Abstract: Child carrier which is configured to be releasably and removably secured to a backpack worn by another person. The child carrier may be lightweight and collapsible such that it is easily stored when not in use. The child carrier may be configured to be worn on a front of a person's body while the backpack is worn on the back.
Abstract: There is disclosed in one example a computer apparatus, including: a hardware platform including a central processor unit (CPU) and a memory; and instructions encoded within the memory to instruct the CPU to: enumerate a plurality of running processes, and associate resource demands with the running processes; predict a resource starvation condition for at least one process; rank the plurality of running processes according to a dynamic ranking algorithm, wherein the ranking algorithm includes user engagement as an input for ranking a process; and according to the ranking and a safeguard algorithm, deallocate resources from a process ranked lower than the at least one process and assign the deallocated resources to the at least one process to mitigate the predicted resource starvation condition.
Abstract: A system and methods for mitigating Kerberos ticket attacks within a domain is provided, comprising an authentication object inspector configured to observe a new authentication object generated by an identity provider, and retrieve the new authentication object; and a hashing engine configured to retrieve the new authentication object from the authentication object inspector, calculate a cryptographic hash for the new authentication object, and store the cryptographic hash for the new authentication object in a data store; wherein subsequent access requests accompanied by authentication objects are validated by comparing hashes for each authentication object to previous generated hashes.
Abstract: Methods and apparatus to measure exposure to streaming media are disclosed. An example apparatus includes for measurement of exposure to streaming media includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to: access metadata identifying media presented to a user, and cookie data, the metadata and the cookie data provided by a client device; determine whether the cookie data identifies the user to a database proprietor; in response to a determination that the cookie data does not identify the user to the database proprietor, send a redirect message instructing the client device to retransmit the metadata to a next-hop location; and in response to a determination that the cookie data does identify the user to the database proprietor, provide the metadata and a user identifier to a central facility.
Type:
Grant
Filed:
January 23, 2023
Date of Patent:
April 23, 2024
Assignee:
The Nielsen Company (US), LLC
Inventors:
Arun Ramaswamy, Alan Bosworth, Kevin K. Gaynor, Narasimha Reddy Goli
Abstract: A method including determining neighboring items from among sample items based on a respective embedding distance between a query image of a query item and a respective image of each of the neighboring items. The each of the sample items can comprise the respective image and at least one respective item label. The method further can include determining a respective normalized weight for each of the neighboring items based on the respective embedding distance between the query image and the respective image of the each of the neighboring items. The method also can include determining a query item label of the query item based on a weighted majority vote by the neighboring items via the respective normalized weight for the each of the neighboring items. Other embodiments are disclosed.
Abstract: An antenna that enables dense packing of radiators includes a plurality of first radiators configured to radiate in a first frequency band and a plurality of second radiators configured to radiate in a second frequency band, the second frequency band having higher frequencies than the first frequency band. each of the plurality of first radiators includes a plurality of dipole arms. Each of the plurality of dipole arms includes a periodic pattern of inductive choke segments, and each of the dipole arms has a broken peripheral current path.
Type:
Grant
Filed:
November 4, 2022
Date of Patent:
April 23, 2024
Assignee:
John Mezzalingua Associates, LLC
Inventors:
Niranjan Sundararajan, Charles Buondelmonte, Jay Zhu, Wengang Chen
Abstract: Methods, systems, and apparatuses are described for identifying potential identity fraud by tracking a user's typical communication patterns. If a new communication is received from someone who purports to be a trusted user, but the communication exhibits communication traits that are not typical for the user, additional identity fraud prevention steps may be taken.
Abstract: A network access point may control access by limiting time of access to users, and by granting additional access time in exchange for certain user behavior, such as viewing advertisements. Other rewards may be granted as well, such as changes to the user's network access quality, or access to restricted content.
Type:
Grant
Filed:
January 12, 2023
Date of Patent:
April 23, 2024
Assignee:
Comcast Cable Communications, LLC
Inventors:
Billy Edison Stephens, Kam-Cheong Anthony Tsoi
Abstract: A statistical multiplexer (statmux) system for encoding multiple channels of digital television data is provided with improved algorithms for determining bitrate for encoding and decoding to account for signal complexity. The variable bit rate (VBR) encoders and encoding are provided in a statmux system by employing a CBR (constant bit rate) adapter. A CBR adapter can provide correcting state updates on a per-frame basis to a CBR encoder element, thereby enabling VBR capability.
Abstract: A UE communicates with a network gateway to access a provisioning device via a provisioning network. The provisioning device uses identification data of the UE to authenticate the UE for a primary network, and provides primary network configuration data to the UE. Using the primary network configuration data, the UE communicates with the network gateway to access the primary network. The primary network configuration data can include data to enable the UE to establish communications with one or more private networks accessible via the primary network.
Abstract: A trench is dug under an above ground water storage tank either before erection of the walls or after the wall is erected. A (rectangular) sump is preferably made of ΒΌ inch steel. It serves as a conduit from an inner tank liner port to an outside tank fill or drain port. The system eliminates hoses hung over the top edge of the tank wall. A pump can fill the tank from the outer port. The tank can be drained using head pressure of the water and/or a pump.