Patents Issued in October 12, 2017
-
Publication number: 20170295108Abstract: Server resources in a data center are disaggregated into shared server resource pools. Servers are constructed dynamically, on-demand and based on workload requirements and a tenant's resiliency requirements (e.g., as specified in an SLA), by allocating from these resource pools. A disaggregated compute system of this type keeps track of resources that are available in the shared server resource pools, and it manages those resources based on that information and the health of the resources. As a workload is processed by the server entity and component resources fail, the server entity composition is changed, e.g. by allocating other resources to the server entity, or by transitioning to other server entities, to ensure that a resiliency requirement is maintained.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Ruchi Mahindru, John Alan Bivens, Koushik K. Das, Min Li, Harigovind V. Ramasamy, Yaoping Ruan, Valentina Salapura, Eugen Schenfeld
-
Publication number: 20170295109Abstract: In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.Type: ApplicationFiled: April 12, 2016Publication date: October 12, 2017Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke, Carlos M. Pignataro, Nagendra Kumar Nainar
-
Publication number: 20170295110Abstract: A terminal device and a base station apparatus use a broad band to improve a throughput. Provided is a terminal device that communicates with a base station apparatus, including a reception unit that receives signals of a first frame structure and a second frame structure, and a subcarrier spacing in the second frame structure is m times a subcarrier spacing in the first frame structure (m is a natural number). Provided is a base station apparatus which communicates with a terminal device, including a transmission unit that transmits signals of a first frame structure and a second frame structure, and a subcarrier spacing in the second frame structure is m times a subcarrier spacing in the first frame structure (m is a natural number).Type: ApplicationFiled: August 28, 2015Publication date: October 12, 2017Applicant: Sharp Kabushiki KaishaInventors: Katsuya KATO, Kazuyuki SHIMEZAWA, Ryota YAMADA
-
Publication number: 20170295111Abstract: Methods and apparatus of delegating instructions or data from a CU to an NOC node in a network on chip (NOC) is disclosed. The NOC node executes the delegated instructions or processes the delegated data. An NOC controller (NCC), which is operatively coupled to the CU and the NOC node, facilitates delegating the instructions or data from the CU to the NOC node.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventors: Greg Sadowski, Edward McLellan
-
Publication number: 20170295112Abstract: Apparatuses, methods and storage medium associated with buffering data in a switch are provided. In embodiments, the switch may include a plurality of queue buffers, a plurality of queues respectively associated with the plurality of queue buffers, a shared buffer, and a queue point controller coupled with the plurality of queue buffers and the shared buffer. In embodiments the queue point controller may be configured to determine an amount of available space in a selected queue buffer of the plurality of queue buffers. The queue point controller may be further configured to allocate at least a portion of the shared buffer to a selected queue that is associated with the selected queue buffer. In embodiments, this allocation may be based on the amount of available space determined in the selected queue buffer. Other embodiments may be described and/or claimed.Type: ApplicationFiled: December 24, 2014Publication date: October 12, 2017Inventors: Albert S. CHENG, Thomas D. LOVETT, Michael S. PARKER, Steven F. HOOVER
-
Publication number: 20170295113Abstract: The present disclosure generally discloses a longest queue identification mechanism. The longest queue identification mechanism, for a set of queues of a buffer, may be configured to identify the longest queue of the set of queues and determine a length of the longest queue of the set of queues. The longest queue identification mechanism may be configured to identify the longest queue of the set of queues using only two variables including a longest queue identifier (LQID) variable for the identity of the longest queue and a longest queue length (LQL) variable for the length of the longest queue. It is noted that the identity of the longest queue of the set of queues may be an estimate of the identity of the longest queue and, similarly, that the length of the longest queue of the set of queues may be an estimate of the length of the longest queue.Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Applicants: Alcatel-Lucent USA Inc., Alcatel LucentInventors: Andrea Francini, Wolfram Lautenschlaeger
-
Publication number: 20170295114Abstract: Techniques for messaging bot controls based on machine-learning user intent detection are described. In one embodiment, an apparatus may comprise a message queue monitoring component operative to monitor a messaging interaction, the messaging interaction exchanged via a messaging system, the messaging interaction involving at least one client device; an interaction processing component operative to determine a user intent for the messaging interaction; and a bot management component operative to determine a messaging bot options configuration for the client device based on the user intent; and send the messaging bot options configuration to the client device. Other embodiments are described and claimed.Type: ApplicationFiled: December 6, 2016Publication date: October 12, 2017Inventors: Jeremy Harrison Goldberg, Sarah Hum, Mikhail Larionov, Chih Shao Lee, Lei Guang, Zhisheng Huang, Henri Romeo Liriani
-
Publication number: 20170295115Abstract: The method and system described herein automatically directs a user's posts or requests for assistance to the appropriate organization responsible for responding to or addressing the incident reported, as based on that user's location and the location of the appropriate organization. A query of a database of organizations, categorized by location and purpose, determines the appropriate organization relevant to a user's location and incident type and generates a full report for review as geolocated on a map with the associated multi-media content. The method and system can also send an automatic message from an organization to a specific user in response to such user's post or request for assistance and establish a two-way communication between the user and the assigned organization based on the foregoing.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Inventors: Peter A. Mottur, Brendan J. Hanna, Claude P. Sheer
-
Publication number: 20170295116Abstract: Conventionally, high-level communication using the message cannot be achieved. The high-level communication using the message can be achieved by a message transmission device including a component candidate group storage unit capable of storing one or more component candidate groups including two or more groups of component candidates forming a content, an input reception unit configured to receive an input for constituting a content including one or more components determined by the selection of one component candidate from two or more component candidates included in one component candidate group, a content constitution unit configured to constitute the content by using the selected one or more components according to the input, and a message transmission unit configured to transmit a message including the content.Type: ApplicationFiled: June 21, 2017Publication date: October 12, 2017Inventors: Koji HOSAKA, Tetsuji OTSUKA, Chiyo MORISAWA, Manabu SHIMIZU, Yosuke MAGAKI
-
Publication number: 20170295117Abstract: In a non-limiting example of the present disclosure, an intelligent personal assistant service may be added as an active participant within a thread of an application. A query directed to an intelligent personal assistant service may be entered into a message thread of a messaging application. An indication that the intelligent personal assistant service is added as an active participant within the message thread may be received, at a processing device. Content from the intelligent personal assistant service may be received directly into the message application. As an example, content may be provided, within the messaging application, as a message draft that may be modified before inclusion within a message thread. An input may be provided indicating to include the received content within the message thread. In response to providing the input, content received from the intelligent personal assistant service may be displayed within the message thread.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Zachary Adam Pfriem, Mark Jozef Vitazko, Jared Frew, Jason Michael Nelson
-
Publication number: 20170295118Abstract: One or more computing devices, systems, and/or methods for auto-generating subject suggestions are provided. For example, a set of n-grams are generated from text within an email body of an email being composed by a user and/or from descriptive information of attachments to the email. Features of the set of n-grams are identified, such as a date feature, a proper noun feature, an activity feature, a number of words feature, etc. Classifiers are used to assign probabilities to the n-grams based upon the features. A probability may specify a strength of an n-gram in relation to a user preference of the user for an email subject derived from the n-gram. In this way, an email subject suggestion is generated based upon a target n-gram with a probability exceeding a threshold. The email subject suggestion is provided to the user, such as during email composition or during sending of the email.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventors: Robert Jacob Kirk, Ashley Rose Schneider, Yating Sheng
-
Publication number: 20170295119Abstract: Techniques for messaging agent messaging interaction are described. In one embodiment, an apparatus may comprise a commerce intermediary server operative to receive a user interface selection of a user-to-commerce message thread on a client device, the user-to-commerce message thread associated with a commerce entity with a messaging system; display a user-to-commerce message thread interface for the user-to-commerce message thread; receive a user-to-commerce message via the user-to-commerce message thread interface for the user-to-commerce message thread; and send the user-to-commerce message to the commerce entity via the messaging system. Other embodiments are described and claimed.Type: ApplicationFiled: December 29, 2016Publication date: October 12, 2017Inventors: Seth Garrett Steinberg Rosenberg, Aditya Gopal Bhandarkar, Yoram Talmor, Jeremy Harrison Goldberg, Mikhail Larionov, Jessica Lee, Nicolas Andrij Bushak
-
Publication number: 20170295120Abstract: Various embodiments are generally directed to techniques for device configuration using commerce messaging history information. In one embodiment, an apparatus may comprise a client front-end component operative to receive a client inbox request for a user account from a client device, the user account for a messaging system; and transmit an ordered business promotion contact list to the client device in response to the client inbox request; a business contact list component operative to determine a business promotion contact list for a user account for a messaging system; a predicted interest component operative to determine a predicted business messaging interest for each business contact on the business promotion contact list; and a contact ranking component operative to determine a ranking weight for each business contact on the business promotion contact list based on the predicted business messaging interest for each business contact. Other embodiments are described and claimed.Type: ApplicationFiled: November 11, 2016Publication date: October 12, 2017Inventors: Edward Young Zhang, Weiwei Ding, Qian Wang, Tsung-Chuan Chen, Guangyuan Liu
-
Publication number: 20170295121Abstract: Various embodiments are generally directed to techniques for device configuration using commerce messaging history information. In one embodiment, an apparatus may comprise a messaging component operative to receive a bot subscription command for a user account with a messaging system from a client device, the bot subscription command specifying a messaging bot; a bot framework component operative to determine a messaging bot channel for the messaging bot; subscribe the user account to the messaging bot channel for the messaging bot in response to the bot subscription command; and receive a broadcast message from the messaging bot, the messaging bot specifying a broadcast channel; and a broadcast component operative to add the broadcast message to a message queue for the user account when the messaging bot channel matches the broadcast channel. Other embodiments are described and claimed.Type: ApplicationFiled: November 11, 2016Publication date: October 12, 2017Inventors: Edward Young Zhang, Weiwei Ding, Qian Wang, Ming Xiao, Guangyuan Liu, Matthew Robert Anger
-
Publication number: 20170295122Abstract: Non-limiting examples of the present disclosure describe proactive action by an intelligent personal assistant application/service to improve functionality of one or more applications. In one example, an intelligent personal assistant service may interface with a messaging application to analyze a message thread within the messaging application. The intelligent personal assistant service may analyze the message thread by evaluating context of message content within the message thread. Analysis of the message thread may occur proactively without requiring an explicit request for assistance from a user of a processing device. In response to the analyzing of the message thread, the intelligent personal assistant service may proactively provide a cue that includes content retrieved by the intelligent personal assistant service. An input may be received to include the cue within the message thread. In response to receiving the input, the cue may be displayed within the message thread.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Zachary Adam Pfriem, Mark Jozef Vitazko, Jared Frew, Jason Michael Nelson
-
Publication number: 20170295123Abstract: A server device that includes a receiving unit, a browse page creation unit, a mail creation unit, and a mail transmission unit. The receiving unit receives an image transmitted from an electronic camera via a wireless network. The browse page creation unit creates a browse page for browsing the transmitted image from the electronic camera, the image having been received by the receiving unit. The mail creation unit creates a notification mail for introducing the browse page that has been created by the browse page creation unit to a person other than a user of the electronic camera. Furthermore, the mail transmission unit transmits the notification mail that has been created by the mail creation unit to a specified mail address.Type: ApplicationFiled: June 19, 2017Publication date: October 12, 2017Applicant: NIKON CORPORATIONInventors: Hirotaka MAEDA, Mio NAGISA, Motoyuki KUBOI, Gaku ITO, Takeshi SHINOHARA
-
Publication number: 20170295124Abstract: A social networking website that connects people with different exercise interest whether walking, jogging or running. The member will create a profile account wherein they can invite or accept another account holders with the same exercise interest. This provides a convenient way for members to meet other exercise enthusiast to share ideas, meet up, motivate one another and create a health group.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: Jasper Nino Embing Golingho
-
Publication number: 20170295125Abstract: The present disclosure relates to a method and apparatus for a thing collaboration service based on a social community. More specifically, the method includes: forming a social community among users having a purpose of detecting and preventing a risk in a predetermined place and environment; managing the social community to connect thing terminals owned by the individual users to each other on the basis of the formed social community; collecting thing status information from the thing terminal of each of the users; detecting an occurrence of a risk for predicting an occurrence of an accident or detecting a time point at which the accident occurs by analyzing the collected thing status information; and sharing information about the detected occurrence of the risk with the users of the social community.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Applicant: Electronics and Telecommunications Research InstituteInventors: Hoon Ki LEE, Noh Sam PARK
-
Publication number: 20170295126Abstract: An article articulating two different points of view is provided to a reader, with each point of view associated with a respective hashtag. Social media streams associated with social media outlets are also collected and analyzed to identify occurrences of the hashtags in the social media streams, and to collect and analyze information relating to those occurrences. Scoring parameter values are assigned to each occurrence, with each scoring parameter value based on the related information, such as an identity of a notable social media user associated with the occurrence. A weighted score value is generated based on the scoring parameter values for each hashtag, and the weighted score value is presented to the reader of the article in real time. Additional visual information, such as trend lines, identities of notable social media users associated with certain occurrences, and other information may also be provided to the reader in real time.Type: ApplicationFiled: April 7, 2017Publication date: October 12, 2017Inventors: Harris Novick, Kevin Wong, David Cohn, Lawrence Donoghue
-
Publication number: 20170295127Abstract: A system, method, and application for users to obtain or possess a geo-location as an asset for presenting one or more information items on a visual display map that are in geographic proximity to a user. The system is configured to receive posts of information items based on a poster's geographic location. The information items are dynamically updated in the system and have a limited lifespan to insure that the information contained in the system remain fresh and current. A user may find information items based on their geographic proximity to the item.Type: ApplicationFiled: April 10, 2017Publication date: October 12, 2017Inventor: Dingchao He
-
Publication number: 20170295128Abstract: A user agent of a user selects another user having a user agent. The user agents exchange personal information about the user and personal information about the other user. The user agent determines whether a common interest exists between the two users based on the exchange of personal information. The other user is added to a social networking webpage of the user when the user agent determines that a common interest exists.Type: ApplicationFiled: June 24, 2017Publication date: October 12, 2017Inventor: Philip Scott Lyren
-
Publication number: 20170295129Abstract: A method for following asynchronous and synchronous productivity application communications includes providing, by an update processor, a targeted medium with a notification for changes associated with the productivity application communication based on a promotion of the productivity application communication to the targeted medium. The update processor further receives subscriptions for receiving update notifications through the targeted medium for the changes associated with the productivity application communication.Type: ApplicationFiled: June 27, 2017Publication date: October 12, 2017Inventors: Kun Bai, Di Ling Chen, Christian B. Kau, Zhi Cheng Liu, Patrick J. O'Sullivan
-
Publication number: 20170295130Abstract: A method is provided in one example embodiment and includes receiving at a controller an Address Resolution Protocol (“ARP”) packet from a source VXLAN Tunnel End Point (“VTEP”) serving a source host and identifying a destination, the source VTEP having assigned thereto a Virtual Network Identifier (“VNI”) identifying a VXLAN network to which the source VTEP and a plurality of other VTEPs belong, the ARP packet being received by the controller via a control plane; determining whether the received ARP packet is a request message; and, if the received ARP packet is a request message, determining whether address information for the identified destination is stored in a cache of the controller.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Mehak Mahajan, Samir D. Thoria, Shyam Kapadia
-
Publication number: 20170295131Abstract: A single DNS NS record can establish a zone delegation to a reverse proxy access device so that the reverse proxy access device answers DNS queries directed to it under the zone delegation. A DNS label can be designated at the reverse proxy access device for each resource served by the reverse proxy access device. Upon receiving a DNS request directed to the reverse proxy access device under the zone delegation, the reverse proxy access device can use the DNS label included in a DNS request to identify the specific resource and answer with an automatically and dynamically generated A record containing the IP address of the reverse proxy access device. The client can then use the IP address to complete a TCP connection with the reverse proxy access device, after which the reverse proxy access device can use the DNS label to complete the request to the appropriate resource.Type: ApplicationFiled: July 22, 2016Publication date: October 12, 2017Inventors: Karl Dyszynski, Steven C. Work
-
Publication number: 20170295132Abstract: Mechanisms may be used for edge caching Hypertext Transfer Protocol Secure (HTTPS) content via an owner-endorsed proxy. The edge servers of a mobile-content distribution network (CDN) may work as the proxy that dynamically gets the means to serve HTTPS content through rights delegated by content owners. Mechanisms may include dynamically assigning a domain with a Canonical name (CNAME) record in DNS based on the popularity of the domain at an edge server. Each edge server from the plurality of edge servers may be associated with a mobile content distribution (mobile-CDN) network, via the mobile-CDN, the right to establish a transport layer security (TLS) session is delegated to the edge server on behalf of the content owner, so that the HTTPS request to the content server may be served by the edge server. A mechanism to restrict the scope of HTTPS content served through the delegated right is presented as well.Type: ApplicationFiled: August 14, 2015Publication date: October 12, 2017Applicant: INTERDIGITAL PATENT HOLDINGS, INC.Inventors: Jun Li, Debashish Purkayastha
-
Publication number: 20170295133Abstract: A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Inventor: Timothy P. Barber
-
Publication number: 20170295134Abstract: A system and methods for correcting domain names in invalid email addresses are described herein. The method includes receiving email failure information including a bad domain name. The bad domain name is compared to valid domain names in a valid domain name database and a match distance of the bad domain name to valid domain names in the valid domain name database is evaluated. Confidence scores for the valid domain names are prepared based on the match distance. Valid domain names having confidence scores exceeding a domain match threshold are identified. A valid domain name with a confidence score exceeding the domain match threshold is selected. The method involves heuristics and machine learning. System administrator intervention may be received to assist in the selecting. An email note is sent to the corrected domain name.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Inventors: Henri J. Isenberg, Ronald B. Laughton, Timothy J. Cashin
-
Publication number: 20170295135Abstract: A network-traversal method includes: receiving an address information of a network device from a link server; generating a port number sequence composed of port values according to an external port number of the address information; and sending a link packet to an external network address of the address information in an order of the port values in the port number sequence until receiving an acknowledgement packet from the network device. At least one of the port values is related to the external port number. A part of the rest port values is/are generated gradually based on the external port number, and the others of the rest port values is/are generated randomly.Type: ApplicationFiled: April 7, 2017Publication date: October 12, 2017Inventor: Kai-Kuo Liu
-
Publication number: 20170295136Abstract: Systems and methods are disclosed for establishing connections between computing devices. A first computing device may communicate data via a symmetric NAT and a second computing device may communicate data via a cone NAT. The first computing device may establish a connection, such as a peer-to-peer (P2P) connection, between the first computing device and the second computing device via the symmetric NAT and the cone NAT.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: GABRIEL RIBEIRO
-
Publication number: 20170295137Abstract: The subject matter described herein relates to methods, systems, and computer readable media for testing network equipment devices using connection-oriented protocols. In some examples, a method for testing a network equipment device under test (DUT) includes executing, by a network equipment test device, a test script to test the network equipment DUT using a connection-oriented protocol. The method includes inserting, during a connection establishment process of the connection-oriented protocol for a network flow to the network equipment DUT, a flow-identifying sequence number into a sequence number field of a first message of the network flow. The flow-identifying sequence number is a number uniquely identifying the network flow from other network flows. The method includes receiving a second message from the network equipment DUT and determining that the second message belongs to the network flow by extracting the flow-identifying sequence number from the second message.Type: ApplicationFiled: April 9, 2016Publication date: October 12, 2017Inventors: Alexandru Badea, George Ciobanu, Emilian-Mihai Filipescu, Marius-Gabriel Ionescu
-
Publication number: 20170295138Abstract: According to one embodiment of the invention, a method for determining a personal identifier corresponding to an alias is provided. The method comprises receiving a request to provide a resource, the resource being provided from an originating party to an alias representing a receiving party. The method further comprises transmitting an inquiry for a personal identifier corresponding to the alias to a plurality of remote computers, interacting with the plurality of remote computers to provide the personal identifier corresponding to the alias, and selecting a remote computer from the plurality of remote computers using selection criteria. The method further comprises requesting the personal identifier from the selected remote computer, and receiving the personal identifier from the remote computer.Type: ApplicationFiled: April 12, 2016Publication date: October 12, 2017Inventor: Vishwanath Shastry
-
Publication number: 20170295139Abstract: The present disclosure relates to a multicast security control method and device based on DNS. The method includes: transmitting a DNS request message to a domain name server to acquire a multicast source DNS address list of an IPTV server; conducting address verification on a multicast data message according to the multicast source DNS address list and a locally maintained multicast address list after the multicast data message issued by the IPTV server is received; and conducting forwarding control on the multicast data message according to a verification result.Type: ApplicationFiled: June 8, 2015Publication date: October 12, 2017Inventors: Chunsheng Gao, Yunfei Wu, Yu Wei
-
Publication number: 20170295140Abstract: A computer-implemented method, including: in response to a request from a client device, establishing a network tunnel between the client device and a gateway, the gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in a private network; in response to an update to a policy after establishing the network tunnel, receiving a first token; and in response to receiving the first token, updating at least one of the firewall rules while the network tunnel is active.Type: ApplicationFiled: January 17, 2017Publication date: October 12, 2017Inventors: Kurt Glazemakers, Natan Abolafya, Gokhan Berberoglu, Thomas Bruno Emmanuel Cellerier, Aitor Perez Iturri, Per Leino, Jamie Bodley-Scott
-
Publication number: 20170295141Abstract: In one embodiment, a virtual firewall is installed on a port of a device that communicates across a zone boundary within an industrial network. The virtual firewall is then configured based on operation of the industrial network, such that the port may then communicate via the firewall to a remote virtual firewall of a remote port of a remote device across the zone boundary.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventors: Pascal Thubert, Xuechen Yang, Rudolph B. Klecka, III, Patrick Wetterwald, Eric Levy-Abegnoli
-
Publication number: 20170295142Abstract: A computing system, method, and storage medium prevent denial of provision of a network service by a server computer to an authorized client device. The computing system receives network service data that include a credential, then transmits that credential to a cloud-based identity system. The computing system responsively receives data pertaining to either zero or one identities related to the credential. If the data pertain to zero identities, the transaction is immediately terminated, preventing denial of the service. Only when the data pertain to exactly one identity does the computing system transmit the data to the server computer. Moreover, the computing system may terminate the transaction unless the server computer is similarly validated by the cloud-based identity system, thereby preventing access from an unauthorized device. The computing system may hide a network address of the client device from the server computer, and vice versa, and perform other useful supporting functions.Type: ApplicationFiled: June 22, 2017Publication date: October 12, 2017Inventor: Norman Schibuk
-
Publication number: 20170295143Abstract: A method and system for communicating between a managed device and a device manager is provided by sending the managed device a message over a first communications channel, and then initiating communication between the managed device and the device manager over a second communications channel in response to the message, wherein the first communications channel and the second communications channel are of different types.Type: ApplicationFiled: April 25, 2017Publication date: October 12, 2017Inventors: Nick BONE, Simone FERRARA
-
Publication number: 20170295144Abstract: Various embodiments implement a secure content distribution architecture involving a content delivery network (CDN). A web server system can encrypt a content file and store the encrypted content file in an origin data center. The web server system can store a decryption key for decrypting the content file. The CDN can fetch the encrypted content file after the content file is first requested by the CDN from the origin cache system. When a client device requests access to a website supported by the web server system, the web server system can provide a blueprint of a page of the website, a link to the content file in the CDN, and the decryption key for decrypting the content file. The client device can then request the encrypted content file from the CDN and utilize the decryption key to decrypt the encrypted content file.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventors: Yee Jiun Song, Wendy Tobagus, Aravind Narayanan
-
Publication number: 20170295145Abstract: The transmission of flight instructions from a ground unit to an aircraft comprising an onboard system. The ground unit is configured to generate, on the basis of flight data intended for the aircraft, at least one optical symbol containing a flight instruction. The onboard system comprises an optical reader and a flight management system. The optical reader is configured to read the optical symbol and to transfer the flight instruction contained in the symbol to the flight management system to prepare the flight of the aircraft.Type: ApplicationFiled: March 28, 2017Publication date: October 12, 2017Inventor: Pau LATORRE-COSTA
-
Publication number: 20170295146Abstract: A utility meter and method for metering consumption of at least one utility including: a metering unit, a communication unit for sending/receiving messages to/from a management center, a memory to store a unique identifier pertaining to the utility meter and a first key, an encryption unit for encrypting the utility consumption as a first cryptogram, a message generator for generating a utility message containing the first cryptogram, a key generator for generating a payload key to be used by the encryption unit for encrypting the utility consumption, a second cryptogram generated by the encryption unit by encrypting the payload key with the first key, the second cryptogram being intended to be included, by the message generator, at least once into the utility message to be sent to the remote management center.Type: ApplicationFiled: April 26, 2017Publication date: October 12, 2017Applicant: NAGRAVISION S.A.Inventors: Corinne Le Buhan, Christophe Nicolas, Joel Conus
-
Publication number: 20170295147Abstract: A method for accessing a remote computer system may include obtaining a private key, storing the private key in a file system owned by a root account, disabling login access to the root account from user accounts, installing a secure application with root execution privileges, mounting, via the secure application, the file system, obtaining, via the secure application, the private key from the file system, and accessing, via the secure application and over a network, the remote computer system using the private key.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: Thierry Manfe
-
Publication number: 20170295148Abstract: Described in detail herein are systems and methods for a group of mobile devices including a stateless application virtualizing an instance of a stateful virtual application. In exemplary embodiments, a mobile monitor within a controller is configured to initialize a session between the stateless application of at least one of the mobile devices and the stateful virtual machine of the controller in response to a first request message from the at least one of the mobile devices. The mobile monitor is further configured to intercept a second request message from the at least one mobile device to the controller intended for the stateful virtual machine that includes encrypted data, transmit the encrypted data to a remote system for decrypting the encrypted data, receive the decrypted data from the remote system, and transmit the second request message and the decrypted data to the stateful virtual machine.Type: ApplicationFiled: April 12, 2017Publication date: October 12, 2017Inventors: Cameron Lloyd Wright, Jason Rupert Roop
-
Publication number: 20170295149Abstract: A card-based method for generating a dynamic password, in which the method comprises: power on a device, initialize a current running state as a first state, prompt a user to press down a mode key, the device determines an operation to be executed when the mode key is pressed down, obtain input data according to the operation on a number key pressed by the user in the case that a number key is pressed down; obtain a confirm state according to the operation on a state key pressed by the user in the case that a state key is pressed down; otherwise, execute a corresponding operation according to the current running state, the corresponding operation comprises: obtain a dynamic password according to the interaction with the card and preset process the password data and output the dynamic password.Type: ApplicationFiled: November 23, 2015Publication date: October 12, 2017Inventors: Zhou LU, Huazhang YU
-
Publication number: 20170295150Abstract: A computing resource service provider receives a request from a customer to establish a physical connection between a provider network device and a customer network device in a colocation center. Once the connection has been established, the customer may transmit cryptographic authentication information, through the physical connection, to the provider network device. The provider network device transmits this information to an authentication service operated by the computing resource service provider to verify the authenticity of the information. If the information is authentic, the authentication service may re-configure the provider network device to allow the customer to access one or more services provided by the computing resource service provider. The authentication service may transmit cryptographic authentication information to the customer to verify the identity of the computing resource service provider.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Inventors: Mark Edward Stalzer, Christian Arthur Arllen
-
Publication number: 20170295151Abstract: A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically fetched, material specific, data handlers (e.g., download assistants). A download assistant fetches a data stream from a remote location and processes the streamed data iteratively using buffers and multi-threaded processes through the decoder (e.g., codec), allowing source material-specific processing of the data as it is streamed from one or more download sources as well as content-indifferent and platform-indifferent decoding. To minimize versioning issues, payload construction for secure delivery is simplified to packing and encrypting a directory tree containing any number of files or other digital media into an archive and, when needed, dividing a payload into multiple files or archives with a descriptor that lists the archives.Type: ApplicationFiled: December 5, 2016Publication date: October 12, 2017Inventors: David ALDIS, Kenneth BROWN, Andrew GALLANT
-
Publication number: 20170295152Abstract: A method for managing keystore information on a computing device may include requesting a keystore from a distribution system, receiving the keystore from the distribution system, and populating a runtime environment with keystore information contained within the keystore. A method for generating a keystore may include receiving, by a distribution system, a request for a keystore from a computing device, generating a key pair including a public key and a private key, generating a certificate signing request, digitally signing the public key with the private key, generating the keystore, combining the signed public key with the private key in the keystore, and providing the keystore to the computing device. A method for generating a truststore may include receiving, by a distribution system, a request for a truststore from a computing device, generating the truststore, adding a certificate to the truststore, and providing the truststore to the computing device.Type: ApplicationFiled: June 19, 2017Publication date: October 12, 2017Applicant: AT&T Intellectual Property I, L.P.Inventor: Andrew Schiefelbein
-
Publication number: 20170295153Abstract: The present invention relates to a reconfiguration method and a terminal for receiving reconfiguration information (including an encryption algorithm) sent by a primary base station, updating a local key according to the received encryption algorithm and using the received encryption algorithm and the updated key to communicate with the secondary base station, and further sending reconfiguration complete information to the primary base station.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Inventors: Tao Zhang, Bo Lin, Dongmei Zhang
-
Publication number: 20170295154Abstract: Techniques for authenticating client applications to services and/or applications that are provided within an environment that may become disconnected, as a whole, from other networks (e.g., on-board a vehicle) may include receiving an indication of a local service that may be provided within the dis-connectable environment, and authenticating/registering the local service. A request for service(s) may be received from a client application within the dis-connectable environment, and the client application may be authenticated/authorized to access one or more local services. An indication of a session key may be provided to the local service provider and to the authenticated/authorized client application for use in establishing a secure connection therebetween, thereby providing the client application access to the registered local service.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Mark Jackson, Christopher M. Rippe, Michael Metz
-
Publication number: 20170295155Abstract: The present disclosure relates generally to tokenization of a co-network account. A co-network account, as used herein, refers to an account associated with a first transaction processing network for processing transactions initiated using the account and a second transaction processing network for processing transactions initiated using the account. During provisioning of a co-network account onto a user device, a first token is generated for use with the first transaction processing network and a second token is generated for use with the second transaction processing network. Embodiments use the authentication result generated during the provisioning of the first token for the provisioning of the second token. Embodiments automatically provision multiple payment tokens on the user device upon determining that the account is associated with more than one transaction processing networks (e.g. the account is a co-network account).Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventor: Erick Wong
-
Publication number: 20170295156Abstract: Systems, methods, and software can be used to share content. In some aspect, an enterprise mobility management (EMM) server receives a command for provisioning a user for an enterprise service at an identity provider (IDP). The EMM server sends a user provisioning request to the IDP. The user provisioning request includes a user identity attribute and a user entitlement attribute, the user identity attribute identifies the user, and the user entitlement attribute indicates an access level associated with the user for the enterprise service. The EMM server receives a user provisioning response from the IDP. The user provisioning response indicates that the user is provisioned at the IDP for the enterprise service.Type: ApplicationFiled: April 12, 2016Publication date: October 12, 2017Applicant: BlackBerry LimitedInventors: Mendel Elliot SPENCER, Kirk Douglas SMITH, David Brian SEEL, Robert Lorne BOWERMAN, Aleksandar SUSNJAR, Calin Marius BOZSITZ
-
Publication number: 20170295157Abstract: Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc. All of the information can be collected for a specified period of time (e.g., 30 minutes, 1 hour, etc.), periodically, or continually. This process yields a large collection of data, which can be condensed (a record before condensing the data may be approximately 10 to 50 MB). The data may then be encapsulated in a blockchain. At least a portion of the blockchain may then be exchanged to identify the device.Type: ApplicationFiled: October 3, 2016Publication date: October 12, 2017Inventors: David Chavez, Laurent Philonenko