06th week of 2016 patent applcation highlights part 63 |
Patent application number | Title | Published |
20160043914 | REMOTELY MONITORING NETWORK DIAGNOSTICS - Devices, methods, and systems for remotely monitoring network diagnostics are described herein. One method includes monitoring a control system network of a site for a plurality of diagnostic messages, wherein the diagnostic messages include a set of parameters, collecting diagnostic data associated with the diagnostic messages, correcting a parameter within the set of parameters to conform to a parameter threshold limit, and alerting a user upon the collected diagnostic data having an abnormal parameter within the set of parameters. | 2016-02-11 |
20160043915 | Detecting Trends in Electronic Communications for Steganography Analysis - Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file. | 2016-02-11 |
20160043916 | MONITORING STREAMING MEDIA CONTENT - Methods, apparatus and articles of manufacture to monitor streaming media are disclosed. Example media monitoring methods disclosed herein include extracting metering data having a first format from media. In some disclosed examples, the media is to be provided to a media device via a transport stream, and the extracted metering data identifies at least one of the media or a source of the media. Disclosed example methods also include transcoding the extracted metering data to form transcoded metering data having a second format different from the first format. Disclosed example methods further include, prior to transmitting the transport stream to provide the media to the media device, transmitting the transcoded metering data to the media device for receipt by a meter executed by the media device. | 2016-02-11 |
20160043917 | MONITORING SMS MESSAGES RELATED TO SERVER/CUSTOMER INTERACTIONS - A system, method and/or computer program product monitors delivery of text messages related to network traffic between a user's electronic system and a server. A capture server captures a network traffic message from a user's electronic system to a solution server. In response to capturing a request for specific information from the solution server, the capture server captures a related text message from the solution server to a text message gateway. The capture server then monitors a text message log within the user's electronic system, which contains a record of text messages received by the user's electronic system. In response to the text message log containing no record of the text message from the solution server within a predetermined length of wait time, the capture server generates and transmits an alert message to the solution server. | 2016-02-11 |
20160043918 | Self-Organizing Multiple Appliance Network Connectivity Apparatus For Controlling Plurality Of Appliances - An appliance network connectivity apparatus includes a voltage sensor that generates a signal at an output that is proportional to a voltage provided to the appliance. A current sensor generates a signal at an output that is proportional to a current flowing through the appliance. A processor determines the electrical characteristics of power consumed by the appliance and executes web server software for communicating data through a network. A relay controls power from the power source to the appliance. A memory stores the electrical characteristics. A network interface provides the electrical characteristics to the network. | 2016-02-11 |
20160043919 | IDENTIFYING UNAUTHORIZED CHANGES TO NETWORK ELEMENTS AND DETERMINING THE IMPACT OF UNAUTHORIZED CHANGES TO NETWORK ELEMENTS ON NETWORK SERVICES - Methods of managing an information technology (IT) infrastructure include detecting by a configuration management system an unauthorized change to one of a plurality of network elements, determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure, and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure. Related systems and computer program products are disclosed. | 2016-02-11 |
20160043920 | CONNECTION MONITORING DEVICE AND CONNECTION MONITORING METHOD - A connection monitoring device includes: first and second connection systems in which monitored devices are connected in cascade in forward and backward directions, respectively; a storage unit to store configuration information on connection configuration of the monitored devices and connection permitting information including information on a path permitted between the connection monitoring device and the monitored devices within paths undefined in the configuration information; and a control unit to change from a first monitoring state in which the connection configuration of the monitored devices is monitored in accordance with the configuration information to a second monitoring state in which the connection configuration of the monitored devices is monitored in accordance with the configuration information and the connection permitting information in a case where a configuration modification, accompanied with cutting of any one of connections of the first and second connection systems, of the monitored devices is performed. | 2016-02-11 |
20160043921 | DETERMINING LIVENESS OF PROTOCOLS AND INTERFACES - The liveness of routing protocols can be determined using a mechanism to aggregate liveness information for the protocols. The ability of an interface to send and receive packets and the forwarding capability of an interface can also be determined using this mechanism. Since liveness information for multiple protocols, the liveness of interfaces, the forwarding capability of interfaces, or both, may be aggregated in a message, the message can be sent more often than could individual messages for each of the multiple protocols. This allows fast detection of failures, and sending connectivity messages for the individual protocols, such as neighbor “hellos,” to be sent less often. | 2016-02-11 |
20160043922 | USING LIVENESS OF PROTOCOLS AND/OR INTERFACES TO MAKE ROUTING DECISIONS - The liveness of routing protocols can be determined using a mechanism to aggregate liveness information for the protocols. The ability of an interface to send and receive packets and the forwarding capability of an interface can also be determined using this mechanism. Since liveness information for multiple protocols, the liveness of interfaces, the forwarding capability of interfaces, or both, may be aggregated in a message, the message can be sent more often than could individual messages for each of the multiple protocols. This allows fast detection of failures, and sending connectivity messages for the individual protocols, such as neighbor “hellos,” to be sent less often. | 2016-02-11 |
20160043923 | INTERNET INFRASTRUCTURE MEASUREMENT METHOD AND SYSTEM ADAPTED TO SESSION VOLUME - The technology disclosed relates to refined survey of Internet infrastructures. A pattern of measurements is disclosed that can improve data collection by increasing the number of measurements per survey session according to a function described in areas that have few measurements, and decreasing the average number of measurements per session in heavily measured areas. These are new problems that arise from implementation of technology developed by these inventors and their colleagues. | 2016-02-11 |
20160043924 | SYSTEM AND METHOD FOR MONITORING USER ACTIVITY ON A PLURALITY OF NETWORKED COMPUTING DEVICES - Among other things, we describe monitoring and interactively supervising user activity on a plurality of networked computing devices. Some embodiments relate to methods and systems configured for remote automatic selection and monitoring of a most actively used computer device from among a plurality of computer devices accessible to and logged into by a specific user. Such methods and systems may also involve the display of the user's screen on a dedicated monitoring display device. Where multiple users are monitored, the displays of the user devices that are most actively used may be reproduced on the monitoring device display in dedicated view ports for the users being monitored. Embodiments may involve the use of software agents installed and executing on each user device that is turned on. Such software agents assist in allowing the monitoring device to determine which of the user devices is most actively used by a particular user. | 2016-02-11 |
20160043925 | Estimating Bandwidth in a Network - A method comprising: collecting respective observations of end-end bandwidth experienced on different occasions by multiple past communications occurring over different respective observed paths over a network, each path comprising a respective plurality of network components; modelling each of the respective network components with a bandwidth probability function characterized by one or more parameters; and estimating a component bandwidth or component bandwidth probability density for each of the network components based on the modelling, by determining respective values for said parameters such that a combination of the component bandwidths or bandwidth probability densities for the network components in the observed paths approximately matches, according to an optimization process, the observations of the end-to-end bandwidth experienced by the past communications over the observed paths. | 2016-02-11 |
20160043926 | METHOD AND APPARATUS FOR DISTRIBUTED CONTROL OF AN INTERFACING-DEVICE NETWORK - A local controller maintains a local database which stores information associated with a set of interfacing devices of a local-area network. The local database can include a database mirror for a remote database, of a remote controller, that stores information for a set of provisioned interfacing devices. When a remote controller hosting the remote database is offline, the local controller can maintain primary control of interfacing devices within the local area network. However, when the local controller determines that the remote controller has come online, the local controller can rescind primary control of interfacing devices within the local area network to the remote controller. | 2016-02-11 |
20160043927 | HIERARCHICAL NETWORK CONFIGURATION - Systems, methods, apparatus and computer-readable medium are described for improving efficiency and robustness for configuring data-planes. Furthermore, systems, methods, and devices are provided for efficiently storing, maintaining and retrieving configuration information for data-planes. The configuration information may be stored and retrieved from a hierarchy of information stored in memory, such as a hierarchy of information in memory, wherein the hierarchy of information has configuration data for one or more data-planes and represents one or more command sequences issued by a controller of the control-plane to one or more data-planes. In certain implementations, the hierarchy of information comprises a plurality of nodes, wherein each node represents at least a portion of a command sequence issued by the controller. The command sequences may be configuration command sequences issued by the control plane to configure the data-planes. | 2016-02-11 |
20160043928 | SYSTEM AND METHOD FOR REMOTE MANAGEMENT OF SALE TRANSACTION DATA - This invention discloses a novel system and method and system for sharing a data item among a plurality of computers connected in an arbitrary network topology. In the preferred embodiment, each of the plurality of computers has a local copy of the data item, but can only edit the copy by obtaining a token from the current token owner, thereby becoming a new current token owner. When the token owner makes a change to the data item, the change is broadcast to the other computers, along with the identity of the new current token owner. Routing of token requests and broadcasts is accomplished by means of each computer calculating a routing table based on information it receives from those computers to which it is directly connected on the network. | 2016-02-11 |
20160043929 | PROVIDING CLOUD-BASED SERVICES USING DYNAMIC NETWORK VIRTUALIZATION - The invention is directed to providing cloud-based services using dynamic network virtualization. Embodiments of the invention provide a cloud-based service over a system that has a dynamic network virtualization architecture. The architecture includes a set of distributed forwarding elements with centralized control, and at least one virtual machine that is bound to one of the forwarding elements. These features enable the virtual machine to be migrated across a wide area network while maintaining its original IP address and service continuity. | 2016-02-11 |
20160043930 | METHOD, DEVICE, AND COMPUTER STORAGE MEDIUM FOR IMPLEMENTING IP ADDRESS ADVERTISEMENT - Disclosed are a method, device, and computer storage medium for implementing IP address advertisement. An advertisement for controlling LSA | 2016-02-11 |
20160043931 | Method for Switching a Communication Connection from a First Connection Path to a Second Connection Path - There are described packets transmitted via the first connection path comprise a first packet propagation time. Said packets are temporarily stored in a first intermediate memory of a receiver unit. The packets transmitted via the second connection path comprise a second packet propagation time and are temporarily stored in a second intermediate memory of the receiver unit. All packets stored in the first step in the first intermediate memory are emitted. Subsequently, packets stored in the second intermediate memory are emitted. According to a first embodiment, each x | 2016-02-11 |
20160043932 | MULTICAST ROUTING SYSTEM AND METHOD - There is described a method of managing routing paths, in particular multicast routing paths, in a content delivery network. The method includes determining, according to a unicast routing protocol, a first link cost for a first routing path and determining a second link cost for a second routing path, the second routing path comprising a first component comprising a link cost to a router that is part of a multicast group and a second component comprising a link cost for the multicast tree from the router. An adjustment factor is then determined based on information received from the content delivery network. The adjustment factor is applied to the second link cost. The adjusted second link cost and the first link cost are analysed to determine an adjusted least cost path in the content delivery network and the adjusted second link cost is selectively output to a routing database to influence routing in the content delivery network. | 2016-02-11 |
20160043933 | PEER-INFLUENCED AGGREGATE MEMBER SELECTION - Embodiments of the present invention provide the ability to allow a peer or remote device to influence aggregate member selection in an aggregate group of members for a data flow. In embodiments, local-side weights and remote-side weights may be assigned to each member in an aggregate group of members. Using these weights, a global value for each member in the aggregate group may be calculated. Given these global values, a member from the aggregate group of members may be selected for egress of the new flow based upon the global values. | 2016-02-11 |
20160043934 | Routing Of Point-to-Multipoint Services in a Multi-Domain Network - A multi-domain network ( | 2016-02-11 |
20160043935 | PROCESSING OF MULTICAST TRAFFIC IN COMPUTER NETWORKS - Each router in a group of routers ( | 2016-02-11 |
20160043936 | METHOD AND APPARATUS FOR PROVIDING RESILIENCY IN MULTICAST NETWORKS - Techniques for minimizing packet loss of multicast traffic stream when a failure occurs are described herein. In one embodiment of the invention, a network element separately joins a multicast group through a first and second path respectively. During uninterrupted operation, the network element processes the packets of the multicast traffic stream it receives through the first path and drops the packets of the equivalent multicast traffic stream it receives through the second path. Upon an interruption of the packets of the multicast traffic stream being received through the first path, the network element transitions to processing the packets of the equivalent multicast traffic stream it receives through the second path. Other methods and apparatuses are also described. | 2016-02-11 |
20160043937 | USER EQUIPMENT AND METHOD FOR RADIO ACCESS NETWORK ASSISTED WLAN INTERWORKING - A User Equipment is disclosed that is configured to perform traffic steering from a RAN (e.g., 3GPP system) to a WLAN, or vice versa, based on one or more rules. In an embodiment, the UE performs the traffic steering to the WLAN based on whether data is to be transmitted from or received by the UE. In another embodiment, the UE performs the traffic steering based on receipt of RAN assistance parameters without checking the status of the UE upload buffers or the eNB/AP download buffers. In yet another embodiment, the UE performs the traffic steering based on the latest RAN assistance information and a time elapsed since the last transmission or receipt of data. | 2016-02-11 |
20160043938 | DATA PROCESSING LOCK SIGNAL TRANSMISSION - In accordance with one aspect of the present description, a node of the distributed computing system has multiple communication paths to a data processing resource lock which controls access to shared resources, for example. In this manner, at least one redundant communication path is provided between a node and a data processing resource lock to facilitate reliable transmission of data processing resource lock signals between the node and the data processing resource lock. Other features and aspects may be realized, depending upon the particular application. | 2016-02-11 |
20160043939 | Redirecting Telephone Call to Packet-Switched Data Call Via Voicemail - In embodiments of the disclosed technology, devices and methods for redirecting a telephone call from a public-switched telephone to a packet-switched data network. The phone call is initially received via the public-switched telephone network having a dialed number associated with a hand-held wireless device of a called party. Upon initialization of the phone call, a route is determined from the telecommunications switch to the hand-held wireless device of the called party via a packet-switched network. The bandwidth of the packet-switched network is then detected to determine the ability of the network to handle the call. If the packet-switched network is determined to be capable of handling the call, the call is forwarded over the packet-switched data, thereby reducing or eliminating charges for wireless minutes. | 2016-02-11 |
20160043940 | REPUTATION-BASED INSTRUCTION PROCESSING OVER AN INFORMATION CENTRIC NETWORK - A packet-forwarding network node can process a programmable packet based on a reputation value for a name prefix to perform a customized operation on a local resource. The programmable packet can include a name prefix, and a header comprising reputation criteria for the packet's name prefix and one or more resource fields. A resource field can include instructions that perform an operation on a corresponding resource of the network node. When the network node receives the programmable packet, the node determines a reputation value for the name prefix at the local node, and compares this reputation value to the packet's reputation criteria. If the reputation value for the name prefix at the local node satisfies the reputation criteria, the node proceeds to execute the one or more instructions of the respective resource field to perform the operation on the corresponding resource. | 2016-02-11 |
20160043941 | METHOD AND SYSTEM FOR CONTROLLING AN UNDERLYING PHYSICAL NETWORK BY A SOFTWARE DEFINED NETWORK - A method for controlling an underlying physical network by a software defined network includes providing a physical network that comprises routers for routing data traffic on a data communication plane, providing a software defined network that comprises at least one controller and at least one feature on a control plane for controlling the data forwarding elements of the physical network, communicating, by the data forwarding elements of the data communication plane, with the controller of the control plane on a dedicated control channel, communicating, by the controller, with the at least one feature on a dedicated feature channel in the control plane, and exchanging, via the data communication plane, at least a portion of the data traffic in the control plane. | 2016-02-11 |
20160043942 | LAYER-3 MESH CONNECTIVITY OF WIRELESS LOCAL NETWORKS - A first wireless device of a wireless local network is operated in an un-associated data transfer mode at a layer-2 level. In the un-associated data transfer mode, communication between the first wireless device and a second wireless device in the wireless local network is allowed to take place without prior authentication and association between the two wireless devices. The first wireless device participates in formulation of routing information in routing nodes of a wireless mesh network while operating in the un-associated data transfer mode. If configured as an end device, the first wireless device thereafter exchanges data packets with another wireless device in the mesh. If configured as a router, the first wireless device routes packets to corresponding wireless devices in the mesh. Operation in the un-associated data transfer mode may result in reduction in power consumption of nodes in the mesh, as well as increased data throughput. | 2016-02-11 |
20160043943 | APPLICATION WIRE - Transferring data over a network includes identifying an application flow and mapping the application flow to a network bound connection. | 2016-02-11 |
20160043944 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR AUGMENTING A PHYSICAL SYSTEM UTILIZING A NETWORK FUNCTION VIRTUALIZATION ORCHESTRATOR (NFV-O) - A system, method, and computer program product are provided for augmenting a physical network system utilizing a network function virtualization orchestrator (NFV-O). In use, data traffic is monitored utilizing a Network Function Virtualization Orchestrator (NFV-O) module associated with at least a portion of a physical network system, the NFV-O module being operable to manage data flow associated with one or more Virtual Network Functions (VNFs) and one or more physical elements of the physical network system. Additionally, it is determined whether flow of the data traffic should be modified based on at least one of a traffic load or a traffic type utilizing the NFV-O module integrated in the physical network system. Further, at least a portion of the data traffic is directed from at least one of the physical elements to at least one of the VNFs when it is determined that the flow of the data traffic should be modified. | 2016-02-11 |
20160043945 | SOURCE-BASED NETWORK ROUTING - A message center for source-based message routing may include a processor and a memory communicatively connected to the processor. The processor may be configured to receive a first message having a first message transfer layer indicating a first destination address and a first message transaction layer, receive a second message having a second message transfer layer indicating a second destination address and a second message transaction layer indicating an alternate routing, read at least the first message transfer layer of the first message, read at least the second message transaction layer of the second message, route the first message based in part on the first destination address of the first message transfer layer, and route the second message based in part on the second destination address of the second message transfer layer and the alternate routing of the second message transaction layer. | 2016-02-11 |
20160043946 | SYSTEMS AND METHODS FOR AGGREGATING MULTI-USER MEDIA ACCESS CONTROL PROTOCOL DATA UNIT FRAMES IN A WIRELESS NETWORK - Systems, methods, and apparatuses for aggregating multi-user media access control protocol data units (MPDU) frame in a wireless network are provided. One aspect of this disclosure provides a method of wireless communication. The method includes generating, by an apparatus, an aggregated media access control protocol data unit (A-MPDU) frame comprising a plurality of media access control protocol data unit (MPDU) frames. A first MPDU frame of the plurality of MPDU frames is intended for at least a first device of a first type and a second MPDU frame of the plurality of MPDU frames is intended for at least a second device of a second type. The method further comprises inserting a value that is not defined for the second device into a media access control (MAC) header field of the first MPDU frame intended for the first device or the second MPDU frame intended for the second device. | 2016-02-11 |
20160043947 | SUBSCRIBER STATION FOR A BUS SYSTEM AND METHOD FOR BROADBAND CAN COMMUNICATION - A user station for a bus system implementing broadband CAN communication includes: a communication control device for creating or reading at least one message for/from at least one further user station of the bus system, in which exclusive, collision-free access of a user station to a bus of the bus system is ensured at least intermittently; and a data interleaving device for interleaving data packets of at least two messages into a single message, so that the data packets are situated in one data segment of the single message. The single message has a shared outer frame header for the data packets in front of the data segment and a shared outer frame end for the data packets after the data segment. | 2016-02-11 |
20160043948 | COMMUNICATIONS OVER MULTIPLE PROTOCOL INTERFACES IN A COMPUTING ENVIRONMENT - According to one aspect of the present disclosure, a system for communications over multiple protocol interfaces in a computing environment includes a processor and a memory storing interface logic executable by the processor to: identify a first communications protocol of a network interface for egress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol to be used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol; generate an application layer header for the data packet communications; store values of the fragmentation data in select fields of the application layer header; fragment the data packet communications according to the data packet fragmentation protocol; and transmit the data packet communications including the application layer header over the identified network interface. | 2016-02-11 |
20160043949 | MAKING A FRAME RECEIVE DECISION IN A RECEIVER PHY LAYER - According to an example, a receiver having a physical (PHY) layer may receive a portion of a frame from a transmitter, in which the portion of the frame comprises information available at the PHY layer. A signature of the transmitter may be determined based upon the information available at the PHY layer and a hardware component in the PHY layer may determine whether to continue to receive the frame based upon the determined signature of the transmitter. | 2016-02-11 |
20160043950 | PROGRESSIVE MAC ADDRESS LEARNING - One embodiment of the present invention provides a switch in a network of interconnected switches. The switch includes a storage device, a hardware management apparatus, and a layer-2 management apparatus. The storage device stores a forwarding table, which includes an entry comprising a MAC address and an egress port for the MAC address. The hardware management apparatus determines whether a destination MAC address of a frame is present in a hardware table in memory of the switch. The layer-2 management apparatus, in response to a determination that the destination MAC address is not present in the hardware table, looks up a first entry comprising the destination MAC address in the forwarding table, and creates a second entry comprising the destination MAC address in the hardware table based on the first entry. | 2016-02-11 |
20160043951 | ROUTING REQUESTS WITH VARIED PROTOCOLS TO THE SAME ENDPOINT WITHIN A CLUSTER - Embodiments are directed to routing requests with different protocols to the same destination. In one scenario, a computer system receives a request that uses a specified protocol. The request includes a request source identifier and a request destination identifier. The computer system identifies, based on both the request source identifier and the request destination identifier, a destination to send the request to and generates a routing entry for the request that indicates which destination the first request was sent to. The computer system receives another request that uses a different protocol. This request includes a request source identifier and a request destination identifier of its own. The computer system determines that the request source identifier and request destination identifier of the subsequent request match those of the generated routing entry, and routes the subsequent request to the destination indicated in the routing entry. | 2016-02-11 |
20160043952 | MECHANISMS TO SUPPORT SERVICE CHAIN GRAPHS IN A COMMUNICATION NETWORK - A novel scheme is defined for supporting service graphs to allow specific service functions to be applied to selected subsets of packet flows. According to one or more embodiments, a service graph is modeled as chains or sequences of “flow steering entities” and “service instances.” According to an embodiment, a flow steering entity (FSE) is configured to identify the flow, and select the next hop service instance in the chain. After a service instance returns the flow packet, the FSE steers the packet to the next FSE in the graph. An initial FSE is used to select matching traffic to enter the service graph. Wherever path forking and merging is required in the service graph, additional classifiers are positioned with the FSE to steer a subset of traffic along different paths of service function instances. | 2016-02-11 |
20160043953 | METHOD AND SYSTEM FOR CONTROLLING TRAFFIC IN A WIRELESS LAN - Embodiments provide a traffic control system for WLAN access points. The traffic control system works in dependence on a first input-user priority (supplied by an authentication server). This allows different service levels to be provided to different classes of customer. In addition, the traffic control system polices and/or shapes traffic based on a second input—a modulation rate detector, which measures the modulation rate at which each connected client is sending its traffic, and uses it to indirectly cause fairer use of the available air interface capacity (e.g. by causing TCP streams to back off when they detect packet loss). Finally, for some embodiments where public Wi-Fi is being delivered through private Wi-Fi access points, the traffic control system is to manage the air interface utilization split between public and private WiFi users, to ensure that private users do not have their Wi-Fi air interface network capacity unduly impaired by public users. | 2016-02-11 |
20160043954 | AVOIDING TRAFFIC LOSS DUE TO ROUTE FAILURES - Embodiments of the present invention include systems and methods for preventing traffic loss of data directed to a destination in a network. A router in the network attempts to install a route prefix of a destination or an ARP entry in the router. If the attempt fails, the router determines whether the routing device originates the uninstalled route prefix or a set of route prefixes pointing the uninstalled ARP entry as next hop in an internet protocol (IP) reachability. If the determination is negative, the router sends a message to a neighboring router to add the router to the exclude route list of the neighboring router. When the neighboring router determines an optimal route involving the uninstalled route prefix or the set of route prefixes pointing the uninstalled ARP entry, it looks up the exclude route list so that the router is not included when determining the optimal route. | 2016-02-11 |
20160043955 | DELIVERY OF PROTOCOL DATA UNITS - Delivery of protocol data units or other suitable data or information units in various communication systems can be enhanced by appropriate methods and devices. For example, in-sequence delivery of protocol data units received in parallel from several lower-layer acknowledged-mode protocol entities may benefit from timers and/or forwarding status reports. A method can include observing a gap in a sequence of protocol data units received from a plurality of lower-layer protocol entities providing data transfer. The method can also include starting a timer upon the gap observation. The method can further include preventing the gap from blocking delivery of service data units to a higher layer, when the timer expires. The method can additionally include detecting a forwarding-status report. The method can also include immediately proceeding with data delivery to higher layer, containing the gaps because of the lack of forwarding at handover. | 2016-02-11 |
20160043956 | SYSTEM AND METHOD FOR MANAGEMENT OF CLOUD-BASED SYSTEMS - System and method for reporting usage of a network infrastructure includes obtaining a map that includes at least one flow-mapping that correlates a flow feature with a service and that correlates a flow feature with an endpoint type, wherein the endpoint types include at least a subscriber type and a service type; at a first computer, receiving flow telemetry of a network infrastructure, the flow telemetry representing at least the destination and source attributes for network traffic in the flow telemetry; categorizing the flow telemetry into at least a subscriber flow category based on the source and destination endpoint types of the traffic; for subscriber flow telemetry of a subscriber, processing the subscriber flow telemetry into at least one flow feature; identifying at least one service to attribute to at least a portion of the subscriber flow telemetry, the service identified through the processed flow feature and a flow-mapping. | 2016-02-11 |
20160043957 | Method and Device for Latency Adjustment - A method for outputting from a device having data communication capability received multimedia data with an adjustable latency comprises the steps of: receiving data packets including the multimedia data and storing the multimedia data in a buffer; measuring at least one characteristic indicative of the input rate of the received data packets; measuring a latency introduced by the buffer; obtaining information indicative of the output rate of the device and determining a target latency for the multimedia data to be outputted based on statistical information derived from the measured at least one characteristic indicative of the input rate and the obtained information indicative of the output rate; adjusting the latency so that it complies with the target latency by modifying the rate at which the multimedia data is outputted or the rate at which the multimedia data is stored in the buffer. | 2016-02-11 |
20160043958 | DATA COMMUNICATION APPARATUS FOR COMMUNICATING WITH EXTERNAL APPARATUS VIA NETWORK, CONTROL METHOD OF THE DATA COMMUNICATION APPARATUS, AND STORAGE MEDIUM - A communication apparatus communicating with an external apparatus via a relaying device is provided. The communication apparatus includes a communication unit configured to perform communication with the relaying device, and a control unit configured to reduce a communication speed of the communication unit to a lower speed if the communication apparatus is to be shifted from a first power mode to a second power mode in which power consumption is lower than that in the first power mode. The communication unit, if the communication apparatus shifts to the second power mode, transmits identification information of the communication apparatus to the relaying device using a first method, and after a predetermined time has passed, transmits the identification information to the relaying device by a second method. | 2016-02-11 |
20160043959 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information terminal | 2016-02-11 |
20160043960 | EXPLICIT STRATEGY FEEDBACK IN NAME-BASED FORWARDING - One embodiment provides a system that facilitates explicit strategy feedback in a Content-Centric Network (CCN). During operation, the system sends a first interest associated with an explicit strategy feedback request via an egress interface. This egress interface is in a plurality of egress interfaces associated with a same name in a forwarding table. An interest is location-independent and uniquely identifies the content object in the CCN and is routed based on the name in the CCN. The system stores one or more parameters received in response to the explicit strategy feedback request in an entry, which includes the name and the egress interface, in the forwarding table. The one or more parameters are associated with a first device. The system determines, for a second interest for a content object associated with the name, an egress interface from the plurality of egress interfaces based on the stored parameters. | 2016-02-11 |
20160043961 | CREDIT-BASED FLOW CONTROL IN LOSSLESS ETHERNET NETWORKS - In one embodiment, a system includes a hardware processor and logic integrated with and/or executable by the processor or media access control (MAC) functionality of a network port. The logic is configured to negotiate a credit aging duration during initialization of a link between a receiving endpoint and a sending endpoint, the receiving and sending endpoints being connected in a network fabric. The link includes at least one virtual link. The logic is also configured to receive an a Count of available flow credits from the receiving endpoint. The amount of available flow credits are used to determine a capacity to process packets at the receiving endpoint. The exchange of flow credits is performed on a per virtual link basis. Other systems, methods, and computer program products are presented according to more embodiments. | 2016-02-11 |
20160043962 | GROUPING OF NETWORK DEVICES - The present disclosure relates to granting of network access to a new network device. Specifically, various techniques and systems are provided for connecting a new network device to a network and limiting access of the network device while authenticating the new network device. More specifically, exemplary embodiments of the present invention include methods and systems for receiving information associated with one or more capabilities of the network devices on the network, analyzing the information associated with the one or more capabilities of the network devices on the network, wherein analyzing includes determining one or more capabilities common to the network devices, and generating a grouping of network devices, wherein the grouping includes network devices that share a common capability. | 2016-02-11 |
20160043963 | Maintaining Named Data Networking (NDN) Flow Balance with Highly Variable Data Object Sizes - A network device among a plurality of network devices in a Named Data Networking (NDN) network receives an Interest from a consumer including a name and an Expected Data Size of data requested through the Interest. The network device forwards the Interest along a path to a producer of the data based on the name. As a result, the network device receives data that has traversed the path in reverse and satisfies the forwarded Interest. The network device determines an actual data size of the received data. The network device compares the actual data size to the Expected Data Size, and performs an action with respect to the received data based on a result of the compare. | 2016-02-11 |
20160043964 | METHODS, SYSTEMS, AND DEVICES FOR BANDWIDTH CONSERVATION - Aspects of bandwidth conservation include monitoring, via a processor over a period of time, program state information for content streamed to an electronic device, and accumulating, in a memory device via the processor, inputs received over the period of time from a user of the electronic device. Each of the inputs is correlated to the program state information based on a location in the content at which the corresponding input occurred. Aspects further include identifying patterns of user behavior based on collective correlations between the inputs and the program state information, determining from the patterns a presence or absence of the user at the electronic device with respect to currently streamed content when no inputs are received by the user, and performing a bandwidth control operation with respect to the currently streamed content based on the determined presence or absence of the user. | 2016-02-11 |
20160043965 | ACCELERATING AND OFFLOADING LOCK ACCESS OVER A NETWORK - Lock access is managed in a data network having an initiator node and a remote target by issuing a lock command from a first process to the remote target via an initiator network interface controller to establish a lock on a memory location, and prior to receiving a reply to the lock command communicating a data access request to the memory location from the initiator network interface controller. Prior to receiving a reply to the data access request, an unlock command issues from the initiator network interface controller. The target network interface controller determines the lock content, and when permitted by the lock accesses the memory location. After accessing the memory location the target network interface controller executes the unlock command. When the lock prevents data access, the lock operation is retried a configurable number of times until data access is allowed or a threshold is exceeded. | 2016-02-11 |
20160043966 | Efficient Allocation Of Network Resources - Using information for efficient allocation of network resources, such as for a communication session, is disclosed. The methods and systems can utilize one or more identifiers that can be configured to indicate the presence of one or more supported features, along with an indication of whether the supported feature is required for communication. | 2016-02-11 |
20160043967 | DEMAND POLICY-BASED RESOURCE MANAGEMENT AND ALLOCATION SYSTEM - The present disclosure relates generally to improving the management and provisoning of configurable computing resources. Certain techniques are disclosed herein for managing and provisoning the configurable computing resources based on resource policies. One of the techniques includes determining a value indicating a real-time demand for a resource within a resource pool based on an aggregate of request data. The aggregate of the request data is obtained from any number of previously received orders for services that included the resource as at least a part of enabling the service. The technique may also include generating or updating one or more demand policies for allocation of the resource based on the determined value indicating the real-time demand for the resource, pre-creating the resource based on the one or more demand policies, and allocating the pre-created resource to one or more users based on the one or more demand policies. | 2016-02-11 |
20160043968 | PLACEMENT POLICY-BASED ALLOCATION OF COMPUTING RESOURCES - Techniques are disclosed for managing and allocating resources based on resource policies in response to user requests. A resource management system can receive a request for a service. A request may indicate preferences for allocation resources (e.g., a resource definition) to enable the service. A resource definition may indicate a topology of the computing resources to allocate for the user. The topology may indicate what computing resources to allocate and how to allocate those computing resource. Based on the information indicated by a request, the resource management system may determine a placement policy for allocation of computing resources indicated by the request. A placement policy may indicate a placement of one or more computing resources requested by a user. The placement policy may indicate where and how computing resources are to be placed once allocated. The computing resources may be allocated based on the placement policy and the resource definition. | 2016-02-11 |
20160043969 | METHODS AND SYSTEMS FOR TRANSMITTING DATA THROUGH AN AGGREGATED CONNECTION - The present invention discloses methods and systems for processing data packets received at a first network node and for processing encapsulating packets received at a second network node. The first network node receives data packets from its network interface. It then selects a first tunnel and selects none or at least one second tunnel according to a selection policy. Original encapsulating packets (OEPs) are transmitted to a second network node through the first tunnel and at least one duplicate encapsulating packet (DEP) is transmitted through the at least one second tunnel. The second network node receives an encapsulating packet with a global sequence number (GSN) through an aggregated connection. The second network node determines whether one or more data packets corresponding to the encapsulating packet have been received earlier. The second network node may then determine whether or not to forward the one or more data packets. | 2016-02-11 |
20160043970 | CONTRIBUTION POLICY-BASED RESOURCE MANAGEMENT AND ALLOCATION SYSTEM - The present disclosure relates generally to improving the management and provisoning of configurable computing resources. Certain techniques are disclosed herein for managing and provisoning the configurable computing resources based on resource policies. One of the techniques includes receiving a resource submission from a user. The resource submission identifies a contributable resource. The technique may also include identifying a contribution policy for the resource submission, and sending, based on the identified contribution policy, one or more resource types of requestable resources to a client computing system associated with the user. The technique may also include receiving, from the client computing system, information indicating a selection by the user of a resource type of the one or more resource types of the requestable resources. | 2016-02-11 |
20160043971 | INCREMENTAL HIGH RADIX NETWORK SCALING - Efficient and highly-scalable network solutions are provided that utilize incremental scaling of switches, and devices connected to those switches, in an environment such as a data center. Embodiments may utilize multiple tiers of switches. Sets of switches in two different tiers may be initially connected to each other utilizing multiple connections. As network capacity needs within the computing environment increase, additional switches may be added to tiers. To connect the added switches to the switch network, the redundant connections may be utilized. Moving connections from one switch to another switch can free up ports to connect added switches in one of the tiers of switches to the switch network. The tiers of switches can be based on Clos networks, where the tiers of switches are fully connected, or other high radix or fat tree topologies that include oversubscription between tiers. | 2016-02-11 |
20160043972 | Interactions Based On Instant Messaging - Interactions based on Instant Messaging (IM) are provided, where an IM client of a user terminal device is configured with a microblog entrance related to IM tips, the IM client obtains IM tips data from an IM server, invokes the microblog entrance in response to an operation instruction of a user, obtains from a microblog server microblog data associated to the IM tips data, generates a microblog box and presents the microblog data on the microblog box. The methods can improve efficiencies of interactions. | 2016-02-11 |
20160043973 | DYNAMIC RESOLUTION OF MESSAGE CONTENT - Example methods, systems and computer readable media are directed to one or more functionalities that dynamically resolve one or more messages. A functionality identifies content in the message that is required for one or more operations performed by the functionality. By performing such operations, the functionality creates modified message data based on the identified content. An identifier for the modified message data is embedded in the message. The modified message data is stored in relation to an object on a server. By using the embedded identifier, the modified message data can be retrieved by a client application associated with a message recipient. The modified message data can be applied to a received message to update the message. | 2016-02-11 |
20160043974 | SYSTEMS AND METHODS FOR INTEGRATING A CHAT FUNCTION INTO AN E-READER APPLICATION - An e-reader communication platform for integrating a chat function into an e-reader application is provided. The e-reader communication platform includes a processor programmed to upload, to a first client device associated with a first user, an e-book. The processor is also programmed to transmit a first IP chat message to a second client device associated with a second user to form a chat group including the first and second users. The processor is further programmed to receive a second IP chat message from the user interface of the e-reader application on the first client device, and embed the second IP chat message into the e-book to produce an embedded IP chat message. The embedded IP chat message is overlaid on the user interface of the e-reader application. The processor is further programmed to facilitate display of the embedded IP chat message to the chat group within the e-reader application. | 2016-02-11 |
20160043975 | SYSTEM AND METHOD FOR PROVIDING INFORMATION INTERACTIVELY BY INSTANT MESSAGING APPLICATION - A method that uses a processor to provide information, the method includes establishing a conversation session between a terminal and a software bot through an instant messaging application executed in the terminal for an instant messaging service; displaying a map on a screen of the terminal; transmitting a request to the software bot through the conversation session for querying information associated with at least one point selected in the map on the screen of the terminal by an user of the terminal or a region corresponding to the at least one point; receiving the information associated with the at least one point or the region from the software bot through the conversation session; and displaying the received information the screen of the terminal. | 2016-02-11 |
20160043976 | SHARED ATTACHMENTS - When an outgoing communication sent to one or more recipients contains a supported attachment type, a shared workspace that contains a shared version of the original attachment is provisioned. A modified version of the original outgoing communication is delivered to internal recipients including both a link to the shared document and the original attachment. | 2016-02-11 |
20160043977 | DATA DEDUPLICATION AT THE NETWORK INTERFACES - A method for data deduplication during execution of an application on a plurality of computing nodes, including: generating, by a first processor in a first computing node executing the application, a first message to process application data owned by a second computing node executing the application; receiving, by a first network interface (NI) of the first computing node, the first message; extracting, by the first NI, a first key from the first message; determining, by the first NI, the first key is not a duplicate; and placing, by the first NI and in response to the first key not being a duplicate, the first message on a network connecting the first computing node to the second computing node. | 2016-02-11 |
20160043978 | TECHNIQUES FOR HOT SNAPSHOTS FOR MESSAGE SYNCING - Techniques for hot snapshotting for message syncing are described. An apparatus may comprise a network component and a snapshot component. The network component may be operative to receiving an incoming update. The snapshot component may be operative to retrieve a messaging snapshot for a user associated with the incoming update; identify a messaging thread corresponding to the incoming update; apply the incoming update to the messaging thread; determining that a number of messaging threads stored in the messaging snapshot is greater than a thread storage limit for the messaging snapshot; identify a least-recently-updated messaging thread currently stored in the messaging snapshot; and remove the least-recently updated messaging thread from the messaging snapshot. | 2016-02-11 |
20160043979 | AUTOMATIC BIOGRAPHICAL SUMMARY COMPILATION AND SPEAKER RECOGNITION BASED MESSAGING SYSTEM - Some embodiments include a messaging platform to facilitate delivery of message conversations between user accounts. The messaging platform can store at least a subset of the message conversations in a data storage memory. The messaging platform can implement a data destruction policy configured to specific which of the message conversations are to be queued for deletion from the data storage memory. Based on the stored conversations, the messaging platform can generate a biographical summary of a user account based on portions of archived message conversations in the data storage memory. | 2016-02-11 |
20160043980 | METHOD AND SYSTEM OF VERIFYING THE AUTHENTICITY OF USERS IN AN ELECTRONIC MESSAGING SERVICE - Various aspects of the disclosure describe a method and system for receiving an electronic communication from an account associated with a physical address. The method and apparatus provides a dynamic link to the electronic communication that is accessible to at least one recipient. | 2016-02-11 |
20160043981 | TECHNIQUES FOR A PERSISTENT QUEUE FOR MESSAGE SYNCING - Techniques for a persistent queue for message syncing are described. A recipient inbound messaging component may receive an incoming update at a recipient update queue. A recipient queue management component may determine an incoming recipient sequence number for the recipient update queue. A recipient outbound messaging component may transmit the incoming update to the recipient messaging endpoint. Other embodiments are described and claimed. | 2016-02-11 |
20160043982 | TECHNIQUES FOR A SEQUENTIAL MESSAGE READER FOR MESSAGE SYNCING - Techniques for a sequential message reader for message syncing are described. An apparatus may comprise a network component and an inbox management component. The network component may be operative to receiving an incoming update at a messaging endpoint from a recipient update queue, the incoming update comprising an incoming recipient sequence number. The inbox management component may be operative to add the incoming update to a message inbox on the messaging endpoint, the incoming update added to the message inbox in an order determined by the incoming recipient sequence number and determine based on the incoming recipient sequence number whether one or more additional updates are missing from the message inbox on the messaging endpoint. Other embodiments are described and claimed. | 2016-02-11 |
20160043983 | TECHNIQUES FOR INTELLIGENT MESSAGING FOR MESSAGE SYNCING - Techniques for intelligent messaging for message syncing are described. An apparatus may comprise a recipient inbound messaging component, a recipient queue management component, a recipient update customization component, and a recipient outbound messaging component. The recipient inbound messaging component may be operative to receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update. The recipient queue management component may be operative to add the incoming update to the recipient update queue and determine a recipient messaging endpoint to receive the incoming update. The recipient update customization component may be operative to retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint and generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters. The recipient outbound messaging component may be operative to transmit the customized incoming update to the recipient messaging endpoint. Other embodiments are described and claimed. | 2016-02-11 |
20160043984 | REDIRECTING NOTIFICATIONS TO AN ALTERNATIVE COMPUTING DEVICE AND ALLOWING SUBSEQUENT SMS INTERACTIONS TO ADDRESS THE NOTIFICATIONS VIA THAT ALTERNATIVE COMPUTING DEVICE - A method, system and computer program product for handling notifications. An instruction from the user is received to redirect notifications to alternative computing device(s). After a notification (e.g., operating system update) is received from a computing device (e.g., computing device of the presenter of an electronic presentation), the notification is queued. A graphical representation of the notification is saved as an image and the action buttons within the notification are translated into textual actions. The image of the graphical representation of the notification and the textual actions are sent to the alterative computing device(s), such as via MMS. In this manner, notifications are prevented from being displayed and interrupting the user, such as a presenter of a presentation, by redirecting such notifications to an alternative computing device. Furthermore, in this manner, the user of the alternative device is able to respond to the notification via SMS. | 2016-02-11 |
20160043985 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR NOTIFYING USERS UPON THE OCCURRENCE OF AN EVENT - A computer-implemented system and method for notifying users on the occurrence of an event is disclosed. An embodiment further includes notifying selected users upon the occurrence of particular events in sessions using a variety of notification methods. | 2016-02-11 |
20160043986 | SECURE FRIENDING - Defining a secure association of users in social networks is described. Users are associated in the social network as a response for association request messages from both users. | 2016-02-11 |
20160043987 | SUGGESTED OUT OF NETWORK COMMUNICATION RECIPIENTS - Disclosed in some examples are methods, systems and machine readable medium for recommending an out-of-network communication by determining a set of potential recommended members of a social networking service based upon one or more recommendation criteria. In some examples the recommendation criteria may include: a profile similarity to a previous target of an out-of-network communication, a degree of correspondence between an interest and intent of the sending member, and a likelihood of response. | 2016-02-11 |
20160043988 | MONITORING SMS MESSAGES RELATED TO SERVER/CUSTOMER INTERACTIONS - A system, method and/or computer program product monitors delivery of text messages related to network traffic between a user's electronic system and a server. A capture server captures a network traffic message from a user's electronic system to a solution server. In response to capturing a request for specific information from the solution server, the capture server captures a related text message from the solution server to a text message gateway. The capture server then monitors a text message log within the user's electronic system, which contains a record of text messages received by the user's electronic system. In response to the text message log containing no record of the text message from the solution server within a predetermined length of wait time, the capture server generates and transmits an alert message to the solution server. | 2016-02-11 |
20160043989 | SEARCH ENGINE OPTIMIZATION OF DOMAIN NAMES AND WEBSITES - The present invention may create a search engine optimized domain name and update a website based on the current domain name, website, forwarding URLs and/or the locations of incoming traffic to the website. The present invention may create a new domain name and a new website based on an initial domain name and an initial website and allow a user to register the new domain name and host the new website with a single purchase. The present invention may also create a new domain name and/or update the language of a website based on the location of incoming traffic to the website. The present invention may also map an IP address/name server to a category of a website and then map the category to one or more top-level domains used in suggested domain names. The present invention may also tokenize a forwarding URL and spin the tokens into additional tokens that may be used to create domain names for registration. | 2016-02-11 |
20160043990 | DNS RESOLUTION REPLAY FOR BARE DOMAIN NAMES THAT MAP TO "A" RECORDS - The technology disclosed relates to DNS resolution of bare domain names of the form “myexample.com”. A bare domain name is also called zone apex or naked domain. In particular, bare domains are resolved by look-up of “A” records, per the IETF standards for DNS resolution. Technology is disclosed that improves resolution of bare domains to edge servers or other devices of a content delivery network or cloud-based content provider (collectively referred to as CDNs). | 2016-02-11 |
20160043991 | IP ADDRESS AND DOMAIN NAME AUTOMATION OF VIRTUAL INFRASTRUCTURE - Provisioning an Internet Protocol address is disclosed. A request to provision an Internet Protocol address to a virtual resource is received. An Internet Protocol address is automatically determined to allocate to the virtual resource. An Internet Protocol Address Management appliance is used to automatically allocate the determined Internet Protocol address to the virtual resource. | 2016-02-11 |
20160043992 | LAYER-2 IP NETWORKING METHOD AND APPARATUS FOR MOBILE HOSTS - A method and apparatus to enable IP networking for mobile hosts without requiring changes to be made to the TCP/IP stack in the operating system installed on the mobile hosts. The apparatus is an “intelligent device” that can be installed on or connected to a mobile host, and may comprise a software-only logical module, physical hardware, or a combination of both. To a mobile host, the intelligent device emulates a network interface such as an Ethernet card or a telephone modem. The intelligent device appears to an access network just like any regular IP host connected to the access network through a physical network interface device. The intelligent device handles all mobile networking functions for the mobile host, and may control multiple different physical network interface devices to enable a connection to an access network available to the mobile user at his location. | 2016-02-11 |
20160043993 | OPTIMIZED DOMAIN NAMES AND WEBSITES BASED ON INCOMING TRAFFIC - The present invention may create a search engine optimized domain name and update a website based on the current domain name, website, forwarding URLs and/or the locations of incoming traffic to the website. The present invention may create a new domain name and a new website based on an initial domain name and an initial website and allow a user to register the new domain name and host the new website with a single purchase. The present invention may also create a new domain name and/or update the language of a website based on the location of incoming traffic to the website. The present invention may also map an IP address/name server to a category of a website and then map the category to one or more top-level domains used in suggested domain names. The present invention may also tokenize a forwarding URL and spin the tokens into additional tokens that may be used to create domain names for registration. | 2016-02-11 |
20160043994 | METHOD AND SYSTEM FOR SUPPORTING VISITOR ACCESS VIA A BROADBAND GATEWAY - A method and system are provided in which a broadband gateway may enable a guest or visitor to access content available to the broadband gateway. The content may be received by the broadband gateway through one or more of a plurality of network access service providers that may provide separate physical layer access to the broadband gateway. After a visitor's device is connected to the broadband gateway, the broadband gateway may classify the device. Based on the classification, the device may be authorized to access a portion of the content received. Once the authorization process is complete, the appropriate content may be made available and transferred to the device. The authorization process may include the authentication of a device identifier and/or a user identifier. The authorized access may be time-limited, but may be renewed or enabled when a request is received within a determined period of time. | 2016-02-11 |
20160043995 | SYSTEM AND METHOD FOR LIMITING DATA LEAKAGE IN AN APPLICATION FIREWALL - System and methods for connection processing with limited data leakage. The system records state associated with a connection request in a connection state engine, records state associated with a connection acknowledgement in the connection state engine, stores data sent after the connection acknowledgement in a buffer and determines, without a proxy, whether to allow or deny a connection as a function of the data stored in the buffer. | 2016-02-11 |
20160043996 | SECURE PATH DETERMINATION BETWEEN DEVICES - Methods, network controllers, and machine-readable and executable instructions are provided to determine a secure path between a source device and a destination device. The secure path may be via a plurality of network devices. The secure path may be determined based on a security capability of each of the plurality of network devices in the secure path. Data may be forwarded between the source device and the destination device, via the plurality of network devices, based on the determined path. | 2016-02-11 |
20160043997 | Device, system and method for supporting the setting up of a local area network - A device comprises a first integrated network card ( | 2016-02-11 |
20160043998 | METHODS AND APPARATUS TO IMPROVE SECURITY OF A VIRTUAL PRIVATE MOBILE NETWORK - Methods and apparatus are disclosed to prevent consecutive attacks on a virtual private mobile network. An example method includes for each of a plurality of network elements, generating virtualized slices based on a virtualized slice count value for subgroups associated with the virtual private mobile network, and assigning non-consecutive ones of the virtualized slices to the subgroups associated with the virtual private mobile network based on demand for the virtualized slices by the respective ones of the subgroups. The example method also includes, in response to a request from a mobile device to access the virtual private mobile network for a first time, assigning the mobile device to one of the virtual slices of the plurality of network elements based on (i) the subgroup associated with the mobile device, and (ii) availability of the virtual slices. | 2016-02-11 |
20160043999 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFICIENT CACHING OF HIERARCHICAL ITEMS - Embodiments disclosed herein provide a “lazy” approach in caching a hierarchical navigation tree with one or more associated permission trees. In one embodiment, only a portion of a cached permission tree is updated. One embodiment of a method may comprise determining whether a dirty node exists by comparing tree timestamps of the permission tree and the master tree. If the tree timestamp of the master tree is temporally more recent than the tree timestamp of the permission tree, the permission tree has a dirty node and the method may operate to check node timestamps of the master and permission trees. This process may be repeated until the dirty node is found, at which time a portion of the permission tree associated with the dirty node may be reconstructed, rather than the entire permission tree itself, thereby eliminating or significantly reducing access time to the cached permission tree. | 2016-02-11 |
20160044000 | SYSTEM AND METHOD TO COMMUNICATE SENSITIVE INFORMATION VIA ONE OR MORE UNTRUSTED INTERMEDIATE NODES WITH RESILIENCE TO DISCONNECTED NETWORK TOPOLOGY - A system and method to communicate secure information between a plurality of computing machines using an untrusted intermediate with resilience to disconnected network topology. The system and method utilize agnostic endpoints that are generalized to be interoperable among various systems, with their functionality based on their location in a network. The system and method enable horizontal scaling on the network. One or more clusters may be set up in a location within a network or series of networks in electronic communication, e.g., in a cloud or a sub-network, residing between a secure area of the network(s) and an unsecure area such as of an external network or portion of a network. The horizontal scaling allows the system to take advantage of a capacity of a local network. As long as an agent has connectivity to at least one locale of the network, the agent is advantageously operable to move data across the system. | 2016-02-11 |
20160044001 | NETWORK-ENABLED DEVICE PROVISIONING - Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a storage device; listening logic to wirelessly receive a plurality of key fragments from a corresponding plurality of peer devices, to cause storage of the plurality of key fragments in the storage device, and to receive an encrypted provisioning message from a management device; key generation logic to generate a decryption key based on the plurality of key fragments stored in the storage device to decrypt the encrypted provisioning message, and to decrypt the encrypted provisioning message using the decryption key; and control logic to provision the network-enabled device in accordance with instructions included in the decrypted provisioning message. Other embodiments may be disclosed and/or claimed. | 2016-02-11 |
20160044002 | DATA TRANSMISSION METHOD AND APPARATUS - The present invention provides a data transmission method and apparatus, where the method includes: performing, by UE, security processing on a NAS PDU by using a security parameter and a security algorithm, where data to be transmitted is encapsulated in the NAS PDU; and sending, by the UE, the NAS PDU to a serving SGSN by using an RNC. The present invention can improve efficiency of transmitting a small data packet, and further provide a security mechanism to ensure security of transmitting the small data packet. | 2016-02-11 |
20160044003 | SECURE COMPUTATION USING A SERVER MODULE - A server module evaluates a circuit based on concealed inputs provided by respective participant modules, to provide a concealed output. By virtue of this approach, no party to the transaction (including the sever module) discovers any other party's non-concealed inputs. In a first implementation, the server module evaluates a garbled Boolean circuit. This implementation also uses a three-way oblivious transfer technique to provide a concealed input from one of the participant modules to the serer module. In a second implementation, the server module evaluates an arithmetic circuit based on ciphertexts that have been produced using a fully homomorphic encryption technique. This implementation modifies multiplication operations that are performed in the evaluation of the arithmetic circuit by a modifier factor; this removes bounds placed on the number of the multiplication operations that can be performed. | 2016-02-11 |
20160044004 | CONTENT DISTRIBUTION METHOD, CONTENT DISTRIBUTION SYSTEM, SOURCE DEVICE, AND SINK DEVICE - Provided is a content distribution method which allows a source device to safely distribute copyrighted content to a sink device in response to a request from the sink device as a trigger. The content distribution method includes a list transmission step S | 2016-02-11 |
20160044005 | MUTUALLY ASSURED DATA SHARING BETWEEN DISTRUSTING PARTIES IN A NETWORK ENVIRONMENT - An apparatus for sharing information between entities includes a processor and a trusted execution module executing on the processor. The trusted execution module is configured to receive first confidential information from a first client device associated with a first entity, seal the first confidential information within a trusted execution environment, receive second confidential information from a second client device associated with a second entity, seal the second confidential information within the trusted execution environment, and execute code within the trusted execution environment. The code is configured to compute a confidential result based upon the first confidential information and the second confidential information. | 2016-02-11 |
20160044006 | DEVICE-TO-DEVICE DISCOVERY INFORMATION ENCRYPTION - In embodiments, apparatuses, methods, and storage media may be described for secure broadcast of discovery information of a discoverable user equipment (UE) in a device-to-device (D2D) network. Specifically, the discovery information may be encrypted with a first encryption key, and then the result of that encryption may be re-encrypted with a second encryption key. The dual-encrypted discovery information may then be broadcast in a cell. Upon reception of the dual-encrypted discovery information, a discovering UE with the appropriate decryption keys may decrypt the message to identify the discovery information. Based on the decrypted discovery information, the discovering UE may identify the presence of the discoverable UE. | 2016-02-11 |
20160044007 | METHOD AND DEVICE FOR ESTABLISHING SESSION KEYS - A method and a device for setting up a session key between a source entity and a target entity in a communication network comprises a plurality of communicating entities. The method, which relies on the use of symmetrical cryptographic primitives, provides each entity in the session with protection against denial of service attacks by setting up a session in four or five message exchanges. | 2016-02-11 |
20160044008 | SECURE COMMUNICATION USING PHYSICAL PROXIMITY - Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file, displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device. | 2016-02-11 |
20160044009 | Method and Apparatus for MoCA Network With Protected Set-Up - Systems and methods are disclosed for securing a network, for admitting new nodes into an existing network, and/or for securely forming a new network. As a non-limiting example, an existing node may be triggered by a user, in response to which the existing node communicates with a network coordinator node. Thereafter, if a new node attempts to enter the network, and also for example has been triggered by a user, the network coordinator may determine, based at least in part on parameters within the new node and the network coordinator, whether the new node can enter the network. | 2016-02-11 |
20160044010 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - There is provided an information processing system, information processing apparatus, and a method of controlling the same. Upon receiving an encrypted application and encrypted license information, the information processing apparatus decrypts the encrypted license information and the encrypted application. It is determined whether or not the decrypted application is a web application, and in the case where the application is determined to be a web application, a URL contained in the application and information contained in the license information are registered, and a display item corresponding to the application is displayed in a menu screen. | 2016-02-11 |
20160044011 | REVOKING SESSIONS USING SIGNALING - Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication indicating that a user's login account has been compromised, where the user's login account has an associated login session and corresponding session artifact that is valid for a specified amount of time. The identity platform generates a signal indicating that the login session is no longer trusted and that the user is to be re-directed to the identity platform to re-authenticate and renew the session artifact and provides the generated signal to various relying parties including at least one relying party that is hosting the login session for the user. | 2016-02-11 |
20160044012 | SECURE CLOUD BASED MULTI-TIER PROVISIONING - Systems, methods, and other embodiments associated with secure cloud based multi-tier provisioning are described. In one embodiment, a method includes storing, in server-side computer storage medium, an activation key for a networked device and a set of configuration parameter values associated with an application to be run by the networked device. The method includes managing access to the computer storage medium such that access to the activation key and the configuration parameter values by unauthorized entities is prevented. Upon receiving the activation key from an authorized installation entity, the method includes identifying a configuration for the networked device comprising the set of configuration parameter values. A network connection is made with the networked device and the configuration is transmitted to the networked device, such that the configuration is not provided to the authorized installation entity. | 2016-02-11 |
20160044013 | INTELLIGENT SYSTEM FOR ENABLING AUTOMATED SECONDARY AUTHORIZATION FOR SERVICE REQUESTS IN AN AGILE INFORMATION TECHNOLOGY ENVIRONMENT - A service request for a managed computer system is received and once a primary authorization for same has been given, a secondary authorization management system (SAMS) determines whether or not the service request requires secondary authorization. This determination is made according to a context of the managed computer system and an authorization profile for the received service request. If needed, the SAMS resolves the secondary authorization request and returns the resolution decision. | 2016-02-11 |