US Pat. No. 11,070,720

DIRECTED IMAGE CAPTURE

Hover Inc., San Francisc...


1. A method of directed capture of building imagery, the method comprising:displaying, on an image capture device display, a building of interest subject from a first camera position;
overlaying a graphical guide associated with the building of interest subject at the first camera position;
calculating a percentage of façade pixels of the building of interest subject at the first camera position displayed within the image capture device display;
determining a distance score of the façade pixels associated with the first camera position from a centroid of the image capture device display;
receiving a first quality assessment of the building of interest subject comprising position change instructions for the image capture device based on the distance score in association with the graphical guide; and
capturing a first image of the building of interest subject based on the first quality assessment.

US Pat. No. 11,070,719

IMAGE CAPTURE ASSIST DEVICE AND IMAGE CAPTURE ASSIST METHOD

MITSUBISHI ELECTRIC CORPO...


1. An image capture assist device comprising:processing circuitry
to determine whether or not a moving speed of a camera is greater than or equal to a threshold;
if it has been determined that the moving speed of the camera is greater than or equal to the threshold, to determine, on a basis of a capture image obtained from the camera, whether a candidate inspection target, being an object that may be a target to be inspected, appears in the capture image;
if it has been determined that the candidate inspection target appears in the capture image, to output an instruction to reduce the moving speed of the camera;
if it has been determined that the moving speed of the camera is less than the threshold, to determine a type of a target appearing in the capture image on a basis of the capture image; and
to determine whether the type of the target determined matches a type of an inspection target to be currently inspected, and if the type of the target matches the type of the inspection target, to determine that a current location of the camera is a shooting location, and to output an instruction to stop a movement of the camera.

US Pat. No. 11,070,718

IMAGE STABILIZATION SYSTEMS AND METHODS

FLIR SURVEILLANCE, INC., ...


1. A system comprising:a fast steering mirror assembly coupled within an imaging system and configured to adjust a propagation direction of an optical path for the imaging system; and
a logic device configured to control the fast steering mirror assembly based on angular motion of the imaging system, wherein the logic device is configured to:receive the angular motion of the imaging system from an angular motion sensor coupled to the imaging system, wherein the received angular motion of the imaging system produces an angular offset in the propagation direction of the optical path;
determine a compensating angular offset for the fast steering mirror assembly based, at least in part, on the received angular motion of the imaging system, wherein the compensating angular offset is configured to stabilize imagery projected along the optical path to an imaging module of the imaging system, by at least partially counteracting the angular offset produced by the angular motion of the imaging system; and
control the fast steering mirror assembly to adjust the propagation direction of the optical path for the imaging system according to the determined compensating angular offset;

wherein the fast steering mirror assembly comprises:
a mirror configured to reflect a beam of electromagnetic radiation projected along the optical path; and
an actuator assembly comprising one or more actuators coupled to the mirror and configured to adjust a position of the mirror;
wherein the controlling the fast steering mirror assembly to adjust the propagation direction of the optical path comprises controlling the one or more actuators to adjust the position of the mirror based, at least in part, on the determined compensating angular offset, without positional feedback from the actuator assembly.

US Pat. No. 11,070,717

CONTEXT-AWARE IMAGE FILTERING

Adobe Inc., San Jose, CA...


1. A non-transitory computer-readable medium having program code that is stored thereon, the program code executable by a processing device for performing operations comprising:for every set of N images that are in a field of view of a camera associated with the processing device, wherein N is an integer greater than one,detecting an object in only an image subset of the N images by applying an object detection technique on a down-sampled version of the image subset, wherein a number of images in the image subset is less than N;
determining, based on the object detected in the image subset, a recommended filter for the image subset from a list of filters available for filtering the image subset;
causing a display device to display, prior to presenting the recommended filter, a user interface comprising a contextual user interface control, the contextual user interface control indicating that a context-aware image filtering mode is available; and

in response to receiving a selection of the contextual user interface control, enabling the context-aware image filtering mode by:automatically applying the object detection technique to a live preview image that is currently in the field of view of the camera to detect the object,
automatically applying the recommended filter to the live preview image to generate a filtered image and causing the display device to display the filtered image in place of the live preview image,
automatically applying an object tracking technique to track the object in a second live preview image that is in the field of view of the camera subsequent to the live preview image, and
automatically applying the recommended filter to the second live preview image to generate a filtered image of the second live preview image and causing the display device to display the filtered image of the second live preview image.


US Pat. No. 11,070,716

IMAGE SENSOR SYSTEM, IMAGE SENSOR, DATA GENERATION METHOD OF IMAGE SENSOR IN IMAGE SENSOR SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM

OMRON Corporation, Kyoto...


1. An image sensor system having an image sensor that performs an examination of a product and an operation terminal for externally operating the image sensor, the image sensor system comprising:a recognition part configured to specify user information of a user who uses the operation terminal and device information of the operation terminal;
a determination part configured to determine display information on the examination displayed on a display part used by the operation terminal and a disposition of the display information on the display part on the basis of both of the specified user information and the specified device information; and
a generation part configured to generate data for displaying the display information in the determined disposition on the display part of the operation terminal,
wherein the device information comprises device type indicating a type of the operation terminal, and
the determination part specifies a user category related to the user of the image sensor on the basis of the specified user information and determines items and a screen layout of the display information displayed on the display part on the basis of a combination of the specified user category and the device information.

US Pat. No. 11,070,715

IMAGE SHIFT AMOUNT CALCULATION APPARATUS AND METHOD, IMAGE CAPTURING APPARATUS, DEFOCUS AMOUNT CALCULATION APPARATUS, AND DISTANCE CALCULATION APPARATUS

CANON KABUSHIKI KAISHA, ...


1. An image shift amount calculation apparatus comprising at least one processor or one circuitry which functions as:an obtaining unit that obtains a pair of images having parallax;
a generation unit that generates, from the pair of images, a plurality of image pairs for a plurality of hierarchal levels, each hierarchal level having a different resolution;
a calculation unit that calculates image shift amounts using the generated image pairs in the plurality of hierarchal levels; and
a synthesizing unit that synthesizes the image shift amounts,
wherein the calculation unit calculates a first image shift amount for each of pixel positions of a first image pair of the plurality of image pairs in a predetermined first hierarchal level among the plurality of hierarchal levels, determines, on the basis of the first image shift amounts in the first hierarchal level, a second hierarchal level for each of the pixels positions of the first image pair, among the plurality of hierarchal levels, where the calculation of the image shift amount is to end, and calculates a second image shift amount of a second image pair of the plurality of image pairs in the second hierarchal level for each of the pixels positions of the first image pair using the first image shift amounts, and
wherein the calculation unit sets the second hierarchal level to a lower level in a case where the first image shift amount in each of the pixel positions is a first value than in a case where the first image shift amount is a second value lower than the first value, and
wherein the synthesizing unit synthesizes the image shift amounts of the first and second hierarchal levels for each of the pixel positions of the first image pair.

US Pat. No. 11,070,714

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD

SONY CORPORATION, Tokyo ...


1. An information processing apparatus, comprising:a central processing unit (CPU) configured to:register, at a time of a first shooting by an imaging apparatus, a setting change time, wherein the setting change time is a first elapsed time from a start time of the first shooting;
determine, at a time of a second shooting by the imaging apparatus, a second elapsed time from a start time of the second shooting, whereinthe second elapsed time is equal to the setting change time, and
the time of the second shooting by the imaging apparatus is after the time of the first shooting by the imaging apparatus; and

change, at the second elapsed time that is equal to the setting change time, a setting of the imaging apparatus to a first specific setting associated with the setting change time.


US Pat. No. 11,070,713

NETWORK-CONTROLLED 3D VIDEO CAPTURE

Microsoft Technology Lice...


1. A computing device comprising:a processing unit;
memory; and
a network connection;
the computing device programmed, via computer-executable instructions, to implement a controller that performs operations for controlling three-dimensional (3D) video capture, the operations comprising:receiving, via the network connection, connections from a plurality of components, wherein the plurality of components process information for generating a three-dimensional holographic video output from a captured real-world video input, wherein the plurality of components run on a plurality of other computing devices, and wherein the plurality of other computing devices are separate from the computing device and communicate with the computing device via the network connection, and wherein the plurality of components comprise:one or more depth generators, wherein the one or more depth generators receive video information from a plurality of video cameras;
an encoder, wherein the encoder transmits encoded video images from the plurality of video cameras to a distributor; and
the distributor, wherein the distributor distributes image data from the encoded video images to the one or more depth generators;

receiving, via the network connection, state update messages from the plurality of components, wherein the state update messages comprise indications that the plurality of components are in a ready state; and
after receiving the state update messages from the plurality of components, broadcasting, via the network connection, a start command to the plurality of components;
wherein the plurality of components start processing information for generating the three-dimensional holographic video output from the captured real-world video input based, at least in part, on the start command received from the computing device.


US Pat. No. 11,070,712

METHOD AND SYSTEM FOR CONTROL OF A DIGITAL CAMERA SYSTEM

PUWELL TECHNOLOGY LLC, N...


1. A camera system, comprising:a lens; and
an image sensor,
wherein a single assembly includes both of the lens and the image sensor, wherein the single assembly is switchable only between a first orientation and a second orientation perpendicular to the first orientation, wherein the single assembly stays only in either the first orientation or the second orientation, wherein an application within a mobile device controls the switch of the single assembly only between the first orientation and the second orientation, and wherein the image sensor is caused to have more pixel sensors in the first orientation through controlling a switch or a motor within the camera system to cause the image sensor to switch to the first orientation.

US Pat. No. 11,070,711

TERMINAL, SCREEN ASSEMBLY, AND ELECTRONIC DEVICE

GUANDONG OPPO MOBILE TELE...


1. A terminal, comprising:a terminal body; and
a rotating body comprising a first end face,
wherein a first camera is arranged on the first end face;
wherein the rotating body is rotatably coupled to one end of the terminal body, so that the first camera selectively faces toward around the terminal body;
wherein a first display screen is arranged on a front face of the terminal body;
wherein the rotating body further comprises a second end face opposite to the first end face;
wherein a second display screen is arranged on the second end face;
wherein when the rotating body is rotated such that the second end face faces the front face of the terminal body, front surfaces of the first display screen and the second display screen are located in a same plane,
wherein the rotating body further comprises a fifth end face facing the terminal body;
wherein a third connecting structure is arranged on the fifth end face;
wherein a fourth connecting structure is provided on a top end face of the terminal body;
wherein the third connecting structure is rotatably coupled to the fourth connecting structure around a second axis;
wherein the second axis is perpendicular to the top end face of the terminal body;
wherein the third connecting structure comprises:a columnar rotating shaft arranged on the fifth end face; and
a limiting protrusion arranged on an end of the rotating shaft away from the rotating body;

wherein the limiting protrusion is arranged on a side wall face of the rotating shaft;
wherein the limiting protrusion is annular and arranged coaxially with the rotating shaft;
wherein the fourth connecting structure comprises:a first stepped hole defined on the top end face; and
a second stepped hole defined on the top end face;

wherein the first stepped hole is coaxial and communicated with the second stepped hole;
wherein the first stepped hole is adjacent to the top end face;
wherein the second stepped hole is away from the top end face;
wherein when the third connecting structure is installed in the fourth connecting structure, the rotating shaft is inserted in the first step hole, and the limiting protrusion is received in the second step hole;
wherein a radius of the first step hole is adapted to a radius of the rotating shaft;
wherein a radius of the second step hole is adapted to a radius of the limit protrusion; and
wherein the radius of the second step hole is larger than the radius of the first step hole.

US Pat. No. 11,070,710

DISPLAY DEVICE CONFIGURED AS AN ILLUMINATION SOURCE

QUALCOMM Incorporated, S...


1. A method for capturing one or more digital images of a scene using a mobile device including a front-facing image sensor and a touch screen, the method comprising:displaying, on the touch screen, a preview image representing the scene, at least a first portion of the preview image being displayed at a first portion of the touch screen and depicting a face of a user of the mobile device;
determining that the preview image includes the face;
receiving a command to capture the one or more digital images of the scene;
displaying, on the touch screen, in response to receiving the command to capture the one or more digital images of the scene, an illumination image including an illumination region, the illumination region being displayed at the first portion of the touch screen and not depicting the face, wherein a color of the illumination region is determined based, at least in part, on a comparison between a chrominance value represented in a test frame and a target chrominance value; and
capturing the one or more digital images of the scene using the front-facing image sensor while the scene is illuminated by the illumination image.

US Pat. No. 11,070,709

ALIGNING AN IMAGE SENSOR RELATIVE TO A LENS MODULE

ASM TECHNOLOGY SINGAPORE ...


1. A method for aligning an image sensor relative to a lens module, the lens module comprising a first optical element and a second optical element, the first optical element and the second optical element being movable relative to each other, and the method comprising the steps of:gripping the lens module with a gripper;
while the lens module is being gripped by the gripper, electrically coupling an electrical interface carried on the gripper to an electrical interface on the lens module, the electrical interface being connected to the first optical element and the second optical element to provide drive signals that cause movement of the first optical element relative to the second optical element, or the second optical element relative to the first optical element, or the first optical element and the second optical element relative to each other;
receiving a test image along a first optical path with the lens module and projecting the test image along a second optical path transverse to the first optical path with the lens module;
manipulating an orientation of the lens module with respect to the image sensor to project the test image along the second optical path onto the image sensor;
adjusting the second optical path to position the test image centrally on the image sensor by providing the drive signals to the lens module via the electrical interface to move the first optical element relative to the second optical element, or to move the second optical element relative to the first optical element, or to move the first optical element and the second optical element relative to each other;
using the test image received by the image sensor along the second optical path to determine a corrected orientation of the lens module with respect to the image sensor, so as to align the lens module with respect to the image sensor; and thereafter
fixing the aligned lens module to the image sensor.

US Pat. No. 11,070,708

SELF-CONTAINED LOW PROFILE CROSS SHOOTING VIDEO APPARATUS

Brainbaby, Inc., Santa M...


1. A self-contained recording arrangement, comprising:an outer enclosure configured to receive and maintain therein:a plurality of video recording devices and a matching plurality of audio recording devices;
deployment hardware configured to deploy the plurality of video recording devices to a desired location;
means for moving the deployment hardware; and
electrical component hardware comprising a power supply, a timecode generator, a plurality of recorders, and an interne protocol (IP) assembly configured to facilitate interface with a remote computing device;

wherein the outer enclosure and all components therein are collectively portable to different physical locations, and further wherein the electrical component hardware is configured to deploy the plurality of video recording devices to positions outside the outer enclosure, the plurality of video recording devices deployable in a desired relative orientation for video recording multiple subjects using the means for moving the deployment hardware, wherein the relative orientation is a cross-shooting orientation wherein a first subject on a left side is video recordable by a first video recording device positioned on a right side and a second subject on the right side is video recordable by a second video recording device on the left side.

US Pat. No. 11,070,707

SYSTEM AND METHOD TO REMOVE A VEHICLE SHADOW FROM A VIDEO FEED

GM GLOBAL TECHNOLOGY OPER...


1. A method to remove a vehicle shadow from image information, the method comprising:determining a location of the vehicle shadow in an environment surrounding a vehicle in response to a vehicle location and a time of day;
selecting one or more cameras installed on the vehicle in response to the location of the vehicle shadow being within a field of view of the one or more cameras;
determining that an auto white balance of the image information is greater than or equal to a threshold; and
removing the vehicle shadow from the image information produced by the one or more cameras in response to the auto white balance being greater than or equal to the threshold, wherein the vehicle shadow is removed from the image information by segmenting the image information into a plurality of image segments, generating a chromaticity representation for each of the plurality of image segments, generating an illumination invariant representation of the chromaticity representation for each of the plurality of image segments, normalizing and linearizing the illumination invariant representation for each of the plurality of image segments and returning the chromaticity representation to the illumination invariant representation for each of the plurality of image segments.

US Pat. No. 11,070,706

NOTIFICATIONS FOR DEVIATIONS IN DEPICTION OF DIFFERENT OBJECTS IN FILMED SHOTS OF VIDEO CONTENT

SONY CORPORATION, Tokyo ...


1. A video editing device, comprising:a memory configured to store first video content that comprises a set of filmed scenes of a filmed sequence, whereineach of the set of filmed scenes comprises a plurality of filmed shots, and
each of the plurality of filmed shots comprises a sequence of image frames; and

circuitry configured to:extract a first image frame of a first filmed shot of the plurality of filmed shots and a second image frame of a second filmed shot of the plurality of filmed shots;
detect a first set of objects from the extracted first image frame and a second set of objects from the extracted second image frame;
identify a first object from each of the detected first set of objects and the detected second set of objects based on an object type of the first object, wherein the object type of the first object in the detected first set of objects and the detected second set of objects is same;
determine whether the first object in the detected first set of objects is absent in the detected second set of objects of the extracted second image frame;
generate, as a first error message, notification information associated with the first object based on a deviation of at least a first visual attribute of the first object in the extracted first image frame from at least a second visual attribute of the first object in the extracted second image frame and based on the determination that the first object is absent in the detected second set of objects, wherein the first visual attribute and the second visual attribute are of same type; and
control a display screen to output the generated notification information associated with the first object in the extracted first image frame and the extracted second image frame, whereinthe generated notification information comprises a second error message that indicates a continuity error in depiction of the first object in the extracted second image frame, and
the continuity error corresponds to a discontinuity in at least one of a shape, a size, textual information, a texture, or a color of the first object between the extracted first image frame and the extracted second image frame.



US Pat. No. 11,070,705

SYSTEM AND METHOD FOR IMAGE DYNAMIC RANGE ADJUSTING

SZ DJI TECHNOLOGY CO., LT...


1. A method for adjusting image dynamic range, comprising:obtaining a dynamic range array of an image including a plurality of color channels, each element of the dynamic range array including a dynamic range vector for one of pixels of the image in the color channels;
decomposing, by a hardware processor, the dynamic range array into a smooth portion, a color portion, and a detail portion, the smooth portion including a low frequency information array, the color portion including a color intensity information array, and the detail portion including a high frequency information array;
adjusting the smooth portion, the color portion, and the detail portion, respectively, to obtain an adjusted smooth portion, an adjusted color portion, and an adjusted detail portion; and
combining the adjusted smooth portion, the adjusted color portion, and the adjusted detail portion to generate an output image;
wherein:each element of the low frequency information array includes a low frequency feature vector for one of the pixels,
each element of the color intensity information array includes a color intensity feature vector for one of the pixels,
each element of the high frequency information array includes a high frequency feature vector for one of the pixels, and
the dynamic range vectors, the low frequency feature vectors, the color intensity feature vectors, and the high frequency feature vectors each have a dimension that is the same as a number of the color channels.


US Pat. No. 11,070,704

IMAGE PROCESSING APPARATUS, CONTROL METHOD FOR CONTROLLING IMAGE PROCESSING APPARATUS, AND STORAGE MEDIUM FOR REMOVING A COLOR FROM IMAGE DATA BASED ON SPECIFIED COLOR

CANON KABUSHIKI KAISHA, ...


1. An image processing apparatus comprising:a user interface that receives designation of a color; and
a controller that sets a range of hue of a color to be removed based on the color of which the designation has been received by the user interface;
wherein the image processing apparatus obtains a first feature amount of image data before a color of a partial area of the image data is removed based on the range of the hue set by the controller and a second feature amount of image data after the color of the partial area of the image data is removed based on the range of the hue set by the controller,
wherein the image processing apparatus expands, based on the first feature amount of image data and the second feature amount of image data, the range of hue to be removed in the partial area, and
wherein the image processing apparatus removes the color of the partial area of the image data based on the expanded range of the hue.

US Pat. No. 11,070,703

3D PRINTER TOUCHSCREEN INTERFACE LOCKOUT

ROBERT BOSCH TOOL CORPORA...


1. A method for authenticating a user of a 3D printer to prevent unsafe use of the 3D printer, the method comprising:detecting, by a sensor, a respective pressure applied simultaneously to each of a plurality of pressure points of a detection surface of a touchscreen interface of the 3D printer, wherein the detected simultaneously applied pressures in combination form a force on the touchscreen interface and wherein the plurality of pressure points correspond to a plurality of input locations;
determining, by processing circuitry, that the force on the touchscreen interface satisfies a force threshold value;
determining, by the processing circuitry, that the application to the touchscreen interface of the force satisfying the force threshold value was performed by the simultaneous application of respective pressure using at least a threshold number of the plurality of input locations; and
preventing, by the processing circuitry, operation of the 3D printer for extruding a print material as a result of the determination of the number of used input locations, wherein operation of the 3D printer is conditioned upon the force satisfying the force threshold value being applied to the touchscreen interface by application of pressure using less than the threshold number of the plurality of input locations.

US Pat. No. 11,070,702

IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM

TOSHIBA TEC KABUSHIKI KAI...


1. An image processing apparatus, comprising:a display device;
a network interface; and
a processor configured to:generate a first screen for display on the display device and on which at least one error condition of the image processing apparatus is presented in a selectable manner, and
control the network interface to transmit error information corresponding to a selected error condition to another apparatus, wherein

when a first error condition corresponding to an abnormal noise being output by the image processing apparatus is selected on the first screen, the processor is configured to generate a second screen for display on the display device and on which reference sounds potentially corresponding to the abnormal noise are presented in a selectable manner, and
when a reference sound is selected as corresponding to the abnormal noise on the second screen, the processor is configured to include sound information corresponding to the selected reference sound in the error information.

US Pat. No. 11,070,701

COLOR MANAGED EMBEDDING SYSTEM FOR EMBEDDING SIGNALS IN COLOR ARTWORK

Digimarc Corporation, Be...


1. An image processing method comprising:obtaining a reflectance value representing an image pixel at or around 660 nm, the image pixel comprising a component of artwork, the artwork including cyan, magenta, yellow and black channels;
altering the reflectance value according to an information carrying signal, said altering yielding a target reflectance value at or around 660 nm;
changing in a first direction a cyan value of the image pixel to achieve the target reflectance value, said changing yielding a changed pixel color value;
evaluating luminance (L*) of the changed pixel color value relative to the luminance (L*) of the image pixel, said evaluating yielding change in luminance (*L);
changing in a second direction, opposite to that of the first direction, a magenta value of the changed pixel color value to minimize the change in luminance (*L) while maintaining the target reflectance value within 0-5%.

US Pat. No. 11,070,700

METHOD OF EXTRACTING WATERMARK DATA IN AN IMAGE WITH REFERENCE TO A NOISE-BASED IMAGE LOCATED IN THE IMAGE BASED ON A COMPARISON PROCESS PERFORMED IN THE FREQUENCY DOMAIN

Beyontech, Inc, Long Gro...


1. A data extracting method for extracting watermark data from a captured image in which the watermark data are an embedded image, the data extracting method comprising the steps of:generating a correction image from a photographed image;
monochromating the correction image to maximize an expression of noise inherent in the correction image to create a monochromated corrected image;
generating a second two-dimensional result matrix indicating whether a noise-based image is comprised in the photographed image by performing a frequency domain process of comparing the photographed image with the noise-based image;
transforming the second two-dimensional result matrix into a spatial domain to generate a second reference image;
determining a reference point that is an extraction position of the watermark data in the captured image using the second reference image, and
extracting the watermark data from a reference point of the photographed image with reference to the noise-based image;
wherein, the step of generating the second two-dimensional result matrix comprises the step of generating a second result matrix indicating whether the noise-based image is comprised in the corrected image by performing a process in a frequency domain that compares the monochromated corrected image with a noise-based image;
wherein, the step of determining the extraction position of the watermark data comprises the step of determining a reference point that is an extraction position of the watermark data in the monochromated corrected image; and
wherein, the step of extracting the watermark data comprises the step of extracting the watermark data from the monochromated corrected image.

US Pat. No. 11,070,699

SYSTEMS AND METHODS FOR FACILITATING DETERMINING CONTEXTUAL AND SEMANTIC MEANING FROM AN IMAGE SCAN


1. A system for facilitating determining contextual and semantic meaning from an image scan, the system comprising:a communication device configured for:receiving a plurality of images from at least one source device;
receiving an image scan from at least one user device; and
transmitting an interpretability notification to the at least one user device; and

a processing device configured for:analyzing the plurality of images;
identifying an image metadata based on the analyzing;
analyzing the image scan;
identifying an image scan metadata based on the analyzing of the image scan;
comparing the image scan metadata and the image metadata;
determining an interpretability of the image scan based on the comparing; and
generating the interpretability notification based on the determining.


US Pat. No. 11,070,698

PRINTING APPARATUS AND METHOD OF CONTROLLING THE SAME THAT SELECTIVELY PERFORM PREDETERMINED IMAGE PROCESSING BASED ON A DETECTED SHEET SIZE

CANON KABUSHIKI KAISHA, ...


1. A printing apparatus comprising:a scanner that scans an original;
an image processor that performs image processing;
a printer that feeds a sheet from a manual sheet tray, detects a size of the fed sheet, sends size information of the detected size to a controller, and prints on the sheet; and
the controller that, in a print mode in which a size of a sheet to be fed from the manual sheet tray is not designated by a user,
(A) receives, from the scanner, first, second and third images respectively corresponding to first, second and third originals scanned in this order by the scanner;
(B) starts to cause the image processor to process an entire part of the received first image, and to cause the printer to feed a first sheet from the manual sheet tray;
(C) before receiving the size information of the detected size of the first sheet fed from the printer, starts to cause the image processor to process an entire part of the received second image regardless of the size information of the detected size of the first sheet; and
(D) after receiving the size information of the detected size of the first sheet fed from the printer, starts to cause the image processor to extract a part corresponding to the detected size of the first sheet fed from an entire part of the received third image and process the extracted part of the received third image.

US Pat. No. 11,070,697

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD

Ricoh Company, Ltd., Tok...


9. An information processing method performed by an information processing system including one or more information processing apparatuses for implementing various functions of the information processing system, the information processing system being coupled, via a network, to one or more devices in which a web browser is installed, the information processing method comprising:first storing, in at least one memory, flow information in association with application identification information identifying an application, with respect to each of applications for executing a sequence of processes using electronic data, the flow information defining program identification information identifying one or more of programs for executing each of the processes in the sequence of processes and an execution order of executing the one or more of the programs;
second storing, in the at least one memory, template screen information representing a template of a screen in a format that is interpretable by the web browser;
first receiving a first request including the application identification information from a first device among the one or more devices;
second receiving a second request including information relating to the electronic data specified by a user in the screen displayed on the web browser of the first device, the screen being displayed based on screen information according to application information representing information of an application identified by the application identification information included in the first request, and the template screen information;
acquiring the flow information stored in the at least one memory in association with the application identification information, when the second receiving receives the second request;
executing the one or more of the programs identified by the program identification information defined in the flow information acquired by the acquiring, in the execution order defined in the flow information, to execute the sequence of processes using the electronic data based on the information relating to the electronic data included in the second request received by the second receiving; and
generating the screen information in which the application information is defined in the template screen information, the application information being identified by the application identification information received by the first receiving, and the application information including parameters necessary for the executing to execute each of the one or more of the programs identified by the program identification information defined in the flow information according to the execution order.

US Pat. No. 11,070,696

INFORMATION PROCESSING SYSTEM

KYOCERA Document Solution...


1. An information processing system comprising:a first information processing apparatus of a data migration source;
a second information processing apparatus of a data migration destination;
a server capable of communicating with the first information processing apparatus and the second information processing apparatus via a predetermined network; and
a user terminal capable of communicating with the first information processing apparatus and the second information processing apparatus by short range wireless communication and capable of communicating with the server via the network;
wherein the first information processing apparatus starts export of predetermined migrating data including print settings, an address book and a system setting in accordance with short range wireless communication with the user terminal and transmits the migrating data, to which predetermined data identification information is added, to the server,
the server receives the migrating data from the first information processing apparatus and stores the migrating data,
the second information processing apparatus starts import of the migrating data in accordance with short range wireless communication with the user terminal,
the server reads out the migrating data on the basis of the data identification information and transmits the migrating data to the second information processing apparatus,
the second information processing apparatus receives the migrating data from the server and stores the migrating data.

US Pat. No. 11,070,695

IMAGE READING DEVICE, STORAGE MEDIUM STORING ABNORMALITY DETECTION PROGRAM, AND ABNORMALITY DETECTION METHOD

Seiko Epson Corporation, ...


1. An image reading device comprising:a reading unit that reads a document sheet and a reading standard surface and outputs read values corresponding to pixels arranged in a main scan direction;
a control unit that processes the read values; and
a storage unit storing information to be referenced by the control unit, wherein
first data that is read values of the reading standard surface and serves as standards, and second data on ranges of variation, based on a change in a temperature, in the read values are stored in the storage unit, and wherein
the control unit determines, based on the first data and the second data read from the storage unit and third data obtained by reading the reading standard surface after an acquisition of the first data, whether an abnormality exists in the pixels.

US Pat. No. 11,070,694

IMAGE PROCESSING APPARATUS FOR CONTROLLING A SCANNER

FUJIFILM Business Innovat...


1. An apparatus comprising:a scanner configured to scan an image of a document according to an instruction of an operator;
at least one processor configured to acquire information about a line of sight of the operator; and
a display,
wherein the at least one processor is configured to control the display to display a screen configured to receive an input for controlling the scanner using the acquired information about the line of sight of the operator,
wherein the at least one processor is configured to acquire information representing a state of hands of the operator, and
wherein the at least one processor is configured to, if the acquired information representing the state of hands of the operator represents that the state of hands of the operator is a predetermined state, then control the display to display the screen.

US Pat. No. 11,070,693

IMAGE FORMING APPARATUS THAT DISPLAYS A PAPER FEED UNIT SELECTION SCREEN

CANON KABUSHIKI KAISHA, ...


1. An image forming apparatus comprising:(A) a display;
(B) a plurality of sheet holding units including an initial group of sheet holding units and other sheet holding units; and
(C) a controller including a processor, the controller being configured to:(a) display on the display a first screen that includes information of a predetermined kind of the initial group of sheet holding units and does not include information of the predetermined kind of the other sheet holding units;
(b) in response to receiving a user instruction while the first screen is displayed, display on the display a second screen that includes information of the predetermined kind of each of at least one of the other sheet holding units;
(c) detect a predetermined event that occurred at one of the plurality of sheet holding units;
(d) determine, based on information specifying the one of the plurality of sheet holding units at which the predetermined event has been detected, a third screen to be displayed,

wherein the one sheet holding unit at which the predetermined event has been detected is not included in the initial group of sheet holding units but is included in the other sheet holding units,
wherein the determined third screen includes information of the predetermined kind of each of some of the other sheet holding units including the one sheet holding unit, and does not include information of the predetermined kind of sheet holding units other than the some sheet holding units even if the determination is made in a situation that information of any one of the some of the other sheet holding units including the one sheet holding unit is not displayed; and(e) display the determined third screen on the display.


US Pat. No. 11,070,692

POST-PROCESSING APPARATUS AND IMAGE FORMING SYSTEM

KONICA MINOLTA, INC., To...


11. A post-processing apparatus comprising:a cutting device that cuts a sheet along one or both of a feed direction in which the sheet is conveyed and a cross direction perpendicular to the feed direction;
one or both of an inclination detector that detects a front edge of the sheet in the feed direction at multiple positions in the cross direction and a side-edge detector that detects a position of a side edge of the sheet in the cross direction;
an inclination corrector that performs an inclination correction operation of correcting an inclination of the sheet; and
a hardware processor that causes the cutting device to cut the sheet after causing the inclination corrector to perform the inclination correction operation on the sheet for an amount of the inclination of the sheet based on the detection by the inclination detector or the detection by the side-edge detector,
wherein the hardware processor causes the cutting device not to cut the sheet in response to the amount of the inclination of the sheet exceeding a predetermined upper limit.

US Pat. No. 11,070,691

APPLIANCE SETTING APPARATUS AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING APPLIANCE SETTING PROGRAM

KYOCERA DOCUMENT SOLUTION...


1. An appliance setting apparatus comprising:a display device;
an operation device;
a processor configured to:generate layout information indicating a layout of a screen of an application program for providing, by an electronic appliance, a function of a workflow execution system to execute a workflow; and
install the layout information generated by the processor on the electronic appliance,

wherein the layout includes a button for realizing a function executed by the electronic appliance,
wherein, if the button is arranged in the layout as a flow execution button for executing the workflow and the workflow includes a plurality of workflows, the processor acquires a list of workflows from the workflow execution system, displays at least a part of the workflows included in the list acquired on the display device, and associates a workflow selected via the operation device from the workflows displayed on the display device with the flow execution button, and
wherein the flow execution button includes a plurality of flow execution buttons, and the processor displays the workflows included in the list on the display device in a state where a workflow already associated with any flow execution button already arranged in the layout is excluded.

US Pat. No. 11,070,690

IMAGE PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJIFILM Business Innovat...


1. An image processing device of an image forming apparatus, the image processing device comprising:a reception unit that receives image data to be printed by the image forming apparatus that is acquired from outside the image processing device;
an acquisition unit that analyzes the image data to acquire the language information from a result of analysis of the image data wherein in response to determining that the image data include text data, the acquisition unit is configured to extract an image portion that includes the text data from the image data, perform a character recognition processing to extracted image portion to acquire the text data included in the image data, and identify the language information according to the acquired text data; and
a setting unit that sets a display language displayed on a display, based on the language information acquired by the acquisition unit,
wherein in response to determining that a principal language is acquired from the language information, the setting unit is configured to set the principal language as the display language displayed on the display, and
in response to determining that the principal language is not supported by the display, the setting unit is configured to set a language that is similar to the principal language as the display language.

US Pat. No. 11,070,689

INFORMATION PROCESSING APPARATUS THAT SWITCHES LANGUAGES TO BE DISPLAYED, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...


1. An information processing apparatus that has a touch panel and switches a display language on the touch panel, comprising:a display control unit configured to cause the touch panel to display a first language switching button and a second language switching button for switching the display language on the touch panel;
a first switching unit configured to receive a selection of the first language switching button from a user and switch the display language on the touch panel to a language selected by the user from a list of languages displayed on the touch panel;
a second switching unit configured to, according to selection of the second language switching button by a user, switch the display language on the touch panel to one of a plurality of languages associated with the second language switching button based on a display order of the plurality of languages, the plurality of languages and the display order being set by a user in advance; and
an obtaining unit configured to obtain a language currently displayed on the touch panel, switched by at least the first switching unit out of the first switching unit and the second switching unit, according to selection of the second language switching button by a user,
wherein in a case where the second language switching button is selected by the user, the second switching unit switches the display language on the touch panel to a language put after the currently displayed language in the display order of the plurality of languages, different from the language obtained by the obtaining unit based on the display order.

US Pat. No. 11,070,688

INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM FOR DISPLAYING A MENU SCREEN FOR USING DESTINATION INFORMATION OF A DESTINATION

CANON KABUSHIKI KAISHA, ...


1. An apparatus having a function of transmitting image data for which image processing has been executed to a destination having been set, the apparatus comprising:at least one processor and at least one memory coupled to the at least one processor, the at least one memory having stored thereon instructions, which, when executed by the at least one processor, cause the at least one processor to function as:a displaying unit configured to display a software key based on processing of the function being executed, the software key being for giving an instruction to re-execute the processing of the function in accordance with an image processing setting regarding image processing of the executed processing and an image data transmission destination setting regarding a destination to which image data is to be transmitted,

wherein, in response to receiving a first operation performed on the software key, a setting screen in which the image processing setting corresponding to the software key is reflected is opened, and the image data transmission destination setting corresponding to the software key is not reflected in the setting screen, and
wherein, in response to receiving a second operation performed on the software key, a setting screen in which the image data transmission destination setting corresponding to the software key is reflected is opened, and the image processing setting corresponding to the software key is not reflected on the setting screen.

US Pat. No. 11,070,687

IMAGE FORMING APPARATUS, CONTROL METHOD THEREOF AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...


1. A control method of an image forming apparatus that forms an image based on an input image, the control method comprising:a first display step of displaying a UI screen for causing a user to determine a first adjustment-target color and a second adjustment-target color different from the first adjustment-target color from among colors included in the input image;
a forming step of forming a first patch group including patches in a plurality of colors similar to the first adjustment-target color and a second patch group including patches in a plurality of colors similar to the second adjustment-target color;
a second display step of displaying a UI screen for causing a user to select one patch from among the formed first patch group and one patch from among the formed second patch group, respectively; and
a determination step of determining a first destination color, which is a conversion destination of the first adjustment-target color, based on the one patch selected from among the first patch group and determining a second destination color, which is a conversion destination of the second adjustment-target color, based on the one patch selected from among the second patch group.

US Pat. No. 11,070,686

IMAGE PROCESSING APPARATUS, CONTROL METHOD OF IMAGE PROCESSING APPARATUS, AND RECORDING MEDIUM

CANON KABUSHIKI KAISHA, ...


1. An image processing apparatus having a plurality of functions comprising:a memory storing instructions; and
at least one processor executing the instructions causing the image processing apparatus to:
display an operation screen which includes a plurality of buttons for executing the plurality of functions;
display a selection screen for selecting a document, in a case in which a first button is selected from the operation screen;
receive a selection of processing for a first document which is selected on the selection screen, wherein selectable processing includes at least a first processing and a second processing;
display, in a case in which a selection of the first processing is received, a setting screen for accepting a setting for the first processing for the first document;
perform the first processing based on a first setting accepted by the setting screen;
store information including at least information indicating the first setting and information indicating the first document as history information;
display a second button corresponding to the history information on the operation screen which includes the plurality of buttons for executing the plurality of functions; and
read out the first setting and the first document and display the setting screen for the first processing in which the first setting performing the first processing to the first document is reflected, in a case the second button is selected.

US Pat. No. 11,070,685

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD FOR ACQUIRING IMAGE FORMING APPARATUS STATUS TO DISPLAY COMPOSITE IMAGE INDICATING DEVICE IMAGE PARTS AND ERROR IMAGE PARTS

KYOCERA DOCUMENT SOLUTION...


1. An information processing apparatus, comprising:a communication interface configured to communicate with an image forming apparatus;
a display device;
a storage device that stores device configuration definitions including a plurality of device image parts indicating the image forming apparatus and one or more devices physically attachable to the image forming apparatus, respectively,
a plurality of device image definitions defining the plurality of device image parts with respect to a plurality of device identifiers identifying the image forming apparatus and the one or more devices, respectively,
a plurality of device offset information definitions defining offset amounts with respect to the plurality of device identifiers, respectively, the offset amounts indicating relative positions of the plurality of device image parts, respectively,
one or more error image parts,
device error definitions defining, respectively, the one or more error image parts with respect to one or more error identifiers identifying one or more error types, respectively, and
a plurality of error offset information definitions defining relative positions of the one or more error image parts with respect to the plurality of device image parts, respectively, with respect to the one or more error identifiers and the plurality of device identifiers, respectively; and
a processor configured to operate as
a device image processor carried out by a software executing module, the software executing module being configured to execute a software program for driving and/or managing the image forming apparatus on an OS (Operation System),
a device status processor carried out by the software executing module,
an analyzer module configured to communicate with the device status processor, and
a device image module configured to communicate with the device image processor,
the device status processor being configured to
receive, from the image forming apparatus, a plurality of device identifiers identifying the image forming apparatus and one or more devices actually attached to the image forming apparatus, respectively, and status information being information of a status of the image forming apparatus, and
send the plurality of device identifiers and the status information to the analyzer module,
the analyzer module being configured to
receive the plurality of device identifiers and the status information from the device status processor,
analyze the status information to thereby determine an error predicted to occur in one of the image forming apparatus and the one or more devices, and
send, to the device status processor, an error identifier and an error device identifier, the error identifier identifying the determined error, the error device identifier being a device identifier identifying one of the image forming apparatus and the one or more devices, in which an error is predicted to occur,
the device status processor being configured to
receive the error identifier and the error device identifier from the analyzer module, and
supply the plurality of device identifiers, the error identifier, and the error device identifier to the device image processor,
the device image processor being configured to
obtain the plurality of device identifiers, the error identifier, and the error device identifier from the device status processor, and
send the plurality of obtained device identifiers, the error identifier, and the error device identifier to the device image module,
the device image module being configured to
receive the plurality of device identifiers, the error identifier, and the error device identifier from the device image processor,
read, from the device configuration definition, a plurality of device image definitions defined with respect to the plurality of received device identifiers, respectively,
read, from the device configuration definition, a plurality of device offset information definitions defined with respect to the plurality of received device identifiers, respectively,
send, to the device image processor, the plurality of read device image definitions and the plurality of read device offset information definitions,
read, from the device configuration definition, a device error definition defined with respect to the received error identifier,
read, from the device configuration definition, an error offset information definition defined with respect to the received error identifier and the received error device identifier, and
send, to the device image processor, the read device error definition and the read error offset information definition,
the device image processor being configured to
receive the plurality of device image definitions and the plurality of device offset information definitions from the device image module,
read, from the device configuration definition, a plurality of device image parts defined by the plurality of received device image definitions, respectively,
receive, from the device image module, the device error definition and the error offset information definition,
read, from the device configuration definition, an error image part defined by the received device error definition,
arrange the plurality of read device image parts on a plurality of offset positions defined by the plurality of received device offset information definitions, respectively, and further arrange the read error image part on an offset position defined by the received error offset information definition, to thereby generate a composite image, and
cause the software executing module to display the composite image on the display device;
wherein the analyzer module is configured to analyze the status information to thereby determine a time at which the error is predicted to occur, and supply time information to the device status processor, the time information being information indicating the determined time, the device status processor is configured to receive the time information from the analyzer module, and supply the time information to the device image processor, and the device image processor is configured to obtain the time information from the device status processor, and generate the composite image including the time information;
wherein the device image processor is configured to determine whether or not a difference between the time at which the error is predicted to occur and a current time is equal to or larger than a first threshold on a basis of the time information, and generate one composite image in a case where it is determined that the difference is egual to or larger than the first threshold, and generate another composite image different from the one composite image in a case where it is determined that the difference is smaller than the first threshold.

US Pat. No. 11,070,684

RETAIL PHOTO ORDER PRODUCTION AND WORKFLOW MANAGEMENT SYSTEM AND METHODS OF USE

KODAK ALARIS INC., Roche...


1. A method of operating a photo product creation system, comprising:receiving images via a user-accessible image input device at a user input terminal;
receiving a photo order at the user input terminal, the photo order comprising one or more photo products that incorporate the images;
transmitting the images and the photo order from the user input terminal to a centralized computer processor located separate from the user input terminal;
routing the photo order from the centralized computer processor to a user-accessible output array located separate from the user input terminal and the centralized computer processor, wherein the user-accessible output array comprises a plurality of output array units;
calculating a fee for the photo order;
calculating an approximate time of completion for the photo order;
producing a receipt at the user input terminal, wherein the receipt is either a physical receipt or virtual receipt comprising alphanumeric and machine readable information representing the requested photo order;
displaying, an order status indicator at the user-accessible output array, wherein the order status indicator comprises the approximate time of completion for each of the photo products in the photo order and a pick-up location for each of the photo products, wherein each pick-up location is a specifically identified output array unit corresponding to each of the one or more photo products in the photo order;
transmitting, by the centralized computer processor, a notification to a remote communication device whether any of the photo products requires specialty finishing;
updating the order status indicator at the user-accessible output array upon completion of the photo products in the photo order;
verifying prior payment of the fee for the photo order and verifying the identification of the photo order by reading the receipt by a receipt reader at the user-accessible output array to allow access to the output array units corresponding to the pick-up locations for each of the photo products in the photo order, wherein allowing access comprises unlocking a locking mechanism at each of the output array units corresponding to the pick-up locations for each of the photo products in the photo order.

US Pat. No. 11,070,683

ROTATION DRIVE CONTROL APPARATUS, SHEET PROCESSING APPARATUS AND IMAGE FORMING APPARATUS

CANON FINETECH NISCA INC....


1. A rotation drive control apparatus comprising:a motor;
a control section including a control member for driving and controlling the motor;
a mechanism section including a punch cam that undergoes drive of the motor to rotate; and
a detecting section including a first detecting member that detects a rotation reference position as a reference of rotation of the punch cam, and a second detecting member that detects a rotation shift position of the punch cam,
wherein the control member is provided with a first mode for counting a detection value of the second detecting member to control a shift amount of the punch cam, based on a detection value of the first detecting member obtained in controlling and rotating the motor, and
a second mode for extracting at least one abnormal portion from among the motor, the control section, the mechanism section, and the detecting section, based on detection patterns comprised of combinations of a state in which the first detecting member detects the rotation reference position within a first predetermined time, or a state in which the first detecting member does not detect the rotation reference position within the first predetermined time, and a state in which the second detecting member detects the rotation shift position within a second predetermined time, or a state in which the second detecting member does not detect the rotation shift position within the second predetermined time, obtained in controlling and rotating the motor.

US Pat. No. 11,070,682

MAINTENANCE SYSTEM, MAINTENANCE SERVER, AND MAINTENANCE METHOD

RICOH COMPANY, LTD., Tok...


1. A system comprising:a server including first circuitry; and
a plurality of apparatuses communicably connected with the server through one or more networks, each of the plurality of apparatuses including second circuitry,
the first circuitry being configured to,receive log data from each of the plurality of apparatuses,
generate a prediction model for predicting at least one occurrence of at least one abnormal state of the plurality of apparatuses based on the log data, and
transmit the prediction model to the plurality of apparatuses; and

the second circuitry being configured to,transmit the log data to the server,
receive the prediction model from the server, and
predict an occurrence of the at least one abnormal state of the apparatus based on the received prediction model.


US Pat. No. 11,070,681

PLATFORM FOR ENABLING SPONSORS TO SPONSOR FUNCTIONS OF A COMPUTING DEVICE

KAJEET, INC., McLean, VA...


1. A method executable on a first computing device associated with a sponsor for sponsoring a mobile computing device associated with a subscriber to services of a service provider, the services supporting a use of the mobile computing device over a network of the service provider, the method comprising:sending, by the first computing device to an exchange platform, first information indicative of a selection of a sponsorship managed by the service provider, the first information associating the selected sponsorship with an account associated with the sponsor and comprising a dynamic rule for applying the sponsorship to the mobile computing device, the dynamic rule usable to determine in real time whether the services of the service provider are allowed to be accessed by the mobile computing device based on the sponsorship, automatically applying the sponsorship for a specified period, without presentation of advertisements and notifications to initiate the sponsorship by the mobile computing device, and based on one or more conditions, including a current location of the mobile computing device; and
receiving, by the first computing device from the exchange platform, second information indicative of an application of the sponsorship to the mobile computing device based at least in part on the dynamic rule.

US Pat. No. 11,070,680

METHOD AND APPARATUS FOR DISTRIBUTING CONTENT VIA A WIRELESS COMMUNICATION NETWORK


1. A server comprising:a processing system including a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, the operations comprising:aggregating unused data capacity associated with a plurality of servers of a wireless communication system to identify a broadband bandwidth, wherein the aggregating is based on unused data capacity information that is obtained via monitoring of the plurality of servers, and wherein the plurality of servers retain data capacity for providing services to mobile devices subscribed to the wireless communication system;
mapping first segments of first content for delivery by a first group of the plurality of servers according to a first portion of the broadband bandwidth;
receiving, according to the mapping of the first segments, the first segments from the first group of the plurality of servers;
transmitting a first content stream to a customer premises device, wherein the first content stream includes the first segments;
mapping second segments of second content for delivery by a second group of the plurality of servers according to a second portion of the broadband bandwidth;
determining a resource usage pattern based on the unused data capacity information that is obtained via the monitoring of the plurality of servers;
determining a time period for receiving the second segments of the second content from the second group of the plurality of servers according to the resource usage pattern;
receiving, according to the mapping of the second segments and the time period, the second segments from the second group of the plurality of servers; and
storing the second segments for subsequent transmission to the customer premises device.


US Pat. No. 11,070,679

CALL SYSTEM FOR SIMULTANEOUS CALLS TO TELEPHONES IN AREA FOR DISASTER AND EMERGENCY

COAIDO INC., Tokyo (JP)


1. A call apparatus comprising:a first memory configured to store therein location information of telephones including a landline telephone, the telephones being call targets;
a second memory configured to store therein information indicating, for each of a plurality of different of types of SOS, a corresponding range of an area to be used for extraction, wherein the range is a governmental administrative division;
a communications interface configured to receive an SOS; and
a processor configured to perform a process including,accessing the second memory to determine, according to a type of the SOS received by the communications interface, the corresponding range of the area for extraction,
accessing the first memory to specify telephones located within the determined area, and
simultaneously calling the specified telephones;

wherein the information stored in the second memory relates the plurality of different types of SOS each to a plurality of binary indicators, wherein each of the binary indicators has a value indication the governmental administrative division is included or not included in the range.

US Pat. No. 11,070,678

ESTABLISHING A TELEPHONY SESSION

Metaswitch Networks Ltd.,...


1. A method for use in establishing a telephony session between first and second telephony devices in a telephony network, the method comprising, at the first telephony device:receiving a telephony session establishment request from telephony network equipment in the telephony network via a signalling link;
determining whether or not a user of the first telephony device has accepted the received telephony session establishment request;
in response to determining that the user of the first telephony device has accepted the received telephony session establishment request, transmitting an acceptance message to the telephony network equipment via a data link that is separate to the signalling link, the acceptance message indicating acceptance of the received telephony session establishment request by the user of the first telephony device; and
in response to determining that the user of the first telephony device has not accepted the received telephony session establishment request, performing a predetermined action.

US Pat. No. 11,070,677

TECHNIQUES FOR MEDIA CALL MULTIWAY RELAY ESCALATION

FACEBOOK, INC., Menlo Pa...


1. A computer-implemented method, comprising:initiating, by a first client device, a peer-to-peer two-party media call with a second client device by sending a peer-to-peer two-party call request to a messaging server, wherein the peer-to-peer two-party call request is sent by the messaging server to the second client device and includes a multiway call identifier for connecting the first client device, the second client device, and a third client device to a multiway media call session by a multiway server;
performing the peer-to-peer two-party media call with the second client device;
detecting a multiway media call escalation event at the first client device;
initiating, by the first client device, the multiway media call session by sending a multiway join request to the multiway server, wherein a first escalation signal is sent by the multiway server to the second client device and includes the multiway call identifier;
joining the multiway media call session; and
transitioning the first client device from the peer-to-peer two-party media call to the multiway media call session.

US Pat. No. 11,070,676

EMBEDDED AUDIO PASSCODE IN RINGTONE TO ESTABLISH SECURE CONNECTION FOR ARBITRARY PHONE RELAY

Apple Inc., Cupertino, C...


1. A multi-user smart home device comprising:one or more speakers;
a data interface;
a memory device to store instructions; and
one or more processors coupled with the memory device, the one or more processors to execute the instructions, wherein the instructions cause the one or more processors to:
receive a first message via the data interface, the first message to indicate that a mobile electronic device proximate with the multi-user smart home device has an incoming call, the incoming call received via a baseband processor of the mobile electronic device;
determine a first audio sequence for playback via the one or more speakers, wherein the first audio sequence includes a call announcement for the incoming call;
encode a seed identifier into the first audio sequence to generate a second audio sequence, the seed identifier to identify the multi-user smart home device to the mobile electronic device and to enable generation of an encryption key to encrypt a data channel between the multi-user smart home device and the mobile electronic device;
play the second audio sequence via the one or more speakers;
receive a second message via the data interface, the second message to indicate that the mobile electronic device is to relay audio data of for the incoming call to the multi-user smart home device via an encrypted data channel established via the data interface, the encrypted data channel encrypted based on the encryption key; and
play the audio data for the incoming call via the one or more speakers, the audio data for the incoming call received via the encrypted data channel.

US Pat. No. 11,070,675

SYSTEM, DEVICE, AND METHOD FOR RINGLESS VOICEMAIL DELIVERY

MAGNIFY TELECOM, LLC, La...


16. A computing device comprising:a computer-readable recording medium having a computer program recorded thereon; and
a processor configured to execute the computer program recorded on the computer-readable recording medium,
wherein the processor, by executing the computer program, is configured to cause the computing device to:
initiate a first SIP session at a first SIP server external to the computing device;
associate the first SIP session with a first socket listener service, wherein the processor causes the first socket listener service to receive a provisional response from the first SIP server, the provisional response indicating a session state;
initiate, in response to receiving the provisional response, a second SIP session at a second SIP server external to the computing device;
associate the second SIP session with a second socket listener service;
receive a success response indicating that a call with a user device was successfully established in association with either the first SIP session or the second SIP session, wherein the processor controls (i) the first socket listener service to receive the success response from the first SIP server when the call with the user device was successfully established in association with the first SIP session, and (ii) the second socket listener service to receive the success response from the second SIP server when the call with the user device was successfully established in association with the second SIP session;
terminate, in response to receiving the success response, the first SIP session or the second SIP session not associated with the success response; and
transmit, in response to receiving the success response, an audio message to a voicemail system associated with the user device.

US Pat. No. 11,070,674

TECHNIQUES FOR BENCHMARKING PAIRING STRATEGIES IN A CONTACT CENTER SYSTEM

AFINITI, LTD., Hamilton ...


1. A method comprising:collecting first performance information for a first pairing strategy;
collecting second performance information for a second paring strategy, wherein the performance information indicates that the first pairing strategy has performed better than the second pairing strategy;
based on a random number, selecting, by at least one computer processor communicatively coupled to and configured to operate in a contact center system, a pairing strategy from a set of pairing strategies comprising the first pairing strategy and the second pairing strategy;
after selecting the first pairing strategy or the second paring strategy based on the random number, pairing, by the at least one computer processor, a contact to an agent in the contact center system using the selected pairing strategy; and
instructing a switch in the contact center system to connect the contact with the agent.

US Pat. No. 11,070,673

CALL MONITORING AND FEEDBACK REPORTING USING MACHINE LEARNING

Bank of America Corporati...


1. A call monitoring device, comprising:a network interface configured to receive phone calls; and
a processor operably coupled to the network interface, the processor configured to:obtain at least a portion of a phone call, wherein the phone call is associated with (a) metadata that identifies keywords used during the phone call and characteristics of a voice signal associated with the phone call; and (b) a transcript for the phone call, the transcript comprising text;
input the transcript and the metadata into a machine learning model, wherein:the machine learning model is configured to generate a call profile based on text from the transcript and the metadata for the phone call; and
the call profile comprises a first call classification for the phone call;

receive the call profile from the machine learning model in response to inputting the transcript and the metadata into the machine learning model;
identify a call log associated with the phone call, wherein the call log comprises a second call classification for the phone call;
compare the first call classification to the second call classification;
determine the first call classification does not match the second call classification;
generate a feedback report that identifies the first call classification in response to determining that the first call classification does not match the second call classification; and
output the feedback report.


US Pat. No. 11,070,672

SYSTEM AND METHOD OF ADAPTING CUSTOMER CARE BASED ON SUBSCRIBER STATE

Sprint Communications Com...


1. A method of adapting customer care handling automated workflows, comprising:creating records of calls to a customer care handling system by a wireless communication service subscriber;
analyzing the records of calls to the customer care handling system by a customer care handling adaptation application that executes on a computer system, wherein the analyzing determines a frequency of calls to customer care of the subscriber, a reason associated with each of the calls to customer care of the subscriber, and a frequency of account credits granted to the subscriber;
determining by the application that the frequency of calls to customer care exceeds a predefined call frequency threshold;
determining by the application that the reasons of different calls to customer care during a predefined time duration are different reasons;
determining by the application that the frequency of account credits granted to the subscriber exceeds a predefined credit frequency threshold;
tagging the wireless communication service account of the subscriber by the application as manipulative of customer care;
receiving a call from the subscriber to the customer care handling system;
determining by the customer care handling system that the subscriber is tagged as manipulative of customer care; and
adapting the handling automated workflow for the subscriber by the customer care handling system based on the determination that the subscriber is tagged as manipulative of customer care, wherein adapting the automated workflow comprises proposing to the subscriber that a customer care expert call back to the subscriber.

US Pat. No. 11,070,671

MIDDLEWARE PIPELINE THAT PROVIDES ACCESS TO EXTERNAL SERVERS TO FACILITATE CUSTOMER-SUPPORT CONVERSATIONS

Zendesk, Inc., San Franc...


1. A method for accessing external servers to process messages during customer-support conversations in an online customer-support system, the method comprising:receiving a message from a sender while the message is in transit between the sender and a receiver during a customer-support conversation, wherein the customer-support conversation is between a customer and a responsive entity, wherein the sender is one of the customer and the responsive entity, wherein the receiver is the other of the customer and the responsive entity, and wherein the customer-support conversation relates to an issue the customer has with a product or a service used by the customer;
feeding the message through a pipeline of software-based message processors, wherein each software-based message processor in the pipeline is configured to make a program call to an associated external server to perform an operation on the message before forwarding the message to a subsequent stage of the pipeline; and
when the message finishes transiting the pipeline, forwarding the message to the receiver.

US Pat. No. 11,070,670

PLATFORM FOR EMERGENCY EVENT SUBSCRIPTIONS

RapidDeploy, Inc., Austi...


1. A system comprising processing circuitry and a memory, the system configured to execute a data subscription system comprising:an event emitter to:receive, from a web-based computer-aided dispatch (CAD) service, domain event data describing a domain event related to an emergency call, the domain event data comprising a tenant identifier identifying a tenant associated with the domain event and an agency identify identifying an agency associated with the domain event;
identify a subscription queue subscribed to the domain event data based on at least one of the tenant identifier and the agency identifier, the subscription queue associated with a receiving system; and
add a data message comprising at least a subset of the domain event data to the subscription queue; and

a distribution module to:retrieve the data message from the subscription queue;
transform the data message based on a formatting rule to format the data message in a particular format associated with the receiving system; and
transmit the transformed data message to the receiving system, the receiving system configured to output a notification in response to receiving the transformed data message.


US Pat. No. 11,070,669

COMMUNICATION DEVICE AND METHODS FOR USE BY HEARING IMPAIRED

ULTRATEC INC., Madison, ...


1. A method to adjust audio amplification in a communication device, the method comprising:(a) storing at least a first sample voice recording in a memory device wherein the first sample voice recording includes at least one of a male voice and a female voice;
(b) obtaining a request from a user regarding adjusting settings of audio output by the communication device;
(c) in response to obtaining the request, presenting an audio adjustment interface on a display of the communication device, the audio adjustment interface including a visual depiction of a plurality of volume settings that each correspond to a different one of a plurality of frequencies, the plurality of volume settings indicating amplifications applied to the plurality of frequencies of the audio output by the communication device;
(d) obtaining an action to adjust the amplification of one or more of the plurality of volume settings in the audio adjustment interface to generate first adjusted amplification settings;
(e) in response to obtaining the action, applying the adjusted first amplification settings to the first sample voice recording and broadcasting the adjusted first sample voice recording via a speaker associated with the communication device;
(f) subsequent to commencing broadcasting of the adjusted first sample voice recording, obtaining additional actions adjusting the amplification of the one or more of the plurality of volume settings to generate subsequent adjusted amplification settings, applying the subsequent adjusted amplification settings to the first sample voice recording and broadcasting the adjusted first sample voice signal via the speaker until the subsequent adjusted amplification settings are optimized for user preference, the optimized setting for the first sample voice recording being first optimized settings;
(g) storing the first optimized settings for subsequent use;
(h) receiving a voice signal transmitted by a separate communication device during a subsequent call;
(i) applying the first optimized settings to the voice signal; and
(j) broadcasting the modified voice signal for the user to hear.

US Pat. No. 11,070,668

ADVANCED CALL LOG NOTIFICATIONS

T-MOBILE USA, INC., Bell...


1. One or more non-transitory computer-readable media storing computer-executable instructions that upon execution cause one or more processors to perform acts comprising:organizing a call routing scheme based on call routing configuration settings, the call routing scheme directing routing of incoming calls to a first user device and a second user device that receive services from a telecommunications network, the first user device operated by a first subscriber of the telecommunications network and associated with a first user device identifier and the second user device operated by a second subscriber and associated with a second user device identifier;
receiving a call log request from the first user device, the call log request including the first user device identifier;
transmitting the call log request to a database server of the telecommunications network to obtain a call log for an incoming call to the first user device and the second user device, the incoming call being routed according to the call routing scheme; and
sending, in response to determining that the incoming call is not routed to the first user device, the call log to the first user device, the call log comprising call log information including the second user device identifier of the second user device that answered the incoming call or missed the incoming call.

US Pat. No. 11,070,667

DETECTING A SPOOFED CALL


1. A device, comprising:a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:
using an indicator associated with a call from a communication device, determining a first geographic area, associated with a service network, via which the call has originated;
determining a second geographic area based on an analysis of an area code of a caller identification number of the call;
in response to determining that the second geographic area is not consistent with the first geographic area according to a consistency criterion, sending a first message to network equipment associated with the service network, wherein the first message comprises a request to determine whether the caller identification number is registered with a provider entity associated with the service network; and
facilitating blocking the call.

US Pat. No. 11,070,666

METHODS AND DEVICES FOR IMPROVEMENTS RELATING TO VOICE QUALITY ESTIMATION

Dolby Laboratories Licens...


1. A method for calculating a voice quality estimate in a packet based voice communication system, the method comprising:receiving data comprising a sequence of encoded voice packets; and
calculating, using a voice quality estimating algorithm, the voice quality estimate based on an input that is switchable between a first and a second input mode,
wherein, in the first input mode, the input is a statistical metric relating to the sequence of encoded voice packets,
wherein, in the second input mode, the input is a pre-processed version of the statistical metric relating to the sequence of encoded voice packets,
wherein a prediction error of the voice quality estimate based on the pre-processed version of the statistical metric is reduced compared with the prediction error of the voice quality estimate based on the statistical metric,
wherein the received data is transmitted from one or more end-points in the voice communication system, wherein encoded voice packets transmitted from the one or more end-points comprises the received sequence of encoded voice packets and one or more lost voice packets, and
wherein the pre-processed version is generated based at least in part on weighting the lost voice packets according to their perceptual importance.

US Pat. No. 11,070,665

VOICE OVER INTERNET PROTOCOL PROCESSING METHOD AND RELATED NETWORK DEVICE

HUAWEI TECHNOLOGIES CO., ...


1. A voice over Internet protocol processing method, comprising:detecting, by a calling access network element, an off-hook event, wherein the off-hook event is off-hook of a first phone set, and the first phone set is connected to the calling access network element;
encapsulating, by the calling access network element, the off-hook event into first signaling;
sending, by the calling access network element, the first signaling to a cloud server, wherein the first signaling causes the cloud server to create therein a session management and a media management;
receiving, by the calling access network element, second signaling sent by the cloud server, wherein the second signaling comprises a connect command, a used encoding/decoding form, a sampling rate, and a packet time, wherein the second signaling is used to establish a first transmission path between the calling access network element and the cloud server, and the first transmission path is used to transmit data between the calling access network element and the cloud server;
establishing, by the calling access network element, the first transmission path based on the second signaling; and
encapsulating, by the calling access network element, at the sampling rate and a required frame size, a pulse code modulated (PCM) bitstream output by a codec, adding control information to the PCM bitstream, and transmitting the PCM bitstream, with the added control information, through the first transmission path;
wherein the cloud server performs signal tone insertion and detection on the PCM bitstream, and wherein the calling access network element does not perform the signal tone insertion or detection on the PCM bitstream.

US Pat. No. 11,070,664

METHODS AND SYSTEMS EMPLOYING ORIENTATION OF PHONE TO ADJUST PHYSICAL OBJECTS

Lear Corporation, Southf...


1. A system comprising:a phone configured to transmit an orientation signal indicative of an orientation of the phone as the orientation of the phone changes;
a controller configured to receive the orientation signal from the phone and to adjust a vehicle seat in correspondence with the orientation of the phone as the orientation of the phone changes; and
wherein the orientation of the phone changes independently of the vehicle seat while the vehicle seat is being adjusted in correspondence with the orientation of the phone as the orientation of the phone changes.

US Pat. No. 11,070,663

METHOD AND SYSTEM OF IMPLEMENTING AN ADVANCED MULTIFUNCTIONAL DIALER CAPABLE OF MANAGING MULTIPLE CALLING ACCOUNTS


1. A software application embodied in a non-transitory computer readable medium, comprising:code instructions for utilization of a plurality of distinct public switched telephone network (PSTN) numbers with a mobile device, by prompting a user to create a plurality of calling accounts, each calling account comprising at least a textual identifier and a distinct PSTN number, and for storing of a plurality of said calling accounts for use within the mobile device, wherein each distinct PSTN number is a number associated with a subscriber identity module (SIM) card, a direct inward dial number, or a landline phone number;
code instructions for choosing from among the plurality of calling accounts for originating a communication event using the mobile device, and for indicating the chosen calling account as an origin of the communication event, wherein each of the plurality of calling accounts is available to be chosen regardless of whether its PSTN number is associated with a hardware component configured within the mobile device to identify the mobile device during a communication event
wherein each of the calling accounts is configured to utilize the hardware component during a communication event, and switching between different calling accounts is performed without changing the same component;
and code instructions for displaying a graphical user interface (GUI), the GUI comprising:
at least one multifunctional graphic user interface element having at least two activation states:
(i) a first state, when actuated, providing a basic function, and
(ii) a second state, when actuated, providing an advanced function; whereby each of said activation states is actuated by a different user action;
wherein said at least one multifunctional graphic user interface element is configured to facilitate selection of one of said plurality of calling accounts in order to intitiate the communication event with the selected calling account.

US Pat. No. 11,070,662

INVALID AREA SPECIFYING METHOD FOR TOUCH PANEL OF MOBILE TERMINAL

NEC CORPORATION, Tokyo (...


1. A mobile terminal comprising:a touch panel display configured to detect a touch thereon;
a memory configured to store a plurality of invalid area information indicating respective areas of the touch panel display each of which is disabled from handling as an input operation the touch on the touch panel display, wherein the plurality of invalid area information includes first invalid area information and second invalid area information indicating, respectively, a first invalid area and a second invalid area which are areas of the touch panel display that are disabled from handling as an input operation the touch on the touch panel display; and
a controller comprising at least one processor configured to execute instructions to implement:detecting an operation on the touch panel display to manipulate at least one of a position and a shape of the first invalid area;
store, in the memory, third invalid area information indicating a third invalid area corresponding to the manipulated first invalid area on the touch panel display; and
disable the third invalid area of the touch panel display from handling as an input operation the touch on the third invalid area of the touch panel display.


US Pat. No. 11,070,661

RESTRICTING MOBILE DEVICE USAGE

Cellepathy Inc., Sammami...


1. A method comprising:receiving a visual capture, the visual capture originating at a mobile device, the visual capture comprising an image of an interior of a vehicle;
processing the visual capture by one or more processors to identify at least two hands and a steering wheel one within the visual capture; and
based on an identification of the at least two hands and the steering wheel within the visual capture, adjusting an implementation of a restriction at the mobile device.

US Pat. No. 11,070,660

DATING METHOD


1. A system for facilitating dating amongst a community of persons, the system comprising:a notification system having signage by which members of the community can make their participation in the community apparent by making the signage visible to other compatible members of the community when in proximity to one another, the signage comprising stickers, including a system of color coding such that a sexual preference of a member can be made known by making the signage a predefined color, and flags including the system of color coding such that a sexual preference of a member can be made known by making the signage a predefined color, the signage adapted to visibly applied to a vehicle associated with each of the members of the community;
a mapping system by which members of the community can view their current location and icons displaying locations of other compatible members of the community, the icons further displaying sexual preference and a unique number for each other compatible member, the icons based on one or more of: current proximity, proximity within a predetermined time period, and a combination thereof;
a recording system by which each member of a community can, in respect of compatible members in the community to whom they have had proximity, make it known that a contact would be welcomed; and
a communication system which facilitates a communication between members of the community who have made it known to the recording system that they would each welcome contact.

US Pat. No. 11,070,659

INCOMING VOICE CALLING METHOD AND TERMINAL

HUAWEI TECHNOLOGIES CO., ...


1. A system comprising:a first terminal configured to:display a call composer interface, wherein the call composer interface sets attribute information, wherein the attribute information comprises an importance degree of a call, text content, picture information, location information, and a multimedia file, and wherein the multimedia file comprises at least one of a voice file or a video file;
obtain the multimedia file from the call composer interface;
send the multimedia file to a server on a dial-up interface;
receive a multimedia identifier from the server in response to sending the multimedia file, wherein the multimedia identifier represents a location of the multimedia file in the server;
send the multimedia identifier; and
send a call request; and

a second terminal configured to:receive the multimedia identifier from the first terminal;
receive the call request from the first terminal;
play, in response to the call request, the voice file as an incoming call ringtone when the multimedia file is the voice file; or

display, in response to the call request, an image of the video file and play voice of the video file as the incoming call ringtone when the multimedia file is the video file,
wherein sending the multimedia identifier comprises sending the multimedia identifier specified by the first terminal to the second terminal or sending the multimedia identifier that is obtained by the first terminal at a last time point to the second terminal when the first terminal sends at least two multimedia files to the server and receives at least two multimedia file identifiers within a preset time period.

US Pat. No. 11,070,658

ZERO TOUCH PROVISIONING

Hewlett Packard Enterpris...


1. A method comprising:in response to a first event, automatically uploading device information from a first network device to a second network device providing a cloud-based service;
receiving, by the first network device and from the second network device, provisioning information for controlling an operation of the first network device responsive to uploading the device information;
provisioning the first network device based on the provisioning information;
establishing communication with a configuration device;
receiving configuration information for the first network device from the configuration device based on a validation check performed by the configuration device on the first network device using validation information provided by the second network device; and
upon validation via a trusted platform module deployed within the first network device, configuring the first network device based on the received configuration information.

US Pat. No. 11,070,657

REMOTE TUNING AND DIAGNOSTIC INTERFACE FOR HANDS-FREE SYSTEMS

Continental Automotive Sy...


1. A method of remotely tuning a hands-free audio system used with a wireless communication device in a moving vehicle, which is being driven by a first person, the wireless communications device being operatively coupled to a controller for the hands-free audio system and which controls the hands-free audio system, the method comprising:using a first wireless communications link to establish a voice telephone call between the first person, who is driving the moving vehicle, and a second person who is at a first remote location distant from the moving vehicle;
transducing audio signals in the moving vehicle using the hands-free audio system located in the moving vehicle to provide a signal representing said audio signals in the moving vehicle being driven by the first person, wherein the audio signals include speech of the telephone call between the first person and the second person;
transmitting the signal representing said audio signals to a remotely-located communications device using the first wireless communications link, the remotely-located communications device being at the first remote location;
generating audio signals by said remotely-located communications device using said signal representing said audio signals;
monitoring audio signals generated by the remotely-located communications device and evaluating the audio signals generated by the remotely-located communications device to determine a quality of said audio signals, the steps of monitoring and evaluating being performed by the second person, who is at said first remote location;
transmitting a command from the first remote location to the hands-free audio system using a second wireless communications link, the second wireless communications link being different from the first wireless communications link, the command that is transmitted to the hands-free audio system being selected by said second person in order to change an operating parameter of the hands-free audio system in order to change the audio quality at the remote location as perceived by the second person.

US Pat. No. 11,070,656

DEVICE WITH AT LEAST ONE TRANSPARENT COVER

TRUMPF PHOTONIC COMPONENT...


1. A mobile apparatus comprising:a housing having a first transparent cover, wherein the housing comprises a front wall oriented in an inclined manner with respect to a further first housing wall of the housing, and wherein at least one of an operating button, a keyboard, at least one rotary switch and a touch-sensitive screen is arranged on an outer side of the front wall;
a circuit board having a functional side, said circuit board being arranged in the housing parallel to the front wall and the functional side being oriented toward the front wall; and
at least one light-emitting device arranged on the functional side of the circuit board and configured for emitting light beams;
wherein the first transparent cover is transparent to at least one partial spectrum of the light beams emitted by the at least one light-emitting device, and
whereinthe first transparent cover forms at least one partial region of the first housing wall of the housing;
the first transparent cover is oriented in a manner inclined by an angle with respect to the functional side of the circuit board; and
at least one reflector having a reflective surface is arranged in the housing in such a way that the light beams emitted by the at least one light-emitting device and deflected by means of the at least one reflective surface of the at least one reflector at least partly impinges on the first transparent cover and are at least partly transmitted through the first transparent cover; and

a sensor system for detecting particles in surroundings of the mobile apparatus using the light beams emitted by the at least one light-emitting device and deflected by means of the at least one reflective surface of the at least one reflector.

US Pat. No. 11,070,655

HOUSING FEATURES OF AN ELECTRONIC DEVICE

APPLE INC., Cupertino, C...


1. A portable electronic device comprising:a display;
a cover glass positioned over the display; and
an enclosure at least partially surrounding the display and coupled to the cover glass, the enclosure comprising:a first metal material defining a first portion of a sidewall of the enclosure, the first metal material defining a blind recess that extends into the sidewall;
a non-metal material defining a second portion of the sidewall of the enclosure, a portion of the non-metal material at least partially fills the blind recess defined in the first metal material, thereby defining a mechanical interlock between the first metal material and the non-metal material; and
a second metal material defining a third portion of the sidewall, the non-metal material positioned between the first and second metal materials.


US Pat. No. 11,070,654

SOCKETS FOR SHARED LINK APPLICATIONS

EMC IP HOLDING COMPANY LL...


1. A method comprising:instantiating a first plurality of type-1 network sockets on a source computing system, each of the type-1 network sockets having a first queue depth;
instantiating a second plurality of type-2 network sockets on the source computing system, each of the type-2 network sockets having a second queue depth that is greater than the first queue depth;
transitioning the source computing system into a first state, the first state being one in which data replication messages are transmitted by the source computing system to a target computing system by using both the type-1 and type-2 network sockets; and
transitioning the source computing system from the first state into a second state, the second state being one in which data replication messages are transmitted, by the source computing system to the target computing system, by using the type-2 network sockets,
wherein the source computing system is transitioned from the first state to the second state in response to detecting a request to transmit a synchronous data replication message,
wherein transitioning the source computing system from the first state into the second state includes modifying an active socket pool that is used for the transmission of data replication messages, such that, when the source computing system is in the second state, no type-1 network sockets are used, by the source computing system, for the transmission of data replication messages, and
wherein the type-1 network sockets are dynamically added and removed from the active socket pool depending on a type of data replication that is performed by the source computing system.

US Pat. No. 11,070,653

DRIVERLESS WIRELESS MODULE

GLOBAL TELECOM, CORP, Ir...


1. A method to communicate network data associated with a network with a host device that does not include a network driver, the method comprising:receiving a radio frequency signal with a module, the radio frequency signal including network data for a host device that does not include a network driver, the host device unable to communicate with the network without the network driver;
generating, with the module, baseband data that includes the network data;
adding, with the module, informational data to the baseband data to form host data, the informational data associated with one or more of the RF signal and the network; and
sending, with the module, the host data over an interface to the host device, the host data including the network data.

US Pat. No. 11,070,652

SYSTEM AND METHOD FOR ENHANCING ASSET MAPS OF PHYSICAL ASSETS IN A DEPLOYMENT

EMC IP Holding Company LL...


8. A method for managing a deployment, comprising:obtaining a client oriented location request regarding the deployment from a client,wherein the deployment comprises a plurality of physical hardware assets and wherein the client comprises a physical positioning sensor;

in response to obtaining the client oriented location request:obtaining location information and an asset map of the deployment, wherein the location information specifies a location of the client relative to at least one of the plurality of physical hardware assets, wherein the location information is determined, at least in part, using the physical positioning sensor;
generating a client oriented asset map of the deployment using the location information and the asset map of the deployment;
modifying the client oriented asset map using a data source that describes at least a characteristic of a portion of the deployment to obtain an enhanced client oriented asset map; and
performing an action set using the enhanced client oriented asset map to service the client oriented location request.


US Pat. No. 11,070,651

CONTRACTOR DATA SERVER AND METHODS FOR USE THEREWITH FOR GENERATING INDIVIDUAL SCORING DATA


1. A system comprising:a network interface for communicating via a network;
a memory that stores a contractor data server application;
a processing module, coupled to the memory and the network interface, the processing module including at least one processor that executes the contractor data server application to bidirectionally communicate contractor data with a first client device via the network interface, wherein the contractor data includes service data received from the first client device that indicates a selected one of a plurality of service types, a selected one of a plurality of specific services that indicates a service performed, service date data that indicates a service date, service address data that indicates a service address, and contractor review data relating to services performed at the service address;
wherein the contractor data server application generates neighborhood scoring data for a neighborhood that includes the service address;
wherein the contractor data server application processes the contractor review data in conjunction with neighborhood scoring data from at least one other service address to generate individual scoring data relating to the service address, wherein the individual scoring data estimates homeowner conduct with contractors at the service address;
wherein generating the individual scoring data includes assigning a first weight to aggregate contractor review data for the service address that includes the contractor review data and assigning a second weight to the neighborhood scoring data, and wherein a weight differential between the first weight and the second weight is a monotonically increasing function of a number of contractor reviews for the service address; and
wherein the contractor data server application sends the individual scoring data a second client device via the network interface.

US Pat. No. 11,070,650

DE-DUPLICATING REMOTE PROCEDURE CALLS

International Business Ma...


1. A computer-implemented method comprising:generating, on a processor, a plurality of local pending remote procedure calls;
identifying, on the processor, a set of duplicate remote procedure calls among the plurality of remote procedure calls, wherein at least one of the remote procedure calls of the set of duplicate remote procedure calls is a foreground request and at least one of the remote procedure calls of the set of duplicate remote procedure calls is a background request;
associating, on the processor, each remote procedure call within the set of duplicate remote procedure calls with one another;
executing, on the processor, a remote procedure call of the set of duplicate remote procedure calls,wherein at least one of the foreground request is given priority over the background request even in the event where the background request was added earlier to the queue, and the background request is given priority over the foreground request even in the event where the foreground request was added earlier to the queue; and

providing, on the processor, a response for the remote procedure call of the set of duplicate remote procedure calls to the other remote procedure calls of the set of duplicate remote procedure calls.

US Pat. No. 11,070,649

CLOUD APPLICATION DESIGN FOR EFFICIENT TROUBLESHOOTING

Zscaler, Inc., San Jose,...


1. A non-transitory computer-readable storage medium having computer-readable code stored thereon for programming a user device to execute an enterprise application that performs steps of:providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network and one or more of monitoring, antivirus, firewall, and Virtual Private Networking (VPN) with the cloud-based system;
responsive to an issue with the functionality of the enterprise application, presenting a user of the user device a list of a plurality of issue types, related to the functionality of the enterprise application, for selection thereof and receiving a selection from the user of an issue type for the issue; and
collecting data, including context-specific information, from the user device, the context-specific information being based on the selected issue type received from the user and being related to the functionality of the enterprise application.

US Pat. No. 11,070,648

OFFLINE CLIENT REPLAY AND SYNC

Oracle International Corp...


1. A non-transitory tangible processor-readable medium including instructions executable by one or more processors, and when executed operable for:determining when a networked software application of a client device is offline and when the networked software application is online;
selectively intercepting one or more request messages from the networked software application addressed to a network resource when the networked software application is offline, resulting in a store of intercepted request messages in a storage;
providing a synchronization log in the storage, the synchronization log having log entries including time stamps for each intercepted one or more request messages;
while the networked software application is offline, generating a mock response using previously shredded data in response to at least one intercepted request message of the one or more intercepted request messages;
detecting when the networked software application transitions from being offline to being online;
issuing a log-retrieval signal to the storage to retrieve all of the log entries, to play back the one or more request messages to the network resource in a sequence according to the time stamps, in which the one or more request messages were stored in the storage;
comparing the mock response with a corresponding request message response from the network resource to determine a conflict, when the networked software application is online;
determining which of data from the mock response or data from the corresponding request message response is to be maintained by the client device; and
removing the played back log entries from the synchronization log.

US Pat. No. 11,070,647

SEAMLESS CROSS-PLATFORM SYNCHRONIZATION OF USER ACTIVITIES AND APPLICATION DATA BETWEEN MOBILE AND DESKTOP DEVICES

Parallels International G...


1. A method comprising:accessing, from a client device, a first application instantiated on a first computing device, the first computing device having a first operating system and being remote to the client device;
displaying, to a user of the client device, a user interface of the first application;
receiving, from the first computing device, a user activity descriptor, wherein the user activity descriptor is indicative of an ongoing user activity in connection with the first application;
responsive to the client device reaching proximity to a second computing device, providing the user activity descriptor to the second computing device, the second computing device having a second operating system, wherein the second operating system is of a different type than the first operating system;
receiving, by the client device from the first computing device, a data associated with the first application;
and
responsive to a second application being instantiated on the second computing device, providing, from the client device to the second computing device, the data associated with the first application, wherein the data associated with the first application is to allow the user to continue the ongoing user activity on the second application;
wherein providing the user activity descriptor to the second computing device is via a first communication channel between the client device and the second computing device, and wherein providing the data associated with the first application to the second computing device is via a second communication channel between the client device and the second computing device, the second communication channel being different from the first communication channel.

US Pat. No. 11,070,646

METHODS AND SYSTEMS FOR SELECTION OF REMOTE SERVICES

INTERNATIONAL BUSINESS MA...


1. A method for selecting a remote service for a core program, by a processor, comprising:receiving a request for a remote service;
receiving information associated with each of a plurality of remote services from a plurality of information sources notwithstanding whether the plurality of information sources are affiliated with any of the plurality of remote services, wherein a first portion of the received information includes technical information associated with at least some of the plurality of remote services and a second portion of the received information includes non-technical information associated with the at least some of the plurality of remote services; and
calculating a score for each of the plurality of remote services based on the information associated with each of the plurality of remote services and at least one remote service evaluation criteria, wherein the calculating of the score for each of the plurality of remote services is based on a respective trustworthiness measure assigned to each of the plurality of information sources.

US Pat. No. 11,070,645

FLEXIBLE SCHEDULING OF DATA TRANSFERS BETWEEN COMPUTING INFRASTRUCTURE COLLECTIONS FOR EFFICIENT RESOURCE UTILIZATION

Amazon Technologies, Inc....


1. A system, comprising:one or more computing devices of a provider network comprising respective processors and memory to implement a data delivery service to:receive respective job specifications for a plurality of data transfer jobs between computing infrastructure collections, wherein a respective job specification of the plurality of job specifications specifies:an amount of data to be transferred for the data transfer job;
one or more destinations of data transfers for the data transfer job; and
one or more flexibility parameters for successful transfer of the data for the data transfer job;

determine connectivity between the computing infrastructure collections
determine a schedule for performing the plurality of data transfer jobs between the computing infrastructure collections based at least on an analysis of the amount of data to be transferred, the destinations of the data transfers, the flexibility parameters for the respective job specifications, and the connectivity, wherein the analysis utilizes the flexibility parameters for the respective job specifications in scheduling the data transfer jobs to initiate different ones of the data transfer jobs at different times in view of the connectivity to improve efficient utilization of data transfer resources; and
initiate the transfer of the data for the plurality of data transfer jobs between the computing infrastructure collections in accordance with the schedule.


US Pat. No. 11,070,644

RESOURCE GROUPED ARCHITECTURE FOR PROFILE SWITCHING

Amazon Technologies, Inc....


1. A computer-implemented method, the method comprising:associating, by a first device associated with a first user account and operating a user interface, a first plurality of resources with the first user account;
receiving, by the first device, first data indicating that a second user account is associated with the first device;
associating, by the first device, a second plurality of resources with the second user account;
receiving, by the first device, while the first device is associated with the first user account and the second user account, second data indicating a first input to the first device;
processing the second data to determine a first command;
determining that the first command is to be executed as though the first command originated from the second user account;
determining that the second user account grants permission to the first user account to initiate the first command on behalf of the second user account;
using the second plurality of resources, causing a first action to be performed that is responsive to the first command, the first action performed as though the first command originated from the second user account;
receiving, by the first device, while the first device is associated with the first user account and the second user account, third data indicating a second input to the first device;
processing the third data to determine a second command;
determining that the second command is to be executed as though the second command originated from the first user account; and
using the first plurality of resources, causing a second action to be performed that is responsive to the second command, the second action performed as though the second command originated from the first user account.

US Pat. No. 11,070,643

DISCOVERING SIGNATURE OF ELECTRONIC SOCIAL NETWORKS

Airbnb, Inc., San Franci...


1. A method, comprising:identifying, by an electronic apparatus, one user's connections with other users in an electronic social network;
creating, by the electronic apparatus, a data structure in a memory that represents the one user, the other users, and the one user's connections with the other users;
analyzing, by the electronic apparatus, a plurality of data sources for electronic communications between the one user and the other users including:assigning a relative importance value to each data source of the plurality of data sources for electronic communications between the one user and the other users by:computing a distance value between each data source and each other data source in the plurality of data sources; and
computing the relative importance value for each data source by evaluating, for each pair of data sources, an average distance over all nodes in the electronic social network;

assigning a weight to each of the connections between the one user and the other users, wherein the weight is an encoded value computed based on a link structure of the connections, the link structure including metadata indicating a category and a status of the respective connections, the weight enabling an emulation and behavioral prediction of the electronic social network by the electronic apparatus in response to a stimulus applied to the electronic social network; and
weighting electronic communications data from each data source of the plurality of data sources based on the assigned relative importance value of each data source;

calculating, by the electronic apparatus, for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources; and
ranking, by the electronic apparatus, the one user's connections with the other users based on the calculated probabilities.

US Pat. No. 11,070,642

CALL HANDLING BASED ON USER PROFILE IDENTIFICATION

Intel Corporation, Santa...


1. A communal mobile communication device comprising:a personal profile database including a plurality of personal profile identifications, wherein respective ones of the personal profile identifications uniquely identify authorized users of the communal mobile communication device;
one or more memory devices; and
one or more processors to execute instructions to :receive a selection of a caller identity from a first user of the communal mobile communication device;
determine whether the first user is authorized to use the selected caller identity;
determine, based on the selected caller identity, a first personal profile identification corresponding to the first user from the plurality of personal profile identifications in response to a determination that the first user is authorized to use the selected caller identity;
generate, based on the first personal profile identification, at least one of an origination number or a destination number for a call to be initiated to a call recipient, the at least one of the origination number or the destination number to include a combination of at least (i) the first personal profile identification corresponding to the first user and (ii) at least one of a phone number of the communal mobile communication device or a phone number of a mobile communication device of the call recipient; and
initiate the call to the call recipient using the at least one of the origination number or the destination number generated based on the first personal profile identification to uniquely identify, on the mobile communication device of the call recipient, the first user initiating the call from other ones of the authorized users of the communal mobile communication device.


US Pat. No. 11,070,641

OPTIMIZING WEB APPLICATIONS USING A RENDERING ENGINE

Citrix Systems, Inc., Fo...


1. A method, comprising:at a computing platform comprising at least one processor, memory, and a communication interface:receiving, by the at least one processor, via the communication interface, and from a user device, a request for a web page;
retrieving, by the at least one processor, via the communication interface, and from a server, the web page;
launching, by the at least one processor, a headless browser in a container;
rendering, by the at least one processor and using the headless browser in the container, the web page to identify a plurality of content parts associated with the web page;
assigning, by the at least one processor, a bandwidth priority to each of the plurality of content parts associated with the web page;
optimizing, by the at least one processor and based on the bandwidth priority assigned to each of the plurality of content parts associated with the web page, the plurality of content parts associated with the web page, wherein the optimizing the plurality of content parts associated with the web page comprises applying a compression technique to the plurality of content parts associated with the web page; and
transmitting, by the at least one processor, via the communication interface, to the user device, and based on the bandwidth priority assigned to each of the plurality of content parts associated with the web page, the plurality of content parts associated with the web page.


US Pat. No. 11,070,640

CONTEXTUAL TIMELINE OF EVENTS FOR DATA COMMUNICATIONS BETWEEN CLIENT-SPECIFIC SERVERS AND DATA-CENTER COMMUNICATIONS PROVIDERS

8x8, Inc., Campbell, CA ...


1. In a communications system involving a data communications server and a client-managed server, a method of providing aggregated context information for data communications between the data communications server and the client-managed server, the method comprising:the data communications server operating to:provide user-data communications sessions each involving a client-specific endpoint device and another participating endpoint device, and each endpoint device including communications circuitry enabled to convey data over a broadband network;
aggregate context information for user-data communications between the client-specific endpoint device and the other participating endpoint device during a first time period, wherein the context information corresponds to at least one communications-specific characteristic which is provided on behalf of the client-specific endpoint device;
display in a disparate-system data room, a contextual timeline of events including the aggregated context information and a predicted context for future communications between the client-specific endpoint device and the other participating endpoint device; and
provide for each end-user of a remotely-situated client entity, access to a virtual room including the aggregated context information of the user-data communications between the client-specific endpoint device and the other participating endpoint device,

wherein the data communications server provides data communications services to a plurality of client entities respectively associated with a plurality of client managed services which include the user-data communications, and wherein each of the plurality of client entities provides a customized set of criteria for the data communications server to use in aggregation and processing of the context information.

US Pat. No. 11,070,639

NETWORK INFRASTRUCTURE SYSTEM AND METHOD FOR DATA PROCESSING AND DATA SHARING USING THE SAME

ELECTRONICS AND TELECOMMU...


1. A network infrastructure system for sharing and processing data by using a network infrastructure to which application domains being each composed of an application terminal or an application server are connected in a shared manner, the network infrastructure system comprising:at least one processor; and a memory having instructions stored thereon, which, when executed by the at least one processor, cause the at least one processor to implement:
a plurality of network infrastructure nodes storing, processing, and sharing data within the network infrastructure system,
wherein each of the plurality of network infrastructure nodes corresponds to one of an access network node, an edge network node, and a core network node, which constitute the network infrastructure system, wherein the access network node is configured to provide an interface enabling an end user to connect to the network infrastructure system, the edge network node is configured to concentrate the access network nodes, and the core network node is configured to perform connection between the edge network nodes,
wherein each of the access network node, the edge network node and the core network node includes a data processing module including a data transfer function, a data distribution function, a data processing function, and a data sharing function, which are provided to at least one of the application terminal and the application server,
wherein each of the plurality of network infrastructure nodes further includes an optimization engine function: optimizing a network connection, a data storage position, a software execution position so as to satisfy application service requirement (KPI); determining an initial position of application data and application software based on a profile of the application data and application software; and performing optimization for the storage position and the execution position based on an access frequency of the application data, a network transmission amount, and statistical and record information of execution quality of the application software.

US Pat. No. 11,070,638

IOT DEVICE IDENTIFICATION

International Business Ma...


1. A method, comprising:receiving user requirements for a user device of an Internet of Things (IoT) network, the user requirements comprising functional capabilities;
determining that no single IoT device operating on the IoT network satisfies the user requirements for functionality;
assigning respective values to the IoT devices based on a degree of accuracy that the IoT devices satisfy the functional capabilities included in the user requirements;
identifying a group of IoT devices from among the IoT devices which meet or exceed the user requirements for functionality based on the assigned respective values; and
outputting information about the group of IoT devices including information about exposed risks with manufacturer-defined capabilities of the group of IoT devices via a user interface which enables selection and use of IoT devices included within the group of IoT devices.

US Pat. No. 11,070,637

METHOD AND DEVICE FOR ALLOCATING AUGMENTED REALITY-BASED VIRTUAL OBJECTS

ADVANCED NEW TECHNOLOGIES...


1. A virtual object distribution method, comprising:performing an image scanning on a local environment of a user to acquire an image of the local environment;
conducting image identification to the image of the local environment;
determining whether any one of a plurality of image identifiers is identified in the image of the local environment, wherein the plurality of image identifiers each have a same word and are associated with electronic certificates of a plurality of categories;
acquiring, in response to a determination that one of the plurality of image identifiers is identified in the image of the local environment, wherein the identified image identifier is a part of the local environment, an electronic certificate of any one of the plurality of categories from a server;
saving the electronic certificate;
determining whether a category count of received electronic certificates reaches a threshold; and
in response to a determination that the category count reaches the threshold, sending to the server a virtual object distribution request containing a plurality of electronic certificates having a category count equals to the threshold to cause the server to distribute a virtual object to the user,
wherein the saving the electronic certificate comprises:generating a display picture corresponding to the electronic certificate; and
augmentatively displaying the display picture superposed and integrated with a real scene image of the local environment of the user at a position corresponding to the image identifier in the image of the local environment, wherein display pictures corresponding to different categories of electronic certificates are different, and local display positions corresponding to different categories of electronic certificates are different.


US Pat. No. 11,070,636

SHARED ACCESS TO COMPUTING RESOURCES USING WIRELESS COMMUNICATIONS

Apple Inc., Cupertino, C...


1. A system, comprising:a first device;
a first access point that is located in a first room and is configured to provide a first line-of-sight dependent wireless data link with the first device when the first device is located in the first room;
a second access point that is located in a second room and is configured to provide a second line-of-sight dependent wireless data link with first device when the first device is located in the second room;
a base station that is connected to the first access point and the second access point by wired communications connections, wherein the base station is configured to:store a user profile,
determine a location of the first device as corresponding to one of the first room or the second room, wherein the location of the first device is determined to correspond to the first room when the first device is wirelessly connected to the first access point using the first line-of-sight dependent wireless data link, and the location of the first device is determined to correspond to the second room when the first device is connected to the second access point using the second line-of-sight dependent wireless data link;
determine whether the first device is allowed to access an application based on a parental control policy associated with the user profile and a location of the first device, wherein the parental control policy allows access to the application by the first device when the first device is located in the first room, and the parental control policy does not allow access to the application by the first device when the first device is located in the second room,
in response to a determination, by the base station, that the first device is allowed to access the application at the location of the first device, transmit content corresponding to the application from the base station to the first device for display of the content by the first device using the first line-of-sight dependent wireless data link between the first access point and the first device.


US Pat. No. 11,070,635

DEVICE MANAGEMENT SERVER AND METHOD

Canon Kabushiki Kaisha, ...


1. A device management server that transmits, to a network device, a collection request specifying a data type, a timing, and a route for collection, the device management server comprising:at least one memory storing instructions; and
at least one processor executing the instructions causing the device management server to:
receive, from at least one service providing server, a collection request specifying a target device, a data type, a timing, and a route for collection;
select, after receiving a plurality of collection requests directed to the same network device, at least one collection request to be set for the network device from the plurality of collection requests on the basis of the timing and the route specified in each of the collection requests; and
transmit the selected at least one collection request to the network device,
wherein if transmitting a first collection request included in the selected at least one collection request and specifying a predetermined data type reduces a frequency of collection of data of the predetermined data type requested by a second collection request specifying the predetermined data type and already transmitted to the network device, a collection request specifying the predetermined data type, a timing specified in the first collection request, and a lower-cost route is transmitted to the network device.

US Pat. No. 11,070,634

HIGHLY AVAILABLE PRIVATE CLOUD SERVICE

Lenovo Enterprise Solutio...


1. One or more non-transitory machine-readable storage mediums storing one or more sequences of program instructions for operating a first cluster of servers, the program instructions being configured to be executable by one or more processors of the first cluster of servers to perform operations comprising:maintaining a shared database that stores, for each of a plurality of cloud service consumers, user interface data that describes an appearance of a user interface for the cloud service consumer, wherein each server in the first cluster can read and write to the shared database;
receiving, from a customer computer, a request to access services of an identified cloud service consumer among the plurality of cloud service consumers, wherein the customer computer is associated with a customer of the identified cloud service consumer;
retrieving the user interface data of the identified cloud service consumer from the shared database;
retrieving, from a second cluster of servers maintained by the identified cloud service consumer, user data required in response to the request; and
providing the user interface data of the identified cloud service consumer and the user data to the customer computer.

US Pat. No. 11,070,633

PRE-ASSOCIATION DISCOVERY OF SERVICES

BlackBerry Limited, Wate...


10. A network node for a wireless local area network (WLAN), comprising:at least one processor; and
a non-transitory storage medium storing instructions executable on the at least one processor to:obtain information about services from multicast Domain Name System (DNS) service discovery frames received on a local area network (LAN) interface of the network node, the services being available via the network node;
filter, based on a first policy, the information about the services obtained from the multicast DNS service discovery frames, the first policy being a privacy policy based on inspection of content of the information about the services to ensure unwanted information is not conveyed to unassociated wireless devices;
further filter the information about the services obtained from the multicast DNS service discovery frames based on a second policy relating to at least one condition of the network node, the second policy being based on at least one of a time-of-day, a channel load, or a maximum bandwidth, the filtering and the further filtering to produce filtered information about the services;
transmit, to the unassociated wireless devices as part of a pre-association discovery operation, the filtered information about the services; and
associate with a first unassociated wireless device of the unassociated wireless devices in response to selection of the network node by the first unassociated wireless device based on the pre-association discovery operation.


US Pat. No. 11,070,632

IDENTIFYING COMPUTING DEVICES IN A MANAGED NETWORK THAT ARE INVOLVED IN BLOCKCHAIN-BASED MINING

ServiceNow, Inc., Santa ...


1. A computing system comprising:a database disposed within a remote network management platform that is associated with a managed network; and
a proxy server application disposed within the managed network, wherein the proxy server application is controlled by the remote network management platform, and wherein the proxy server application is configured to:provide, to a computing device disposed within the managed network, one or more instructions to identify one or more applications executing on the computing device;
determine, for an application, a command string used to invoke the application to execute on the computing device;
compare the command string to a uniform resource locator (URL) of a blockchain-based mining pool, wherein the blockchain-based mining pool corresponds to a plurality of applications respectively executing on a plurality of computing devices, and wherein the plurality of applications are configured to share processing resources to mine cryptocurrency at least in part by computing a hash for a respective block of a respective blockchain;
determine that the command string includes the URL;
based on determining that the command string includes the URL, provide, to the computing device, one or more additional instructions to perform a measurement of a current processor utilization of the computing device;
determine that the current processor utilization is indicative that the application is associated with the blockchain-based mining pool; and
based on determining that the current processor utilization indicates that the application is associated with the blockchain-based mining pool, store, in the database, an indication that the application is associated with the blockchain-based mining pool.


US Pat. No. 11,070,631

EXPLICIT SPATIAL REPLAY PROTECTION

Telefonaktiebolaget LM Er...


1. A method of operation of a terminal device, comprising:obtaining accurate location information relating to a location of the terminal device;
obtaining imprecise location information relating to a location of the terminal device by introducing an inaccuracy into the obtained accurate location information to form the imprecise location information; and
transmitting a proximity service discovery message, wherein the discovery message includes the imprecise location information.

US Pat. No. 11,070,630

COMPUTER SYSTEM PROVIDING SAAS APPLICATION SESSION STATE MIGRATION FEATURES AND RELATED METHODS

CITRIX SYSTEMS, INC., Fo...


1. A computer system comprising:at least one client computing device configured to access a first Software as a Service (SaaS) application session within a first browser; and
a server communicating with the at least one client computing device over a network, the server being configured tocollect and store a series of browser commands executed by the first browser during the first SaaS application session, and
initiate a second SaaS application session within a second browser for the at least one client computing device and migrate a live state of the first SaaS application session to the second SaaS application session by initiating execution of the series of stored browser commands within the second browser.


US Pat. No. 11,070,629

MIGRATION NOTIFICATION AND RESPONSE MESSAGES FOR VIRTUAL MACHINES

Red Hat Israel, LTD, Raa...


1. A method comprising:receiving, by a virtual machine executed by a processing device, from a hypervisor managing the virtual machine, an indication that the virtual machine has been migrated to a first host system of a group of host systems;
in response to receiving the indication, identifying, by the virtual machine, one or more network addresses associated with the virtual machine;
generating, by the virtual machine, a notification message corresponding to the one or more network addresses;
transmitting, by the virtual machine, the notification message on a network for the one or more network addresses to a second host system of the group of host systems;
identifying, by the virtual machine, each of the one or more network addresses that has not received a response message from the second host system;
and
transmitting, by the virtual machine, a subsequent notification message comprising the one or more network addresses that have not received a response message to the second host system.

US Pat. No. 11,070,628

EFFICIENT SCALING OF COMPUTING RESOURCES BY ACCESSING DISTRIBUTED STORAGE TARGETS

Nutanix, Inc., San Jose,...


1. A method, comprising:determining a periodic change in a workload executing, or for execution, on a computer located external to a virtualization environment that comprises a virtualized controller, the computer connected to the virtualized controller through which the workload accesses data that has been distributed in the virtualization environment;
configuring, at the virtualization environment, a virtual machine or executable container to execute at least a portion of the workload;
migrating, from the computer and based at least in part on said determining the periodic change, the at least the portion of the workload that accesses the data; and
executing the at least the portion of the workload, which has been migrated, at the virtual machine or the executable container so that the workload accesses the data via the virtualized controller.

US Pat. No. 11,070,627

DISCOVERY OF A USER PLANE FUNCTION THAT SUPPORTS CELLULAR IOT OPTIMIZATION

Ofinno, LLC, Reston, VA ...


1. A method comprising:receiving, by a network exposure function from an application function, a first message requesting delivery of one or more Internet of Things (IoT) packets to a wireless device;
sending, by the network exposure function to a network repository function, a second message requesting a discovery of a user plane function that supports cellular IoT optimization;
receiving, by the network exposure function from the network repository function, a third message comprising an identifier of the user plane function that supports the cellular IoT optimization; and
sending, by the network exposure function to the user plane function, a fourth message requesting delivery of the one or more IoT packets to the wireless device.

US Pat. No. 11,070,626

MANAGING MESSAGES SENT BETWEEN SERVICES

salesforce.com, inc., Sa...


1. A database system comprising:at least one server comprising at least one processor, the at least one server configurable to cause:
providing, at an integration bus, a registry of a plurality of service definitions, each service definition describing a respective set of properties for accessing a respective one of a plurality of external services situated external to the integration bus, the set of properties comprising at least an identification of an external service, a syntax associated with the external service, a description of at least one interface for interacting with the external service using a message flow, authentication information, a mode of message delivery, a window of time during which messages are accepted, and a rule to modify invocation of a service;
processing, at the integration bus, first application-level messages received at the integration bus from a requesting application for delivery to a provider application of a first one of the external services, the processing of a first application-level message comprising processing information regarding the first application-level message, the information comprising a message header of the first application-level message, the message header comprising a message identifier of the first application-level message;
sending, at the integration bus and using the set of properties described by a service definition for accessing the first external service, the first application-level messages to the provider application of the first external service;
processing, at the integration bus, second application-level messages received at the integration bus from the provider application of the first external service; and
sending, at the integration bus, a response message based on at least one of the second application-level messages to the requesting application.

US Pat. No. 11,070,625

SERVER CONNECTION CAPACITY MANAGEMENT

International Business Ma...


1. A computer-implemented method comprising:establishing a plurality of individual client-server connections between a server and a plurality of clients, wherein each connection is configured to support a respective adjustable maximum number of concurrent requests;
monitoring a current total number of concurrent requests being supported by the server;
detecting, based on the monitoring, that the server is in an overloaded state;
responsive to detecting the overloaded state, reducing a first adjustable maximum number of concurrent requests for a first connection of the plurality of individual client-server connections; and
responsive to the first connection operating within the reduced first adjustable maximum number of concurrent requests and detecting that the server has recovered from the overloaded state, increasing the reduced first adjustable maximum number of concurrent requests.

US Pat. No. 11,070,624

HYBRID WIRELESS SENSOR NETWORK ARCHITECTURE FOR FLUID DELIVERY AND DISTRIBUTION SYSTEMS

EATON INTELLIGENT POWER L...


1. A hybrid, wireless sensor network architecture for a fluid delivery and distribution system, said architecture comprising:a first component adapted to perform one or more functions on a fluid or in response to receiving a fluid;
a second component adapted to perform one or more functions on the fluid or in response to receiving the fluid;
a conduit distributing the fluid between the first and second components;
first and second intelligent fittings each connected to the conduit at locations between said first component and said second component, said first and second intelligent fittings each having a sensor adapted to perform measurements of a characteristic of the fluid distribution between the first and second components, and to wirelessly communicate data representative of the measurements via a communication network; and
a controller wirelessly receiving the data representative of the measurements from the communication network, the controller controlling an operation of at least one of the first and second components to shut off the fluid distribution between the first and second components when the data representative of the measurements indicates degradation of the conduit.

US Pat. No. 11,070,623

METHODS AND APPARATUS FOR ITERATIVE NONSPECIFIC DISTRIBUTED RUNTIME ARCHITECTURE AND ITS APPLICATION TO CLOUD INTELLIGENCE

Neurala, Inc., Boston, M...


1. A method comprising:learning an identity of a first object with a first brain on a first device;
transmitting the identity of the first object from the first brain to a cloud brain, the cloud brain residing in at least one slave node having at least one memory and at least one processing unit; and
transmitting the identity of the first object from the cloud brain to a second brain on a second device.

US Pat. No. 11,070,622

STREET INFORMATION PROCESSING SYSTEM, CLIENT AND SERVER APPLIED TO STREET INFORMATION PROCESSING SYSTEM, AND METHOD AND PROGRAM OF THE SAME

KABUSHIKI KAISHA TOSHIBA,...


1. A street information processing system including a plurality of clients arranged on a street in a distributed manner and a server communicatively connected to the plurality of clients via a communication network,wherein each of the clients comprises client circuitry configured to:
collect street information near an arrangement place;
determine whether the street information collected is information required to be provided to the server; and
transmit the street information determined to be required to be provided to the server, adding client identification information for identifying the client, and
wherein the server comprises server circuitry configured to:
analyze the street information transmitted by the client;
determine one or more clients, from among the plurality of clients, for providing information determined based on an analysis result;
transmit the information determined based on the analysis result to the one or more clients determined;
transmit the analysis result together with server identification information for identifying the server to an external server determined in advance according to analysis result;
acquire external server information provided from the external server according to the analysis result and the server identification information transmitted to the external server; and
accumulate the external server information together with an acquisition time when the external server information has been acquired, and external server identification information for identifying the external server.

US Pat. No. 11,070,621

REUSE OF EXECUTION ENVIRONMENTS WHILE GUARANTEEING ISOLATION IN SERVERLESS COMPUTING

CISCO TECHNOLOGY, INC., ...


1. A method comprising:in response to a first request to run a serverless function, executing, at an execution environment on a network, computer-readable code configured to perform the serverless function;
after the computer-readable code has executed, modifying a pointer to an area of memory used to store a first state of the serverless function to reference a different area of memory;
in response to a second request to run the serverless function, reusing, at the execution environment, the computer-readable code to perform the serverless function; and
based on the pointer referencing the different area of memory, using the different area of memory to store a second state of the serverless function.

US Pat. No. 11,070,620

EFFICIENT TRANSFER TO AND FROM A DEDUPLICATED CLOUD STORAGE SYSTEM

EMC IP HOLDING COMPANY LL...


1. A method for transferring data to a cloud storage system from a client, the method comprising:receiving a request from a client at a server, wherein the request is associated with an object to be placed in the cloud storage system;
processing the object, by the server, to generate segments and to generate fingerprints that include a fingerprint for each of the segments;
sending the fingerprints, by the server, to the cloud storage system, wherein the cloud storage system compares the fingerprints received from the server with fingerprints stored at the cloud storage system;
receiving a list of missing fingerprints at the server from the cloud storage system, wherein the list of missing fingerprints identifies segments of the object that are not stored at the cloud storage system; and
sending, by the server, the segments corresponding to the list of missing fingerprints to the cloud storage system.

US Pat. No. 11,070,619

ROUTING MESSAGES BETWEEN CLOUD SERVICE PROVIDERS

NETAPP, INC., Sunnyvale,...


1. A method comprising:receiving, by a storage device over a first virtual local area network (VLAN), an Internet Protocol (IP) message from a first cloud service provider to a second cloud service provider, the IP message including a header indicating in a protocol level different than IP that the second cloud service provider is to receive the IP message;
creating a port of the first VLAN on a physical interface of a storage cluster of a first tenant, wherein the physical interface is connected to a trunk port of a switch associated with the storage device, wherein the header included in the IP message from the first cloud service provider includes a field with an identifier for the first VLAN; and
routing the IP message to the second cloud service provider using a first virtual routing table (VRT) associated with the first VLAN and the first tenant in the first VLAN, wherein the first cloud service provider and the second cloud service provider are identified in the first VRT.

US Pat. No. 11,070,618

TECHNIQUES FOR UPDATING FILES

Valve Corporation, Belle...


1. One or more computing devices comprising:one or more processors; and
one or more computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:storing first data representing a first version of a file;
identifying a first portion of the first data representing the first version of the file;
storing second data representing a second version of the file;
identifying a first portion of the second data representing the second version of the file;
determining that the first portion of the first data corresponds to the first portion of the second data;
based at least in part on the first portion of the first data corresponding to the first portion of the second data, identifying a second portion of the first data, the second portion of the first data being subsequent to the first portion of the first data;
based at least in part on the first portion of the first data corresponding to the first portion of the second data, identifying a second portion of the second data, the second portion of the second data being subsequent to the first portion of the second data;
compressing the second portion of the first data by at least generating a first dictionary associated with the second portion of the first data;
compressing the second portion of the second data by at least generating a second dictionary associated with the second portion of the second data;
compressing the second portion of the second data by at least generating, using the first dictionary, a third dictionary and a reference associated with the second portion of the second data;
determining a difference between the second portion of the first data and the second portion of the second data using the second dictionary and the third dictionary;
determining that the difference satisfies a threshold difference; and
based at least in part on the difference satisfying the threshold difference, storing at least one of a portion of the third dictionary or the reference as a patch file for the second version of the file.


US Pat. No. 11,070,617

PREDICTING CLOUD ENABLEMENT FROM STORAGE AND DATA METRICS HARNESSED FROM ACROSS STACK

INTERNATIONAL BUSINESS MA...


1. A computer-implemented method, comprising:identifying a corpus of data located on a private cloud computing resource;
classifying a portion of the corpus of data based on an access threshold and a sensitivity threshold, including:comparing an access rate for each unit of data to the access threshold, where the access threshold includes an access rate threshold, and where for each unit of the data, the unit of data is classified as hot in response to determining that the access rate for the unit of data exceeds the access threshold, and the unit of data is classified as cold in response to determining that the access rate for the unit of data does not exceed the access threshold,
comparing content of each unit of data and metadata of each unit of data to the sensitivity threshold, where the sensitivity threshold includes an indication of predetermined types of content and predetermined metadata, and where for each unit of the data, the unit of data is classified as sensitive in response to determining that the content of the unit of data and the metadata of the unit of data includes one or more of the predetermined types of content and the predetermined metadata, and the unit of data is classified as not sensitive in response to determining that the content of the unit of data and the metadata of the unit of data does not include one or more of the predetermined types of content or the predetermined metadata;

identifying a segment of the portion of the corpus of data that contains all units of data within the portion of the corpus of data that area classified as cold and not sensitive; and
migrating the segment of the portion of the corpus of data from the private cloud computing resource to a public cloud computing resource.

US Pat. No. 11,070,616

NETWORK PROTOCOLS TO MINIMIZE REPEATS IN A FLOOD NETWORK

ABL IP HOLDING LLC, Cony...


1. A method, comprising steps of:based on neighbor relationships among radio frequency (RF) nodes of a flooding wireless network, designating some but not all of the RF nodes as repeaters to select RF nodes as repeaters such that each RF node of the flooding wireless network has at least two neighboring RF nodes designated as repeaters, wherein designating some but not all of the RF nodes as repeaters includes:(a) building an RF node neighbor relationship matrix that includes a respective neighbor relationship status of each respective RF node to other RF nodes, wherein:i. for each respective RF node, the respective neighbor relationship status is set to indicate each of one or more neighboring RF nodes is within range to directly transmit and receive network packets to and from the respective RF node over the flooding wireless network, and
ii. for each respective RF node, the respective neighbor relationship status is unset to indicate each of one or more non-neighboring RF nodes is not within range to directly transmit and receive network packets to and from the respective RF node over the flooding wireless network;

(b) based on the built RF node neighbor relationship matrix, determining a respective number of neighbors for each respective RF node;
(c) generating an RF node repeater matrix by:i. for each RF node determined to have two neighbors, designating each neighbor of the determined RF node as repeater;
ii. assigning at least two designated repeaters of network packets over the flooding wireless network for each respective RF node having two or more RF node neighbors by:selecting one or more neighbors of any RF nodes not yet having at least two neighbors and designating each selected RF node as a repeater, such that each RF node has at least two neighbors designated as repeaters;


(d) based on the RF node repeater matrix, configuring the designated RF nodes to act as repeaters;

configuring designated RF nodes to act as repeaters to receive and resend network packet transmissions from other RF nodes through the flooding wireless network; and
configuring all RF nodes not designated as repeaters not to resend network packet transmissions from other RF nodes through the flooding wireless network.

US Pat. No. 11,070,615

METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR TRANSACTION NEGOTIATION

EMC IP Holding Company LL...


1. A method of negotiating coherency of transactions in a distributed network, comprising:receiving, from a server of a first application node by a network adapter of the first application node, entity information comprising an indication of at least one entity with which coherency of transactions is to be negotiated between application nodes of a distributed application;
identifying, by the network adapter, a second application node based at least in part on the entity information;
receiving, by the network adapter, a negotiation request for a transaction associated with the distributed application;
negotiating with the second application node, by a negotiation module of the network adapter, to obtain transaction negotiation information corresponding to the transaction, the transaction negotiation information comprising an indication that a coherent result of the distributed application associated with the transaction has been reached with the second application node, the coherent result of the distributed application comprising an acceptance by both the negotiation module of the network adapter and the second application node of the same result for the distributed application; and
sending, by the network adapter, the transaction negotiation information to the server of the first application node;
wherein the method is performed by at least one processing device of the network adapter of the first application node, the network adapter comprising the negotiation module.

US Pat. No. 11,070,614

LOAD BALANCING METHOD AND RELATED APPARATUS

HUAWEI TECHNOLOGIES CO., ...


9. An operation and maintenance system, comprising:a load balancer including a first processor in communication with a first memory storing a first program;
a second interaction node on a source side, the second interaction node including a second processor in communication with a second memory storing a second program; and
a third interaction node, wherein the first processor of the load balancer executes the first program to obtain an invalidation notification, the invalidation notification comprises an identifier of an invalid object on a target side, and the invalid object comprises an invalid interaction node, an invalid session group on an interaction node, or an invalid session in a session group,
the first processor of the load balancer executes the first program to send the invalidation notification to the second interaction node on the source side,
the second interaction node receives the invalidation notification,
the second processor of the second interaction node executes the second program to delete recorded information of the invalid object in response to the invalidation notification,
the second processor of the second interaction node executes the second program to send an application interaction request, and destination data in the application interaction request is null,
the load balancer receives the application interaction request from the second interaction node on the source side, and
the first processor of the load balancer executes the first program to reassign the third interaction node in response to the application interaction request, and
the first processor of the load balancer executes the first program to send the application interaction request to the third interaction node.

US Pat. No. 11,070,613

AUTOMATIC APPLICATION SCALING BETWEEN PRIVATE AND PUBLIC CLOUD PLATFORMS

MICROSOFT TECHNOLOGY LICE...


17. A system, comprising:a non-public server set that includes a first instance of an application configured at least in part to receive private data, the non-public server set configured to be communicatively coupled to a public-network accessible server set that includes a second instance of the application instantiated and executed at the public-network accessible server set based at least on telemetry generated at the non-public server set, the public-network accessible server set separate from the non-public server set, the public-network accessible server set configured to securely couple to the non-public server set based on the traffic telemetry, and to determine based on the traffic telemetry to instantiate additional application instances, wherein the traffic telemetry comprises at least one of latency, bandwidth and central processing unit (CPU) utilization;
the first instance of the application configured to:receive requests routed to the first instance of the application by a traffic manager at the public-network-accessible server set, the public-network-accessible server set configured to receive the requests from computing devices over a public communication channel, the traffic manager configured to route each request of the requests, based on at least on the traffic telemetry, to the first instance of the application or to the second instance of the application, and
process the requests routed to the first instance of the application, including processing additional private data related to storage of the non-public server set;


the non-public server set further comprising:a traffic monitor configured to:monitor at least one performance criterion at the first instance of the application to generate the traffic telemetry; and
transmit the traffic telemetry to the traffic manager at the public-network-accessible server set; and

a communication channel interface configured to securely couple the non-public server set to the public-network accessible server set and enable secure transfer of the private data or the additional private data therebetween.

US Pat. No. 11,070,612

SYSTEM AND METHOD FOR PROVIDING DATA AND APPLICATION CONTINUITY IN A COMPUTER SYSTEM

Geminare Inc., Toronto (...


1. A method comprising:hosting, by a first server of a continuity system network, a virtual server configured to receive a set of active data from a second server of a client computing network using a replication engine for the client computing network and replicate the set of active data;
presenting, by a control platform of the continuity system network, a user interface to a client of the client computing network;
configuring, by the first server according to a server definition process, the virtual server based on a rule of the control platform defined by a user entry in the user interface, the rule instructing the virtual server to run at least one application of the second server using the set of active data, wherein the user interface includes an online tool that collects client server and network information using a survey form presented to a user, wherein the server definition process is configured to create the virtual server on a virtualization platform based on a server definition generated according to one or more user entries into the survey form, and wherein the server definition process is configured to validate the virtual server created for the virtualization platform according to one or more setup rules for validating server creation; and
controlling, by the control platform according to the server definition process, a failover to the virtual server from the second server based on the rule in response to a failover event, wherein the failover event corresponds to the second server.

US Pat. No. 11,070,611

FILE DOWNLOAD MANAGER

Snap Inc., Santa Monica,...


1. A method comprising:queuing, in a download queue, at least two file download requests based on respective components of a client application that operationally uses a file of the respective download request;
receiving, from a client device, an indication of an active component of the client application;
adjusting a priority of the at least two file download requests in the download queue based on the indication; and
executing the download requests according to the adjusted priority of the at least two file download requests in the download queue.

US Pat. No. 11,070,610

SYSTEM AND METHOD FOR DATA TRANSFER, INCLUDING PROTOCOLS FOR USE IN DATA TRANSFER IN A CONTENT MANAGEMENT ENVIRONMENT

Open Text Corporation, W...


1. A data transfer system, comprising:a client data transfer engine on a client device, the client data transfer engine for:
receiving, at a first interface of the client data transfer engine, a first request to upload a first file to a content management system from a user application at the client device associated with the content management system, the first request including a first location of the first file at the client device and a second location for the first file at the content management system;
determining a set of chunks of the first file at the first location at the client device;
establishing a chunk map including an entry for each chunk of the set of chunks of the first file, each entry associated with the chunk and including an offset and a status for the associated chunk;
initiating the upload to the content management system by sending a second request for the upload of the first file to a second interface of a data transfer server, the second request including the second location for the file at the content management system;
receiving a transfer identifier associated with the upload of the first file from a data transfer server;
sending a third request for each chunk of the set of chunks to the second interface of the data transfer server, each third request associated with the chunk and including the transfer identifier and data of the chunk;
determining a first response for each of the third requests, and updating the chunk map based on the first response determined for each of the third requests;
accessing the chunk map to determine that each of the set of chunks has been transferred to the data transfer server based on the status of each entry in the chunk map;
sending a fourth request to commit the upload of the first file;
in response to receiving a second response to the fourth request, responding to the first request from the user application; and
a data transfer server associated with the content management system, the data transfer server for:
receiving the second request at the second interface provided by the data transfer server;
determining the transfer identifier for the upload of the first file;
sending the transfer identifier to the client data transfer engine at the client device;
creating a second file at the data transfer server for the upload of the first file, the second file associated with the transfer identifier and the second location at the content management system;
receiving each third request for each chunk of the set of chunks at the second interface;
in response to receiving each third request, determining the second file associated with the transfer identifier based on the transfer identifier included in the third request, writing the data of the chunk included in the third request into the second file, and returning the first response to the third request;
in response to receiving the fourth request, uploading the second file to the content management system at the second location using a native interface of the content management system; and
returning the second response to the client data transfer engine.

US Pat. No. 11,070,609

SYSTEM AND METHOD FOR DOWNLOADING A FILE

VERITAS TECHNOLOGIES LLC,...


1. A system for providing a service to a plurality of client devices for identifying duplicate files before a file is downloaded prior to download in a client computing environment to improve performance of the computing environment, comprising:a link hash server coupled to a database, the link hash server configured to generate, over time, a database of hashes of files associated with URLs of web content across the Internet with the database configured to store hash information and uniform resource locator (URL) information for each of a plurality of files;
the link hash server comprising a processor configured to:receive, from a browser of client computing device, an URL associated with a file whose download, from a first server to which the URL is directed, the first server distinct and operating independently from the link hash server, has been initiated and temporarily suspended at the client computing device;
determine whether a hash of the file associated with the URL received from the browser exists in the database of the link hash server;
in response to a determination that the hash of the file exists in the database, communicate an indication to the browser of the client computing device that the hash of the file exists along with the hash; and
in response to a determination that the hash of the file does not exist in the database, communicating an indication to the browser of the client computing device that the hash of the file does not exist.


US Pat. No. 11,070,608

EXPEDITED SUB-RESOURCE LOADING

Fastly, Inc., San Franci...


1. A method of operating a cache node that caches content for delivery to multiple, different end user devices, the method comprising:receiving, at the cache node, a content request comprising a URL corresponding to a web page corresponding to an original HTML file, from an end user device of the multiple, different end user devices;
consulting a repository within the cache node to identify a first JavaScript code that is required for rendering the requested web page and obtain identification and location information for the first JavaScript code,
wherein the repository maintains a listing of JavaScript codes that have been historically requested for the URL corresponding to the web page by a plurality of the multiple different end users;
identifying a required sub-resource by scanning the original HTML file to identify a reference to the required sub-resource;
obtaining the first JavaScript code and the required sub-resource; and
sending the identified original HTML file, the first JavaScript code and the required sub-resource to the end user device,
wherein the original HTML file is used by the end user device to display the web page.

US Pat. No. 11,070,607

DYNAMIC BEHAVIOR MODIFICATION FOR CONTENT DOWNLOAD AND PLAYBACK

DAZN LIMITED, Feltham (G...


1. A method for displaying content on a user device comprising:receiving by a media player a content request corresponding to a fragment download from a server;
receiving from a quality module in communication with the media player, a quality selection for the fragment;
downloading by the media player the fragment from the server;
analyzing a bandwidth availability for the media player during download of the fragment, wherein analyzing the bandwidth availability comprises:generating a first estimate reflective of a local network condition of a local network for the user device based on a size of the fragment relative to a download time of the received fragment to the user device from the server;
generating a second estimate reflective of a server network condition and the local network condition based on a number of bytes for the fragment received over an interval; and
selecting the first estimate, the second estimate, or a combination of the first estimate and the second estimate to determine bandwidth availability; and

based in part on the bandwidth availability stopping or continuing to download the fragment.

US Pat. No. 11,070,606

SELECTING ROUTES THROUGH A NETWORK

Fuze, Inc., Boston, MA (...


1. A method for affecting routing of a communication from a first computer system, through a network, to a second computer system, the method comprising:identifying a location of a fault on a segment of the network based on (a) a determination of which of multiple communication endpoints on a network experience data transmission that is affected by the fault, and (b) correlating segments of paths through the network to the communication endpoints experiencing data transmission affected by the fault;
selecting a metric based on a type of the communication initiated from the first computer system through the network, and ending at the second computer system, the first computer system and the second computer system being among the communication endpoints on the network,
wherein the metric comprises plural metrics, the plural metrics comprising an attribute of a route and a quality of communication, or a bandwidth associated with the route;
determining whether a route through the network meets the metric and avoids the segment of the network containing the fault;
assigning an output address of the first computer system and an input address of the second computer system corresponding to the route through the network;
when the route is determined to no longer meet the metric, assigning a new output address of the first computer system and a new input address of the second computer system to a new route through the network; and
assigning the new output address of the first computer system and the new input address of the second computer system to the new route when there is not sufficient bandwidth associated with the route to accommodate the communication.

US Pat. No. 11,070,605

MAXIMUM SUSTAINABLE ENCODING BIT RATES FOR VIDEO DOWNLOADS

Vasona Networks, Inc., A...


1. A system comprising:a network interface;
a processor, coupled to the network interface, wherein the processor includes memory, and the memory includes code stored therein that when executed by the processor causes the processor:to identify, via the network interface, a state of congestion in a communication channel between (i) a base station included in a cellular network and (ii) a client device that during operation downloads content, which is encoded at a plurality of different encoding bit rates, from a server via the base station and the communication channel,
to estimate a current communication bit rate at which content is being downloaded by the client device,
to calculate, responsively to the state of congestion, a maximum sustainable encoding bit rate (MSEBR) for the content as a function of the estimated current communication bit rate, and
to inhibit the client device, in response to calculating the MSEBR, from downloading a segment of the content that is encoded at any one of the predefined bit rates that exceeds the MSEBR.


US Pat. No. 11,070,604

SOFTWARE-DEFINED MEDIA PLATFORM

TELEFONAKTIEBOLAGET LM ER...


1. A media delivery method, comprising:receiving, at a network node, a source media stream;
responsive to the network node determining that processing of the source media stream is required, dynamically instantiating a plurality of transcoding processing units that are sequentially connected to one another such that each subsequent transcoding processing unit receives an input segment stream from an upstream transcoding processing unit and generates one or more output segment streams having encoding bitrates that are different from an encoding bitrate of the input segment stream and dynamically instantiating one or more packager processing units;
processing the source media stream into one or more levels of work product segments having different media characteristics using the dynamically instantiated plurality of transcoding processing units;
packaging the one or more levels of work product segments into one or more final work product segments having select media characteristics by the one or more dynamically instantiated packager processing units;
uploading the final work product segments by the one or more dynamically instantiated packager processing units to one or more storage nodes for delivery to a plurality of end stations over a media streaming network;
responsive to determining that the source media stream is segmented and encoded at one or more bitrates acceptable for delivery, avoiding the instantiation of the plurality of transcoding processing units and the processing of the source media stream into one or more levels of work product segments by the plurality of transcoding processing units.

US Pat. No. 11,070,603

APPARATUS AND METHODS FOR PACKETIZED CONTENT ROUTING AND DELIVERY

Charter Communicatons Ope...


1. A computerized method of operating a content delivery network (CDN) so as to enable computer algorithm-based mapping of individual network resources to address space for delivery of digitally rendered content associated with the individual network resources, the computerized method comprising:utilizing a resource route (RR) mapping process to determine at least one routing path to access a plurality of the individual network resources, a portion of the plurality of individual network resources disposed in another CDN, the RR mapping process comprising:issuance of a mapping request to a first network entity configured to provide mapping data in a prescribed format; and
generation of a plurality of mapping data that is associated with the plurality of individual network resources, the plurality of individual network resources comprising at least (i) a first network resource associated with the CDN and (ii) a second network resource associated with the another CDN, the generated plurality of mapping data enabling a second network entity to return response data via each of the plurality of individual network resources; and

advertising, via at least the another CDN and based at least on the determined at least one routing path, the plurality of individual network resources within the CDN.

US Pat. No. 11,070,602

SPLIT STREAMING SYSTEM AND METHOD

Ignite Technologies, Inc....


1. A streaming-communication method for split-streaming streaming-content media from a streaming unit to a plurality of data stream receivers, the method comprising:providing a distribution pattern of non-redundant, one-to-many and many-to-one at least partial-stream channels from one or more early stage data stream receivers to second data stream receivers of the plurality of data stream receivers, wherein the one or more early stage data stream receivers are connected to a streaming unit; and
streaming a stream of data, using the channels, wherein the streaming of the stream of data, using the channels comprises:distributing at least two portions of the stream, wherein each portion contains a different part of the stream, to each data stream receiver using the field of a plurality of data stream receivers;
recombining the at least two portions of the stream to form the stream at the data stream receivers; and
for each of the data stream receivers, selecting a peer receiver if a packet clock of the streaming unit at the peer receiver is within plus or minus a predetermined time period from a latency of the data stream receiver that selects the peer receiver.


US Pat. No. 11,070,601

DATA RATE ADAPTATION FOR MULTICAST DELIVERY OF STREAMED CONTENT

Telefonaktiebolaget LM Er...


1. A method of streaming content, the method comprising a client device:receiving a first set of one or more segments of streamed content in a unicast transmission mode;
receiving a synchronization stream indicating, separately from the streamed content, a timing of segments of the streamed content transmitted in a multicast transmission mode;
switching, based on the indicated timing, to receiving the segments in the multicast transmission mode;
receiving the segments of the streamed content in the multicast transmission mode;
determining an input data rate based on a data rate of the received segments in the multicast transmission mode;
setting an output data rate based on the determined input data rate; and
outputting, in response to requests from a media player, the received segments at the output data rate to the media player.

US Pat. No. 11,070,600

OPTIMIZATION TECHNIQUES TO SUPPORT LAGGING READERS AT STREAMING DATA SERVICE

Amazon Technologies, Inc....


1. A system, comprising:one or more computing devices of a data streams management service;
wherein the one or more computing devices include instructions that upon execution on a processor cause the one or more computing devices to:identify one or more storage servers of a first stream records repository to store at least a first partition of a first data stream;
in response to determining that a first set of data records of the first partition meet a first aging criterion, wherein particular individual data records of the first set are interleaved with data records of one or more other partitions at the one or more storage servers such that the particular data record is non-contiguous with data records of the first set of data records, store, at a second stream records repository, a rearranged version of the first set of the first partition, wherein within the rearranged version of the first set of the first partition, at least some of the particular data records of the first set are contiguous with another record of the first set;
determine that the number of data records of the first partition that have not been consumed by a first application meets a first triggering criterion for an optimized read lag reduction operation; and
provide, to the first application, one or more data records of the first partition using at least a portion of the rearranged version of the first set of records.


US Pat. No. 11,070,599

BROADCASTING AND CONTENT-SHARING SYSTEM

KAE, Inc., Langhorne, PA...


1. A method, comprising:receiving, by a processor, content details associated with content to be at least one of created or shared through a first user profile;
creating, by the processor, an interaction request comprising at least a portion of the content details;
transmitting, by the processor, the interaction request to a second user profile;
receiving, by the processor, an acknowledgement of the interaction request from the second user profile; and
capturing, by the processor, the content through at least one of the first user profile or the second user profile, wherein the capturing the content comprises an interaction between the first user profile and the second user profile.

US Pat. No. 11,070,598

AUTOMATIC REPORT AND RESOLUTION GENERATION FROM MULTI-PLATFORM COMMUNICATIONS

International Business Ma...


1. A computer-implemented method comprising:identifying, automatically by a processor, that a user has been added to a group of two or more users, wherein one or more communications between the group are hosted on one or more communication platforms;
analyzing each of the one or more communications;
identifying, from the analyzing, content of the one or more communications;
generating a report, wherein the report indicates the content of the one or more communications;
analyzing the report;
generating, from the analyzing of the report, a predictive outcome for the group, wherein the content of the one or more communications of which the report is based indicate a predictable trend from historical data;
generating, automatically, a resolution for the predictive outcome; and
displaying the report to the user.

US Pat. No. 11,070,597

METHOD FOR DISPLAYING OBJECT IN TIMELINE AREA, OBJECT DISPLAY DEVICE, AND INFORMATION RECORDING MEDIUM HAVING RECORDED THEREON PROGRAM FOR IMPLEMENTING SAID METHOD

GREE, Inc., Minato-ku (J...


1. A method for displaying an object, comprising:on a client side, managing a timeline of communication messages for a user of a Web service;
on the client side, after a determination on a server side of whether the user has taken an action on a timeline area of the Web service within a predetermined time period, changing a state of the timelineto add a first object as a new object to be displayed on the timeline area, in a case it is determined that the user has not taken the action within the predetermined time period, and
to add a second object that differs from the first object as the new object to be displayed on the timeline area, in a case it is determined that the user has taken the action within the predetermined time period,
wherein the first object includes an application advertising frame, and wherein the second object includes a friend recommendation frame for recommending another user as a new friend and for receiving an input from the user to add said another user as said new friend;

on the client side, determining whether a predetermined event has occurred with respect to a communication message on the timeline area of the Web service, the predetermined event including writing a comment to the communication message or writing a message;
on the client side, causing the first object or the second object to be hidden for a certain time period when determining that the predetermined event has occurred; and
on the client side, responsive to the certain time period having elapsed, causing the hidden first object or the hidden second object to be displayed again.

US Pat. No. 11,070,596

VOLTE CIRCUIT SWITCH VOICE AND SMS INTERWORKING

Syniverse Technologies, L...


1. A method of enabling a Visited Public Land Mobile Network (VPLMN) to provide a Voice over Long-Term Evolution (VoLTE) and a Short Message Service (SMS) to a User Equipment (UE) roaming within the VPLMN and subscribed to a Home Public Land Mobile Network (HPLMN), without requiring an Internet Protocol Multimedia Subsystem (IMS) registration between the VPLMN and the HPLMN, the method comprising:providing an Interworking Function (IWF) in communication with the VPLMN and the HPLMN, wherein the IWF comprises an IMS Core, a virtual Mobile Switching Center/Visitor Location Register (vMSC/VLR), a Diameter Routing Agent (DRA), and a Packet Data Network Gateway (PGW);
intercepting, by the DRA of the IWF, an Update Location Answer (ULA) message from the HPLMN to the VPLMN;
mediating the ULA message to produce a mediated ULA message and sending the mediated ULA message to the VPLMN, wherein the mediated ULA message enables the VPLMN to obtain an IP address of the PGW of the IWF;
establishing a General Packet Radio Service Tunneling Protocol (GTP) session between a Serving Gateway (SGW) of the VPLMN and the PGW of the IWF, wherein the PGW is configured to break-out GTP data into the IMS Core of the IWF, thereby enabling the UE to make Mobile Originated (MO) voice calls;
performing, by the vMSC/VLR of the IWF, a circuit switched (CS) registration with a Home Location Register (HLR) of the HPLMN, wherein the vMSC/VLR sends a MAP Location Update Request message to the HLR and the HLR is configured to store a Global Title of the vMSC/VLR;
wherein the vMSC/VLR of the IWF bridges a Short Message Service Center (SMSC) of the HPLMN and a Mobility Management Entity (MME) of the VPLMN, enabling the VPLMN to provide the SMS service to the UE, and wherein the vMSC/VLR of the IWF bridges the IMS Core of the IWF and a Gateway MSC (GMSC) of the HPLMN enabling the UE to receive Mobile Terminated (MT) voice calls.

US Pat. No. 11,070,595

METHODS AND APPARATUS FOR EFFICIENT LOAD BALANCING AMONG MICROSERVICES AND/OR PROCESSING ENTITIES

Ribbon Communications Ope...


1. A communications method, the method comprising:receiving, at a first Session Initiation Protocol (SIP) load balancer (SLB), a first SIP INVITE message;
selecting, at the first SLB, which Session Border Controller (SBC) in a first cluster of SBCs to send the first SIP INVITE message based on a message allocation weight determined based on message loss information corresponding to different SBCs in the first cluster of SBCs, said selecting including allocating a portion of incoming received SIP INVITE messages to an individual SBC based on a message loss rate corresponding to the individual SBC and said message allocation weight, said selecting including selecting a first SBC from the first cluster of SBCs to send said first SIP INVITE message;
sending the first SIP INVITE message to the first SBC; and
receiving a first SIP response message from the first SBC in response to the first SIP INVITE message.

US Pat. No. 11,070,594

APPLYING OVERLAY NETWORK POLICY BASED ON USERS

Tempered Networks, Inc., ...


1. A method for managing communication over a network using one or more network computers that include one or more processors that perform actions, comprising:providing one or more credentials of a user to an authorization service on an underlay network, wherein the authorization service authenticates the user as a member of one or more authorization groups for the underlay network, and wherein the user is associated with a gateway on an overlay network;
providing one or more user groups associated with the overlay network, wherein each user group is associated with one or more access tags, and wherein the one or more user groups for the overlay network are separate from the one or more authorization groups for the underlay network;
providing one or more resource groups associated with one or more resources in the overlay network and one or more resource tags;
comparing the one or more authorization groups with the one or more user groups to generate one or more affirmative first results based on an identifier of each authorization group;
associating the user with each user group that corresponds to each affirmative first result;
comparing the one or more access tags of each user group associated with the user to the one or more resource tags associated with each resource group to generate one or more affirmative second results;
associating the gateway with each resource group that corresponds to the one or more affirmative second results;
generating policy information for the gateway based on each resource group that is associated with the gateway;
providing the policy information to the gateway to define one or more policies associated with the one or more resources in the overlay network;
in response to a source node associated with the gateway providing overlay traffic directed to a target node in the overlay network, enforcing the one or more policies;
associating an access time window with the one or more user groups; and
in response to a current time being outside of the access time window, performing further actions, including:determining one or more disqualified access tags based on the one or more access tags that are associated with the one or more user groups associated with the access time window;
determining one or more disqualified resource groups based on the one or more resource tags that correspond to the one or more disqualified access tags;
updating the policy information for the gateway based on the one or more disqualified resource groups; and
providing the updated policy information to the gateway over the underlay network.


US Pat. No. 11,070,593

DATA PROCESSING SYSTEMS FOR DATA-TRANSFER RISK IDENTIFICATION, CROSS-BORDER VISUALIZATION GENERATION, AND RELATED METHODS

OneTrust, LLC, Atlanta, ...


1. A computer-implemented data processing method for determining personal data management documentation requirements, the method comprising:detecting, by one or more computer processors, a first indication of a first location in which a particular entity operates and a second location in which the particular entity operates;
detecting, by one or more computer processors, a second indication that the particular entity is associated with a standards location;
determining, by one or more computer processors, one or more standards organization requirements associated with the standards organization;
determining, by one or more computer processors based at least in part on the one or more standards organization requirements and the first location, a first plurality of personal data management documentation requirements;
generating, by one or more computer processors, a first questionnaire comprising a first plurality of questions, wherein each question of the first plurality of questions corresponds to a respective requirement of the first plurality of personal data management documentation requirements;
determining, by one or more computer processors based at least in part on the standards organization requirements and the second location, a second plurality of personal data management documentation requirements;
generating, by one or more computer processors, a second questionnaire comprising a second plurality of questions, wherein each question of the second plurality of questions corresponds to a respective requirement of the second plurality of personal data management documentation requirements;
generating, by one or more computer processors, an ontology mapping each question of the first plurality of questions to a respective question in a master questionnaire;
modifying, by one or more processors, the ontology to map each question of the second plurality of questions to a respective question in the master questionnaire;
presenting, by one or more computer processors, the master questionnaire to a user;
receiving, by one or more computer processors, answers responsive to one or more questions in the master questionnaire from the user;
storing, by one or more computer processors, the answers responsive to the one or more questions in the master questionnaire;
populating, by one or more computer processors, answers to one or more questions of the first plurality of questions with respective answers responsive to the one or more questions in the master questionnaire mapped to the one or more questions of the first plurality of questions by the ontology;
populating, by one or more computer processors, answers to one or more questions of the second plurality of questions with respective answers responsive to the one or more questions in the master questionnaire mapped to the one or more questions of the second plurality of questions by the ontology;
generating, by one or more computer processors, a first report based at least in part on the answers to the one or more questions of the first plurality of questions; and
generating, by one or more computer processors, a second report based at least in part on the answers to the one or more questions of the second plurality of questions.

US Pat. No. 11,070,592

SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION

QOMPLX, INC., Tysons, VA...


1. A system for self-adjusting cybersecurity analysis and rating based on heterogeneous data and reconnaissance, comprising:a computing device comprising a memory, a processor, and a network interface;
a high volume web crawler comprising a first plurality of programming instructions stored in the memory of, and operating on the processor of, the computing device, wherein the first plurality of programming instructions, when operating on the processor, cause the computing device to obtain information from the Internet as directed by an automated planning service module;
an automated planning service module, comprising a second plurality of programming instructions stored in the memory of, and operating on the processor of, the computing device, wherein the second plurality of programming instructions, when operating on the processor, cause the computing device to periodically or continuously establish a score for one or more of the following aspects of cybersecurity analysis by:
defining a target network by identifying internet protocol addresses and subdomains of the target network, verifying domain name system information for each internet protocol address and subdomain of the target network, and assigning an Internet reconnaissance score;
collecting domain name system leak information by identifying improper network configurations in the internet protocol addresses and subdomains of the target network, and assigning a domain name system leak information score;
identifying web applications used by the target network, analyzing the web applications used by the target network to identify vulnerabilities in the web applications that could allow unauthorized access to the target network, and assigning a web application security score;
identifying personnel within the target network, searching social media networks for information of concern related to the personnel identified within the target network, and assigning a social network score;
conducting a scan of the target network for open TCP/UDP ports, and assigning an open port score;
identifying leaked credentials associated with the target network that are found to be disclosed in previous breach incidents, and assigning a credential score;
gathering version and update information for hardware and software systems within the boundary of the target network, checking version and update information for the hardware and software systems within the boundary of the target network, and assigning a patching frequency score; and
identifying content of interest contained within the target network, performing an Internet search to identify references to the content of interest, and assigning an open-source intelligence score; and
a cybersecurity scoring engine comprising a third plurality of programming instructions stored in the memory of, and operating on the processor of, the computing device, wherein the third plurality of programming instructions, when operating on the processor, cause the computing device to create a weighted cybersecurity score by:
assigning a weight to each of the Internet reconnaissance score, the domain name system leak information score, the web application security score, the social network score, the open port score, the credential score, the patching frequency score, and the open-source intelligence score;
combining the weighted scores into the weighted cybersecurity score; and
a feedback engine comprising a fourth plurality of programming instructions stored in the memory of, and operating on the processor of, the computing device, wherein the fourth plurality of programming instructions, when operating on the processor, cause the computing device to:
compare the weighted cybersecurity score to a score set point;
recommend changes to network security for the target network to either increase or decrease network security to bring the score into equilibrium with the score set point.

US Pat. No. 11,070,591

DISTRIBUTED NETWORK APPLICATION SECURITY POLICY ENFORCEMENT

Zscaler, Inc., San Jose,...


1. A non-transitory computer-readable medium having computer program instructions stored thereon, the computer program instructions being executable by at least one computer processor in a policy management engine system communicatively coupled to a network to perform steps of:obtaining state information from a plurality of systems, wherein the state information includes application state information and network topology information for each system of the plurality of systems;
providing a set of policies to each system of the plurality of systems, wherein the set of policies specify both a source application and a destination application and whether the source application and the destination application are authorized to communicate with one another, wherein each system of the plurality of systems utilize the set of policies for evaluation to avow or block applications thereon; and
providing a root certificate to each system of the plurality of systems, wherein the root certificate is utilized, by each system of the plurality of systems, in addition to the set of policies to determine whether the source application and the destination application are authorized to communicate with one another.

US Pat. No. 11,070,590

SYSTEM AND METHOD FOR SECURE MULTITENANT OPERATIONS OF A DISTRIBUTED COMPUTING CLUSTER

NORTHROP GRUMMAN SYSTEMS ...


1. A method of secure operator onboarding for secure multitenant operations of a distributed computing cluster, comprising:receiving a network service call from a client computer containing credentials of an operator, in which the client computer is located in a network security domain coupled to the distributed computing cluster;
initiating the network service call to a centralized directory server and authentication server, located in the network security domain, to authenticate the operator using the received credentials;
presenting a user interface to collect a plurality of configurable attestations from the operator;
storing the configurable attestations to a data store in the centralized directory server and authentication server;
initiating a series of asynchronous operations for the operator onboarding via the distributed computing cluster; and
updating a metadata store in the distributed computing cluster to store metadata of the operator in the metadata store and to indicate to the operator that the operator onboarding is completed.

US Pat. No. 11,070,589

DYNAMIC IMPLEMENTATION OF A SECURITY RULE

Juniper Networks, Inc., ...


1. A device, comprising:a memory; and
one or more processors to:receive condition information identifying a condition and a set of security actions,the condition to control implementation of a set of security rules associated with a network security policy,
the condition information including first terms indicating:a term or phrase associated with the condition,
a first security action, of the set of security actions, to apply when the condition is satisfied, and
a second security action, of the set of security actions, to apply when the condition is not satisfied,

the condition information being user-defined;

determine the set of security rules, from among a plurality of security rules, that is to be controlled by the condition after receiving a threshold amount of the condition information,each security rule, of the set of security rules, including second terms identifying:at least one of a source of traffic or a destination of the traffic to which a respective security rule applies, and
another security action, separate from the set of security actions, to be performed when the respective security rule applies to the traffic, and

where the one or more processors, when determining the set of security rules, are to:process the threshold amount of the condition information, using natural language processing, to identify the term or phrase associated with the condition;
perform a comparison of the term or phrase associated with the condition to the second terms included in the plurality of security rules; and
identify the set of security rules that is to be controlled by the condition based on the comparison of the term or phrase associated with the condition to the second terms included in the plurality of security rules indicating a match that is based on a measure of similarity between the term or phrase associated with the condition to the second terms included in the plurality of security rules;


modify information related to the set of security rules to associate the set of security rules with the condition and to cause the implementation of the set of security rules to be controlled by the condition based on the match,the modification to cause the device to process the set of security rules to dynamically implement the set of security actions based on whether the condition is satisfied, and
the modification to permit implementation of the set of security rules to be adaptive to a set of changes in a network;

perform an action after modifying the information related to the set of security rules; and
where the one or more processors, when performing the action, are to:generate a report that identifies the first security action based on the condition being satisfied and a subset of security rules that cause the device to implement different security actions based on the condition being satisfied,the report indicating whether a conflict exists between one or more security rules, of the set of security rules, and whether particular security actions were overridden based on the conflict,

provide the report for display via another device, and
receive an indication from the other device to perform the second security action rather than the first security action.



US Pat. No. 11,070,588

COGNITIVE MALICIOUS ACTIVITY IDENTIFICATION AND HANDLING

International Business Ma...


1. A method, in a data processing system comprising a processor and a memory, the memory comprising instructions that are executed by the processor to cause the processor to be configured to implement a malicious activity response system that automatically identifies and handles malicious activities within the data processing system, the method comprising:identifying a trap for use in isolating a malicious activity associated with a malicious attack;
deploying the trap and automatically reconfiguring a network associated with the data processing system such that the malicious activity is routed to the trap thereby isolating the malicious activity;
observing a behavior of the malicious activity within the trap;
extracting features associated with the malicious activity in the trap; and
utilizing the extracted features to handle a future malicious activity, wherein the handling of the future malicious activity comprises building a new trap and wherein building the new trap comprises:
comparing the extracted features to an existing trap in a set of existing traps; and
responsive to identifying a difference in the extracted features from features of the existing trap, building the new trap to include the features of the existing trap and to address the extracted features.

US Pat. No. 11,070,587

SYSTEMS AND METHODS FOR PERFORMING SIMULATED PHISHING ATTACKS USING SOCIAL ENGINEERING INDICATORS

KnowBe4, Inc., Clearwate...


1. A method comprising:communicating, by a server, a simulated phishing email to one or more email accounts, the simulated phishing email comprising a link to a page embedding a copy of the simulated phishing email using a phishing email template, the phishing email template comprising one or more failure indicators, each of the one or more failure indicators assigned a flag and a description on identifying that type of failure indicator;
causing to display the page embedding the copy of the simulated phishing email responsive to an interaction with the link by a user of an email account of the one or more email accounts receiving the simulated phishing email;
causing to display with the copy of the simulated phishing email one or more flags from the phishing email template corresponding to the one or more failure indicators; and
causing to display a flag of the one or more flags in the copy of the simulated phishing email, the copy of the simulated phishing emails configured to provide the description on how to identify that type of failure indicator corresponding to the flag.

US Pat. No. 11,070,586

CRYPTOGRAPHIC NETWORK PROTOCOL ESCALATION PATH

Stackpath, LLC, Dallas, ...


1. A system for dynamically providing a network protocol escalation path, the system comprising:a network traffic monitoring system configured to:monitor network traffic associated with a plurality of computing devices configured to deliver web content;
calculate a metric associated with an availability of hardware resources associated with the plurality of computing devices;
in response to a determination that the calculated metric has passed a threshold condition, communicate an alert to a network connection management system that the calculated metric has passed the threshold condition; and

the network connection management system configured to:in response to the alert from the network traffic monitoring system, provide an indication to a first client system that a network protocol escalation path is available wherein the network protocol escalation path is associated with an upgraded connection channel;
in response to a selection by the first client system to upgrade to the upgraded connection channel:receive a result of a proof-of-work from the first client system;
validate the result of the proof-of-work; and
enable the first client system to access the upgraded connection channel in response to a determination that the result of the proof-of-work is valid;

select a second client system from a group of client systems having at least one similar device characteristic as the first client system which has solved the proof-of-work; and
allow at least the second client system to access the upgraded connection channel without requiring that the second client system solve the proof-of-work.


US Pat. No. 11,070,585

SYSTEMS AND METHODS CONFIGURING A UNIFIED THREAT MACHINE LEARNING MODEL FOR JOINT CONTENT AND USER THREAT DETECTION

Sift Science, Inc., San ...


1. A machine learning-based system for identifying digital threats, the system comprising:a distributed network of computers implementing a machine learning-based digital threat mitigation service that:implements a unified threat model that produces a unified threat score and predicts the unified threat score by computing in parallel both of:(a) a level of threat of an impending or a pending piece of online content from a target user set to be published on one or more online resources of a subscriber, and
(b) a level of threat that the target user associated with the one or more online resources of the subscriber will create a harmful piece of online content;

wherein:implementing the unified threat model includes:receiving event data comprising one or more of historical content data for the target user and real-time content data of the pending piece of online content and one or more of historical user digital activity data and real-time user activity data; and
providing input of content feature data and user digital activity feature data to the unified threat model extracted from the event data; and

the unified threat model produces the unified threat score based on the content feature data and the user digital activity feature data; and

if implementing an automated decisioning workflow:evaluates the unified threat score to one or more distinct threat score thresholds of the automated decisioning workflow; and
computes a threat mitigation action based on the evaluation.



US Pat. No. 11,070,584

GRACEFUL NEUTRALIZATION OF INDUSTRIAL ASSETT ATTACK USING CRUISE CONTROL

GENERAL ELECTRIC COMPANY,...


1. A method for neutralizing an attack on a control system of an industrial asset, comprising:detecting an anomaly in a first sensor node associated with a first unit of the industrial asset, the first unit operating in a first operational mode;
receiving time series data associated with the first sensor node;
providing a subset of the received time series data to each of a plurality of virtual sensor models associated with the first sensor node;
selecting a first virtual sensor model from among the plurality of virtual sensor models associated with the first sensor node, wherein each virtual sensor model is based upon the provided subset of the time series data received by each of the plurality of virtual sensor models;
determining a first confidence level of the selected first virtual sensor model;
determining that the first confidence level is below a first confidence level threshold;
transferring, responsive to the determining that the first confidence level is below the first confidence level threshold, the first unit to a second operational mode, wherein the transfer to the second operational mode applies the sensor readings associated with a second sensor node of a second unit of the industrial asset to the first unit;
determining a third confidence level of the first virtual sensor;
determining that the third confidence level is below a second confidence level threshold and greater than the first confidence level threshold; and
transferring the first unit to a third operational mode responsive to the determining that the third confidence level is below the second confidence level threshold and greater than the first confidence level threshold.

US Pat. No. 11,070,583

AUTOMATIC COMMUNICATION NETWORK SYSTEM HARDENING

ABB SCHWEIZ AG, Baden (C...


1. A method for automatically improving security of a network system, the method comprising:collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices, wherein collecting the security relevant information is performed by one or more monitoring processes;
determining a regular behavior of the network system from previously stored security relevant information;
when security relevant information has been collected, instructing a coordinator process to analyze the security relevant information by the one or more monitoring processes;
analyzing the security relevant information for determining weak security settings from collected security settings of a network device and from the regular behavior, the weak security settings being not necessary for a regular operation of the network system in accordance with the operational information, wherein analyzing the security relevant information is performed by analysis processes that are coordinated by the coordinator process, wherein information encoding regular behavior and corresponding security settings are grouped into groups, which are analyzed by different analysis processes;
determining hardened security settings for the network device based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system in accordance with the operational information, wherein the hardened security settings are determined by restricting weak security settings;
applying the hardened security settings to the network device.

US Pat. No. 11,070,582

CLOUD-BASED CYBERSECURITY PORTAL WITH VULNERABILITY DATA MANAGEMENT

Cytellix Corporation, Al...


1. A system comprising computer-readable memory and one or more hardware processors, wherein the system is configured to at least:generate a vulnerability data file by scanning a target network and identifying a plurality of cybersecurity vulnerabilities, wherein each vulnerability is represented in the vulnerability data file by at least a vulnerability identifier and a severity label, and wherein the severity label comprises one of: a critical severity label, a high severity label, or a medium severity label;
generate a critical severity file comprising a plurality of vulnerability identifiers associated with the critical severity label;
generate a high severity file comprising a plurality of vulnerability identifiers associated with the high severity label;
generate a medium severity file comprising a plurality of vulnerability identifiers associated with the medium severity label;
determine a first set of unique vulnerability identifiers in the vulnerability data file;
generate a map file comprising the set of unique vulnerability identifiers, wherein each unique vulnerability identifier is associated with a key-value pair;
generate a summary file comprising data representing a first quantity of vulnerabilities in the vulnerability data file associated with the critical severity label, a second quantity of vulnerabilities in the vulnerability data file associated with the high severity label, and a third quantity of vulnerabilities in the vulnerability data file associated with the medium severity label;
generate a user interface configured to display a first graph based at least partly on the summary file, wherein the first graph comprises selectable segments for each of the critical severity file, the high severity file, and the medium severity file;
receive a selection of a selectable segment;
update the user interface to display a second graph based at least partly on a severity file associated with the selectable segment, wherein the second graph comprises selectable segments for each of a plurality of different groups of vulnerabilities;
determine a first dimension measurement of a first selectable segment of the second graph based at least partly on quantity of vulnerabilities in a corresponding group of vulnerabilities; and
determine a second dimension measurement of the first selectable segment based at least partly on a quantity of devices associated with the corresponding group of vulnerabilities.

US Pat. No. 11,070,581

ELIMINATING NETWORK SECURITY BLIND SPOTS

WELLS FARGO BANK, N.A., ...


1. A method, comprising:generating synthetic transactions for a network system, wherein the synthetic transactions travel across the network system, wherein the synthetic transactions imitate financial transactions that are performed over the network system, and wherein the network system is an enterprise network system employed by a financial institution;
capturing at least part of the synthetic transactions; and
generating a logical security map of the network system based on the at least part of the synthetic transactions.

US Pat. No. 11,070,580

VULNERABILITY SCANNING METHOD, SERVER AND SYSTEM


1. A vulnerability scanning method, comprising:identifying a host service running on a target host and creating a scan task that matches the identified host service;
issuing the created scan task to a task scheduling center, to allow a proxy node to acquire at least one scan task from the task scheduling center, wherein the proxy node executes the at least one scan task for the target host, and obtains a scan result; and
receiving the scan result fed back by the proxy node, determining whether there exists a specified host service in the identified host service, wherein the specified host service signifies an existence of a website resource running on the target host, and if there exists the specified host service in the identified host service, issuing again a scan subtask corresponding to the specified host service to the task scheduling center, wherein the scan subtask is acquired by the proxy node from the task scheduling center and executed for the target host to obtain a scan result corresponding to the specified host service on the target host.

US Pat. No. 11,070,579

INTERACTIVE DISPLAY OF A CONFIDENCE-BASED GRAPH OF INTERNET RELATED ASSETS

RiskIQ, Inc., San Franci...


1. A method, comprising:receiving entity information associated with a digital footprint request;
retrieving network data associated with the entity information from a network data store based on the entity information;
determining an inventory of Internet-facing assets associated with the entity information;
calculating a confidence score for each asset in the inventory of Internet-facing assets associated with the entity information, the confidence score indicating a confidence level that the asset is owned, managed, or controlled by the entity, the confidence score using information from a measure of connections between the asset and other assets in the inventory;
generating a visual representation of the inventory of Internet-facing assets as a digital footprint of the entity information for presentation within a graphical user interface, the visual representation including a representation of the confidence score for each asset in the inventory of Internet-facing assets.

US Pat. No. 11,070,578

PACKET DUMP UTILITY IN A MOBILE APPLICATION FOR EFFICIENT TROUBLESHOOTING

Zscaler, Inc., San Jose,...


1. A non-transitory computer-readable storage medium having computer-readable code stored thereon for programming a user device to execute an enterprise application that performs steps of:providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network and one or more of monitoring, antivirus, firewall, and Virtual Private Networking (VPN) with the cloud-based system;
responsive to a user request for troubleshooting an issue, presenting a user of the user device a list of a plurality of issue types, related to the functionality of the enterprise application, for selection thereof;
receiving a selection from the user of an issue type of the plurality of issue types;
collecting packets intercepted by the enterprise application, the packets intercepted including context-specific information, the context-specific information being based on the selected issue type received from the user and being related to the functionality of the enterprise application;
storing the collected packets, including the context-specific information, on the user device; and
providing the issue type and the collected packets, including the context-specific information, for debugging of the issue type.

US Pat. No. 11,070,577

DATA DETERMINATION DEVICE, DATA DETERMINATION METHOD, AND DATA DETERMINATION PROGRAM

MITSUBISHI ELECTRIC CORPO...


1. A data determination device, comprising:a flag manager to store a current value of a flag set for an own device;
a state manager to store a current operation state of the own device transitioning between a plurality of operation states, and to cause the operation state of the own device to transition in accordance with a state transition model defining transition between the plurality of operation states, according to any one or more of an input signal from an outside and the current value of the flag stored in the flag manager;
an allowed communication list converter to convert a detection rule, which describes a correspondence relationship between communication data indicating request communication and communication data indicating response communication to the request communication, into an allowed communication list registering in advance communication data for which communication is allowed for each of the plurality of operation states; and
a determiner to determine whether communication data input to the own device is communication data in the current operation state registered in the allowed communication list by using any one or more of the current operation state of the own device stored in the state manager, the allowed communication list, and the current value of the flag stored in the flag manager, to thereby determine whether the communication data input to the own device is normal or abnormal,
wherein the allowed communication list converter is configured to, when converting the detection rule into the allowed communication list:assign a flag to each of the request communication and the response communication, between which the correspondence relationship is described in the detection rule; and
describe, in the allowed communication list, details of a flag operation specifying a set value to be set to the flag and a flag condition for determining whether the set value is set in the flag, in association with each other, and

wherein the determiner is configured to:set the set value in the flag in accordance with the details of the flag operation after determining that communication data on the request communication is normal;
determine whether the set value is set in the flag based on the flag condition when determining whether communication data on the response communication to the request communication is normal; and
determine that the communication data on the response communication is normal when the set value is set, to thereby reset the flag.


US Pat. No. 11,070,576

THREAT MITIGATION SYSTEM AND METHOD

ReliaQuest Holdings, LLC,...


1. A computer-implemented method, executed on a computing device, comprising:establishing connectivity with a plurality of security-relevant subsystems within a computing platform, the plurality of security-relevant subsystems including one or more of Content Delivery Network systems, Database Activity Monitoring systems, User Behavior Analytic systems, Mobile Device Management systems, Identity and Access Management systems, Domain Name Server systems, antivirus systems, operating systems;
receiving a unified query concerning the plurality of security-relevant subsystems;
parsing the unified query to define a plurality of queries for at least a portion of each of the security-relevant subsystems;
executing the plurality of queries on the respective security-relevant subsystems;
obtaining at least one security-relevant information set from each of the plurality of security-relevant subsystems, based upon, at least in part, the plurality of queries, thus defining a plurality of security-relevant information sets;
processing the plurality of security-relevant information sets using artificial learning/machine learning to identify one or more commonalities amongst the plurality of security-relevant information sets, wherein processing the plurality of security-relevant information sets using artificial learning/machine learning to identify one or more commonalities amongst the plurality of security-relevant information sets includes:utilizing a decision tree based, at least in part, upon one or more previously-acquired security-relevant information sets; and
defining an initial probabilistic model based upon, at least in part:the plurality of security-relevant information sets, and
one or more user-specified probabilistic model variables;


combining the plurality of security-relevant information sets to form an aggregated security-relevant information set for the computing platform based, at least in part, upon the one or more commonalities identified, wherein combining the plurality of security-relevant information sets to form the aggregated security-relevant information set for the computing platform based, at least in part, upon the one or more commonalities identified includes homogenizing the plurality of security-relevant information sets to form the aggregated security-relevant information set;
enabling third-party access to the aggregated security-relevant information set; and
generating a security profile based, at least in part, upon the aggregated security-relevant information set for the computing platform.

US Pat. No. 11,070,575

VERIFYING ACCURACY OF ML PIPELINES USING THIRD PARTY CO-ORDINATION

CISCO TECHNOLOGY, INC., ...


1. A method for verifying traffic classification comprising:designating, at a first node, a classification to a received packet according to a local model; and
verifying the classification of the packet by the first node by:sending packet information describing the packet to a distributed network comprising multiple nodes, wherein the packet information comprises attributes of the packet;
verifying the classification of the packet from receiving results from a second node that, based on the attributes, independently classifies the packet; and
updating decentralized information for classifying packets based on the verified traffic classification.


US Pat. No. 11,070,574

SYSTEM AND METHOD FOR PREVENTING SECURITY BREACHES IN AN INTERNET OF THINGS (IOT) SYSTEM

Afero Inc., Los Altos, C...


1. A system comprising:an internet of things (IoT) device comprising advertising control logic circuitry to transmit first advertising beacons to a plurality of IoT hubs indicating that the IoT device is connectable, a connection manager circuit to establish or detect when the first IoT hub has established the connection with the IoT device and to responsively control the advertising control logic circuitry to begin transmitting the second advertising beacon, and further comprising secret and counter processing logic circuitry to generate a master secret, the master secret to be transmitted to an IoT service;
one or more IoT hubs to receive the master secret from the IoT service over a first secure communication channel, a first IoT hub of the one or more IoT hubs to use the master secret to establish a second secure communication channel with the IoT device; and
the advertising control logic circuitry to begin transmitting a second advertising beacon to the one or more IoT hubs other than the first IoT hub indicating that a connection was established with the IoT device when the IoT device establishes a connection with the first IoT hub, the IoT hubs other than the first IoT hub each use a secure wireless communication module to report the connected status of the IoT device to the IoT service.

US Pat. No. 11,070,573

PROCESS TREE AND TAGS

Capsule8, Inc., Brooklyn...


1. A system, comprising:a processor configured to:receive information associated with a process;
use at least a portion of the received information to modify a Process Tree, wherein modifying the Process Tree includes at least one of: (1) adding a Tag to the Process Tree, including by adding a new authorized heir Tag to the Process Tree in response to determining that an original authorized shell process is still alive, and (2) modifying a Tag in the Process Tree;
return a NIL in response to determining that the original authorized shell process is dead; and
generate an Alert, based at least in part in response to determining that a Strategy has been matched; and

a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 11,070,572

METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS FOR PRODUCING GENERIC IP REPUTATION THROUGH CROSS-PROTOCOL ANALYSIS

McAfee, LLC, San Jose, C...


1. An apparatus for determining whether an Internet Protocol (IP) address is malicious, the apparatus comprising:means for gathering a first data set representing Internet Protocol (IP) telemetry data for a HyperText Transfer Protocol (HTTP) protocol, the means for gathering to gather a second data set representing IP telemetry data for an email protocol;
means for identifying first features from the first data set and second features from the second data set;
means for separating the first features and the second features into separate time windows, the separate time windows to include at least a daily time window, a weekly time window, and a monthly time window;
means for selecting first labels from the first data set and second labels from the second data set, the means for selecting to generate a training data set based on records in the first data set and the second data set having matching IP addresses, the training data set to include combined labels indicating whether each of the respective matching IP addresses is malicious, benign, or unknown;
means for training a machine learning model using the training data set;
means for executing, responsive to a request from a client device, the machine learning model to output, based on the first features and the second features, a first value indicating whether a requested IP address is malicious, benign, or unknown;
means for generating a second value separate from the first value, the second value representing a confidence that the first value is correct; and
means for providing the first value and the second value to the client device, the providing of the first value and the second value to the client device to enable the client device to block a message corresponding to the IP address in response to the first value satisfying a first threshold and the second value satisfying a second threshold.

US Pat. No. 11,070,571

CLOUD-BASED GATEWAY SECURITY SCANNING

SONICWALL INC., Milpitas...


1. A method for blocking content from reaching computing devices in a computer network, the method comprising:receiving a request at a data center device concerning access by a client device to data from a source external to the computer network, the request having been forwarded to the data center device from a gateway device, wherein the gateway device begins receiving the requested data while the data center device initiates an evaluation associated with the request;
evaluating information associated with the request while the gateway device forwards a first portion of the requested data to the client device, the evaluation performed in accordance with a policy for blocking a specified content type from the computing devices in the computer network, wherein the evaluation includes:receiving an initial portion of the requested data, the initial portion including one or more data packets,
scanning the received data packets with a deep packet inspection (DPI) scanner, and
identifying that the scanned data packets include malware based on the DPI scanning; and

providing an evaluation result that indicates that the requested data corresponds to the content type specified by the policy, wherein at least one portion of the requested data is blocked from being sent to the client device based on the malware corresponding to the content type in accordance with the policy.

US Pat. No. 11,070,570

METHODS AND CLOUD-BASED SYSTEMS FOR CORRELATING MALWARE DETECTIONS BY ENDPOINT DEVICES AND SERVERS

ACRONIS INTERNATIONAL GMB...


1. A method for correlating malware detections by endpoint devices and servers, comprising:receiving, by a correlator, from one or more servers, one or more events collected without invasive techniques, one or more events collected using one or more invasive techniques, and one or more final verdicts, wherein the one or more events collected without invasive techniques include at least one of: guaranteed events, logging events, tracing events, and noninvasive monitoring events;
correlating, by the correlator, the one or more events collected without invasive techniques with the one or more events collected using the one or more invasive techniques;
creating, by the correlator, a suspicious pattern, when an event of the one or more events collected without invasive techniques is correlated with an event of the one or more events collected using the one or more invasive techniques, and the event of the one or more events collected using the one or more invasive techniques is used to detect a malware; and
updating, by the correlator, databases of one or more endpoint devices with created suspicious patterns.

US Pat. No. 11,070,569

DETECTING OUTLIER PAIRS OF SCANNED PORTS

PALO ALTO NETWORKS (ISRAE...


1. A method, comprising:identifying, in data traffic transmitted between multiple nodes that communicate over a network, a set of port scans, each of the port scans comprising an access, in the data traffic, of a plurality of communication ports on a given destination node by a given source node during a predefined time period;
computing, for the communication ports that were accessed in the identified port scans, respective first probabilities of being accessed during any given port scan;
computing for each pair of the communication ports in the identified port scans, a respective second probability that both of the communication ports in the pair were accessed during any given port scan; and
upon detecting a port scan by one of the nodes comprising accesses of first and second communication ports on a given destination node for which the respective second probability for the pair of the first and second communication ports is lower than a threshold dependent upon the respective first probabilities of the first and second communication ports, initiating a preventive action.

US Pat. No. 11,070,568

IOT DEVICE MANAGEMENT VISUALIZATION

Palo Alto Networks, Inc.,...


1. A method comprising:maintaining a set of Internet of Things (IoT) device profiles based, at least in part, on operational characteristics of IoT devices indicated by one or a combination of historical records of the IoT devices, event logs of the IoT devices, and system logs of the IoT devices;
grouping the IoT devices into an IoT device dimension group according to IoT device dimensions defined by context-based parameters of the IoT devices in operation using the IoT device profiles;
assessing risk levels to the IoT devices in operation using the IoT device profiles of the IoT devices, wherein assessing the risk levels to the IoT devices in operation includes extracting IoT device risk factors based on the IoT device profiles of the IoT devices, and applying assessment weights to the extracted IoT device risk factors;
gathering management data of the IoT devices including the risk levels assessed to the IoT devices and the operational characteristics of the IoT devices from the IoT device profiles; and
controlling presentation of the management data of the IoT devices including the risk levels assessed to the IoT devices to a user based on the grouping of the IoT devices into the IoT device dimension group.

US Pat. No. 11,070,567

METHOD FOR DETECTING AND PREVENTING AN ATTACK

F-Secure Corporation, He...


1. A method, comprising:detecting an attack by an attacker against a security function on a client computer, comprising:
generating a first hash value of an entity for the client computer, the first hash value having a second-preimage resistance, wherein the first hash value of the entity is generated using a first collision resistance, wherein the first hash value is generated to be weak and placed in a location that controls the security function on the client computer to enable the attacker use of the first hash value to bypass the security function causing the attack at the client computer to appear successful to the attacker;
storing the generated first hash value to a local database, comprising sending the first hash value to a server computer for storing to a local database of known hash value pairs as a hash value pair the generated first hash value and a second hash value calculated for the entity, the second hash value having a collision resistance stronger than the first hash value having the second-preimage resistance;
receiving, from the attacker via a second computer, a request for the entity with an object comprising-a hash value pair of the received object comprising a first hash value and a second hash value, wherein the attack is from the second computer;
based on the first hash value of the received object being determined as identical with the first hash value having the second-preimage resistance stored in the local database, accepting the received object and transmitting data relating to the received object to the server computer for a validity check, wherein the validity check comprises comparing the hash value pair of the object with the hash value pair including the first hash value having the second-preimage resistance of the entity stored in the local database at the server computer to determine whether the first hash value and the second hash value of the hash value pair of the object and the first hash value and the second hash value of the hash value pair of the entity stored in the local database match;
based on the validity check identifying that the hash value pair of the object and the hash value pair for the entity stored in the local database do not match, a hash collision attempt is detected; and
receiving the result of the validity check, wherein based at least on the hash collision attempt being detected finding the object malicious and making further action relating to the received object comprising at least one of blocking or quarantining the object.

US Pat. No. 11,070,566

SYSTEM AND METHOD TO SECURE RENEGOTIATION OF CONNECTIONS BETWEEN A BASEBOARD MANAGEMENT CONTROLLER AND A HOSTED AGENT

Dell Products L.P., Roun...


1. An information handling system, comprising:a processor that executes a first baseboard management controller (BMC) agent; and
a BMC configured to communicate with the processor, the BMC configured to:establish a first Transport Layer Security (TLS) session with the first BMC agent, wherein the first TLS session includes a first cryptographic parameter shared between the BMC and the first BMC agent;
receive a first request from the first BMC agent via the first TLS session, the first request to register the first BMC agent with the BMC;
provide a second cryptographic parameter to the first BMC agent in response to the first request;
establish a second TLS session, wherein the second TLS session includes a third cryptographic parameter;
determine that the second TLS session is suspected of being from a malicious agent; and
renegotiate with the first BMC agent using the second cryptographic parameter within the first TLS session to share a fourth cryptographic parameter between the BMC and the first BMC agent in response to determining that the second TLS session is suspect.


US Pat. No. 11,070,565

SYSTEMS, METHODS, AND DEVICES FOR PROVISIONING AND PROCESSING GEOLOCATION INFORMATION FOR COMPUTERIZED DEVICES

INTEGRITY SECURITY SERVIC...


1. A method, implemented by an enhanced security credential management system (SCMS) host, for securely provisioning a device that includes an enrollment certificate specifying a geo-region for the device and an application certificate, wherein the device is geographically restricted according to both the enrollment certificate and the application certificate, the method comprising:generating local policy data for the application certificate, the local policy data indicating tenant-specific data corresponding to the device, the tenant-specific data comprising application permissions, a duration of validity of the application certificate, and an overlap time period for the application certificate with a second application certificate;
determining an operating geolocation for the device;
verifying that the operating geolocation is within the geo-region;
generating the application certificate; and
providing the application certificate and the local policy data to the device, whereby the device is geographically restricted according to the operating geolocation and the geolocation of the application certificate.

US Pat. No. 11,070,564

ELECTRONIC INTERACTION AUTHENTICATION AND VERIFICATION, AND RELATED SYSTEMS, DEVICES, AND METHODS

Uledger, Inc., Boise, ID...


1. A system for electronic communication involving two parties, comprising:a security processor to enable a system public-private key pair;
a communication interface to facilitate electronic communications to a client computing device via a first communication channel and electronic communications to a client computing device via a second communication channel;
one or more processors to:receive from the client computing device a first half of a split secret via the first communication channel, the split secret including a public key of a client public-private key pair of the client computing device;
receive from the client computing device a second half of the split secret via the second communication channel;
reconstitute the split secret by combining the first half of the split secret with the second half of the split secret;
if reconstituting the split secret results in a valid public key:register the public key with an authority entity; and
transmit an identity certificate to the client computing device to evidence the public key is registered with the authority entity, the identity certificate including the public key;

receive a request for one or both of authentication and verification of an electronic communication being sent from a recipient client computing device from the client computing device;
confirm the one or both of authentication and verification of the electronic communication; and
send to the recipient computing device a confirmation of the one or both of authentication and verification of the electronic communication being sent to the recipient computing device from client computing device.


US Pat. No. 11,070,563

TRACE-BASED TRANSACTION VALIDATION AND COMMITMENT

International Business Ma...


1. A hardware-implemented system for trace-based transaction validation and commitment in a network, the hardware-implemented system comprising:at least one hardware-implemented endorser peer configured to generate a binary trace during a simulation of a transaction, and to generate an endorsed trace based on a result of the simulation; and
at least one hardware-implemented committer peer configured to validate the transaction based on an execution of a smart contract and a use of the endorsed trace as a witness;
wherein a length of the binary trace is reduced using a length reduction technique, by the at least one hardware-implemented endorser peer configured to perform one or more of:exclude, from the binary trace, conditions that are unnecessary depending on their state, and
apply a compression algorithm to the binary trace.


US Pat. No. 11,070,562

FINE-GRAINED IOT ACCESS CONTROL VIA DEVICE PROXIES AND SDN-BASED MICRO-SEGMENTATION

VMware, Inc., Palo Alto,...


1. A method for implementing fine-grained IoT (Internet of Things) access control in an IoT deployment, the method comprising:creating, by a gateway of the IoT deployment, a plurality of device proxies for an IoT device in the IoT deployment, each device proxy in the plurality of device proxies being associated with a persona in a plurality of personas and including one or more access methods that implement access rights deemed appropriate for the persona with respect to the IoT device;
receiving, by an application instance of the IoT deployment, a request from a first persona in the plurality of personas to access the IoT device; and
routing, via networking equipment interconnecting the application instance with the gateway, the request to a first device proxy in the plurality of device proxies that is associated with the first persona, the routing enabling the gateway to process the request via the one or more access methods of the first device proxy.

US Pat. No. 11,070,561

MULTIPLE DATA STORE AUTHENTICATION

Seven Networks, LLC, Mar...


1. A server for communicating with one or more data stores, comprising:a server communication interface;
a processor communicatively coupled to the server communication interface; and
a memory communicatively coupled to the processor, the memory containing instructions executable by the processor whereby the server is operable to:receive a first notification message of new data at one or more data stores,

wherein the first notification message comprises an indication of the new data and does not include all of the new data,wherein the first notification message is generated in response to an electronic message created by a first user;
determine whether an Internet Protocol connection exists between a mobile device and the server, wherein the mobile device is associated with a second user;
if the Internet Protocol connection exists between the server and the mobile device, send a second notification message for the mobile device to inform the mobile device of the new data at the one or more data stores, wherein the second notification message is sent over the existing Internet Protocol connection in response to receipt of the first notification message; and
if the Internet Protocol connection does not exist between the server and the mobile device, send a message to the mobile device to wake up the mobile device and cause an Internet Protocol connection to be established between the server and the mobile device, and further to:
send the second notification message to the mobile device over the established Internet Protocol connection; and
cause mobile device to receive the new data from the one or more data stores.


US Pat. No. 11,070,560

SYSTEMS AND METHODS FOR MANAGING USER ENTITLEMENTS OF OBJECTS FROM HETEROGENEOUS CONTENT SOURCES

Veritas Technologies LLC,...


1. A computer-implemented method for managing user entitlements of objects from heterogeneous content sources, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:obtaining, by the computing device, a user identifier from a user profile associated with a user;
determining, by the computing device, an entitlement for the user in an access control list (ACL) for an object of a content source;
determining, by the computing device, another entitlement for the user in another ACL for another object of another content source, wherein the content source and the other content source are associated with different systems;
generating, by the computing device, an effective entitlement of the user by associating the user identifier, the entitlement for the user in the ACL for the object, and the other entitlement for the user in the other ACL for the other object, wherein the effective entitlement is derived from deconstructing user groups and resolving conflicting entitlements associated with the user according to a conflict resolution rule that at last one of prioritizes directly assigned entitlements over group entitlements or prioritizes group entitlements over individual entitlements;
storing, by the computing device, the effective entitlement of the user;
performing, by the computing device, a security action using the effective entitlement of the user by modifying the effective entitlement and propagating changes in the effective entitlement to the ACL and the other ACL; and
generating a report using the effective entitlement of the user.

US Pat. No. 11,070,559

SYSTEM AND METHOD FOR SUPPORTING OBJECT-BASED SECURITY

ORACLE INTERNATIONAL CORP...


1. A system for supporting object-based security in an application server environment, comprising:one or more microprocessors;
an application server environment executing on the one or more microprocessors, wherein the application server provides Java message service (JMS) resources for consumption by a client application;
a security subject stored in an object associated with the client application configured to access one or more of the JMS resources, wherein the object associated with the client application is a Java Naming and Directory Interface (JNDI) context;
wherein the security subject in the JNDI context is created based on either anonymous credentials or credentials provided by a current thread used to create the JNDI initial context, and wherein the JNDI context is created from a JNDI context factory enabled to support object-based security using a property in the JNDI context factory;
wherein the security subject stored in said object is configured to be used in each of a plurality of calls from the client application to access the one or more the JMS resources.

US Pat. No. 11,070,558

PERMISSION MANAGEMENT AND RESOURCE CONTROL

Advanced New Technologies...


1. A computer-implemented method, comprising:receiving, by a server, an association request initiated by a user of a first account;
identifying an account identifier of a second account based on the association request;
associating the first account with the second account based on the account identifier;
in response to associating the first account with the second account, granting a partial permission to the first account for accessing the second account, wherein the partial permission comprises permission to vote on an operation to be performed by the second account;
determining, by the server, that a requested operation on the second account is an operation to be voted on by the first account;
initiating, by the server, a voting operation by the first account;
determining, by the server, whether a result of the voting operation meets a predetermined condition; and
in response to determining that the result of the voting operation meets the predetermined condition, allowing the requested operation on the second account, or
in response to determining that the result of the voting operation does not meet the predetermined condition, rejecting the requested operation on the second account.

US Pat. No. 11,070,557

DELAYED SERVING OF PROTECTED CONTENT

SHAPE SECURITY, INC., Sa...


1. A computer system comprising:one or more hardware processors;
at least one memory coupled to the one or more hardware processors and storing one or more instructions which, when executed by the one or more hardware processors, cause the one or more hardware processors to:
identify that a request has been made by a client for a requested resource comprising a first portion and a second portion that is initially withheld from the client;
serve or cause service of, for execution on the client, first content comprising the first portion of the requested resource and reconnaissance code that, when executed at the client, gathers data at the client that indicates whether the client is human-controlled or bot-controlled;
receive the data gathered by the reconnaissance code;
determine, based on the data, that the client is not bot-controlled;
in response to determining that the client is not bot-controlled, serve or cause service of, to the client, the second portion of the requested resource.

US Pat. No. 11,070,556

CONTEXT-BASED POSSESSION-LESS ACCESS OF SECURE INFORMATION

Thycotic Software, LLC, ...


1. An access system comprising:one or more processors; andone or more computer readable storage media having program instructions stored thereon which, when executed by the one or more processors, cause the access system to:
direct a browser session to display an indication of an availability of secure information;
responsive to receiving a trigger for the secure information, send, to a transparent proxy system, a request for the secure information;
subsequent to receiving, from the transparent proxy system, the secure information with formatting instructions for preventing access by an end user to the secure information, provide the secure information to a protected resource;
in response to determining that the protected resource is protected, send, to the transparent proxy system, a request for login credentials associated with the protected resource;
receive, from the transparent proxy system and without intervention of a user associated with a client device, login credentials;

populate a login form of the protected resource with the login credentials; andsubmit the login form for access to the protected resource by the user, without saving the login credentials to a memory within the access system, wherein, subsequent to submitting the login credentials, the login credentials are no longer accessible by the access system.


US Pat. No. 11,070,555

USER PROFILE PROVISIONING IN WLAN

Telefonaktiebolaget LM Er...


1. A method for operating an entity of a WLAN network, comprising:receiving an access request from a subscriber of a mobile communications network, wherein the access request is based on a mobile network identity used in the mobile communications network to authenticate the subscriber,
receiving, from an authentication entity configured to authenticate a subscriber in the mobile communications network, mobility control information for the subscriber which comprises subscriber specific information how radio resources of a radio network part of the mobile communications network should be used,
determining a radio resource usage of the subscriber in the WLAN network taking into account the received mobility control information,wherein determining the radio resource usage comprises determining a condition under which a data connection of the subscriber is steered from the WLAN network to the mobile communications network based on the received mobility control information, and
wherein the mobility control information is received for a first subscriber from a first mobile communications network and for a second subscriber from a second mobile communications network, wherein the radio resource usage of the two subscribers in the WLAN network is determined taking into account the mobility control information from the corresponding mobile communications network.


US Pat. No. 11,070,554

AUTHENTICATION MODULE FOR MOBILE DEVICES

PayPal, Inc., San Jose, ...


1. A mobile device, comprising:one or more computer-readable memories storing program instructions; and
one or more processors configured to execute the program instructions to cause the mobile device to perform operations comprising:
analyzing a user interface on the mobile device, the analyzing including detecting a Hypertext Markup Language (HTML) element and/or a string associated with authentication information indicating a request for the authentication information;
determining, based on the analyzing, that the authentication information has been requested from the mobile device by a requesting device;
in response to the determining that authentication information has been requested by the requesting device, identifying requestor information corresponding to the requesting device;
detecting that a user interface element corresponding to a transmission of the authentication information has been selected on the mobile device;
accessing a blacklist database containing one or more risk indications indicating security risks to the mobile device;
determining, based on the accessing, whether the requestor information is associated with the one or more risk indications; and
in response to determining that the requestor information is associated with the one or more risk indications, implementing one or more security measures including intercepting the transmission of the authentication information prior to the authentication information being received by the requesting device and altering one or more fields of the user interface that correspond to the requested authentication information, the altering configured to prevent an entry of the requested authentication information into the mobile device and indicate to a user of the mobile device that the requestor information is associated with the one or more risk indications.

US Pat. No. 11,070,553

APPARATUS AND METHOD FOR CONTEXT-BASED STORAGE AND RETRIEVAL OF MULTIMEDIA CONTENT

SAP SE, Walldorf (DE)


1. A method for retrieving stored multimedia content comprising:receiving at least a partial search term entered by a user in an enterprise;
generating one or more candidate search terms from the partial search term using user-context data of other users in the enterprise who have roles in the enterprise similar to the user's role in the enterprise, the user-context data of other users including preferences, viewing history, and history of selection of topics during search sessions;
displaying on a display device the generated one or more candidate search terms;
receiving a candidate search term selected from among the generated one or more candidate search terms;
using the selected candidate search term and user-context data representative of a current context of the user to identify one or more search results from among the stored multimedia content, the user-context data of the user including data that is representative of the user's role in the enterprise and the user's current environment including the user's geographic location in the enterprise;
displaying on the display device a list of the one or more identified search results, which can then be presented to the user; and
presenting to the user a search result selected from among the one or more identified search results.

US Pat. No. 11,070,551

SYSTEM AND METHOD FOR REMOTE ACCESS TO A PERSONAL COMPUTER AS A SERVICE USING A REMOTE DESKTOP PROTOCOL AND WINDOWS HELLO SUPPORT

Dell Products L.P., Roun...


1. An information handling system comprising:a biometric sensor device; and
a client device coupled to the biometric sensor device, the client device including a processor having access to memory media storing instructions executable by the processor to perform operations comprising:receive a gesture of a target user captured by the biometric sensor device;
in response to receiving the gesture of the target user, unlock secure access information of the information handling system including encrypted biometric information of the target user and server-side unlock information based on the gesture and the encrypted biometric information of the target user utilizing client-side software of the client device, wherein the secure access information is stored at the biometric sensor device; and
communicate the encrypted biometric information of the target user and the server-side unlock information to a server device via a network utilizing a remote desktop protocol (RDP) to cause server-side software of the server device to:unlock server-side access information of the server device based on the server-side unlock information; and
authenticate the target user based on the encrypted biometric information of the target user and the server-side access information.



US Pat. No. 11,070,550

DEVICE FOR IDENTIFYING A PERSON AND A METHOD THEREOF

WELL BEING DIGITAL LIMITE...


1. A device for continual physiological monitoring of and identifying a person comprising:a physiological monitor; and
a biometric identity reader;
the biometric identity reader and the physiological monitor arranged such that the biometric identity reader is capable of reading biometric information of the person and the physiological monitor is capable of reading physiological information of the person at the same time to authenticate the physiological information as being of the person;
wherein the device is configured such that:
when the physiological information is authenticated as being of the person, the biometric identity reader is capable of discontinuing the reading of the biometric identity of the person while the physiological monitor continues reading physiological information of the person; and
if the physiological monitor is detected to have been moved away from the person, the device is capable of requiring the biometric identity reader to read the biometric information of the person and the physiological monitor to read the physiological information of the person at the same time again to re-authenticate the physiological information as being of the person.

US Pat. No. 11,070,549

ELECTRONIC MECHANISM TO SELF-AUTHENTICATE AND AUTOMATE ACTIONS

PAYPAL, INC., San Jose, ...


1. A system, comprising:one or more biometric sensors;
a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising:detecting, via the one or more biometric sensors, first biometric user identification data of a first user;
determining that the first biometric user identification data does not match second biometric user identification data stored on the system;
initiating a search, in response to the determining that the first biometric user identification data does not match second biometric user identification data and via one or more wireless electronic communication protocols, for a first device, wherein the first biometric user identification data is stored on the first device;
receiving, from the first device, a notification that the first biometric user identification data is stored on the first device;
determining a type of the first biometric user identification data; and
electronically exchanging data with the first device after the receiving the notification, wherein the electronically exchanging the data comprises electronically exchanging a predefined type of transaction data based on the determined type of the first biometric user identification data.


US Pat. No. 11,070,548

TOKENIZED ONLINE APPLICATION SESSIONS

PAYPAL, INC., San Jose, ...


1. A system, comprising:a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising:receiving, from a first application, a first request for a first token that is associated with first information, wherein the first request for the first token is part of an application session between a plurality of applications that includes the first application;
providing a master token to an owning application of the plurality of applications after the receiving the first request for the first token, wherein the owning application controls the application session and the master token is mapped to the first token;
associating the first information with the master token;
maintaining an association of the first token with the first information such that none of the plurality of applications is able to reverse the first token to obtain the first information without the association;
providing the first token to the first application;
receiving the first token from a second application of the plurality of applications;
determining, in response to receiving the first token, the first information from the association of the first token with the first information; and
providing the first information to the second application, wherein the first information enables an action to be performed by the second application based on the first information.


US Pat. No. 11,070,547

ELECTRONIC CONTROL DEVICE, A COMMUNICATION MANAGEMENT METHOD PERFORMABLE AND A NON-TRANSITORY STORAGE MEDIUM CONFIGURED TO RESTRICT PREDETERMINED COMMUNICATION IN AN IN-VEHICLE NETWORK

TOYOTA JIDOSHA KABUSHIKI ...


1. An electronic control device that is connected to an in-vehicle network and is configured to restrict a predetermined communication in the in-vehicle network, the electronic control device comprising a central processing unit (CPU), and the CPU is programmed toaccept connection of a key device;
verify the key device;
permit the predetermined communication in the in-vehicle network when the verification of the key device succeeds;
receive a communication frame transmitted to the in-vehicle network; and
generate an error in the communication frame when an identification code corresponding to the predetermined communication is included in the communication frame,
wherein the key device is an electronic key that stores predetermined information or a key that unlocks car doors based on a physical shape.

US Pat. No. 11,070,546

TWO-USER AUTHENTICATION

Nokia Technologies Oy, E...


1. An apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus comprising said at least one processing core and said at least one memory at least to:receive from a first device a digital key;
receive from a second device an encrypted data item;
decrypt the encrypted data item using the digital key to obtain a first decrypted data item, decrypt the first decrypted data item to obtain a second decrypted data item and
verify the second decrypted data item matches a reference data item, and responsive to the second decrypted data item matching the reference data item, grant access to at least one of the first device and the second device, wherein the at least one memory and the computer program code are configured to, with the at least one processing core, cause the apparatus to decrypt the encrypted data item using, at least in part, an exclusive-or, XOR, operation with the digital key and the encrypted data item.

US Pat. No. 11,070,545

SECURE COMMUNICATION

PIKSEL, INC., Wilmington...


1. A system comprising:a first device of a user, the first device having a user interface;
a second device of the user, the second device having a user interface; and
a server configured to:store an association between each of the first device, the second device and the user;
store an association of the second device with user content;
arrange the user interface of the first device as a remote control for the content associated with the second device, such that when content is displayed on the second device, the user interface of the first device controls that content,
wherein the user initiates a secure communication process at the user interface of the second device to initiate a transaction at the server, wherein in response the server is further configured to:
retrieve the stored association identifying the first device associated with the second device for the user;
send a request from the server to the first device identified by that stored association for display on the user interface of the first device; and
receive a detected user input at the user interface of the first device;
wherein responsive to the detected user input at the user interface of the first device being a confirmation, the server is further configured to complete the transaction for the user, initiated by the second device, at the server.