17th week of 2016 patent applcation highlights part 61 |
Patent application number | Title | Published |
20160119193 | METHOD AND SYSTEM FOR DETECTING PROXY INTERNET ACCESS - A method for detecting proxy internet access includes intercepting an access request from a proxied terminal of a same internet account; and sending a redirection packet to the proxied terminal sending the access request. The redirection packet carries a first timestamp indicating when the redirection packet is sent. The method also includes receiving a reported timestamp difference between the first timestamp and a second timestamp. The second timestamp is a system time of the proxied terminal acquired after the proxied terminal receives the redirection packet. Further, the method includes executing a clustering process on the reported timestamp difference to obtain a clustering result; and based on the clustering result, detecting whether the same internet account is a proxy account. | 2016-04-28 |
20160119194 | CONTENT FILTERING FOR INFORMATION CENTRIC NETWORKS - A method provides for marking classifications of content objects at a content marking node in a content centric networking (CCN) network. The content marking node has a network interface with a network that is separately administered from the CCN network. The method includes receiving a content object on the network interface, checking whether the content object is authentic and there is a pending interest for the content object, and sending a request to a content marking service to obtain categories for the content object using a name of the content object. The method further includes receiving a response from the content marking service with the categories for the content object, and adding a category field to the content object, the category field including the categories. | 2016-04-28 |
20160119195 | COMPUTING SERVICE LEVEL RISK - Statistical process control, performance distribution identification, and a simulation model based on, for example, Monte Carlo simulation, are used to calculate the risk of various service levels. A recommended service level is determined, the service level being one that is estimated to have an appropriate risk for both the outsourcing supplier and the customer. | 2016-04-28 |
20160119196 | Multipath Provisioning of L4-L7 Traffic in a Network - Techniques are provided for a network mapping server device in a network to receive a connection upgrade message comprising information to establish a first data flow from a first endpoint that does not support multiple subflows for the first data flow according to a multipath protocol, where multiple subflows subdivide the first data flow across two or more network paths. The information in the connection upgrade message is analyzed in order to resolve network connectivity to determine potential network connections for at least two subflows of the first data flow to a second endpoint. A response message is sent comprising information configured to establish at least two subflows for the first data flow between the first endpoint and the second endpoint. | 2016-04-28 |
20160119197 | SYSTEM AND METHOD FOR SUPPORTING SERVICE LEVEL QUORUM IN A DATA GRID CLUSTER - A system and method is described for use with a data grid cluster, for supporting service level quorum in the data grid cluster. The data grid cluster includes a plurality of cluster nodes that support performing at least one service action. A quorum policy, defined in a cache configuration file associated with the data grid cluster, can specify a minimum number of service members that are required in the data grid cluster for performing the service action. The data grid cluster uses the quorum policy to determine whether the service action is allowed to be performed, based on a present state of the plurality of cluster nodes in the data grid cluster. | 2016-04-28 |
20160119198 | Deep Packet Inspection Method and Device, and Coprocessor - A deep packet inspection method and device, and a coprocessor. The deep packet inspection method includes receiving, by a transceiver module of the coprocessor, an original data packet sent by a general processor, and sending the original data packet to a processor core of the coprocessor; invoking, by the processor core, a sub-coprocessor of the coprocessor to perform application layer parsing on the original data packet so as to obtain an application layer parsing result; and sending, by the processor core, the parsing result to the general processor so that the general processor processes the original data packet according to the parsing result. The deep packet inspection method and device provided by the embodiments of the present disclosure reduce resource occupation of a general processor and increase a running speed. | 2016-04-28 |
20160119199 | REPORTING PAGE COMPOSITION DATA - Distributed applications are monitored and page composition metrics are reported in terms of a plurality of phases of a page loading lifecycle. The phases may include first byte received, page rendering time, onload time, post page load time, and other phases. For each phase, data regarding different types of requests may be reported. Data regarding AJAX and iFrame requests may be reported for each phase in a page load, providing more information regarding what is loaded and when. The data may be provided in a graphical ‘cascade’ format based on the phase. Information for AJAX, iFrame and other requests may include the number of such requests occurring in each phase, the average execution time of the requests, and other data. The requests and phases can be determined for multiple types of browsers based on data collection techniques compatible for each particular browser. | 2016-04-28 |
20160119200 | SYSTEMS AND METHODS FOR PROVIDING USER ANALYTICS - Systems and methods are provided for capturing user analytics for user experiences on, for example, a website, mobile application, and/or at an offline location, venue and/or event without requiring a programmer to provide specialized code in each instance. When a user event occurs, such as a click or other selection of an object and/or user action, a user analytics system captures and stores information about the event. The captured information is such that an administrator or other user is capable of identifying the object and associated analytics by viewing the captured information and/or graphical representations thereof. In addition, a user may define a model flow for comparison to actual user flows by simply navigating through a website, mobile application, and/or at an offline location, venue and/or event in a manner that the user believes is similar to how other users will navigate through the website, mobile application, and/or at an offline location, venue and/or event. The system identifies the sequence of objects selected by the user to define the model flow. | 2016-04-28 |
20160119201 | ENTRY ADDING METHOD AND SWITCH - An entry adding method includes: a switch receives a first group entry sent by a controller, where the first group entry includes importance indication information of the first group entry, and a first action bucket; the switch determines that the first group entry cannot be added to a group table, and that a second group entry exits in the group table, the switch deletes the second group entry and adds the first group entry to the group table. Where importance of the second group entry is lower than importance of the first group entry; the second group entry includes a second action bucket; a quantity of first action buckets is not greater than the sum of a first value and a quantity of second action buckets; and the first value is a quantity of available action buckets in the group table. | 2016-04-28 |
20160119202 | CROSS-CLOUD MANAGEMENT AND TROUBLESHOOTING - A cloud management system is described herein that provides the ability for an application to span two or more clouds while allowing operation, management, and troubleshooting of the distributed application as a single application. The system provides infrastructure that communicates across datacenters for execution and for centralizing knowledge of instances of an application that are running at different locations. The infrastructure provided by the system monitors both the application and connections between the clouds, with intelligence to know if issues are within the application or because of the connection between the clouds. The system coordinates management functions across multiple cloud platforms/locations. Thus, the cloud management system creates a single monitoring and troubleshooting interface and knowledge and execution fabric across multiple clouds so that applications spread across multiple clouds can be monitored, managed, and debugged more easily. | 2016-04-28 |
20160119203 | Error Detection in Critical Repeating Data in a Wireless Sensor System - Provided are methods, systems, and apparatus for error detection of bits of a data packet received at a receiver unit by detecting corrupted data bits. | 2016-04-28 |
20160119204 | NETWORK CONFIGURATION AND OPERATION VISUALIZING APPARATUS - [Object] To provide a network visualizing apparatus giving a user to have a clear perspective of network configuration and operation. | 2016-04-28 |
20160119205 | Computer System and Computer-Implemented Method for Load Testing A Service-Oriented Architecture Service - A computer system for use in load testing a service-oriented architecture (SOA) service has a testing processor and a memory storage device in communication with the processor. The testing processor is adapted to receive an XML message, an address for a service to be tested, an action compliant with a protocol for exchanging structured information in a decentralized, distributed environment and associated with the service; create and store in memory a template message package compliant with the protocol; create a populated message package compliant with the protocol by incorporating in the template message package the XML message, the address and the action; establish a connection to the service and furnish one or more documents to the service; and receive a response from the service. | 2016-04-28 |
20160119206 | METHOD AND APPARATUS - A method comprising: determining in an element that a load level in the element has changed; and deactivating at least one inactive session when a load level is above a load level threshold. | 2016-04-28 |
20160119207 | PROGRESSIVE DEPLOYMENT AND TERMINATION OF CANARY INSTANCES FOR SOFTWARE ANALYSIS - A data processing method, comprising: using computing apparatus, causing instantiating a plurality of baseline application instances that are running a first version of software, and one or more canary application instances that are running a second version of the software; using computing apparatus including a load balancer, causing selectively routing a first proportion of incoming requests to the baseline instances, and routing a second proportion of the incoming requests to the canary instances; monitoring the plurality of canary instances to collect performance data for performance metrics; determining that the performance data indicates a negative performance issue, and in response thereto: using computing apparatus, automatically updating the first proportion to be larger and updating the second proportion to be smaller, and then reconfiguring the load balancer based upon the first proportion and the second proportion; terminating one or more of the canary application instances. | 2016-04-28 |
20160119208 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - A method for tracking provenance information includes catching and logging data events performed by an instrumented application at a provenance layer. Overwritten library call instructions provide library calls to one or more instrumented libraries that invoke the provenance layer to track data operations. A provenance log is created that includes the logged data events. | 2016-04-28 |
20160119209 | SELECTIVELY RE-HOMING DATA PROCESSING TASKS BASED ON DATA COMPLEXITY AND CANDIDATE SYSTEM PERFORMANCE CHARACTERISTICS - Techniques are disclosed for selectively re-homing data processing tasks based on data complexity and candidate system performance characteristics. A server system obtains performance capabilities of a target system such that the server can decide whether to send program code and data to the target system for execution, based in part on the complexity of the data and code used in performing the request. In cases where a client system sending a request is capable of executing code and where other constraints are satisfied, e.g., bandwidth, throughput, and data volume, then the server can decide to re-home both the data and the program code to the client for execution. | 2016-04-28 |
20160119210 | USER INTERFACES FOR CONTINUOUS GLUCOSE MONITORING - The subject matter disclosed herein provides methods for presenting glucose level data. Glucose data for a patient may be received. A current glucose level and a rate of change of the current glucose level may be determined based on the received glucose data. A first interface may be displayed on a screen of a device. The first interface may include a unitary icon. The unitary icon may display the current glucose level and a visualization of the rate of change. Related apparatus, systems, techniques, and articles are also described. | 2016-04-28 |
20160119211 | TUNNELED MONITORING SERVICE AND METHOD - Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded. | 2016-04-28 |
20160119212 | Physical Resource Management - A method and system for resource management is provided. The method includes generating a physical server pool. Resources of the physical server pool and additional resources of additional physical server are monitored and monitored data is retrieved during the monitoring. A utilization rate of the additional physical server pools is determined to be less than a threshold value. In response a group of physical servers is migrated to a free server pool. The physical server pool is determined to need an additional server and each physical server pool is rated based on a calculated chance for required usage. A first physical server is allocated to the physical server pool. | 2016-04-28 |
20160119213 | Mapping Network Service Dependencies - A method and apparatus for discovering service dependencies. A plurality of connections is identified between nodes in a data network. A set of connection pairs is identified based on the plurality of connections identified. A set of time series is created for the set of connection pairs using monitoring data received from a plurality of sensors monitoring the data network. Service dependencies may be discovered using the set of time series. | 2016-04-28 |
20160119214 | INFORMATION PROCESSING METHOD AND DEVICE - It is described an information processing method and device. It is received a request for service data from a client device. In response to the request for service data, it is sent at least two probing packets which contain the service data to the client device on a forward path which is from a server to the client device. It is obtained timing information, which includes: a time stamp corresponding to the service data, a time stamp corresponding to the request for the service data, and time stamps corresponding to at least two backward-path packets sent by the client device on a backward path, the backward path being from the client device to the server. It is determined according to the timing information a one-way path metric. | 2016-04-28 |
20160119215 | MONITORING NETWORK PERFORMANCE OF ENCRYPTED COMMUNICATIONS - According to one general aspect, a method of using a first probing device may include monitoring one or more encrypted communications sessions between a first computing device and a second computing device. In some implementations of the method, each encrypted communications session includes transmitting a plurality of encrypted data objects between the first and second computing devices. The method may include deriving, by the first probing device, timing information regarding an encrypted communications session. The method may also include transmitting, from the first probing device to a second probing device, the derived timing information. | 2016-04-28 |
20160119216 | METHOD AND DEVICE FOR ACTIVATING AND DEACTIVATING SECONDARY COMPONENT CARRIER IN CARRIER AGGREGATION - The present invention relates to communication technology. Disclosed are a method and device for activating and deactivating a secondary component carrier (SCC) in carrier aggregation. When the cache data volume reported by an RLC reaches an activation data volume threshold, increasing the count value of an SCC activation counter instead of directly activating an SCC; when determining that a monitor condition is met, and if the ratio of the count value of the SCC activation counter and the report times of the RLC reaches a set activation threshold, then indicating that the cache data volumes reported for multiple times all reach the activation data volume threshold, and then activating the SCC, thus avoiding multiple activations and deactivations during a short time, and improving SCC rate stability. | 2016-04-28 |
20160119217 | HARDWARE TRIGGER GENERATION FROM A DECLARATIVE PROTOCOL DESCRIPTION - A test-and-measurement instrument is described. A state machine, corresponding to a regular expression, can be stored in the test-and-measurement instrument. The state machine can be modified to reflect a trigger condition received from a user. The modified state machine can then be used to invoke a trigger when the condition is met in the bits of a bit stream. | 2016-04-28 |
20160119218 | DERIVING HARDWARE ACCELERATION OF DECODING FROM A DECLARATIVE PROTOCOL DESCRIPTION - A test-and-measurement instrument is described. The test-and-measurement instrument can store a state machine. As the state machine is used to analyze a bit stream, breadcrumbs can be saved from states in a memory of the state machine. The breadcrumbs can then be used to analyze the operation of the state machine. | 2016-04-28 |
20160119219 | METHOD FOR REACHABILITY MANAGEMENT IN COMPUTER NETWORKS - Various techniques for partitioning an overlay network is disclosed herein. In certain embodiments, an overlay network can be partitioned into overlay partitions with manageable sizes. Each overlay partition can independently manage and update reachability information only for end points that belong to a virtual network with at least one end point in the overlay partition. Thus, each overlay partition can operate independently from others to achieve fast reachability updating for relocated virtual machines or other end points. | 2016-04-28 |
20160119220 | MULTIPLE RING IDENTIFICATION AND CONFIGURATION PROTOCOL - A protocol identifies and configures rings in a network topology automatically in order to simplify and quicken the actions that need to be performed in response to addition, deletion and shuffle of network nodes in that topology. Such rings do not need to be identified and configured manually. The protocol involves two separate sequentially performed phases. In the first phase, the protocol can automatically identify all rings that are present within a Virtual Local Area Network (VLAN) topology. In the second phase, the protocol can automatically configure each node of each such ring in conformity with the Ethernet Ring Protection (ERP) protocol. After this ERP configuration has been performed, the failure of a link within the network will not require every network node to re-learn paths through the network; instead, the nodes that are required to re-learn such paths can be limited to those within the particular ring that contained the failed link. | 2016-04-28 |
20160119221 | TRANSMISSION DEVICE AND METHOD FOR ESTABLISHING PATH IN MULTILAYER NETWORK - A transmission device is located between a first node and a second node in a multi-layer network in which a path message is transmitted from the first node to the second node and a response message corresponding to the path message is transmitted from the second node to the first node. A transmission device includes: an upper layer switch that processes traffic in the upper layer; a lower layer switch that processes traffic in a lower layer; and a signaling processor that processes the path message and the response message. The signaling processor transmits a message for establishing a path in the lower layer to a node represented by node information added to the response message received from an adjacent node on a downstream side when the lower layer switch is not connected to a lower layer switch of an adjacent node on an upstream side. | 2016-04-28 |
20160119222 | METHOD AND APPARATUS FOR ROUTING TRAFFIC USING ASYMMETRICAL OPTICAL CONNECTIONS - A method, computer-readable storage device and apparatus for routing traffic in a reconfigurable optical add-drop multiplexer layer of a dense wavelength division multiplexing network are disclosed. For example, the method determines the reconfigurable optical add-drop multiplexer layer has asymmetric traffic, and routes the asymmetric traffic in the reconfigurable optical add-drop multiplexer layer over a plurality of asymmetrical optical connections, wherein the plurality of asymmetrical optical connections is provided with only uni-directional equipment in the reconfigurable optical add-drop multiplexer layer. | 2016-04-28 |
20160119223 | REFRESH INTERVAL INDEPENDENT FAST REROUTE FACILITY PROTECTION TEAR DOWN MESSAGING - In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router. Based on whether or not the network device determines it is a MP, the network device may selectively clean up LSP states when there is an upstream link or node failure. The RSVP-TE protocol may be extended to enable a network device to send a tear down message to a downstream router, which may enable the downstream router to conditionally delete locale LSP state information. In some instances, a PLR network device may directly send a tear down message to a MP network device even though the PLR network device may not have a working bypass LSP. | 2016-04-28 |
20160119224 | LABEL SWITCHED PATH NODE FAILURE MANAGEMENT FOR LABEL SWITCHED PATHS HAVING REFRESH INTERVAL INDEPENDENT FAST REROUTE FACILITY PROTECTION - In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router. Based on whether or not the network device determines it is a MP, the network device may selectively clean up LSP states when there is an upstream link or node failure. The RSVP-TE protocol may be extended to enable a network device to send a tear down message to a downstream router, which may enable the downstream router to conditionally delete locale LSP state information. In some instances, a PLR network device may directly send a tear down message to a MP network device even though the PLR network device may not have a working bypass LSP. | 2016-04-28 |
20160119225 | TRANSMISSION APPARATUS AND REDUNDANCY METHOD - A transmission apparatus includes: a switch circuit to hold a first protection path provided for a working path in a first network, a second protection path provided for the working path in a second network, and a bridge path provided between a working apparatus to relay traffic on the working path between the first and second networks and a protection apparatus to relay traffic on the first and second protection paths; and a signal processing unit to, upon reception of a first control signal indicating a failure on the working path from the first network, transmit the first control signal to the working apparatus and control the switch circuit in accordance with a second control signal corresponding to the first control signal received from the working apparatus, wherein the transmission apparatus is the protection apparatus, and is provided on a boundary between the first and second networks. | 2016-04-28 |
20160119226 | Transparent Network Service Header Path Proxies - A controller that is in communication with the plurality of network nodes establishes a service path for a service chain defined by an ordered sequence of service functions to be performed at respective ones of one or more of the plurality of network nodes. The controller assigns a predetermined service path identifier and a predetermined service index value for a segment of the service chain that includes only one or more network nodes not capable of decapsulating packets to extract a network service header so as to designate the one or more network nodes determined not capable of decapsulating packets to extract the network service header as a single service hop segment in the service chain. | 2016-04-28 |
20160119227 | DISTRIBUTED SYSTEM AND METHOD FOR FLOW IDENTIFICATION IN AN ACCESS NETWORK - A system and method for tracking and adjusting packet flows through a network having a service delivery node and one or more residential services gateways. Packet flows are recognized as they pass through one or more residential services gateway and flow analytics information corresponding to the packet flows recognized in the residential services gateways are transferred from the residential gateways to the flow identification control unit. The flow analytics information received from the residential services gateways is analyzed within the flow identification control unit and traffic through one or more of the service access platform and the residential services gateways is adjusted, if necessary, as a function of the flow analytics information analyzed by the flow identification control unit. | 2016-04-28 |
20160119228 | FORWARDING PACKETS - A control device may allocate a global label for a switch device based on a forwarding equivalent class (FEC), and issue the global label to the switch device. Subsequently, for a packet not carrying the global label, after matching the packet not carrying the global label with the FEC, the switch device may encapsulate the global label for the packet, and forward the packet. For a packet carrying the global label, the switch device may forward the packet carrying the global label by using a global label forwarding entry. | 2016-04-28 |
20160119229 | Method for Establishing Tunnel, Method for Allocating Label, Device and Network System - A network system includes a first Egress PE | 2016-04-28 |
20160119230 | HYPERVISOR INDEPENDENT NETWORK VIRTUALIZATION - A method includes receiving a first packet having a first virtual local area network (VLAN) identifier (ID) directly from a first virtual switch using a first physical overlay switch located at an edge of an internet protocol (IP) network, encapsulating the first packet with an overlay header and tunneling the first encapsulated packet via Layer-3 operations across the IP network to a second physical overlay switch in response to a determination that a source of the packet is physically separated from a destination of the packet by the IP network, receiving a second encapsulated packet having a second overlay header from the second physical overlay switch, de-encapsulating the second encapsulated packet to create a second packet having a second VLAN ID, and sending the second packet having the second VLAN ID directly to the first virtual switch operating in the first hypervisor domain. | 2016-04-28 |
20160119231 | METHOD FOR TRANSMITTING ROUTING INFORMATION - A method for transmitting routing information between first and second nodes of a plurality of nodes capable of exchanging data relative to the management of subscribers to electronic communication services. The first node and the second node are connected and have exchanged the respective management capabilities thereof. The method includes, when the management capabilities supported by both the first node and the second node include a discovery capability: triggered by a predefined event, transmission, by the first node to the second node, of a discovery message including at least one item of routing information included in a routing table of the first node and relative to at least a third node. | 2016-04-28 |
20160119232 | Method and Apparatus for Processing Data Packets - A method and apparatus for processing a plurality of data packets. A data packet is received. A determination is made as to whether a portion of the data packet follows a selected digital recorder standard protocol based on a header of the data packet. Raw data in the data packet is converted into human-readable information in response to a determination that the portion of the data packet follows the selected digital recorder standard protocol. | 2016-04-28 |
20160119233 | METHOD AND SYSTEMS FOR SEAMLESS MEDIA TRANSITION BETWEEN NETWORKS - Methods and systems for forwarding data packets containing media of an Internet protocol (IP) communication are provided herein. In some embodiments, a method for forwarding data packets containing media of an IP communication may include receiving IP communication setup signaling that includes an indication of a first originating IP address for data packets that are to be forwarded to a destination address; setting the first originating IP address as an authorized originating IP address; receiving a data packet from a second originating IP address directed to the destination address; and determining whether to forward the data packet from the second originating IP address to the destination address based on whether a first pre-defined time interval has elapsed since a last data packet was received from the first originating IP address. | 2016-04-28 |
20160119234 | CONTENT FILTERING FOR INFORMATION CENTRIC NETWORKS - A method provides filtering of content objects on a per user basis at a gateway node in a content centric networking (CCN) network. The gateway node has a network interface with a network of a user device originating a CCN interest packet. The method includes receiving a CCN interest packet including a CCN name and a user identity, retrieving a content object identified by the CCN name, and retrieving allowed categories of the user. The method further includes retrieving categories of the content object, checking whether allowed categories of the user enable retrieval of the content object based on comparison with the categories of the content object, and forwarding the content object to user in response to the allowed categories enabling retrieval of the content object for the user. | 2016-04-28 |
20160119235 | FILTERING AND ROUTE LOOKUP IN A SWITCHING DEVICE - Methods and devices for processing packets are provided. The processing device may include an input interface for receiving data units containing header information of respective packets; a first module configurable to perform packet filtering based on the received data units; a second module configurable to perform traffic analysis based on the received data units; a third module configurable to perform load balancing based on the received data units; and a fourth module configurable to perform route lookups based on the received data units. | 2016-04-28 |
20160119236 | SOURCE ROUTING WITH FABRIC SWITCHES IN AN ETHERNET FABRIC NETWORK - In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions are readable/executable by a processor to receive, by the processor, a packet via a network fabric, the network fabric having a plurality of interconnected fabric switches. The embodied program instructions are also readable/executable by the processor to determine, by the processor, a path through the network fabric by consulting a source-routing table. Moreover, the embodied program instructions are readable/executable by the processor to store, by the processor, source-routing information to a packet header for the packet, the source-routing information including the path. In addition, the embodied program instructions are readable/executable by the processor to send, by the processor, the packet according to an indication in the source-routing information. | 2016-04-28 |
20160119237 | WIRED DATA-CONNECTION AGGREGATION - According to at least one embodiment, a computer-implemented method to transmit data is described. The data being transmitted over a wired data-connection may be identified. The identified data may be parsed into two or more parts. A first part of the identified data may be transmitted over a primary wired data-connection. A second part of the identified data may be transmitted over an auxiliary wired data-connection. The auxiliary wired data-connection may be connected to the primary wired data-connection via a wireless data-connection. | 2016-04-28 |
20160119238 | System and Method for Optimizing Transportation Over Networks - A system and method for efficient transfer of data over a network. A data source and a destination are coupled to one another via a network. The data source is configured to transmit data to the destination and determine a network latency associated with the transmission. In response to determining a first transmission parameter may not be optimized, the source is configured to modify the first transmission parameter and evaluate its effect on data throughput. The source may repeat such modifications as long as throughput is increased. Once the first transmission parameter is deemed optimized, the source may perform a similar procedure for a second transmission parameter. In various embodiments, the first transmission parameter may correspond to a packet size and the second transmission parameter may correspond to a number of streams being processed by the source. | 2016-04-28 |
20160119239 | Method and Apparatus for Providing an Efficient Multi-Client Access - An apparatus and a method for providing an efficient multi-client access in a WLAN, the method comprising the step of: when the number of clients exceeds a threshold, creating at least two virtual access points (VAP1, VAP2, VAP3); load balancing by distributing workloads across the created at least two virtual access points; and dynamically allocating at least one quality of service parameter (e.g., timeslots, AIFS, TXOP, maximum and minimum contention window) to each of the created at least two virtual access points. | 2016-04-28 |
20160119240 | DATA-CONNECTION AGGREGATION - A method for security and/or automation systems is disclosed. The method may include identifying data being transmitted over a wired data-connection and parsing the identified data into two or more parts. The method may additionally include transmitting a first part of the identified data over a primary wireless data-connection and transmitting a second part of the identified data over an auxiliary wireless data-connection connected to the primary wireless data-connection via a wireless data-connection. | 2016-04-28 |
20160119241 | Method and device for regulating a quality of service between a local area network and a wide area network - A method is provided for regulating a Quality of Service in a local area network, including the following: a Quality of Service regulator receives at a gateway of the local area network, from at least one Quality of Service checker, a status report concerning a distributed application; the Quality of Service regulator establishes, based on the status report, traffic engineering rules pertaining to the gateway; and the Quality of Service regulator transmits the traffic engineering rules to a Quality of Service controller. A corresponding device, a corresponding computer program and a corresponding storage medium are also provided. | 2016-04-28 |
20160119242 | Method and Device for Processing a Call, and Terminal - Provided are a call processing method, device and terminal. The method comprises: acquiring the call quality of a call link which will be used for a call; and according to the call quality, performing call processing. By means of the disclosure, the problem that the user experience is seriously affected by instable calls and large time delay existing in the related art is solved. The invention allows a user to know the call quality of a current network before placing a call, thereby enabling said user to select, according to the call quality, the appropriate call mode and application for the call, greatly improving the user experience. | 2016-04-28 |
20160119243 | APPARATUS AND METHOD FOR TRANSMITTING FILE - A file transmission apparatus includes a hardware processor to implement: a determiner that determines whether a transmission target file is a first transmission file; and a transmitter that transmits a plurality of packets of the transmission target file to a file reception apparatus, wherein the transmitter transmits the transmission target file in which a duplicate portion between the transmission target file and a previously transmitted file is reduced, when it is determined that the transmission target file is not the first transmission file, and transmits the transmission target file without reducing the transmission target file when it is determined that the transmission target file is the first transmission file, wherein a transmission speed of the plurality of packets is increased by increasing an amount of the plurality of packets to be input to a buffer of a router while not exceeding a size of the buffer of the router. | 2016-04-28 |
20160119244 | FACILITATING WORKLOAD-AWARE SHUFFLING AND MANAGEMENT OF MESSAGE TYPES IN MESSAGE QUEUES IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic workload-aware shuffling of message types in message queues in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes monitoring, in runtime, workload patterns associated with incoming workloads, where each workload is associated with a plurality of message types and the plurality of message types are inspected and processed in a predetermined order. The method may further include collecting, in runtime, information regarding each message type based on a workload pattern of its associated workload, and dynamically shuffling the order based on the information, where shuffling includes ordering a first set of message types having one or more messages ahead of a second set of message types having fewer or no messages. | 2016-04-28 |
20160119245 | SIMPLE INTEGRATION OF AN ON-DEMAND COMPUTE ENVIRONMENT - Disclosed are a system and method of integrating an on-demand compute environment into a local compute environment. The method includes receiving a request from an administrator to integrate an on-demand compute environment into a local compute environment and, in response to the request, automatically integrating local compute environment information with on-demand compute environment information to make available resources from the on-demand compute environment to requestors of resources in the local compute environment such that policies of the local environment are maintained for workload that consumes on-demand compute resources. | 2016-04-28 |
20160119246 | FACILITATING DYNAMIC HIERARCHICAL MANAGEMENT OF QUEUE RESOURCES IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic hierarchical management of queue resources in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes assigning, in runtime, by the database system, weights to at least one of a plurality of tenants and a plurality of message types. The assigned weights are capable of being dynamically scaled, in runtime, based on one or more factors. The method may further include allocating, in runtime, by the database system, resources to one or more of the plurality of tenants and one or more of the plurality of message types based on their assigned one or more weights of the weights. The allocated resources are capable of being dynamically modified, in runtime, based on scaling of the assigned weights. | 2016-04-28 |
20160119247 | AUTOMATIC RESOURCE DELIVERING APPARATUS AND METHOD THEREOF - An automatic resource delivering apparatus and a method thereof are provided. The automatic resource delivering apparatus includes a control server, a data bank apparatus and a plurality of resource delivering devices. The control server generates a plurality of delivery planning commands according to a plurality of dispatching instructions, respectively. A data bank controller of the data bank apparatus decides whether to enable a flow control scheme according to an amount of the delivery planning commands, and transmits control parameters corresponding to the delivery planning commands to the control server. At least one of the delivering devices executes a resource delivering operation according to an action command generated by the control server. The control server stores each of the delivery planning commands to a command queue in the data bank apparatus according to whether the flow control scheme being enabled and the control parameter corresponding to each delivery planning command. | 2016-04-28 |
20160119248 | USER DRIVEN SMARTPHONE SCHEDULING ENHANCEMENT FOR RUNNING DATA ANALYTICS APPLICATION - Methods and devices for controlling execution of a data analytics application on a computing device are described. The devices include an alert app to prompt a user on system load and to recommend the user for proactively controlling the execution of a set of processes to reclaim computational resources required for execution of the data analytics application on the devices. | 2016-04-28 |
20160119249 | ORCHESTRATED PEER-TO-PEER SERVER PROVISIONING - Embodiments of the present invention address deficiencies of the art in respect to server provisioning in a heterogeneous computing environment and provide a method, system and computer program product for secure and verified distributed orchestration and provisioning. In one embodiment of the invention, a server provisioning method can be provided. The server provisioning method can include establishing grouping criteria, grouping different target computing nodes into different groups of target computing nodes according to the established grouping criteria, server provisioning a root node in each of the different groups of target computing nodes, and relying upon the root node in each of the different groups to peer-to-peer server provision remaining nodes in each of the different groups. | 2016-04-28 |
20160119250 | Transparent Proxy Architecture for Multi-Path Data Connections - A method for forming an optimized communication connection providing enhanced performance of an application utilizing the communication connection is provided, the communication connection including multiple individual communication networks. The method includes: obtaining a set of performance requirements corresponding to the application utilizing the communication connection; obtaining real-time capacity information for each of a plurality of available channels associated with the respective individual communication networks; applying at least one policy-based management criteria to the available channels for controlling, in real-time, one or more aspects of the available channels; dynamically aggregating the individual communication networks to form the optimized communication connection, the communication connection leveraging one or more features and capabilities of at least a subset of the communication networks; and controlling real-time traffic scheduling across at least a subset of the available channels so as to adapt the communication connection to changes in network conditions and/or policy-based management criteria. | 2016-04-28 |
20160119251 | SYSTEM AND METHOD FOR CREATING VIRTUAL INTERFACES BASED ON NETWORK CHARACTERISTICS - A network-configuring system creates stable virtual interfaces for groups of neighboring network nodes. During operation, the system can obtain network-neighborhood information from one or more network neighbors. This network-neighborhood information includes duplex-neighborhood information that indicates at least a set of neighboring devices to the network neighbor, and a set of remote network nodes which are accessible via a respective neighbor. The system can use the network-neighborhood information to determine one or more groups of network neighbors with common network characteristics, such that a respective group includes one or more mutually-connected network peers. The system can then define a virtual interface for a respective group of stable network neighbors, such that the virtual interface's member nodes include the local network node and the respective group's mutually-connected network peers. | 2016-04-28 |
20160119252 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, SERVER EQUIPMENT, AND COMMUNICATION EQUIPMENT - A server includes a plurality of network interfaces capable of communicating between the server and a plurality of communication apparatus which includes network ports capable of connecting a communication cable; a first unit specifying a pair of the network ports, which are connected via the communication cable, according to information related to connectivity of the network ports; and a second unit sending an instruction to the communication apparatus; wherein the instruction is to connect a first end of the communication cable to a first port corresponds to the specified port, and to connect a second end of the communication cable to a second port corresponds to the specified port. | 2016-04-28 |
20160119253 | METHOD AND SYSTEM OF PERFORMING SERVICE FUNCTION CHAINING - A method and system of performing service function chaining is disclosed. The method includes: determining a service function path (SFP) for a packet transmitted to the network device; determining a service function (SF) through which the received packet passes on the SFP; and processing the received packet based on whether a function of the SF is essential or not. Accordingly, the SFs can be categorized into mandatory SFs and optional SFs based on the functions of the SFs or the setting for the SFC and the SFC can be more stably implemented based on the categorization. | 2016-04-28 |
20160119254 | METHODS AND SYSTEMS FOR PROVIDING NETWORK ACCESS REDUNDANCY - In a networked multi computer environment with redundant links, network interface cards (NICs) are commonly duplicated and teamed to provide a recovery mechanism when network components fail. Embodiments of the present inventions avoid teaming of pairs of NICs and provide a computing host with redundant network connections for the computing host through a switch that is transparent to the computing host. The computing host itself; that is, its hardware and software, is relieved of the duty of network access redundancy and returned to the simple, simplex networking operating mode. The switch replaces a potentially large number of NICs and the need for computing host network access redundancy management which leads to hardware and software cost reductions and increases the robustness and reliability of the system through redundant network access. | 2016-04-28 |
20160119255 | Partial Software Defined Network Switch Replacement in IP Networks - The claimed subject matter is directed to novel methods and systems for a network topology wherein an Internet Protocol (IP) network is partially integrated and enhanced with a relatively small number of Software Defined Network (SDN)-Openflow (SDN-OF) enabled network devices to provide a resilient network that is able to quickly recover from a network failure and achieves post-recovery load balancing while minimizing cost and complexity. The SDN-OF Controller, or a management node, determines such a minimum set of SDN-OF enabled devices and establishes IP tunnels to route traffic from nodes affected by failure to designated SDN-OF switches and finally to the final destination without looping back to the failed link or node. By combining SDN-OF enabled switches with IP nodes such as routers, a novel network architecture and methods are described herein that allows for ultra-fast and load balancing-aware failure recovery of the data network. | 2016-04-28 |
20160119256 | DISTRIBUTED VIRTUAL SWITCH SYSTEM - A distributed virtual switch system comprises a controller and multiple servers. Each server is configured with a virtual SDN switch and at least one VM. Each VM is connected with an external physical switch via the SDN switch. The controller obtains interface information of a switch logic interface corresponding to a VM, adds an entry comprising the interface information into a local global interface management table. The interface information includes a global unique identifier of the switch logic interface corresponding to the VM, a switch identifier of an SDN switch corresponding to the switch logic interface, and a local port identifier of the SDN switch corresponding to the switch logic interface. The controller manages each VM connected with each SDN switch according to the local global interface management table. | 2016-04-28 |
20160119257 | METHOD AND DEVICE FOR PROVIDING COMMUNICATION BETWEEN MULTI-DEVICES - A method of providing communication between a plurality of devices of a user without a dedicated server and a device capable of communicating with other devices by using the method are disclosed. The method includes generating a message to be sent to a second device and storing a channel file including message data in a predetermined space within a cloud server, which are performed by a first device, and accessing the cloud server and reading a channel file stored in a predetermined place within the cloud server, which are performed by the second device. | 2016-04-28 |
20160119258 | SUBSCRIPTION/NOTIFICATION OF A CONFERENCE IN A COLLABORATION CONFERENCING SYSTEM - Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing controller in the network configured to control certain aspects of establishing a collaboration conference. In one particular embodiment, the user of the network may access the control system application to provide one or more conferencing parameters or settings the user wishes to be present during a collaboration conference session. The parameters may then be established by the control system and associated with the conferencing session involving the user. In one embodiment, such information may be associated with the identification token. In yet a further embodiment, a user to the collaboration control system may subscribe to receive a notification when another user of the system accesses a portion of a collaboration of the system. | 2016-04-28 |
20160119259 | METHOD, TERMINAL DEVICE AND SERVER FOR PUSHING MESSAGE THROUGH LIGHT APPLICATION - The present disclosure relates to a method, a terminal device and a server for pushing message through light application, which belongs to the field of internet technology. The method comprises: acquiring an application list of light applications added to a terminal device, the application list listing at least one light application; sending the application list to a push server through a browser, so that the push server acquires a data packet to be pushed corresponding to the at least one light application according to the application list, the data packet to be pushed comprising at least a message to be pushed and push object information; and receiving the data packet to be pushed corresponding to the at least one light application through the browser. | 2016-04-28 |
20160119260 | APPARATUS AND METHOD FOR OPTIMIZED MULTI-FORMAT COMMUNICATION DELIVERY PROTOCOL PREDICTION - This disclosure relates generally to apparatus, methods, and computer readable media for composing communications for computing devices across multiple formats and multiple protocols. More particularly, but not by way of limitation, this disclosure relates to apparatus, methods, and computer readable media to permit computing devices, e.g., smartphones, tablets, laptops, and the like, to send communications in a number of pre-determined and/or ‘determined-on-the-fly’ optimal communications formats and/or protocols. Determinations of optimal delivery methods may be intelligently based on the sender individually or the relationship with the sender in the context of a group of recipients—including the format of the incoming communication, the preferred format of the recipient and/or sender, and an optimal format for a given communication message. The techniques disclosed herein allow communications systems to become ‘message-centric’ or ‘people-centric,’ as opposed to ‘protocol-centric,’ eventually allowing consideration of message protocol to fall away entirely for the sender of the communication. | 2016-04-28 |
20160119261 | APPARATUS AND METHOD FOR MULTI-FORMAT AND MULTI-PROTOCOL GROUP MESSAGING - This disclosure relates generally to apparatuses, methods, and computer readable media for composing communications for computing devices across multiple formats and multiple protocols. More particularly, but not by way of limitation, this disclosure relates to apparatuses, methods, and computer readable media to permit computing devices, e.g., smartphones, tablets, laptops, and the like, to send encrypted or unencrypted group communications in a number of pre-determined and/or ‘determined-on-the-fly’ communications formats and/or protocols. Correlation of messages comprising secure group communications across multi-format multi-protocol may be determined by tracking message groups and mapping aliases across protocols. The techniques disclosed herein allow communications systems to become ‘message-centric’ or ‘people-centric’ as opposed to ‘protocol-centric,’ eventually allowing consideration of message protocol and security mechanisms to fall away entirely for the sender of the communication. | 2016-04-28 |
20160119262 | Subscription-Based Media Push Service - Aspects of the subject disclosure may include, for example, a process that determines an identity of a subscriber of a media service. A viewing criterion of the subscriber is determined and a media content item is identified based on the viewing criterion of the subscriber. The media content item is provided for delivery to a media processing device without first requiring a request for delivery of the media content item. The media processing device is identified by a network service provider based on a selection of the media processing device from among a number of devices of the subscriber that are registered with the network service provider. The selection of the media processing device is based on device capabilities and the identity of the subscriber. Other embodiments are disclosed. | 2016-04-28 |
20160119263 | SYSTEM FOR DELEGATING THE PRIORITIZATION OF INCOMING COMMUNICATIONS TO TRUSTED USERS - A computer-implemented method for prioritizing an incoming communication directed to a recipient by an originator includes creating a privacy/trust relationship between a recipient and an originator in response to user input, and determining a disposition of an incoming communication by reference to the privacy/trust relationship. | 2016-04-28 |
20160119264 | RE-ROUTING INCOMING EMAIL FOR A MULTI-TENANT DATABASE SYSTEM - A method for processing email for a multi-tenant database system is presented here. The system includes a plurality of data centers and a plurality of instances of a database system core. Each data center implements at least one instance of the database core. The method receives an incoming email at a first local mail transfer agent (MTA) of a first data center, wherein the incoming email is erroneously directed to a first instance of the database system core. The method continues by searching a private domain name service (DNS) database maintained at the first data center, based on an identifier of the first instance and an identifier of the first data center. The method then obtains an identifier associated with a second data center of the plurality of data centers, and routes the incoming email in accordance with the identifier of the second data center. | 2016-04-28 |
20160119265 | SOCIAL NETWORK USERS' INTERACTIONS BY SPLITTING POSTS IN A THREAD INTO A NEW THREAD - A method, system and computer program product for improving social network users' interactions. The content of posts in a thread is analyzed so as to group the posts by topic. The posts directed to a specific topic are then analyzed to determine which users posted an initial post or a comment containing an ongoing question not answered. The users' profiles, liked pages and/or friends' graphs for the users involved in the analyzed posts are analyzed to determine any relationships among the users. Furthermore, past communication patterns and/or liked pages of the users are analyzed to determine the likelihood of responding to posts. The posts in the original thread are split into a new thread containing the group(s) of posts directed to a topic(s) having a group of users who would most likely participate in the new thread, where the group of users is selected based on the analysis discussed above. | 2016-04-28 |
20160119266 | ENCODING PORTIONS OF A MESSAGE - The disclosure is related to encoding a message or portions of the message to be exchanged between a pair of users. Messages can be exchanged between a pair of users in multiple ways, e.g., electronic mail, short messaging service (SMS), messenger applications. The computing resource, e.g., network bandwidth consumed in transmission of the messages, can be minimized by encoding/compressing at least portions of a message prior to transmission. A server analyzes messages exchanged between a pair of users to identify message portions, e.g., a word or a phrase, that are commonly exchanged and generates a set of codes for those message portions. The pair of users can use the set of codes for encoding and/or decoding the messages exchanged between them. The codes are generated using a specified coding technique, e.g., Huffman coding. | 2016-04-28 |
20160119267 | METHOD FOR NOTIFYING A SALES PERSON OF A SALES PROSPECT - A computer system and method that immediately alerts a sales person with a notification message when the online behavior or usage criteria of a subscriber is met, so that the sales person may follow up on the sales lead before the subscriber loses interest in the commodity or buys elsewhere. With the preferred embodiment, the activity criteria for each subscriber (or a group of subscribers) can be preset by the sales person, so as to selectively quantify degrees of activity that triggers the sending notification messages. With the preferred embodiment records are kept of all the events, including triggers and messages sent in relation to the subscribers and sales persons and these records provide valuable management information for evaluating the efficiency of online marketing campaigns. | 2016-04-28 |
20160119268 | SYSTEM AND METHOD FOR ENTITY DETECTION IN MACHINE GENERATED MESSAGES - Disclosed is a system and method for email management that leverages information derived from automatically generated messages in order to identify types of messages and message content. The disclosed systems and methods apply the information learned from decoding previously received messages to other messages in a user's inbox to fully, or at least partially decode the information included within such messages. The disclosed systems and methods analyze messages received in a user's inbox to detect message specific information corresponding to types of content in the message and the location of such content in the messages. The message specific information is then applied to other newly received or identified messages to learn message specific information about those messages. Based on such learning, information can be extracted from such messages in order to increase a user's experience and increase monetization. | 2016-04-28 |
20160119269 | METHOD AND SYSTEM FOR LOW-REDUNDANCY E-MAIL HANDLING - A method of low-redundancy e-mail handling, wherein: e-mail data is selected, attachments of e-mails comprised in the e-mail data are detached, stored and replaced with references accordingly, and wherein further e-mail threads comprised in the e-mail data are identified and split in separate e-mails, duplicates of e-mails are deleted while maintaining their e-mail references, differences between a first e-mail and an immediately preceding second e-mail of the same thread are identified, generating difference data, the first e-mail is replaced by the difference data, and a reference to the second e-mail is inserted therein, the e-mails and references to their predecessors and successors in the same thread are stored in a data storage, and a graph-based interface is generated for the stored e-mails and references, and an e-mail server computer device, e-mail client computer device, data processing program, computer program product, and computer data signal therefor. | 2016-04-28 |
20160119270 | STAKEHOLDER NOTIFICATION - As disclosed herein a method, executed by a computer, for enabling stakeholder notification includes receiving a message that indicates a stakeholder for a message and responding to an identified stakeholder without requiring user intervention. The stakeholder, specified by a stakeholder indicator, may be an address, a label, or the like that is included in a message header or embedded in the message. A messaging client may auto-populate the stakeholder indicator with a specified user, such as, a supervisor of the user preparing the message. Activation of the stakeholder field may be a configurable setting configured through email client options, or alternatively may be manually selected by the message author at the time of message creation. A user interface may be available allowing an identified stakeholder to request removal as a stakeholder. A computer system, and computer program product corresponding to the method are also disclosed herein. | 2016-04-28 |
20160119271 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR SOCIAL NETWORK SERVICE - A computer implemented method is provided. The computer implemented method includes A computer implemented method comprising receiving a request from a user of a social networking system to select a first post, receiving a first range from the user, providing a first group of content items comprising a first plurality of content items posted for a period of time of the first range including the first post, identifying a second post of the social networking system according to a predetermined criteria, identifying a second group of content items comprising a second plurality of content items posted for a period of time of the first range including the second post, and displaying at least one of the first group of content items and the second group of content items on a display device. Each of the content items of the first group and each of the content items of the second group are rearranged according to a relative time difference with a posting date of the first post. | 2016-04-28 |
20160119272 | METHOD AND SYSTEM OF MANAGING EPHEMERAL POST IN A SOCIAL NETWORKING SYSTEM - A method of posting ephemeral posts is disclosed. The method starts with receiving, from a user of a social network, a request to post an ephemeral post, the request including an ephemeral variable associated with a threshold event. The ephemeral post is posted on behalf of the user. Then an occurrence of the threshold event is monitored. When the threshold event has not occurred, the post is allowed to be accessible to at least one viewer other than the user. When the threshold event has occurred, the post is blocked from being accessible by the at least one view other than the user. | 2016-04-28 |
20160119273 | METHOD AND APPARATUS FOR GENERATING AND SENDING A TWO-DIMENSIONAL CODE IN A MESSAGE - A code-generating system can be accessed from within a messaging application on a mobile computing device to generate and insert a two-dimensional (2-D) code into a message. During operation, the system can receive a request to generate a 2-D code, such as from the messaging application executing on the mobile device or from the operating system. In response to receiving the request, the system can present a user-interface (UI) mechanism (e.g., modal window) for entering or selecting message content to convert into a 2-D code. Then, in response to obtaining the message content from a local user, the system may generate a 2-D code for the message content, and may generate a message that includes the 2-D code (e.g., by inserting the 2-D code into the message body). The system may then send the message, which includes the 2-D code, to a target recipient. | 2016-04-28 |
20160119274 | APPARATUS AND METHOD FOR INTELLIGENT DELIVERY TIME DETERMINATION FOR A MULTI-FORMAT AND/OR MULTI-PROTOCOL COMMUNICATION - This disclosure relates generally to apparatus, methods, and computer readable media for composing communications for computing devices across multiple formats and multiple protocols. More particularly, but not by way of limitation, this disclosure relates to apparatus, methods, and computer readable media to permit computing devices, e.g., smartphones, tablets, laptops, and the like, to send communications in a number of pre-determined and/or ‘determined-on-the-fly’ communications formats and/or protocols at one or more determined delivery times via a single, seamless user interface. The determined delivery time of any message to any recipient may be intelligently determined individually for each recipient, e.g., by using one or more context factors to assess optimal delivery times for each recipient. The techniques disclosed herein allow communications systems to become ‘message-centric’ or ‘people-centric,’ as opposed to ‘protocol-centric,’ allowing the message protocol and delivery time to be abstracted from the sender of the communication, if the sender so desires. | 2016-04-28 |
20160119275 | High Availability Internet Protocol Address Solution for Disaster Recovery - A system, a method, and a computer program product for providing a high availability internet protocol address are disclosed. At a first customer routing domain, a high availability internet protocol (“HA IP”) address is generated and configured on a first computing device located within the first customer routing domain. The HA IP address is forwarded to a second computing device located within at least one of the first customer routing domain and a second customer routing domain. The forwarded HA IP address is configured on the second computing device. The second customer routing domain is connected to the first customer routing domain using a transport mechanism. The first and second computing devices can be configured as a host for providing a communication capability to the customer routing domains based on the high availability internet protocol address. | 2016-04-28 |
20160119276 | DNS-Based Determining Whether a Device is Inside a Network - In a computing device a domain name system (DNS) query is generated and sent, and a check is made as to whether a verified DNS response to the DNS query is received. The computing device is determined to be inside a particular network if a verified DNS response is received, and is determined to be outside that particular network if a verified DNS response is not received. A DNS response can be determined to be verified if both the DNS response has an expected value and the DNS response is digitally signed by a trusted authority, and otherwise can be determined to be not verified. | 2016-04-28 |
20160119277 | LIGHT EMITTING DIODE LAMP WITH BURNABLE FUNCTION AND LIGHT EMITTING DIODE LAMP STRING WITH BURNABLE FUNCTION - A light emitting diode lamp with a burnable function includes at least a light emitting diode and a light emitting diode driving apparatus with the burnable function. The light emitting diode driving apparatus is electrically connected to the light emitting diode. The light emitting diode driving apparatus includes a positive contact and a negative contact. The light emitting diode driving apparatus receives a burn start signal sent through the positive contact and a burn address data sent through the positive contact. The light emitting diode driving apparatus is configured to burn the burn address data into the light emitting diode driving apparatus after the light emitting diode driving apparatus receives the burn start signal. | 2016-04-28 |
20160119278 | METHOD TO DISTRIBUTE A CENTRALIZED SERVICE - A network device may detect packets being transmitted on a network to obtain detected packets, identify Internet Protocol (IP) addresses corresponding to the detected packets, and identify candidate IP subnets that do not include any IP address in the IP addresses corresponding to the detected packets. A particular IP subnet may be selected from the set of candidate IP subnets for allocation to a set of target devices. A network device may identify a set of candidate Internet Protocol (IP) subnets, select a particular IP subnet from the set of candidate IP subnets, and transmit, to other network devices, an advertisement including an intent to use the particular IP subnet. Responsive to determining that none of the other network devices are using the particular IP subnet, the network device may select the particular IP subnet for allocating to a set of target devices. | 2016-04-28 |
20160119279 | CONTENT DELIVERY SYSTEMS AND METHODS - Aspects of the present disclosure involve a CDN utilizing a Direct Server Return (DSR) request command to create a tunnel from one content server to another content server of the CDN. Through the DSR tunnel, a request for content may be served from a content server that is more advantageous for the CDN for any number of reasons, such as from a content server that is logically closer to the content server. In determining when a DSR tunnel is created to provide the content, the CDN may access a database storing various information concerning the CDN, such as the location of egress gateways of the CDN in relation to one or more content servers, connecting network location information, the capabilities of one or more content servers, and/or load information of available content servers. | 2016-04-28 |
20160119280 | SYSTEM AND METHOD FOR ASSIGNING A SERVICE FLOW CLASSIFIER TO A DEVICE - A system and method for assigning a service flow classifier to a device. A MAC address of a device is extracted from a DHCP discover message. A DHCP server constructs a key from the device MAC address and an IP address assigned by the DHCP server. The key identifies a record of attributes of the device. A configuration server uses the key to access the attribute record and to generate a boot file for the device. The boot file includes one or more service flow classifiers that determine a service flow for packets destined for the device. | 2016-04-28 |
20160119281 | RELAY APPARATUS, RELAY SYSTEM, AND RELAY METHOD - Upon receipt of a packet addressed to a virtual IP address assigned to each first device from a second device outside a base network, a processor identifies a base relay apparatus that accommodates the first device, to which the virtual IP address is assigned, on the basis of the virtual address and a protocol type of the received packet, and also identifies a reception port number of the identified base relay apparatus, which corresponds to a combination of the virtual IP address and the protocol type of the received packet, from among reception port numbers each assigned to a combination of the first device accommodated to identify a transfer destination, and a protocol type. Then, the processor relays the received packet to the identified reception port number of the identified base relay apparatus. | 2016-04-28 |
20160119282 | DOMAIN NAME REGISTRATION VERIFICATION - Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: identify a domain name; request, access and/or download, from an electronic repository of domain name data, a historical data associated with the domain name; parse, from the historical data, at least one transaction associated with the domain name; calculate, according to the at least one transaction, a level of confidence that a history of registration of the domain name is complete and accurate; and transmit the historical data to a client computer communicatively coupled to the network. | 2016-04-28 |
20160119283 | DOMAIN NAME HI-JACK PREVENTION - A domain name hi-jack prevention service may be selected by a domain name registrant and enabled by a Registrar. In a first embodiment, the Registrar may send a confirmation request via a preferred contact method to the registrant and only move the domain name from a first account to a second account (both managed by the Registrar) when the registrant confirms the request. In a second embodiment, a third party platform that is independent from and/or not the Registrar confirms the identity of the registrant before the Registrar moves the domain name from the first account to the second account (again, both managed by the Registrar). In a third embodiment, a third party platform communicates an authorization code to a verified registrant so the registrant can enter the authorization code with a Gaining Registrar so the domain name may be transferred from a Losing Registrar to the Gaining Registrar. | 2016-04-28 |
20160119284 | REMOTE GRANT OF NETWORK ACCESS - Systems and techniques for granting of network access to a new network device are described. Specifically, various techniques and systems are provided for connecting a new network device to a network and limiting access of the network device while authenticating the new network device. Exemplary embodiments of the present invention include a computer-implemented method. The method comprises receiving, at a gateway on a network, a communication including a request for a new network device to join the network; establishing a connection between the new network device and the gateway; generating a firewall configured to prevent the new network device from communicating with an additional device on the network; transmitting a query, wherein the query includes a request to determine whether the new network device is associated with the network; receiving a communication including a response to the query indicating that the new network device is associated with the network; removing the firewall so as to allow the new network device to communicate with the additional network device. | 2016-04-28 |
20160119285 | SYSTEM AND METHOD FOR COMPLIANCE BASED AUTOMATION - This invention generally relates to a process and computer code for enabling users to create adapters that enable application automation processes that allow customers to define compliance boundaries using a rules-based compliance firewall for their service providers and allow service providers to perform automation on customer machines remotely while adhering to customer's compliance requirements. | 2016-04-28 |
20160119286 | IDENTIFYING MALICIOUS DEVICES WITHIN A COMPUTER NETWORK - This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device. | 2016-04-28 |
20160119287 | OPTIMIZED TRANSPORT LAYER SECURITY - A method for establishing a secure communication session over communication paths between one or more client devices and one or more server computers according to a communication protocol includes initiating the session including passing communication through a proxy on a device on the communication paths, passing session initiation information between the client devices and the server computers via the proxy, passing encrypted content between the client devices and the server computers over secure communication sessions, each established for exclusive access from one client device and one server computer based on the exchanged session initiation information between said client device and said server computer whereby the proxy does not have access to the content, and modifying, using the proxy, at least some information passing between a client device and a server computer such that the communication to and from the server computer adheres to the communication protocol. | 2016-04-28 |
20160119288 | METHOD AND APPARATUS FOR CONTENT FILTERING ON SPDY CONNECTIONS - The present disclosure discloses a method and a network device for performing content filtering on SPDY connections. Specifically, a network device receives, from a client device, a first control frame identifying a first maximum number of unsolicited unacknowledged messages related to a web resource that can be transmitted by a web server. The network device transmits to the web server a second control frame identifying a second and different maximum number of unsolicited unacknowledged messages related to the web resource that can be transmitted by the web server. In some embodiments, the network device establishes a first connection with the client device without forwarding the request to the web server, and a second connection with the web server. Further, the network device inspects data in the unsolicited unacknowledged messages and forwards at least portion of the data to the client device using the first connection. | 2016-04-28 |
20160119289 | DATA COMPUTATION IN A MULTI-DOMAIN CLOUD ENVIRONMENT - A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and is configured to receive encoded data and a set of operations from the server device in response to a request for cloud services from the client device. The gateway device is configured to decode the encoded data, and to provide the decoded data and the set of operations to the client device. The client device is configured to perform the set of operations on the decoded data, and to incorporate the operation results into an application or interface corresponding to the requested cloud service. The gateway device is configured to encode the operation result data, and to provide the encoded operation result data to the server device for storage. | 2016-04-28 |
20160119290 | SELECTIVE CONTENT CLOUD STORAGE WITH DEVICE SYNCHRONIZATION - Programmable devices selectively allocate file content portions between cloud and secured hardware device storage mediums. A confidential portion of a first file is stored as a second file on a first device, and a remainder portion of content of the first file that is different from the confidential portion and is not designated as confidential is stored on a cloud storage system. A uniform resource indicator is generated that includes a routing identifier to the first device, and a section routing identifier to the second file stored on the first device. A revised version of the first file is stored to the cloud storage system wherein the confidential portion of the first file is replaced with the generated uniform resource indicator within the revised version of the first file at a location of the confidential portion within the content of the first file. | 2016-04-28 |
20160119291 | SECURE COMMUNICATION CHANNEL WITH TOKEN RENEWAL MECHANISM - One embodiment of the present invention includes a server machine configured to establish a secure communication channel with a client machine via renewable tokens. The server machine receives a plurality of messages from a client machine over a secure communication channel, where the plurality of messages includes a first message that includes at least two of user authentication data, entity authentication data, first key exchange data, and encrypted message data. The server machine transmits, to the client machine, a second message that includes a master token comprising second key exchange data associated with the first key exchange data and at least one of a renewal time and an expiration time. | 2016-04-28 |
20160119292 | RE-ENCRYPTION SYSTEM, RE-ENCRYPTION APPARATUS, AND PROGRAM - A re-encryption system according to this embodiment includes a file sharing apparatus and a re-encryption apparatus. Upon receiving a file request from the client apparatus, the file sharing apparatus acquires a first encrypted file based on the file request, and transmits a re-encryption request including the first encrypted file to the re-encryption apparatus. The re-encryption apparatus re-encrypts the first encrypted file included in the re-encryption request to the second encrypted file based on the re-encryption key, and transmits the second encrypted file to the file sharing apparatus. The file sharing apparatus transmits the second encrypted file to the client apparatus. The client apparatus obtains the file by decrypting the second encrypted file based on a private key corresponding to the public key of the member. | 2016-04-28 |