Follow us on Twitter
twitter icon@FreshPatents


Cloud patents

      

This page is updated frequently with new Cloud-related patent applications.

SALE: 1700+ Cloud-related patent PDFs



 Beacon network for identifying shopper locations and providing enhanced shopper services patent thumbnailBeacon network for identifying shopper locations and providing enhanced shopper services
A method for identifying shopper locations and providing enhanced shopper services is provided. The method includes transmitting a beacon having information identifying a printer, from the printer and detecting the beacon and the information identifying the printer, with a mobile device.
Seiko Epson Corporation


 System and  using an electronic lock with a smartphone patent thumbnailSystem and using an electronic lock with a smartphone
An electronic lock may transmit advertising that the electronic lock is available for communication. A smartphone may establish communication with the electronic lock in response to the advertising.
Schlage Lock Company Llc


 Online backup and restoration of television receiver storage and configuration data patent thumbnailOnline backup and restoration of television receiver storage and configuration data
Embodiments described herein provide various techniques for backing up and restoring data and programs at television receiver devices. In some embodiments, various types of data stored locally by television receiver devices may be backed up by uploading the data to a television provider server, cloud-based storage system, and/or other remote storage locations.
Echostar Technologies L.l.c.


 Acr buffering in the cloud patent thumbnailAcr buffering in the cloud
A network element of an internet protocol multimedia subsystem buffers network resource usage information in the cloud. After generating network resource usage information based on an observation of network resource usage, the network element transmits the network resource usage information to a cloud-based storage service for buffering.
At&t Intellectual Property I, L.p.


 Crowdsourcing-mode-based analysis  utilization of wireless network resources by mobile apps patent thumbnailCrowdsourcing-mode-based analysis utilization of wireless network resources by mobile apps
A crowdsourcing-mode-based analysis method for utilization of wireless network resources by mobile applications (apps) includes the following steps. Behavior characteristic data of each type of mobile app is collected by using a data collection tool, which is installed on a mobile client and based on a crowdsourcing technology and an analysis algorithm located on a cloud server, and using a machine learning algorithm targeted to the behavior characteristic data.
Nanjing Howso Technology Co., Ltd


 Managing multiple cloud stores through a web service patent thumbnailManaging multiple cloud stores through a web service
A service exposes a storage system-independent application programming interface (api) and receives a data request from an application over the api. The service transforms the storage system-independent data request into a storage system-specific data request and executes it against an identified cloud-based storage system.
Microsoft Technology Licensing, Llc


 External injection of cloud based network functions into network services patent thumbnailExternal injection of cloud based network functions into network services
Disclosed herein are system, method, and computer program product embodiments for providing an api description of an external network service and using the api to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (api), transmitting a call to the service provider using the api for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied..
Level 3 Communications, Llc


 Container runtime image management across the cloud patent thumbnailContainer runtime image management across the cloud
Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file.
Vmware, Inc.


 Data movement among distributed data centers patent thumbnailData movement among distributed data centers
Embodiments of the present disclosure provide a method and an apparatus for data movement among distributed data centers in a peer network. The method comprises: reducing an amount of data to be moved by pre-processing the data; generating a torrent file for the data; distributing the torrent file to a peer data center, and in response to receiving a data request from the peer data center, transmitting a segment of the data to the peer data center.
Emc Ip Holding Company Llc


 Method of and system for detecting spam activity in a cloud system patent thumbnailMethod of and system for detecting spam activity in a cloud system
There are provided a method and a system for detecting and blocking spam activity in a cloud system. The method can be executed at a server.
Yandex Llc


Method for streaming packet captures from network access devices to a cloud server over http

A system for streaming packet captures over the internet includes multiple network access devices, each operating as one of a gateway device, a wireless access point, and a network switch, and a management server communicatively coupled to the network access devices over the internet for managing the network access devices. The management server maintains a persistent hypertext transport protocol (http) connection with each of the network access devices over the internet.
Cisco Technology, Inc.

Systems and methods of enforcing multi-part policies on data-deficient transactions of cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

Method, apparatus and system for processing attack behavior of cloud application in cloud computing system

An apparatus for processing an attack behavior of a cloud application in a cloud computing system, including a policy manager configured to store a security determining rule and a malicious application processing rule, a security analyzer configured to receive application behavior data from a security detector, and send the application behavior data to a security processor when the cloud application running on the cloud host has an attack behavior, and the security processor is configured to invoke, according to the malicious application processing rule, an interface provided by a cloud controller in order to process the cloud application having an attack behavior. The apparatus performs security protection based on an application level of cloud computing, which can prevent mutual attack between different applications on a same host, and reduce impact on a normal application..
Huawei Technologies Co., Ltd.

Malicious http cookies detection and clustering

Techniques for malicious http cookies detection and clustering are disclosed. In some embodiments, a system, process, and/or computer program product for malicious http cookies detection and clustering includes receiving a sample at a cloud security service; extracting a cookie from network traffic associated with the sample; determining that the cookie is associated with malware; and generating a signature based on the cookie..
Palo Alto Networks, Inc.

Providing a virtual security appliance architecture to a virtual cloud infrastructure

A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine.
Mcafee, Inc.

Middle ware security layer for cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

System and providing a universal security handler for a cloud-based integration platform

In accordance with an embodiment, described herein is a system and method for providing a universal security handler for use with a cloud-based integration platform. A universal security configuration interface can be provided to capture custom values, syntaxes, and/or grammars for a common set of security properties for different implementations of a particular authorization flow.
Oracle International Corporation

Flow extension controller

Methods and apparatus, including computer program products, are provided for flow control. In one aspect, there is provided a method, wherein the method may include monitoring, by an external flow controller, a workflow at a first cloud application to determine whether at least one condition is satisfied to extend the workflow to a second cloud application external to the first cloud application; diverting, by the external flow controller, when the at least one condition is satisfied; handling, by the external flow controller, a request to divert the workflow to the second cloud application by at least formatting the request in accordance with configuration information at the external flow controller; sending, by the external flow controller, the workflow to the second cloud application; receiving, by the external flow controller, a result to incorporate into the workflow at the first cloud application; and/or proceeding with the workflow at the first cloud application..
Sap Se

Method and routing voice calls over voice over internet protocol networks

A method is provided for improving voice quality of voice over ip networks in which a highest-quality routing protocol is interposed between a local ip pbx exchange and a cloud-based internet service provider server to which calls are to be routed, wherein the highest-quality routing protocol detects the quality of the voice channel between the local ip pbx exchange and cloud-based internet service provider servers and routes voice calls to that cloud-based internet service provider server exhibiting the highest voice call quality, with the highest voice quality server connection determined by detecting lost packets and packet delay between the local ip pbx exchange and a server.. .
Unified Office, Inc.

Method and routing voice calls over voice over internet protocol networks

A method is provided for improving voice quality of voice over ip networks in which a highest-quality routing protocol is interposed between a local ip pbx exchange and a cloud-based internet service provider server to which calls are to be routed, wherein the highest-quality routing protocol detects the quality of the voice channel between the local ip pbx exchange and cloud-based internet service provider servers and routes voice calls to that cloud-based internet service provider server exhibiting the highest voice call quality, with the highest voice quality server connection determined by detecting lost packets and packet delay between the local ip pbx exchange and a server.. .
Unified Office

System for support in the event of intermittent connectivity, a corresponding local device and a corresponding cloud computing platform

A system wherein a request can be processed both in a cloud service and autonomously or locally via a client, and a monitoring of the network quality, for example, the presence of delay, is carried out, and wherein, depending on the current accessibility of the cloud platform, optionally a local alternative calculation is carried out, which may be slower or, for example in the event of real-time requirements, is of a lower quality than the corresponding cloud service, and the result thereof is then temporarily used alternatively by the client is provided. In this way, cloud services can be locally buffered, thereby cushioning connection interruptions between end device and cloud platform, whereby cloud services can be used in a transparent manner for the user and, even in the event of connection interruptions..
Siemens Aktiengesellschaft Ü

Local consumption of remote services

An approach for providing simulated remote services locally. A local virtual access module collects remote services for local virtual service access.
International Business Machines Corporation

Systems and methods for management of cloud computing resources for information systems

The system and methods described herein provide for dynamic provisioning of computing resources for an enterprise resource planning system. The dynamic provisioning system provisions an original configuration of computing resources upon selection from a client device, and then provides for further dynamic provisioning by evaluating the real-time performance of the erp system or by analyzing historical performance and consumption information of the erp system or by using a combination to predict the anticipated stress on the computing resources placed by future performance of the erp system..
Velocity Technology Solutions, Inc.

Method for generating an ordered point cloud using mobile scanning data

Methods for generating a set of ordered point clouds using mobile scanning device are presented, the methods including: causing the mobile scanning device to perform a walkthrough scan of an interior building space; storing data scanned during the walkthrough; creating a 3-dimensional (3d) mesh from the scanned data; and creating the set of ordered point clouds aligned to the 3d mesh. In some embodiments, the mobile scanning device captures one or more of the following: a number of images from a number of camera positions, pose and orientation information associated with each of the number of images captured, and magnetic data information associated with each of the number of images captured.
Indoor Reality

Point cloud data hierarchy

One embodiment is directed to a system for presenting views of a very large point data set, comprising: a storage system comprising data representing a point cloud comprising a very large number of associated points; a controller operatively coupled to the storage cluster and configured to automatically and deterministically organize the point data into an octree hierarchy of data sectors, each of which is representative of one or more of the points at a given octree mesh resolution; and a user interface through which a user may select a viewing perspective origin and vector, which may be utilized to command the controller to assemble an image based at least in part upon the selected origin and vector, the image comprising a plurality of data sectors pulled from the octree hierarchy.. .
Willow Garage, Inc.

System and using image data to determine a direction of an actor

Example systems and methods are disclosed for determining the direction of an actor based on image data and sensors in an environment. The method may include receiving point cloud data for an actor at a location within the environment.
Google Inc.

Source control response system and process therefor

A source control response system in which tasks in an event are provided to several persons involved in a response to the event has a plurality of tablet computers provide respectively to the persons involved in the response. Each of the tablet computers is adapted to display a position-specific checklist, incident data and resources.
Trendsetter Engineering, Inc.

Cloud service rating

According to an example, to provide cloud service ratings, a service type is monitored on a first and second cloud service by capturing on a network interface at least one resource utilization feed and at least one connection feed. Infrastructure-level metrics and application-level metrics for the service type on the first and second cloud services are determined based on the monitoring of the first and second cloud services.
Hewlett Packard Enterprise Development Lp

Mobile application and two-way financial interaction solution with personalized alerts and notifications

A platform, a method and a cloud data interaction product with customized alerts, fraud alerts,notifications, services, promotions and communication between financial institutions and their clients. The invention is a solution that allows the user to integrate information from several financial institutions, through all channels and for all financial products such as credit and debit cards, checking accounts, savings accounts, insurance policies, loans, investments and others.
Appriz Incorporated

Configuration of equipment with retailer and geolocation information

A method for registering a printer to a cloud service is provided. The method includes coupling a mobile device to a printer, via a wireless connection and sending at least a serial number from the printer to the mobile device via the wireless connection.
Seiko Epson Corporation

Data encryption in a multi-tenant cloud environment

Various embodiments of systems, computer program products, and methods for encrypting data in a multi-tenant cloud environment are described herein. In an aspect, an encryption time frame to encrypt data associated with a user in a multi-tenant cloud environment may be retrieved.
Sap Se

Cloud key escrow system

Embodiments are directed to storing encrypted data in a data store and to securely providing access to the encrypted data according to a predefined policy. A data storage system receives encrypted data.
Microsoft Technology Licensing, Llc

Cookies watermarking in malware analysis

Techniques for cookies watermarking in malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for cookies watermarking in malware analysis includes receiving a sample at a cloud security service; detonating the sample in an instrumented virtual environment; and determining that the sample is malware based on detecting an attempt to access a watermark cookie during an automated malware analysis using the instrumented virtual environment..
Palo Alto Networks, Inc.

Systems and methods for secure storage of user information in a user profile

Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of information disclosed during a security breach. Information pertaining to a user is obtained from one or more sources and organized into a user profile and securely stored in a database.
Fhoosh, Inc.

Master data management for a cloud computing system

Some embodiments provide a program that receives, from a first system, a copy of master data. The program also receives a master data modification rule.
Sap Se

Management server and file managing method

A management server and method thereof is provided. The management server includes a storage configured to store user account information correspondingly associated with a plurality of cloud servers, a communicator configured to receive file information of a user file stored any one or more of the plurality of cloud servers using the stored user account information correspondingly associated with the plurality of cloud servers, and a processor configured to generate a file list including the user file based on the received file information..
Samsung Electronics Co., Ltd.

Debugging applications

A method, executed by a computer, for debugging a cloud application includes establishing an http connection with a remote server, sending an http request with a request for state information for a program executing on the remote server, and receiving, from a cloud container, state information in an http response. A computer program product and computer system corresponding to the above method are also disclosed herein..
International Business Machines Corporation

Virtual server cloud file system for virtual machine backup from cloud operations

Uploads of restored virtual machine (“vm”) data to cloud storage, e.g., vm restore-to-cloud operations, are performed without having to write whole restored virtual disk files to a proxy server before the virtual disk data begins uploading to cloud. Restored data blocks from a backup source are locally cached, staged for efficiency, and asynchronously uploaded to the cloud page-by-page without tapping mass storage resources on the proxy.
Commvault Systems, Inc.

Manifest-based snapshots in distributed computing environments

Scalable architectures, systems, and services are provided herein for creating manifest-based snapshots in distributed computing environments. In some embodiments, responsive to receiving a request to create a snapshot of a data object, a master node identifies multiple slave nodes on which a data object is stored in the cloud-computing platform and creates a snapshot manifest representing the snapshot of the data object.
Cloudera, Inc.

Virtual server cloud file system for virtual machine restore to cloud operations

Uploads of restored virtual machine (“vm”) data to cloud storage, e.g., vm restore-to-cloud operations, are performed without having to write whole restored virtual disk files to a proxy server before the virtual disk data begins uploading to cloud. Restored data blocks from a backup source are locally cached, staged for efficiency, and asynchronously uploaded to the cloud page-by-page without tapping mass storage resources on the proxy.
Commvault Systems, Inc.

Backup, archive and disaster recovery solution with distributed storage over multiple clouds

This invention is a software application utilizing distributed storage systems to provide backup, archive and disaster recovery (bcadr) functionality across multiple clouds. The multi-cloud aware bcadr application and distributed storage systems are utilized together to prevent data lost and to provide high availability in disastrous incidents.

System and methods for preventing interruptions due to battery drain during streaming media sessions between devices

A cloud server intermediates in a streaming media session from a source to a receiving device for a media content. Upon determining that time remaining to complete the streaming media session for the media content is greater than time of remaining battery power for the source, the cloud server redirects the streaming media session to the receiving device.
Google Technology Holdings Llc

Photogrammetric soil density system and method

The present invention is an apparatus which executes a photogrammetry method for calculating soil density. After a user excavates soil, measures the mass of the excavated soil and takes multiple images of the excavation site in combination with a calibration object, a data processor uses the various values obtained from the collected images to create a point cloud data object.
United States Of America As Represented By The Secretary Of The Army

Autonomous unmanned aerial system for man overboard recovery

A man overboard recovery system for use on a vessel includes one or more unmanned aerial systems configured to autonomously locate and engage a man overboard using onboard sensing equipment. Unmanned aerial system launch, recovery, health and status monitoring, and integration with existing systems is facilitated by a ground station(s) located on the vessel, in the cloud, at a remote monitoring center, or any combination of these.

Systems and methods for integrated automated sports data collection and analytics platform

Systems and methods for integrated automated sports data collection and analytics are disclosed. Different types of data, for example but not limited, location data, movement data, impact data and biometric data for individual players are collected via wearable sensors in real time during a sports activity and transmitted to a cloud-based platform together with other sports data, including video, timing, scoring, statistics, and events with time code.
Sportsmedia Technology Corporation

Server apparatus providing portable information terminal and image forming apparatus with cloud image processing service

An image forming apparatus 176 capable of easy log-in to a desired cloud service includes a print engine communicable with a cloud server 170 for printing a print job received from cloud server 170, a reader/writer 174 capable of proximity communication with a portable terminal 172, and a log-in executing device receiving log-in information to cloud server 170 from portable terminal 172 through reader/writer 174, for executing the log-in process to cloud server 170 using the log-in information.. .
Sharp Kabushiki Kaisha

Intuitive computing methods and systems

A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera.
Digimarc Corporation

Apparatus, container based service deployment

Embodiments disclosed facilitate distributed orchestration and deployment of a single instance of a distributed computing application over a plurality of clouds and container clusters, including container clusters provided through a container as a service (caas) offering. In some embodiments, system and pattern constructs associated with a hybrid distributed multi-tier application may be used to obtain an infrastructure independent representation of the distributed multi-tier application.
Cliqr Technologies Inc.

Optimization of integration flows in cloud environments

An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors.
International Business Machines Corporation

Systems and methods for cloud-based agricultural data processing and management

A cloud-based system for integration of agricultural data with geolocation-based agricultural operations is provided. The system receives agricultural-related data associated with a given geographic area and transforms the received data into an analysis-ready format.
Agverdict, Inc.

Saas network-based backup system

A system fetches consistent datasets in batches for a given period of time and provides the ability to retrieve each batch. Batches of data may be fetched for an interval of time.
Dell Products L.p.

Method and system to dynamically enable sdn network learning capability in a user-defined cloud network

A software defined network controller for controlling a radio access network has a leaning capability by which usage characteristics are learned for each service provided by the radio access network. For example, bandwidth data, connection duration data and latency data may be used to learn usage characteristics for each radio access network service.
At&t Intellectual Property I, L.p.

Data defined infrastructure

A system for managing the operation of different components within a cloud system to accomplish various tasks, including the implementation of build features within the cloud system to achieve specific operational goals. The system may include a data defined infrastructure (ddi) tool installed within a data defined infrastructure (ddi) to manage certain features or tasks within the cloud system.
Accenture Global Solutions Limited

Cloud storage using merkle trees

Efficient cloud storage systems, methods, and media are provided herein. Exemplary methods may include locating a merkle tree of a stored object on a deduplicating block store, comparing an object at a source location to the merkle tree of the stored object, determining changed blocks for the object at a source location, and transmitting a message across a network to the deduplicating block store, the message including the change blocks and merkle nodes that correspond to the change blocks..
Axcient, Inc.

Method for detecting the status of a home automation device

This invention discloses a method of using a cloud server to remotely detect the status of a home automation gateway of a home security and automation network. According to this invention, the home automation gateway of the home security and automation network periodically sends heartbeat packets to a cloud server.
Wireless Input Technology, Inc.

Information security realizing method and system based on digital certificate

A digital certificate based information security realization method and system are provided. The method includes: separately issuing a digital certificate for a cloud management host, a physical cloud computing host and a virtual cloud computing machine; and carrying out a compliance authentication according to a corresponding digital certificate when the cloud management host, the physical cloud computing host and the virtual cloud computing machine start up or are in the running process.
Zte Corporation

Encrypted password transport across untrusted cloud network

A computer in an untrusted cloud network functions as a cloud-based enterprise application store via which a client computer (client) establishes a connection to an enterprise application in a trusted enterprise network. User authentications are performed in both a login phase and subsequent application launch phase, each authentication receiving from the client and transmitting to the enterprise network an encrypted password and encrypted key, the encrypted password being a user password encrypted under a first one-use symmetric key, the encrypted key being the first symmetric key encrypted under a public key of a private/public key pair of the enterprise network.
Citrix Systems, Inc.

System and implementing adaptive pulse position modulation (appm) for improved optical communications performance

The adaptable pulse position modulation (appm) optical communication system and process facilitate wireless communications through turbid mediums including, but not limited to, smoke, airborne dust, mist, fog, clouds, water, seawater and water-to-air (air-to-water) interfaces by controlling the signal gain at the optical detector and controlling of the signal encoding to allow high data rate operation when the signal to noise ratio is high. The system also supports signal encoding redundancy to maintain good connectivity at the cost of the communication channel data rate as the signal to noise degrades..
Leidos, Inc.

Device and system for controlling secure key access using an internet-connected key box device

A system for controlling key access using a phone and internet-connected key box device. The key box device hangs or mounts on a fixture and controls key access to visitors.

System and storing a digital receipt on a cloud for allowing a vendor to reward a purchaser for obtaining the digital receipt

A system and method for storing a digital receipt on a cloud for allowing a vendor to reward a purchaser for obtaining the digital receipt. The vendor and purchaser complete a transaction.

Business to consumer enterprise software system

A business to consumer enterprise software system having a computer having a memory and a processor and non-transitory computer-readable instructions stored in the memory when executed by the processor provides a service cloud, a marketing cloud, a customer acquisition cloud, and a community cloud.. .
Mcnabb Technologies, Llc

Authentication system and method

Described herein is a system for utilizing an embedded nfc chip in a rubber stamp for authenticating and verifying documents through a 2fa process that is connected to a cloud platform comprising a secure element operably connected to the nfc baseband; and a unique authentication id stored in the secured element.. .
Vertical Software Asia Pte Ltd

Using cloud-based data for industrial simulation

A cloud-based simulation generation service collects industrial data from multiple industrial customers for storage and analysis on a cloud platform. The service employs a simulation generator component that analyzes data to facilitate generating a simulation model that simulates an industrial automation system, including simulating or emulating industrial devices, industrial processes, other industrial assets, or network-related assets or devices, and their respective interrelationships with each other.
Rockwell Automation Technologies, Inc.

Blending enterprise content and web results

Web search results and enterprise search results are combined into a single presentation. A search query is received from a user associated with a tenant of an enterprise cloud computing platform.
Microsoft Technology Licensing, Llc

Using principles of natural selection to optimize a cloud-computing genome

A method and associated systems for optimizing a computing platform. A processor joins sets of configurable parameters into groups that each identifies a configuration of the computing environment or of a component or subsystem of the computing environment.
International Business Machines Corporation

Interactive dynamic cloud navigation system

An interactive dynamic cloud navigation system includes: a server, including a database, wherein the database stores a map, a management account and a plurality of accounts; a plurality of navigation terminal and a plurality of users corresponding to the navigation terminals; and a map operator which logs in the management account on the server to manage the database. The navigation terminal includes a data collection module, a data storage module, a data transmission module, and an input and output module, wherein: the data collection module is for collecting data; the data transmission module is for transmitting the data between the navigation terminal and the server; the data storage module is for storing the data; and the input and output module is for receiving an input of the user and outputting the data stored in the navigation terminal to the user.

A cutting machine for resizing raw implants during surgery

Provided is a method for forming an implant with an autonomous manufacturing device. The method includes accessing a first computer-readable reconstruction of a being's anatomy; accessing a second computer-readable reconstruction of an implant; accessing a third computer-readable reconstruction comprising the first computer-readable reconstruction superimposed with the second computer readable reconstruction; generating at least one computer-readable trace from a point cloud; and forming an implant with an autonomous manufacturing device, wherein the autonomous manufacturing device forms the implant into a shape defined by at least one dimension of the computer-readable trace..
The Johns Hopkins University

Method for cooperating between smart devices and cloud server thereof

Provided are a method for cooperating between smart devices, which includes: identifying, by a cloud server, a wireless access device accessed by the first smart device and registering the first smart device as an access group corresponding to the corresponding wireless access device; receiving, by the cloud server, event occurrence information from a second smart device; determining, by the cloud server, a type of an event, an event occurrence time, and an event occurrence point as the event occurrence information; determining, by the cloud server, a group member associated with the event occurrence time and the event occurrence point among group members of the registered access group as a event group member; determining, by the cloud server, required information depending on the type of the event and requesting the required information corresponding to the event occurrence time to the event group member; and acquiring and storing, by the cloud server, the required information from the event group member, and a cloud server thereof.. .
Kumoh National Institute Of Technology Industry-academic Cooperation Foundation

System and aggregating and displaying media from multiple cloud services

A computer implemented system and process for aggregating files from multiple cloud servers provides into one or more seamless virtual directories. File types can be combined to create unique multimedia shows, with added special effects and transitions.
Dermot Obrien Apps, Llc

Codebook generation for cloud-based video applications

Techniques are disclosed for the improvement of vector quantization (vq) codebook generation. The improved codebooks may be used for compression in cloud-based video applications.
Adobe Systems Incorporated

Method and system for exchanging data between users of a vehicle

This disclosure relates to a method and system for exchanging data between users of a vehicle, including a main user equipped with a first personal electronic device and a secondary user equipped with a second personal electronic device. The method includes a preparatory phase and a transmission phase, which comprise the following steps: the application installed on the first personal electronic device sends data to a remote server including the second email address of the secondary user and instructions for the transfer of information regarding the vehicle; the remote server sends data to an information cloud including the mobile identifier assigned to the application installed on the second device and information regarding the vehicle, and the cloud sends information regarding the vehicle to the application installed on the second personal electronic device..
Dura Automotive Systems Sas

Cloud storage accelerator

Systems and methods are disclosed for accelerating the delivery of a data file. The data file may be uploaded to a content accelerator connected to a local area network.
Seagate Technology Llc

Secure migration of virtual machines from source to target and transfer of vm descriptor and keys between physical servers

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Method and apparatuses for enabling routing of data packets between a wireless device and a service provider based in the local service cloud

There is provided a method for constructing a traffic filter enabling routing of data between a wireless device and a local service cloud, lsc, based service provider and a corresponding system, computer program and computer program carrier. There is also provided a method for enabling routing of data packets between a wireless device in a cellular communication network and a local service cloud, lsc, based service provider, a method for routing data packets between a wireless device in a cellular communication network and a local service cloud, lsc, based service provider and corresponding network nodes..
Telefonaktiebolaget Lm Ericsson (publ)

Network node and handling a traffic flow related to a local service cloud

A method in a network node for handling a traffic flow of a user equipment, ue is provided. The network node is related to a local service cloud.
Telefonaktiebolaget Lm Ericsson (publ)

Custom share sheet with shortcut controls to share a content item

Techniques are described herein to generate a custom share sheet. The custom share sheet comprises one or more shortcut controls to share a content item using one or more corresponding contact-avenue pairs.
Dropbox, Inc.

Reallocating resource capacity among resource pools in a cloud computing environment

In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments.
International Business Machines Corporation

Control of communication using service function chaining

An apparatus including at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to acquire data indicating at least one available external service function or at least one external service function chain via a predetermined interface, to decide whether at least one of the indicated at least one external service function or at least one external service function chain is usable in a communication of a service data flow in the communication network, to select at least one from the indicated at least one external service function or at least one external service function chain for use on the basis of the decision whether at least one of the advertised at least one external service function or external service function chain is usable in a communication of a service data flow, and to provide, to an external service function providing side, information related to an intended usage of at least one external service function or at least one external service function chain in a service data flow communicated in a communication network. Implements service function chaining and cloud bursting..
Nokia Solutions And Networks Oy

System, providing improved performance of aggregated/bonded network connections with multiprotocol label switching

A network system, method, and device are provided for improving network communication performance between at least a first client site and a second client site, where the first client site and the second client site are at a distance from one another that is such that would usually require long haul network communication. The network system includes at least one network bonding/aggregation computer system for bonding or aggregating one or more diverse network connections so as to configure a bonded/aggregated connection that has increased throughput; and at least one network server component, configured to interoperate with the client site network component, the network server component including a server/concentrator or a cloud concentrator element that is implemented at an access point to an multiple protocol label switching network..
Teloip Inc.

System and a cloud service provider tracer

A method and apparatus of a device that measures performance of a plurality of cloud service providers is described. In an exemplary embodiment, the device deploys a plurality of cloud agents to the plurality of cloud service providers.
Arista Networks, Inc.

Policies for analytics frameworks in telecommunication clouds

It is disclosed a network node (200,220, 300, 400, 500, 600, 80) and a method for executing an analytics task. The network node is adapted to reside in a telecommunication network, and to be supported by a distributed cloud infrastructure.
Telefonaktiebolaget L M Errisson (publ)

Granular permission assignment

A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user..
Red Hat, Inc.

Data decision method, apparatus and system

A data decision method, apparatus and system relate to the field of communications technologies, where they accurately and effectively analyze information included in fragmented data. The method includes obtaining, by a data decision apparatus, analysis conditions for data analysis, reporting, by the data decision apparatus, the analysis conditions to a cloud server such that the cloud server determines, according to the analysis conditions, a first data type that the data decision apparatus can process, obtaining, by the data decision apparatus, first data satisfying the first data type, where the first data is perception data generated by a human body device, performing, by the data decision apparatus, data analysis and data decision on the first data, and generating first decision data, where the first decision data is decision information of a data characteristic reflected for the first data..
Huawei Technologies Co., Ltd.

Integration platform of internet of things

An integration platform of internet of things is provided. An integration platform of internet of things comprises a master apparatus, at least one first iot object and a vendor-side server.

Cloud-based control for power distribution system

Unique systems, methods, techniques and apparatuses for cloud-based control for power distribution systems are disclosed. One exemplary embodiment is a system comprising a microprocessor-based power management system in operative communication with a plurality of buildings located remotely from the power management system and a plurality of communication interface devices provided at corresponding ones of the plurality of buildings.
Abb Schweiz Ag

Unattended physical delivery access method and control system

An unattended physical delivery access control system includes a wireless mobile agent which journeys from supply originations to unattended delivery destinations through one or more waypoints. In the vicinity of waypoints specified in an itinerary, the agent transacts tokens which are verified by a cloud server or within the agent.

System and 3d modeling and virtual fitting of 3d objects

Method and system of virtual fitting a foot with a shoe by obtaining a first and second 3d model associated with the surface of the foot and interior cavity of the shoe, respectively, each 3d model comprising a point cloud; aligning the point clouds such that the heel extreme point of the two point clouds align and the ankle back extreme point of the first point cloud aligns with the top back point of the second point cloud; calculating for at least one point p in the first point cloud a value of at least one fit indicator determined based on a distance between p and a corresponding point q in the aligned second point cloud; and outputting, to a display device, a graphical representation of the first 3d model colored in accordance with the fit calculated at p.. .
Fitfully Ltd.

System and communicating with retail customers with a sustainability standard

A cloud computing system and method for communicating product and source information with retail customers with a sustainability standard is disclosed. The system may include a server system with a processor system, a communications interface, a communications system, an input system and an output system, the server system having access to a communications network, a memory system with an operating system, a communications module, a web browser module, a web server application which communicates product and source information with retail customers with a sustainability standard using non-transitory storage media and a website with a plurality of web pages to track and communicate product and source information with retail customers with a sustainability standard..

Engine, system and providing automated risk mitigation

The present invention provides an engine, system and method for providing normalized communications and data access between alternative platform systems and devices having access to the present invention. Such normalization may allow for the adaptation and development of applications and cloud-based services for interchangeable use between third parties client devices.

Systems and methods for controlling the distribution and viewing of digital art and imaging via the internet

System and method for storing digital content for display on a display device, comprising at least one digital content item, configured to be displayed on the display device, and a service cloud comprising a secure storage system, configured to store digital content, a communication controller, configured to communicate with the display device, a provisioning engine, configured to control the provisioning of digital content on the display device, a service management system, configured to collect data reflecting operational status of the display device, a server, configured to interface with an application running on a computer with memory and processor for selection and control of digital content for display, an ingestion engine, configured to control importation of digital content, an external content gateway, configured to transfer digital content from outside the service cloud to the display device, and a live data feed gateway, configured to provide over-the-top content to the display devices.. .
Videri Inc.

Isolating data for analysis to avoid malicious attacks

Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment.
Cylance Inc.

Methods and sharing, transferring and removing previously owned digital media

The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (dmo) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors..
Redigi, Inc.

Operating room black-box device, system, method and computer readable medium

A multi-channel recorder/encoder for collecting, integrating, synchronizing and recording medical or surgical data received as independent live ware units. The medical or surgical data relating to a live or real-time medical procedure.
Surgical Safety Technologies Inc.

Method for sharing patient pregnancy data during ultrasound

A method for sharing patient pregnancy data during ultrasound examination, including: capturing relevant pregnancy data by means of an ultrasound machine by the doctor/sonographer without exam interruption; storing pregnant relevant data captured/collected from the pregnant into a local machine; and transmitting the compressed relevant data sent by the local machine to the cloud service, assigned with a unique patient identification; and allowing access of the smart device to a cloud service assigned with a unique patient identification through a web service.. .
Samsung EletrÔnica Da AmazÔnia Ltda.

Modeling point cloud data using hierarchies of gaussian mixture models

A method, computer readable medium, and system are disclosed for generating a gaussian mixture model hierarchy. The method includes the steps of receiving point cloud data defining a plurality of points; defining a gaussian mixture model (gmm) hierarchy that includes a number of mixels, each mixel encoding parameters for a probabilistic occupancy map; and adjusting the parameters for one or more probabilistic occupancy maps based on the point cloud data utilizing a number of iterations of an expectation-maximum (em) algorithm..
Nvidia Corporation

Method and browser plugin for creation of objects in a cloud-based object management system

Computer implemented methods and systems are provided that utilize a plugin to allow for quick creation of objects in a cloud-based object management system. The plugin interfaces with a browser application that interacts with the cloud-based object management system.
Salesforce.com, Inc.

Techniques to manage a remote data store for an electronic device

A remote data storage system for providing one or more mobile devices with a remote data store. The system may include a cloud platform with a storage management application and a data store.
Netapp, Inc.

A method, cloud synchronization function means and file system for handling files and directories in a cloud storage service

The present invention relates to a method and a cloud synchronization function means (118) of a user device (100) for handling files and directories in a cloud storage service, the user device comprises a processing unit (110) adapted to perform: receiving (s110) a notification from a file system (116) of the user device that one or more files in the file system have been cloud tagged by a user of the user device to be synchronized with the cloud storage service; retrieving (s120) the cloud tagged file or files from the file system; sending (s130) the cloud tagged file or files to the cloud storage service.. .
Telefonaktiebolaget Lm Ericsson (publ)

Public personalized mobile health sensing system,

The claimed invention relates to an enhanced mobile health detection and monitoring system utilizing non-invasive saliva screening of real-time health metrics coupled with remote deep analysis of body characteristics. Health information is derived from a combination of local chemical markers which are optically collected, locally reported and broadcast over a ‘cloud based’ internet data distribution system.
Enano Health Limited

Mobile automated health sensing system,

The claimed invention relates to mobile computing monitoring of health statistics using chemically synthesized conjugate markers providing highly specific details of personal health states. Using portable computing and communications devices, commonly known as ‘smartphones’, personal health and wellness information is gathered from chemical markers and reported to the user.
Enano Health Limited

System, method, and setting device geolocation via location proxies

The present invention relates to wireless networks and more specifically directed to device location confirmation based on a geolocation proxy. One embodiment includes an exemplary device location confirmation component configured to implement a device location confirmation algorithm using a cloud database configured to comprise device information including location information from the geolocation proxy.
Network Performance Research Group Llc

Light device has built-in digital data system for record image, sound

A led light device having built-in camera unit is powered by ac or-and dc power source for a lamp-holder, led bulb, flashlight, garden, entrance door light or other led light device connected to power source by (1) prongs or (2) male-base has conductive wires can be inserted into a female-socket which connect with power source or (3) wired. The device has built-in camera unit has plurality functions to make different products and functions.

Apparatus, system and method to provide iot cloud backend service

A system is configured to provide an iot device with access to cloud resources. The system includes a backend system configured to provide at least one service selected from a group consisting of: data management, file management, user management, and device management.
Wuhan Mbaas Computing Co., Ltd.

Hub-and-spoke connection architecture

A system, may include a private cloud network operated by an operator for a client. The private cloud network may be connected to a public cloud network that operates a web platform and a plurality of groups of gateway devices.
Accenture Global Solutions Limited

Peripheral device implementation system and associated methods

An example peripheral device implementation system and associated methods are described. The example peripheral device implementation system includes a central database, a peripheral service including a peripheral service interface, a communication platform, non-transitory computer-readable medium, and a processing device.
Wal-mart Stores, Inc.

Network transmitting data in a network system

A network system, and a method of use thereof, includes a first network subscriber arranged in an automation network of an automation system, a second network subscriber having a cloud computing infrastructure, and a communication unit for transmitting acquired data from the first network subscriber to the second network subscriber. The communication unit includes a first interface, which is configured as an input/output module and connected to the first network subscriber, and a second interface, which is configured as an agent and connected to the second network subscriber..
Siemens Aktiengesellschaft

Cloud storage methods and systems

A programmer input in a programming language is received, where the programmer input includes i) a built-in function of a computational application corresponding to retrieving data from electronic storage objects, and ii) a first parameter specifying the electronic storage object from which data is to be retrieved. The computational application evaluates the programmer input to generate one or more messages corresponding to requests for a server to retrieve data from the electronic storage object.
Wolfram Research, Inc.

Hot swapping and hot scaling containers

Techniques for hot swapping and hot scaling containers between cloud services are disclosed. In one example, a method includes storing, with a cloud exchange, data indicating an association of a first container of a first private network with a second container of a second private network, wherein the first private network and the second private network are coupled to the cloud exchange to send and receive data packets via the cloud exchange.
Equinix, Inc.

Scalable network function virtualization

A scalable virtualized network core is provided to allow for incrementally adjusting network resources in response to changing demand, and for improved flexibility in network management and control. The scalable virtualized network core provides a cloud evolved packet core that has virtual machines performing the functions of the individual server elements.
At&t Intellectual Property I, L.p.

Just-in-time access based on screening criteria to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes screening criteria limiting automatic granting of jit access to devops personnel who meeting the screening criteria.
Microsoft Technology Licensing, Llc

Distributed detection of malicious cloud actors

Examples relate to distributed detection of malicious cloud actors. In some examples, outgoing cloud packets from the cloud server are intercepted and processed to determine if a preliminary threshold is exceeded, where the outgoing cloud packets are used to identify a customer.
Hewlett Packard Enterprise Development Lp

Just-in-time access based on geolocation to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes geolocation criteria limiting the geolocation from which jit access can be automatically granted.
Microsoft Technology Licensing, Llc

Customer call logging data privacy in cloud infrastructure

Systems and methods are provided for encrypting data at a customer for storage at a hosted service provider. In addition to the data being encrypted by the client, the secret encryption key used to encrypt the data is also encrypted.
Cloud9 Technologies, Llc

Firewall port access rule generation

A method includes generating firewall port access rules between a first cloud system a second cloud system for each tenant of a plurality of tenants. A unique ip address range is generated for each tenant.
Hewlett Packard Enterprise Development Lp

Declarative and extensible model for provisioning of cloud based services

A method for offering a set of services is disclosed. The method may comprise storing, by a cloud infrastructure system, subscription order information identifying a service from a set of services provided by the cloud infrastructure system, the cloud infrastructure system comprising one or more computing devices.
Oracle International Corporation

Customized cloud service

Some examples described herein relate to providing a customized cloud service. In an example, key service indicators (ksi) may be received for a cloud service.
Hewlett Packard Enterprise Development Lp

System and providing configuration settings to services in a cloud infrastructure

Computer systems and methods are provided for storing configuration settings for services that are provided in a cloud infrastructure in a central database, and providing values for those configuration settings to services in the cloud infrastructure when those services request a configuration setting.. .
Salesforce.com, Inc.

System for connecting and controlling multiple devices

The present invention provides a platform that enables devices, services and applications to be connected together. An in-home gateway device provides the hub for this connectivity, by connecting and coordinating in-home (and/or in-office) devices and cloud-based services.
Centrica Connected Home Limited

Container-based cloud exchange disaster recovery

In general, this disclosure describes techniques for coordinating, with a cloud exchange, automated cloud-based disaster recovery across containers from a failed cloud service to a backup cloud service. In some examples, an orchestration engine for a cloud exchange is configured to: detect an indication of a disruption in a first cloud service provided by a first cloud service provider network coupled to the cloud exchange to send and receive data packets via the cloud exchange; provision, in response to detecting the indication of the disruption in the first cloud service, disaster recovery infrastructure layers in containers of a second cloud service provided by a second cloud service provider network coupled to the cloud exchange; obtain code and state from containers of the first cloud service; and communicate the code and state to the disaster recovery infrastructure layers in the containers of the second cloud service..
Equinix, Inc.

Method and system for protecting and sharing digital data between users in a network

Scalable method and system for secure sharing of encrypted information in a cloud system, the encrypted information being encrypted only once, and each user joining and accessing a shared folder by individual encrypted key material transferred.. .

Context-based smartphone sensor logic

Methods employ sensors in portable devices (e.g., smartphones) both to sense content information (e.g., audio and imagery) and context information. Device processing is desirably dependent on both.
Digimarc Corporation

Systems and methods for controlling the distribution and viewing of digital art and imaging via the internet

System and method for storing digital content for display on a display device, comprising at least one digital content item, configured to be displayed on the display device, and a service cloud comprising a secure storage system, configured to store digital content, a communication controller, configured to communicate with the display device, a provisioning engine, configured to control the provisioning of digital content on the display device, a service management system, configured to collect data reflecting operational status of the display device, a server, configured to interface with an application running on a computer with memory and processor for selection and control of digital content for display, an ingestion engine, configured to control importation of digital content, an external content gateway, configured to transfer digital content from outside the service cloud to the display device, and a live data feed gateway, configured to provide over-the-top content to the display devices.. .
Videri Inc.

Systems and methods for deriving spatial attributes for imaged objects utilizing three-dimensional information

Various embodiments are directed to deriving spatial attributes for imaged objects utilizing three-dimensional (3d) information. A server may obtain 3d survey data about an object from a pre-existing source.
Quantum Spatial

Systems and methods for controlling the distribution and viewing of digital art and imaging via the internet

System and method for storing digital content for display on a display device, comprising at least one digital content item, configured to be displayed on the display device, and a service cloud comprising a secure storage system, configured to store digital content, a communication controller, configured to communicate with the display device, a provisioning engine, configured to control the provisioning of digital content on the display device, a service management system, configured to collect data reflecting operational status of the display device, a server, configured to interface with an application running on a computer with memory and processor for selection and control of digital content for display, an ingestion engine, configured to control importation of digital content, an external content gateway, configured to transfer digital content from outside the service cloud to the display device, and a live data feed gateway, configured to provide over-the-top content to the display devices.. .
Videri Inc.

Billing consumption of cloud-based resources

Some examples described herein relate to billing consumption of cloudbased resources. Topology maps of resources assigned to a user on a cloud may be periodically generated.
Hewlett Packard Enterprise Development Lp

Methods and systems for browser-based mobile device and user authentication

Methods and systems for authenticating both a browser-based user mobile device and the user in association with an online transaction. In an embodiment, the process includes receiving, by a cloud-based authentication service computer, a user authentication request from a user mobile device.
Mastercard International Incorporated

Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture, payment transactions, and one touch payment, one tap payment, and one touch service

A method for facilitating mobile device payments, multimedia capture, calling, and messaging may include providing a payment, multimedia capture, calling, and messaging interface on a display of a mobile and wearable device and sensing a haptic input of the user via the haptic control associated with one touch payment, one tap payment, and one touch service. In response to the haptic input, a cloud-based application associated with the mobile and wearable device may be activated.

Method and system for providing cloud-based application security service

The present invention relates to a method and a system for providing a cloud-based application security service. The system for providing the cloud-based application security service according to the present invention includes: a client device including a compiler, an execution package composition unit, an uploader, and a downloader; and a cloud device including an execution package decomposition unit, a security library providing unit, a security library application unit, and an execution package recomposition unit, thereby, based on a cloud, providing convenience in security application and rapid action against hacker attacks..
Inka Entworks, Inc.

Tenant data mapping for multiple tenant cloud applications

Examples disclosed herein relate to using a tenant data mapping for multiple tenant cloud applications. For example, a processor executing tenant access instructions may retrieve data related to a tenant associated with a user login and data related to tenants with a hierarchical relationship to the tenant and create a mapping including the retrieved data.
Hewlett Packard Enterprise Development Lp

Cloud storage methods and systems

A system receives one or more messages corresponding to a request to add data to an electronic storage object that is accessible on a network, the one or more messages corresponding to the electronic storage object to which data is to be stored, and including raw data corresponding to the data that is to be stored. Responsive to the one or more messages, the system: locates the electronic storage object in a database, identifies data conversion metadata in the electronic storage object that indicates how the raw data is to be converted to formatted data in a format that is recognized by a computational application, uses the data conversion metadata to convert the raw data to the formatted data in the format recognized by the computational application, and stores the formatted data to the electronic storage object in the database..
Wolfram Research, Inc.

Testing a cloud service

Some examples described herein relate to testing of a cloud service. In an example, a cloud service to be tested may be deployed in a cloud system.
Hewlett Packard Enterprise Development Lp

Managing external feeds in an event-based computing system

At a cloud platform, a class of feed is received for an external feed corresponding to an information source, as are an instruction corresponding to a create operation for the external feed, and a dictionary input corresponding to parameters expected by the information source. The external feed produces a corresponding class of events.
International Business Machines Corporation

Methods and systems to determine and improve cost efficiency of virtual machines

Methods and systems to compute cost efficiency of virtual machines (“vms”) running in a private cloud are described. Methods and systems compute a cost efficiency value for each vm in the private cloud based on cost of the vm in the private cloud, cost of similar vms in the private cloud, price of similar vm running in the public cloud, and the cost of similar vms running in one or more private clouds in the same geographical area.
Vmware, Inc.

Internet-of-things device blank

System and techniques for an internet-of-things device blank are described herein. An iot blank device may be tested to determine whether it is in an initial state.

Generation of hybrid enterprise mobile applications in cloud environment

Generate hybrid enterprise mobile applications in cloud environment, according to one embodiment. A web application is selected in a web integrated development environment (ide) executing in a browser.
Sap Se

System and determining turf performance indicators

System and method for quantifying qualitative turf conditions as they relate to turf performance and health. In an embodiment, data is collected about turf condition using a turf analysis device.
Stevens Water Monitoring Systems, Inc.

Control system for providing cloud based commands for controlling operation of a moveable barrier

A control system for providing cloud based commands to a garage door includes one or more cloud servers for receiving commands from at least one mobile web enabled user device. A load balancer is used for receiving communication from a server for distributing commands from at least one web enabled device to the cloud.
Menklab, Llc

Dynamic application execution for automobile and cloud hybrid environments

Embodiments are directed towards providing a dynamic application environment where separate components of an application can execute on separate processing hardware at any given point in time. A host device monitors current operating characteristics associated with a computing device, such a head unit of an automobile, and based on those characteristics selects which components of one or more applications to execute on the computing device and which components to execute on the host device, if any.
Xevo Inc.

Modified architecture for cloud radio access networks and approach for compression of front-haul data

Systems and methods disclosed herein describe a centralized-processing cloud-based ran (c-ran or cloud-ran) architecture that offers reduced front-haul data-rate requirements compared to common-public-radio-interface (cpri) based c-ran architectures. Base-band physical-layer processing can be divided between a bbu pool and an enhanced rrh (errh).
Intel Ip Corporation

Node selection in virtual evolved packet core

The present disclosure includes gateways and methods for node selection of virtual network nodes in virtual evolved packet core networks. The methods include receiving, at a gateway from an evolved node b (enodeb), an attach request for a user equipment (ue), and determining a network selection hint corresponding to the received attach request, where the network selection hint is used for determining a virtual network node for selection in a mobile cloud network.
Cisco Technology, Inc.

Non-intrusive techniques for discovering and using organizational relationships

The present disclosure provides techniques for calculating an entity's cybersecurity risk based on identified relationships between the entity and one or more vendors. Customer/vendor relationships may impact the cybersecurity risk for each of the parties involved because a security compromise of a downstream or upstream provider can lead to a compromise of multiple other companies.
Security Scorecard, Inc.

Supplementing network flow analysis with endpoint information

Techniques are disclosed for supplementing network flow analysis with data collected from endpoint computer systems in a network. An endpoint analysis agent may run on endpoints to collect information relating to computing activity internal to the endpoint, including system configuration information, event information, and network, user, process, and file activity.
Ziften Technologies, Inc.

Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service

Message(s) are received from each one of multiple proxy servers, which are anycasted to the same ip address, that indicate source ip addresses of packets that are received that are directed to that same ip address. These proxy servers receive the packets as result of domain(s) resolving to that same ip address, and a particular one of the proxy servers receives the packets as a result of an anycast protocol implementation selecting that proxy server.
Cloudflare, Inc.

System and providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment

A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and trigger data is generated.
Intuit Inc.

Method and system of a cloud-based multipath routing protocol

In one aspect, a computerized system useful for implementing a cloud-based multipath routing protocol to an internet endpoint includes an edge device that provides an entry point into an entity's core network. The entity's core network includes a set of resources to be reliably accessed.

Cloud compute scheduling using a heuristic contention model

Technologies for contention-aware cloud compute scheduling include a number of compute nodes in a cloud computing cluster and a cloud controller. Each compute node collects performance data indicative of cache contention on the compute node, for example, cache misses per thousand instructions.
Intel Corporation

Cloud resource pool

In one implementation, a cloud resource system includes a resource engine and configuration engine. The resource engine can identify a cloud resource based on a template and assign the cloud resource based on a subscription and the template.
Hewlett Packard Enterprise Development Lp

Supplementing network flow analysis with endpoint information

Techniques are disclosed for facilitating analysis of cloud activity. A cloud activity analysis agent may run within a virtual machine in a cloud computing environment to collecting information regarding computing activity within the virtual machine.
Ziften Technologies, Inc.

High availability internet services provisioning

Systems and methods described herein provide redundant functionality for multi-cloud high availability continuous service provisioning. Service rule configuration of regional internet services platforms at different geographical locations are provisioned through a multi-cloud provisioning platform.
Verizon Patent And Licensing Inc.

Event notification in interconnected content-addressable storage systems

Some of the embodiments herein provide a seamless cloud of storage. This storage may be content-addressable storage.
Datcard Systems, Inc.

Architecture framework to realize push-to-x services using cloudbased storage services

An architecture framework to realize push-to-x services using cloud-based storage services. Push-to-x messages are transmitted between mobile units by messaging servers.
Kodiak Networks Inc.

Method and bulk authentication and load balancing of networked devices

A new approach is proposed that contemplates systems and methods to support bulk authentication of a device associated with a user to all cloud-based services the device intends to access in one transaction instead of authenticating the device against each of the services individually. First, the device generates and transmits to one or more authentication service clusters an authentication request that includes its identification and authentication credentials in order to access to a plurality of services.
Barracuda Networks, Inc.

Secure provisioning of operating systems

Methods, media, and systems for secure provisioning of servers within a cloud computing environment are provided for herein. In some embodiments, a management service can delegate provisioning of a server of the cloud computing environment to an imaging service.
Microsoft Technology Licensing, Llc

Methods and systems for content processing

Mobile phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to visual search capabilities, and determining appropriate actions responsive to different image inputs.
Digimarc Corporation

Systems, methods and devices for forming respiratory-gated point cloud for four dimensional soft tissue navigation

A surgical instrument navigation system is provided that visually simulates a virtual volumetric scene of a body cavity of a patient from a point of view of a surgical instrument residing in the cavity of the patient, wherein the surgical instrument, as provided, may be a steerable surgical catheter with a biopsy device and/or a surgical catheter with a side-exiting medical instrument, among others. Additionally, systems, methods and devices are provided for forming a respiratory-gated point cloud of a patient's respiratory system and for placing a localization element in an organ of a patient..
Veran Medical Technologies, Inc.

Methods and systems for highlighting box surfaces and edges in mobile box dimensioning

Disclosed herein are methods and systems for highlighting box surfaces and edges in mobile box dimensioning. An embodiment takes the form of a method that includes obtaining a three-dimensional (3d) point cloud from a depth sensor when the depth sensor is positioned such that an aiming indicator appears on a first surface of an object; processing the 3d point cloud to identify an extent of the first surface; further processing the 3d point cloud to identify a second surface that is adjacent and normal to the first surface, and to identify an extent of the second surface; and displaying at least part of the 3d point cloud via a user interface, including displaying the identified first surface in a first color and the identified second surface in a second color different from the first color..
Symbol Technologies, Llc

Wear measurement system using computer vision

A wear measurement system for a component is disclosed. The wear measurement system may have an imaging device configured to obtain a plurality of two-dimensional images of the component.
Caterpillar Inc.

Digital data commerce system and methods with digital media object to cloud redirection

The invention provides, in some aspects, a digital commerce system that includes a first digital data device, a second digital data device and a third digital data device, each of which is connected to a network that provides at least intermittent communications coupling between the second digital data device and each of the first and second digital data devices. Redirection logic executing on at least the second digital data device effects storage on the third digital data device of a digital media object downloaded from the first digital data device to the second digital data device.
Redigi, Inc.

Method and autonomous services composition

A cloud services composition system allows customers to interactively create service constructs from network function virtualization resources. The network function virtualization primitives are modeled using a standard modeling language.
At&t Intellectual Property I, L.p.

System and methods for implementing custom transactions within a multi-tenant platform

Systems and methods for enabling a user of a multi-tenant, cloud-based, business-data-processing platform to define one or more custom transactions. Custom transactions provide the power and flexibility for an enterprise resource planning (erp) system to satisfy varying requirements of national/international markets that have and often require additional transaction types to cover aspects of business activity that have an erp impact.
Netsuite Inc.

The present disclosure provides techniques for calculating an entity's cybersecurity risk based on identified relationships between the entity and one or more vendors. Customer/vendor relationships may impact the cybersecurity risk for each of the parties involved because a security compromise of a downstream or upstream provider can lead to a compromise of multiple other companies.
Security Scorecard, Inc.

Robust large-scale machine learning in the cloud

The present disclosure provides a new scalable coordinate descent (scd) algorithm and associated system for generalized linear models whose convergence behavior is always the same, regardless of how much scd is scaled out and regardless of the computing environment. This makes scd highly robust and enables it to scale to massive datasets on low-cost commodity servers.
Google Inc.

Automated system and methodology for feature extraction

An automated method performed by at least one processor running computer executable instructions stored on at least one non-transitory computer readable medium, comprising: classifying first data points identifying at least one man-made roof structure within a point cloud and classifying second data points associated with at least one of natural structures and ground surface to form a modified point cloud; identifying at least one feature of the man-made roof structure in the modified point cloud; and generating a roof report including the at least one feature.. .
Pictometry International Corp.

Determination of data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment.
Palo Alto Networks, Inc.

Secure credential service for cloud platform applications

A system, apparatuses, and methods for enabling a third party application installed on a multi-tenant platform to utilize an external service, where that service requires a user to provide authentication credentials, without exposing those credentials to the third party application. The invention enables an extension of the platform's services, applications, and functionality via the use of the third party application and the external service, but without the risk that the application might expose the credentials to misuse or otherwise cause a breach of the security measures applicable to the data and/or services of a tenant, a tenant's users, or the platform itself..
Netsuite Inc.

Remote healthcare system for family care

A remote healthcare system that incorporates a cloud based platform with a service provider having servers that store data and administrative applications for delivering healthcare features to a care recipient by an authorized member of a caretaker group where the system includes a care recipient controller at the location of the care recipient being provided the healthcare features, the care recipient controller being under primary control of the care recipient and having an internal microcontroller programmed to function as a general purpose computer to permit communications with cloud platform systems and with the care recipient, wherein the controller has circuitry to connect wirelessly and by landline to authorized members of the caretaker group, such that one authorized member of the caretaker group can remotely take control of the recipient controller as authorized by the service provider, and remotely control services to the care recipient including initiating emergency calls to 911 through the controller switch circuitry for the care recipient's landline.. .

Cloud based viewing, transfer and storage of medical data

Features are disclosed for remote storage of medical information in a cloud service, and the systems and methods for sending, receiving, and accessing the data into and from the cloud server. A user may identify dicom studies stored in a database at a medical data repository to be exported.
Datcard Systems, Inc.

System and implementing cloud based asynchronous processors

Systems, apparatuses, and methods for scheduling the processing of job requests on a data processing platform that utilizes multiple processing elements. In one embodiment, each job request includes a set of attributes that are used to determine scheduling and handling.
Netsuite Inc.

Virtualized file server tiers

In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (vfs) comprising a plurality of file server virtual machines (fsvms), wherein each of the fsvms is running on one of the host machines, and a backup system configured to, in response to a request to access a data item, determine an access frequency for the data item. The backup system is further configured to, in response a request to store a data item, determine a storage tier at which the data item is to be stored in a cloud storage service, wherein the tier is determined based on the access frequency associated with the data item, and store the data item at the determined tier of the cloud storage service..
Nutanix, Inc.

System and methods for management of cloud application extensions

Systems, apparatuses, and methods for managing the deployment of extensions to the functionality of a multi-tenant data processing platform. A computing system, such as a multi-tenant distributed computing platform, may have multiple business related applications installed on the platform that are used by one or more users/tenants to perform business related functions.
Netsuite Inc.

Methods and systems for facilitatng communications with storage

cloud computing platforms having computer-readable media that perform methods for facilitating communications with storage. A request having a first-interface format to access storage is intercepted.
Microsoft Technology Licensing, Llc

Virtualized file server backup to cloud

In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (vfs) comprising a plurality of file server virtual machines (fsvms), wherein each of the fsvms is running on one of the host machines and conducts i/o transactions with the one or more virtual disks, and a virtualized file server backup system configured to back up data stored in a vfs located a cluster of host machines to an object store, and retrieve the backed-up data as needed to restore the data in the vfs. The object store may be located in a public cloud.
Nutanix, Inc.

Short stroking and data tiering for a distributed filesystem

The disclosed embodiments disclose techniques for optimizing caching performance for a distributed filesystem. Two or more cloud controllers collectively manage distributed filesystem data that is stored in one or more cloud storage systems; the cloud controllers ensure data consistency for the stored data, and cloud controllers cache portions of the distributed filesystem on hard drives with rotating disk platters.
Panzura, Inc.

Cloud controlled laser fabrication

An execution plan segment of an execution plan can be received at a control unit of a computer numerically controlled machine from a general purpose computer. The execution plan segment can define operations for causing movement of a movable head of the computer numerically controlled machine to deliver electromagnetic energy to effect a change in a material within an interior space of the computer numerically controlled machine.
Glowforge Inc.

Method and system for in-situ identification of working fluids

A system for in-situ identification of a working fluid disposed in at least one piece of equipment, the system including: a working fluid reservoir that contains the working fluid; an in-situ sensor disposed in the working fluid reservoir such that it detects properties of the working fluid or computes properties from the generated spectra of the working fluid; a transmitter that transmits the detected spectra of the working fluid and equipment identification information; and a cloud computing system that receives the detected spectra and the equipment identification information transmitted from the transmitter, wherein the cloud computing system compares the spectra and equipment identification information against a reference database to determine whether or not the spectra of the working fluid substantially matches the stored reference spectra associated with the expected or specified fluid for the equipment.. .
Exxonmobil Research And Engineering Company

Wear measurement system using a computer model

A wear measurement system for a component is disclosed. The wear measurement system may include an imaging device configured to obtain a plurality of two-dimensional images of the component.
Caterpillar Inc.

Apparatus and temperature-precise culinary processes including food safety verification

An apparatus and method for control of temperature-precise culinary processes with real-time verification of food safety and pathogen destruction. The apparatus and method utilizes software process control for monitoring and recording input temperature sensors, controlling active relays for adjusting temperature according to set programmable recipes.

Apparatus and methods for recording, accessing, and delivering packetized content

Apparatus and methods to manage recording of streaming packetized content (such as for example live ip packetized content) for access, retrieval and delivering thereof to one or more users. In one embodiment, the foregoing is accomplished via communication between a recording manager and a receiver/decoder device.
Time Warner Cable Enterprises Llc

Method for transmitting fax messages from a fax message sending device to a fax message receiving device

The disclosure relates to a method of transmitting fax messages from at least one fax message sending device to at least one fax message receiving device. The method is implemented in a fax communication device driver.
Retarus Gmbh

Network and video/audio gaming and virtual reality

A wireless network and video/audio system and method for gaming and virtual reality are provided. The system and method intelligently harnesses the computing power of network of local-devices and the cloud to make powerful computing possible, anywhere..
Gridraster, Inc.

Adding cloud service provider, could service, and cloud tenant awareness to network service chains

A packet is received at a device configured to provide a service function within a network service chain. A cloud service identifier is extracted from a header of the packet.
Cisco Technology, Inc.

System and cloud aware application delivery controller

The present disclosure is directed towards systems and methods of managing cloud-based services via a network. A controller intermediary to clients and servers of a cloud environment can receive account information related to each of a plurality of instances of one or more services provided by the servers of the cloud environment.
Citrix Systems, Inc.

Context-aware task offloading among multiple devices

The present disclosure relates to offloading computing tasks from a user device to a cloud service. In one embodiment, a method generally includes generating, based on user input, a command for processing by the cloud service.
International Business Machines Corporation

Context-aware task offloading among multiple devices

The present disclosure relates to offloading computing tasks from a user device to a cloud service. In one embodiment, a method generally includes generating, based on user input, a command for processing by the cloud service.
International Business Machines Corporation

Cloud service server and managing cloud service server

The present invention provides a method for managing a cloud service server. The method includes receiving an http request from a user device through the internet; transmitting a cloud service page to the user device through the internet in response to the http request; receiving a registration request transmitted by the cloud service page through the internet; and transmitting a redirect command to the user device through the internet in response to the registration request for allowing the user device to register the cloud service page with the network storage server through a registration page, in which the redirect command redirects the user device to the registration page of a network storage server..
Synology Inc.

Advanced asset tracking and correlation

A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans.
Qualys, Inc.

Vehicle correlation system for cyber attacks detection and method thereof

A system and method for detection of at least one cyber-attack on one or more vehicles including steps of transmitting and/or receiving by a first on-board agent module installed within one or more vehicles and/or a second on-board agent module installed within road infrastructure and in a range of communication with said first on-board agent module metadata to and/or from an on-site and/or remote cloud-based detection server including a correlation engine; detecting cyberattacks based on correlation calculation between the metadata received from one or more first agent module installed within vehicles and/or from one or more second agent modules installed within road infrastructure; indicating a probability of a cyber-attack against one or more vehicle based on correlation calculation; initiating blocking of vehicle-to-vehicle communication to present and/or stop a spread of an identified threat.. .
Tower-sec Ltd.

System and confirmation of information

A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint authenticated sworn affidavit or statement called a “confirmation” can be given upon request of another individual and stored in a third party service provider's cloud based vault for future retrieval in the case of any legal or other forms of action that may need to be taken in the future.. .

Secure cloud-based clipboard for touch devices

Methods and systems for securely transferring assets via a cloud-based clipboard are provided. In an embodiment, input is indicating an asset is received from an input device at a computing device, which transmits to asset to cloud-based storage.
Adobe Systems Incorporated

Cloud-based service resource provisioning based on network characteristics

A network characteristic of current resources providing a network service may be identified. A determination as to whether the network characteristic of the current resources satisfies a load policy may be made.
Red Hat, Inc.

Context-aware task processing for multiple devices

The present disclosure relates to processing tasks offloaded from one or more user devices to a cloud service. An example method generally includes receiving a command to be processed by the cloud service.
International Business Machines Corporation

Evaluating resource performance from misaligned cloud data

A processing device sends a request to a cloud provider for data for a metric for a particular resource being provided by the cloud provider, receives one or more data steams for the metric for the particular resource from the cloud provider. The one or more data streams includes data points over a specified period of time.
Red Hat, Inc.

System and masking and computing on masked data in a data store

Various embodiments are disclosed for efficiently masking a data set using sparse associative array representations, such that various computations may be performed directly on the masked data set in a data store with low computational overhead. Some embodiments may include transforming a data set into a sparse associative array representation (e.g., a sparse matrix table or graph) and masking the various components of the sparse associative array representation (e.g., row keys, column keys, values) to generate a masked associative array representation using different masking schemes.
Massachusetts Institute Of Technology

System and processing multimodal images

Various aspects of a system and a method to process multimodal images are disclosed herein. In accordance with an embodiment, the system includes an image-processing device that generates a structured point cloud, which represents edge points of an anatomical portion.
Sony Corporation

Cloud infrastructure event analysis

In one example, neuro-fuzzy expert system logic analyzes and assigns significance values to events occurring in a cloud infrastructure. The logic includes event significance logic and a plurality of neuro-fuzzy logic modules.
Hewlett Packard Enterprise Development Lp

Securely storing and distributing sensitive data in a cloud-based application

Techniques to securely store and retrieve data are disclosed. In various embodiments, a process of retrieving secure data includes receiving a request, where the request includes a first secret data and a second secret data.
Mobileiron, Inc.

Control device, control system, control method, and control program

A cloud controller performs, when an attack on a vm in any of data centers in a system is detected, setting of nat of a private ip address of a vm(a), for a boundary router of each data center other than a data center that the vm(a) belongs to, the vm(a) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the vm(a), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center.
Nippon Telegraph And Telephone Corporation

Intelligent medical escalation process

A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking service. The medical network service in certain embodiments can provide networking services via software as a service technologies, platform as a service technologies, and/or infrastructure as a service technologies.
Masimo Corporation

Privacy protection of media files for automatic cloud backup systems

Identifying an electronic data file for exclusion from a data backup operation. A method identifies either or both of a first data file stored on an electronic file system, and a set of data elements within the first data file.
International Business Machines Corporation

Method and system for expanding storage capacity of a drive using cloud storage systems

A storage drive and associated system and method for storing data locally at the storage drive and/or at cloud storage may buffer, in a local storage buffer, data to be stored at the cloud and upload the data to the cloud storage from the local storage buffer. Upon receipt of an acknowledgement, from the cloud storage, that the data was successfully uploaded, the storage drive may delete the data from the local storage buffer.
Mokhtarzada Holdings, Llc

Privacy protection of media files for automatic cloud backup systems

Backing up electronic data files excluding confidential data. An electronic trigger event for initiating a data backup operation is detected.
International Business Machines Corporation

Privacy protection of media files for automatic cloud backup systems

Identifying an electronic data file for exclusion from a data backup operation. A method identifies either or both of a first data file stored on an electronic file system, and a set of data elements within the first data file.
International Business Machines Corporation

Systems and methods for managing digital data in a fault tolerant matrix

Aspects of the present disclosure relate to systems and methods for automatic management of digital data volumes logically maintained in a dynamically scalable fault tolerant matrix. The data volumes may be distributed across a cluster of connected server nodes included in a cloud computing architecture.

Context-aware task processing for multiple devices

The present disclosure relates to processing tasks offloaded from one or more user devices to a cloud service. An example method generally includes receiving a command to be processed by the cloud service.
International Business Machines Corporation

Effective and efficient virtual machine template management for cloud environments

Techniques are provided for reducing the amount of data that to be transferred in a hybridcloud system in order to spawn a vm at a private cloud computing system from a template library stored in a public cloud computing system. Instead of storing full virtual machine templates, template libraries at the public cloud computing system are “differential” libraries.
Vmware, Inc.

Single, logical, multi-tier application blueprint used for deployment and management of multiple physical applications in a cloud infrastructure

A deployment system enables a developer to define a logical, multi-tier application blueprint that can be used to create and manage (e.g., redeploy, upgrade, backup, patch) multiple applications in a cloud infrastructure. In the application blueprint, the developer models an overall application architecture, or topology, that includes individual and clustered nodes (e.g., vms), logical templates, cloud providers, deployment environments, software services, application-specific code, properties, and dependencies between top-tier and second-tier components.
Vmware, Inc.

Pointing detection

A pointing detecting device is described. In an embodiment, a device comprises: a display; a processor; a storage containing instructions; wherein the instructions cause the processor to: select a set of points from a point cloud representing a pointing object in proximity or in contact of the display; determine the selected set of points as control points of a computational smooth surface representing the pointing object; determine a point nearest to the display on the computational smooth surface; based on the point nearest to the display, determine a point in a direction of a gradient of a curvature of the computational smooth surface; and report the point as a location of a desired pointing or touch action..
Microsoft Technology Licensing, Llc





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Cloud for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cloud with additional patents listed. Browse our RSS directory or Search for other possible listings.


3.0462

file did exist - 11716

1 - 1 - 268