Follow us on Twitter
twitter icon@FreshPatents


Application Programming Interface patents

      

This page is updated frequently with new Application Programming Interface-related patent applications.

Method and system for detection and interference of network reconnaissance
A method for detecting unauthorized network activity includes: establishing, by a reconnaissance detection device, communication with a communication network comprised of a plurality of networked devices; emulating, by the reconnaissance detection device, a known networked device; receiving, by the reconnaissance detection device, one or more network communications intended for the known networked device; identifying, by the reconnaissance detection device, at least a device identifier associated with a source device of the received one or more network communications; and transmitting, by the reconnaissance detection device, an alert via an application programming interface, wherein the alert includes at least the identified device identifier.. .

Secure client-server communication
A secure client-server connection method compatible with restful (representational state transfer) apis (application programming interface) that is resistant to cross-site scripting (xss) and cross-site request forgery (csrf) attacks. The server generates a token for the client and a random value which it pairs with the token.

Software defined network (sdn) quality-of-service (qos)
A software-defined network (sdn) controller receives controller application programming interface (api) calls from an sdn application and transfers sdn data machine api calls. Sdn data machines receive the sdn data machine api calls and process user data responsive to the sdn data machine api calls.

Periodical generation of network measurement data
Some embodiments provide a method that generates different network measurements data (e.g., network topology, bandwidth estimation of different paths, etc.) for a pair of endpoints upon receiving a network administrative request (e.g., an application programming interface (api) request) or by other means (e.g., automatically and without intervention of a user). In some embodiments, the method is implemented by a network measurement agent operating on each endpoint and a centralized service component (e.g., web service layer) executing on a network manager machine (e.g., a controller) that responds to measurement requests.

System of standardized api interpretation for inter application communication
Managed inter application communications and relationships (miac) is a system for business process automation that uses recognised standard application programming interfaces (api), data base schema mapping and raw data to collect, translate and transfer data to facilitate processes that incorporate data transfers, communications, event creations, alerts and physical inputs to build an end-to-end work flow where all actions and communications are recorded for audit and automated feedback response cycles. The system allows for an incremental build of a matrix computer network where all connected systems are separated but communicate in an intelligent rule and workflow driven process, controlled and influenced by the human workforce..

Patient privacy de-identification in firewall switches forming vlan segregation
The present disclosure relates to enabling users to logging access information associated with their license via a virtual network. In one example of the present disclosure, user data associated with a user having an account on a virtual network is obtained.

Simulation systems and methods
Methods, systems, computer-readable media, and apparatuses for performing, providing, managing, executing, and/or running a spatially-optimized simulation are presented. In one or more embodiments, the spatially-optimized simulation may comprise a plurality of worker modules performing the simulation, a plurality of entities being simulated among the plurality of worker modules, a plurality of bridge modules facilitating communication between workers and an administrative layer including a plurality of chunk modules, at least one receptionist module, and at least one oracle module.

Systems and methods for increasing efficiency of application programming interface calls
Systems and methods are provided for improving communication between a multi-user data service (such as smartsheet) and a third-party data source (such as salesforce). The multi-user data service requests object updates from the third-party data source via an application programming interface (api).

Automated enforcement of architecture guidelines for application programming interfaces
To determine whether a set of software services underlying an api adhere to architecture guidelines, an architecture guideline validation system analyzes program code as part of a compilation process for the services to generate a data structure that indicates an organization of the services and invocations between the services. The system analyzes the data structure to determine whether any architecture guidelines have been violated.

Collection point anchored multi-property identity based application specific token origination
A secure identity framework has been designed that leverages a host device as a data collection point for four properties of a digital identity profile anchored to the collection point device, and uses the digital identity profile for multi-factor authentication. A public key infrastructure key exchange is conducted for secure identity framework members corresponding to collection and access of data of the digital identity profile.

Methods and apparatuses for utilizing a gateway integration server to enhance application security

Embodiments are disclosed for managing interactions between a server application and an external environment while limiting an attack surface of the server application. An example method includes receiving, by communications circuitry of a gateway integration server (gis) and from a source device in the external environment, a message including an application programming interface (api) call.

Systems and methods for managing resource utilization in cloud infrastructure

The present disclosure relates to managing resource utilization in cloud service infrastructure. A device can monitor the cloud service.

Automated field-mapping of account names for form population

A system for account mapping includes functionality for obtaining more than one labeled accounts labeled by more than one accountant; pre-processing more than one labeled accounts using natural language processing, using the more than one pre-processed labeled accounts to train an account mapping model that performs multinomial classification; receiving an account name from an accounting application where the account name includes a text label for an account included in a chart of accounts; generating an account mapping by applying the account mapping model to the account name, where the account mapping includes a type of the account, a sub-type of the account, a code, and a series associated with an accounting form; returning the account mapping to the accounting application through an application programming interface (api); and receiving a corrected account mapping from an accountant and using the corrected account mapping as a new text label to incrementally update the account mapping model.. .

Composite file system commands

Techniques for processing composite commands in a file system are disclosed. A file system receives a composite command that includes an argument.

Customized application programming interface presentation

Systems and methods are provided that list application programming interfaces (apis). A categorization tag for each api in the list is generated.

Dynamically generating a service pipeline comprising filtered application programming interfaces

According to an embodiment of the present invention, a system filters a collection of application programming interfaces based on input data representing information of a document to be processed, and generates a pipeline of filtered application programming interfaces. Each filtered application programming interface is sequentially executed within the pipeline.

Reactive api gateway

A system for processing application programming interface (api) calls and event messages may include a gateway subsystem and an events hub. The gateway subsystem can route api calls submitted by user agents connected to the gateway subsystem to appropriate service subsystems.
Accenture Global Solutions Limited

Application programming interface (api)-based security for websites

A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely delivered policy to redirect network requests for hosted services to a server to enforce visibility, policy and data security for network delivered services.
Netskope, Inc.

Deep application programming interface inspection (dapii) for cloud security

A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely delivered policy to redirect network requests for hosted services to a server to enforce visibility, policy and data security for network delivered services.
Netskope, Inc.

Protection configuration for application programming interfaces

A system is configured to authorize client access to an application programming interface (api) of a host device. A proxy is configured to handle network traffic between a host and a client.
Zenedge, Inc.

Authenticating access configuration for application programming interfaces

A system is configured to authorize client access to an application programming interface (api) of a host device. A proxy is configured to handle network traffic between a host and a client.
Zenedge, Inc.

Monitoring and automation systems, and related methods

A system comprising an agent system and a cloud platform, the agent system including a device handler and a communications manager, the cloud platform including components including: a receiver module; a platform management layer including a rules engine; a database; application programming interfaces (apis), and a user interface.. .
Intamac Systems Limited

System and controlling access to content using an accessibility api

Disclosed are system and methods for controlling access to content from a user application executing in an isolated environment on a user device. An exemplary method includes intercepting, by a security application, data relating to content in a graphical user interface of the user application using an accessibility application programming interface (api) exposed by an operating system of the user device, and generating a first template associated with the content based on the intercepted data.
Ao Kaspersky Lab

Dynamically integrating a client application with third-party services

Disclosed are various approaches for dynamically integrating a client application with multiple third-party services. An integration service receives a request to perform an action relative to a particular third-party service from a client device.
Airwatch Llc

Management processor using code from peripheral device

A management processor includes a peripheral identifier to identify a peripheral device installed in a computing device. The management processor also includes a code retriever to receive management code from the peripheral device.
Hewlett Packard Enterprise Development Lp

Creating local copies of data stored in online data repositories

Systems and methods for creating local, or on-premises, secondary copies of data managed and/or stored in online repositories are described. In some embodiments, the systems and methods perform a single application programming interface (api) call to a web application level of an online repository to transfer a copy of the data stored in the online repository from the online repository to a local site of a local information management system.
Commvault Systems, Inc.

Integrated snapshot interface for a data storage system

A data storage system includes a generic snapshot interface, allowing for integration with a wide variety of snapshot-capable storage devices. The generic interface can be a programming interface (e.g., an application programming interface [api]).
Commvault Systems, Inc

Systems and methods for accessing multiple application servers via a service capability exposure function

A computing device may include a memory configured to store instructions and a processor configured to execute the instructions to receive a message from a user equipment (ue) device via a mobility management entity (mme), wherein the computing device is configured as a service capability exposure function (scef) device. The processor may be further configured to identify an application server associated with the message based on one or more application server identifiers included in the received message; map uplink data, included in the received message and associated with the identified application server, to an application programming interface (api) associated with the identified application server; and send the mapped uplink data to the identified application server using the api associated with the identified application server..
Verizon Patent And Licensing Inc.

Asynchronous connection handling in a multi-threaded server

In accordance with an embodiment, described herein is a system and method for providing an asynchronous architecture in a server with an existing synchronous architecture. The system can include a keep-alive subsystem and a user-level request context switching application programming interface (api).
Oracle International Corporation

Methods and systems for managing networked storage system resources

Methods and systems for a networked storage environment are provided. One method includes maintaining by a processor of a management console, a plurality of structured objects representing a plurality of resources in a networked storage system for storing and retrieving client data from a plurality of storage devices; receiving by the processor unstructured data from an application programming interface (api) associated with a resource of the networked storage system; parsing by the processor, the unstructured data and generating an identifier hash value based on uniquely identifying fields of the unstructured data for an unstructured object; and generating by the processor a logical index with a configuration index and a performance index for the unstructured object identified by the identifier hash value for responding to user requests for performance information regarding the unstructured object..
Netapp, Inc.

Application programming interface fingerprint data generation at a mobile device executing a native mobile application

Systems, methods, and computer-readable storage devices to enable secured data access from a mobile device executing a native mobile application and a headless browser are disclosed.. .
Appbrilliance, Inc.

Remote communication and remote programming by application programming interface

Methods and systems are provided for remote application programming interface (rapi) communications between server and client devices. In an embodiment, server and client devices comprise memories and hardware processors coupled to the memories.
Silead Inc.

Apparatus for transmitting broadcast signals, receiving broadcast signals, transmitting broadcast signals and receiving broadcast signals

The present invention proposes a method for providing a broadcast content in an apparatus, the method comprising: requesting a filter code to an application running on the apparatus by using a first application programming interface (api); receiving a javascript object notation (json) object from the application in response to the first api; storing the filter code; receiving an extended file delivery table (efdt) having a first filter code associated with a first file; and selectively downloading the first file by comparing the stored filter code with the first filter code in the efdt.. .

Communication platform for exchanging digital data, generic application programming interface for such a communication platform, and operating and using such a communication platform

A communication platform exchanges digital data within a value added chain by at least one order. Each individual order corresponds to a collaborative process and has an order structure.

Methods and systems for implementing differential pricing configurations

Methods for implementing different pricing configurations by a server system are disclosed. The server system provides an application programming interface (api) for one or more network operators and receives, from a network operator via the api, a first request for a pricing configuration for network access for one or more internet protocol (ip) addresses hosted by the network operator.

Systems and methods for supporting augmented reality applications on a transport vehicle

Systems, devices, and methods for providing and supporting the operation of augmented reality applications on a transport vehicle, such as an airplane, train, bus, automobile, etc. The system includes an onboard management system which is configured to be installed on the vehicle.

Application programming interfaces for fulfilment services

In some examples, a computing device exposes, to a merchant device, one or more application programming interfaces (apis) for accessing a fulfilment service. The computing device receives, from the merchant device, via the one or more apis, a request regarding fulfillment of an order specified by a customer for fulfilment from the merchant.

System for preventing website redirection

Systems and methods may reducing website redirection for surveys. A method may include receiving, at a host server, an indication via an application programming interface (api), the indication including a request for survey.

Database query for histograms

Methods, systems, and computer programs are presented for obtaining histogram data from a database utilizing an interface with histogram-related options. One method includes an operation for providing, by a server, an application programming interface (api), to access the database, which includes a histogram request, to obtain histogram data from the database, with histogram options.

In-memory data analytic system that provides an integrated tracking mechanism for explicit memory resources

Techniques and a system are provided for managing resources used by user-provided programs. The system includes an application programming interface (api) that allows user-provided programs to access memory resources managed by functions provided by the api.

Satisfying application dependencies

The dependencies of an application are identified by intercepting application programming interface calls made by an application. A determination is then made at the runtime of the application as to whether the dependencies of the application are present.

Method and implementing mobile broadband device service

A method and an apparatus for implementing a mobile broadband device service. The method includes the following steps: obtaining, service information of a mobile broadband device according to a rule set on the host or by calling an application programming interface (api) of a web server on the mobile broadband device; and when to use a corresponding function of the host for implementing a mobile broadband device service corresponding to the service information, executing, the corresponding function of the host by calling an api provided by an operating system (os) of the host, to implement the mobile broadband device service.
Huawei Device Co., Ltd.

Determining security vulnerabilities in application programming interfaces

A security system scans application programming interfaces (apis) to detect security vulnerabilities by receiving api documentation from a third-party system associated with the api and organizing it in an api specification that describes the hostname of the api and one or more endpoints of the api. For each of the endpoints, the api specification includes a uniform resource identifier, a method term, an input content type, an output content type (if applicable), authorization details, and any associated parameters or arguments.
Tinfoil Security, Inc.

Smart thermostat orchestration

Systems and methods for orchestrating the operation of energy consuming loads so as to minimize power consumption are described. In some embodiments, the loads can be hvac, refrigeration systems, air compressors, and the like, and orchestration is effected either directly or by means of the loads' respective controllers.
Encycle Corporation

Web application firewall

Embodiments described herein provide an application programming interface and framework for a web application firewall single policy model. The framework can layer on top of a firewall platform that provides web application specific widgets that may be toggled and configured to enable or disable certain firewall actions on a per application basis.
Royal Bank Of Canada

Symmetric bridge component for communications between kernel mode and user mode

A symmetric, cross-platform, bridge component is described herein. The bridge component creates an interface (through a set of application programming interfaces (apis)) to enable the sending of data between a pair of components, called “endpoints,” a first endpoint component of the pair being executed in a kernel mode of a computing device, and a second endpoint component of the pair being executed in a user mode of the computing device.
Crowdstrike, Inc.

Image forming apparatus, management server, and information processing method

An image forming apparatus includes: a memory that stores a package file including an api execution propriety table and a storage file, propriety of a call and execution of one or more application programming interfaces (apis) from a program that runs on the image forming apparatus itself being described in the api execution propriety table, the one or more apis being provided for the program to use a function of the image forming apparatus itself, the storage file storing the program; and a processor that operates as a program execution platform for executing the program, the program execution platform including the one or more apis and a table check unit, the table check unit checking the api execution propriety table in a case where any of the one or more apis is called when the program is executed to determine propriety of execution of the called api.. .
Kyocera Document Solutions Inc.

Building automation system with microservices architecture

A building automation system (bas) platform includes one or more processors configured to provide an operating environment for developing and executing a plurality of building automation and control microservices. At least one of the plurality of building automation and control microservices is configured to receive live data from remote building equipment and provide control signals to the remote building equipment.
Johnson Controls Technology Company

Method and self organizing networks

A method for running a self organizing network (son) module in a communication network provides an open application programming interface (api) for a son framework and executes the son module. The son module accesses the functionality of the son framework using the api.
Nokia Solutions And Networks Oy

Managing device profiles in the internet-of-things (iot)

Systems and methods for managing device profiles in the internet-of-things (iot). In some embodiments, an information handling system (ihs) may include a processor and a memory coupled to the processor, the memory including program instructions stored thereon that, upon execution by the processor, cause the ihs to: receive a command from a user to access an iot device coupled to the ihs, and process the command using a device profile stored in the ihs, where the device profile includes an application programming interface (api) associated with the iot device..
Dell Products, L.p.

System and enterprise data distribution

In accordance with accordance, described herein is a system and method for providing a cloud service for distributing enterprise data to data consumers for reuse. The cloud service can include a generic connector interface configured to retrieve enterprise data from a paas service, and a plurality of services used for categorizing the enterprise data, managing identities of the data consumers, configuring data access rules, and masking the enterprise data.
Oracle International Corporation

System and providing multiple payment method options to browser

Disclosed is an approach for enabling a user to choose from multiple payment options using a browser api. The method includes determining whether a user interfacing with a site via a browser can make a payment via a first browser payment request application programming interface or a second browser payment request application programming interface.
Monticello Enterprises, Llc

System and securely storing and sharing information

The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core mechanism consisting of the key masters, the registries and the cloud lockboxes with application programming interfaces providing interaction with a wide variety of user-facing software applications. Together the mechanism provides full lifecycle encryption enabling cross-platform sharing of encrypted data within and between organizations, individuals, applications and devices.
Seed Protocol, Llc

Web api recommendations

A web application programming interfaces (api) recommendations technology for use in existing context (e.g., considering an already selected api) is disclosed. For example, recommendations for a “next” api, considering already “selected” apis can be provided.
International Business Machines Corporation

Web api recommendations

A web application programming interfaces (api) recommendations technology for use in existing context (e.g., considering an already selected api) is disclosed. For example, recommendations for a “next” api, considering already “selected” apis can be provided.
International Business Machines Corporation

Automatically embedding digital maps in software applications

An application programming interface (api) for automatically providing digital maps to third-party software applications is provided. The api is configured to (i) receive a string of alphanumeric characters from a third-party software application that executes independently of a map service, (ii) automatically determine whether the string is consistent with one or more indications of geographic locations, (iii) when the string is consistent with an indication of a geographic location, determine whether a digital map of a geographic area including the indicated geographic location should be generated, and (iv) in response to determining that the digital map should be generated, receive the digital from the map service and provide the digital map to the third-party software application for display via a user interface..
Google Inc.

Gallery control with dynamically determined control template replica sizes

Techniques are described for rendering a gallery control to a graphical user interface (gui), the gallery control including first and second template replicas. For each template replica, a gui-rendering component is instructed to render the template replica, a read application programming interface (api) call is placed to the gui-rendering component, a target size of the template replica is determined based on the results of the read api call, and a write api call is scheduled to instruct the gui-rendering component to update the dimension of the template replica to the target size.
Microsoft Technology Licensing, Llc

Device, hemispheric array breast imaging

A device, system, and method for volumetric ultrasound imaging is described. The device and system include an array of transducer elements grouped in triangular planar facets and substantially configured in the shape of a hemisphere to form a cup-shaped volumetric imaging region within the cavity of the hemisphere.
University Of Rochester

Notification and trigger for service layers and applications in a small cell network

In current approaches to m2m architectures, no interworking application programming interfaces (api's) are exposed to the service layers that are in the local network. Thus, a service layer might not able to make various requests including, for example, that devices be triggered, that the service layer receive notifications when devices are connected to the network, and that the service layer receive notifications when devices are no longer connected to the network.
Convida Wireless, Llc

Software defined network (sdn) application integrity

A network function virtualization infrastructure (nfvi) controls a software defined network (sdn) application programming interface (api) between a source sdn virtual network function (vnf) and a target sdn vnf. Nfv circuitry executes the source sdn vnf and transfers an identity code embedded in the source sdn vnf to management and orchestration (mano) circuitry.
Sprint Communications Company L.p.

Switching between data aggregator servers

Apparatuses, systems, methods, and computer program products are presented for switching between data aggregator servers. A method for switching between data aggregator servers may include tracking first account transaction data for a first financial account over a network using a personal financial manager (pfm) server using a first financial data feed having a first application programming interface (api), detecting, at the pfm server, that the first account transaction data from the first data aggregator server has become unavailable to the pfm server over the network and that a second data aggregator server is currently available to the pfm server over the network, and displaying the second account transaction data from the second api to a user for the first financial account in place of the unavailable first account transaction data..
Mx Technologies, Inc.

Federated marketplace portal

A system includes a federated marketplace portal to allow a user to browse, order, and manage business services offered by a plurality of cloud marketplaces based at least in part on application programming interface (api) abstractions. The system includes an integration system to transform the api abstractions into product-specific apis used by the cloud marketplaces and cause the invocation of the product-specific apis..
Ent. Services Development Corporation Lp

Control system and control method

A control system includes a server and a plurality of nodes. The server transmits data of command strings being described in combination of sequential processing and loop processing to the nodes.
Fujitsu Limited

Optimizing service deployment in a distributed computing environment

A computer-implemented method includes: receiving, by a computing device, a trigger indication to deploy a new artifact into an application cluster; obtaining, by the computing device, deployment data for the new artifact from one or more service entities via external application programming interface (api) calls; storing, by the computing device, the deployment data as a deployment data object; and providing, by the computing device, the deployment data object to a plurality of instances of the application cluster via internal api calls without the need for the plurality of instances to conduct external api calls to the one or more service entities.. .
International Business Machines Corporation

Integrated management heterogeneous devices using instances of vendor classes

Provided is an integrated management apparatus and method for heterogeneous devices. The integrated management method may include classifying internet protocol (ip) based devices to be managed based on a domain grouped for each field; defining a hierarchical class for each domain based on a field classification corresponding to each domain; defining a class of a bottom layer among the hierarchical classes as a vendor class corresponding to a device of a specific vendor; and mapping an instance of the vendor class to the device.
Futuresystems, Inc.

Method and system for implementing dual network telemetry application programming interface (api) framework

Novel tools and techniques are provided for implementing network application programming interface (“api”), and, more particularly, implementing dual network telemetry api framework. In some embodiments, a computing system might receive first network telemetry data from a first network via a gateway api, might receive second network telemetry data from one or more second networks via a network api, and might analyze the first network telemetry data and the second network telemetry data to determine first instructions to send to the first network and to determine second instructions to send to the one or more second networks.
Centurylink Intellectual Property Llc

Technologies for pooling accelerator over fabric

Technologies for pooling accelerators over fabric are disclosed. In the illustrative embodiment, an application may access an accelerator device over an application programming interface (api) and the api can access an accelerator device that is either local or a remote accelerator device that is located on a remote accelerator sled over a network fabric.
Intel Corporation

Method and system for implementing application programming interface (api) to provide network metrics and network resource control to users

Novel tools and techniques are provided for implementing network application programming interface (“api”), and, more particularly, api to provide network metrics and network resource control to users. In some embodiments, a computing system might receive customer network telemetry data from a first network via a gateway api, might receive service provider network telemetry data from a second network(s) via a network api, might compile the customer network telemetry data and the service provider network telemetry data, might receive a request from a user to access information regarding network services associated with the user, might filter the compiled customer network telemetry data and the compiled service provider network telemetry data to isolate first telemetry data and second telemetry data, respectively, might provide the user with access to at least one of the first telemetry data or the second telemetry data, and might provide the user with options to control network resources..
Centurylink Intellectual Property Llc

Identification of networking component application programming interfaces

Based on a request to identify a networking component, a first application programming interface (api) signature is selected from a plurality of api signatures within a priority list that associates the first api signature with a corresponding first api type, wherein the first api signature includes a first characteristic. A first api implemented by the networking component is tested to determining whether the first api implemented by the networking component exhibits the first characteristic.
Ca, Inc.

Method and system for implementing dual network telemetry application programming interface (api) framework

Novel tools and techniques are provided for implementing network application programming interface (“api”), and, more particularly, implementing dual network telemetry api framework. In some embodiments, a computing system might receive first network telemetry data from a first network via a gateway api, might receive second network telemetry data from one or more second networks via a network api, and might analyze the first network telemetry data and the second network telemetry data to determine first instructions to send to the first network and to determine second instructions to send to the one or more second networks.
Centurylink Intellectual Property Llc

Out of order pixel shader exports

Improvements in graphics processing pipelines are disclosed. The graphics processing pipeline processes graphics objects in a particular order (application programming interface order—“api order”) as requested by an application or other entity.
Advanced Micro Devices, Inc.

Computer based system for evaluating options in an eclectic array of product and service attributes in the travel services industry

The invention is a computer-based system for collecting, archiving, analyzing and distributing travel-related information which is comprised of an application programming interface (api) that provides scores and evaluations on travel amenities, duration and other flight attributes that can be integrated into the search engines and reservations systems of airlines and other travel service providers. The api computes scores (numerical, graphical and text) relating to customer satisfaction with various attributes of travel, including flight schedules and amenities and outputs data in such a way that integrators can display these in flexible ways for their customers to readily understand their options using icons, text or numerical means.

System and synchronizing notary meeting interactions between multiple software clients

Embodiments included herein are directed towards a method for synchronizing notary meeting interactions between multiple software clients. Embodiments may include allowing a signer to join, via a graphical user interface associated with a first software client, a remote notary meeting.
Notarize, Inc.

Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (ccs)

A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (ccs). The method includes using a cross-application monitor to detect a cloud computing service (ccs) application programming interface (api) in use and a function or an activity being performed via the ccs api.
Netskope, Inc.

Discovering and publishing api information

A system includes a marketplace portal to allow a user to order a business service, and a cloud controller to deploy an instance of the ordered business service to a cloud environment. The system includes an application programming interface (api) scanner to discover api information including at least one api exposed by the deployed instance of the ordered business service, and publish the discovered api information to another service..
Hewlett Packard Enterprise Development Lp.

Automated provisioning of applications

Disclosed are various embodiments for automating the provision of applications to managed client devices. A search string is passed through an iframe embedded in a web page to a remote computing device that provides an application programming interface (api) for an application store.
Vmware, Inc.

Home api

The present disclosure contemplates a variety of improved methods and systems for controlling a variety of disparate home devices coupled to the framework and/or ambient operating system (ambientos). This home application programming interface (api) exposes the operation of the home devices in a natural and intuitive manner, facilitating control of unknown devices by high level commands.
Essential Products, Inc.

System and enabling real-time eventing

A method and system for real-time eventing including interacting with at least one configuration attribute according to instructions specified through an application programming interface (api); adding subscribers for an event channel; generating an event from operation of an application; publishing the event message to the event channel on an event router; processing the event message according to the at least one configuration attribute; identifying a subscriber to the event channel; and sending the event from the event router to the subscriber.. .
Twilio, Inc.

Gateway for distributed control network

A gateway configured to control and monitor a plurality of control elements (ce is provided that comprises application programming interface (api) for communicating with applications over the internet; libraries of ce's messages; and at least one interpreter utilized for translating the messages into an api protocol and vice versa.. .
Emerald Information Systems Ltd.

Dynamic management of networks to facilitate storage device access

Facilitating dynamic management of networks to facilitate storage device access is presented herein. A discovery component can discover a network topology utilizing application programming interfaces (apis) of storage devices, network switches, and servers comprising a client computing resource in response to receiving an api request to facilitate a network access between the client computing resource and a storage device of the storage devices.
Osnexus Corporation

Controlling access by code

A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (apis).
Blackberry Limited

Application programming interface for database access

A system for generating a query plan is provided. In some example embodiments, the system performs operations comprising: determining, at a query execution engine, a first primitive call for implementing a query operation on data at a database; performing the query operation by at least sending, to a data management engine coupled to the database, the first primitive call for execution by the data management engine; and determining, based at least on a result of the first primitive call, a result of the query operation.
Sap Se

Computer system for managing digital media of an organization

A computer system provides a data structure, a framework for the querying of that data structure, and a presentation layer responsible for the interactive manipulation of that data via the use of standards enabling the data to be replaced, or the presentation to be replaced, which produces a highly customizable interactive presentation of data via re-used modules. The computer system includes a database and database access module to support information about sets of members of an organization with static and time-varying information.
Jalea Technology, Inc.

Api-based service command invocation

Api-based service command invocation is provided through a method that includes identifying one or more executable commands of a service. The one or more executable commands correspond to one or more service operations supported by the service.
International Business Machines Corporation

Dynamic application customization for automated environments

The present disclosure contemplates a variety of improved methods and systems for controlling a variety of disparate home devices coupled to the framework and/or ambient operating system (ambientos). This home application programming interface (api) exposes the operation of the home devices in a natural and intuitive manner, facilitating control of unknown devices by high level commands.
Essential Products, Inc.

Home device application programming interface

The present disclosure contemplates a variety of improved methods and systems for enabling developers to program and control a variety of disparate devices coupled to the framework and/or ambient operating system. The home api can expose operation of the devices in a natural and intuitive manner, facilitating control of unknown devices by high-level commands..
Essential Products, Inc.

Home device application programming interface

The present disclosure contemplates a variety of improved methods and systems for enabling developers to program and control a variety of disparate devices coupled to the framework and/or ambient operating system. The home api can expose operation of the devices in a natural and intuitive manner, facilitating control of unknown devices by high-level commands..
Essential Products, Inc.

Application programming interface manager

Modern elevators are computer controlled and a computer program sending service requests to an elevator system may be implemented in a mobile device. An api-manager is used in a mobile device for providing a common programming interface for all elevator related applications in the mobile device.
Kone Corporation

Messaging service application programming interface

Systems and methods for integrating (sms) text messaging into existing applications are presented. Consistent with some embodiments, a method may include receiving a request from a client application to transmit a message to a recipient device.
Zeta Global Corp.

Database functions-defined network switch and database system

A computer-implemented method and system are provided, including executing an application programming interface (api) in a network switch to define at least one of one or more database functions, performing, using one or more processors, the one or more database functions on at least a portion of data contained in a data message received at the switch, to generate result data, and routing the result data to one or more destination nodes. A database function-defined network switch includes a network switch and one or more processors to perform a pre-defined database function on query data contained in data messages received at the switch, to produce result data, wherein the pre-defined database function is performed on the query data in a first mode of operation to a state of full completion, generating complete result data and no skipped query data, or to a state of partial completion, generating partially completed result data and skipped query data..
Futurewei Technologies, Inc.

Computer based developing, managing and distributing mixed media content in the travel services industry

A computer based system and methods for developing, managing and distributing mixed media content in an eclectic array of product and service attributes in the travel services industry is described herein. The invention is comprised of a hub with an application programming interface (api) as such its components include a data structure for associating descriptive information, multimedia elements such as photos, videos and tours with product offerings and customer profiles using novel targeting rules that associate the features with specific airline flights, itineraries and customers..
Routehappy Inc.

System for facilitating secure electronic communications between entities and processing resource transfers

Embodiments of the present invention provide a system for utilizing one or more decentralized applications to allow entities to interface with a blockchain for the purposes of conducting a resource transfer. Typically, the blockchain is a permissioned blockchain which may be accessed only by the entities involved in the resource transfer.
Hashlynx Inc.

Enabling enforcement of licensing terms in distributing content in containers by including a key in the container containing the pertinent licensing terms

A method, system and computer program product for enforcing licensing terms when distributing content via a container image running in a container. Upon receiving a request for a service from the container by the isolation code, where the isolation code limits, accounts and isolates resource usage of process groups, the commerce code application programming interfaces (apis) of the isolation code read a key of the container.
International Business Machines Corporation

Best-efforts database functions

A computer-implemented method and system at a network switch provides using one or more processors to perform a pre-defined database function on query data contained in data messages received at the network switch, with the performing producing result data, and wherein the pre-defined database function is performed on the query data in a first mode of operation to a state of full completion, generating complete result data and no skipped query data, and in a second mode of operation to a state of partial completion, generating partially complete result data and skipped query data. Further, the method and system performing one or more network switch functions to route the complete result data, and/or route the partially complete result data and skipped query data, to one or more destination nodes.
Futurewei Technologies, Inc.

Application programming interface

An api on a server system automatically gathers an instance of each multiple resources from different sources, storing each instance in the server system. Later, a call to the api is received from a querying application, the call comprising a search query comprising.
Microsoft Technology Licensing, Llc

Analysis of application programming interface usage for improving a computer system

A method and system api call data for a user is obtained. The api call data for the user including for each api call of a two or more api calls made by the user: api request data and api response data.
International Business Machines Corporation

Application programming interface for providing access to computing platform definitions

Aspects of the disclosure are directed to providing access to the contents of a computing platform definition. A computing platform definition includes entries indicating devices and executables to deploy to a computing platform.
Bank Of America Corporation

Distributed virtual block storage network

A virtual storage network may be implemented and exposed as a single virtual namespace, using physical disk storage distributed across multiple computing devices. In various embodiments, each computing device contributing physical disk storage to the virtual storage network may include one or more virtual block devices configured to provide a local interface to the virtual storage network, an application programming interface (api) or other software components to translate the local data access requests into tuple-space operations compatible with the tuple-space data model, and/or a tuple-space storage engine configured to provide access to the data tuple-space of the distributed virtual storage network.
Oracle International Corporation

Systems and methods for enabling service interoperability functionality for wifi direct devices connected to a network via a wireless access point

Certain embodiments herein are directed to enabling service interoperability functionality for wireless fidelity (wifi) direct devices connected to a network via a wireless access point. A wifi direct device may identify various other wifi direct devices on a wifi network for performing a requested service, such as printing content or displaying content to a screen.
Intel Ip Corporation

Automatic discovery of management nodes and generation of cli using ha module

Systems and methods for communicating with the representational state transfer (rest) application programming interface (api), by providing a set of libraries for the hypertext transfer protocol (http) verbs used (that function without providing the uniform resource locator (url) to the management server in which the rest api resides) are disclosed. A caller requires no knowledge of where the management server is located in a high-availability (ha) situation, in which the management server can easily migrate and the internet protocol (ip)/url can change frequently.
Western Digital Technologies, Inc.

Communication protocols in integrated systems

A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises.
Icontrol Networks, Inc.

Communication protocols in integrated systems

A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises.
Icontrol Networks, Inc.

Internet of things application framework

A method, a device, and a non-transitory storage medium provides to receive a packet from an internet of things (iot) device; determine whether the packet carries iot data; determine a type of linked data to obtain in response to a determination that the packet carries the iot data, wherein a determination of the type of linked data is based on at least one of a source network address of the iot device or a device identifier of the iot device that correlates to an application programming interface (api) and corresponding type of linked data; obtain the type of linked data in response to the determination of the type of linked data; store the type of linked data and the iot data; and grant access and use of the type of linked data and the iot data to the api of a software application, when the software application is executed.. .
Verizon Patent And Licensing Inc.

Information processing device, information processing method, and program

There is provided a configuration in which completion of a drawing process by a drawing command executed by an application is detected and a conversion process and a display process are performed on an image to which the drawing process is completed. An application execution unit executing the drawing process and storing a drawing result in a storage unit, a display image generation unit converting a drawn image in the storage unit, and a buffer management unit switching a plurality of buffers in the storage unit are included.
Sony Corporation

Multi-application state navigation

Technology for interoperability is disclosed by enabling the sharing of application state data for an application experience across computing devices, operating systems, applications, or locations. In one aspect, a secondary application shares encrypted state data along with a non-encrypted hint that describes the application experience reflected in the state data with a primary application.
Microsoft Technology Licensing, Llc

Application programming interfaces for content curation

Content curation can be facilitated by an application programming interface (api) for creating an address for a block of content in a document identified through a location identifier as well as apis for retrieving content from the created address and pushing or merging the content back to the created address. Access services including conversion and merge services can be used to provide the content blocks in a suitable format for various clients.
Microsoft Technology Licensing, Llc

Application programming interface discovery using pattern recognition

Transforming application programming interface calls is provided. An application programming interface discovery process is performed on a second data processing system to determine how a task corresponding to a service request received from a first data processing system is performed on the second data processing system.
International Business Machines Corporation

Generating web api specification from online documentation

A tool that automatically generates a web api specification from a web api documentation is provided. The tool extracts a base uniform resource locator (url) string from the received documentation by identifying url strings in the documentation that are valid web application programming interface (api) calls.
International Business Machines Corporation

Autonomous vehicle interface system

In embodiments of an autonomous vehicle interface system, system nodes are each implemented as a distributed node for independent data processing of low-level sensor data and/or high-level system data. The high-level system data is abstracted from the low-level sensor data, providing invariance to system configuration in higher-level processing algorithms.
Polysync

Sequence dependent data message consolidation in a voice activated computer network environment

Systems and methods to combine multiple voice activated audio input data packets that indicate sequence dependent operations are provided. A natural language processor component can receive first and second input audio signal from a client computing device, and can identify respective requests and corresponding trigger keywords.
Google Inc.

Multimodal transmission of packetized data

A system of multi-modal transmission of packetized data in a voice activated data packet based computer network environment is provided. A natural language processor component can parse an input audio signal to identify a request and a trigger keyword.
Google Inc.

Technologies for securely extending cloud service apis in a cloud service marketplace

Technologies for securely extending cloud service application programming interfaces (apis) in a cloud service marketplace include a connector hub of a marketplace computing device communicatively coupled to a cloud service provider interface of a cloud service provider and a cloud service broker interface of a cloud service broker. The connector hub is configured to deploy an api connector instance in a connection factory of the marketplace computing device, transmit provider provisioning channel credentials to the api connector instance and the cloud service provider interface and transmit broker provisioning channel credentials to the api connector instance and the cloud service broker interface.
Ingram Micro Inc.

Data structure pooling of voice activated data packets

Systems and methods of voice activated thread management in a voice activated data packet based environment are provided. A natural language processor (“nlp”) component can receive and parse data packets comprising a first input audio signal to identify a first request and a first trigger keyword.
Google Inc.

Multimodal transmission of packetized data

A system of multi-modal transmission of packetized data in a voice activated data packet based computer network environment is provided. A natural language processor component can parse an input audio signal to identify a request and a trigger keyword.
Google Inc.

Personalized, event-driven, and location-based consumption of media content

A personalized, location-based experience of consuming a media event is provided. A user computing entity identifies a media event that a user is expected to want to consume based on profile information corresponding to the user.
Turner Broadcasting System, Inc.

Video conferencing control systems

A video conferencing control system for controlling the transmission of media streams between endpoints (103, 116.1, 116.2, 116.3). The system comprises: a plurality of video conferencing endpoints; a video conferencing bridge (110) arranged to provide a virtual meeting room (114.1, 114.2, 144.3) that operates to directly connect to each of the endpoints in a given video conferencing session for the exchange of media streams; a controller (105) connected to a first endpoint (103) of the plurality of video conferencing endpoints for the management of incoming and outgoing media streams; and a user interface (107) connected to the controller.
Cyviz As

Apparatus for detecting anomaly and operating the same

Disclosed are an apparatus for detecting an anomaly and an operating method for the apparatus. The disclosed apparatus may include a communication interface, a memory including one or more instructions, and a processor configured to execute the one or more instructions to receive one or more application programming interface (api) calls corresponding to one or more applications from a terminal device, and determine whether the anomaly has occurred in a first pattern of data acquired from the received api calls, by using a second pattern of data stored in a database..
Samsung Electronics Co., Ltd.

Client wireless device that merges functions of upper and lower mac layers to support wlan modules operating simultaneously in different wireless bands

A simultaneous client wireless device includes wireless modules configured to perform communication functions of a phy (physical) layer for wireless radios operable in different bands. The simultaneous client wireless device also includes a communication module configured as an intermediate layer between the phy layer of the wireless modules and a network layer.
Netgear, Inc.

Client wireless device that merges functions of upper mac layer to support wlan modules operating simultaneously in different wireless bands

A simultaneous client wireless device includes wireless modules configured to perform communication functions of lower mac (media access control) and phy (physical) layers for wireless radios operable in multiple wireless bands. The simultaneous client wireless device also includes a communication module configured as an intermediate layer between the lower mac layer of the wireless modules and a network layer.
Netgear, Inc.

Systems and methods for use in facilitating donation transactions to payment accounts

Systems and methods are provided for use in facilitating donation transactions to payment accounts. One exemplary method includes soliciting, by a computing device, a selection of a charity for a donation transaction, via an application programming interface (api), at a network-based interface affiliated with an issuer, in response to a donate input from a user authenticated to the network-based interface, and soliciting, by the computing device, a donation detail for the donation transaction, via the api, from the user.
Mastercard International Incorporated

Smart card secure online checkout

Wireless communication technologies, a dynamic transaction card, and a mobile application may be utilized to facilitate multi-factor authentication and secure electronic checkout of any website. A wireless connection between a dynamic transaction card and a user device may be utilized to authenticate a user.
Capital One Services, Llc

Virtual queuing system

A virtual queuing system includes a server connected to a call center. The call center includes an automatic call distributor and a firewall.
Virtualq Gmbh

Visual feedback system

A method of providing a visual feedback system may include providing an application programming interface (api) by which a third party electronic device invokes a visual feedback system. The method may also include receiving, from the third party electronic device, a request to invoke the api, where the request includes information from which an emotional state may be determined.
Fujitsu Limited

Application-to-application messaging over an insecure application programming interface

Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be provided over an insecure operating system application programming interface (api).
Vmware, Inc.

Application programming interface for detection and extraction of data changes

A system, a method, and a computer program product for detection and extraction of data are disclosed. A query containing a filtering parameter for extracting changed data from a plurality of resources is executed.
Sap Se

Storage layer based orchestration virtual machine migration across disparate virtualization environments

A storage layer based orchestration method can efficiently migrate a virtualized, enterprise scale system across disparate virtualization environments. A copy of a source logical storage container with multiple virtual disks of virtual machines (vms) can be created in a public cloud destination as a destination logical storage container.
Netapp, Inc.

Deploying documents to a server in a specific environment

In some examples, a method includes parsing, by a computing device, configuration data associated with multiple application programming interfaces (apis) that are served by multiple remote applications executing on multiple servers in different environments respectively; determining, by the computing device, a uniform resource location (url) of a remote application executing on a particular server deployed in the specific environment; receiving, by the computing device, a version of the remote application at the url; retrieving, by the computing device, multiple documents associated with the particular api corresponding to the version from an artifact repository; and deploying, by the computing device, the multiple documents to the particular server in the specific environment.. .
Hewlett Packard Enterprise Development Lp

Method and system to prevent ultrasound data leaks in mobile devices

A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an operating system on a mobile computing device, and includes: an app flow analysis system that generates and maintains runtime flow graphs for apps running on the mobile device and analyzes the runtime flow graphs to identify a set of apps having confidential data flow application programming interfaces (apis) in their execution paths; a detector that further evaluates the set of apps having confidential data flow apis to identify a subset of vulnerable apps also having ultrasound emitting apis; and a runtime correlation system that flags a vulnerable app as a potential data leak when a call to an ultrasound emitting api is detected from the vulnerable app.
International Business Machines Corporation

Real-time service status

An application programming interface (api) exposes real-time service status information from a service backend system to a mobile application of a mobile device. Interactive, dynamic, and real-time service status information is rendered to the mobile device for managing and/or rating services rendered to a customer who operates the mobile device..
Ncr Corporation

Centralized development of advertising code

Described are computer-based methods and apparatuses, including computer program products, for centralized deployment of advertising code. Advertising code is stored for use by a web page, the advertising code comprising at least one of vendor advertising code or vendor reporting code.
Viacom International Inc.

Predictive model integration

Techniques are described for integrating predictive models into applications, to enable the applications to provide predictive functionality. Using the framework according to implementations, predictive models and their supporting libraries may be incorporated into applications without requiring application developers to be knowledgeable regarding the particular features of the predictive models and/or libraries.
Business Objects Software Ltd.

Method and repairing kernel vulnerability

The present disclosure discloses a method and an apparatus for repairing a kernel vulnerability. A specific implementation of the method comprises: collecting attribute information of a to-be-repaired kernel, the attribute information comprising feature information for representing a code loading mode supported by the to-be-repaired kernel; acquiring a vulnerability repairing code matching the feature information, the vulnerability repairing code being used for invoking a patch application programming interface, the patch application programming interface being used for adapting the vulnerability repairing code to kernel functions of different kernels; loading the vulnerability repairing code and relocating an instruction contained in the vulnerability repairing code; replacing an address relocated by the patch application programming interface in the vulnerability repairing code with an address of the kernel function invoked by the vulnerability repairing code; and executing the vulnerability repairing code with the replaced address to repair the kernel vulnerability..
Baidu Online Network Technology (beijing) Co., Ltd.

Content validation and coding for search engine optimization

A method and a content validation and coding system (cvcs) for validating and coding content of an electronic document for search engine optimization (seo) are provided. The cvcs integrates with application programming interfaces (apis) of search engines and/or media platforms.
Metasense Digital Marketing Management Inc.

Big object bulk data ingest

Techniques and architectures for data ingestion in an environment having a distributed data storage system. A request to import data into the environment.
Salesforce.com, Inc.

Method for creating cache to e-commerce application in mobile device

A method for creating cache to e-commerce application in mobile device that comprising an engine that provides cache storage feature to user's mobile device. The engine communicates with merchant's website by means of bundle of application programming interface functions that are attached to engine.

Data publishing service with low-latency read access

The disclosure is directed to a data publishing service that provides a low-latency read access to data. Some applications store data in a format that is not suitable or efficient for retrieving the data in real-time or near real-time.
Facebook, Inc.

Identifying entities in a virtualization environment

In one embodiment, a system includes host machines that form elements of the virtualization environment, and that include a hypervisor, a user virtual machine (uvm), a connection agent, and an i/o controller. The system further includes a virtual disk comprising a plurality of storage devices, the virtual disk being accessible by all of the i/o controllers.
Nutanix, Inc.

Identifying entities in a virtualization environment

A system and method include receiving, by a controller/service virtual machine, a first request associated with an element of a visualization environment using an application programming interface (api). The first request includes a context-specific identifier.
Nutanix, Inc.

Intent-based service engine for a 5g or other next generation mobile core network

A context-aware network service engine is employed to support integrated network. In one aspect, the network service engine can receive a message associated with the user's intent and/or situation via a standard and/or open application programming interface (api).
At&t Intellectual Property I, L.p.

Security modes for a component-based web security model

Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications. Documents for a web-based application are received, with the application containing custom components and application programming interface (api) components.
Salesforce.com, Inc.

Secure component-based web applications

Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications. Documents for a web-based application are received, with the application containing custom components and application programming interface (api) components.
Salesforce.com, Inc.

Commerce system and providing intelligent personal agents for identifying intent to buy

A commerce system is controlled by providing a shopping agent. A first data is transmitted to the shopping agent using a mobile device connected to the shopping agent by an application programming interface.
Myworld, Inc.

Systems, methods and computer program products providing a bone conduction headband with a cross-platform application programming interface

An audio device can include a bone conduction headband configured to fit a user's head. A bone conduction headband extension that is coupled to the bone conduction headband, where the bone conduction headband extension can be configured to follow an inner contour of a user's ear when the bone conduction headband is worn to provide bone conduction audio transmission to a user.
Muzik, Llc

Managing transitions of adaptive display rates for different video playback scenarios

To manage dynamic adjustment of the refresh rate of a computer display, the operating system defines at least two playback modes: one or more custom modes that can be selected by applications, and a standard mode which is a default setting for the system that can be expected by applications. The operating system provides an application programming interface that enables an application to request using a custom mode.
Microsoft Technology Licensing, Llc

Isolating advertising identifiers from applications

A system and method include exposing, via an application programming interface, an advertising identifier to an online advertising network executing by at least one microprocessor of a computing device. The advertising identifier is associated with a user profile and is associated with a set of packaged web applications associated with the user profile.
Google Inc.

Applying machine learning techniques to discover security impacts of application programming interfaces

A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (sast). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information.
International Business Machines Corporation

Dynamic bridging of interface protocols

Systems and methods for protocol bridging for a system level modeling simulation (slms), such as a systemc simulation where the components communicate using a tlm2.0 application programming interface (api). The method includes accessing design configuration information describing a first component of the slms that uses a first communication protocol and a second component of the slms that uses a second communication protocol.
Synopsys, Inc.

Establishing an interaction session between a service client and a ran

A method performed in a radio device comprising a service client configured for service level communication with a service provider via a radio access network (ran) to which the radio device is connected. The method is for establishing an interaction session between the service client and the ran.
Telefonaktiebolaget Lm Ericsson (publ)

Systems and methods for tracking device ids for virtualized applications

A method of tracking device ids for virtualized applications includes receiving, at a proxy server, a network message originating from an emulated application, inspecting the network message to determine if a device id is set for the network message, obtaining an originating device id corresponding to the device id in the network message, replacing the device id in the network message with the originating device id, and transmitting the network message to a specified destination server. Alternatively, the method may include intercepting the network message at a network message inspector.
Oath (americas) Inc.

Accessing connected service resources in a distributed application programming interface

The disclosure relates to technology for accessing connected resources in a distributed application programming interface (api) of a network. A request is received from a client node, where the request includes one or more service labels indicating a selection of services to invoke.
Futurewei Technologies, Inc.

System and processing telephony sessions

In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol; processing telephony instructions with a call router; and creating call router resources accessible through a call router application programming interface (api). In another embodiment, the system for processing telephony sessions includes: a call router, a uri for an application server, a telephony instruction executed by the call router, and a call router api resource..
Twilio, Inc.

Integration device and integration method thereof

An integration device and an integration method thereof are provided. The integration device executes an artifact integration procedure to integrate the artifacts in a first database and the artifacts in the second database.
Institute For Information Industry

Distributed edge processing of internet of things device data in co-location facilities

Techniques are described for distributed processing of internet of things (iot) device data by edge systems co-located within a globally-distributed set of co-location facilities deployed and managed by a co-location facility provider. For example, a method includes selecting, by at least one of a plurality of edge computing systems co-located within respective co-location facilities each deployed and managed by a single co-location facility provider, a selected edge computing system of the plurality of edge computing systems to process data associated with events generated by an iot device.
Equinix, Inc.

Selective traffic blockage

Method, product and device for selective traffic blockage. In one embodiment, in response to a detection that a computing device cannot connect to a predetermined server, the blockage policy is applied to an outgoing packet, whereby selectively blocking outgoing packets when the computing device has limited connectivity to the predetermined server.
Skycure Ltd.

Taking actions on notifications using an incomplete data set from a message

An apparatus, a system, and a method in which a message notification application such as an e-mail notification application resident in a first memory on a wearable electronic device is configured to provide messaging actions; where the message notification application has a user interface to present content of a message originating from an message application resident on a mobile computing device; where the message notification application is configured to analyze a notification of the message to obtain an incomplete data set; and where the message notification application is configured to work with a server configured to integrate with one or more application programming interfaces of one or more messaging service providers, where the server has a server module configured to receive the incomplete data set and use all or a portion of the incomplete data set as search query terms to retrieve an instance of the message in its full-message format.. .
Fitbit, Inc.

Third party application configuration for issuing notifications

Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium for implementing one or more application programming interfaces (apis) that configure applications stored in an electronic device are described. An application may be configured to receive event information from various sources based on user preferences and application permissions.
Google Inc.

System and detecting geo-locations in social media

A method of determining locations for social media postings may include: retrieving, by communicating with at least one application programming interface (api) of a social media system over one or more first communication networks, at least one social media posting; determining at least one location mention in the at least one social media posting; determining at least one location based on the at least one location mention; determining a primary location from the at least one location; storing, in at least one database on a non-transitory machine-readable storage medium, at least one set of geo-coordinates for the primary location in at least one posting object for the at least one social media posting; and outputting, by communicating with a user system over one or more second communication networks, the at least one social media posting with the stored at least one set of geo-coordinates for display on the user system.. .
Thomson Reuters Global Resources Unlimited Company

Dynamic licensing for applications and plugin framework for virtual network systems

A network functions virtualization (nfv) method integrating third-party virtual network functions (vnf) through a plugin framework includes operating, via one or more servers in an nfv cloud, the plugin framework with application programming interfaces (api) to one or more third-party vnfs; providing a catalog of vnf services comprising the one or more third-party vnfs to an end user; and operating the one or more third-party vnfs with the end user via the nfv cloud, wherein the one or more third-party vnfs are from a different vendor than an operator of the nfv cloud.. .
Ciena Corporation

Facilitating management of user queries and dynamic filtration of responses based on group filters in an on-demand services environment

In accordance with embodiments, there are provided mechanisms and methods for facilitating management of user queries and dynamic filtration of responses based on group filters in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes receiving, at a first computing device, a query via an application programming interface (“api”) of a software application at a second computing device, where the query includes one or more filter parameters including a size filter parameter.
Salesforce.com, Inc.

Suggesting application programming interfaces based on feature and context analysis

Methods, systems, and computer program products for suggesting apis based on feature and context analysis are provided herein. A computer-implemented method includes extracting at least one feature of an input function code based on application of one or more text analytics to one or more inputs pertaining to the input function code; deriving at least one item of context-related information from the input function code; generating a suggestion comprising one or more application programming interfaces, wherein said generating comprises comparing (i) the at least one feature of the input function code and (ii) the at least one item of context-related information to a database, and wherein the database comprises (a) feature data and (b) context-related information pertaining to multiple application programming interfaces; and outputting the suggestion to at least one user..
International Business Machines Corporation

Framework for developing and deploying applications

A system may determine one or more data sources which the system is configured to access. The system may provide a set of application programming interfaces (apis) for interacting with data stored in one or more data sources.
Palantir Technologies Inc.

Personal care device with camera

A personal care system having a treatment device for applying a treatment to the skin or hair of a user is provided. The treatment device has a camera for taking an image of the skin.

Traffic prediction and real time analysis system

A traffic routing and analysis system uses data from individual cellular or mobile devices to determine traffic density within a transportation network, such as subways, busses, roads, pedestrian walkways, or other networks. The system may use historical data derived from monitoring people's travel patterns, and may compare historical data to real time or near real time data to detect abnormalities.
Dataspark Pte, Ltd.

Systems and methods for event detection and clustering

A method of detecting events in and clustering social media postings for display on a user system may include retrieving, via an application programming interface (api) of a social media system over at least one first communication network, at least one posting of the social media system; determining whether the at least one posting has content referring to a predetermined time period; upon determining that the at least one posting has content referring to the predetermined time period, determining whether the at least one posting corresponds to an existing cluster of postings related to an event; upon determining that the at least one posting corresponds to the existing cluster of postings relating to the event, storing, in at least one database on a non-transistory machine-readable storage medium, the existing cluster of postings modified to include the at least one posting; and providing, via at least one second communication network, a representation of the modified existing cluster of postings for display on a user system.. .
Thomson Reuters Global Resources Unlimited Company

Dynamic messaging for an application programming interface

Examples disclosed herein comprise dynamic message instructions to map each of a plurality of data identifiers to at least one granular application programming interface (api), receive a message comprising at least one of the plurality of data identifiers from a client, retrieve, via the at least one granular api for the at least one of the plurality of data identifiers, a data resource, and provide the retrieved data resources to the client.. .
Hewlett Packard Enterprise Development Lp

Processing application programming interface (api) queries based on variable schemas

The present disclosure relates to accessing data using application programming interface (api) calls. According to one embodiment, a method generally includes receiving, at the api, a request from a client device, where the requesting a data operation.
Intuit Inc.

Defining variability schemas in an application programming interface (api)

The present disclosure relates to managing variability in an application programming interface (api). According to one embodiment, a method generally includes receiving, from a user, a definition of a variability schema and context information associated with the variability schema.
Intuit Inc.

Self-aware and self-registering software & analytics platform components

According to some embodiments, system, apparatus and methods are provided comprising a platform hosting one or more elements; an application programming interface (api) wrapper associated with each of the one or more elements, the api wrapper including input information to the one or more elements, output information to the one or more elements, and at least one instruction defining a function of the element; and wherein the one or more elements and the api wrapper form a self-aware element. Numerous other aspects are provided..
General Electric Company

Endpoint management system and virtual compute system

A system for integrating an endpoint management system and a virtual compute system is provided. The system may be configured to receive a first request to execute a proxy application programming interface (api) associated with a first resource of a plurality of resources maintained by the endpoint management system, determine, based at least in part on the first request and the proxy api, an api mapping definition associated with the proxy api, output a second request to execute a program code on the virtual compute system based on the api mapping definition associated with the proxy api, wherein the second request contains information associated with the first resource, receive a first response from the virtual compute system, wherein the first response contains information regarding the first resource, and output a second response based on the first response received from the virtual compute system..
Amazon Technologies, Inc.

Scalable and secure analytic model integration and deployment platform

According to some embodiments, system, apparatus and methods are provided comprising an analytic model for an installed product; an execution platform configured to execute the analytic model; an application programming interface (api) wrapper associated with each of the analytic model and the execution platform, the api wrapper including input information, output information and a technique; and a storage in communication with the analytic model and the execution platform and storing program instructions to perform the functions as follows: transmitting information between the analytic api wrapper and the execution platform api wrapper; and deploying the analytic model to the execution platform based on the transmitted information. Numerous other aspects are provided..
General Electric Company

System architecture for secure and rapid development, deployment and management of analytics and software systems

According to some embodiments, system, apparatus and methods are provided comprising one or more component models of an analytic model for an installed product; an application programming interface (api) wrapper associated with each of the one or more component models, the api wrapper including information about one or more inputs to the component model; and wherein the component model and the api wrapper form a self-aware component. Numerous other aspects are provided..
General Electric Company

Device and system for cloud based mobile application virtualization

A system and method for mobile application virtualization. The system includes a server based architecture for mobile application virtualization.
Sierraware, Llc

Detecting device masquerading in application programming interface (api) transactions

This disclosure describes a technique to determine whether a client computing device accessing an api is masquerading its device type (i.e., pretending to be a device that it is not). To this end, and according to this disclosure, the client performs certain processing requested by the server to reveal its actual processing capabilities and thereby its true device type, whereupon—once the server learns the true nature of the client device —it can take appropriate actions to mitigate or prevent further damage.
Akamai Technologies, Inc.

System and policy based adaptive application capability management and device attestation

A method provides policy based adaptive application capability management and device attestation for dynamic control of remote device operations. The method includes instrumenting applications installed on a remote device to examine their runtime application programming interface (api) invocations to trusted functions abstracted by a trusted services platform anchored to an underlying firmware, software or hardware root of trust, and managing the application security operations based on the execution context and dynamic privilege controls to restrict their capabilities.
Mocana Corporation

Cloud-based user interface augmentation

In a general aspect, a computer-implemented method can include storing, on one or more remote servers, preferences specific to a user for augmented user interface (aui) functionality on a local computer and receiving, at the one or more remote servers via a web browser running on the local computer, a request to login the user. The computer-implemented method can also include, in response to the request, providing from the one or more remote servers to the local computer, one or more application programming interface (api) plug-ins to provide, in the web browser, the aui functionality on the local computer, wherein the provided aui functionality conforms to the user's preferences stored on the one or more remote servers..
Google Llc

Instantiation of javascript object

A method. A javascript (js) object is instantiated.
International Business Machines Corporation

Active drive api

An application programming interface (api) that enables installation of an application as one or more key-value objects on a data storage drive such as a hard disk drive, a solid state drive or a hybrid drive. The api also enables execution of the application within a controlled environment of the data storage drive..
Seagate Technology Llc

Remote communication and remote programming by application programming interface

Methods and systems are provided for remote application programming interface (rapi) communications between server and client devices. In an embodiment, server and client devices comprise memories and hardware processors coupled to the memories.
Silead (cayman) Inc.

Api for obtaining geographic location data

Provided are systems and methods for obtaining geographic location data. In one embodiment, an example method includes identifying, by the first software application running on one or more computing devices, one or more location parameters indicative of a geographic point of interest based at least in part on an application programming interface invoked by the first software application.
Google Inc.

Api for obtaining geographic location data

Provided are systems and methods for obtaining geographic location data. In one embodiment, an example method includes identifying, by the first software application running on one or more computing devices, one or more location parameters indicative of a geographic point of interest based at least in part on an application programming interface invoked by the first software application.
Google Inc.

Automated resolution of wi-fi connectivity issues over sms

Wi-fi connectivity issues are automatically resolved over sms. An sms message including a mac address is received for a station having a wireless connectivity issue involving a wi-fi portion of the data communication network.
Fortinet, Inc.

Safe sharing of sensitive data

In an example, there is disclosed a computing apparatus having: a processor; a memory; a data interface; and one or more logic elements providing a verification engine to: receive via the data interface an input script including a request to access enterprise data; analyze the input script to determine that the input script complies with a data request criterion; apply an application programming interface (api) to the input script to collect the enterprise data; and send the enterprise data via the data interface.. .
Mcafee, Inc

Microservices based multi-tenant identity and data security management cloud service

A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request includes a call to an application programming interface (“api”) that identifies the identity management service and a microservice configured to perform the identity management service.
Oracle International Corporation

Network application component with credit based congestion control, and corresponding method

A computer-implemented networked application component includes a need parameter manager adapted to regularly determine an instantaneous need of an application for throughput in the network; a credit parameter manager adapted to regularly update a throughput credit built up as a function of throughput difference, i.e. Difference between actual data throughput and fair share; and a transport layer application programming interface adapted to alter one or more congestion control parameters in the transport layer of the network depending on the instantaneous need to temporarily receive a throughput above, respectively below, fair share in return for consuming, respectively building up, the throughput credit..
Alcatel Lucent

Public cloud interface for tranceiving corresponding requests and responses to multiple networks

A public cloud can host a multi-network service for transceiving common requests and responses for multiple networks. The public cloud can receive requests from the networks to join the service via an application programming interface (api).
Ebay Inc.

Application programming interfaces for courier services

A system and environment to enable entities to utilize courier services provided by a service provider are described herein. In some examples, the service provider exposes the courier services to a computing device associated with a merchant, buyer, and/or others using one or more application programming interfaces (apis) provided by the service provider.
Square, Inc.

Account top-up feature to interface with a vendor application programming interface

There are provided systems and methods for an account top-up feature to interface with a vendor application programming interface (api). A user may utilize a communication device while shopping or otherwise performing transaction processing, where the user may require additional funds to be deposited within an account of the user for transaction processing with a service provider.
Paypal, Inc.

Metadata application programming interface for ad hoc database queries

Embodiments include a metadata application programming interface (api) for processing ad hoc database queries. Embodiments can be configured to process ad hoc database queries to determine the structure of the resulting data set and to provide metadata in the form of a result table, for example, in response to the queries that describes the structure of the data to be accessed by the queries.
Sap Se

Configuring resources used by a graphics processing unit

The application programming interface permits an application to specify resources to be used by shaders, executed by the gpu, through a data structure called the “root arguments.” a root signature is a data structure in an application that defines the layout of the root arguments used by an application. The root arguments are a data structure resulting from the application populating locations in memory according to the root signature.
Microsoft Technology Licensing, Llc

Generating a mixed reality interface to expose object functionality

Invoking a function of a mixed reality interaction enabled object is provided. In response to determining that an input was received selecting the mixed reality interaction enabled object to perform an action, an interface is received showing a set of available application programming interfaces and functions corresponding to the mixed reality interaction enabled object.
International Business Machines Corporation

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework, that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework.
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework, that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework.
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework..
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework.
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework.
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework, and publishes a method and an event that are used for communication with a core logic portion of another application..
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework, and the application programming interface includes a before-the-fact notification indicative of that a window of the application is changed to a display state as a result that another window in an upper layer is changed to a non-display state..
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework, and the interface includes a before-the-fact notification indicative of that a window displayed by the application is terminated..
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework.
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework, that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework.
Fuji Xerox Co., Ltd.

Real-time push api for log events in enterprise threat detection

A log entry is received at a streaming component of an enterprise threat detection (etd) system from a real-time push application programming interface (api) associated with a backend computing system. The received log entry is parsed using a runtime parser associated with the streaming component into mapped data in an etd format compatible with the etd system.
Sap Se

Software-based fabric enablement

A first fabric abstraction layer couples to a data link layer and a physical layer of a network fabric device. The network fabric device is connected to other network elements within a network via at least one network connection, such as a fiber optic connection.
Nant Holdings Ip, Llc

System and providing a multi-validator oracle

Disclosed is a system and method of implementing a multi-validator oracle. The method includes receiving a notification at a multi-validator oracle from an external smart contract that requests data from the multi-validator oracle to be provided to the external smart contract according to a set of parameters to yield requested data, gathering the requested data from at least one application programming interface for a website that provides information associated with the requested data, validating the requested data based on a first verification from a first private key and a second verification from a second private key to yield a validation and, based on the notification and validation, providing the requested data to the external smart contract..
Shapeshift Ag

Embedded storefront

A vertically integrated retail system includes an embedded storefront adapted to operate in a distributed manner through independent units embedded in different web sites or content in other host applications. Each unit of the embedded storefront enables a user to purchase goods, services, or other entities without leaving the host application.
Groupon, Inc.

Secure disk access control

A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (api) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations.
Mcafee, Llc

Automated security testing for a mobile application or a backend server

Techniques that facilitate automated security testing of one or more mobile applications and/or one or more backend servers for the one or more mobile applications are provided. In one example, a system includes an analysis component and a security component.
International Business Machines Corporation

Mobile application management

Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (api) calls of the particular platform.

Computer security profiling

Certain examples described herein relate to security profiling files on a computer system, including determining a similarity between two executable program files. Byte samples are obtained from each executable program file, respective distributions of byte values are determined, and a difference metric between said distributions is determined, for example by a byte sampler.
1e Limited

Generating an application programming interface

A technology is provided for generating a customized application program interface (api) in a service provider environment. A model is created of computing resources and data hosted by a service provider environment.
Amazon Technologies, Inc.

Scheduler and cpu performance controller cooperation

In one embodiment, an application programming interface (api) is defined that enables a thread scheduler to communicate thread information to the cpu performance controller when dispatching a thread to a processor or processor core. When dispatching a thread, the scheduler may communicate thread information including thread state information, a general “importance” of the thread as defined by a priority level and/or quality of service (qos) classification, a measurement of the scheduler dispatch latency for the thread, or architectural information regarding the instructions within the thread, such as whether the thread is contains 64-bit or 32-bit instructions.
Apple Inc.

Hypervisor-hosted virtual machine forensics

A computer system acquires forensics data from running virtual machines in a hypervisor-hosted virtualization environment. The computer system provides a forensics partition as an additional root virtual machine partition or child virtual machine partition.
Microsoft Technology Licensing, Llc

Centralized application programming interface monitoring tool

Methods and systems for the collecting and monitoring of information related to the performance of application programming interfaces (apis) are provided. A method includes obtaining one or more various measurements of performance of the apis, and assessing a performance status for each api based on the obtained one or more various measurements of performance.
Adp, Llc

Image processing apparatus and storage medium

An image processing apparatus includes an application on a framework that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework, and publishes a method and an event that are used for communication with a core logic portion of another application..
Fuji Xerox Co., Ltd.

Image forming apparatus and storage medium

An image forming apparatus includes an application on a framework, that is separated into a core logic portion handling basic processing and a user interface frame portion handling rendering processing and operates; and a controller that executes the application and the framework. The core logic portion is implemented with an application programming interface defined by the framework and is loaded in a memory by the framework at activation of a system.
Fuji Xerox Co., Ltd.

Version control machine

Aspects of the present disclosure relate to version control. A version control server receives, from a client device, a request for making changes to a portion of data stored in a data store.
Palantir Technologies Inc.

Authorization with container application issued token

A method and system manages access to resources within a virtualization platform using an application token, where the application token includes information to enable identification of an associated application. The method includes receiving a request from an application programming interface (api) server to instantiate an application, where the application is provided the application token based on a verified caller token, generating the application token derived from the verified caller token or a virtualization platform policy, and providing the application token to the application in a container for the application..
Telefonaktiebolaget Lm Ericsson (publ)

Multi-session authentication

An approach for multi-session authentication of multiple networked devices is disclosed. A user can create a public key-encrypted message on a client device using biometric data and a one-time password (e.g., one-time password).
Ebay Inc.

Methods and systems for multichannel micro-interactions

Various systems and methods for managing multichannel content delivery are presented. A multichannel content server system may use an application programming interface (api) for interfacing with a plurality of end-user communication channels.
Ignite Feedback, Inc.

Multi-tiered access to functionality of universal platform applications

Technologies are provided for multi-tiered access to functionality and menus of a universal platform application by packaging the universal platform application with a desktop application of an executable. A universal platform application may be packaged with an executable that is launched automatically when the universal platform application is launched.
Microsoft Technology Licensing, Llc

Enabling enforcement of licensing terms in distributing content in containers by including a key in the container containing the pertinent licensing terms

A method, system and computer program product for enforcing licensing terms when distributing content via a container image running in a container. Upon receiving a request for a service from the container by the isolation code, where the isolation code limits, accounts and isolates resource usage of process groups, the commerce code application programming interfaces (apis) of the isolation code read a key of the container.
International Business Machines Corporation

Systems and methods for predicting performance of applications on an internet of things (iot) platform

Performance prediction systems and method of an internet of things (iot) platform and applications includes obtaining input(s) comprising one of (i) user requests and (ii) sensor observations from sensor(s); invoking application programming interface (apis) of the platform based on input(s); identifying open flow (of) and closed flow (cf) requests of system(s) connected to the platform; identifying workload characteristics of the of and cf requests to obtain segregated of and segregated cf requests, and a combination of open and closed flow requests; executing performance tests with the apis based on the workload characteristics; measuring resource utilization of the system(s) and computing service demands of resource(s) from measured utilization, and user requests processed by the platform per unit time; executing the performance tests with the invoked apis based on volume of workload characteristics pertaining to the application(s); and predicting, using queuing network, performance of the application(s) for the volume of workload characteristics.. .
Tata Consultancy Services Limited

Pre/post deployment customization

An example system and method facilitates customization of and configuration of a software connector, such as a connector to an application programming interface (api) or web service, in various types of computing environments, including both pre-deployment and post-deployment computing environments. A connectors framework provides a layer of abstraction between connectors maintained in the different environments and a connector editor of an application development system (which may be implemented via a server-side integrated development environment).
Oracle International Corporation

Automatic video game highlight reel

In one example, a gaming platform may use a variety of protocols to identify video game events for inclusion in a highlight reel. The gaming platform may store a highlight criterion for a video game to mark a highlight event in the video game.
Microsoft Technology Licensing, Llc

Task segregation in a multi-tenant identity and data security management cloud service

Embodiments provide cloud-based identity management by receiving a request to perform an identity management service that includes real-time tasks and near-real-time tasks. Embodiments synchronously execute the real-time tasks by accessing at least one microservice using a corresponding application programming interface (“api”).
Oracle International Corporation

Telecommunication network analytics platform

Methods, computer-readable media and devices are disclosed for selecting a plurality of network devices to perform a plurality of tasks in accordance with a set of functional network analytics instructions. For example, a processor deployed in a telecommunication network may receive a set of functional network analytics instructions compiled from a set of instructions in accordance with a functional network analytics platform application programming interface.
At&t Intellectual Property I, L.p.

Sharing document links from multiple data providers

A document sharing system includes a plurality of different data provider implementations. The document sharing system exposes a common application programming interface to a plurality of different clients and receives data requests identifying a given data provider, from the clients.
Microsoft Technology Licensing, Llc

Processing cloud services and intelligence cloud services integration

Various embodiments provide for integrating process cloud services (pcs) with intelligence cloud service (ics). Pcs analytics data is obtained using one or more pcs analytics data export application programming interfaces (apis).
Oracle International Corporation

Configurable platform architecture and use thereof

A platform architecture that is configurable to provide task specific application instances compatible with one or more hosts is provided with a method for using the architecture. In one example, the platform architecture provides a transducer functionality block, a conduit functionality block, an application functionality block, and an application programming interface (api) functionality block on which each task specific application instance is based..
D Alan Holdings, Llc

Provide copy of notebook document

Variety of approaches to provide a copy of a notebook document are described. A copy application programming interface (api) of a productivity service initiates operations to copy a source notebook document upon receiving a request to copy a designated portion of the source notebook document to a destination.
Microsoft Technology Licensing, Llc

Embedding user interface snippets from a producing application into a consuming application

A user interface of a producing application is accessed. The producing application includes embeddable snippets that each include encapsulated code that provides the functionality of one or more user interface component.
Oracle International Corporation

System and remote power/power over ethernet (poe) device controls

A system and method configured to improve the function of a network of power over ethernet (poe) devices. The system and method is configured such that a digital video recorder (dvr) actively monitors the poe devices using the poe device application programming interface (api).
Verint Americas Inc.

Managing ios-based mobile communication devices by creative use of callkit api protocols

Systems, methods, and devices for managing predetermined functions on a mobile device, the operating system (os) installed on the device including an event application programming interface (api) configured to enable voice over internet protocol (voip) applications to assume priority over other applications and functions of the mobile device when voip calls are detected. A mobile device management software application installed and running on the mobile device emulates a voip software application and uses event api calls to trick the os into believing that a voip call has been detected and, in response, causes the os to block or interfere with one or more predetermined functions on the mobile device based on the status and location of the mobile device..
Obdedge, Llc

Application platform with flexible permissioning

Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an application platform with flexible permissioning comprises: a service provider server adapted to interact with an application development server and a client device over a network, wherein the service provider server is adapted to implement at least one application programming interface (api); one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the application platform with flexible permissioning to: maintain, at the service provider server, a profile associated with at least one application developer using the application development server; receive an api call from the application developer; authenticate the application developer and authorize the api call; assign an access level to the application developer based on the profile associated with the application developer; and control permissions given to the application developer to perform operations available based on the assigned access level..
Paypal, Inc.

Extension configuration and interaction

Techniques for extension interaction with applications are described. Generally, an extension represents functionality for extending, modifying, customizing, and/or supplementing native functionality of an application.
Microsoft Technology Licensing, Llc

Flexible scripting platform for troubleshooting

A scripting service may provide a scripting platform to users of the scripting service. The users may cause execution of various scripts and/or modify or generate new scripts associated with the scripting service.
Amazon Technologies, Inc.

Outdated resource handling and multiple-version upgrade of cloud software

A system and method for seamlessly and automatically handling outdated resources in a cloud and/or performing a multiple-version upgrade within the cloud with little visibility of interim operations to end users are presented. Mechanisms ensure that outdated resources do not communicate with the rest of the cloud (for example, via distributed data models and application programming interfaces (apis) before they are upgraded to a target software level.
Amplidata N.v.

Intelligent gimbal assembly and unmanned vehicle

Simultaneous control of an unmanned vehicle and an on-board sensor is facilitated by the use of an intelligent gimbal assembly. The assembly includes a gimbal for carrying the sensor and a node controller for controlling the gimbal, sensor and the unmanned vehicle to which the gimbal assembly is attached.
Skyefish, Llc

Identifying and handling threats to data compute nodes in public cloud

Some embodiments provide a method for a public cloud manager that interacts with a management system of a public datacenter. The method receives a notification from a network controller that a second data compute node is compromised.
Nicira, Inc.

Communications interface for simulation systems and methods

Methods, systems, computer-readable media, and apparatuses for performing, providing, managing, executing, and/or running a spatially-optimized simulation are presented. In one or more embodiments, the spatially-optimized simulation may comprise a plurality of worker modules performing the simulation, a plurality of entities being simulated among the plurality of worker modules, a plurality of bridge modules facilitating communication between workers and an administrative layer including a plurality of chunk modules, at least one receptionist module, and at least one oracle module.
Improbable Worlds Ltd

Simulation systems and methods

Methods, systems, computer-readable media, and apparatuses for performing, providing, managing, executing, and/or running a spatially-optimized simulation are presented. In one or more embodiments, the spatially-optimized simulation may comprise a plurality of worker modules performing the simulation, a plurality of entities being simulated among the plurality of worker modules, a plurality of bridge modules facilitating communication between workers and an administrative layer including a plurality of chunk modules, at least one receptionist module, and at least one oracle module.
Improbable Worlds Ltd

Load balancing systems and methods

Methods, systems, computer-readable media, and apparatuses for performing, providing, managing, executing, and/or running a spatially-optimized simulation are presented. In one or more embodiments, the spatially-optimized simulation may comprise a plurality of worker modules performing the simulation, a plurality of entities being simulated among the plurality of worker modules, a plurality of bridge modules facilitating communication between workers and an administrative layer including a plurality of chunk modules, at least one receptionist module, and at least one oracle module.
Improbable Worlds Ltd

Software-defined computing system remote support

Methods, computing systems and computer program products implement embodiments of the present invention that include initializing, by a hypervisor executing on a processor, first and second virtual machines. A first software application configured to provide a service is executed on the first virtual machine, and a logical data connection is established between the first and the second virtual machines.
International Business Machines Corporation

Network authentication system extensions

Example implementations relate to network authentication system extensions. For example, network authentication system extensions may be installed and executed using a system.
Hewlett Packard Enterprise Development Lp

Method of gathering, storing, and distributing user defined geographic location identities

A system and method facilitated on the internet wherein users connected to the internet via a system comprised of, a computer driven mobile gps and/or agps enabled device, or, a stationary or portable computing device capable of connecting to the internet, a corresponding mobile application and/or website portal with user account access, and an application programming interface (api) for the user to interact with a user centric secure online database, engage with a method of constructing, saving, and sharing user defined specific geographic point location identity data sets or files exclusively that is not designed as a social interaction community involving tracking or proximity sensing of the user device. A system and method that is designed and intended for the purposes of constructing, saving, modifying, and sharing user defined geographic location identity data sets or files exclusively and absent requirements of engaging in actively tracking user devices..
Latloc, Llc

Methods and systems for providing application programming interfaces and application programming interface extensions to third party applications for optimizing and minimizing application traffic

Methods and systems for providing apis and api extensions to third party applications for optimizing and minimizing application traffic are provided. According to one aspect, a method for optimizing and minimizing application traffic in a wireless network includes defining an application programming interface (api) for controlling application traffic between an application client residing on a mobile device that operates within a wireless network and an application server not residing on the mobile device and using the api to optimize application traffic in the wireless network..
Ball Horticultural Company

Patient-owned electronic health records system and method

Embodiments of the invention provide a personal digital health portfolio system including a computer system coupled to a source of patient medical records or patient data with accessibility controlled by a secure authenticator structured for an uploader, downloader or reviewer of the patient medical records or patient data. An application programming interface (api) in data communication with a processor of the computer system can upload, download, or enable access of patient medical records or patient data stored on a non-transitory computer-readable storage medium.
Mindset Medical, Llc

System and metadata-driven external interface generation of application programming interfaces

In accordance with various embodiments, described herein is a system (data artificial intelligence system, data ai system), for use with a data integration or other computing environment, that leverages machine learning (ml, dataflow machine learning, dfml), for use in managing a flow of data (dataflow, df), and building complex dataflow software applications (dataflow applications, pipelines). In accordance with an embodiment, the system provides a programmatic interface, referred to herein in some embodiments as a foreign function interface, by which a user or third-party can define a service, functional and business types, semantic actions, and patterns or predefined complex data flows based on functional and business types, in a declarative manner, to extend the functionality of the system..
Oracle International Corporation

Voip and native carrier call integration

A method for native call and voip call integration is disclosed, comprising: receiving, at a switch in a mobile operator network, an incoming call for a mobile device; querying a convergence gateway from the soft switch via an application programming interface (api) at the convergence gateway to determine whether the mobile device is currently engaged in a voice over ip (voip) call using a voip calling software application on the mobile device; delivering the incoming call via the soft switch over ip as a voip call to the voip calling software application on the mobile device.. .
Parallel Wireless, Inc.

Methods and systems for accessing third-party services within applications

A client device provides to a user, in an application associated with a social-networking service provided by a server system, a link to a page associated with a third-party service provider. The third-party service provider is distinct from the social-networking service.
Facebook, Inc.

Homomorphic encryption in a healthcare network environment, system and methods

A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (api) compatible with the results set, the api facilitating encrypted analysis on the results set in the homomorphic work space.. .
Nanthealth, Inc

Systems and methods for monitoring health indicators associated with applications

Systems and methods for use in evaluating health associated with one or more applications are disclosed. One exemplary method includes exposing, by a computing device, an application programming interface (api) where the api defines a standard form associated with health indicator packets, and receiving, at the computing device, via the api, a health indicator packet for a health indicator from at least one application where the health indicator packet conforms to the standard form and including a value for the health indicator for the at least one application.
Mastercard International Incorporated

Base user defined functions

Methods, devices, and techniques for base user defined functions in a database management system are discussed herein. For example, in one aspect, a query request is received from a computer device.
Hewlett Packard Enterprise Development Lp

End-to- end application tracking framework

Novel tools and techniques for tracing application execution and performance. Some of the tools provide a framework for monitoring the execution and/or performance of applications in an execution chain.
Qwest Communications International Inc.

Fast and accurate identification of message-based api calls in application binaries

Disclosed are various embodiments for fast and accurate identification of message-based application programming interface (api) calls in applications. A set of compliance rules is obtained from a compliance rule store.
Airwatch Llc

Extending object-schema-based application programming interfaces (apis)

The present disclosure relates to extending object-schema-based application programming interfaces (apis). According to one embodiment, a method generally includes receiving, from a user, a schema defining an extension to the api and a reference to a parent node in a graph projection of the api.
Intuit Inc.

Detecting scripted or otherwise anomalous interactions with social media platform

A computer system receives an account creation request for a social media platform created and sent using a frontend component. An application programming interface (api) call sequence associated with the account creation request is received from the frontend component.
Twitter, Inc.

Application programming interface for providing access to computing platform definitions

Aspects of the disclosure are directed to providing access to the contents of a computing platform definition. A computing platform definition includes entries indicating devices and executables to deploy to a computing platform.
Bank Of America Corporation

Key value file system

A file system includes: an application programming interface (api) configured to provide a file system access to an application running on a host computer; a key value file system configured to represent a file or a directory as an inode including one or more key-value pairs; a virtual file system configured to direct a file system call received from the application to the key value file system; and a key value api configured to provide the file system access to data stored in a data storage device. Each key-value pair contained in the inode includes a name of the file or the directory as a key and an identifier of a container that is associated with the file or the directory as a value.
Suphatchatwong Innovation Co., Ltd.

Distributed computing in r

Examples disclosed herein relate to distributed computing in r. Some examples disclosed herein may include identifying a distributed multivariate apply (dmapply) operation and an invocation of a distributed computing backend and determining a function referenced in the dmapply operation.
Hewlett Packard Enterprise Development Lp

Token based network service among iot applications

One embodiment of the invention is directed to a computer-implemented method comprising, receiving registration information for one or more application programming interfaces (apis) at a registrar computer system associated with a federated network of computing devices. The method further comprises generating a unique address for each api included in the registration information.

Treatment of cloud-based and local attachments in communication applications

Users of communication applications may be enabled to select from a user-friendly and efficiently provided list of files that may be of interest to them to attach to a correspondence and send to one or more recipients. For example, the communication application may retrieve information from one or more application programming interfaces (apis) associated with applications of the user to determine the list of files.
Microsoft Technology Licensing, Llc

Managing a cloud service

A technique includes providing at least one service blueprint to orchestrate application programming interfaces to manage the lifecycle of at least one cloud service.. .
Hewlett Packard Enterprise Development Lp

Mobile push payments

There is described herein a method of conducting a mobile transaction, comprising: a card processor server receiving an authorisation message from an application programming interface (api) running on a sending institution server, the authorisation message comprising a push code indicating that the transaction should be processed immediately; and the card processor server transmitting a guarantee message to an api running on a receiving institution server, the guarantee message comprising an urgency code indicating that funds should be posted to a merchant's account immediately. There is further described a system comprising a card processor server, an api running on a sending institution server, an api running on a receiving institution server, a consumer mobile user device and a merchant user device, the card processor server being configured to perform the aforementioned method..
Mastercard International Incorporated

Multi-media quality of service and quality of user experience optimization through voice prioritization

Techniques to optimize quality of service and quality of user experience for multi-media mobile applications are described. A traffic detection component detects the video and audio data components of a video call.
T-mobile Usa, Inc.

Apparatus and software-agnostic multi-gpu processing

An apparatus and method are described for a software agnostic multi-gpu implementation. For example, one embodiment of an apparatus comprises: a plurality of physical graphics processor units (pgpus) to execute graphics commands; a graphics driver to receive graphics commands generated from applications via a graphics application programming interface (api); a mediator to receive commands directed to pgpu resources from the graphics driver, the mediator to map the plurality of pgpus into a virtual graphics processor unit (vgpu) visible to the graphics driver, the mediator further including a load balancer to distribute commands received by the vgpu to each of the plurality of pgpus in accordance with a load balancing policy..
Intel Corporation

Graphics pipeline that supports multiple concurrent processes

A graphics processing unit (gpu) concurrently executes kernel codes programmed in more than one programming framework. The gpu includes a first command decoder that decodes a first set of commands issued by a first application programming interface (api) for executing a first kernel code.
Mediatek Inc.

Social network transaction processing system

A system for transferring funds using social network connections. The system sends application programming interface (api) requests to social networks to obtain “friend” information and create accounts into which funds are deposited and which may be retrieved by recipients via hyperlinks in messages provided through social networks.
Dwolla, Inc.

Reprogrammable point-of-sale transaction flows

Techniques and arrangements for allowing modification of transaction flows, user interfaces (uis), receipt configuration and control of buyer-facing displays associated with transactions between a payment service, a merchant and a buyer are provided. Payment service payment functionality is exposed by the payment service via one or more application programming interfaces (api)s, software development kits (sdks), or some other web-based communication technique (e.g., a uniform resource locator).
Square, Inc.

Reprogrammable point-of-sale transaction flows

Techniques and arrangements for allowing modification of transaction flows, user interfaces (uis), receipt configuration and control of buyer-facing displays associated with transactions between a payment service, a merchant and a buyer are provided. Payment service payment functionality is exposed by the payment service via one or more application programming interfaces (api)s, software development kits (sdks), or some other web-based communication technique (e.g., a uniform resource locator).
Square, Inc.

Reprogrammable point-of-sale transaction flows

Techniques and arrangements for allowing modification of transaction flows, user interfaces (uis), receipt configuration and control of buyer-facing displays associated with transactions between a payment service, a merchant and a buyer are provided. Payment service payment functionality is exposed by the payment service via one or more application programming interfaces (api)s, software development kits (sdks), or some other web-based communication technique (e.g., a uniform resource locator).
Square, Inc.

Reprogrammable point-of-sale transaction flows

Techniques and arrangements for allowing modification of transaction flows, user interfaces (uis), receipt configuration and control of buyer-facing displays associated with transactions between a payment service, a merchant and a buyer are provided. Payment service payment functionality is exposed by the payment service via one or more application programming interfaces (api)s, software development kits (sdks), or some other web-based communication technique (e.g., a uniform resource locator).
Square, Inc.

Reprogrammable point-of-sale transaction flows

Techniques and arrangements for allowing modification of transaction flows, user interfaces (uis), receipt configuration and control of buyer-facing displays associated with transactions between a payment service, a merchant and a buyer are provided. Payment service payment functionality is exposed by the payment service via one or more application programming interfaces (api)s, software development kits (sdks), or some other web-based communication technique (e.g., a uniform resource locator).
Square, Inc.

Portable computerized interactive training profile

A method for maintaining a user profile representing evolving user profile data of a first user, the user profile accessible by a first organization and a second organization without communication between the first organization and the second organization. The method includes creating the user profile by a remote computer based on feedbacks from a corresponding users of the first organization communicating with the remote computer via an application programming interface operating on the remote computer.
Adp, Llc

Systems and methods for bi-directional database application programming interface, extract transform and load system, and user computing device

Systems and methods are provided for improved integration between database systems. Data from multiple disparate computing systems is transmitted via bi-directional communication interfaces.
Hart, Inc.

System architecture for a wearable device

Apparatuses and methods that generate and send interactive elements to a plurality of wearable electronic devices are discussed. One or more mobile applications and one or more remote backend servers may cooperate to send information in the interactive elements to the instances of the time synchronous application resident in their wearable electronic device in order to bring different types of content such as timely and relevant data, events, and notifications to a user of that wearable electronic device without the user's intervention to actively retrieve the different types of content.
Pebble Technology, Corp.

Modifying authentication for an application programming interface

Application programming interfaces (apis) can be unintentionally exposed and allow for potentially undesirable use of corporate resources. An api call filtering system configured to monitor api call requests received via an endpoint and api call responses received via a supporting service of an api or web service.
Shape Security, Inc.

System and managing cryptocurrency payments via the payment request api

Disclosed is an approach for processing cryptocurrency payments via a payment request application programming interface. A method includes receiving, from a site, at a browser and via the payment request application programming interface, a request associated with a potential purchase, wherein the request includes an identification of a cryptocurrency payment method accepted by the site and transmitting, to the site, from the browser and via the api, data indicating that a user of the browser can pay for the potential purchase via the cryptocurrency payment method accepted by the site.
Monticello Enterprises Llc

Automated agile roadmap decision management system

Systems and methods for managing allocation of resources among plural offerings of an enterprise are disclosed. A method includes: maintaining, by a computer device, a ranked list of the offerings, wherein the ranked list is viewable at plural user devices within the enterprise; receiving, by the computer device, an input to link an item to one of the offerings included in the ranked list; accessing, by the computer device, stored cost/benefit data defined for the item, wherein the accessing comprises using an application programming interface (api) call; updating, by the computer device, a score of the one of the offerings based on the cost/benefit data defined for the item; updating, by the computer device, the ranked list based on the updated score..
International Business Machines Corporation

Virtual service provider zones

A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received by the service proxy, the service proxy encrypts the data and stores the data in encrypted form at the service.
Amazon Technologies, Inc.

Method and system for connecting heterogeneous internet of things devices for workflow automation

A method and computer program product of an internet of things (iot) platform for workflow automation of heterogeneous iot devices. The platform is implemented as a cloud service, and the iot devices are connected to the platform via application programming interfaces.
Ananse Incorporated

System and providing a credential management api

Disclosed is an approach for enabling a user to login to a site without needing to manually type in credentials. A method includes receiving, from a site, at a browser and via a browser credential management application programming interface that defines a protocol for communicating data between the site and the browser for enabling a user to login to the site, a request associated with a login credential required for the site, retrieving, based on the request, user data and transmitting, to the site, from the browser and via the browser credential management application programming interface, a response to the request.
Monticello Enterprises Llc

Flow controller automatically throttling rate of service provided by web api

A mechanism is provided in a data processing system for automatically throttling the rate of service provided by a web application programming interface (api) for a software service. A flow controller executing on the data processing system assigns a queue to each consumer of the software service.
International Business Machines Corporation

Assessing penalties for sdks that violate policies in mobile apps

A system, method and program product for processing software development kits (sdks). A system is provided that includes a container creation system that wraps an inputted sdk in a penalty container to create a wrapped sdk, wherein the wrapped sdk includes re-instrumented code that redirects application programming interface (api) calls between the sdk and an associated app and operating system through a wrapper in order to monitor runtime behavior; wherein the container creation system instantiates a policy module that is configurable by an sdk provider and app developer to implement a mutual policy configuration for the penalty container; and wherein the penalty container includes a penalty manager that assesses penalties to the sdk provider based on sdk violations of the mutual policy configuration..
International Business Machines Corporation

Modified jvm with multi-tenant application domains and class differentiation

A method and system for operating a modified java virtual machine (jvm) which is able to simultaneously host multiple java application programs is disclosed. In a first modification the jvm is modified to permit multiple class definitions of some of the java application programming interface (api) classes, so called non-sensitive classes, to be loaded multiple times but restrict other java api classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader.
Waratek Limited

Containerizing a block storage service

Containerization of a block storage service. A scheduler component of a block storage service is initiated in a first container via a containerization technology.
Red Hat, Inc.

Navigation api for linking software applications

Provided are systems and methods for linking two or more software applications using a navigation application programming interface. In one embodiment, a first software application on a computing device can invoke a second software application on the computing device.
Google Inc.

System, method and computer program product for sharing content via links

In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via links can enable customizable features associated with the operations related to those links.
Salesforce.com, Inc.

Cross platform social networking authentication system

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information.
Zynga Inc.

System and neutral application programming interface

Systems and methods for neutral application programming interfaces are disclosed. In one embodiment, the disclosure relates to a system for neutral application programming interfaces.
Umbra Technologies Ltd.

Unmanned ground and aerial vehicle attachment system

Techniques are disclosed for hot swapping one or more module devices on a single host device. A module device can perform module-specific tasks that are defined in its module software driver.

Viewpoint navigation control for three-dimensional visualization using two-dimensional layouts

Systems and methods for supplying an open interface (e.g., web pages) for viewpoint navigation control of a three-dimensional (3-d) visualization of an object that is simple to create and fast and easy to use. This viewpoint navigation control application allows users to control the viewpoint in a 3-d environment by interacting with (e.g., clicking on) a 2-d hyperlink layout within a web browser (or other 2-d viewer with hyperlink capability).
The Boeing Company

Application programming interfaces for scrolling operations

At least certain embodiments of the present disclosure include an environment with user interface software interacting with a software application. A method for operating through an application programming interface (api) in this environment includes transferring a set bounce call.
Apple Inc.

Method and system of decoupling applications from underlying communication media through shim layers

In one example aspect, a computerized system of a shim layer that provides an application-level network overlay functionality without requiring any packet-level processing includes the step of implementing a shim layer underneath an application endpoint of an application, wherein the shim layer intercepts an application programming interface (api) between the application and the network and modifies a set of parameters exchanged in the api such that a network overlay is provided to the application. The method includes the step of assigning an identifier to the application endpoint, wherein the identifier can remain persistent when the application goes down and comes back up, and wherein the identifier can remain persistent when the application changes locations in a network..

Server-to-server content distribution

A non-limiting example method includes receiving a request to publish content that is stored on a user storage server in a personal data store. The method includes preparing the content for publication and moving the prepared content to a content repository to generate published content.
Microsoft Technology Licensing, Llc.

Sharing user context and preferences

Technology for interoperability is disclosed by enabling the sharing of user context or preferences for a computing experience across computing devices, operating systems, applications, or locations. A platform and application programming interface (api) are provided for computer applications and services to store and retrieve context data associated with a computing experience.
Microsoft Technology Licensing, Llc

Systems and methods for authenticating network messages

Networks and methods for use in authenticating messages are provided. One exemplary method generally includes receiving a message from a client, where the message includes a client certificate.
Mastercard International Incorporated

Universal application programming interface for augmented reality

An application programming interface (api) server accesses first data of a non-augmented reality (ar) application. The first data including first content data, first control data, first user interface data, and a first data format.
Daqri, Llc

Tool experience aggregator

Various examples are directed to systems and methods for aggregating user tool experience. A record ingestion circuit may receive action record data from a user tool that describes an action performed with the user tool by the user.

Application programming interface (api) hub

Embodiments are directed to a system for controlling access to remote services, comprising an application programming interface (api) hub configured to provide an interface between a client application and one or more remote services. The client application accesses the api hub using a common data protocol, such as odata, that is not associated with the remote services.
Microsoft Technology Licensing, Llc.

On-demand network code execution with cross-account aliases

Systems and methods are described for utilizing cross-account access to tasks on an on-demand code execution environment or other distributed code execution environment to implement an application programming interface (api) on a network-accessible service. An on-demand code execution environment can utilize pre-initialized virtual machine instances to enable execution of user-specified code in a rapid manner, without delays typically caused by initialization of the virtual machine instances.
Amazon Technologies, Inc.