TELCORDIA TECHNOLOGIES, INC. Patent applications |
Patent application number | Title | Published |
20150304411 | Self-Organizing Distributed Service Overlay for Wireless Ad Hoc Networks - An apparatus and a method are operable to enable peer-to-peer communication between a first communication node having a first server application and an associated first client application and a second communication node having a second server application and an associated second client application in a wireless ad hoc network. In one embodiment, the apparatus includes memory including computer program code configured to, with a processor, cause the apparatus to determine an identity and service capability of the second communication node, initiate the first client application on the first communication node, enable the first server application with the first client application on the first communication node to communicate with the second client application via the second server application on the second communication node, and provide a service associated with the first client application and the second client application between the first server application and the second server application. | 10-22-2015 |
20140355454 | Communication Node Operable to Estimate Faults in an Ad Hoc Network and Method of Performing the Same - A communication node operable to estimate faults in a mobile ad hoc network and method of performing the same. In one embodiment, the communication node includes a processor and memory including computer program code configured to, with the processor, cause the communication node to monitor a set of observable parameters at the communication node, produce a fault estimate at the communication node from the set of observable parameters, and provide the fault estimate to a global fault detector at another communication node. | 12-04-2014 |
20140133402 | Architecture for Open Communication in a Heterogeneous Network - Network architecture configured for open communication between a plurality of sub-networks. Each of the plurality of sub-networks has a different routable network addressing scheme. The architecture includes at least one broker node adapted to communicate using at least two different routable network addressing schemes. The broker node comprises an identification management module configured to collect peer-application addresses for nodes currently accessing a specific application, the peer-application addresses being associated with a specific application, an address resolution module configured to map each of the peer-application addresses to a sub-network specific routable network address and a network coordination module configured to monitor and coordinate sub-network communication capabilities between the broker node and at least one other broker node and elect a primary broker node for each sub-network which the broker node and at least one other broker node is capable of communication. | 05-15-2014 |
20140130178 | Automated Determination of Quasi-Identifiers Using Program Analysis - A system and method for automated determination of quasi-identifiers for sensitive data fields in a dataset are provided. In one aspect, the system and method identifies quasi-identifier fields in the dataset based upon a static analysis of program statements in a computer program having access to - sensitive data fields in the dataset. In another aspect, the system and method identifies quasi-identifier fields based upon a dynamic analysis of program statements in a computer program having access to -sensitive data fields in the dataset. Once such quasi-identifiers have been identified, the data stored in such fields may be anonymized using techniques such as k-anonymity. As a result, the data in the anonymized quasi-identifiers fields cannot be used to infer a value stored in a sensitive data field in the dataset. | 05-08-2014 |
20140080106 | Method and System for Improving Personal Productivity in Home Environments - Method and system for improving personal productivity in home environments may store state information associated with an environment and one or more users in a knowledge base, detected activity of a user, infer location of the user based on the detected activity, and suggest one or more tasks to be performed based on the inferred user location. | 03-20-2014 |
20140074982 | Optimizing Evaluation Patterns and Data Acquisition for Stream Analytics in Resource-Constrained Wireless Environments - Mobile wireless devices may receive data streams from multiple remote sensors. The sensors may have limited power supplies and memory capacity. Aspects of the invention use statistical characteristics of the sensor data streams and the cost of acquiring a single element of each stream to determine what sequence the sensors should send their data streams in. The cost of acquiring the data may be modified dynamically, depending on parameters such as block size. Additional factors, such as a sensor's buffer capacity, may limit the amount of stream elements that may be cached and affect the sensors' stream transmit sequence. The evaluation order may be dynamically modified using an event processing engine, to reflect both changing statistics of underlying sensor stream tuples and time-varying acquisition costs associated with individual streams. This helps to increase in the operational lifetime of the sensors and associated monitoring applications. | 03-13-2014 |
20140040172 | Privacy-Preserving Aggregated Data Mining - An apparatus, system and method are introduced for preserving privacy of data in a dataset in a database with a number n of entries. In one embodiment, the apparatus includes memory including computer program code configured to, with a processor, cause the apparatus to form a random matrix of dimension m by n, wherein m is less than n, operate on the dataset with the random matrix to produce a compressed dataset, form a pseudoinverse of the random matrix, and operate on the dataset with the pseudoinverse of the random matrix to produce a decompressed dataset. | 02-06-2014 |
20140020099 | SYSTEM AND METHOD FOR CREATING BGP ROUTE-BASED NETWORK TRAFFIC PROFILES TO DETECT SPOOFED TRAFFIC - An inventive system and method for creating source profiles to detect spoofed traffic comprises obtaining a routing path for data to traverse nodes using traffic profiles, each routing path comprising at least a target AS, initializing one or more AS sets with last hop ASes, enhancing the AS sets by connecting the AS sets to routers, for each enhanced AS set, filtering observed traffic flows, and using the filtered flows to associate enhanced AS sets with network monitoring points to create the source profiles. In one aspect, filtering flows comprise TCP session filtering and/or destination bogon filtering. In one aspect, the routers are border gateway protocol routers. In one aspect, the last hop ASes are one hop away from the target AS. | 01-16-2014 |
20140020066 | SYSTEM AND METHOD FOR SPAMMER HOST DETECTION FROM NETWORK FLOW DATA PROFILES - A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles. | 01-16-2014 |
20140006093 | Method for Systematic Modeling and Evaluation of Application Flows | 01-02-2014 |
20130226698 | SYSTEM, METHOD AND PROGRAM FOR EMBEDDING IN LINE ADVERTISEMENTS DURING A MULTI-FACTOR AUTHENTICATION SESSION - Systems, methods and programs for determining a question posed to a user during a user authentication process are provided. An example of a method for determining the question comprises obtaining user commercial activity, storing the user commercial activity by activity type, generating a set of candidate questions for a user based upon the user commercial activity, each candidate question in the set of candidate questions is associated with a score, selecting one candidate question from the set of the candidate questions based upon a first selection criteria, detecting a vendor placement opportunity in the selected candidate question by analyzing the user commercial activity and adding a vendor name into the selected candidate question based upon the detecting. The user commercial activity can be user purchases of goods and services from corresponding vendors. Lost Opportunities for the placement of an advertisement are detected and recorded. | 08-29-2013 |
20130197958 | CRITICAL DATE MANAGEMENT - A critical date management system includes a critical date management module (CDM), project management system, and flow management system in which the CDM dynamically and automatically links activities and tasks in an overall project. Once a project plan is submitted to the CDM, the individual tasks are dynamically assembled together along with all dependencies and temporal data to create a complete end-to-end process flow containing all of the interdependent tasks. The assembled flow is then submitted to the flow management system for execution. The modular approach allows for the dynamic creation of a complete end-to-end delivery flow for different projects and project changes without the need for complex contingency logic. The result is a service delivery process that is customized for each new project. Additionally, when changes are made to an active project plan, manual recalculating of coordinated activities will be performed by the critical date management system. | 08-01-2013 |
20130194108 | System, Method, Control Device and Program for Vehicle Collision Avoidance Using Cellular Communication - Avoiding vehicle collisions using an in-vehicle device is provided. The method comprises receiving a connection request from an in-vehicle device within a moving vehicle when the moving vehicle is within a selected distance from a traffic intersection, establishing connection with the in-vehicle device within a moving vehicle via a serving base station, receiving position information from the in-vehicle device within a moving vehicle corresponding to a position of the moving vehicle, receiving control information for a traffic light at the traffic intersection from a traffic management center and relaying the control information for the traffic light to the in-vehicle device within a moving vehicle. A warning is issued based upon a vehicle speed, a location and a position relative to a traffic intersection. A warning is also issued based upon multiple vehicles speed, relative locations to each other and each position relative to a traffic intersection. | 08-01-2013 |
20130179869 | Adaptive Diversity for Compressible Return Oriented Programs - A method of transforming return oriented programming executables into functionally equivalent yet different forms with specific structural and/or functional characteristics that can assist in the use of such executables. A method automatically biases the structural and/or functional diversity of the return oriented programming software executables to achieve specific program representation objectives while preserving the programmatic capabilities of the original executable. | 07-11-2013 |
20130163983 | Signaling Protocol for Multi-Domain Optical Networks - A three-way handshake method for optical messaging in a multi-domain optical network that includes a first pass from a source domain to a destination domain through intermediate domains on candidate working paths, collecting information identifying available routing resources for each working path, calculating a working path metric and storing each of the metrics at the respective border node, determining a path key of the topology of each domain working path and using the path key to identify the path outside its domain and determining the best working paths and border nodes to use. A second pass using the path keys for identifying the working path in each domain and reserving the identified routing resources and selecting which routing resources to use. A third pass identifying the selected routing resources and establishing an optical signaling message path between the source node and the destination node. | 06-27-2013 |
20130145461 | Security Method for Mobile Ad Hoc Networks with Efficient Flooding Mechanism Using Layer Independent Passive Clustering (LIPC) - A security method and system for Layer Independent Passive Clustering (LIPC) is presented. The inventive method and system maintains the states in the LIPC cluster formation protocol while adding a ‘Trusworthy’ event to each state and provides a methodology that depends on the state of the transmitting node to quantify Trustworthy and derive a Trust Confidence Value (TCV) to represent the level of confidence in quantifying ‘Trustworthy’. The invention dynamically computes a degree of trustworthiness for each participating network node and eliminates nodes from participating in the PC cluster formation protocol and packet forwarding if they do not meet established trust metrics. The security solution can also apply to PC-based Mobile Ad hoc Networks (MANETs). The novel system and method applies a multidimensional set of security algorithms to protect the LIPC cluster formation protocol from malicious attacks that compromise cluster formation and secure routing. | 06-06-2013 |
20130144620 | METHOD, SYSTEM AND PROGRAM FOR VERIFYING THE AUTHENTICITY OF A WEBSITE USING A RELIABLE TELECOMMUNICATION CHANNEL AND PRE-LOGIN MESSAGE - Various embodiments of the present invention for validating the authenticity of a website are provided. An example of a method according to the present invention comprises providing a website having an artifact, receiving a communication from a user, at a service provider, for validating the website associated with a service provider, inquiring from the user a description of the artifact comparing the artifact on the website with the description of the artifact from the user and generating a indication to the user based upon the comparing. The communication is over a first communication channel and the website is accessed over a second communication channel. The first communication channel is different than the second. The artifact can be displayed after a user session is identified. | 06-06-2013 |
20130125235 | Method, Apparatus and Program for Detecting Spoofed Network Traffic - A method, an apparatus and a program for detecting spoofed Internet Protocol (IP) traffic directed to a network having a plurality of autonomous systems (AS) is provided. The method comprises receiving an incoming packet through an AS, the incoming packet containing a source IP address and a destination IP address, acquiring a corresponding source and destination IP address prefixes, converting the corresponding source and destination IP address prefixes into a source AS number and a destination AS number, determining if the incoming packet arrived from an unexpected source based upon the corresponding destination IP address prefix and the converted source and destination AS number using an unexpected pair tuple table generated from network routing information and generating an alert indicating that the incoming packet is not allowed to enter the network. | 05-16-2013 |
20130124452 | MODEL-THEORETIC APPROACH TO DATA ANONYMITY AND INFERENCE CONTROL - A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating certain formulas representing the answers; and determining whether there is a minimum number of distinct models of these formulas conjoined with the relevant anonymity predicates along with previous answers and general background knowledge, and when that number of models does not exist, suppressing the answers. In one aspect, the method further comprises creating formulas encoding the information conveyed by the answer; and combining the formulas encoding the information with prior information. | 05-16-2013 |
20130110511 | System, Method and Program for Customized Voice Communication | 05-02-2013 |
20130107729 | METHOD, SYSTEM, NETWORK NODES, ROUTERS AND PROGRAM FOR BANDWIDTH ESTIMATION IN MULTI-HOP NETWORKS | 05-02-2013 |
20130103668 | QUESTION CONVERSION FOR INFORMATION SEARCHING - A question conversion engine converts terms and phrases used in a user's question into terms and phrases that are more likely to produce information containing the search terms. The question conversion engine parses a user's question to associate each term in the user's question with a part of speech and to eliminate extraneous terms in the user's question. A term/phrase replacement map is used to replace terms and/or phrases in the user's question with replaced terms and phrases that are more likely to produce relevant information. The question conversion engine matches the user's question to a declarative expression thereby altering the semantics of the question into an expression that is more likely to produce optimum search results. | 04-25-2013 |
20130094509 | OPEN COMMUNICATION METHOD IN A HETEROGENEOUS NETWORK - An open communication method between at least two sub-networks using a broker node. Each of the sub-networks has a different routable network addressing scheme. The method comprises receiving a packet for a specific application, the packet includes an application identifier, determining if the packet is to be relayed to another of the at least two sub-networks based upon the application identifier, determining if a node receiving the packet is a broker node, relaying the packet to a broker node if not a broker node and forwarding, by the broker node, the packet to at least one node in another of the at least two sub-networks. The node generating the packet communicates using a first of the at least two sub-networks. A broker node communicates using at least two of the at least two sub-networks via a corresponding routable network addressing schemes for each of the sub-networks. | 04-18-2013 |
20130089888 | System and Method for Nonlinear Optical Devices - Systems for enhancing the sensitivity of detecting an optical signal using nonlinear optics and method of performing the same. In one embodiment, a single-photon detection system includes an optical amplifier realized in a waveguide, and a photodetector coupled to an output of the optical amplifier. A light detection and ranging system includes the optical amplifier coupled to an optical source and one photodetector. In another embodiment, a photodetection system includes a plurality of optical frequency converters, coupled to an optical source, that sequentially convert a wavelength of photons of the optical source to a final wavelength, and a single-photon photodetector coupled to the optical frequency converters to detect single photons produced by the optical source. In another embodiment, an optical sensor includes an optical pump, and a transducer including an optical ring cavity coupled to the optical pump and configured to utilize optical four-wave mixing to detect an external stimulus. | 04-11-2013 |
20130088955 | Method and System for Distributed, Prioritized Bandwidth Allocation in Networks - An apparatus, system and method are introduced for prioritizing allocation of communication bandwidth in a network. In one embodiment, the apparatus includes memory including computer program code configured to, with a processor, cause the apparatus to assign a value to a prioritization parameter at an endpoint communication device dependent on a priority of an information flow in a network, and update a communication bandwidth for the information flow dependent on the value of the prioritization parameter after a round-trip time for the information flow. | 04-11-2013 |
20130087693 | System and Method for Nonlinear Optical Devices - Systems for enhancing the sensitivity of detecting an optical signal using nonlinear optics and method of performing the same. In one embodiment, a single-photon detection system includes an optical amplifier realized in a waveguide, and a photodetector coupled to an output of the optical amplifier. A light detection and ranging system includes the optical amplifier coupled to an optical source and one photodetector. In another embodiment, a photodetection system includes a plurality of optical frequency converters, coupled to an optical source, that sequentially convert a wavelength of photons of the optical source to a final wavelength, and a single-photon photodetector coupled to the optical frequency converters to detect single photons produced by the optical source. In another embodiment, an optical sensor includes an optical pump, and a transducer including an optical ring cavity coupled to the optical pump and configured to utilize optical four-wave mixing to detect an external stimulus. | 04-11-2013 |
20130087692 | System and Method for Nonlinear Optical Devices - Systems for enhancing the sensitivity of detecting an optical signal using nonlinear optics and method of performing the same. In one embodiment, a single-photon detection system includes an optical amplifier realized in a waveguide, and a photodetector coupled to an output of the optical amplifier. A light detection and ranging system includes the optical amplifier coupled to an optical source and one photodetector. In another embodiment, a photodetection system includes a plurality of optical frequency converters, coupled to an optical source, that sequentially convert a wavelength of photons of the optical source to a final wavelength, and a single-photon photodetector coupled to the optical frequency converters to detect single photons produced by the optical source. In another embodiment, an optical sensor includes an optical pump, and a transducer including an optical ring cavity coupled to the optical pump and configured to utilize optical four-wave mixing to detect an external stimulus. | 04-11-2013 |
20130087689 | System and Method for Nonlinear Optical Devices - Systems for enhancing the sensitivity of detecting an optical signal using nonlinear optics and method of performing the same. In one embodiment, a single-photon detection system includes an optical amplifier realized in a waveguide, and a photodetector coupled to an output of the optical amplifier. A light detection and ranging system includes the optical amplifier coupled to an optical source and one photodetector. In another embodiment, a photodetection system includes a plurality of optical frequency converters, coupled to an optical source, that sequentially convert a wavelength of photons of the optical source to a final wavelength, and a single-photon photodetector coupled to the optical frequency converters to detect single photons produced by the optical source. In another embodiment, an optical sensor includes an optical pump, and a transducer including an optical ring cavity coupled to the optical pump and configured to utilize optical four-wave mixing to detect an external stimulus. | 04-11-2013 |
20130055020 | Method for Automated Distributed Diagnostics for Networks - A method for distributed computations for fault-diagnosis in a system whose fault propagation model has deterministic couplings between faults and symptoms includes creating a ‘relation graph’ in which the nodes correspond to the potential faults, with two nodes connected by a ‘relational link’ if their corresponding faults have an observed symptom in common. Each relational link is assigned a weight equal to the sum, taken over the symptoms represented by the relational link, of the reciprocal of the number of distinct fault-pairs that produce each such symptom. The relation graph is then partitioned into several domains, while minimizing the number of cross-domain relational links, which correspond to cross-domain symptoms. In each domain, all the optimal local solutions to the domain's sub-problem are first determined, and then a combination is selected of the local solutions, one from each domain, that explains the maximum number of cross-domain symptoms, where the optimal solution is supplemented, if necessary, with additional faults to explain any remaining unexplained cross-domain symptoms, determining also a bound on the deviation from optimality of the global solution. | 02-28-2013 |
20130039264 | DISTRIBUTED MANAGEMENT OF LEO SATELLITE NETWORKS WITH MANAGEMENT AGILITY AND NETWORK EFFICIENCY - In a distributed management scheme for LEO satellite networks interactions between a satellite and the designated fixed center occur according to a time schedule and only when the designated center is in the coverage area of the payload. For exception/alarm reporting and real-time configuration updates the interaction varies with time. Interactions of this type occur between a satellite and the management center that is “nearest” to the payload or satellite at the time instant at which the network event occurs or configuration upload is needed. The nearest management center for a payload is the center that can be reached from the payload with fewest number of crosslink hops. A central network operation center determines, prior to payload launch, the association between satellites and management centers for routine information exchange, and the nearest management center for the payload for different snapshots of time. | 02-14-2013 |
20130036474 | Method and Apparatus for Secure Data Representation Allowing Efficient Collection, Search and Retrieval - A system and method for secure representation of data is presented. The method comprises setting a number of components, dividing original data into the set number of components using a function, storing the set number of components of divided data, determining a number of retrieved components, and using the function to retrieve the data from the retrieved components and to determine retrieved data. In one aspect, the function is XOR. In one aspect, when the number of retrieved components is less than the set number of components, the retrieved data is redacted data, and when the number of retrieved components is equal to the set number of components, the retrieved data is the original data. | 02-07-2013 |
20130016837 | OCDM-BASED ALL OPTICAL MULTI-LEVEL SECURITY - A high data rate optical signal is inverse multiplexed into a multitude of lower-rate tributaries, each of which is coded by its unique OCDM code, and the combined coded tributaries are injected into a common phase scrambler. Coherent summation of these optically encoded tributaries pass through a shared phase or phase and frequency scrambler before exiting the secure location. The setting of the scrambler acts as the key. The authorized recipient with the correct key retrieves the ones and zeros of the several decoded signals. | 01-17-2013 |
20130011133 | DIFFERENTIAL EYE DIAGRAMS - Changes in a signal are detected. The signal is repeatedly sampled in a synchronous manner during a predetermined interval to generate a captured eye diagram. At least one of a positive differential eye diagram or a negative differential eye diagram is generated from the captured eye diagram and a baseline eye diagram. The at least one positive or negative differential eye diagram is analyzed to determine whether a change in signal conditions is present. | 01-10-2013 |
20130010791 | SYSTEM AND METHOD FOR ASSIGNING INFORMATION CATEGORIES TO MULTICAST GROUPS - A system and method for determining an efficient assignment of information categories to multicast addresses is described. In one embodiment, the assignment takes into account the overlapping information needs of the subscriber nodes and the network bandwidth that will be consumed in the dissemination of each information category based on its size and the frequency of dissemination. In another embodiment, the assignment takes into consideration the additional constraint of a quality of service network having different prioritizations associated with the information categories. | 01-10-2013 |
20130004170 | OSS Support for Control Plane Technology - The OSS provides unique and automated provisioning, activation, fallout management and monitoring of SONET and WDM networks comprising control plane mesh and traditional SONET/WDM Rings/Chains. Resource discovery and dynamic provisioning provides for increased use of network bandwidth. It is possible both all control plane networks and mixed control plane and traditional networks. Network connections or the network topology may be accomplished in a hop-by-hop manner. | 01-03-2013 |
20120331115 | OPTIMAL NETWORK CONFIGURATION REPAIR - Changing a network configuration to restore compliance to one requirement may invalidate the network compliance with another requirement. A method changes a configuration to restore compliance to all requirements at minimum cost. The requirements are a hybrid of symbolic, arithmetic and bit-vector constraints, so traditional optimization techniques such as linear programming, that work only for purely arithmetic constraints, do not apply. The requirements are represented as SMT (satisfiability-modulo-theory) constraints on configuration variables, and then a weighted Max-SAT solver is used to compute the optimal configuration changes in order to minimize the cost. | 12-27-2012 |
20120328282 | Network Restoration Under Link or Node Failure Using Preconfigured Virtual Cycles - The design of telecommunication networks is such that there is provision of end-to-end path protection to multiple demands under a single link or node failure in the networks. Restoration routes are provided on Preconfigured Virtual Cycles (PVC's), where each demand is assigned one restoration route and specific restoration wavelengths on a segment of one cycle. Multiple demands may share restoration wavelengths, and the number of restoration wavelengths may vary among the PVC links. First, a plurality of candidate PVC's are generated where each demand may be assigned to multiple candidates. Assignment of demands with common failure scenarios are allowed, under certain conditions, to the same PVC. Next, a set of PVC's is selected from among the candidates, while minimizing total reserved restoration capacity and ensuring that all demands are protected. Next duplicate assignments are eliminated. Finally, conflicts of wavelength assignments are resolved. The invention focuses primarily on optical networks. | 12-27-2012 |
20120327840 | SWITCHED LINK-BASED VEHICULAR NETWORK ARCHITECTURE AND METHOD - A multiple hop communications method among a plurality of moving vehicles. Each moving vehicles has a plurality of unidirectional radio. The method comprises receiving an incoming packet at one of the plurality of unidirectional radios, determining if there is an active link between each of the plurality of unidirectional radios and an unidirectional radio of a neighbor vehicle, relaying the incoming packet to the plurality of unidirectional radios having an active link and transmitting the incoming packet as an outgoing packet from at least one of the plurality of unidirectional radios. If more than one packet is received, the packets can be encoded using group coding before send the packets out as an outgoing packet. | 12-27-2012 |
20120315049 | METHOD AND APPARATUS FOR OPTIMIZED ANALOG RF OPTICAL LINKS - A system and method for optimizing an optical RF photonic link system is presented. The system comprises a modulator subsystem in which nonlinear response is compensated by an envelope precompensation method and employs an optical filter to suppress optical carriers and extract modulated sidebands, an optical amplifier, and an array of photodetectors, each having a plurality of pairs of diodes. The modulator subsystem performs optical filtering on the signal, the signal is amplified by the optical amplifier and sent to the array of photodetectors. The optical amplifier can be an erbium doped fiber amplifier, or a phase sensitive amplifier. The optical power can be delivered to each diode of the array of photodetectors via a photonic integrated circuit. | 12-13-2012 |
20120296968 | System and Method for Group Communications in 3GPP Machine-to-Machine Networks - An inventive system and method for group communication among devices in M2M networks comprises associating one or more of the devices with a gateway having a unique identifier, initiating registration of the devices at an M2M network using the unique identifier of the gateway, providing from the network a temporary identifier to the gateway and associating, in the network, the temporary identifier with the gateway, attaching the devices to the network using the temporary identifier, and communicating information between the network and the device through the gateway. In one aspect, the devices can be classified into sub-groups and each sub-group has a sub-group head that can be attached to the gateway so that the devices can communicate with the network through the sub-group head instead of the gateway. Each sub-group can be associated with a unique temporary identifier, in addition to the temporary identifier associated with the gateway. | 11-22-2012 |
20120284328 | Method, System, User Equipment and Program For Dynamically Selecting Proxies For Communication With Servers Using Known Paths - Method, User equipment, system and program for limiting an amount of information transmitted between a plurality of user equipments and a server. The method comprising establishing communication links between a plurality of user equipments based upon a proximity of the plurality of user equipments, determining a tactical common mission group selected from the linked plurality of user equipments using a mission profile stored in each of the plurality of user equipments; and selecting a proxy for the tactical common mission group. The proxy communicates with a server on behalf of the tactical common mission group. A proxy is selected based upon a ranking. | 11-08-2012 |
20120282962 | SYSTEMS AND METHODS FOR EFFICIENT RADIO FREQUENCY SPECTRUM MANAGEMENT IN A SCENARIO INVOLVING MULTIPLE MOBILE VEHICLES - Various embodiments of the present invention relate to wireless network management. One specific example relates to efficient radio frequency (RF) spectrum management involving multiple mobile vehicles, whereby a system and/or a method of the invention achieves greatly improved spectral efficiency in the assignment of frequency bands to communications channels between the vehicles and/or stationary ground stations. Other examples of the present invention provide systems and methods to analyze the RF emissions resulting from the motion of transmitters and/or receivers through airspace with the help of five-dimensional quanta of space (x, y, z), time and frequency to assign frequency bands to test plans (including previously-validated test plan(s) and/or to-be-validated test plan(s)). In one specific example, the analysis is directed to the assignment of frequency bands with and without reuse. | 11-08-2012 |
20120282872 | DIRECTIONAL NOTCH FILTER FOR SIMULTANEOUS TRANSMIT AND RECEIVE OF WIDEBAND SIGNALS - A directional notch filter for simultaneous transmit and receive of wideband signals comprises an antenna, an antenna match, a receiver, a power combiner, a first directional coupler, a second directional coupler and a shaping filter accepting a signal and producing a compensation signal as a replica of an antenna reflection transfer function, wherein the first and second directional couplers produce signals and portions of signals received by the antenna and sent to the receiver via the power combiner. The receiver can produce a receiver signal and the first directional coupler can produce a first signal as a portion of an overall signal received by the antenna, the first signal comprising at least reflection of a signal from the power amplifier and the second directional coupler samples a small portion of the receiver signal, said second directional coupler producing a second signal. | 11-08-2012 |
20120278657 | COMPUTING DIAGNOSTIC EXPLANATIONS OF NETWORK FAULTS FROM MONITORING DATA - A system and method for network fault diagnosis in a network having network elements is presented. The method comprises creating a network causality model, generating Boolean expressions from the network causality model, converting the Boolean expressions into SAT sets, receiving network monitoring results, correlating these monitoring results with the SAT sets, and enumerating all possible diagnostic explanations of potential faults, properly annotated. Creating a network causality model can comprise creating, for each network element, an element-specific causality model, stitching together all network elements using the element-specific causality models and a network topology, retrieving monitoring state and propagation information, and generating the network causality model using the stitched together network elements and the monitoring state and propagation information. Stitching together network elements can comprise adding causes and implies dependency between appropriate network elements and/or adding and connecting reachable and not-reachable states. The network causality model can comprise network element states. | 11-01-2012 |
20120275789 | SYSTEM AND METHOD FOR AUTOMATED PROVISIONING OF SERVICES USING SINGLE STEP ROUTING AND WAVELENGTH ASSIGNMENT ALGORITHM IN DWDM NETWORKS - A single step routing and wavelength assignment method and system for automated provisioning of services on DWDM networks is presented. This novel single step solution automates design and assignment of services in DWDM networks. For an automated provisioning platform that can handle the routing and wavelength assignment in a single step, the solution avoids reconfiguration of existing services. It also takes into consideration practical aspects of DWDM transponder availability at termination sites and regeneration sites along the selected route. The methodology includes iterative computation of common channel sets to avoid multiple shortest path computations for each of the wavelengths. | 11-01-2012 |
20120263102 | ARCHITECTURE FOR OPEN COMMUNICATION IN A HETEROGENEOUS NETWORK - Network architecture configured for open communication between a plurality of sub-networks. Each of the plurality of sub-networks has a different routable network addressing scheme. The architecture includes at least one broker node adapted to communicate using at least two different routable network addressing schemes. The broker node comprises an identification management module configured to collect peer-application addresses for nodes currently accessing a specific application, the peer-application addresses being associated with a specific application, an address resolution module configured to map each of the peer-application addresses to a sub-network specific routable network address and a network coordination module configured to monitor and coordinate sub-network communication capabilities between the broker node and at least one other broker node and elect a primary broker node for each sub-network which the broker node and at least one other broker node is capable of communication. | 10-18-2012 |
20120263042 | METHOD AND SYSTEM FOR DETERMINATION OF ROUTES IN LEO SATELLITE NETWORKS WITH BANDWIDTH AND PRIORITY AWARENESS AND ADAPTIVE REROUTING - In Low Earth Orbit (LEO) satellite networks data routes for point to point and point to multipoint communication sessions in LEO satellite networks are determined by considering session bandwidth, priority, and the constantly changing terminal-satellite and satellite-satellite connectivity. Multiple routes are computed for a session to facilitate automatic adaptive rerouting by satellite payloads when they encounter network failures or congestion conditions. | 10-18-2012 |
20120257498 | METHOD AND SYSTEM FOR PROVIDING END-TO-END QoS IN CONVERGED NETWORKS USING PROBABILISTIC PREFERENTIAL ADMISSION CONTROL - Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads. | 10-11-2012 |
20120239727 | MULTIMEDIA SERVICE NETWORK AND METHOD FOR PROVIDING THE SAME - An overlay service network and method for delivering a multimedia service. The overlay service network comprises a user interface for subscribers to request an available service as a requested service, a register server for registering and storing a database of available services, a plurality of service nodes for executing at least one available service and a controller for receiving a request for an available service, searching the register server for the requested service, selecting one or more of the plurality of service nodes to execute the requested service and establishing a chaining sequence between a node requesting the service, the one or more selected execution nodes and a destination node to execute the requested service. | 09-20-2012 |
20120238278 | DISTRIBUTED POWER LEVEL SELECTION METHOD AND SYSTEM FOR CELLULAR WIRELESS NETWORKS UNDER JOINT CONSTRAINTS - A distributed method and system are presented for determining the largest Signal-to-Interference-and-Noise Ratio (SINR) that can be achieved by a plurality of small wireless cells, such as femtocells or picocells, while satisfying a specified SINR value for multiple large cells, referred to as macrocells. The method also determines the minimum power levels at each of the femtocells that achieve the maximum SINR for the femtocells. The distributed synchronous algorithm executes all intensive computations independently, locally at each of the femtocells. The computations are synchronized in time and executed simultaneously at all cells where after each of the iterations information of interim power selections at the multiple cells is exchanged among the femtocells. Eventually, the computations converge to the maximum SINR value and the corresponding minimum-power solution. | 09-20-2012 |
20120231786 | SYSTEM AND METHOD FOR QUANTIFYING ANCHOR PLACEMENT IMPACT PLACEMENT ON LOCATION ACCURACY - A computer implemented method for determining geometric impact of anchor placement on localization accuracy and the subset of anchors which mitigates the impact of measurement-induced noise. | 09-13-2012 |
20120226947 | SYSTEM AND METHOD FOR A STAGGERED EXECUTION ENVIRONMENT - A staggered execution environment is provided to safely execute an application program against software failures. In an embodiment, the staggered execution environment includes one or more probe virtual machines that execute various portions of an application program and an execution virtual machine that executes the same application program within a time delay behind the probe virtual machines. A virtualization supervisor coordinates the execution of the application program on one or more probe virtual machines. The probe virtual machines are used to detect and correct software failures prior to the execution virtual machine encountering them. The virtualization supervisor embargos output data in order to ensure that erroneous data is not released which may adversely affect external processes. | 09-06-2012 |
20120226736 | METHOD AND SYSTEM SUPPORTING MOBILE COALITIONS - A system and method for supporting mobile coalitions for entertainment comprises devices including a master device, a server having a multimedia service executable by the master device and modules operable to recommend formation of a coalition based on the service, invite the devices to participate in the coalition, set up the coalition by determining the devices to participate, launching on each device a link to the coalition, performing emulation of the coalition by streaming a portion of the service to each device until experience is satisfactory, and continuing by transmitting the service to the devices, capture interactions on the devices by users, the interactions comprising at least gestures, taps correlating to messages of quality of experience, adapt the coalition by managing user inputs conveying quality of experience, maintaining synchronization of the devices, and maintaining the service when one or more of the devices cease to participate, and terminate the coalition. | 09-06-2012 |
20120221700 | System, Method and Program for Telecom Infrastructure Virtualization and Management - A virtualized telecom system and a method for managing service continuity and mobility in a virtualized telecom system. The system comprises a plurality of execution nodes each configured to execute a network function by registering; and a manager node for registering each of the plurality of execution nodes, assigning a node identifier (Node ID) to each of the plurality of execution nodes, periodically polling each of the plurality of execution nodes for a status, and issuing control instructions to each of the plurality of execution nodes based upon the status of a respective execution node. Each of the plurality of execution node responds to the polling by transmitting its status to the manager node. The status includes runtime information and pre-configuration information. | 08-30-2012 |
20120209796 | ATTENTION FOCUSING MODEL FOR NEXTING BASED ON LEARNING AND REASONING - A system and method for nexting is presented. The method comprises computing an expected event, observing a new event, when the expected event matches the new event, processing the new event and performing action in accordance with given concepts, when the expected event does not match the new event and the new event can be explained based on the given concepts, processing the new event and performing action in accordance with the given concepts, and when the expected event does not match the new event and the new event cannot be explained based on the given concepts, employing learning mechanism and performing action decided on by the learning mechanism. In one aspect, the method comprises generating new concepts using reasoning or learning. In one aspect, the method comprises converting sensed numerical data into events of interest via the application of learned functions operating on the numerical data. | 08-16-2012 |
20120201167 | Inter-Local Peer Group (LPG) Routing Method - An on-demand method of routing data between a plurality of local peer groups (LPG) of plural moving nodes comprises transmitting a route request message from a source node, relaying the route request message to a native boundary node; forwarding the route request message to a foreign boundary node, determining if the destination node is within an LPG for the foreign boundary node; relaying the route request message to another boundary node if the destination node is not within the LPG, relaying the route request message to the destination node if the destination node is within the LPG, receiving the routing request message at the destination node, transmitting a routing response to the source node, relaying the routing response to the source node through a path discovered by the route request, receiving the routing response at the source node, and transmitting the data, upon receipt of the routing response. | 08-09-2012 |
20120197618 | ARCHITECTURE AND METHOD FOR REALISTIC VEHICULAR NETWORKING AND APPLICATIONS VISUALIZATION - A system and method for vehicular networking and applications visualization comprises selecting a simulation area, converting the selected simulation area to graph representation, eliminating streets outside the simulation area, generating, using the graph representation, vehicles and random vehicle traffic in the simulation area, calculating vehicle movement in coordinates, transforming the calculated coordinates into a format compatible with a general purpose communication networking simulation tool, simulating, using the transformed calculated coordinates and the general purpose communication networking simulation tool, an application, and performing visualization of the simulation. The application can be local traffic information, the vehicle movement and communication among the vehicles. The simulation can be at least 2000 seconds and communication can be disruption tolerant. The visualization of the simulation can comprise a global view of all vehicles and one or more local views, each local view of one vehicle. The simulation area can be selected from a geographic map. | 08-02-2012 |
20120195351 | DIRECTIONAL FILTER FOR SEPARATING CLOSELY SPACED CHANNELS IN AN HF TRANSCEIVER - Apparatus and methods of simultaneous transmission and reception in a single-antenna radio transceiver. The transceiver may be used, for instance, for communication between at least two terminals, by use of multiple intermediate recruited transceiver nodes. The recruited transceiver nodes receive a signal from a master mode, and then retransmit the signal to a receiver. The recruited transceiver nodes are designed to have reduced interference between the transmit channel and the received channel. In accordance with one aspect of the present application, embodiments can achieve more robust wireless communication between a transmitter and an over-the-horizon receiver. The robust wireless communication will have improved resistance to interference, including self-interference, and improved communication range. | 08-02-2012 |
20120192115 | System and Method for Interactive Projection and Playback of Relevant Media Segments onto the Facets of Three-Dimensional Shapes - A system for interactive media skimming and search on a device comprises a scene manager building a model of a 3D scene of a multimedia segment of the media visible on a screen of the device, facets of scene objects in the 3D scene are used to dynamically convey visual imagery as a texture from a multimedia source and maintaining a logical navigable relationship between the scene objects, the object facets and the multimedia segments, and further comprising an interaction manager, a user manager securely storing user information and preferences, a playback component initiating rough or high definition playback, a texturizer creating a 2D texture artifact from a set of the multimedia segments in the media for a 3D facet, a transformer transforming and modifying pixels, a cache and scene heuristics maintaining a set of 3D scenes comprising objects, object facets, a virtual camera, and positions of the objects. | 07-26-2012 |
20120165009 | PRIORITIZED QUERY - A solution framework is employed that includes defining of a mechanism to run multiple queries in a single message exchange, along with a priority on a per-query basis. In some embodiments, a system for facilitating handover of a mobile device across heterogeneous access networks by ensuring response to queries transmitted by the mobile device includes: a) a mobile device having a plurality of wireless network interfaces for communicating over a plurality of heterogeneous access networks, having a media independent handover (MIH) entity to facilitate handovers between the heterogeneous networks, and configured to transmit queries related to handover operation between the heterogeneous access networks to MIH entities within said heterogeneous access networks; and b) said media independent handover entity of said mobile device being configured to transmit multiple queries in a single message exchange to an MIH entity in an access network with prioritization among said multiple queries. | 06-28-2012 |
20120155560 | LOW COMPLEXITY ITERATIVE MIMO RECEIVER BASED ON SUCCESSIVE SOFT INTERFERENCE CANCELLATION AND MMSE SPATIAL FILTERING - A multiple-input multiple-output (MIMO) system for demapping uses a single stream system of iterative passes in a preferred order using the latest soft-information for better interference cancellation and the minimum mean square error (MMSE) criterion. | 06-21-2012 |
20120134307 | HIGH RATE RF LINK TECHNOLOGY - A high rate radio frequency (RF) link system and method for spatially multiplexing data transmission is presented. The system can comprise a common communications point characterized by a first collection of antennas having independent channels interconnected with a known latency connection to a central process location, such as with optical fiber; and a second similarly configured collective endpoint or set of endpoints wherein multi-path between the first collection and the second collection is negligible. Signal decorrelation between independent channels is achieved through a combination of spatial separation and signal processing. In one aspect, decorrelation is performed using near-maximum likelihood Multiple-Input Multiple-Output signal processing. | 05-31-2012 |
20120134261 | CONTEXT AWARE ADAPTIVE SWITCHING IN RECONFIGURABLE LOW EARTH ORBIT SATELLITE NETWORKS - A payload switching architecture for LEO satellite networks minimizes processing and storage requirements of payloads for deployment as small primary or secondary payloads, payloads perform only forwarding functions. Forwarding rules are provisioned in the payloads enabling them to reroute in case of failures or congestion without intervention from a ground station. Configuration rules are provisioned in the payloads enabling them to dynamically establish and remove interplane crosslinks without intervention from a ground station. The central network operations center on the ground computes forwarding rules and configuration rules for payloads and uploads the rules to the payloads. | 05-31-2012 |
20120130939 | RECONFIGURATION PLANNING - A method for solving the reconfiguration planning problem transforms the requirement that an invariant is always preserved into a constraint on the times at which the configuration parameters change. The method then solves this constraint to obtain the required reconfiguration plan. When this constraint is strengthened with a synthesis constraint, it is ensured that any final configuration that is computed is also reachable. An extension of the method allows parameters to take on multiple intermediate values. | 05-24-2012 |
20120130799 | SYSTEM AND METHODOLOGY FOR DETERMINATION OF ADVERTISEMENT EFFECTIVENESS - A system and method for determination of advertisement effectiveness is presented. The method can comprise obtaining records for domain elements, for each domain element, developing a model and populating the model based on the obtained records, for a record of a first domain element of the plurality of domain elements, searching a second domain element for another record matching the record of the one domain element, when a match is found, correlating a time stamp in the record with a time stamp in the other record and when correlated, determining a confidence level indicating the advertisement effectiveness. In one aspect, determining a confidence level further comprises searching a third domain element, obtaining a search result, and incorporating the search result in the confidence level. In one aspect, searching a third domain element further comprises performing a secondary search. | 05-24-2012 |
20120113896 | Skip Ahead Routing in Wireless Ad Hoc Networks - A wireless ad hoc network may be composed of several nodes that are coupled by communication links and configured dynamically. As the packet is transmitted from one node to the next node or hop in a predetermined route, a neighboring node, within the same transmission range, may hear the broadcasted transmission. If the neighboring node determines that a future hop on the route includes the neighboring node, the neighboring node may receive the packet at that time thereby skipping one or more hops along the route. The neighboring node may then forward the packet to the next node in the route. | 05-10-2012 |
20120106966 | TRANSPONDER POOL SIZING IN HIGHLY DYNAMIC TRANSLUCENT WDM OPTICAL NETWORKS - A system and method for sizing transponder pools in a dynamic wavelength division multiplexing optical network having selected nodes designated to have a shared transponder pool is presented. The method comprises performing network simulations, generating transponder pool histograms (for each node having a transponder pool) based on the network simulations, performing statistical analysis using the transponder pool histograms to determine probability distribution and distribution parameters for each node and to calculate the horizontal axis location that has a specified distribution tail area, sizing the transponder pools according to the horizontal axis location that has the desired distribution tail area, executing network call blocking simulations to calculate call blocking probabilities, determining whether the call blocking probabilities meet blocking requirements, when the blocking requirements are met, using the sized transponder pools, and when the blocking requirements are not met, adjusting the distribution tail area and repeating sizing, executing and determining steps. | 05-03-2012 |
20120096520 | Key Cashing, QoS and Multicast Extensions to Media-Independent Pre-Authentication - This present application relates to, among other things, Key Caching, QoS and Multicast extensions and improvements to the Media-independent Pre-Authentication (MPA) framework, a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility optimization mechanisms. MPA is a mobile assisted, secure handover optimization scheme that works over any link-layer and with any mobility management protocol. | 04-19-2012 |
20120093015 | Systems and Methods for Multi-Beam Optic-Wireless Vehicle Communications - The present invention offers systems and methods for effective multiple-hop routing, multicasting and media access control for vehicle group communications that employ directional wireless radio technology. Multi-beam optic-wireless media and streamlined operations provide low-overhead communications among vehicles. Systems and methods are provided to maintain a quasi-stationary group of neighboring vehicles, enable high-throughput on-demand switching among multiple vehicles, enable group coding in the vehicle group to achieve higher throughput, and enable dynamic adjustment of link to maintain desirable vehicle group. The proposed solution builds upon the conception of a MAC-free wireless operation and quasi-stationary vehicular switched network to achieve ultra-low-overhead and high-throughput vehicle communications. | 04-19-2012 |
20120084464 | Obfuscating Network Traffic from Previously Collected Network Traffic - An obfuscated network traffic server is operative to generate obfuscated network traffic. The obfuscated network traffic server maintains the relationship between extracted application content and extracted network header content such that the obfuscated network traffic is indistinguishable from the monitored network traffic. The obfuscated network traffic server may include a network monitor operative to monitor network traffic and to extract application content and network header content from the monitored network traffic. The obfuscated network traffic server may also include a data masking processor operative to mask a portion of the separated application content and/or the separated network header content. The obfuscated network traffic server may further include a masking attribute selector operative to specify the attributes of the application content and/or the network header content that is to be masked. | 04-05-2012 |
20120082136 | P-CSCF FAST HANDOFF FOR IMS/MMS ARCHITECTURE - A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology. | 04-05-2012 |
20120072988 | DETECTION OF GLOBAL METAMORPHIC MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSIS - Malware feature extraction derives semantic summaries of executable malware using global, inter-procedural program analysis techniques. A combination of global, inter-procedural program analysis techniques constructs semantic summaries of malware which automatically detect and discard any noise introduced by transformations and capture the essence of the underlying computations in a succinct form. This is achieved in two ways. First, global control flow analysis techniques are used to derive a high level representation of malware code that, for instance, removes the effects of subroutine calls. Second, global data flow analysis techniques are employed to detect and remove all spurious elements of malware that do not contribute towards its underlying computation, thereby preventing the resulting summaries from being “corrupted” with unnecessary, extraneous elements. | 03-22-2012 |
20120072932 | SYSTEM AND METHOD FOR CONTROLLING AND MANAGING THE DELIVERY OF DIGITAL MEDIA TO DEVICES ON HOME NETWORKS - A system and method for controlling and managing delivery of digital media to devices on a home network is presented. The system comprises an application server executed by a physical or virtual CPU, the application server notified by each device when each device initializes, a plurality of plug-ins, each device corresponding to at least one plug-in, and a control plane, wherein the control plane receives notice of an event from one device and sends the notice of the event to the application server, which sends the notice of the event to the plug-in corresponding to the one device having the event, and the plug-in performs the event. The plug-in can perform the event by streaming content data to a desired device. The application server can maintain user information and when the plug-in performs the event, the plug-in updates the user information. The application server can have an interactive program guide. | 03-22-2012 |
20120070804 | Architecture, Method, and Program for Generating Realistic Vehicular Mobility Patterns - A method, simulator and program for simulating vehicular movement based upon user input parameters related to simulation topology and simulation vehicles including, but not limited to linear vehicular density. The simulator generates the simulation topology having a simulation area using the user input parameters, places a plurality of simulation vehicles within the simulation area at an initial placement using at least two input parameters related to simulation vehicle and the generated simulation topology; and determines movement of the plurality of simulation vehicles starting with the initial placement using a plurality of movement models. Each of the plurality of simulation vehicles has mobility characteristics generated using the plurality of movement models. When vehicle moves outside the simulation area, the vehicle re-emerges at a location within the simulation area. The vehicle re-emerges with new movement characteristics. | 03-22-2012 |
20120069749 | MOBILITY POLICY UPDATES FOR MOBILE DEVICES - A packet data network gateway device may receive packet network data at a packet data network gateway device; filter the received packet network data to extract information associated with one or more messages in the packet network data; analyze the extracted information; and dynamically determine one or more of policy updates, rules, or thresholds based on the analyzing of the information and information associated with one or more of subscribers, location, existing policies, network operating condition and load. | 03-22-2012 |
20120059921 | VIRTUAL AD HOC NETWORK TESTBEDS FOR NETWORK-AWARE APPLICATIONS - A virtual ad hoc network testbed provides the capability to instrument a testbed in order to support the execution of network-aware applications “as is.” Network aware applications are a special class of applications that interact with a network not only by using the network for communication purposes, but also configure or read the status of network devices. Local stack management provides the means to automatically construct standard APIs for accessing the information residing in a simulated or emulated network, and instantiate these APIs. The testbed is designed to bridge a standard management module (such as SNMP) and a simulation or emulation model, starting from a MIB module. The testbed uses CORBA as a communication means. The process is divided into two parts, agent side and model side. | 03-08-2012 |
20120042084 | SELF-ORGANIZING IMS NETWORK AND METHOD FOR ORGANIZING AND MAINTAINING SESSIONS - A method and system for setting up and maintaining an IMS session. The method comprising transmitting an invite message from a registered user equipment, forwarding the invite message to a selected SIP proxy (P-CSCF), forwarding the invite message to a specified SIP server (S-CSCF) and relaying said invite message to a destination. The invite message contains a header and a payload. The header includes an identifier for the load balancing node. The load balancing node is assigned to the user equipment. There are at least two load balancing node, a primary and a secondary load balancing node. The identifier for the load balancing node does not change even if there is a failure of one of a primary load balancing node, the P-CSCFs or S-CSCFs. During registration, the routing information for the load balancing node is added into both via and record-route headers in a SIP registration request. | 02-16-2012 |
20120039235 | METHODS FOR RELIABLE MULTICASTING IN LOCAL PEER GROUP (LPG) BASED VEHICLE AD HOC NETWORKS - A method for routing a multicast message comprising the steps of receiving a multicast message including at least a message, a source identifier, a sequence number, a time-to-live value and a multicast group destination, determining if the multicast group destination is in a multicast forwarding table, determining if the message has been previously received, adding the multicast message to the multicast forwarding table if it is determined that the multicast message has not been previously received, determining if a node that received the multicast message is a forwarding node; randomly setting a wait time for forwarding the multicast message; and forwarding the multicast message at the expiration of the wait time. | 02-16-2012 |
20120036360 | SYSTEM AND METHOD ESTABLISHING TRUSTED RELATIONSHIPS TO ENABLE SECURE EXCHANGE OF PRIVATE INFORMATION - The invention disclosed here is aimed at enabling a trusted third party to manage user opt-ins which would enable growth of personalized information services, that is, enabling trusted business relationships between three types of entities—an end-user, an information source/provider, and an application service provider/developer—so that they can have a controlled, secure and private exchange of sensitive and/or confidential information. The inventive system has modes of operation recommended based on various conditions, enabling a secure exchange of private information between personal information repository owners and application services providers to enable deliver of personalized services. One mode is Durable Subscription Management, which is used when per transaction approval is not needed, that is, when an end-user has given permission to access data for a given or predefined period of time. A second mode is Per-Transaction Subscription Management Without Logs and a third mode is Per-Transaction Subscription Management With Logs. | 02-09-2012 |
20120030758 | Automated Diversity Using Return Oriented Programming - A method of automatically creating functionally and structurally diverse equivalent copies of software executables using return oriented programming for the purpose of passing through a filter and other purposes includes starting with a program and a target runtime environment, creating a return oriented instruction library having a plurality of code fragments which end in a ‘return’ instruction from the program and chaining fragments together to automatically form diverse equivalent copies of software executables using return oriented programming. | 02-02-2012 |
20120030150 | Hybrid Learning Component for Link State Routing Protocols - In a network that executes a link state routing protocol, a network node receives periodic disseminations of link state information from other network nodes. The link state information includes neighboring node identity and link cost metrics. The network node calculates the initial routing paths based on the received link state information by using a link state routing algorithm. It then adapts the calculated path based on both the current link state information and past link state information through a reinforcement learning process. The network node then selects a routing path to each destination node based on the adaptation and updates the routing table accordingly. | 02-02-2012 |
20120028643 | METHOD AND SYSTEM TO SUPPORT USER-CENTRIC SELECTION OF POINT OF ATTACHMENT THROUGH MOMENTARY INTERACTIVE MULTIMEDIA EXPERIENCE CONVEYANCE AND THROUGH CORRELATION OF WEB LINKS TO QUALITY AND EXPERIENCE METRICS - A system and method for improving quality of experience (QoE) of using a mobile device can comprise utilization of stored information relating to RANs of service providers and QoE ratings, receiving an event related to the RANs or to mobile Web browsing actions, receiving requests for QoE metrics based on the event, parsing and interpreting results of the QoE metrics; preparing and beginning an emulation session of the RANs, choosing a presentation style, rendering QoE in accordance with the browser actions and the presentation style which can be purely quantitative comparison, pre-recorded session, limited interaction-emulated session, live interactive session and live automatically controlled non-interactive session, and enabling user input according to the presentation style. The method can comprise standardizing information to allow comparison of the information, rendering network-related information on a display and updating the presentation of the network-related information to maintain a fair representation of the RANs being emulated. | 02-02-2012 |
20120023062 | ROBUST INFORMATION FUSION METHODS FOR DECISION MAKING FOR MULTISOURCE DATA - Methods and systems are provided for developing decision information relating to a single system based on data received from a plurality of sensors. The method includes receiving first data from a first sensor that defines first information of a first type that is related to a system, receiving second data from a second sensor that defines second information of a second type that is related to said system, wherein the first type is different from the second type, generating a first decision model, a second decision model, and a third decision model, determining whether data is available from only the first sensor, only the second sensor, or both the first and second sensors, and selecting based on the determination of availability an additional model to apply the available data, wherein the additional model is selected from a plurality of additional decision models including the third decision model. | 01-26-2012 |
20120021740 | System and Method for Load Balancing and Handoff Management Based on Flight Plan and Channel Occupancy - A predictive system and method for aircraft load balancing and handoff management leverages the aircraft flight plan as well as channel occupancy and loading information. Several novel techniques are applied to the load balancing and handoff management problem: Use of aircraft position and flight plan information to geographically and temporally predict the appropriate ground stations that the aircraft should connect to for handoff, and monitoring the load of ground stations and using the ground-requested, aircraft initiated handoff procedure to influence the aircraft to connect to lightly loaded ground stations. | 01-26-2012 |
20120020216 | COGNITIVE NETWORK LOAD PREDICTION METHOD AND APPARATUS - Loads for a wireless network having a plurality of end nodes are predicted by constructing a computer data set of end-to-end pairs of the end nodes included in the network using a computer model of the network; constructing a computerized set of observables from social information about users of the network; developing a computerized learned model of predicted traffic using at least the data set and the observables; and using the computerized learned model to predict future end-to-end network traffic. | 01-26-2012 |
20120020204 | PUBLIC LAND MOBILE NETWORK SELECTION PROCEDURES FOR SIMULTANEOUS NETWORK CONNECTIVITY THROUGH MULTIPLE ACCESSES - A system and method for network selection procedures for simultaneous network connectivity through multiple accesses comprises obtaining stored and registered PLMNs, determining whether PLMNs are both stored PLMN for access technology type Ai and registered PLMN, when no PLMNs are both, performing PLMN selection using a standard procedure, when only one PLMN is both, determining whether the PLMN satisfies a condition, and when the PLMN satisfies the condition, attempting to connect to the PLMN, and when more than one PLMN is both, creating a set of PLMNs, selecting one PLMN that satisfies the condition, from the set PLMN, attempting to connect to the selected PLMN, and when attempting to connect fails, removing the selected PLMN from the set, and selecting another PLMN. In one aspect, the PLMN that minimizes changes is selected. In one aspect, the PLMN that provides access to a larger number of access technologies is selected. | 01-26-2012 |
20120017260 | VERIFYING ACCESS-CONTROL POLICIES WITH ARITHMETIC QUANTIFIER-FREE FORM CONSTRAINTS - A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving. | 01-19-2012 |
20120016909 | QUERY-BASED SEMANTIC ANALYSIS OF AD HOC CONFIGURATION LANGUAGES FOR NETWORKS - A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database. | 01-19-2012 |
20120009909 | Feasibility, Convergence, and Optimization of LTE Femto Networks - Methods and systems used to plan, optimize, and manage LTE femtocell networks describes an analytical framework and algorithms that allow analysis and planning of various femtocell aspects including dynamic adjustment of femtocell power for interference mitigation, and optimization according to user selectable policies. The framework recommends using a hybrid of both distributed control and centralized policy enforcement. An algorithm having two closely related aspects is provided. The first part is an Iterative and Distributed Algorithm (IDA), which is intended to be executed inside the femtocells. The second part of the algorithm is intended to be used as a toolset and is called Analytic Computational Algorithm (ACA), which is intended to be used in a centralized planning and operations center. The ACA provides a set of conditions that are used to check for convergence of the IDA. | 01-12-2012 |
20120002733 | OPTIMIZING EVALUATION PATTERNS AND DATA ACQUISITION FOR STREAM ANALYTICS IN RESOURCE-CONSTRAINED WIRELESS ENVIRONMENTS - Mobile wireless devices may receive data streams from multiple remote sensors. The sensors may have limited power supplies and memory capacity. Aspects of the invention use statistical characteristics of the sensor data streams and the cost of acquiring a single element of each stream to determine what sequence the sensors should send their data streams in. The cost of acquiring the data may be, modified dynamically, depending on parameters such as block size. Additional factors, such as a sensor's buffer capacity, may limit the amount of stream elements that may be cached and affect the sensors' stream transmit sequence. The evaluation order may be dynamically modified using an event processing engine, to reflect both changing statistics of underlying sensor stream tuples and time-varying acquisition costs associated with individual streams. This helps to increase in the operational lifetime of the sensors and associated monitoring applications. | 01-05-2012 |
20110299389 | Real Time Monitoring, Onset Detection And Control Of Congestive Phase-Transitions in Communication Networks - Systems and methods for managing network congestion through detecting the closeness to network congestion. The network includes a plurality of network nodes, where each node has at least one neighboring node and each node has a buffer for a queue of packets from other nodes. The system measures queue length at a node and the node's neighboring nodes, processes the measured queue lengths to obtain patterns of fluctuations for the measured queue length. The system determines if one or more of the measured nodes are in a transition-onset status toward a phase transition point based on the obtained patterns of fluctuation and generates congestion control signals based on the determination to route network traffic away. The phase transition point corresponds to a change from a non-congestive phase of the measured nodes to a congestive phase of the measured nodes. | 12-08-2011 |
20110296245 | SYSTEM AND METHOD FOR A STAGGERED EXECUTION ENVIRONMENT - A staggered execution environment is provided to safely execute an application program against software failures. In an embodiment, the staggered execution environment includes one or more probe virtual machines that execute various portions of an application program and an execution virtual machine that executes the same application program within a time delay behind the probe virtual machines. A virtualization supervisor coordinates the execution of the application program on one or more probe virtual machines. The probe virtual machines are used to detect and correct software failures prior to the execution virtual machine encountering them. The virtualization supervisor embargos output data in order to ensure that erroneous data is not released which may adversely affect external processes. | 12-01-2011 |
20110295982 | SOCIETAL-SCALE GRAPH-BASED INTERDICTION FOR VIRUS PROPAGATION SLOWDOWN IN TELECOMMUNICATIONS NETWORKS - Embodiments of the invention enable very rapid intervention on detection of computer network attacks by viruses or other malicious code. Targeted disruption of links between selected nodes in the network is used to hinder the spread of such malicious code. This applies to e-mail and other modes of communication. For instance, identification of and response to an attack may occur within 5-10 minutes instead of the hours or days timescale associated with known signature-based virus protection techniques. Aspects of the invention directly adapt to observed patterns of social contacts and exchanges to provide a substantial increase, e.g., on the order of a 10-fold increase, in the time until a virus affects 70-80% of network users. This provides anti-virus inoculation mechanisms significant time, for instance on the order of 1-2 additional days, before an attack disrupts worldwide communication networks. | 12-01-2011 |
20110283348 | SYSTEM AND METHOD FOR DETERMINING FIREWALL EQUIVALENCE, UNION, INTERSECTION AND DIFFERENCE - Aspects of the invention pertain to integrated compliance analysis of multiple firewalls and access control lists for network segregation and partitioning. Access control lists may have many individual rules that indicate whether information can be passed between certain devices in a computer network. The access control lists in different firewalls in different network segments within a given network may overlap or have inconsistent rules. Aspects of the invention generate differences between firewalls, analyze equivalency of firewalls, generate the intersection (if any) between a pair of firewalls, and generate the union (if any) between firewalls. Such information provides an integrated analysis of multiple interrelated firewalls, including inbound and outbound access control lists for such firewalls, and may be used to manage firewall operation within the network to ensure consistent operation and maintain network security. It also addresses a wide range of security questions that arise when dealing with multiple firewalls. | 11-17-2011 |
20110282862 | SYSTEM AND METHOD FOR PREVENTING NFORMATION INFERENCING FROM DOCUMENT COLLECTIONS - A method for preventing information inferencing from documents comprises creating a document collection view from the documents, obtaining rules based on information to be hidden, establishing a plurality of levels of the rules, said levels ranging from a shallow level to a deepest level, for each level of the rules, from the shallow level to the deepest level, examining the document collection view in accordance with the level of the rules, when said examining detects inferencing, performing trace and repair on the document collection view, and outputting the document collection view. Examining can be performed using a search engine, a natural language processing engine, and a conceptual inferencability engine. The shallow level can correspond to a search engine, a deep level can correspond to a natural language processing engine, and a deepest level can correspond to a conceptual inferencability engine. The documents can be data in digital form. | 11-17-2011 |
20110276552 | RECONSTRUCTION OF TRANSIENT INFORMATION IN INFORMATION DELIVERY SYSTEMS - In a dynamic information delivery context, a system collects data regarding transient information accessed by a user. The user can then query the stored data to reconstruct transient information. The system uses heuristics to help reconstruct transient information. The heuristics include user profile, time stamps, metadata, and indexing. | 11-10-2011 |
20110271340 | METHOD AND APPARATUS FOR DETECTING SPOOFED NETWORK TRAFFIC - A method and apparatus for detecting spoofed IP network traffic is presented. A mapping table is created to indicate correlations between IP address prefixes and AS numbers, based on routing information collected from a plurality of data sources. At each interface of a target network, IP address prefixes from a training traffic flow are acquired and further converted into AS numbers based on the mapping table. An EAS (Expected Autonomous System) table is populated by the AS numbers collected for each interface. The EAS table is used to determine if an operation traffic flow is allowed to enter the network. | 11-03-2011 |
20110271110 | KEY MANAGEMENT DEVICE, SYSTEM AND METHOD HAVING A REKEY MECHANISM - According to some embodiments, a key management apparatus for deploying in a smart grid system adapted to receive metering data from smart meters connected to at least one relay via a network, includes: a key control mechanism that derives a key array of individual purpose specific keys from one master key such that the purpose specific key in the key array are each independent cryptographic keys for each specific usage in an application or for each application if there is only one specific usage in an application. | 11-03-2011 |
20110261703 | DISTRIBUTED METHOD FOR EQUITABLE BANDWIDTH ALLOCATION FOR CONTENT DISTRIBUTION IN A NETWORK - A distributed method is presented for determining equitable bandwidth allocations in a content distribution tree network, where the root of the tree has a server that broadcasts multiple programs throughout the tree. The intensive computations in the distributed method are done at each of the nodes independently while only minimal information is exchanged among the nodes. Each network link has limited capacity. The allocation problem is formulated as an equitable resource allocation problem with a lexicographic maximin objective function that provides equitable service performance for all requested programs at the various nodes. The constraints include link capacity constraints and tree-like ordering constraints imposed on each of the programs. The distributed method converges to the equitable solution in a finite number of iterations. The distributed method can be applied to a network comprised of multiple trees. | 10-27-2011 |
20110255871 | Mode-Locked Optical Amplifier as a Source for a wdm-WDM Hierarchy Architecture - The present invention relates to advances in the field of reconfigurable optical networks. In particular, the present invention provides improvements in the technology of light sources for use in optical networks. The optical network according to the present invention includes a single light source that can be used to emit all of the bands and channels needed for transmission. In particular, the single light source in the optical network of the present invention is a mode-locked laser. | 10-20-2011 |
20110250836 | INTERFERENCE-ADAPTIVE UWB RADIO-BASED VEHICLE COMMUNICATION SYSTEM FOR ACTIVE-SAFETY - A system and method for increasing transmission concurrency amongst communicating vehicles using UWB radio-based communication is presented. The method comprises dividing an area around a sending vehicle into transmission areas, and, for each transmission area, broadcasting a message from the sending vehicle, waiting for a time, and when a not clear to send response is not received, sending information to the transmission area, and the information being sent using a time-hopping sequence based on a location and seed in the message. The message can also have a frame length and a target region. The method can also comprise determining, when a no-send is received, whether the no-send was in response to the message from the sending vehicle, and when the no-send is not in response to the message from the sending vehicle, sending the information to the transmission area. The system and method can be used for active-safety vehicle communication. | 10-13-2011 |
20110249653 | SECURE AND SEAMLESS WAN-LAN ROAMING - Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks. | 10-13-2011 |
20110238379 | ENABLING CAPTURE, TRANSMISSION AND RECONSTRUCTION OF RELATIVE CAUSITIVE CONTEXTURAL HISTORY FOR RESOURCE-CONSTRAINED STREAM COMPUTING APPLICATIONS - A scalable middleware for supporting energy-efficient, long-term remote health monitoring and the capture and transmission of relative causative contextual history where data is collected using physiological sensors and transported back to the middleware through a mobile device serving as a gateway. The key to energy efficient operations lies in the adoption of an Activity Triggered Deep Monitoring paradigm, where data collection episodes are triggered only when the system is determined to possess a specified set of causative contexts. The system supports on-demand collection of causative contextual history using a low-overhead provenance collection sub-system. In a preferred embodiment the behavior of this sub-system is configured using an application-defined context composition graph. The resulting causative context history stream provides valuable insight into the states and conditions surround sensor readings and allows improved human interpretation of the ‘episodic’ sensor data streams. | 09-29-2011 |
20110234435 | SYSTEM AND METHOD FOR SELECTIVE WAVELENGTH INTERLEAVED FILTERED TECHNIQUE (SWIFT) ADC - A system and method for selective wavelength interleaved filtering technique for analog to digital conversion (ADC) comprises a remote aperture for analog input, a modulator operable to transform the analog input into an initial optical signal, a photonic front end having high resolution optical filters operable to filter the optical signal into multiple subsequent optical signals and supply local oscillators for downconversion into electrical signals, a segmented subsystem having a plurality of ADCs, each operable to receive and convert one subsequent optical signal of the optical signals, and a memory buffer and process subsystem operable to reconstruct the converted subsequent optical signals into a digital representation of the analog input by executing reconstruction algorithms. Provision is made for compensation of distortions arising in the electrical to optical to electrical conversion process. The optical filters can include a self-registered filter wherein individual passbands are intrinsically aligned to one another. | 09-29-2011 |
20110231656 | SYSTEM AND METHODS FOR AUTHENTICATING A RECEIVER IN AN ON-DEMAND SENDER-RECEIVER TRANSACTION - A system and method are provided for authenticating a first device to a second device. This involves determining, at the directory, a secret key and a first set of images by communicating with the first device; receiving, at the directory, a transaction request from the second device to authenticate the first device; and generating, at the directory, a tag using said secret key and first information associated with said transaction request. This also involves selecting a second set of images from said first set of images according to said tag, and sending said second set of images from the directory to the second device. Moreover, using said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device. | 09-22-2011 |
20110228939 | SYSTEM AND METHODS FOR OCDM-BASED OPTICAL ENCRYPTION USING SUBSETS OF PHASE-LOCKED FREQUENCY LINES - A method for optical signal processing includes receiving an optical signal containing a plurality of frequency lines, defining at least two wavesets including an updatable random subset of the frequency lines, receiving a data stream, modulating the optical signal with the data stream, encrypting the data stream by extracting the subset of the frequency lines of the at least two wavesets from the modulated optical signal, and phase coding the subset of frequency lines of the at least two wavesets in the modulated optical signal. | 09-22-2011 |
20110228938 | MULTI-BIT CRYPTOGRAPHICALLY SECURE ENCRYPTOR FOR M-ARY SPECTRAL PHASE ENCODER OPTICAL CODE DIVISION MULTIPLE ACCESS - A system and methods are provided for transmitting an encrypted data word of two or more bits. This involves identifying a random key word comprising two or more bits for encrypting the data word and identifying a set of unique orthogonal codes. This also involves selecting a code from the set of unique orthogonal codes that corresponds to a result of an exclusive-or (XOR) operation between the two or more bits of the data word and the random key word. This also involves encoding a signal with the code and transmitting the encoded signal as encrypted data. | 09-22-2011 |
20110228913 | AUTOMATIC EXTRACTION OF INFORMATION FROM ONGOING VOICE COMMUNICATION SYSTEM AND METHODS - A system and methods are provided for automatically extracting information from ongoing voice communications. A signal is received at an electronic processor indicating that a portion of an ongoing communication is to be recorded. As a result of that signal, the ongoing communication is recorded and then analyzed to identify information suitable for storage in an address directory of a participant to the communication maintained in an electronic storage medium. Thereafter, the extracted information is sent to that address directory for storage there. In the alternative, when the extracted information is a telephone number, a call based upon that number may be placed automatically and connected into the ongoing communication. | 09-22-2011 |
20110227757 | METHODS FOR CONTEXT DRIVEN DISRUPTION TOLERANT VEHICULAR NETWORKING IN DYNAMIC ROADWAY ENVIRONMENTS - A method and apparatus for optimizing communication of data within a disruption tolerant network. The method comprises of receiving a data packet, said data packet including a context and a state related to said context, storing the data packet to a buffer and disseminating the data packet to neighboring vehicles and RSU, and passing said state to an application, said application associated with said application context. In one embodiment, the method functions as a software protocol within a dashboard computer. The apparatus comprises a processor and a memory operable to receive a data packet, said data packet including a context and a state related to said context, store the data packet to a buffer when the context matches an application context, disseminating the data packet to neighboring vehicles and RSU, and pass said state to an application when the context matches an application context, said application associated with said application context. In one embodiment, the apparatus is presented as a dashboard computer within a vehicle. | 09-22-2011 |
20110214178 | System and Method for Detecting and Evicting Malicious Vehicles in a Vehicle Communications Network - In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles). | 09-01-2011 |
20110213968 | System and Methods to Perform Public Key Infrastructure (PKI) Operations in Vehicle Networks using One-Way Communications Infrastructure - A set of certificate management methods designed to significantly reduce or eliminate reliance on infrastructure network connectivity after vehicles are sold uses techniques to support certificate management operations in order to reduce the frequency which vehicles need to communicate with the Certificate Authorities (CAs) and the amount of data that needs to be exchanged between vehicles and the CA. These methods include, for example, approaches to use one-way communications and vehicle-to-vehicle (V2V) communications to replace expired certificates, approaches to use one-way communications and V2V communications to replace revoked certificates, and use of a small subset of vehicles as proxies to help retrieve and distribute Certificate Revocation Lists (CRLs) and replacement certificates. The combination of these techniques leads to solutions that can eliminate the need for roadside infrastructure networks completely. | 09-01-2011 |
20110211244 | HIGH-PROBABILITY HERALDED SINGLE-PHOTON SOURCE AND RELATED METHOD - A system and method is provided for a source for a heralded single photon comprising a correlated photon-pair generator that provides bursts of multiple photon pairs that may be odd or even in number of pairs, one of each pair having a first but not a second characteristic and the other of each pair having the second but not the first characteristic; a first optical path for photons of pairs having the first characteristic; a second optical path for photons of pairs having the second characteristic; a two-photon absorber in the first optical path that, for each burst of photons, reduces the number of first characteristic photons in the first path to zero or one, depending on whether the number of photon pairs in the burst is even or odd; a photon detector in the second path having a heralding signal output to indicate when the number of photons in the burst is odd; and an optical switch coupled to the output of the second optical path and connected to operate in response to the heralding signal. | 09-01-2011 |
20110210973 | METHOD TO MODEL VEHICULAR COMMUNICATION NETWORKS AS RANDOM GEOMETRIC GRAPHS - A method for generating mathematical analysis of a communication protocol in a vehicular communications network. The method defines features of a vehicular network, which may include a graph of a street map within a geographic area. A random geometric graph with a plurality of parameters is generated. A plurality of communications protocols on the vehicular network are defined. A communication protocol over the random geometric graph is redefined. A communication protocol's basic properties and associated features on the random geometric graph are analyzed. Results of the analysis are generated. The results of the analysis based on the random geometric graph's parameters are translated into results based on the vehicular network features. The random geometric graph with the parameters are displayed. The parameters may include: a number of graph nodes; and a probability that any two nodes are communicably connected being expressed as a function of the vehicular network features. | 09-01-2011 |
20110200192 | SECURE KEY DISTRIBUTION FOR OPTICAL CODE DIVISION MULTIPLEXED BASED OPTICAL ENCRYPTION - An optical communications network incorporating photonic layer security, with secure key exchange without loss of data, and a method of operating the network are disclosed. The network comprises a transmit side and a receive side. The transmit side includes first and second scramblers and a transmit side switch; and the receive side includes first and second descramblers and a receive side switch. The scramblers use encryption keys to encrypt optical signals, and the descramblers use the encryption keys to decrypt the encrypted optical signals. The encryption keys can be updated randomly and at will by installing new encryption keys on the scramblers and descramblers, and the transmit side and receive side switches are synchronized so that all of the optical signals that are encrypted using a new or updated encryption key are decrypted using the same new or updated encryption key. | 08-18-2011 |
20110197255 | SOCIAL NETWORK PRIVACY BY MEANS OF EVOLVING ACCESS CONTROL - A method and software product for limit privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Social networks deploy an additional layer of server-assisted access control which, even under no action from a user, automatically evolves over time, by restricting access to the user's data. The evolving access control mechanism provides non-trivial quantifiable guarantees for formally specified requirements of utility (i.e., users share as much data as possible to all other users) and privacy (i.e., users expose combinations of sensitive data only with low probability and over a long time). | 08-11-2011 |
20110191581 | METHOD AND SYSTEM FOR USE IN MANAGING VEHICLE DIGITAL CERTIFICATES - A system and method is provided for managing digital certificates, the system including one or more a certificate authorities and a vehicle-bound digital certificate manager, the apparatus comprising: a mobile client having a wireless transceiver with internet protocol capabilities and a vehicle communication device; the client further including at least one processor and at least one non-transitory computer readable medium encoded with instructions, which when loaded on the at least one computer, establishes processes for information handling, comprising: establishing secure communications with a certificate authority to receive at least one of a Vehicle Identification Digital Certificate (“VIDC”), an Anonymous Vehicle digital Certificate (“AVDC”), and a Certificate Revocation Lists (“CRLs”); storage management of at least one of the VIDC, AVDCs, and CRLs; and forwarding of at least one of the VIDC, AVDCs, and CRLs received from the certificate authority to the digital certificate manager using the vehicle communication device. | 08-04-2011 |
20110185230 | LEARNING PROGRAM BEHAVIOR FOR ANOMALY DETECTION - A computer-enabled method of learning the behavior of a program. A processor can execute a target program during a learning interval while varying a plurality of stimuli provided to the target program so as to produce a multiplicity of different sequences of events which differ in combinations of types of events in respective sequences, orders in which the types of events occur in respective sequences, or in the combinations and in the orders in which the types of events occur. The multiplicity of event sequences can be recorded, and a second program can be executed by a processor to: determine a plurality of clusters based on similarities between the event sequences in their entirety; and determine a plurality of signatures corresponding to the plurality of clusters. Each signature can be the longest common subsequence of all sequences in the respective cluster and thus representative of the cluster. In such method, each of the plurality of signatures can be a benchmark representative of acceptable behavior of the target program. | 07-28-2011 |
20110185229 | FAULT DIAGNOSIS EMPLOYING PROBABILISTIC MODELS AND STATISTICAL LEARNING - A computer implemented fault diagnosis method employing both probabilistic models and statistical learning that diagnoses faults using probabilities and time windows learned during the actual operation of a system being monitored. In a preferred embodiment, the method maintains for each possible root cause fault an a-priori probability that the fault will appear in a time window of specified length as well as maintaining—for each possible resulting symptom(s)—probabilities that the symptom(s) will appear in a time window containing the fault and probabilities that the alarm will not appear in a time window containing the fault. Consequently, the method according to the present invention may advantageously determine—at any time—the probability that a fault has occurred, and report faults which are sufficiently likely to have occurred. These probabilities are updated based upon past time windows in which we have determined fault(s) and their cause(s). Advantageously, each root cause fault may be assigned its own time window length. By maintaining these probability parameters for several different window lengths, a window length that is particularly well-suited to a particular set of conditions may be chosen. | 07-28-2011 |
20110185047 | SYSTEM AND METHOD FOR A DISTRIBUTED FAULT TOLERANT NETWORK CONFIGURATION REPOSITORY - An autonomous management cluster of network elements serves as a distributed configuration repository. Network elements sharing a common pre-determined shared identifier autonomously form themselves as a management cluster. The network elements in the cluster exchange configuration files. In the event of a loss, destruction, or corruption of one of the network element's configuration file, the network element recovers its configuration file from its closest neighbor in its management cluster. The management cluster can also be used to efficiently disseminate configuration changes by simply communicating the changes to one or more elements in the cluster, and allowing the other nodes in the cluster to discover and retrieve their updated configuration files. | 07-28-2011 |
20110183678 | SYSTEM AND METHOD FOR RESOURCE ALLOCATION OF A LTE NETWORK INTEGRATED WITH FEMTOCELLS - A resource scheduling and power allocation technique is provided for a LTE radio network integrated with femtocells. The technique utilizes a tri-phase approach that includes a stochastic geometric model of an exemplary radio network that generates a channel attenuation matrix for each channel at each PRB. A resource scheduling and power allocation procedure determines a near optimal assignment of mobile user to PRBs based on the channel attenuations, potential data rates, and transmit power subject to maximizing the data rates in accordance with a fairness objective. A discrete-event simulation procedure simulates the end-to-end transmission of the data packets in a packet-switch network in accordance with the assignments to analyze the behavior of the overall network. | 07-28-2011 |
20110182587 | SYSTEM AND METHODS FOR CONVERTING A TEMPORALLY SHORT AND SPECTRALLY BROAD OPTICAL PULSE INTO A TRAIN OF SPECTRALLY NARROW OPTICAL PULSES - A system and methods are provided for converting a first temporally short and spectrally broad optical pulse into a train of spectrally narrow and distinct optical pulses. This involves receiving, on a first I/O channel, the first optical pulse associated with a plurality of wavelengths and performing wavelength division demultiplexing on the first optical pulse at an optical unit housed on an optical chip to output a plurality of second optical pulses on different ones of a plurality of second I/O channels, each of the second optical pulses associated with a unique wavelength range from the first optical pulse. This also involves receiving the second optical pulses at loop mirrors in the second I/O channels, wherein the second I/O channels are patterned as waveguides in the optical chip and reflecting, at the loop mirrors, the second optical pulses back to the optical unit. | 07-28-2011 |
20110182417 | MULTI VENDOR NPAC ADMINISTRATION PEERING - An architecture and accompanying method and apparatus for providing multi vendor administration of telephone numbers being ported from one service provider to another. | 07-28-2011 |
20110178969 | METHOD AND SYSTEM FOR IMPROVING PERSONAL PRODUCTIVITY IN HOME ENVIRONMENTS - Method and system for improving personal productivity in home environments may store state information associated with an environment and one or more users in a knowledge base, detected activity of a user, infer location of the user based on the detected activity, and suggest one or more tasks to be performed based on the inferred user location. | 07-21-2011 |
20110158095 | NON-BLOCKING ADMISSION CONTROL - A method for controlling network access comprises receiving a request to allow a communication flow over a network and temporarily allowing the communication flow over the network before a response to the request is transmitted. Further, the availability of one or more network resources may be determined and compared with resources required for the requested communication flow. Priority of the communication flow may also be determined, and the temporarily allowed communication flow may be responded to based on the available resources, the requested resources, and the priority. | 06-30-2011 |
20110154386 | ANNOTATED ADVERTISEMENT REFERRAL SYSTEM AND METHODS - A system and methods provide an annotated advertisement referral for presentation on an electronic device by employing the steps of receiving at an electronic processor an indication of a referral of an advertisement and the identity of a target to whom the advertisement is referred, and then directing the electronic signal representing a version of that advertisement to an electronic device associated with that target to whom the advertisement is referred. Preferably, that directed electronic signal includes an indication of the origin of the referral and a ranking of the advertisement given by the referring party. | 06-23-2011 |
20110153564 | ERROR-SENSITIVE ELECTRONIC DIRECTORY SYNCHRONIZATION SYSTEM AND METHODS - A system and method is provided for synchronizing related entries in different electronically stored directories. In one implementation, the method includes the steps of: storing first entries in a first directory, one of a plurality of directories, the first entries having first fields for different types of information and each first field having a related stored confidence level indicating the degree of confidence of the accuracy of the data stored in each first field; storing second entries in related second fields in a second memory, each of the second field entries having a corresponding stored confidence level; determining when a change has been made to a field of an entry; and updating the corresponding field in the other directory with a confidence level for the field when a change exceeds a threshold. | 06-23-2011 |
20110145901 | SYSTEMS AND METHODS FOR AUTHENTICATING A SERVER BY COMBINING IMAGE RECOGNITION WITH CODES - A system and method is provided for authenticating a first device to a second device. This involves providing images to the second device, receiving an indication of selected ones of the images as authenticating images, and identifying an authenticating code associated with the second device. This also involves receiving a transaction request from the second device, the first device providing a display page to the second device, the display page including the authenticating images at locations identified by the authenticating code. | 06-16-2011 |
20110145686 | TERM-SPECIFIC NAVIGATION SYSTEM AND METHOD FOR INFORMATION SEARCHING - A term-specific navigation method and system is provided for information searching by a user of an Internet browser, that modifies, by using a processor, a copy of Internet content identified as a result of a specific user's search to mark in that copy the locations of a user's search terms; and provides the user with one or more links that will direct the user's browser to the locations in the copy where the user's specific terms were found. | 06-16-2011 |
20110143760 | Modified Overhead Adjustment Function - A MOAF algorithm is used to resize cells for balancing capacity. The MOAF algorithm bases its decision on a cell and all other cells which the algorithm decides are sufficiently close in a propagation sense to affect the results. The MOAF algorithm also automatically determines those cells in an area which are most heavily loaded and those cells which are lightly loaded. The MOAF algorithm will only decrease the size of a cell if it determines specific adjacent cells that are willing and able to accept the load, and the MOAF algorithm will increase the size of a cell only if there is a nearby heavily loaded cell that requires the removal of load. Moreover, the MOAF algorithm can be tuned (via the threshold parameter T) to shift the focus of the optimization from avoidance of coverage holes to the avoidance of creation of excessive handover legs. Because the changes are electrical rather than physical they can be deployed instantaneously via the network management system thus saving the cost of sending a field crew to the site. Moreover, it is possible to make these changes much more frequently than has been possible in the past thereby permitting the optimization of the network to be done in near real time to meet the temporal changes in the geographic distribution of customers. | 06-16-2011 |
20110142058 | BRIDGE PROTOCOL FOR FLOW-SPECIFIC MESSAGES - A bridge protocol for controlled information transfer between encrypted and unencrypted networks—and vice versa—by utilizing successive packets of a flow wherein messages are spread across multiple packets and may therefore collectively convey far greater information than is possible in individual per-packet DiffServ Code Points (DSCPs), as practiced in the current art. In a first preferred embodiment the bridge protocol utilizes IPv6 DSCPs in successive packets to provide messages having a length of up to 6n bits in length where n is the number of DSCPs comprising the IPv6 bridge protocol message. In an alternative embodiment, the bridge protocol utilizes DSCPs in successive packets of an IPv4 flow to provide messages having a length of up to 5n bits in length where n is the number of DSCPs comprising the IPv4 bridge protocol message. It further utilizes the DSCP in the last packet of the IPv4 flow to mark the end of the flow. For security purposes, both embodiments include multiple safeguards to prohibit passage of unauthorized information across encryption boundaries. | 06-16-2011 |
20110141363 | MULTIMEDIA TELEVISION PROGRAM ANNOUNCEMENT SYSTEM AND METHODS - A system and method are provided for television program announcements, involving a television; a storage device connected to the television that stores multimedia summaries of a plurality of television programs, including the channel and time of display of the program for which it is a summary; the capacity to change channels; and a processor program to sense when the television has been connected to a new channel and to select and display on that television the multimedia summary of the program being presented on the new channel at the time of the connection of the television to the new channel. | 06-16-2011 |
20110138229 | Automated Testing of Software with Targeting of Deep Paths - A method is provided for generating a test case for testing a program, which can include analyzing instructions of the program to identify basic blocks and superblocks, each basic block containing at least one executable instruction, and each superblock containing a plurality of basic blocks. The method can include executing instructions by a processor to perform determining respective weights of superblocks, each weight representing a number of basic blocks which require execution when the superblock is executed; determining the constraints which cause a superblock having a high weight to be executed, and using the determined constraints to generate a test case which, upon execution of the program, causes the high weight superblock to be executed. | 06-09-2011 |
20110135299 | DIFFERENTIAL EYE DIAGRAMS - Changes in a signal are detected. The signal is repeatedly sampled in a synchronous manner during a predetermined interval to generate a captured eye diagram. At least one of a positive differential eye diagram or a negative differential eye diagram is generated from the captured eye diagram and a baseline eye diagram. The at least one positive or negative differential eye diagram is analyzed to determine whether a change in signal conditions is present. | 06-09-2011 |
20110134762 | Adaptation Protocols for Local Peer Group (LPG) Networks in Dynamic Roadway Environments - A method and system for determining a size of a local peer group (LPG) network in a dynamic roadway (mobile) environment is provided. In one embodiment, the method comprises measuring a roundtrip time between a first node and a second node, and utilizing the measured roundtrip time to select the size of the local peer group network from a lookup table. In another embodiment, the method comprises determining when the roundtrip time exceeds a time interval of the heartbeat signal, and when the roundtrip time exceeds the time interval of the heartbeat signal adjusting the size of the local peer group network. | 06-09-2011 |
20110131411 | Secure content based routing in mobile ad hoc networks - The present invention describes methods and systems for information dissemination in mobile ad hoc networks founded on Content Based Routing. The method comprises generating a first data packet at a source node, encoding, via an encoding logic within the source node, a plurality of information categories associated with the first data packet in a header of the first data packet, encrypting the first data packet with an encryption key unique to the plurality of information categories, generating a second data packet having a unique dissemination group identity in its header and the encrypted first data packet as a payload of the second data packet, disseminating the second data packet across a dissemination mesh, and receiving the second data packet at a destination node. The system comprises a host within the source node that generates a first data packet comprising a first packet header and the content within a first payload of the first data packet, an identity generator within the source node to receive the first data packet and to generate a dissemination group identity for a dissemination group, an encoding unit to encode within the first packet header a plurality of information categories associated with the content, an encryption unit for encrypting the first data packet with an encryption key unique to the dissemination group identity, such that a second data packet is formed, the second data packet having in a second header the dissemination group identity and in a second payload the encrypted first data packet, and a routing unit to disseminate the second data packet to the dissemination mesh. | 06-02-2011 |
20110131222 | PRIVACY ARCHITECTURE FOR DISTRIBUTED DATA MINING BASED ON ZERO-KNOWLEDGE COLLECTIONS OF DATABASES - A system and method for privacy-preserving distributed data mining are presented. The system comprises clients, servers, and a distributed database comprising databases each residing on a server, wherein original data in each database is changed into masked data using a masking function based on a query template generated by one or more clients, and in response to a query obtained from a client as an instantiation of the query template, the masked data is retrieved and the query result on the original data is obtained using a reconstruction function. The query result can be displayed on a computer. The query template and the query can be functions or protocols among clients. The retrieved masked data and the reconstruction function can compute an accurate query result on the original data without revealing additional information in the database having some original data that generates said query result. | 06-02-2011 |
20110129222 | SYSTEM AND METHOD FOR OPTICAL BYPASS ROUTING AND SWITCHING - Optical bypass circuits are selected and created with a desired amount of traffic on each circuit to offload from the IP routers, the maximum possible amount of traffic. In a first phase, each node in a network independently determines the maximum number of optical bypass circuits, configured to their maximum capacity, to as many destinations, that could possibly originate at that node. The determination is made by aggregating traffic from a given traffic matrix. The optical bypass circuit transports traffic that originates at the node plus transient traffic that the node receives from other nodes. In the second phase, the node will eliminate an optical bypass circuit found in the first phase if any of its parent nodes created a necessarily longer optical bypass circuit to the same destination. In addition, if a descendent node has more aggregate traffic to fill more bypass circuits than the parent node, then the extra optical bypass circuits from the descendent node are also created. | 06-02-2011 |
20110125844 | MOBILE ENABLED SOCIAL NETWORKING APPLICATION TO SUPPORT CLOSED, MODERATED GROUP INTERACTIONS FOR PURPOSE OF FACILITATING THERAPEUTIC CARE - A computer readable medium stores a program executable on a computing device, the program comprising data and instructions for providing an interface for users to create and display a user profile and enabling the users to safely and securely transmit and receive communications and other data to and from other individuals in the network for the purposes of communication to enhance the social resources of users under medical care. Moreover, the system provides a means for data from the user's devices and other connected devices to be collected, combined with the communication data and analyzed for medical purposes. Moreover, the program provides for storing at a storage unit a first set of predefined criteria for indicating medical need, and analyzing the data transmitted by a device at a processor in comparison to the first set of predefined criteria to determine if the user exhibits medical need. Accordingly, information may be transmitted to the users, or to other users, including medical care givers, based on the analysis. Such medical care givers may interact with users exhibiting medical need and transmit a variety of educational and training material for purposes of medical treatment. | 05-26-2011 |
20110119661 | Automated Determination of Quasi-Identifiers Using Program Analysis - A system and method for automated determination of quasi-identifiers for sensitive data fields in a dataset are provided. In one aspect, the system and method identifies quasi-identifier fields in the dataset based upon a static analysis of program statements in a computer program having access to—sensitive data fields in the dataset. In another aspect, the system and method identifies quasi-identifier fields based upon a dynamic analysis of program statements in a computer program having access to—sensitive data fields in the dataset. Once such quasi-identifiers have been identified, the data stored in such fields may be anonymized using techniques such as k-anonymity. As a result, the data in the anonymized quasi-identifiers fields cannot be used to infer a value stored in a sensitive data field in the dataset. | 05-19-2011 |
20110110223 | SELF ORGANIZING IP MULTIMEDIA SUBSYSTEM - A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network. | 05-12-2011 |
20110090540 | SYSTEM AND METHOD FOR MULTI-RESOLUTION INFORMATION FILTERING - A method for ranking a plurality of documents relevant to a user profile comprises determining a high resolution representation for the user profile, computing a high resolution representation for each document, calculating a rank for each document based on the high resolution representation of the document and the high resolution representation of the user profile, recalculating the rank for each document based on a lower resolution representation of the document and/or a lower resolution representation of the user profile when the rank of each document is not satisfactory, and outputting a number of the plurality of documents sorted by the rank of each document, when the rank is satisfactory. The high resolution representation can be a discrete wavelet transform. The lower resolution representation can be recalculated by averaging the values of the discrete wavelet transform. Outputting the number of documents can comprise displaying the documents on a device. | 04-21-2011 |
20110085498 | PLMN SELECTION AND INTER-SYSTEM MOBILITY POLICY CONFLICT RESOLUTION FOR MULTI-INTERFACE USER - A mobile device includes: multiple interfaces that are configured to support a various access technology such as 3G or Wi-Fi etc. A public land mobile network (PLMN) selector that generates a list for each of the PLMN networks that provide coverage to the mobile device. A PLMN selection policy parameter that is set to True or False to allow or prohibit the selection of PLMN networks by the mobile device based on the generated list where the generated list includes information as to different access technologies and selection priorities supported on the PLMN access networks providing coverage to the mobile device. In particular, when the PLMN selection policy parameter is set to True, multiple PLMN registrations are allowed; and when the A PLMN selection policy parameter is set to False, multiple PLMN registrations are prohibited. | 04-14-2011 |
20110083168 | Framework of Media-Independent Pre-Authentication - This application describes, among other things, a framework of Media-independent Pre-Authentication (MPA), a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility optimization mechanisms. MPA is a mobile-assisted, secure handover optimization scheme that works over any link-layer and with any mobility management protocol. This application also shows, among other things, an initial implementation of MPA in our testbed and some performance results to show how existing protocols could be leveraged to realize the functionalities of MPA. | 04-07-2011 |
20110083011 | METHOD FOR A PUBLIC-KEY INFRASTRUCTURE FOR VEHICULAR NETWORKS WITH LIMITED NUMBER OF INFRASTRUCTURE SERVERS - A system, and method related thereto, for providing a vehicular communications network public-key infrastructure. The system comprises a plurality of communications infrastructure nodes and a plurality of vehicles each having a communications component. The communications component provides vehicle to vehicle (V2V) communications, and communications via infrastructure nodes. A communications security component in each of the plurality of vehicles provides security for the communications between the plurality of vehicles using a plurality of security modules. The security modules include a certificate management module. A public key interface module may include a public key, a private key, an anonymous key and a management key. The system further includes a detection and response module for attack detection and attack mitigation. The communications security component assigns and installs at least one security key, a certificate of operation, and a current certificate revocation list. The communications component provides secure communications between the plurality of vehicles. | 04-07-2011 |
20110064404 | Network Restoration Under Dual Failures Using Path Protecting Preconfigured Cycles - The design of optical telecommunication networks is such that there is provision of end-to-end path restoration to specified demands under up to two links or nodes failures. Restoration routes are provided on Path Protecting Preconfigured Cycles (PP-PCs), where each demand is assigned one or two restoration routes and restoration wavelengths on a segment of one cycle. Splitting of demand across multiple restoration routes is not allowed. All restoration routes and restoration wavelengths are predetermined where multiple demands may share restoration wavelengths without resorting to intermediate switching or wavelength conversions along restoration routes. First, numerous candidate PP-PCs are generated. Assignment of demands with common failure scenarios are allowed, under certain conditions, to the same PP-PC. Next, a set of PP-PCs is selected from among the candidates, while minimizing total reserved restoration wavelengths cost and ensuring that all demands are protected as required. Finally, conflicts of wavelength assignments are resolved. | 03-17-2011 |
20110044264 | PRE REGISTRATION/PRE AUTHENTICATION IN WIRELESS NETWORKS - A system and method is provided to manage wireless network mobility and wireless network resources. In one aspect of the invention, network equipment acquires samples associated with time that past user devices stayed in the coverage range of the network equipment and estimates a time that a user device currently stays in the cell based on the acquired samples. In another aspect, pre-authentication and pre-registration of the user device in another network are performed based on the estimated time. In yet another aspect, network resources reserved for the user device are released based on the estimated time. | 02-24-2011 |
20110035387 | SYSTEM AND METHOD FOR THE CONTROLLED INTRODUCTION OF NOISE TO INFORMATION FILTERING - A system and method for controlled introduction of noise to information filtering, comprises requesting, directly or indirectly, infatuation by a user having a user profile, obtaining the requested information, generating the noise related to the requested information and the user profile, and presenting the requested information and the noise in an information stream. Generating can further comprise finding aggregate profiles relevant to the user profile, obtaining the noise from non-overlapping parts of the aggregate profiles, and prioritizing the noise based on predefined rules. In one embodiment, each of the aggregate profiles comprises at least one characteristic found in the user profile. The aggregate profiles can be constructed using data mining or data aggregation mechanisms. In one embodiment, the noise is generated using random selection or complex selection algorithms. | 02-10-2011 |
20110035146 | DISTRIBUTED TRAFFIC NAVIGATION USING VEHICULAR COMMUNICATION - A method for distributed traffic navigation in a vehicular network is presented. At each vehicle entering the network, information associated with the vehicular network is acquired and stored, and destination addresses are broadcasted as route requests. At each vehicle in the network, the stored information is updated through vehicle to vehicle communication. At each junction, a header vehicle is selected for listening for broadcasts to determine the presence of a matrix. If the matrix is not present, the matrix is initialized based on the stored information of the header vehicle. The header vehicle further estimates travel time on the road segments based on the matrix, calculates a backlog indicator based on the segment travel time and the route requests. The header vehicle further updates the matrix and generates a route based on the matrix. The matrix is broadcasted from the header vehicle. | 02-10-2011 |
20110026398 | Dynamic Traffic Rearrangement to Enforce Policy Change in MPLS Networks - A system and method of rearranging Label Switched Paths (LSPs) and rerouting traffic in a DiffServ-enabled Multi-Protocol Label Switched (MPLS) network is disclosed. The system periodically monitors network performance, and rearranges LSPs and reroutes traffic through existing or new Label Switched Paths (LSPs) based on network performance and network bandwidth utilized by various DiffServ classes. | 02-03-2011 |
20110019672 | SYSTEM AND METHOD FOR ASSIGNING INFORMATION CATEGORIES TO MULTICAST GROUPS - A system and method for determining an efficient assignment of information categories to multicast addresses is described. In one embodiment, the assignment takes into account the overlapping info cation needs of the subscriber nodes and the network bandwidth that will be consumed in the dissemination of each information category based on its size and the frequency of dissemination. In another embodiment, the assignment takes into consideration the additional constraint of a quality of service network having different prioritizations associated with the information categories. | 01-27-2011 |
20110016161 | SYSTEM AND METHOD FOR THE SELECTION OF CONTEXT SENSITIVE USER PROFILE FRAGMENTS - A method and system for collecting and generating context sensitive data for consumer profiles and presenting a contemporaneous context sensitive model of consumer preferences to a user. An interpreter module obtains event data of a user's activity and obtains personal user data. The interpreter module associates the event data with context information using predetermined context parameters and selects profile fragments corresponding to the context information. An assembly module generates a composite profile from the profile fragments, and a personalization module prepares a model of the user's composite profile which can be displayed. | 01-20-2011 |
20110015969 | SYSTEM AND METHOD FOR COLLECTING CONSUMER INFORMATION PREFERENCES AND USAGE BEHAVIORS IN WELL-DEFINED LIFE CONTEXTS - A system and method for collecting consumer information includes a data storage device included in a computer system. A data interface for use by a user offers services from a service provider. The services are selectable by the user. Event data of the user's activity is collected using the data interface. Timeline data is collected during the user's activity from the service provider. Also, personal user data is collected and the personal user data is anonymized. The event data, the timeline data, and the anonymized personal user data are correlated. A model of the user's preferences is prepared and displayed. | 01-20-2011 |
20110012798 | SYSTEM AND METHOD FOR IMPROVING MIMO PERFORMANCE OF VEHICULAR BASED WIRELESS COMMUNICATIONS - A system for use with vehicle-based wireless multiple-input multiple-output (MIMO) communications equipment has several directional sub-arrays mounted on different faces of the vehicle. It is contemplated in typical operation that each sub-array will experience different channel conditions that can be evaluated with the help of pilot tones or training sequences transmitted from a remote communications device. Based on channel rank, or other appropriate metric, the system selects the sub-array with the best predicted performance for communication with the remote device. The system achieves better MIMO performance while contributing less interference to other nearby co-channel users and allows full use of the limited number of MIMO antenna elements supported by conventional 4G wireless standards. | 01-20-2011 |
20110010446 | Program and Method for Adaptively Maintaining a Local Peer Group in a Dynamic Environment - A method for maintaining a local peer group (LPG) for supporting communications among vehicles. The LPG is formed from a plurality of vehicles. Each vehicle is equipped with a wireless communications device. One of the vehicles is selected as a group header node (GH). The method comprises receiving periodically a heartbeat packet from the GH, the heartbeat packet including a maximum hop count, and a heartbeat cycle, forwarding the heartbeat packet until the maximum hop count is reached after waiting for a first random relay delay, which is less than a maximum allowable adjustable value, replying to the heartbeat packet with a membership report packet, forwarding a membership report packet towards the GH, and adding a vehicle that submitted the membership report packet to a LPG membership as a member node of the LPG if the membership report packet is new or updating information for a member node. | 01-13-2011 |
20110006913 | Program and Method for Adaptive Mobile Ad-Hoc Wireless Communication - A method of controlling a wireless communication device that is installed in a moving vehicle. The method comprises receiving roadway topology information and vehicle traffic pattern information, receiving vehicle and wireless communication device performance information from a plurality of other moving vehicles, determining current position information for the moving vehicle; determining a first set of metrics for a performance of the wireless communication device installed in the moving vehicle, estimating at least one second metric related to the performance of the wireless communication device or an ad-hoc network which includes each wireless communication device and changing an operation or routing parameter for the wireless communication device based upon the estimation. The second metric is based upon at least a sub-set of the first set of metrics, the received information and the determined current position information for the moving vehicle. | 01-13-2011 |
20100327147 | Optical Filter Control - A system and method for controlling an optical filter is provided. The system and method includes dithering a delay of an optical path within an optical filter unit cell, measuring a position of a filter zero, measuring a position of a filter pole, or measuring positions of both a filter zero and a filter pole by observing an output of the unit cell when the delay is dithered, and using the measurement as feedback for maintaining the position of the filter zero at a desired position, maintaining the position of the filter pole at a desired position, or maintaining the positions of both the filter zero and the filter pole at desired positions. | 12-30-2010 |
20100309823 | FULL-DUPLEX WIRELESS COMMUNICATION USING A SINGLE TRANSMITTER - A system for fall-duplex communication using a single transmitter is presented. The system comprises a base station with a signal and data processor, peripheral detectors each placed at a distance from the transmitting antenna, and a mobile device having at least a dipole antenna having a switch and a loop antenna having a switch, wherein the sending device modulates the shorting state, i.e., the electromagnetic configuration, of the wire and coil antennas using the switches, the modulating resulting in alteration in load at the base station. This alteration can be calculated based on input from the transmitting antenna and the detectors, each input having time coding. The input from the transmitting antenna can be magnitude of propagated signal and the input from each detector can comprise a quantified signal level and the quantified signal level time-delayed by propagation time. The detectors can be peripheral signal level detecting antennas. | 12-09-2010 |
20100293289 | PEER-TO-PEER MOBILITY MANAGEMENT IN HETEROGENEOUS IPV4 NETWORKSAPP 1784n - Peer-to-peer mobility management in heterogeneous IP networks provides a peer-to-peer mobility module operable to intercept a data packet received at a communication protocol layer of an Internet Protocol communication stack. A translation table may be stored on memory device. The translation table stores real address of one or more network interfaces and a corresponding virtual address. The peer-to-peer mobility module may be further operable to modify the intercepted data packet using the real address and virtual address stored on the translation table. | 11-18-2010 |
20100293183 | CONVERGED PERSONAL AREA NETWORK SERVICE METHOD AND SYSTEM - A converged personal area network service system uses information provided by personal network elements (PNEs) to generate an event report file to store along with a data file to commemorate an event. When the data file is created, such as taking a picture, an event recording device sends requests to PNEs, sensors and other devices within the network to provide information corresponding to a timestamp based on the event. The information, if available, is sent to the event recording device, where it is aggregated. The event recording device generates an event report file that includes fields storing the information pertaining to the data file. The event report file is stored along with the data file for retrieval or use at a later time. | 11-18-2010 |
20100281519 | PROACTIVE AUTHENTICATION - A system for proactively authenticating includes a server having media independent access functions including media independent authentication functions that authenticates other entities attached via an interface to an end of a link specific to a media. A plurality of heterogeneous networks each having media specific access functions including authentication functions corresponding to the other entities attached via the interface to the end of the link specific to the media and mobile devices connected to the plurality of heterogeneous networks, and the server having predefined media independent handover protocols and media independent handover identities based on the media independent functions related to handover, in which the server authenticates candidate access networks prior to the handover of the mobile devices from serving access networks to the candidate access networks each of which belonging to the plurality of heterogeneous access networks having the link specific to the media. | 11-04-2010 |
20100281249 | MEDIA INDEPENDENT HANDOVER PROTOCOL SECURITY - An apparatus for providing security to media independent handover service includes a point of service for providing the media independent handover services including an independent authenticator. The independent authenticator authenticates candidate access networks prior to the handover of the mobile devices from serving access networks to the candidate access networks, where each of the serving access networks and the candidate access networks belong to a plurality of heterogeneous access networks having the specific serving media. An access controller applies an access control through an access authentication with the point of service providing the media independent handover services through an authentication server, in which when the access authentication is established between the point of service and the authentication server, the mobile devices are authorized to access the media independent handover services through the point of service for the mobile devices attached between heterogeneous media. | 11-04-2010 |
20100272444 | Code Grouping for Optical Networks - The invention is directed to code labeling in an optical network. The network includes a transmitting station operable to transmit an optical signal. The network also includes an encoder coupled to the transmitting station operable to label the optical signal composed of a group of codes. A receiving station operable to receive the labeled group of optical codes is also provided. The receiving station is operable to read the optical signal if the label of the received group of codes corresponds to the group of codes assigned to the receiving station. | 10-28-2010 |
20100265836 | Self-Correcting Adaptive Tracking System (SATS) - A system and method for self and group location and tracking based on ultra wide band ranging among members of the group is presented. The system comprises an anchored station, a plurality of nodes, each node having at least knowledge of where the node is facing and heading, knowledge of all pair wise distances among all of the plurality of nodes, and ability to exchange information among the nodes and with the anchored station via relays. The system and method find a new position estimate of the group in accordance with an adaptive search process based on constraints of the ultra wide band ranging, and the search process enables extracting directional information and adaptively stabilizing orientation of the group. In one embodiment, adaptively stabilizing the orientation of the group is performed using an orientation-correcting polygon matching process. | 10-21-2010 |
20100254350 | Fast Handoff Using GPS Technology for Mobile Telematics - The present invention relates to the reduction of handoff delays for mobile telematics applications. In particular, the present invention provides a method employing GPS technology to define IP addresses in a mobile environment in order to reduce delays and transient data loss caused by handoff from one network to another. | 10-07-2010 |
20100233999 | SYSTEM AND METHOD FOR PRIVACY-ENABLED MOBILE LOCATOR SERVICES WITH DYNAMIC ENCOUNTER HORIZON - A method and system for managing awareness information relating to a mobile device's visibility with respect to other buddy devices, the system comprising; the mobile device, a mobile application listing one or more buddies, an application listener which tracks the one or more buddies zoom operations and radar zoom factors, and a server, the server comprising an encounter manager, an approach manager and a notification marshalling system. | 09-16-2010 |
20100232608 | OCDM-BASED PHOTONIC ENCRYPTION SYSTEM WITH PROVABLE SECURITY - In an OCDM-based photonic encryption system by applying random noise on unused channels and varying the inter-code phases on realistic framing repetition, an OCDM-based encryption system with provable security guarantees results. | 09-16-2010 |
20100232404 | SCALABLE DISRUPTIVE-RESISTANT COMMUNICATION METHOD - A method for transmitting data in vehicular network comprising determining a communication window between at least two nodes, grouping a plurality of fragments of content together into an aggregate fragment block, forwarding the aggregate fragment block to a target node and assembling the plurality of fragments into the content. The content is divided into the plurality of fragments. A fragment signature is generated for the fragments that contain fragment index information regarding each fragment. Each fragment is unambiguously identified by its signature. A number of fragments grouped into the aggregate fragment block is dependent on the communication window. | 09-16-2010 |
20100229121 | SYSTEM AND METHOD FOR CAPTURING, AGGREGATING AND PRESENTING ATTENTION HOTSPOTS IN SHARED MEDIA - A method and system for providing an attention hotspot in temporal media is provided and executes following explicit or implicit user actions. The method comprises identifying at least one event related to playback or browsing of the temporal media, deriving the significance of the identified event in accordance with one or more rules, assigning a signifier based on the derived significance of the event, and associating the signifier with a specific segment of the temporal media and user. The system comprises a server and a mobile device, wherein the server is operable to identify at least one event related to playback of the temporal media, derive the significance of the identified event in accordance with one or more rules, select a signifier based on the derived significance of the event, and associate the signifier with a specific segment of the temporal media. The server aggregates and averages the cumulative attention hotspots of a greater community for the purposes of improving user experience. The server provides the signifier(s) to the mobile device. A computer program product embodying the method is also disclosed. | 09-09-2010 |
20100225450 | DELIVERING MEDIA AS COMPENSATION FOR COGNITIVE DEFICITS USING LABELED OBJECTS IN SURROUNDINGS - A computer implemented method and system for assisting a person with completion of a task. The method comprises recognizing one or more objects in an environment associated with said task; presenting media that demonstrates a use of the one or more objects associated with said task to the person; and interacting with the person throughout said task to measure progress towards the completion of the task. The system comprises a processor; a knowledge base operable to store state information, rules, attributes and associations, associated with an environment, objects associated with the environment, and one or more users; a server module operable to recognize one or more objects in an environment associated with said task, present media that demonstrates a use of the one or more objects associated with said task to the person, and interact with the person throughout said task to measure progress towards the completion of the task. | 09-09-2010 |
20100221009 | Phase Chip Frequency-Bins Optical Code Division Multiple Access - Apparatus and system for transmitting and receiving optical code division multiple access data over an optical network. The apparatus comprises a spectral phase decoder for decoding the encoded optical signal to produce a decoded signal, a time gate for temporally extracting a user signal from the decoded signal, and a demodulator that is operable to extract user data from the user signal. The system preferably comprises a source for generating a sequence of optical pulses, each optical pulse comprising a plurality of spectral lines uniformly spaced in frequency so as to define a frequency bin, a data modulator associated with a subscriber and operable to modulate the sequence of pulses using subscriber data to produce a modulated data signals and a Hadamard encoder associated with the data modulator and operable to spectrally encode the modulated data signal to produce an encoded data signal. | 09-02-2010 |
20100217860 | SYSTEMS AND METHODS FOR SINGLE SESSION MANAGEMENT IN LOAD BALANCED APPLICATION SERVER CLUSTERS - Aspects of the invention pertain to user session management in load balanced clusters. Multiple application servers communicate with a central data server to ensure there is a single session per user ID. The central data server maintains a user session index and a parameter table. Each time a network access is attempted using a given user ID, a load balancer assigns the session to one of the application servers. The assigned application server queries the central data server to determine whether a session status for the user's login ID is inactive or active. If inactive, a new, unique value is assigned as the session number. If active, the session number is evaluated to determine whether multiple sessions exist. In this case, one of the sessions is terminated to ensure a single session per user ID. Preferably, the terminated session is the earlier session. | 08-26-2010 |
20100217853 | SYSTEM AND METHOD FOR POLICY BASED MANAGEMENT FOR A HIGH SECURITY MANET - A system and method for policy based management for a high security MANET comprises policy managers, each performing policy decision-making and policy enforcement using multiple policies, containers, each related to an application and each container having one policy manager, nodes, each having an infrastructure and at least one container, and dynamic community building blocks associating the containers having a same application, the containers being in different nodes, the associated containers maintained by the dynamic community building blocks on a secure network. Each container can define a security boundary around the node. Each container can be a lightweight virtual machine. The system can also have a special container having a policy manager only evaluating policies for conflicts. In one embodiment, a node can consist of multiple network devices and each network device is a container of its own. | 08-26-2010 |
20100211430 | MONITORING OF VEHICLE CONDITIONS UTILIZING CELLULAR BROADCASTS - This document describes, among other things, a systems and methods for monitoring vehicle conditions via cellular networks. | 08-19-2010 |
20100209099 | Network Restoration Under Link or Node Failure Using Preconfigured Virtual Cycles - The design of telecommunication networks is such that there is provision of end-to-end path protection to multiple demands under a single link or node failure in the networks. Restoration routes are provided on Preconfigured Virtual Cycles (PVC's), where each demand is assigned one restoration route and specific restoration wavelengths on a segment of one cycle. Multiple demands may share restoration wavelengths, and the number of restoration wavelengths may vary among the PVC links. First, a plurality of candidate PVC's are generated where each demand may be assigned to multiple candidates. Assignment of demands with common failure scenarios are allowed, under certain conditions, to the same PVC. Next, a set of PVC's is selected from among the candidates, while minimizing total reserved restoration capacity and ensuring that all demands are protected. Next duplicate assignments are eliminated. Finally, conflicts of wavelength assignments are resolved. The invention focuses primarily on optical networks. | 08-19-2010 |
20100208613 | EFFICIENT AND LOSS TOLERANT METHOD AND MECHANISM FOR MEASURING AVAILABLE BANDWIDTH - A single burst method is used to determine the available bandwidth in a network environment. A sending node transmits test packets to a receiving node. The size of the test packets is dynamically determining based on network parameters within the network environment. The sending node then receives test receipt packets that have the same sequence numbers as the corresponding test packets. Packet clusters are formed from the test receipt packets. The available bandwidth is determined based on the packet clusters along with values set by the single burst method or inputted by a user. | 08-19-2010 |
20100199346 | SYSTEM AND METHOD FOR DETERMINING SYMANTIC EQUIVALENCE BETWEEN ACCESS CONTROL LISTS - Aspects of the invention pertain to analyzing and modifying access control lists that are used in computer networks. Access control lists may have many individual rules that indicate whether information can be passed between certain devices in a computer network. The access control lists may include redundant or conflicting rules. An aspect of the invention determines whether two or more access control lists are equivalent or not. Order-dependent access control lists are converted into order-independent access control lists, which enable checking of semantic equivalence of different access control lists. Upon conversion to an order-independent access control list, lower-precedence rules in the order-free list are checked for overlap with a current higher precedence entry. If overlap exists, existing order-free rules are modified so that spinoff rules have no overlap with the current entry. This is done while maintaining semantic equivalence. | 08-05-2010 |
20100199344 | REDUNDANCY DETECTION AND RESOLUTION AND PARTIAL ORDER DEPENDENCY QUANTIFICATION IN ACCESS CONTROL LISTS - Aspects of the invention pertain to analyzing and modifying access control lists that are used in computer networks. Access control lists may have many individual entries that indicate whether information can be passed between certain devices in a computer network. The access control lists may include redundant or conflicting entries. An aspect of the invention converts an order-dependent control list into an order-free equivalent. Redundant entries are identified and removed without adversely affecting the access control list. Redundancy may be identified by evaluating the volume contraction ratio, which is the ratio of the volume of spin-off entries to specific original entry in the access control list. This ratio reflects the extent of order-dependent impact on that entry in a given access control list. | 08-05-2010 |
20100189078 | SEAMLESS MOBILITY FOR A MULTIPLE INTERFACE DEVICE IN A CO-LOCATED WIRELESS ENVIRONMENT - Data packets are transmitted from a first access network to a first interface of a multiple interface device (MID), and identical data packets are transmitted concurrently from a second access network to a second interface of the MID. Some of the data packets that are transmitted to the MID from the first access network are not received by the first interface. The MID inspects identifiers of data packets from the first and second interfaces in order to send to the application a stream including all of the data packets. For example, the MID sends to the application the data packets from the first interface, buffers the data packets from the second interface, and sends data packets from the buffer to the application upon detecting that data packets in the buffer were transmitted to the first interface but not received by the first interface. | 07-29-2010 |
20100183309 | System and Method for OCDM-Based Photonic Layer Security Robustness to Archival Attack - A system and method for transporting encrypted data having a transmitter and a receiver is provided. The transmitter generates a sequence of optical pulses, which are copied and output as identical channels. The identical channels are modulated by a plurality of modulators using data to generate a modulated data signal. Respective spectral phase encoders coupled to each of the plurality of data modulators encode respective modulated data signals using a plurality of mutually orthogonal phase codes that are individually associated with the respective spectral phase encoder. These encoded data signals are combined and code-scrambling by a spectral phase scrambler t using a scramble code as an encryption key to generate an encrypted signal. A receiver reverses the encryption to extract the data. | 07-22-2010 |
20100180116 | INTRUSION-TOLERANT GROUP MANAGEMENT FOR MOBILE AD-HOC NETWORKS - An inventive system and method for intrusion-tolerant group management for a network is presented. The method comprises a client broadcasting a message request to controllers and validating the rekey messages received from the controllers, and controllers validating the client's broadcast message request and broadcasting proposals, collecting proposals, constructing threshold-signed proofs, updating the view umber, performing the client's message request, generating the rekey based on the valid proposals and transmitting the rekey to the client. Simultaneously, controllers send reconciliation messages to all controllers, based on which the membership state is updated. The client updates a shared key when a predetermined number of valid rekey messages are received. The controllers can communicate via a byzantine fault-tolerant agreement. The client can use its public key to decrypt the rekey and perform validation. The client's message request can be a join or a leave. | 07-15-2010 |
20100175112 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCTS FOR ENABLING TRUSTED ACCESS TO INFORMATION IN A DIVERSE SERVICE ENVIRONMENT - A system, method, and computer program product for enabling mediated access to information controlled by one or more information repositories by one or more application service providers. The information controlled by the one or more information repositories is associated with one or more subscribers of information-based services offered by the one or more application service providers. | 07-08-2010 |
20100165947 | Network Discovery Mechanisms - In some of the preferred embodiments, a method for network discovery of a mobile device to use at least one of a plurality of access networks within an IP network includes: obtaining specified network information in the vicinity of a given location based on a set of criteria when a mobile is connected to the IP network from any location. | 07-01-2010 |
20100142465 | CHANNEL PARTITIONING FOR WIRELESS LOCAL AREA NETWORKS - The present application discloses, inter alia, a system for improving the aggregate throughput of a wireless local area network which includes: at least one access point that is equipped with at least one transceiver configured to simultaneously transmit and receive at multiple frequencies using multiple channels; and the access point being configured to acquire channel conditions of users and to pool sets of users on the channels based on the channel conditions. | 06-10-2010 |
20100115341 | COMPUTING DIAGNOSTIC EXPLANATIONS OF NETWORK FAULTS FROM MONITORING DATA - A system and method for network fault diagnosis in a network having network elements is presented. The method comprises creating a network causality model, generating Boolean expressions from the network causality model, converting the Boolean expressions into SAT sets, receiving network monitoring results, correlating these monitoring results with the SAT sets, and enumerating all possible diagnostic explanations of potential faults, properly annotated. Creating a network causality model can comprise creating, for each network element, an element-specific causality model, stitching together all network elements using the element-specific causality models and a network topology, retrieving monitoring state and propagation information, and generating the network causality model using the stitched together network elements and the monitoring state and propagation information. Stitching together network elements can comprise adding causes and implies dependency between appropriate network elements and/or adding and connecting reachable and not-reachable states. The network causality model can comprise network element states. | 05-06-2010 |
20100115083 | NETWORK SELECTION MECHANISM - A terminal device includes multiple interfaces having links to various networks. When a trigger event occurs, the terminal device selects a target link to a network to transition from its current link. A candidate link selection function determines candidate links that are filtered to remove links not meeting connectivity criteria. A target link selection function is then executed to select a target link from the filtered candidate links. Thus, the target link selection function is not run for every possible link, but only those meeting the criteria. | 05-06-2010 |
20100111545 | MULTISCALE SAMPLING FOR WIDE DYNAMIC RANGE ELECTRO-OPTIC RECEIVERS - A method for multiscale sampling for wide dynamic range electro-optic receivers is presented. The method comprises obtaining a signal, reproducing the signal into first and second signals, scaling one signal with respect to the other, modulating both signals with the same modulation function, and utilizing the resulting vector response function to invert the response of the link over a greater dynamic range than would otherwise be possible with a single instance of the modulated signal. The sealed modulation response may be obtained by splitting the signal into two polarizations and utilizing a modulator having different response for the two polarizations, or by utilizing two modulators. | 05-06-2010 |
20100110921 | PRE-EVALUATION OF MULTIPLE NETWORK ACCESS POINTS - The present application describes, inter alia, novel techniques to perform pre-evaluations of multiple Wi-Fi Access Points (AP) and Access Networks (AN). A pre-evaluation determines whether or not an AP is connected to the Internet and measures the path performance that the AN, via that particular AP, can offer between the mobile device and a pre-specified Internet host. In addition, the invention also discloses methods to determine whether the AN requires a user to actively authenticate themselves through a redirect log-on page. | 05-06-2010 |
20100097956 | MULTI-INTERFACE MANAGEMENT CONFIGURATION METHOD AND GRAPHICAL USER INTERFACE FOR CONNECTION MANAGER - A terminal device includes interfaces that establish links to networks. The networks can be wired, wireless, and the like. The terminal device includes a connection manager that manages the network connections based on configured parameters. Based on the configuration parameters it may compare network performance of different links in the device and it may switch or connect to a link having the best connectivity. Parameters are set to configure the connection manager and how it operates. The parameters can be set via a graphical user interface by the user or alternatively by the operator administrator. | 04-22-2010 |
20100091990 | OCDM-BASED ALL OPTICAL MULTI-LEVEL SECURITY - A high data rate optical signal is inverse multiplexed into a multitude of lower-rate tributaries, each of which is coded by its unique OCDM code, and the combined coded tributaries are injected into a common phase scrambler. Coherent summation of these optically encoded tributaries pass through a shared phase or phase and frequency scrambler before exiting the secure location. The setting of the scrambler acts as the key. The authorized recipient with the correct key retrieves the ones and zeros of the several decoded signals. | 04-15-2010 |
20100090841 | ENVIRONMENTAL MONITORING USING MOBILE DEVICES AND NETWORK INFORMATION SERVER - Sensors mounted on vehicles (e.g., buses, taxis, police cars) and public personnel (e.g., policemen) are used to monitor various conditions and situations such as air quality, potential biological and chemical attacks, and road and traffic conditions. The invention improves upon the typical approach that deploys fixed sensors at every geographical position of interest. The total number of required sensors and the size and the complexity of the network infrastructure required to connect the sensors are reduced and simplified. A method for estimating the number of mobile sensors required to cover a region of interest also is disclosed. A relatively small number of mobile sensors may be sufficient to cover a large area at a lower cost and less complexity than a fixed sensor network. | 04-15-2010 |
20100083121 | SYSTEM AND METHOD FOR EVALUATING MULTIPLE CONNECTIVITY OPTIONS - This present application relates to, among other things, novel techniques to evaluate and qualify multiple networking options. A device contains multiple network connectivity options, including but not limited to various wireless and wired technologies such as Wi-Fi, 3G, WiMAX, LTE, Ethernet, Bluetooth, UWB, WHDMI, etc. Each connectivity option can be evaluation and pre-qualified prior to the user selecting that mode of communication. This evaluation process takes into account both lower-layer information such as signal strength, bit error rates, SNR, interference, etc. but also network-layer information such as IP connectivity, and end-to-end path performance. | 04-01-2010 |
20100074623 | THREE-WAY HANDSHAKE (3WHS) OPTICAL NETWORK SIGNALING PROTOCOL - A method for optical network signaling processing of a signal from a first node to an end node through intermediate nodes is presented. The method comprises determining, in a first pass from the first node to the end node, available wavelengths and wavelength conversion at each node, the end node optimizing wavelengths using the available wavelengths and wavelength conversions, at each node, dropping a cross-connect command, in a second pass from the end node to the first node, choosing wavelengths for connection based on the optimizing step, in a third pass from the first node to the end node, receiving at each node a signal message and releasing unused cross-connect commands, the end node identifying the chosen wavelengths and releasing the unused resources, and transmitting the signal on the chosen wavelengths. Restoration paths can also be determined. Optimizing can include selecting and marking one or more backup wavelengths. | 03-25-2010 |
20100074444 | Method and System for OCDM-Based Photonic Layer Security Robustness to Spoof Data Integrity - A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encoded data signal over a network; descrambling the scrambled encoded data signal using a descramble code corresponding to a compliment of the dynamically changing scramble code; analyzing the descrambled encoded data signal to search for a region of low error between descrambled data and noise; notifying of a possible spoofing attempt when a region of low error is not found; and decoding the descrambled encoded data signal using a compliment of phase codes originally used for encoding the encoded data signal in order to generate a decoded signal to retrieve a desired data signal when a region of low error is found. | 03-25-2010 |
20100074114 | Achieving High-Rate Multi-Hop Data Delivery in Vehicular Networks - A method for high rate data delivery in a multi-hop vehicular network comprises at each source vehicle, initiating a packet having a flow tag, assigning an identifier of the content and the current location to the flow tag, and forwarding the packet; at each destination vehicle, setting a flow request and broadcasting at the current intersection; further on movement, setting the flow request at the new intersection, and at each intersection, selecting a header vehicle at the intersection, computing backlog and congestion indicators and listening for broadcasts with a matrix and the flow requests at the header vehicle, determining if the matrix is present, updating the matrix in accordance with the backlog and congestion indicators if the matrix is present, initializing the matrix and estimating the delay on the outgoing road segments if the matrix is not present, forwarding the packet flow, and broadcasting the matrix from the header vehicle. | 03-25-2010 |
20100067922 | Variable Spectral Phase Encoder/Decoder Based on Decomposition of Hadamard Codes - The invention is directed toward a variable spectral phase encoder. The variable spectral phase encoder includes a plurality of switches and at least one encoder. The encoder is coupled between a first switch and second switch among the plurality of switches. The first switch selectively routes an optical signal to some combination of fixed encoders such that their collective product applies one of the Hadamard sequences to the optical signal. | 03-18-2010 |
20100050093 | Collaborative Panel Adminstrator - A collaborative panel administrator provides virtual panel lifecycle management to a wide variety of data acquisition and analysis services. Broadly, it supports three types of functionalities—it provides panel lifecycle management functions; it acts as a service plug-in registry allowing various data acquisition and analysis services to register with it and extend its functionality; and, it acts as a client for the registered analysis services by invoking them on user requests and then storing and distributing the results according to panel security policies. | 02-25-2010 |
20100042605 | VERSIONING RELATIONAL DATABASE DISJOINT RECORDS - An inventive system and method for versioning relational database disjoint records comprises a relational database, configuration files translated into query files, and a version control system, wherein each query file is stored and checked into the version control system, updating a version number of the query file. Each query file comprises a set of query statements. Query files are retrieved from the version control system based on the version number or an independent data item, and put into the database for analysis. In one embodiment, one of the configuration files comprises a configuration of a device, such as a router, a switch, a firewall, or a medical record. The method comprises acquiring configuration files, changing the configuration files into query files and storing the query files, and checking each query file into a version control system, wherein the checking in updates a version number of the query file. | 02-18-2010 |
20100037057 | SYSTEM AND METHOD FOR USING NETWORKED MOBILE DEVICES IN VEHICLES - A system and method for using networked mobile devices in a vehicle in a tightly integrated manner is presented. The vehicle has an OBE, a mobile device client, and vehicle components, and the mobile device has a mobile device proxy and applications, such that the mobile device client and the mobile device proxy communicate, enabling dynamic transfer of the applications to the OBE and execution of the applications on the mobile device and the OBE using the plurality of vehicle components at runtime. In one embodiment, the mobile device client and the mobile device proxy authenticate each other. The authentication can be performed using digital certificates. The mobile device client can communicate the vehicle components on the vehicle to the mobile device proxy. The mobile device client and the mobile device proxy can communicate using Bluetooth. The vehicle components can include dashboard displays, speakers, and voice I/O systems. | 02-11-2010 |
20100036953 | Systems and Methods for QoS Provisioning and Assurance for Point-to-Point SIP Sessions in DiffServ-enabled MPLS Networks - Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe. | 02-11-2010 |
20100031236 | System and Method to Unify Multiple Service Environments to Optimize the Delivery of Telecommunications Services - System and method to unify multiple service environments to optimize the delivery of telecommunications services include a composite service execution environment providing a common platform for executing a plurality of different execution environments. A service creation environment enables creating of service logic from a plurality of pre-defined software components and one or more inter-method communication components operable to handle communications between the plurality of different execution environments. | 02-04-2010 |