[ { "title": "", "publication_date": "2018/02/06", "number": "", "url": "/2018/06/02/2014-06-26-global-relationship-model-and-a-relationship-search-method-for-internet-social-networks/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2018/02/06", "number": "", "url": "/2018/06/02/2014-02-25-system-and-method-for-facilitating-secure-self-payment-transactions-of-retail-goods/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Techniques to transform network resource requests to zero rated network requests", "publication_date": "2014/19/11", "number": "09584671", "url": "/2014/11/19/techniques-to-transform-network-resource-requests-to-zero-rated-network-requests2/", "abstract": "Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.", "owner": "FACEBOOK, INC.", "owner_city": "Menlo Park", "owner_country": "US" }, { "title": "Methods and systems for data transfer and campaign management", "publication_date": "2014/18/11", "number": "09036808", "url": "/2014/11/18/methods-and-systems-for-data-transfer-and-campaign-management/", "abstract": "An online and offline communication processing and tracking using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first entity. A call quality rating is determined and recorded. A call from a caller directed to the phone address is received at a call bridging system coupled to at least one network, wherein the call is associated with call signaling information. Based at least in part on the call quality associated with the caller call, the caller call is assigned to a first location in a call queue. An outbound call is generated from the call bridging system and the inbound and the outbound calls are bridged. One or more parameters of the bridged call are compared to the call quality rating. An indication is recorded regarding the successful bridging of the calls in association with an entity identifier.", "owner": "INVOCA, INC.", "owner_city": "Santa Barbara", "owner_country": "US" }, { "title": "Replicated database startup for common database storage", "publication_date": "2014/11/11", "number": "09613120", "url": "/2014/11/11/replicated-database-startup-for-common-database-storage2/", "abstract": "Read-only nodes of a distributed database system may perform replicated database startup for common database storage. A read-only node may request a view of a database from a master node to initialize the read-only node for servicing queries. An indication of the view may be received and portions of data maintained for the distributed database may be read from a common data store maintaining the data for the database according to the indicated view of the database. In-memory data structures at the read-only node for servicing queries may be initialized based on the portions of data read from the common data store. The read-only node may then be made available for servicing queries.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Automated deployment of applications", "publication_date": "2014/10/11", "number": "09547564", "url": "/2014/11/10/automated-deployment-of-applications/", "abstract": "Functionality is disclosed for automated deployment of applications. A network-based deployment service provides functionality for deploying software components to physical or virtual hosts in a service provider network and/or to hosts in other types of networks external to the service provider network. A user of the deployment service creates an application revision that includes deployable content and an application specification defining how the application is to be deployed and one or more lifecycle events. The application revision is then uploaded to a storage service, source code repository, or other location. A deployment configuration is also created that defines the location of the application revision, a deployment group, and a schedule for the deployment. A deployment agent executing on hosts in the deployment group obtains the application revision from the specified location, deploys the deployable content according to the schedule, and performs the lifecycle events.", "owner": "Amazon Technologies, Inc.", "owner_city": "Seattle", "owner_country": "US" }, { "title": "System and method of delivering data that provides service differentiation and monetization in mobile data networks", "publication_date": "2014/07/10", "number": "09037646", "url": "/2014/10/07/system-and-method-of-delivering-data-that-provides-service-differentiation-and-monetization-in-mobile-data-networks/", "abstract": "An exemplary system according to the present disclosure comprises a lower tier Radiolet™ that is in communication with a local switching office of a mobile data network, and an upper tier Radiolet™ that is in communication with the lower tier Radiolet™ and an Internet datacenter. In operation, the upper tier Radiolet™ receives data extracted from the Internet datacenter and distributes at least a portion of the received data to the lower tier Radiolet™. At the lower tier Radiolet™, the portion of received data is stored. The lower tier Radiolet™ then receives a data request (relating to a portion of received data) and in turn, transmits data from the portion of received data to a source of the data request. The lower tier Radiolet™ is located closer to the source of the data request than the Internet datacenter to improve application performance and efficiency of network as well as datacenter.", "owner": "Alef Mobitech Inc.", "owner_city": "Bernardsville", "owner_country": "US" }, { "title": "Dynamic signaling and resource allocation in secure media-based conferencing", "publication_date": "2014/29/09", "number": "09131112", "url": "/2014/09/29/dynamic-signaling-and-resource-allocation-in-secure-mediabased-conferencing/", "abstract": "Methods and apparatuses, including computer program products, are described for allocating resources in a media-based conferencing session. A server computing device receives a first request to join a conference session from a first end point device associated with a non-organizer participant, including a first media stream. The server computing device determines a hosting site by querying a media location service and determines configuration attributes by querying a database. The server computing device connects the media stream to a waiting room at the hosting site. The server computing device receives a second request to join the conference session from a second end point device associated with an organizer, including a second media stream. The server computing device determines a meeting room for the conference session by querying the media location service and establishes the conference session by transferring the first media stream and the second media stream into the meeting room.", "owner": "Edifire LLC", "owner_city": "Boston", "owner_country": "US" }, { "title": "Dynamic media negotiation in secure media-based conferencing", "publication_date": "2014/29/09", "number": "09282130", "url": "/2014/09/29/dynamic-media-negotiation-in-secure-mediabased-conferencing/", "abstract": "Methods and apparatuses, including computer program products, are described for negotiating media capabilities between a plurality of end point devices in a media-based conference session. A server computing device receives a request to join a conference session between a plurality of end point devices, the request received from a first device and comprising a media flow. The server computing device identifies at least one of the first device and a network from which the first device sent the request. The server computing device determines whether a media negotiation profile associated with the identified device exists. The server computing device determines whether a media negotiation profile associated with the identified network exists. The server computing device adjusts one or more of a bitrate, a session description, and a destination multipoint control unit, based upon the media negotiation profiles. The server computing device connects the adjusted media flow to the conference session.", "owner": "EDIFIRE LLC", "owner_city": "Boston", "owner_country": "US" }, { "title": "Dynamic conference session state management in secure media-based conferencing", "publication_date": "2014/29/09", "number": "09137187", "url": "/2014/09/29/dynamic-conference-session-state-management-in-secure-mediabased-conferencing/", "abstract": "Methods and apparatuses, including computer program products, are described for managing session state for a plurality of media-based conference sessions. A server computing device receives a first request to update a data element in a primary in-memory data structure, the request comprising an update to the data element associated with a session state of one or more in-process media-based conference sessions. The server blocks subsequent requests to update the data element that are received after the first request and stores the blocked requests sequentially in a temporary queue based upon a timestamp associated with each blocked request. The server replicates the update to the data element to a secondary in-memory data structure. The server updates the data element in the primary in-memory data structure based upon the update to the data element in the first request, and processes the blocked requests based upon the timestamp upon completion of the replication.", "owner": "Edifire LLC", "owner_city": "Boston", "owner_country": "US" }, { "title": "Dynamic conference session re-routing in secure media-based conferencing", "publication_date": "2014/29/09", "number": "09167098", "url": "/2014/09/29/dynamic-conference-session-rerouting-in-secure-mediabased-conferencing/", "abstract": "Methods and apparatuses, including computer program products, are described for re-routing a media-based conference session. A server computing device determines a condition associated with a first conference session between a plurality of end point devices, each connected to the server via an external media stream and each connected from the server to a first multipoint control unit via a first internal media stream. The condition indicates that a new multipoint control unit is required. The server identifies a second multipoint control unit available to host a second conference session between the plurality of end point devices. The server disconnects the first internal streams from the first multipoint control unit while the external streams remain connected. The server connects each of the plurality of devices from the server to the second multipoint control unit via a second internal stream, and establishes the second conference session on the second multipoint control unit.", "owner": "Edifire LLC", "owner_city": "Boston", "owner_country": "US" }, { "title": "Media distribution and management platform", "publication_date": "2014/29/08", "number": "09501212", "url": "/2014/08/29/media-distribution-and-management-platform/", "abstract": "An embodiment of the invention simplifies management of the “video lifecycle”. An embodiment includes one of more modules that streamline the video publishing process by abstracting technical steps such as video publishing, updating video, unpublishing video, retrieval or statistics concerning video, authorization to process video, validation of video, video metadata processing, video transcoding, and/or video transmission. Other embodiments are described herein.", "owner": "uStudio, Inc", "owner_city": "Austin", "owner_country": "US" }, { "title": "Providing data volume recovery access in a distributed data store to multiple recovery agents", "publication_date": "2014/20/08", "number": "09424140", "url": "/2014/08/20/providing-data-volume-recovery-access-in-a-distributed-data-store-to-multiple-recovery-agents/", "abstract": "A distributed data store may provide volume recovery access to multiple recovery agents. A data volume may be maintained for a storage client at the distributed data store. Write access to the data volume may be granted according to a single writer consistency scheme. When a recovery event is detected for the data volume, the data volume may be made available to multiple recovery agents that may perform respective recovery operations. Upon first completion of a recovery operation for the data volume, granting access to the data volume according to the single writer consistency scheme may be resumed. In some embodiments, the distributed data store may be a log-structured data store.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Automating client development for network APIs", "publication_date": "2014/20/08", "number": "09398081", "url": "/2014/08/20/automating-client-development-for-network-apis/", "abstract": "System and method of automating client development for an application programming interface (API). An embodiment includes an apparatus capable of receiving information regarding a target application resource accessible by an API, and of generating a selected sequence of API calls based on weighted transitions in an API model representing resources needed for a client to perform interactions with the API. The apparatus is able to automatically generate a client program for interacting with the API according to a sequence of API calls. Additionally, methods are described for converting a model of an API into a directed, weighted graph, allowing determination of a selected sequence of API calls to access a target application resource. The API may be a Representational State Transfer API (REST API) implemented for a software defined network (SDN).", "owner": "Futurewei Technologies, Inc.", "owner_city": "Plano", "owner_country": "US" }, { "title": "Policy based application management", "publication_date": "2014/24/07", "number": "09521147", "url": "/2014/07/24/policy-based-application-management/", "abstract": "Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.", "owner": "Citrix Systems, Inc.", "owner_city": "Fort Lauderdale", "owner_country": "US" }, { "title": "Methods and systems for processing and managing communications", "publication_date": "2014/30/06", "number": "08917860", "url": "/2014/06/30/methods-and-systems-for-processing-and-managing-communications/", "abstract": "An online and offline communication processing and tracking using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first entity. A call quality rating is determined and recorded. A call from a caller directed to the phone address is received at a call bridging system coupled to at least one network, wherein the call is associated with call signaling information. Based at least in part on the call quality associated with the caller call, the caller call is assigned to a first location in a call queue. An outbound call is generated from the call bridging system and the inbound and the outbound calls are bridged. One or more parameters of the bridged call are compared to the call quality rating. An indication is recorded regarding the successful bridging of the calls in association with an entity identifier.", "owner": "Invoca, Inc.", "owner_city": "Santa Barbara", "owner_country": "US" }, { "title": "Providing social-network information to third-party systems", "publication_date": "2014/13/06", "number": "09524348", "url": "/2014/06/13/providing-socialnetwork-information-to-thirdparty-systems/", "abstract": "Particular embodiments receive, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determine, by the first computing device, whether the user of the third-party system matches any member of the social-networking system; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then send, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query.", "owner": "Facebook, Inc.", "owner_city": "Menlo Park", "owner_country": "US" }, { "title": "System and method for securely transmitting data via an electronic marketplace", "publication_date": "2014/11/06", "number": "09077547", "url": "/2014/06/11/system-and-method-for-securely-transmitting-data-via-an-electronic-marketplace/", "abstract": "The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs, comprises a method for integrating value added services within a network of participants, for instance, a payment network. The network can use service switching capabilities to route service calls to and from the service consumers and providers using routing elements defined in a message specification. Network participants can be both consumers and providers of services. The network can route service messages to the appropriate provider depending on details in the message.", "owner": "AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.", "owner_city": "New York", "owner_country": "US" }, { "title": "System and method for monetizing switching of web service messages", "publication_date": "2014/11/06", "number": "09154315", "url": "/2014/06/11/system-and-method-for-monetizing-switching-of-web-service-messages/", "abstract": "The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs, comprises a method for integrating value added services within a network of participants, for instance, a payment network. The network can use service switching capabilities to route service calls to and from the service consumers and providers using routing elements defined in a message specification. Network participants can be both consumers and providers of services. The network can route service messages to the appropriate provider depending on details in the message.", "owner": "AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.", "owner_city": "New York", "owner_country": "US" }, { "title": "System and method for facilitating on call privileges over a digital network", "publication_date": "2014/11/06", "number": "09088423", "url": "/2014/06/11/system-and-method-for-facilitating-on-call-privileges-over-a-digital-network/", "abstract": "The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs, comprises a method for integrating value added services within a network of participants, for instance, a payment network. The network can use service switching capabilities to route service calls to and from the service consumers and providers using routing elements defined in a message specification. Network participants can be both consumers and providers of services. The network can route service messages to the appropriate provider depending on details in the message.", "owner": "AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.", "owner_city": "New York", "owner_country": "US" }, { "title": "Analyzing facial recognition data and social network data for user authentication", "publication_date": "2014/11/06", "number": "09147117", "url": "/2014/06/11/analyzing-facial-recognition-data-and-social-network-data-for-user-authentication/", "abstract": "Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect business enterprises, consumers, and other entities from fraud by combining biometric activity data with facial recognition data for end users. Risks associated with various entities can be analyzed and assessed based on a combination of user liveliness check data, facial image data, social network data, and/or professional network data, among other data sources. In various embodiments, the risk assessment may include calculating an authorization score or authenticity score based on different portions or combinations of the collected and processed data.", "owner": "Socure Inc.", "owner_city": "New York", "owner_country": "US" }, { "title": "Viral invitations for social networks", "publication_date": "2014/30/04", "number": "09419818", "url": "/2014/04/30/viral-invitations-for-social-networks/", "abstract": "A system and method for virally growing a social network. The social network system receives a member account sign-up message for a first social network from a first member. The social network system then posts a member sign-up notification to the first member's event wall on a second social network; wherein the first member has one or more social contacts through the second social network. For at least a second respective member in the one or more social contacts, the social network system posts a personalized invitation message as a comment to the member sign-up notification on the first member's event wall, wherein the comment is initially hidden from all members other than the second respective member of the one or more member contacts.", "owner": "LinkedIn Corporation", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "System and method for creating a development and operational platform for mobile applications", "publication_date": "2014/18/04", "number": "09038015", "url": "/2014/04/18/system-and-method-for-creating-a-development-and-operational-platform-for-mobile-applications/", "abstract": "The present invention provides a system and method for constructing a complete definition of a backend requirements model that can be automatically accessed and interpreted, and generated into a mobile consumable API for creation of, and use with, mobile applications. The mobile consumable API can be provided and made available to mobile app developers on a separate, stand-alone platform, and may act as an intermediary between the mobile app and the primary mainframe/enterprise/back end system. The method may include identification and definition of one or more of information providers, integration providers, and system behaviors, and creating a domain model. The domain model may be automatically codified into an API based solution as the app/mainframe interface, and stored on a development and operational platform for use.", "owner": "Clearblade, Inc.", "owner_city": "Austin", "owner_country": "US" }, { "title": "Method and devices to invite a user from an external chat service to a group chat session", "publication_date": "2014/16/04", "number": "09391788", "url": "/2014/04/16/method-and-devices-to-invite-a-user-from-an-external-chat-service-to-a-group-chat-session/", "abstract": "This is a method and devices used to invite a user from one message chat service into a preexisting group chat session located on another chat service.", "owner": "Infinite Convergence Solutions, Inc", "owner_city": "Arlington Heights", "owner_country": "US" }, { "title": "Object store management operations within compute-centric object stores", "publication_date": "2014/02/04", "number": "09075818", "url": "/2014/04/02/object-store-management-operations-within-computecentric-object-stores/", "abstract": "Object store management operations within compute-centric object stores are provided herein. An exemplary method may include transforming an object storage dump into an object store table by a table generator container, wherein the object storage dump includes at least objects within an object store that are marked for deletion, transmitting records for objects from the object store table to reducer containers, such that each reducer container receives object records for at least one object, the object records comprising all object records for the at least one object, generating a set of cleanup tasks by the reducer containers, and executing the cleanup tasks by a cleanup agents.", "owner": "Joyent, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Systems and methods for image processing using a resizing template", "publication_date": "2014/01/04", "number": "09256919", "url": "/2014/04/01/systems-and-methods-for-image-processing-using-a-resizing-template/", "abstract": "Disclosed are various embodiments for systems and methods for image processing. A resizing template may be generated having one or more image sizes of an original image based at least in part on resize settings. A preview may then be generated of preview images of the original image based at least in part on the resizing template and the resize settings. The resize settings may be further adjusted via the preview. Upon approval of the preview and the adjusted resize settings, the original image is processed to generate final resized images according to the template and the modified resize settings.", "owner": "GRIT DESIGN, INC.", "owner_city": "Detroit", "owner_country": "US" }, { "title": "Risk assessment using social networking data", "publication_date": "2014/17/03", "number": "09300676", "url": "/2014/03/17/risk-assessment-using-social-networking-data/", "abstract": "Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and other organizations from identity theft and fraud. Risks associated with various entities can be analyzed and assessed based on analysis of social network data, professional network data, or other networking connections, among other data sources. In various embodiments, the risk assessment may include calculating an authenticity score based on the collected network data.", "owner": "Socure Inc.", "owner_city": "New York", "owner_country": "US" }, { "title": "Log record management", "publication_date": "2014/07/03", "number": "09501501", "url": "/2014/03/07/log-record-management/", "abstract": "A database system may maintain a plurality of log records at a distributed storage system. Each of the plurality of log records may be associated with a respective change to a data page. The plurality of log records may be transformed (e.g., cropped, prune, reduce, fused, deleted, merged, added, etc.).", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Database system with database engine and separate distributed storage service", "publication_date": "2014/07/03", "number": "09514007", "url": "/2014/03/07/database-system-with-database-engine-and-separate-distributed-storage-service/", "abstract": "A database system may include a database service and a separate distributed storage service. The database service (or a database engine head node thereof) may be responsible for query parsing, optimization, and execution, transactionality, and consistency, while the storage service may be responsible for generating data pages from redo log records and for durability of those data pages. For example, in response to a write request directed to a particular data page, the database engine head node may generate a redo log record and send it, but not the data page, to a storage service node. The storage service node may store the redo log record and return a write acknowledgement to the database service prior to applying the redo log record. The server node may apply the redo log record and other redo log records to a previously stored version of the data page to create a current version.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "External injection of cloud based network functions into network services", "publication_date": "2014/12/02", "number": "08832321", "url": "/2014/02/12/external-injection-of-cloud-based-network-functions-into-network-services/", "abstract": "Disclosed herein are system, method, and computer program product embodiments for providing an API description of an external network service and using the API to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (API), transmitting a call to the service provider using the API for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied.", "owner": "tw telecom holdings, inc.", "owner_city": "Littleton", "owner_country": "US" }, { "title": "System and method for enabling pairing of a companion device with a mate device for performing a companion device", "publication_date": "2014/28/01", "number": "09374619", "url": "/2014/01/28/system-and-method-for-enabling-pairing-of-a-companion-device-with-a-mate-device-for-performing-a-companion-device/", "abstract": "A method is provided in one example embodiment and includes establishing a connection between a first client and a messaging fabric of a conductor element associated with a video system; receiving a request to perform a companion service with a second client; authenticating the first client via a client directory based on an identifier associated with the first client; receiving a pair message from the first client for the second client; and verifying whether the two clients can be paired in order to perform the companion service. Companion service commands can be authorized/policy checked and resulting commands on the second client may appear as-if they had been triggered locally.", "owner": "CISCO TECHNOLOGY, INC.", "owner_city": "San Jose", "owner_country": "US" } ]