[ { "title": "Network control of applications using application states", "publication_date": "2015/15/12", "number": "09420400", "url": "/2015/12/15/network-control-of-applications-using-application-states/", "abstract": "Application states of applications associated with a communication device can be network controlled. An application agent, associated with an application used by the communication device, controls transitioning the application between application states based on network indicators received or network events detected from a communication network. The application states include active state or doze state. An application management component associated with the communication network at least partially controls transitioning the application between application states to facilitate controlling network traffic or reducing network congestion. The application agent or application management component can map application states to various factors, including radio states, congestion level, application performance indicators, network policies, or user policies, to facilitate determining which application state to apply to an application at a given time. The application agent can be in a centralized location, or at a same or different location as the application source.", "owner": "AT&T INTELLECTUAL PROPERTY I, L.P.", "owner_city": "Atlanta", "owner_country": "US" }, { "title": "Managing contingency capacity of pooled resources in multiple availability zones", "publication_date": "2015/07/12", "number": "09529682", "url": "/2015/12/07/managing-contingency-capacity-of-pooled-resources-in-multiple-availability-zones/", "abstract": "A network-based services provider may reserve and provision primary resource instance capacity for a given service (e.g., enough compute instances, storage instances, or other virtual resource instances to implement the service) in one or more availability zones, and may designate contingency resource instance capacity for the service in another availability zone (without provisioning or reserving the contingency instances for the exclusive use of the service). For example, the service provider may provision resource instance(s) for a database engine head node in one availability zone and designate resource instance capacity for another database engine head node in another availability zone without instantiating the other database engine head node. While the service operates as expected using the primary resource instance capacity, the contingency resource capacity may be leased to other entities on a spot market. Leases for contingency instance capacity may be revoked when needed for the given service (e.g., during failover).", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Provisioning dedicated network resources with API services", "publication_date": "2015/20/11", "number": "09491066", "url": "/2015/11/20/provisioning-dedicated-network-resources-with-api-services/", "abstract": "Embodiments are disclosed that provision a cloud-based service together with a dedicated network connection to provision a cloud-based service element. In response to the request both the cloud-based service element and a dedicated network connection are provisioned. Provisioning the cloud-based service element together with the dedicated network connection enables the cloud-based service element to utilize the dedicated network connection.", "owner": "LEVEL 3 COMMUNICATIONS, LLC", "owner_city": "Broomfield", "owner_country": "US" }, { "title": "System and method for running a multi-module telephony application", "publication_date": "2015/05/11", "number": "09491309", "url": "/2015/11/05/system-and-method-for-running-a-multimodule-telephony-application/", "abstract": "A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session.", "owner": "Twilio, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Enriching API registry using big data analytics", "publication_date": "2015/07/10", "number": "09471404", "url": "/2015/10/07/enriching-api-registry-using-big-data-analytics/", "abstract": "For data integration using APIs, a request for data is analyzed to determine a set of functional characteristics and a set of non-functional characteristics expected in the data. A first API entry is selected in a registry of API entries, the first API entry corresponding to a first API of the first data source. The first API entry includes a first metadata corresponding to a first functional characteristic in the set of functional characteristics. The first API is invoked to obtain a first portion of the data, the first portion having the first functional characteristic. Using a second API entry in the registry, a second API is invoked to obtain a second portion of the data. The first portion and the second portion are returned in a response to the request.", "owner": "INTERNATIONAL BUSINESS MACHINES CORPORATION", "owner_city": "Armonk", "owner_country": "US" }, { "title": "Electronically binding to a lost mobile device", "publication_date": "2015/23/09", "number": "09451465", "url": "/2015/09/23/electronically-binding-to-a-lost-mobile-device/", "abstract": "The first mobile device determining that the first mobile device is lost and the first mobile device, in response to determining that the first mobile device is lost, activating a secure mode on the first mobile device. The first mobile device making the first mobile device discoverable to other mobile devices. The first mobile device electronically binding to a second mobile device. The first mobile device sending information relating to the first mobile device to the second mobile device. The first mobile device receiving an indication that the first mobile device is no longer lost. The first mobile device, in response to receiving the indication that the first mobile device is no longer lost, unbinding from the second mobile device.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" }, { "title": "Wireless end-user device with policy-based controls for WWAN network usage and modem state changes requested by specific applications", "publication_date": "2015/28/08", "number": "09220027", "url": "/2015/08/28/wireless-enduser-device-with-policybased-controls-for-wwan-network-usage-and-modem-state-changes-requested-by-specific-applications/", "abstract": "A wireless end-user device has a wireless wide-area network (WWAN) modem. A network service activity control policy set has a policy element that associates multiple Internet activity access controls with at least one end-user application. One or more processors receive a first type of request from applications, to use the networking stack, and a second type of request from applications, to change the power control and/or network connection state of the WWAN modem. The processors determine whether to apply the Internet activity access controls to the first type of request and the second type of request. Accordingly, certain end-user applications can, when specified policy conditions apply, be prevented from consuming bandwidth by affecting the modem state, and can also be prevented from using the packet networking stack to communicate data, even when the modem state would allow such.", "owner": "Headwater Partners I LLC", "owner_city": "Redwood City", "owner_country": "US" }, { "title": "API validation system", "publication_date": "2015/26/08", "number": "09552237", "url": "/2015/08/26/api-validation-system2/", "abstract": "A system that validates an application programming interface (API) call is provided. A key and a value associated with the key are read from a test script containing a script. The key and the value are separated by a colon. The key is included in first double quotes, and the value is included in second double quotes. Whether the key matches a plurality of keys defined for an API call is determined. Based on the key matching the plurality of keys defined for the API call, the API call is configured using the key and the value without any of the colon, the first double quotes, or the second double quotes. The configured API call is executed.", "owner": "SAS Institute Inc.", "owner_city": "Cary", "owner_country": "US" }, { "title": "Mode switching user device", "publication_date": "2015/22/06", "number": "09474046", "url": "/2015/06/22/mode-switching-user-device/", "abstract": "Techniques for monitoring radio and network conditions to improve performance for a wireless device are described. A diagnostic monitoring module may receive diagnostic messages from a modem via a diagnostic interface at the wireless device. The module may process (e.g., parse) the diagnostic messages to obtain network status information indicative of the status of a radio network. The module may provide the network status information to an application for use to control communication with the radio network. The module may also process the diagnostic messages to obtain diagnostic information indicative of the performance of a radio connection or a data session or both for the wireless device. The module may send the diagnostic information to a network server for network monitoring, debugging, etc.", "owner": "QUALCOMM Incorporated", "owner_city": "San Diego", "owner_country": "US" }, { "title": "Restoring connectivity of a user device to an LTE network", "publication_date": "2015/18/05", "number": "09609558", "url": "/2015/05/18/restoring-connectivity-of-a-user-device-to-an-lte-network2/", "abstract": "User devices may search for cellular networks that provide the best available service, such as Long-Term Evolution (“LTE”) networks. If such a network is unavailable, the user device may connect to a different network, such as a Code Division Multiple Access 2000 1X network. When connected to the 1X network, the user device may not attempt to search for the LTE network unless the user device enters an idle mode, even if the LTE network becomes available while connected to the 1X network. Systems and/or methods, described herein, may “force” the user device into idle mode, while the user device is actively communicating via the 1X network, so that the user device may search for the LTE network. Forcing the user device into idle mode may include interrupting communications, which may include causing traffic, output by network applications of the user device, to not be transmitted from the user device.", "owner": "Verizon Patent and Licensing Inc.", "owner_city": "Basking Ridge", "owner_country": "US" }, { "title": "Transaction payment processing by multiple data centers", "publication_date": "2015/13/05", "number": "09436938", "url": "/2015/05/13/transaction-payment-processing-by-multiple-data-centers/", "abstract": "A payment service is configured to support purchase transactions generated by merchant point-of-sale (POS) devices, wherein each purchase transaction may comprise multiple transaction requests such as authorization requests and capture requests. Each transaction request may be sent to a different one of multiple data centers of the payment service. Upon successfully receiving an acknowledgement from one of the data centers for a transaction request, the POS device designates that data center as the primary data center. Subsequently, all transaction requests for that transaction identify the primary data center, even when the transaction requests are sent to other data centers. At the payment service, the data centers synchronize requests such that the primary data center is informed of all authorizations and is made responsible for performing the capture of the transaction. This allows the primary data center to detect duplicate authorizations and to prevent duplicate captures.", "owner": "Square, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "System and method for creating a development and operational platform for mobile applications", "publication_date": "2015/06/05", "number": "09274763", "url": "/2015/05/06/system-and-method-for-creating-a-development-and-operational-platform-for-mobile-applications/", "abstract": "The present invention provides a system and method for constructing a complete definition of a backend requirements model that can be automatically accessed and interpreted, and generated into a mobile consumable API for creation of, and use with, mobile applications. The mobile consumable API can be provided and made available to mobile app developers on a separate, stand-alone platform, and may act as an intermediary between the mobile app and the primary mainframe/enterprise/back end system. The method may include identification and definition of one or more of information providers, integration providers, and system behaviors, and creating a domain model. The domain model may be automatically codified into an API based solution as the app/mainframe interface, and stored on a development and operational platform for use.", "owner": "Clearblade, Inc.", "owner_city": "Austin", "owner_country": "US" }, { "title": "Generating and publishing applications for multiple platforms", "publication_date": "2015/04/05", "number": "09645814", "url": "/2015/05/04/generating-and-publishing-applications-for-multiple-platforms2/", "abstract": "Technologies are disclosed for generating and publishing multi-platform application binaries from hosted websites or website source code. A developer can provide source code for a website or a link to a hosted website and identify target platforms for which application binaries should be created. The website is then modified for optimized presentation on devices on the specified target platforms. For example, page layouts, menu styles, image resolutions, and other aspects of the website can be modified for presentation on a mobile device, a tablet, a set top box, or other type of device. Source code is then generated for the target platforms that includes a web view component for rendering the website. A cross-platform compilation service then compiles the source code to generate native applications for the target platforms. The generated applications can then be provided to the developer or automatically submitted to application stores associated with the target platforms.", "owner": "Amazon Technologies, Inc.", "owner_city": "Seattle", "owner_country": "US" }, { "title": "Centralized throttling service", "publication_date": "2015/01/05", "number": "09405597", "url": "/2015/05/01/centralized-throttling-service/", "abstract": "A method and system are provided that may centralize the management of applications that access the data of social networks via API calls. A central service may generate tokens at a generation rate that permit an application to access an API. The tokens may be distributed to queues associated with certain content types. The relative distribution of tokens to each queue may be determined by rules. A queue may release tokens to applications that function to access the content type associated with the queue. The token generation rate and rules may be selected to prevent violation of the rate limits for the API.", "owner": "SALESFORCE.COM, INC.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Social network honeypot", "publication_date": "2015/30/04", "number": "09509716", "url": "/2015/04/30/social-network-honeypot/", "abstract": "The invention is a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase of an Advanced Persistent Threat (APT). APTs are very sophisticated attacks and incorporate advanced methods for evading current security mechanisms. Therefore, the present invention uses an innovative social network honeypot.", "owner": "Deutsche Telekom AG", "owner_city": "Bonn", "owner_country": "DE" }, { "title": "Comparing applications and assessing differences", "publication_date": "2015/21/04", "number": "09563749", "url": "/2015/04/21/comparing-applications-and-assessing-differences2/", "abstract": "An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.", "owner": "LOOKOUT, INC.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Methods and systems for routing calls in a marketing campaign", "publication_date": "2015/07/04", "number": "09171322", "url": "/2015/04/07/methods-and-systems-for-routing-calls-in-a-marketing-campaign/", "abstract": "An online and offline communication processing and tracking system using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first customer prospect communication. A call quality rating is determined and recorded. A call from a caller directed to the phone address is received at a call bridging system coupled to at least one network, wherein the call is associated with call signaling information. Based at least in part on the call quality associated with the caller call, the caller call is routed to entity placing a bid on the caller call. An outbound call is generated from the call bridging system and the inbound and the outbound calls are bridged.", "owner": "INVOCA, INC.", "owner_city": "Santa Barbara", "owner_country": "US" }, { "title": "Executing commands within virtual machine instances", "publication_date": "2015/20/03", "number": "09582298", "url": "/2015/03/20/executing-commands-within-virtual-machine-instances2/", "abstract": "Technologies are disclosed herein for executing commands within virtual machine (“VM”) instances. A public web service application programming interface (“API”) is exposed within a service provider network that includes methods relating to the execution of commands within VM instances. For example, the API might include a method for obtaining a list of the commands that can be executed within a VM instance. The API might also include a method for requesting the execution of a command within a VM instance. The API might also include a method for requesting data describing the status of the execution of a command within a VM instance. The API might also expose other methods. A software agent executing on a VM instance may be utilized to provide a list of commands that can be executed in the VM, to execute requested commands, and to provide data describing the status of execution of a command.", "owner": "Amazon Technologies, Inc.", "owner_city": "Seattle", "owner_country": "US" }, { "title": "Real time lockdown", "publication_date": "2015/13/02", "number": "09230098", "url": "/2015/02/13/real-time-lockdown/", "abstract": "A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.", "owner": "Websense, Inc.", "owner_city": "San Diego", "owner_country": "US" }, { "title": "Network control of applications using application states", "publication_date": "2015/12/02", "number": "09253095", "url": "/2015/02/12/network-control-of-applications-using-application-states/", "abstract": "Application states of applications associated with a communication device can be network controlled. An application agent, associated with an application used by the communication device, controls transitioning the application between application states based on network indicators received or network events detected from a communication network. The application states include active state or doze state. An application management component associated with the communication network at least partially controls transitioning the application between application states to facilitate controlling network traffic or reducing network congestion. The application agent or application management component can map application states to various factors, including radio states, congestion level, application performance indicators, network policies, or user policies, to facilitate determining which application state to apply to an application at a given time. The application agent can be in a centralized location, or at a same or different location as the application source.", "owner": "AT&T MOBILITY II LLC", "owner_city": "Atlanta", "owner_country": "US" } ]