Patents Examined by Cai Y Chen
  • Patent number: 11297397
    Abstract: A system for presenting video signals related to a marker image on a surface of a sports ball structured by a plurality of panels includes a computing device having a camera, and a server linked to the computing device via internet, the server being arranged to store the video signals related to the maker image, wherein programs running on the computing device includes the steps to obtain the maker images captured by the camera, extract a digital watermark embedded from the marker image, the digital watermark being positioned on a part of a curved surface of the plurality of panels formed by sewing, access the server to search the video signals corresponding to information in the digital watermark, receive the video signals from the server; and display the received video signals on the display in the computing device.
    Type: Grant
    Filed: September 7, 2019
    Date of Patent: April 5, 2022
    Inventor: Mitsuru Okura
  • Patent number: 11297382
    Abstract: An apparatus, method, system and computer-readable medium are disclosed for, in one aspect, determining when a trigger, such as an application trigger, should be generated. In some embodiments, the application trigger may be generated when a frame included in a feed (e.g., a content feed) matches a specified or indicated frame. In some embodiments, a comparison between the feed and the specified or indicated frame may be based on one or more tolerances or thresholds. In some embodiments, the feed may be split and content (e.g., video) obtained via the split may be combined (e.g., multiplexed) with a trigger. The combined content and trigger may be transmitted to one or more devices, such as one or more user devices.
    Type: Grant
    Filed: June 18, 2020
    Date of Patent: April 5, 2022
    Assignee: Comcast Cable Communications, LLC
    Inventor: Darren Sargent
  • Patent number: 11297091
    Abstract: A method for securely testing a web application is provided. The method may include analyzing each HTTP log entry that may be included in a centralized web server log file of a web application. Each HTTP log entry may include an endpoint. The endpoint may be a URL path correlating to a location on the web application. Based on the analysis, the method may include identifying each endpoint included in the web application and generating a first web application site-map based on each identified endpoint. The method may further include determining one or more endpoints on the first web application site map, that may be absent from a second web application site map. The second web application site map may include each crawled endpoint within the web application identified via a crawling of the web application by a web application attack tool for identifying security vulnerabilities.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: April 5, 2022
    Assignee: Bank of America Corporation
    Inventors: Peggy J. Qualls, Travis Hoyt, Cary Hooper
  • Patent number: 11284169
    Abstract: A method (1) of and a device for rendering content data of a content data stream. From content data identified in the content data stream, a level of toxicity is determined (4). The level of toxicity represents a measure of authenticity of the received content data stream. Content data of the received content data stream is rendered (6) based on an aggregated level of toxicity.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: March 22, 2022
    Inventors: André Kudelski, Pierre Sarda
  • Patent number: 11271970
    Abstract: A flexible security system has been created that allows for fluid security operations that adapt to the dynamic nature of user behavior while also allowing the security related operations themselves to be dynamic. This flexible system includes ongoing collection and/or updating of multi-perspective “security contexts” per actor and facilitating consumption of these multi-perspective security contexts for security related operations on the users. These security related operations can include policy-based security enforcement and inspection. A security platform component or security entity uses a multi-perspective security context for a user or actor. Aggregating and maintaining behavioral information into a data structure for an actor over time from different sources allows a security platform component or entity to have historical context for an actor from one or more security perspectives.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: March 8, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jeffrey James Fitz-Gerald, Jr., Ashwath Sreenivasa Murthy
  • Patent number: 11252473
    Abstract: Systems and methods presented herein provide for conflict resolution of assets selected for insertion into COD content. In one embodiment, the system includes an interface operable to process a request for asset insertion into the COD content selection. The system also includes an asset conflict resolution module operable to identify asset timeslots within the COD content selection from the request, to evaluate the assets to determine conflicts among the assets, to remove conflicting assets, and to select at least a portion of the remaining assets for insertion in the asset timeslots of the COD content selection. For example, the asset conflict resolution module may determine that conflicts exist between certain assets based on various identifiers associated with the assets and/or content such that the conflicts between the assets may be resolved with the removal of one or more of the assets from potential asset insertion selection.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: February 15, 2022
    Assignee: Canoe Ventures, LLC
    Inventors: Jonathan E. Farb, Thomas M. Moretto, Bruce C. Dilger, Timothy R. Whitton, Christopher M. Rippe
  • Patent number: 11252565
    Abstract: A field device according to one aspect of the present invention may include a first processor configured to perform a process of communicating first information used for process control and a process of generating second information including a diagnosis result obtained by performing self-diagnosis of the field device, a second processor including a first wireless unit configured to perform wireless communication, the second processor being configured to request the first processor to read at least the second information and to perform a process of transmitting, from the first wireless unit, the second information obtained through the read request as a wireless signal, and a security unit configured to permit or reject a request made to the first processor by the second processor in accordance with a rule which is specified in advance.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: February 15, 2022
    Assignee: Yokogawa Electric Corporation
    Inventors: Naoyuki Fujimoto, Masato Yamaji, Shoji Nagano
  • Patent number: 11252452
    Abstract: The present disclosure discloses a video encryption method comprising: acquiring image frames continuously by using an image acquisition component, and storing the image frames into a frame buffer; acquiring a time encryption sequence, and using the time encryption sequence to obtain an address encryption sequence; and reading each of the image frames in the frame buffer according to the address encryption sequence to obtain an encrypted video when the frame buffer is full. The method continuously acquires the image frames and uses the time encryption sequence to obtain the address encryption sequence, and when the frame buffer is full, each of the image frames in the frame buffer is read according to the address encryption sequence to obtain an encrypted video. In addition, the present disclosure also provides a video encryption apparatus, an image capture device, and a computer readable storage medium, which also have the above-mentioned beneficial effects.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: February 15, 2022
    Assignee: GUANGDONG UNIVERSITY OF TECHNOLOGY
    Inventors: Jianguo Ma, Shaohua Zhou, Zhiyuan Gao
  • Patent number: 11252477
    Abstract: Aspects described herein may provide systems, methods, and device for facilitating language learning using videos. Subtitles may be displayed in a first, target language or a second, native language during display of the video. On a pause event, both the target language subtitle and the native language subtitle may be displayed simultaneously to facilitate understanding. While paused, a user may select an option to be provided with additional contextual information indicating usage and context associated with one or more words of the target language subtitle. The user may navigate through previous and next subtitles with additional contextual information while the video is paused. Other aspects may allow users to create auto-continuous video loops of definable duration, and may allow users to generate video segments by searching an entire database of subtitle text, and may allow users create, save, share, and search video loops.
    Type: Grant
    Filed: May 13, 2021
    Date of Patent: February 15, 2022
    Assignee: Videokawa, Inc.
    Inventor: Steven Selfors
  • Patent number: 11233799
    Abstract: Systems and methods are provided for performing operations including receiving, by a messaging application server from a third-party application implemented on a first device, a request to generate a registration code to enable the third-party application to access user profile information stored on the messaging application server; generating, by the messaging application server, the registration code; causing, by one or more processors, the first device to display a representation of the registration code; receiving, by the messaging application server from a messaging application implemented on a second device, a request to authorize access to the user profile based on the representation that is displayed on the first device; and authorizing, by the messaging application server, the third-party application implemented on the first device to access the user profile information maintained by, the messaging application server in response to receiving the request from the messaging application.
    Type: Grant
    Filed: February 21, 2020
    Date of Patent: January 25, 2022
    Assignee: Snap Inc.
    Inventors: David Whyte, Matthew Colin Grantham, Patrick Mandia, Hongjai Cho
  • Patent number: 11233787
    Abstract: Complex cloud-based system with many different entities, e.g., servers, clients, databases, firewalls, other machines, etc. often require on call engineers to be available to help with maintenance, emergencies, and other tasks. Sometimes ad hoc access is required when on call engineers are unable to resolve a particular issue. Organizations that manually manage access to on call and ad hoc engineer access, may do so relatively easily if they are a smaller organization. But, for larger or more complex environments, manual processes represent a significant burden. An alternative is automatically grant and revoke access. For example, if a vendor tracks your on call engineers, on call statuses may be identified to automatically grant access while on call. For ad hoc access, a requestor may request temporary access, and if valid, access may also be automatically granted for a desired time period. Automation frees valuable limited resources for other tasks.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: January 25, 2022
    Assignee: SALESFORCE.COM, INC.
    Inventors: LaDean Clark, Ramesh Ramani
  • Patent number: 11228794
    Abstract: Disclosed are a method and apparatus, a computer device and a storage medium for media code rate self-adaptation. The method includes the following steps: acquiring network quality information of a user network; acquiring, based on a pre-set code rate correspondence list, code rate information corresponding to the network quality information; and determining a code rate indicated by the code rate information as a code rate parameter of a target object.
    Type: Grant
    Filed: October 14, 2020
    Date of Patent: January 18, 2022
    Assignee: BEIJING DAJIA INTERNET INFORMATION TECHNOLOGY CO., LTD.
    Inventors: Chao Zhou, Shucheng Zhong
  • Patent number: 11228619
    Abstract: A method, apparatus and computer program product for managing security threats to a distributed network. A set of events are aggregated from a plurality of event sources in the network for each of a set of security threats to the network. A magnitude of a characteristic of each of the set of security threats is determined. Each of the set of security threats is represented as a three dimensional graphical object in a three dimensional (3D) representation of the network according to the respective magnitude of the characteristic. A security action is taken based on the determined magnitude of one of the set of security threats.
    Type: Grant
    Filed: April 22, 2020
    Date of Patent: January 18, 2022
    Assignee: International Busuness Machines Corporation
    Inventors: Russell Couturier, Jason Flood, Aidan Butler, Wayne F Tackabury, Patrick Hourigan
  • Patent number: 11216306
    Abstract: Technologies for dynamically sharing remote resources include a computing node that sends a resource request for remote resources to a remote computing node in response to a determination that additional resources are required by the computing node. The computing node configures a mapping of a local address space of the computing node to the remote resources of the remote computing node in response to sending the resource request. In response to generating an access to the local address, the computing node identifies the remote computing node based on the local address with the mapping of the local address space to the remote resources of the remote computing node and performs a resource access operation with the remote computing node over a network fabric. The remote computing node may be identified with system address decoders of a caching agent and a host fabric interface. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: January 4, 2022
    Assignee: Intel Corporation
    Inventors: Francesc Guim Bernat, Kshitij A. Doshi, Daniel Rivas Barragan, Alejandro Duran Gonzalez, Harald Servat
  • Patent number: 11212569
    Abstract: Provided is a content distribution server or the like capable of limiting undesirable behavior of viewers. This content distribution server 100 comprises: an information acquisition unit 141 which acquires character information indicating a virtual character used by a distributor in a virtual space, additional information added to the character information, and/or limit information set by the distributor; a distribution unit 143 which distributes live content according to an image in the virtual space in which the movement of the distributor is synthesized as the movement of the virtual character, on the basis of the character information acquired by the information acquisition unit 141; and a behavior limiting unit 144 which limits the behavior of a viewer who watches the live content, on the basis of the additional information and/or the limit information set by the distributor.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: December 28, 2021
    Assignee: DWANGO Co., Ltd.
    Inventors: Nobuo Kawakami, Kentarou Matsui, Shinnosuke Iwaki, Takashi Kojima, Naoki Yamaguchi
  • Patent number: 11196751
    Abstract: The disclosed system and method provide a way to easily review, audit, and modify multiple users' security access authority. The disclosed system and method may include using a trained bot that is trained using a machine learning algorithm to retrieve user profile information from a complex network of tables stored in a relational database and to analyze the user profile information to generate a recommendation to revoke or approve at least one user's security access authority for at least one transaction type. In some embodiments, the disclosed system and method allow for a human expert to revoke or approve at least one user's security access authority for at least one transaction type based on the recommendation. In some embodiments, the disclosed system and method determine whether to revoke or approve at least one user's security access authority for at least one transaction type and may also revoke or approve the at least one user's security access authority based on the decision.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: December 7, 2021
    Assignee: Accenture Global Solutions Limited
    Inventors: Prashant Gupta, Abhishek Jain, Jagadish Berigai Rama Iyengar, Murali Krishna Vedagiri Venkata Naga, Ramesh Naidu Thanniru, Gurram Venkata Ramana, Nikhil G. Kumar, Balaji Nagarajan, Ravishankar Krishnan, Tushar Shinde, Dayapatra Nevatia, Vikas Pujari, Shantanu Biswas
  • Patent number: 11190823
    Abstract: An access node limits access of a user to a medium such as an Internet resource of a television program. The access node comprises upstream and downstream interfaces, a memory and a processor. The upstream interface is connectable to an Internet service provider. The downstream interface is connectable to a client device. The memory stores a user account for a user of the client device. The processor detects, via the downstream interface, an access from the user of the client device, in response to detecting the access, causes the client device to display a challenge, receives, via the downstream interface, a challenge response from the client device, and if the challenge response is a correct response, adds to the user account, a credit for connection of the client device to the medium. The access node may be part of a system including a server.
    Type: Grant
    Filed: December 17, 2019
    Date of Patent: November 30, 2021
    Inventor: Adrien Laurent
  • Patent number: 11184656
    Abstract: Disclosed examples include: determining periods of loudness in an audio signal by: determining whether a difference between a first amplitude at a first time and a second amplitude at a second time satisfies a loudness threshold; in response to the difference satisfying the loudness threshold, setting a loudness flag to a loud state corresponding to the second time, the second time occurring after the first time; determining whether a third amplitude at a third time after the second time satisfies a quiet threshold; in response to the third amplitude satisfying the quiet threshold, setting the loudness flag to a quiet state corresponding to the third time; and determining periods of loudness for the audio signal based on the states of the loudness flag at the second and third times; and indicating the audio signal as spillover based on the periods of loudness.
    Type: Grant
    Filed: June 9, 2020
    Date of Patent: November 23, 2021
    Assignee: THE NIELSEN COMPANY (US), LLC
    Inventor: Morris Lee
  • Patent number: 11182481
    Abstract: A system for evaluating files for cyber threats includes a machine learning model and a locality sensitive hash (LSH) repository. When the machine learning model classifies a target file as normal, the system searches the LSH repository for a malicious locality sensitive hash that is similar to a target locality sensitive hash of the target file. When the machine learning model classifies the target file as malicious, the system checks if response actions are enabled for the target file. The system reevaluates files that have been declared as normal, and updates the LSH repository in the event of false negatives. The system disables response actions for files that have been reported as false positives.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: November 23, 2021
    Assignee: Trend Micro Incorporated
    Inventors: Jonathan James Oliver, Chia-Yen Chang, Wen-Kwang Tsao, Li-Hsin Hsu
  • Patent number: 11178141
    Abstract: The disclosure provides for authentication and/or authorization via persistable identity tokens, so an original identity provider (e.g., a user) does not need to be present upon initiating execution of a task. Examples include requesting a persistable token in exchange for a first live token. Based at least on the request for the persistable token complying with a first set of policies, receiving the persistable token. Based at least on a trigger event, requesting a second live token in exchange for the persistable token. Based at least on the request for the persistable token complying with a second set of policies, receiving the second live token. Based at least on receiving the second live token, initiating execution of a task using the second live token for authentication or authorization, wherein the execution of the task is contingent upon the authentication or authorization.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: November 16, 2021
    Assignee: VMware, Inc.
    Inventors: Georgi L Lyubomirov Dimitrov, Muhammad Akbar, John Brezak, Andrew Gormley, Barry Gerhardt