate on the predetermined analyzing host, wherein the program is allowed access to the set authentication information,
detect unauthorized access to a content at a predetermined server using the authentication information,
obtain a program corresponding to the authentication information by referring to a table stored in a memory, the table prescribing correspondence between the authentication information and the program, and
identify, as a program that leaks out information, the program that operates on the predetermined analyzing host set with the authentication information if unauthorized access using the authentication information has been detected.

US Pat. No. 10,142,342

AUTHENTICATION OF CLIENT DEVICES IN NETWORKS

Extreme Networks, Inc., ...

1. A method comprising:receiving identity information at an edge configuration device from a physical end device via a connection, wherein the identity information identifies the physical end device or one or more users associated with the physical end device, and wherein the identity information includes a request for permission for the physical end device to access a Shortest Path Bridging (SPB) network;
sending a request from the edge configuration device over the SPB network to an access control server connected to the SPB network in response to receiving the identity information, wherein the request requests authentication for the physical end device;
receiving authentication at the edge configuration device from the access control server for the physical end device to connect to the SPB network;
receiving network configuration information at the edge configuration device from the access control server in response to sending the request for authentication; and
using the network configuration information to configure the edge configuration device for use with one or more virtual local area networks (VLANs) of the SPB network for use with the physical end device.

US Pat. No. 10,142,341

APPARATUS, SYSTEM AND METHOD FOR WEBRTC

NEC Corporation, Tokyo (...

1. An authentication method in a communication system, the method comprising:sending a token from a WWSF (WebRTC (Web Real Time Communication) Web Server Function) to a UE (User Equipment) in an IMS (IP (Internet Protocol) Multimedia Subsystem) registration, wherein the token is generated by binding an IMPU (IMS public user identity) to a webRTC ID (Identity) received by the WWSF from the UE, and the token is transmitted from the WWSF to the UE;
sending a REGISTER message with the token from the UE to an eP-CSCF (enhanced Proxy-CSCF (Call Session Control Function));
verifying the token by the eP-CSCF, the token having an effective time;
forwarding the REGISTER message from the eP-CSCF to an S-CSCF (Serving-CSCF);
receiving a subscription profile from an HSS (Home Subscriber Server) to the S-CSCF; and
sending a 200 OK message from the S-CSCF to the UE via the eP-CSCF.

US Pat. No. 10,142,340

SYSTEM FOR DETECTION AND IDENTIFICATION OF ELECTRONIC DEVICES AND ALLOCATION OF PROXY IDENTIFIERS FOR SAME

Bank of America Corporati...

1. A system for detection and identification of electronic devices and allocation of proxy identifiers for the same, the system comprising:a memory;
a processor; and
a module stored in the memory, executable by the processor, and when executed by the processor, causes the process to:
detect one or more electronic devices within a wireless network range;
identify the one or more electronic devices within the wireless network range, comprising:
matching the one or more electronic devices with one or more entries in a database of users;
determine that the one or more electronic devices has stored thereon one or more credentials;
access the one or more credentials;
copy the one or more credentials from the one or more electronic devices to a secure digital lock box;
detect that the one or more credentials have been copied to the secure digital lock box;
based on detecting that the one or more credentials have been copied to the secure digital lock box, permanently delete the one or more credentials from the one or more electronic devices;
allocate proxy identifiers corresponding to the one or more credentials;
initiate storage of the allocated proxy identifiers on the one or more electronic devices;
detect that the one or more electronic devices have attempted to perform a transaction that requires the use of the one or more credentials; and
based on detecting that the one or more electronic devices have attempted to perform a transaction that requires the use of the one or more credentials, initiate use of the proxy identifiers by the one or more electronic devices instead of use of the one or more credentials.

US Pat. No. 10,142,338

SYSTEMS AND METHODS FOR ONLINE THIRD-PARTY AUTHENTICATION OF CREDENTIALS

ID.me, Inc., McLean, VA ...

1. A computer-implemented method for online authentication of online attributes, the method including:receiving, at a server over an electronic network, an authentication request from a relying party, the authentication request including identity information to be authenticated and credential information to be authenticated;
determining, by the server, whether a user account is associated with the received identity information by accessing an internal database;
accessing, by the server from the internal database, user data of the user account determined to be associated with received identity information;
determining, by the server, authentication data to be obtained from a user associated with the user account based on the user data of the user account and the credential information to be authenticated;
transmitting, by the server over the electronic network to the user, a request for authentication data;
determining, by the server, an assurance level associated with the authentication request based on the authentication request and the relying party, wherein a single-factor authentication is required for lower assurance levels and a multi-factor authentication is required for higher assurance levels;
receiving, at the server over the electronic network, authentication data associated with the user, wherein the authentication data is associated with a lifetime value, wherein the lifetime value identifies a length of time the authentication data is valid, wherein the authentication data further includes a status identifier, wherein the status identifier includes one of a pending, active, suspended, and revoked status, wherein the status identifier is placed in the revoked status after receiving and authenticating a revocation request;
transmitting, by the server over the electronic network to a verification data source server, authentication data associated with the user; and
receiving, at the server over the electronic network, an authentication result from the verification data source server for the user associated with authentication data.

US Pat. No. 10,142,337

HARDWARE IDENTIFICATION THROUGH COOKIES

Uniloc 2017 LLC, Wilming...

6. A non-transitory computer readable medium which includes one or more processors, and a memory, the computer readable medium including computer instructions which are configured to cause a server computer, by execution of the computer instructions in the one or more processors from the memory, to recognize a given remotely-located device as either a known device or an unknown device by:receiving, from the given device, a device identifier generated by hashing multiple cookies supplied from at least two different hosts which cookies are stored on the given device;
determining an amount of correlation between the device identifier of the given device and corresponding previously stored identifiers of each of one or more other devices; and
determining that the given device is a known device upon a condition in which the amount of correlation is at least a predetermined threshold.

US Pat. No. 10,142,336

COMMUNICATION SYSTEM AND METHOD

SCHNEIDER ELECTRIC INDUST...

1. A communication analysis method implemented in a first device configured to receive communication frames originating from a second device, said first device and said second device being configured to establish a communication between themselves in a secure communication session, said method comprising:storing parameters corresponding to the communication established with the second device during the secure communication session;
analyzing, in response to receiving a communication frame originating from the second device, the parameters of the communication during the reception of the communication frame in relation to the parameters stored for said communication; and
determining a renewal or a maintenance of the secure communication session according to the analysis carried out,
wherein the first device is a server including a microprocessor and the second device is a sensor with a microcontroller and a transmitter, and
wherein the communication is a cryptographic communication in a wireless environment,
wherein the analyzing further comprises checking a level of confidence assigned to the second device and when the level of confidence is downgraded in the event of inconsistency between the parameters of the communication during the reception of the communication frame and the parameters stored for said communication, renegotiating a new session key for the secure communication session.

US Pat. No. 10,142,335

DYNAMIC INTRINSIC CHIP IDENTIFICATION

International Business Ma...

1. A method for intrinsic chip identification, comprising:receiving first counter information from a device;
determining whether the first counter information matches second counter information;
enabling authentication in response to the first counter information matching the second counter information;
receiving a first set of frequencies from the device, wherein the first set of frequencies are selected based on the first counter information;
determining whether each frequency of the first set of frequencies is within a predetermined range of a corresponding frequency of a second set of frequencies, wherein the second set of frequencies are selected based on the second counter information;
selecting a challenge response pair comprising a challenge and a response as a result of each frequency of the first set of frequencies being within the predetermined range of a corresponding frequency of the second set of frequencies;
transmitting the challenge to the device in response to selecting the challenge response pair;
receiving the response as a result of the challenge being sent to the device;
determining whether the response matches an expected response; and
granting authentication as a result of the response matching the expected response.

US Pat. No. 10,142,334

COMMUNICATING APPARATUS, METHOD, AND COMMUNICATING SYSTEM

RICOH COMPANY, LTD., Tok...

1. A communicating apparatus that communicates with at least one terminal device, the communicating apparatus comprising:circuitry configured to
capture an image,
authenticate a person in the image that has been captured,
determine a direction of the person based on a result of authenticating the person, and control transmission of a radio wave in the determined direction to connect the terminal device to a network, and
communicate with the terminal device connected to the network by using access information included in the transmitted radio wave, wherein
the circuitry is further configured to
calculate a size of a room in which the person is located in each direction based on the image, and calculate a size of an area based on the calculated size of the room,
adjust a transmission area of the radio wave according to the size of the area, and
control the radio wave to reach an entirety of the area and adjust radio wave intensity so as to not transmit the radio wave outside of the area.

US Pat. No. 10,142,333

BIOMETRIC REFERENCE TEMPLATE RECORD

WELLS FARGO BANK, N.A., ...

1. A method, comprising:receiving, by an authentication computing system, a biometric reference sample and a user identifier, the user identifier uniquely identifying a user from whom the biometric reference sample was captured;
processing, by the computing system, the biometric reference sample to generate biometric data;
tokenizing, by the computing system, the biometric data using a first tokenization schema;
tokenizing, by the computing system, the biometric reference sample using a second tokenization schema;
generating, by the computing system, a reference template, the reference template including the tokenized biometric data;
generating, by the computing system, a biometric reference template record, the biometric reference template record including:
a template record identifier uniquely identifying the biometric reference template record, the template record identifier being associated with the user identifier,
the reference template,
a first identifier identifying that the reference template includes tokenized biometric data, and
a second identifier identifying that the reference template includes tokenized reference sample;
digitally signing, by the computing system, the reference template using SignedData cryptographic message syntax to generate a SignedData message;
binding, by the computing system, a third identifier to the SignedData message via an attribute of the SignedData message, the third identifier identifying the first tokenization schema, wherein the attribute includes a first uniform resource identifier query string, the first uniform resource identifier query string including a first uniform resource locator identifying a first tokenization service provider capable of recovering the biometric data from the tokenized biometric data; and
binding, by the computing system, a fourth identifier to the SignedData message via an attribute of the SignedData message, the fourth identifier identifying the second tokenization schema, wherein the attribute includes a second uniform resource identifier query string, the second uniform resource identifier query string including a second uniform resource locator identifying a second tokenization service provider capable of recovering the biometric reference sample from the tokenized biometric reference sample.

US Pat. No. 10,142,331

AUTHENTICATION FOR APPLICATION

Alibaba Group Holding Lim...

1. A method comprising:detecting a near-field device of a user by a terminal when a particular operation is triggered;
obtaining an identification of the near-field device;
sending the identification of the near-field device to a server to request the server to conduct an authentication of the near-field device that matches the near-field device with a particular near-field device corresponding to the particular operation according to the identification of the near-field device;
receiving a result of authentication performed by the server according to the identification of the near-field device; and
sending a notification by the near-field device to another device used by the user in response to receiving the result of failed authentication.

US Pat. No. 10,142,330

LOCKING SYSTEMS WITH MULTIFACTOR AUTHENTICATION AND CHANGING PASSCODES

1. A computer-based locking system using changing passcodes, comprising:an application server;
an application running on a computing device and in electronic communication with the application server,
wherein the application is configured to request an input passcode from the application server based on a lock ID,
wherein the application server is configured to store a plurality of lock IDs each in association with a unique lock algorithm,
wherein the application server is configured to retrieve an associated lock algorithm by accessing the lock ID, and
wherein the application server is configured to generate the input passcode using the associated lock algorithm; and
a lock comprising a passcode interface, a locking mechanism, and an electromechanical actuator,
wherein the lock ID corresponds to the lock,
wherein the passcode interface is configured to capture the input passcode,
wherein the lock is configured to execute the associated lock algorithm locally to generate a plurality of local passcodes based on an input time including at least one of a current time and a time near the current time, and
wherein the lock is configured to release the locking mechanism by actuating the electromechanical actuator to translate the locking mechanism into an open position, in response to the input passcode matching at least one local passcode from the plurality of local passcodes.

US Pat. No. 10,142,329

MULTIPLE-FACTOR AUTHENTICATION

1. A method comprising:verifying a first authentication factor for a user;
identifying at least one target endpoint device for the user;
accessing an application program interface (API) to generate a communication request that includes:
a first portion specifying the target endpoint device, and
a second portion that includes a set of one or more documents written in a programming language that includes call flow commands for call routing logic of a call control server, the call flow commands including commands specifying how to communicate a security code;
transmitting the communication request to the call control server;
receiving input from the user; and
verifying a second authentication factor for the user by comparing the input to the security code.

US Pat. No. 10,142,327

RULE BASED DEVICE ENROLLMENT

Oracle International Corp...

1. A system comprising:memory configured to store computer-executable instructions; and
at least one processor configured to access the memory and execute the computer-executable instructions to collectively at least:
detect a gateway device connected to one or more electronic devices in a communication network;
receive, from the gateway device, an enrollment request requesting enrollment of an electronic device of the one or more electronic devices with the system, the enrollment request including fingerprint information associated with the electronic device endorsed by a certificate associated with the gateway device;
identify an enrollment policy associated with the electronic device;
enroll the electronic device in accordance with the enrollment policy based on verifying the fingerprint information associated with the electronic device; and
transmit, to the gateway device, information that enables the electronic device to access resources of the system.

US Pat. No. 10,142,326

ATTRIBUTE-BASED ACCESS CONTROL

INTERNATIONAL BUSINESS MA...

1. A method for performing attribute-based access control across a first and a second security domain in a federated processing environment, the method comprising:adding, into a received security token that comprises first access control attributes and a signature of a first identity provider of the first security domain, additional access control attributes provided by a second identity provider of the second security domain;
re-signing, with a private key associated with a certificate of a second service provider in the second security domain, the received security token with the added additional access control attributes, where the re-signing comprises an assertion in the second security domain that the added additional access control attributes have been provided by the second identity provider of the second security domain; and
issuing the re-signed received security token for consuming, using the added additional access control attributes, by any service provider in the second security domain.

US Pat. No. 10,142,324

METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN

BUNDESDRUCKEREI GmbH, Be...

1. A method for a first computer system to read at least one attribute stored in an identification (ID) token associated with a user, and transmit the at least one attribute to a second computer system, the method comprising:sending a request from a third computer system, associated with the user, to the second computer system;
providing, by the second computer system, an attribute specification identifying the at least one attribute from the ID token in response to the request from the third computer system;
sending, by the second computer system, the attribute specification to the first computer system without interposition of the third computer system;
selecting, by the first computer system, at least one certificate of a plurality of certificates of the first computer system based on the attribute specification, each of the plurality of certificates including a different indication of attributes for which the first computer is authorized for read access, the at least one certificate including an indication of the at least one attribute identified in the attribute specification;
authenticating, by the ID token, the user;
authenticating, by the ID token, the first computer system using the at least one certificate of the first computer system, the at least one certificate being received by the ID token via a protected connection with end-to-end encryption between the ID token and the first computer system;
checking, by the ID token, an authorization of the first computer system for a read access to the at least one attribute identified in the attribute specification using the at least one certificate, the checking following successful authentication of the user and the first computer system;
effecting read access, by the first computer system, to the at least one attribute stored in the ID token if the first computer system is authorized for the read access;
signing, by the first computer system, the at least one attribute read from the ID token; and
sending, by the first computer system, the at least one signed attribute to the second computer system without interposition of the third computer system.

US Pat. No. 10,142,323

ACTIVATION OF MOBILE DEVICES IN ENTERPRISE MOBILE MANAGEMENT

HUAWEI TECHNOLOGIES CO., ...

1. A method, comprising:generating, at a mobile device, a first device security certificate, the first device security certificate including a representation of an identifier of the mobile device and a representation of a device key in a signature of the first device security certificate;
transmitting, by the mobile device, the first device security certificate to an authentication server;
receiving, at the mobile device, a server security certificate from the authentication server in response to a successful authentication by the authentication server, the server security certificate including a representation of a server key in a signature of the server security certificate, the server key corresponding to the device key and to a representation of a shared secret stored on the mobile device and known by the authentication server;
validating, at the mobile device, the server security certificate based on the signature of the server security certificate that includes the representation of the server key;
establishing, by the mobile device, a secure connection with the authentication server based on the first device security certificate and the server security certificate; and
enrolling, at the mobile device, at least one second device security certificate for formal communication over the secure connection.

US Pat. No. 10,142,322

METHODS AND APPARATUS FOR AUTHENTICATING IDENTITY OF WEB ACCESS FROM A NETWORK ELEMENT

TELLABS, INC., Napervill...

1. A communication network configured to generate a report identifying a user equipment (“UE”), comprising:a mobile device coupled to a communication network and configured to access and display online advertisements;
an advertising exchange server (“AES”) coupled to the communication network and configured to provide additional web pages relating to the online advertisements to the mobile device upon receipt of access requests associated with the online advertisement initiated by the mobile device;
a router configured to perform a gateway GPRS support node (“GGSN”), coupled to the mobile device and the AES for routing information between the mobile device and the AES, the router configured to obtain an International Mobile Subscriber Identification (“IMSI”) of the mobile device from web access request generated by the mobile device and a geo-location associated with the mobile device from a cell site coupled to the communication network, the router configured to create an authentication record containing the IMSI and the geo-location associated with the mobile device when an advertising access request for the online advertisements initiated by the mobile device is detected; and
a subscription partner coupled to the router and able to identify whether an ad-click is fraudulent based on IMSI information and geo-location of the mobile device in the authentication record.

US Pat. No. 10,142,319

PROTECTING NETWORK COMMUNICATION SECURITY

International Business Ma...

1. A method for protecting network communication security at a server by updating tokens in a valid token queue comprising a plurality of valid tokens that are maintained at the server, the method comprising:in response to a request from a client, determining, by the server, whether a token from the client is included in the valid token, the valid token queue being a first-in-first-out queue;
in response to the token being included in the valid token queue, the server managing the valid token queue based on a position of the token in the valid token queue, wherein managing the valid token queue based on a position of the token in the valid token queue comprises:
keeping the valid token queue unchanged in response to a distance of the position of the token in the valid token queue from an end of the valid token queue being greater than or equal to a threshold distance;
generating a new token in response to a distance of the position of the token in the valid token queue from an end of the valid token queue being less than a threshold distance; and
in response to generating the new token, updating the valid token queue with the new token when the token from the client is at the end of the valid token queue; and
the server sending a response that includes the new token to the client based on the managing of the valid token queue.

US Pat. No. 10,142,317

SYSTEM AND METHOD FOR PROCESSING USER RIGHTS

Comcast Cable Communicati...

1. A method, comprising:storing, in a storage device, content, wherein a user account of a user device has a right to consume the content at a first time when the content is stored;
determining a time duration after which the content is removed from the storage device;
receiving, by an entitlement server from the user device, a first request for playback of the content at a second time;
determining, by the entitlement server, that a user associated with the user account does not have the right to consume the content at the second time;
determining, by the entitlement server, that the second time falls within the time duration; and
providing, based on the right to consume the content at the first time and the second time falling within the time duration, the content to the user device at the second time.

US Pat. No. 10,142,316

COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AN EMAIL INPUT FACILITY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT

Intralinks, Inc., New Yo...

1. A method for secure management of emailed content, the method comprising:providing a secure email input facility for accepting non-secure email addressed to a designated email address, wherein the non-secure email is received and at least one of the non-secure email and content delivered thereby is stored in a storage facility as secure content related to at least one of the sender of the email, the subject line of the non-secure email, the destination address of the email within the exchange, and the content of the email, wherein access to the secure content stored in the storage facility is limited to an access list with permissions assigned to each member of the access list;
assigning a first user and second user to the access list, wherein the step of assigning at least provides permission for the first user to send email content to the secure email input facility for storage of the email content in the storage facility and at least provides permission for the second user to access the email content stored in the storage facility;
receiving the email content from the first user, wherein the email content was addressed to the designated email address;
verifying permission for the first user to store email content in the storage facility in association with the designated email address;
storing the email content in the storage facility; receiving an access request for the second user to access the stored email content; and
granting access to the second user for access to the email content stored in the storage facility.

US Pat. No. 10,142,314

METHOD AND APPARATUS FOR PROCESSING AUTHENTICATION REQUEST MESSAGE IN A SOCIAL NETWORK

Alibaba Group Holding Lim...

1. A method comprising:receiving, directly by a social network server, an authentication request message to establish a social relationship between a first client and a second client, the request message being sent by the first client;
determining, by the social network server and after receiving the authentication request message sent by the first client, a relationship chain information indicative of an indirect social network relationship between the first client and the second client;
determining, by the social network server, the relationship chain information between the first client and the second client based on identification information of the first client and identification information of the second client and a correlation between the identification information of the first and second clients and respective relationship chain information of the first and second clients;
searching, by the social network server, for a keyword in an inverted index;
locating, by the social network server, index records in the inverted index file of which identification information of the first client and the identification information of the second client are keywords;
obtaining, by the social network server, the relationship chain information of the first client and the second client from the located index records, the inverted index using the identification information of the first and second clients as an index keyword and the respective relationship chain information of the first and second clients as an index value; and
forwarding, by the social network server and in response to determining the relationship chain information between the first client and the second client, the authentication request message and the determined relationship chain information to the second client, the determined relationship chain information being for use by the second client to authenticate the authentication request message.