Patents Examined by Cai Y Chen
-
Patent number: 11297397Abstract: A system for presenting video signals related to a marker image on a surface of a sports ball structured by a plurality of panels includes a computing device having a camera, and a server linked to the computing device via internet, the server being arranged to store the video signals related to the maker image, wherein programs running on the computing device includes the steps to obtain the maker images captured by the camera, extract a digital watermark embedded from the marker image, the digital watermark being positioned on a part of a curved surface of the plurality of panels formed by sewing, access the server to search the video signals corresponding to information in the digital watermark, receive the video signals from the server; and display the received video signals on the display in the computing device.Type: GrantFiled: September 7, 2019Date of Patent: April 5, 2022Inventor: Mitsuru Okura
-
Patent number: 11297382Abstract: An apparatus, method, system and computer-readable medium are disclosed for, in one aspect, determining when a trigger, such as an application trigger, should be generated. In some embodiments, the application trigger may be generated when a frame included in a feed (e.g., a content feed) matches a specified or indicated frame. In some embodiments, a comparison between the feed and the specified or indicated frame may be based on one or more tolerances or thresholds. In some embodiments, the feed may be split and content (e.g., video) obtained via the split may be combined (e.g., multiplexed) with a trigger. The combined content and trigger may be transmitted to one or more devices, such as one or more user devices.Type: GrantFiled: June 18, 2020Date of Patent: April 5, 2022Assignee: Comcast Cable Communications, LLCInventor: Darren Sargent
-
Patent number: 11297091Abstract: A method for securely testing a web application is provided. The method may include analyzing each HTTP log entry that may be included in a centralized web server log file of a web application. Each HTTP log entry may include an endpoint. The endpoint may be a URL path correlating to a location on the web application. Based on the analysis, the method may include identifying each endpoint included in the web application and generating a first web application site-map based on each identified endpoint. The method may further include determining one or more endpoints on the first web application site map, that may be absent from a second web application site map. The second web application site map may include each crawled endpoint within the web application identified via a crawling of the web application by a web application attack tool for identifying security vulnerabilities.Type: GrantFiled: September 24, 2019Date of Patent: April 5, 2022Assignee: Bank of America CorporationInventors: Peggy J. Qualls, Travis Hoyt, Cary Hooper
-
Patent number: 11284169Abstract: A method (1) of and a device for rendering content data of a content data stream. From content data identified in the content data stream, a level of toxicity is determined (4). The level of toxicity represents a measure of authenticity of the received content data stream. Content data of the received content data stream is rendered (6) based on an aggregated level of toxicity.Type: GrantFiled: November 2, 2017Date of Patent: March 22, 2022Inventors: André Kudelski, Pierre Sarda
-
Patent number: 11271970Abstract: A flexible security system has been created that allows for fluid security operations that adapt to the dynamic nature of user behavior while also allowing the security related operations themselves to be dynamic. This flexible system includes ongoing collection and/or updating of multi-perspective “security contexts” per actor and facilitating consumption of these multi-perspective security contexts for security related operations on the users. These security related operations can include policy-based security enforcement and inspection. A security platform component or security entity uses a multi-perspective security context for a user or actor. Aggregating and maintaining behavioral information into a data structure for an actor over time from different sources allows a security platform component or entity to have historical context for an actor from one or more security perspectives.Type: GrantFiled: July 25, 2019Date of Patent: March 8, 2022Assignee: Palo Alto Networks, Inc.Inventors: Jeffrey James Fitz-Gerald, Jr., Ashwath Sreenivasa Murthy
-
Patent number: 11252473Abstract: Systems and methods presented herein provide for conflict resolution of assets selected for insertion into COD content. In one embodiment, the system includes an interface operable to process a request for asset insertion into the COD content selection. The system also includes an asset conflict resolution module operable to identify asset timeslots within the COD content selection from the request, to evaluate the assets to determine conflicts among the assets, to remove conflicting assets, and to select at least a portion of the remaining assets for insertion in the asset timeslots of the COD content selection. For example, the asset conflict resolution module may determine that conflicts exist between certain assets based on various identifiers associated with the assets and/or content such that the conflicts between the assets may be resolved with the removal of one or more of the assets from potential asset insertion selection.Type: GrantFiled: January 23, 2020Date of Patent: February 15, 2022Assignee: Canoe Ventures, LLCInventors: Jonathan E. Farb, Thomas M. Moretto, Bruce C. Dilger, Timothy R. Whitton, Christopher M. Rippe
-
Patent number: 11252565Abstract: A field device according to one aspect of the present invention may include a first processor configured to perform a process of communicating first information used for process control and a process of generating second information including a diagnosis result obtained by performing self-diagnosis of the field device, a second processor including a first wireless unit configured to perform wireless communication, the second processor being configured to request the first processor to read at least the second information and to perform a process of transmitting, from the first wireless unit, the second information obtained through the read request as a wireless signal, and a security unit configured to permit or reject a request made to the first processor by the second processor in accordance with a rule which is specified in advance.Type: GrantFiled: December 23, 2019Date of Patent: February 15, 2022Assignee: Yokogawa Electric CorporationInventors: Naoyuki Fujimoto, Masato Yamaji, Shoji Nagano
-
Patent number: 11252452Abstract: The present disclosure discloses a video encryption method comprising: acquiring image frames continuously by using an image acquisition component, and storing the image frames into a frame buffer; acquiring a time encryption sequence, and using the time encryption sequence to obtain an address encryption sequence; and reading each of the image frames in the frame buffer according to the address encryption sequence to obtain an encrypted video when the frame buffer is full. The method continuously acquires the image frames and uses the time encryption sequence to obtain the address encryption sequence, and when the frame buffer is full, each of the image frames in the frame buffer is read according to the address encryption sequence to obtain an encrypted video. In addition, the present disclosure also provides a video encryption apparatus, an image capture device, and a computer readable storage medium, which also have the above-mentioned beneficial effects.Type: GrantFiled: October 28, 2019Date of Patent: February 15, 2022Assignee: GUANGDONG UNIVERSITY OF TECHNOLOGYInventors: Jianguo Ma, Shaohua Zhou, Zhiyuan Gao
-
Patent number: 11252477Abstract: Aspects described herein may provide systems, methods, and device for facilitating language learning using videos. Subtitles may be displayed in a first, target language or a second, native language during display of the video. On a pause event, both the target language subtitle and the native language subtitle may be displayed simultaneously to facilitate understanding. While paused, a user may select an option to be provided with additional contextual information indicating usage and context associated with one or more words of the target language subtitle. The user may navigate through previous and next subtitles with additional contextual information while the video is paused. Other aspects may allow users to create auto-continuous video loops of definable duration, and may allow users to generate video segments by searching an entire database of subtitle text, and may allow users create, save, share, and search video loops.Type: GrantFiled: May 13, 2021Date of Patent: February 15, 2022Assignee: Videokawa, Inc.Inventor: Steven Selfors
-
Patent number: 11233799Abstract: Systems and methods are provided for performing operations including receiving, by a messaging application server from a third-party application implemented on a first device, a request to generate a registration code to enable the third-party application to access user profile information stored on the messaging application server; generating, by the messaging application server, the registration code; causing, by one or more processors, the first device to display a representation of the registration code; receiving, by the messaging application server from a messaging application implemented on a second device, a request to authorize access to the user profile based on the representation that is displayed on the first device; and authorizing, by the messaging application server, the third-party application implemented on the first device to access the user profile information maintained by, the messaging application server in response to receiving the request from the messaging application.Type: GrantFiled: February 21, 2020Date of Patent: January 25, 2022Assignee: Snap Inc.Inventors: David Whyte, Matthew Colin Grantham, Patrick Mandia, Hongjai Cho
-
Patent number: 11233787Abstract: Complex cloud-based system with many different entities, e.g., servers, clients, databases, firewalls, other machines, etc. often require on call engineers to be available to help with maintenance, emergencies, and other tasks. Sometimes ad hoc access is required when on call engineers are unable to resolve a particular issue. Organizations that manually manage access to on call and ad hoc engineer access, may do so relatively easily if they are a smaller organization. But, for larger or more complex environments, manual processes represent a significant burden. An alternative is automatically grant and revoke access. For example, if a vendor tracks your on call engineers, on call statuses may be identified to automatically grant access while on call. For ad hoc access, a requestor may request temporary access, and if valid, access may also be automatically granted for a desired time period. Automation frees valuable limited resources for other tasks.Type: GrantFiled: January 31, 2020Date of Patent: January 25, 2022Assignee: SALESFORCE.COM, INC.Inventors: LaDean Clark, Ramesh Ramani
-
Patent number: 11228794Abstract: Disclosed are a method and apparatus, a computer device and a storage medium for media code rate self-adaptation. The method includes the following steps: acquiring network quality information of a user network; acquiring, based on a pre-set code rate correspondence list, code rate information corresponding to the network quality information; and determining a code rate indicated by the code rate information as a code rate parameter of a target object.Type: GrantFiled: October 14, 2020Date of Patent: January 18, 2022Assignee: BEIJING DAJIA INTERNET INFORMATION TECHNOLOGY CO., LTD.Inventors: Chao Zhou, Shucheng Zhong
-
Patent number: 11228619Abstract: A method, apparatus and computer program product for managing security threats to a distributed network. A set of events are aggregated from a plurality of event sources in the network for each of a set of security threats to the network. A magnitude of a characteristic of each of the set of security threats is determined. Each of the set of security threats is represented as a three dimensional graphical object in a three dimensional (3D) representation of the network according to the respective magnitude of the characteristic. A security action is taken based on the determined magnitude of one of the set of security threats.Type: GrantFiled: April 22, 2020Date of Patent: January 18, 2022Assignee: International Busuness Machines CorporationInventors: Russell Couturier, Jason Flood, Aidan Butler, Wayne F Tackabury, Patrick Hourigan
-
Patent number: 11216306Abstract: Technologies for dynamically sharing remote resources include a computing node that sends a resource request for remote resources to a remote computing node in response to a determination that additional resources are required by the computing node. The computing node configures a mapping of a local address space of the computing node to the remote resources of the remote computing node in response to sending the resource request. In response to generating an access to the local address, the computing node identifies the remote computing node based on the local address with the mapping of the local address space to the remote resources of the remote computing node and performs a resource access operation with the remote computing node over a network fabric. The remote computing node may be identified with system address decoders of a caching agent and a host fabric interface. Other embodiments are described and claimed.Type: GrantFiled: June 29, 2017Date of Patent: January 4, 2022Assignee: Intel CorporationInventors: Francesc Guim Bernat, Kshitij A. Doshi, Daniel Rivas Barragan, Alejandro Duran Gonzalez, Harald Servat
-
Patent number: 11212569Abstract: Provided is a content distribution server or the like capable of limiting undesirable behavior of viewers. This content distribution server 100 comprises: an information acquisition unit 141 which acquires character information indicating a virtual character used by a distributor in a virtual space, additional information added to the character information, and/or limit information set by the distributor; a distribution unit 143 which distributes live content according to an image in the virtual space in which the movement of the distributor is synthesized as the movement of the virtual character, on the basis of the character information acquired by the information acquisition unit 141; and a behavior limiting unit 144 which limits the behavior of a viewer who watches the live content, on the basis of the additional information and/or the limit information set by the distributor.Type: GrantFiled: July 11, 2019Date of Patent: December 28, 2021Assignee: DWANGO Co., Ltd.Inventors: Nobuo Kawakami, Kentarou Matsui, Shinnosuke Iwaki, Takashi Kojima, Naoki Yamaguchi
-
Patent number: 11196751Abstract: The disclosed system and method provide a way to easily review, audit, and modify multiple users' security access authority. The disclosed system and method may include using a trained bot that is trained using a machine learning algorithm to retrieve user profile information from a complex network of tables stored in a relational database and to analyze the user profile information to generate a recommendation to revoke or approve at least one user's security access authority for at least one transaction type. In some embodiments, the disclosed system and method allow for a human expert to revoke or approve at least one user's security access authority for at least one transaction type based on the recommendation. In some embodiments, the disclosed system and method determine whether to revoke or approve at least one user's security access authority for at least one transaction type and may also revoke or approve the at least one user's security access authority based on the decision.Type: GrantFiled: September 30, 2019Date of Patent: December 7, 2021Assignee: Accenture Global Solutions LimitedInventors: Prashant Gupta, Abhishek Jain, Jagadish Berigai Rama Iyengar, Murali Krishna Vedagiri Venkata Naga, Ramesh Naidu Thanniru, Gurram Venkata Ramana, Nikhil G. Kumar, Balaji Nagarajan, Ravishankar Krishnan, Tushar Shinde, Dayapatra Nevatia, Vikas Pujari, Shantanu Biswas
-
Patent number: 11190823Abstract: An access node limits access of a user to a medium such as an Internet resource of a television program. The access node comprises upstream and downstream interfaces, a memory and a processor. The upstream interface is connectable to an Internet service provider. The downstream interface is connectable to a client device. The memory stores a user account for a user of the client device. The processor detects, via the downstream interface, an access from the user of the client device, in response to detecting the access, causes the client device to display a challenge, receives, via the downstream interface, a challenge response from the client device, and if the challenge response is a correct response, adds to the user account, a credit for connection of the client device to the medium. The access node may be part of a system including a server.Type: GrantFiled: December 17, 2019Date of Patent: November 30, 2021Inventor: Adrien Laurent
-
Patent number: 11184656Abstract: Disclosed examples include: determining periods of loudness in an audio signal by: determining whether a difference between a first amplitude at a first time and a second amplitude at a second time satisfies a loudness threshold; in response to the difference satisfying the loudness threshold, setting a loudness flag to a loud state corresponding to the second time, the second time occurring after the first time; determining whether a third amplitude at a third time after the second time satisfies a quiet threshold; in response to the third amplitude satisfying the quiet threshold, setting the loudness flag to a quiet state corresponding to the third time; and determining periods of loudness for the audio signal based on the states of the loudness flag at the second and third times; and indicating the audio signal as spillover based on the periods of loudness.Type: GrantFiled: June 9, 2020Date of Patent: November 23, 2021Assignee: THE NIELSEN COMPANY (US), LLCInventor: Morris Lee
-
Patent number: 11182481Abstract: A system for evaluating files for cyber threats includes a machine learning model and a locality sensitive hash (LSH) repository. When the machine learning model classifies a target file as normal, the system searches the LSH repository for a malicious locality sensitive hash that is similar to a target locality sensitive hash of the target file. When the machine learning model classifies the target file as malicious, the system checks if response actions are enabled for the target file. The system reevaluates files that have been declared as normal, and updates the LSH repository in the event of false negatives. The system disables response actions for files that have been reported as false positives.Type: GrantFiled: July 31, 2019Date of Patent: November 23, 2021Assignee: Trend Micro IncorporatedInventors: Jonathan James Oliver, Chia-Yen Chang, Wen-Kwang Tsao, Li-Hsin Hsu
-
Patent number: 11178141Abstract: The disclosure provides for authentication and/or authorization via persistable identity tokens, so an original identity provider (e.g., a user) does not need to be present upon initiating execution of a task. Examples include requesting a persistable token in exchange for a first live token. Based at least on the request for the persistable token complying with a first set of policies, receiving the persistable token. Based at least on a trigger event, requesting a second live token in exchange for the persistable token. Based at least on the request for the persistable token complying with a second set of policies, receiving the second live token. Based at least on receiving the second live token, initiating execution of a task using the second live token for authentication or authorization, wherein the execution of the task is contingent upon the authentication or authorization.Type: GrantFiled: December 10, 2019Date of Patent: November 16, 2021Assignee: VMware, Inc.Inventors: Georgi L Lyubomirov Dimitrov, Muhammad Akbar, John Brezak, Andrew Gormley, Barry Gerhardt