14th week of 2019 patent applcation highlights part 52 |
Patent application number | Title | Published |
20190103935 | OPTICAL MULTICAST SWITCH WITH BROADCAST CAPABILITY - An apparatus includes a first input port, a first switch, and a second switch. The first switch and the second input port are in optical communication with the first input port. The apparatus also includes a second input port, a third switch, and a fourth switch. The third switch and the fourth switch are in optical communication with the second input port. Each switch is switchable between a first state to pass optical signals and a second state to block optical signals. The apparatus also includes a first combiner in optical communication with the first input port via the first switch and the second input port via the third switch. The apparatus also includes a second combiner in optical communication with the first input port via the second switch and the second input port via the fourth switch. | 2019-04-04 |
20190103936 | PROCESS OF ASSEMBLING OPTICAL RECEIVER MODULE - A process of assembling an optical receiver module that receives a wavelength multiplexed signal is disclosed. The process includes a step of sequentially mounting a wavelength selective filter (WSF), a prism, a mirror, and first and second optical de-multiplexers (o-DeMuxes) each on the carrier. The WSF transmits a first wavelength multiplexed signal but reflects a second wavelength multiplexed signal. The prism includes first and second surfaces, where the first surface reflects the wavelength multiplexed signal toward the WSF, while the second surface receives a second wavelength multiplexed signal coming from the WSF. The mirror reflects the first wavelength multiplexed signal transmitting through the WSF. The first and second o-DeMuxes de-multiplex the first and second wavelength multiplexed signals. | 2019-04-04 |
20190103937 | OPTICAL MODULES HAVING AN IMPROVED OPTICAL SIGNAL TO NOISE RATIO - Consistent with the present disclosure, a photonic integrated circuit (PIC) is provided that has 2 N channels (N being an integer). The PIC is optically coupled to N optical fibers, such that each of N polarization multiplexed optical signals are transmitted over a respective one of the N optical fibers. In another example, each of the N optical fibers supply a respective one of N polarization multiplexed optical signals to the PIC for coherent detection and processing. A multiplexer and demultiplexer may be omitted from the PIC, such that the optical signals are not combined on the PIC. As a result, the transmitted and received optical signals incur less loss and amplified spontaneous emission (ASE) noise. In addition, optical taps may be more readily employed on the PIC to measure outputs of the lasers, such as widely tunable lasers (WTLs), without crossing waveguides. | 2019-04-04 |
20190103938 | OPTICAL MODULES HAVING AN IMPROVED OPTICAL SIGNAL TO NOISE RATIO - Consistent with the present disclosure, a photonic integrated circuit (PIC) is provided that has 2 N channels (N being an integer). The PIC is optically coupled to N optical fibers, such that each of N polarization multiplexed optical signals are transmitted over a respective one of the N optical fibers. In another example, each of the N optical fibers supply a respective one of N polarization multiplexed optical signals to the PIC for coherent detection and processing. A multiplexer and demultiplexer may be omitted from the PIC, such that the optical signals are not combined on the PIC. As a result, the transmitted and received optical signals incur less loss and amplified spontaneous emission (ASE) noise. In addition, optical taps may be more readily employed on the PIC to measure outputs of the lasers, such as widely tunable lasers (WTLs), without crossing waveguides. | 2019-04-04 |
20190103939 | VIRTUALIZED SECTIONS FOR SECTIONAL CONTROL OF OPTICAL LINKS - Systems and methods are implemented at an Optical Add/Drop Multiplexer (OADM) node using virtual sections to provide sectional control over an optical link over a foreign-controlled optical network. The systems and methods include virtually splitting the optical link at a shelf processor associated with the OADM node; in a non-fault condition, obtaining and storing a power snapshot of the optical link and associated virtual sections thereon, from an optical spectrum monitor; responsive to a fault on one or more virtual sections of the virtual sections, obtaining a current power snapshot of the optical link and the associated virtual sections; and comparing the stored power snapshot and the current power snapshot of the one or more virtual sections and providing a fault alarm for the one or more virtual sections based on the comparing to a control plane for management thereof. | 2019-04-04 |
20190103940 | SECURING BLUETOOTH COMMUNICATIONS USING MULTIPLE ANTENNAS - A method for securing Bluetooth communications. The method includes receiving, by a target wireless device, a security level indication from a source wireless device using one or more receiver antennas of the target wireless device. The method also includes determining, by the target wireless device, a jammer signal power level based on the security level indication and generating, by the target wireless device, the jammer signal based on the jammer signal power level. The method also includes transmitting, by the target wireless device, the jammer signal using one or more transmitter antennas of the target wireless device and receiving at least a portion of a communication from the source wireless device using the one or more receiver antennas of the target wireless device. | 2019-04-04 |
20190103941 | METHOD FOR TRANSMITTING OR RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - According to one embodiment of the present invention, a method of receiving DCI by a UE includes receiving bundling information regarding REGs via higher layer signaling, performing blind detection for a PDCCH in a CORESET configured on a plurality of OFDM symbols, and acquiring DCI from the PDCCH. When the bundling information indicates a first value, the UE may perform bundling such that only REGs locating on a same RB and corresponding to different OFDM symbols in the CORESET, are bundled as 1 REG bundle, and when the bundling information indicates a second value, the UE may perform bundling such that the REGs locating on the same RB and corresponding to the different OFDM symbols are bundled as 1 REG bundle along with REGs locating on different RBs in the CORESET, and the UE may perform the blind detection of the PDCCH by assuming same precoding for REGs belonging to a same REG bundle as a result of REG bundling. | 2019-04-04 |
20190103942 | GRANT-FREE TRANSMISSION METHOD AND APPARATUS - Embodiments of this application provide a grant-free transmission method, a terminal device, and a network device, to improve grant-free transmission reliability. The grant-free transmission method includes: obtaining, by a terminal device, an interleaving pattern based on at least one of a cell identity of the terminal device, a terminal device identifier, time-domain resource information, and frequency-domain resource information; interleaving data based on the obtained interleaving pattern, to obtain interleaved data; and sending the interleaved data. | 2019-04-04 |
20190103943 | UPLINK TRANSMISSION METHOD AND CORRESPONDING EQUIPMENT - A method for an uplink transmission of a user equipment (UE) in a wireless communication system and the UE are provided. The method includes receiving, from a base station (BS), control signaling; grouping physical downlink shared channels (PDSCHs) based on the control signaling; determining a hybrid automatic repeat request acknowledgement/negative acknowledgement (HARQ-ACK/NACK) codebook for each grouping of the PDSCHs; and transmitting HARQ-ACK/NACK information corresponding to the HARQ-ACK/NACK codebook. The UE includes a transceiver configured to receive control signaling from a BS; and a processor configured to: group PDSCHs based on the control signaling; and determine an HARQ-ACK/NACK codebook for each group of PDSCHs, wherein the transceiver is further configured to transmit HARQ-ACK/NACK information corresponding to the HARQ-ACK/NACK codebook. | 2019-04-04 |
20190103944 | HARQ Buffer Size Design For Communication Systems - Techniques and examples of hybrid automatic repeat request (HARQ) buffer size design for communication systems are described. A user equipment (UE) communicates with a serving cell of a wireless network using a HARQ mechanism, with the communicating involving: (a) determining, by the processor, a respective size of each buffer of a plurality of buffers corresponding to a plurality of HARQ processes on a per-HARQ process basis; and (b) storing, by the processor, respective information in each buffer of the plurality of buffers for a corresponding HARQ process among the plurality of HARQ processes. | 2019-04-04 |
20190103945 | Repetition And Hybrid Automatic Repeat Request Process Determination For Grant-Free Transmission In Mobile Communications - Various solutions for repetition and hybrid automatic repeat request (HARQ) process determination for grant-free transmission with respect to user equipment and network apparatus in mobile communications are described. An apparatus may determine a cyclic shifted version of a base sequence. The apparatus may generate a reference signal based on the cyclic shifted version of the base sequence. The apparatus may transmit a data repetition along with the reference signal on a semi-persistent scheduling (SPS) resource to a network node. The reference signal may be used to identify a repetition index of the data repetition. | 2019-04-04 |
20190103946 | TECHNIQUES AND APPARATUSES FOR ULTRA RELIABLE LOW LATENCY HYBRID AUTOMATIC REPEAT REQUEST (HARQ) RETRANSMISSION FOR SEMI-PERSISTENT SCHEDULING (SPS) - Certain aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may receive a configuration for hybrid automatic repeat request (HARQ) retransmissions for semi-persistent scheduling (SPS), wherein the configuration, which is specific to the UE, identifies allocated resources of a physical downlink shared channel (PDSCH) or a physical uplink shared channel (PUSCH) for the HARQ retransmissions; and use the allocated resources identified in the configuration for the HARQ retransmissions. Numerous other aspects are provided. | 2019-04-04 |
20190103947 | APPARATUS AND METHOD OF TRANSMITTING AND RECEIVING HARQ ACK/NACK INFORMATION FOR NEW RADIO - Provided are a method of transmitting and receiving HARQ ACK/NACK feedback information in a next-generation/5G radio access network. The method may include receiving, from a base station, HARQ timing indication information to a plurality of the downlink channels, receiving, from the base station, uplink (UL) control channel resource indication information for HARQ feedback to each DL data channel, and transmitting the HARQ information through one or the plurality of the UL control channels indicated by the UL control channel resource indication information in the same slot when the HARQ timing indication information indicates the same slot. | 2019-04-04 |
20190103948 | APPARATUS AND METHOD FOR MANAGING RADIO RESOURCES IN MOBILE COMMUNICATION SYSTEM - An operation method of a terminal in a mobile communication system includes receiving information indicating a first scheduling region map consisting of a plurality of resource regions from a base station, the information indicating the first scheduling region map including information indicating the plurality of resource regions included in the first scheduling region map; receiving first resource allocation information indicating a first resource region allocated to the terminal among the plurality of resource regions included in the first scheduling region map from the base station; receiving a first reference signal (RS) from the base station through the first resource region; generating first channel state information (CSI) for the first resource region based on the first RS; and transmitting the first CSI to the base station. | 2019-04-04 |
20190103949 | EFFICIENT SRS RESOURCE INDICATION METHODS - A method of identifying reference signal resources to be used in a transmission by a wireless device is disclosed. The method comprises a wireless device receiving signaling configuring the wireless device with a plurality of reference signal resource groups, each group comprising a plurality of reference signal resources. The wireless device subsequently receives an indication, in a control channel, of a selection of reference signal resources to be used. Each of the plurality of reference signal resources to be used is selected from a different one of the plurality of reference signal resource groups such that reference signal resources belonging to the same reference signal resource group are not selected for simultaneous use. A reference signal is then transmitted to a network node in the network using the indicated selection of reference signal resources. | 2019-04-04 |
20190103950 | TECHNIQUES AND APPARATUSES FOR WAKEUP SIGNAL DESIGN AND RESOURCE ALLOCATION - A method, an apparatus, a base station, a user equipment, and a computer program product for wireless communication are provided. The base station may configure resource allocation for wakeup signaling based at least in part on one or more resource patterns corresponding to different user equipment groups and/or antenna port configurations. The user equipment may receive a wakeup signal based at least in part on the resource allocation, detect the wakeup signal based at least in part on a preamble of the wakeup signal, and receive a subsequent communication based at least in part on the wakeup signal. Numerous other aspects are provided. | 2019-04-04 |
20190103951 | METHOD FOR TRANSMITTING AND RECEIVING UPLINK/DOWNLINK DATA IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - Disclosed are a method for transmitting and receiving uplink/downlink data in a wireless communication system, and an apparatus therefor. Specifically, a method for receiving downlink data from multiple transmission points (TPs) by a terminal in a wireless communication system may comprise the steps of: receiving downlink scheduling information from one or more of a first TP and a second TP; receiving first downlink data from the first TP and second downlink data from the second TP, on the basis of the downlink scheduling information; and transmitting, to the first TP and the second TP, a first acknowledgment/non-acknowledgment (ACK/NACK) response to the first downlink data and a second ACK/NACK response to the second downlink data, respectively. | 2019-04-04 |
20190103952 | SYSTEM AND METHOD FOR ADAPTIVE AGGREGATION OF BROADBAND COMMUNICATIONS CHANNELS FOR IN-FLIGHT AIRCRAFT - A method for aggregating usage of broadband communications channels for an in-flight aircraft has been developed. First, wireless communication channel links are established between a network router and passengers on board the in-flight aircraft. Multiple communications channels are bonded together in a group by the router. Threshold parameters for the bonded group are set up based on the bandwidth requirements for priority passengers. These bandwidth requirements for priority passengers are continuously monitored. Communications channels are removed and added from the bonded group as needed to meet the bandwidth requirements for the priority passengers. | 2019-04-04 |
20190103953 | Efficient Bandwidth Adaptation for a Wideband Carrier - Apparatus and methods are provided for efficient bandwidth adaptation for wideband carrier. In one novel aspect, the UE starts a BWP timer upon detecting one or more BWP timer starting triggering events, resets the BWP timer upon detecting BWP resetting triggering events, and switches to the default BWP upon expiration of the BWP timer. The BWP timer starting triggering events comprises decoding a command to switch away from the default BWP, the detection of end of DL data transmission in DRX mode. In another novel aspect, the UE only decodes the DCI indication for active BWP switching in the first three OFDM symbols of a subframe or a slot. In yet another novel aspect, when the SPS is configured for the serving cell for a UE with multiple BWPs, the SPS is configured for all the BWPs accordingly. | 2019-04-04 |
20190103954 | BANDWIDTH PART ACTIVATION, DEACTIVATION, AND SWITCHING IN WIRELESS COMMUNICATIONS - Methods, systems, and devices for wireless communications are described that provide for transmission of an indication of an activated bandwidth part (BWP) or component carrier (CC), or combination thereof, to a user equipment (UE) through downlink control information (DCI) that is excluding a grant of resources of the BWP or CC. A UE may establish a connection with a base station in which one or more CCs may be configured with one or more BWPs. The base station may indicate which BWP is active for a transmission in DCI that is transmitted subsequent to the configuration of the one or more CCs, and a UE may activate a corresponding BWP or CC based on the indication. In some cases, a CC may be deactivated unless the DCI indicates that at least one BWP of the CC is active. | 2019-04-04 |
20190103955 | TIME-DIVISION MULTIPLE ACCESS WITH OVERLAPPED PREAMBLE - Interference cancellation in a receiver can be used to improve bandwidth efficiency. The transmission of bursts from different terminals scheduled at separate time intervals can overlap partially such that time used for information transmission is optimized. For example, a receiver includes a signal processor including instructions executable to select first data including a first burst and a successive second burst from a transmission. The signal processor demodulates and decodes information from the first burst. The signal processor further generates a remodulated first burst based on recoded and remodulated information and generates second data by subtracting the remodulated first burst from the first data. The signal processor synchronizes with a stored symbol pattern in the second burst; and demodulates and decodes the information from the second burst. With such arrangement, the performance of each link is not affected by the partially overlapping burst. | 2019-04-04 |
20190103956 | Serializer/Deserializer (Serdes) Lanes with Lane-by-Lane Datarate Independence - A circuit and method enables multiple serializer/deserializer (SerDes) data lanes of a physical layer device (PHY) to operate across a broad range of diversified data rates that are independent from lane to lane. The multiple SerDes data lanes may operate at data rates independent from one another. A single low frequency clock is input to the PHY. A frequency of the single low frequency clock is increased via a common integer-N phase-locked loop (PLL) on the PHY to produce a higher frequency clock. Each of the SerDes data lanes is operated, independently, as a fractional-N PLL that employs the higher frequency clock. Use of the common integer-N PLL enables modulation noise of the fractional-N PLLs to be suppressed by moving the modulation noise to higher frequencies where a level of the modulation noise is filtered, avoiding use of high risk noise cancellation techniques. | 2019-04-04 |
20190103957 | ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE AND DECRYPTION METHOD - There is provided an encryption device to suppress calculation in the reverse direction in whitebox model encryption. The encryption device includes: having a predetermined relationship that outputs a plurality of output values according to a plurality of input values configured of plain text, with a part of the plurality of output values being inputted to a trapdoor one-way function, the predetermined relationship being defined by the output values that are not inputted to the trapdoor one-way function and one arbitrary input value of the plurality of input values; and having a property of encrypting a part of the plurality of output values according to the trapdoor one-way function, and the trapdoor one-way function not being able to decrypt encrypted data in a state in which a trapdoor is unknown. | 2019-04-04 |
20190103958 | DATA STORAGE METHOD, DATA QUERY METHOD AND APPARATUSES - A data storage method comprises sending, by a blockchain node associated with a blockchain, data to an encryption device to cause the encryption device to encrypt the data and return the encrypted data to the blockchain node; receiving the encrypted data returned by the encryption device; and sending the encrypted data to other blockchain nodes associated with the blockchain to cause each of the other blockchain nodes to store the encrypted data in the blockchain after performing consensus verification on the encrypted data with success. | 2019-04-04 |
20190103959 | HASH OFFSET BASED KEY VERSION EMBEDDING - In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored. | 2019-04-04 |
20190103960 | SECURE AND DISRUPTION-TOLERANT COMMUNICATIONS FOR UNMANNED UNDERWATER VEHICLES - An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential that has not been revoked by an access granting authority. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device. | 2019-04-04 |
20190103961 | SYSTEM AND TECHNIQUES FOR ENCRYPTING CHIP-TO-CHIP COMMUNICATION LINKS - Embodiments detailed herein relate to techniques which enable the creation of secure point-to-point interconnect communication channels between hardware components which may be independently manufactured and arbitrarily paired with one another in a computer system. Also detailed herein is instruction support for dynamically enabling and disabling the security of a point-to-point interconnect link. | 2019-04-04 |
20190103962 | RECIPIENT-DRIVEN DATA ENCRYPTION - A system that includes a quantum key device, a first device, and a second device. A monitor module is configured to detect, at the first device, that the second device is reading quantum information over a second quantum communication channel. A read module is configured to read, at the first device, the quantum information over a first quantum communication channel. An encryption module is configured to generate a first quantum encryption key at the first device using the quantum information that is read over the first quantum communication channel. The encryption module is also configured to encrypt data using the first quantum encryption key to create encrypted data. The second device decrypts the encrypted data using a second quantum encryption key generated at the second device using the quantum information read at the second device to create decrypted data. | 2019-04-04 |
20190103963 | ZONE BASED KEY VERSION ENCODING - In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored. | 2019-04-04 |
20190103964 | METHODS FOR ENCRYPTED DATA COMMUNICATIONS - Embodiments are directed to a method for encrypting data communications, including performing a stochastic procedure between a plurality of nodes, including at least a first node and a second node; collecting a measured outcome of the stochastic procedure, the measured outcome of the stochastic procedure providing a dependent random variable pair; and constructing an encryption key based on one or more correlations identified between at least a first random variable and a second random variable, the first and second random variables forming the dependent random variable pair. | 2019-04-04 |
20190103965 | FORMAT PRESERVING ENCRYPTION UTILIZING A KEY VERSION - In one example, a system for format preserving encryption utilizing a key version can include a processor, and a memory resource storing instructions executable by the processor to determine a quantity of significant bits for a value to be encrypted, mask the value to include the quantity of significant bits, perform format preserving encryption on the masked value to generate an encrypted value, and append a key version to the encrypted value. | 2019-04-04 |
20190103966 | Emergency Lockdown in a Local Network of Interconnected Devices - Systems, methods, and devices are described herein for executing a lockdown of electronic locks deployed in a local network of interconnected devices. In example implementations, each electronic lock is provided with a unique encryption key specific to that electronic lock and is provided with a shared encryption key. To execute a lockdown of all electronic locks in the local network, a server generates a locking instruction and encrypts it using the shared encryption key. The server then transmits the encrypted locking instruction to the gateway devices of the local network which, in turn, transmit it to each of the electronic locks. Upon receipt of the encrypted locking instruction, the electronic locks attempt to decrypt it using the shared encryption key. Upon successful decryption of the encrypted locking instruction, an electronic lock toggles to a lock state. | 2019-04-04 |
20190103967 | METHOD, APPARATUS, AND CLOUD SYSTEM FOR EXECUTING AN APPLICATION IN A CLOUD SYSTEM - A method is for executing an application in a cloud system. The method includes receiving a request from a first user for executing an application in the cloud system; receiving, from the first user, user data of the first user related to the execution of the requested application; storing the received user data in a first storage area of a computing environment of the cloud system; in the computing environment, executing the requested application based on the stored user data of the first user to obtain an execution result; and storing the execution result in a second storage area of the computing environment, the access permission of the first user to the first storage area being a write-only permission, and the access permission of the first user to the second storage area being a read-only permission. As such, data privacy protection and security can be provided in the cloud system. | 2019-04-04 |
20190103968 | TRUSTED TOKEN RELAY INFRASTRUCTURE - A token relay system is provided that enables a client requester to acquire a properly scoped access token issued by a token issuer authority in a secure manner. The client requestor may be a non-confidential client (e.g., a JavaScript application). The token relay system is a trusted and confidential client of the token issuer authority. Upon receiving an access token request from a client, the token relay system is configured to send a request to the token issuer authority (e.g., OAuth server) requesting an access token on behalf of the requestor. The token issuer authority may then respond by issuing an access token with the appropriate scope to the token relay system. The token relay system may then forward the access token received from the token issuer to the requesting client, who may then use the access token to access a protected resource (e.g., a REST resource). | 2019-04-04 |
20190103969 | SYSTEMS AND METHODS FOR PREVENTING EXCESS USER AUTHENTICATION TOKEN UTILIZATION CONDITIONS IN AN ENTERPRISE COMPUTER ENVIRONMENT - A system for preventing an excess user authentication token utilization condition in an enterprise computer environment, the system including an excess user authentication token utilization condition predictor operable for calculating a number of additional group memberships of each of the enterprise users that can be expected to result in an excess user authentication token utilization condition, a group membership estimator operable, for each the enterprise user, for estimating a number of additional group memberships of the enterprise user that will be created by an anticipated activity, and an anticipated excess user authentication token utilization condition alerter operable, before initiation of the anticipated activity, for providing an alert if the anticipated activity can be expected to result in an excess user authentication token utilization condition. | 2019-04-04 |
20190103970 | ENCRYPTED SELF-IDENTIFICATION USING A PROXY SERVER - Some database systems may implement encrypted connections to improve the security of incoming server traffic. The systems may implement the encrypted connections using encryption keys known to both a proxy server and a server (e.g., a database server). For example, a proxy server may encrypt one or more communications between the proxy server and a user device, such as self-identifying information for the user device, using a known encryption key. The user device may, in turn, attempt to establish an encrypted connection with the server using the encrypted communications. Because the encryption key is known to both the server and the proxy server, the server may decrypt the encrypted communications and subsequently establish an encrypted connection with the user device based on the decrypted communications. | 2019-04-04 |
20190103971 | VERIFICATION METHOD OF BIOMETRIC AUTHENTICATION - A method for processing biometric data performed by a proof entity and a verification entity; the proof entity having a biometric candidate datum, a biometric reference datum, a hash value of the biometric reference datum, a hash value of the biometric candidate datum; the verification entity having only the hash value of the biometric candidate datum; the method including steps of: generation by a data-processing unit of the proof entity of a zero-knowledge proof of the assumption that the biometric candidate datum and the biometric reference datum coincide; transmission to the verification entity of said zero-knowledge proof, the hash value of the biometric candidate datum, and the hash value of the biometric reference datum; verification by a data-processing unit of the verification entity that the zero-knowledge proof is valid, and that the hash value received from the biometric candidate datum corresponds to the one the verification entity has. | 2019-04-04 |
20190103972 | NETWORK INTERFACE DEVICE AND METHOD - A network interface device comprises an integrated circuit device comprises at least one processor. A network interface device comprises a memory. The integrated device is configured to execute a function with respect to at least a part of stored data in said memory. | 2019-04-04 |
20190103973 | HASH SUBTREES FOR GROUPING COMPONENTS BY COMPONENT TYPE - A system for generating a hash tree with components grouped by component type is provided. Each non-leaf node of the hash tree has a hash of the hashes of its child nodes, and a leaf node has a hash of a component of the hash tree. The system generates, for each component type, a component subtree for that component type based on the leaf nodes that have hashes of the components of that component type. The system then generates a root subtree of the hash tree based on leaf nodes that are the root nodes of the component subtrees. The combination of the root subtree and the component subtrees form the hash tree. | 2019-04-04 |
20190103974 | DEVICE WITH SELF-AUTHENTICATION - A device includes a first memory circuit, a second memory circuit and a processing circuit. The memory circuit is configured to store a distinguishable identification (ID). The second memory circuit is configured to store first hash data, wherein the first hash data is generated according to the distinguishable ID. The processing circuit is configured to generate second hash data according to the distinguishable ID when the device is powered on, and to compare the first hash data and the second hash data to determine whether the second hash data matches the first hash data. | 2019-04-04 |
20190103975 | VALIDATION OF THE INTEGRITY OF DATA - A computer-implemented method of permitting authentication of data added to an initial plurality of unique data items stored on a computer, all of the data items being converted via a one-way function to respective equal length unique digests (or hashes); and the hashes being stored as a linked dataset in which the value of each successive hash is dependent on the value of the previous hash combined with a new hash resulting from the hashing of the most recently added data. The most recent hash in the linked dataset (hash chain) is the cumulative result of all previous hashes in their original sequence, each hash in the dataset being unique to the most recently added data. Each cumulative hash is constructed by incorporating one or more pre-existing cumulative hashes into the source data, before the new hash is calculated. | 2019-04-04 |
20190103976 | TECHNOLOGIES FOR IMPLEMENTING MUTUALLY DISTRUSTING DOMAINS - Technologies for providing shared immutable code among untrusting domains are provided. The untrusting domains may be cryptographically separated within a cloud computing service or environment. The shared immutable code may be a shared virtual machine monitor (sVMM) that is setup by system software to indicate that the sVMM code pages need integrity alone and should be protected with an integrity key associated with individual domains. This indication may be stored in page tables and carried over the memory bus to a cryptographic engine. The cryptographic engine may use this indication to protect the integrity of data before storing the data to memory. In order to ensure cryptographic isolation, integrity values may be generated using a domain-specific key ensuring that an attempt to modify the code by one domain is detected by a different domain. Other embodiments are described herein and claimed. | 2019-04-04 |
20190103977 | MANAGING INTERVAL BOUNDARIES FOR GROUPED AND DIGITALLY SIGNED COMPUTER-BASED RECORDS - Embodiments provide a computer-implemented method for managing interval boundaries of electronic records. The method includes receiving electronic records, associating a first selection criterion and second selection criterion with the electronic records, and associating some of the electronic records with a group based at least in part on determining that the second selection criterion is within a predetermined range of a first threshold. The method further includes generating a group record that identifies the group, associating a third selection criterion with the group record, the third selection criterion being within the interval boundaries, and identifying an expiration of an interval boundary based at least in part on determining that the electronic data representing the third selection criterion is within a predetermined range of a second threshold. | 2019-04-04 |
20190103978 | MANAGING INTERVAL BOUNDARIES FOR GROUPED AND DIGITALLY SIGNED COMPUTER-BASED RECORDS - Embodiments provide a computer-implemented method for managing interval boundaries of electronic records. The method includes receiving electronic records, associating a first selection criterion and second selection criterion with the electronic records, and associating some of the electronic records with a group based at least in part on determining that the second selection criterion is within a predetermined range of a first threshold. The method further includes generating a group record that identifies the group, associating a third selection criterion with the group record, the third selection criterion being within the interval boundaries, and identifying an expiration of an interval boundary based at least in part on determining that the electronic data representing the third selection criterion is within a predetermined range of a second threshold. | 2019-04-04 |
20190103979 | USING MULTIPLE DIGITAL IDENTIFICATION DOCUMENTS TO CONTROL INFORMATION DISCLOSURE - A first digital identification document is transmitted from an identification authority to a mobile device of an identified individual. This first digital identification document is digitally signed and includes a set of attributes about the identified individual. In the same manner, a second digital identification document is also transmitted to the identified individual's mobile device. The second digital identification document is also digitally signed but includes a different set of attributes about the identified individual. The identified individual is then confronted by a series of challengers, wherein each challenger requires a different amount of information about the identified individual. Based on the identity of each challenger, the identified individual selects an appropriate identification document and transmits it to the applicable challenger's device. The challenger is then able to confirm both the information he needs about the identified individual and the validity of the identification document that he receives. | 2019-04-04 |
20190103980 | RFID TAG FOR SECURE ACCESS TO A SERVICE FROM AN ACCESS TERMINAL - The invention relates to an RFID tag adapted to access a service of interest from an access terminal, said RFID tag ( | 2019-04-04 |
20190103981 | POE SYSTEM PROVIDING MEASURE OF ENERGY CONSUMPTION - The invention relates to a PoE system, which comprises a powered device ( | 2019-04-04 |
20190103982 | EXPECTED GROUP CHAT SEGMENT DURATION - A method, computer system, and computer program product for calculating a group chat segment duration is provided. The embodiment may include capturing a plurality of group chat messages from a chat message repository. The embodiment may also include determining a probability distribution based on analyzing the captured group chat messages over a time vector. The embodiment may further include calculating a time parameter based on the determined probability distribution. The embodiment may also include calculating a content parameter based on one or more relevant chat topics. The embodiment may further include calculating an attendee parameter based on a plurality of attendees and one or more attendee associations. The embodiment may also include determining a chat duration prediction based on the calculated time parameter, the calculated content parameter, and the calculated attendee parameter. | 2019-04-04 |
20190103983 | MULTI-DEVICE COMMUNICATION MANAGEMENT - A device implementing the subject technology may include at least one processor configured to transmit an allocation request requesting allocation of a group communication session with a plurality of devices and receive an allocation response in response to the allocation request, the allocation response including credential information for the device to use to join the group communication session. The at least one processor may be further configured to transmit an allocation bind request with the credential information to join the group communication session using the credential information and receive an allocation bind success response in response to the allocation bind request, the allocation bind success response indicating that the device has joined the group communication session. The at least one processor may be further configured to provide a join notification to the plurality of devices via an intermediary device to notify that the device has joined the group communication session. | 2019-04-04 |
20190103984 | SECURE MULTIWAY CALLING - Techniques are disclosed relating to multiway communications. In some embodiments, a first electronic device initiates a multiway call between a plurality of electronic devices and exchanges a first secret with a first set of electronic devices participating during a first portion of the multiway call, the first secret being used to encrypt traffic between the first set of electronic devices. The first electronic device receives an indication that first set of participating electronic devices has changed and, in response to the indication, exchanges a second secret with a second set of electronic devices participating during a second portion of the multiway call, the second secret being used to encrypt traffic between the second set of participating electronic devices. In some embodiments, the indication identifies a second electronic device as leaving the multiway call, and the second secret is not exchanged with the second electronic device. | 2019-04-04 |
20190103985 | VISUALIZING CONVERSATIONS ACROSS CONFERENCE CALLS - A method can include conducting a plurality of related conference calls and generating a visualization for each conference call. The visualizations can be sent to computing devices of participants of the plurality of conference calls concurrently with the plurality of conference calls. | 2019-04-04 |
20190103986 | BUILDING CONDITION SENSOR MONITORING AND CONTROL SYSTEM - Apparatus and systems for providing home and building security and condition monitoring include a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate dynamically with each other and a remote server. | 2019-04-04 |
20190103987 | APPLIANCE STATE RECOGNITION DEVICE AND METHODS - Embodiments herein relate to recognition of an appliance state based on sensor data and determination of a response based at least in part on the appliance state. In various embodiments, an apparatus to recognize an appliance state may include a sensor data module to identify sensor data in one or more signals relating to data from one or more sensors associated with an appliance, an appliance state recognition module to determine an appliance state of the appliance based at least in part on the sensor data, a response module to determine a response based at least in part on the appliance state, and a transmission module to send the response to at least one of an appliance controller for the appliance or a presentation device. Other embodiments may be described and/or claimed. | 2019-04-04 |
20190103988 | COMMUNICATIONS ON VEHICLE DATA BUSES - An apparatus | 2019-04-04 |
20190103989 | COMMUNICATION CONTROL SYSTEM AND COMMUNICATION CONTROL METHOD - Provided is a communication control system in which a control device and one or a plurality of control target devices are connected through a network, wherein at least one of the plurality of control target devices includes a sub master and a sub slave to be synchronously controlled with each other, and the control device includes a storage unit storing each pieces of information on a synchronization period for synchronizing with the control target device, communication periods, and mutual communication control information for mutually communicate in a mutual communication period shorter than the synchronization period, a calculation unit calculating a control command for commanding an operation in synchronization with the control target device for each control target device, and a communication control unit transmitting the control command including the mutual communication control information to the sub master and the sub slave of the at least one control target device. | 2019-04-04 |
20190103990 | CREATING VIRTUAL NETWORKS SPANNING MULTIPLE PUBLIC CLOUDS - Some embodiments establish for an entity a virtual network over several public clouds of several public cloud providers and/or in several regions. In some embodiments, the virtual network is an overlay network that spans across several public clouds to interconnect one or more private networks (e.g., networks within branches, divisions, departments of the entity or their associated datacenters), mobile users, and SaaS (Software as a Service) provider machines, and other web applications of the entity. The virtual network in some embodiments can be configured to optimize the routing of the entity's data messages to their destinations for best end-to-end performance, reliability and security, while trying to minimize the routing of this traffic through the Internet. Also, the virtual network in some embodiments can be configured to optimize the layer 4 processing of the data message flows passing through the network. | 2019-04-04 |
20190103991 | VIRTUAL NETWORK PROVIDER - Some embodiments establish for an entity a virtual network over several public clouds of several public cloud providers and/or in several regions. In some embodiments, the virtual network is an overlay network that spans across several public clouds to interconnect one or more private networks (e.g., networks within branches, divisions, departments of the entity or their associated datacenters), mobile users, and SaaS (Software as a Service) provider machines, and other web applications of the entity. The virtual network in some embodiments can be configured to optimize the routing of the entity's data messages to their destinations for best end-to-end performance, reliability and security, while trying to minimize the routing of this traffic through the Internet. Also, the virtual network in some embodiments can be configured to optimize the layer 4 processing of the data message flows passing through the network. | 2019-04-04 |
20190103992 | SELECTING ONE NODE FROM SEVERAL CANDIDATE NODES IN SEVERAL PUBLIC CLOUDS TO ESTABLISH A VIRTUAL NETWORK THAT SPANS THE PUBLIC CLOUDS - Some embodiments establish for an entity a virtual network over several public clouds of several public cloud providers and/or in several regions. In some embodiments, the virtual network is an overlay network that spans across several public clouds to interconnect one or more private networks (e.g., networks within branches, divisions, departments of the entity or their associated datacenters), mobile users, and SaaS (Software as a Service) provider machines, and other web applications of the entity. The virtual network in some embodiments can be configured to optimize the routing of the entity's data messages to their destinations for best end-to-end performance, reliability and security, while trying to minimize the routing of this traffic through the Internet. Also, the virtual network in some embodiments can be configured to optimize the layer 4 processing of the data message flows passing through the network. | 2019-04-04 |
20190103993 | IDENTIFYING MULTIPLE NODES IN A VIRTUAL NETWORK DEFINED OVER A SET OF PUBLIC CLOUDS TO CONNECT TO AN EXTERNAL SAAS PROVIDER - Some embodiments establish for an entity a virtual network over several public clouds of several public cloud providers and/or in several regions. In some embodiments, the virtual network is an overlay network that spans across several public clouds to interconnect one or more private networks (e.g., networks within branches, divisions, departments of the entity or their associated datacenters), mobile users, and SaaS (Software as a Service) provider machines, and other web applications of the entity. The virtual network in some embodiments can be configured to optimize the routing of the entity's data messages to their destinations for best end-to-end performance, reliability and security, while trying to minimize the routing of this traffic through the Internet. Also, the virtual network in some embodiments can be configured to optimize the layer 4 processing of the data message flows passing through the network. | 2019-04-04 |
20190103994 | RADIO COMMUNICATION SYSTEM, RADIO BASE STATION APPARATUS, AND USER EQUIPMENT - A user equipment is disclosed that includes a receiver configured to receive candidates of phase rotation in a horizontal direction and candidates of phase rotation in a vertical direction for precoding. The user equipment also has a processor configured to report feedback information including a phase rotation in the horizontal direction and a phase rotation in the vertical direction to a radio base station based upon the candidates of the phase rotation in a horizontal direction and the candidates of phase rotation in a vertical direction. Additionally, the candidates of phase rotation in the horizontal direction or the candidates of phase rotation in the vertical direction are a part of predetermined candidates, the part being selected from the predetermined candidates according to a predetermined method. | 2019-04-04 |
20190103995 | WIRELESS COMMUNICATION SYSTEM AND SIGNAL PROCESSING METHOD THEREOF - A wireless communication system includes a channel estimation circuit, a shortening circuit, a time-domain decision feedback equalizer and a coefficient calculation circuit. The channel estimation circuit generates an estimated channel pulse response according to a received signal. The shortening circuit defines a shortened impulse response from the estimated channel impulse response according to a main energy distribution region of the estimated channel impulse response. The time-domain decision feedback equalizer performs time-domain equalization on the received signal, and includes a feedforward filter for filtering the received signal. The coefficient calculation circuit calculates, according to the shortened impulse response, a set of feed-forward filter coefficients to be utilized by the feedforward filter. | 2019-04-04 |
20190103996 | LTE Channel Estimation - A method for channel estimation in LTE, the method comprising decoding a received LTE signal comprising a message, and when a CRC of the decoder indicates successful decoding of a subframe, estimating the content of the message transmitted to the decoder, de-rotating the received LTE signal based on the estimated content of the message transmitted to the decoder to calculate pseudo pilot signals for all resource elements on which the corresponding physical downlink shared channel ‘PDSCH’ is mapped. | 2019-04-04 |
20190103997 | SYMBOL RATE ESTIMATION DEVICE AND SYMBOL RATE ESTIMATION METHOD - A symbol rate estimation device includes: a power spectrum density (PSD) generating unit, estimating a power of an input signal to generate a PSD; a cut-off frequency index outputting unit, outputting a cut-off frequency index according to the power; and a symbol rate calculating unit, calculating a symbol rate of the input signal according to the cut-off frequency index. | 2019-04-04 |
20190103998 | Selectable-tap Equalizer - A signaling circuit having a selectable-tap equalizer. The signaling circuit includes a buffer, a select circuit and an equalizing circuit. The buffer is used to store a plurality of data values that correspond to data signals transmitted on a signaling path during a first time interval. The select circuit is coupled to the buffer to select a subset of data values from the plurality of data values according to a select value. The equalizing circuit is coupled to receive the subset of data values from the select circuit and is adapted to adjust, according to the subset of data values, a signal level that corresponds to a data signal transmitted on the signaling path during a second time interval. | 2019-04-04 |
20190103999 | Passive Variable Continuous Time Linear Equalizer with Attenuation and Frequency Control - A continuously or step variable passive noise filter for removing noise from a signal received from a DUT added by a test and measurement instrument channel. The noise filter may include, for example, a splitter splits a signal into at least a first split signal and a second split signal. A first path receives the first split signal and includes a variable attenuator and/or a variable delay line which may be set based on the channel response of the DUT which is connected. The variable attenuator and/or the variable delay line may be continuously or stepped variable, as will be discussed in more detail below. A second path is also included to receive the second split signal and a combiner combines a signal from the first path and a signal from the second path into a combined signal. | 2019-04-04 |
20190104000 | Stable Modulation Index Calibration and Dynamic Control - Calibrating a Gaussian frequency-shift keying modulation index includes generating a training sequence of bits, shaping a pulse from the training sequence according to an initial modulation index, and converting the shaped signal to a transmission signal. The transmission signal is then either looped through a radio frequency core or processed by frequency deviation estimation hardware to determine a frequency deviation. The frequency deviation is converted to a new modulation index, and potentially a ratio between a target modulation index and a measured modulation index as a scaling factor. The process is then iteratively repeated until a threshold frequency deviation is achieved. | 2019-04-04 |
20190104001 | AUTHENTICATION THROUGH VOLTAGE VARIATIONS OVER COMMUNICATION CHANNELS - Embodiments may include systems and methods for authenticating a message between a transmitter and a receiver. An apparatus for communication may include a transmitter to transmit a message to a receiver via a physical channel coupling the transmitter and the receiver. The message may be transmitted via a plurality of transmission voltage levels varied from a plurality of nominal voltage levels on the physical channel. The transmitter may include a voltage generator to generate the plurality of transmission voltage levels varied in accordance with a sequence of voltage variations from the plurality of nominal voltage levels for the message. The sequence of voltage variations may serve to authenticate the message between the transmitter and the receiver. Other embodiments may be described and/or claimed. | 2019-04-04 |
20190104002 | SYSTEM AND METHOD FOR MODULATING FILTER COEFFICIENTS IN A CHANNELIZER - Circuit and method for modulating filter coefficients of a frequency channelizer having a filter bank include: receiving a wide spectrum input signal; modulating the filter coefficients of the filter bank to sweep a center frequency of each channel of the frequency channelizer, using a modulation scheme; and inputting frequency offset compensation caused by the modulation, and output signals of the frequency channelizer to an application processing circuit to convert the output signals to their original center frequencies. | 2019-04-04 |
20190104003 | JOINT AD-HOC SIGNAL AND COLLISION DETECTION METHOD - Various embodiments relate to a method for classifying received radio frequency signals, including: receiving an input signal; matched filtering the input signal to produce a correlation result signal; sampling the correlation result signal at a plurality of half-bit-grids and a plurality of bit-grids to produce a set of modulated phase correlation result samples and a set of non-modulated phase correlation result samples; calculating a minimum of the set of modulated phase correlation result samples; calculating a maximum of the set of non-modulated phase correlation result samples; and classifying the input signal as valid data or collision data based on the minimum and the maximum. | 2019-04-04 |
20190104004 | ENHANCED CLEAR CHANNEL ASSESSMENT - In an example of multi-user wireless communications, an access point may send a downlink frame to a first station. The first station may generate and transmit an uplink frame. A second station in a same or different basic service set coverage area as that of the access point performs a clear channel assessment of a medium associated with the station for transmitting a frame without interrupting a frame exchange between the access point and the first station. The second station receives the downlink frame and the uplink frame of the frame exchange. The second station determines a signal measurement of the uplink frame, and determines a status of the medium based on the signal measurement and the downlink frame. The first station may update or ignore a network allocation vector timer based on the status of the medium. Other methods, apparatus, and computer-readable media are also disclosed. | 2019-04-04 |
20190104005 | METHOD AND APPARATUS FOR TRANSMITTING TRACKING REFERENCE SIGNAL IN NEW RADIO - Provided is a method of transmitting a tracking reference signal (TRS) in a next-generation/5G radio access network, and for transmitting the TRS by a base station to a user equipment. The method may include configuring a resource element shift value K for mapping a frequency domain resource of a TRS to a user equipment, transmitting the K value to the user equipment, and transmitting the TRS mapped to the frequency domain resource based on the K value to the user equipment. | 2019-04-04 |
20190104006 | WIRELESS COMMUNICATION DEVICE AND WIRELESS COMMUNICATION METHOD - Provided are wireless communication devices and methods. A wireless communication device can comprise: circuitry operative to map at least a first type of reference signals (RSs) onto orthogonal frequency division multiplexing (OFDM) symbol (s) other than the OFDM symbols onto which shortened transmission time intervals (TTIs) are mapped in a subframe, each of the shortened TTIs comprising 1-7 OFDM symbols; and a transmitter operative to transmit a physical channel in one of the shortened TTIs and transmit at least the first type of RSs. | 2019-04-04 |
20190104007 | COMPUTER GENERATED SEQUENCE DESIGN AND HYPOTHESIS MAPPING - Certain aspects of the present disclosure relate to methods and apparatus generating sequences and mapping cyclic shifts of the sequences to hypotheses for short burst transmissions, for example, in new radio (NR) technologies. An exemplary method includes selecting a computer generated sequence (CGS), from a plurality of CGSs; determining, based on different values of uplink control information (UCI) and a first shift index assigned to the transmitter, a shift to apply to the CGS; and transmitting the selected CGS, with the determined shift applied, in a short physical uplink control channel (PUCCH) to indicate the UCI. | 2019-04-04 |
20190104008 | TRANSMITTERS, RECEIVERS AND METHODS OF TRANSMITTING AND RECEIVING - The receiver comprises a demodulator configured to detect a signal representing the OFDM symbols and to generate a sampled digital version of the OFDM symbols in the time domain. A Fourier transform processor is configured to receive the time domain digital version of the OFDM symbols and to form a frequency domain version of the OFDM symbols, from which the pilot symbol bearing sub-carriers and the data symbol bearing sub-carriers can be recovered. A detector is configured to recover the data symbols from the data bearing sub-carriers of the OFDM symbols and to recover the pilot symbols from the pilot bearing sub-carriers of the OFDM symbols in accordance with the continuous pilot symbol pattern. The continuous pilot symbols are present at the same sub-carrier locations in first OFDM symbols and as second OFDM symbols. A transmitter is also provided. | 2019-04-04 |
20190104009 | SYSTEM AND METHOD FOR ROBUST OFDM SYNCHRONIZATION - Disclosed methods include transmitting an OFDM signal including a succession of frames spaced apart by a set of training symbols that are symmetric in time and each formed by a plurality of even-frequency sub-carriers, spaced by odd frequency zeros. The OFDM signal is received and sampled and timing metrics are determined. Local maximums, or peaks of the timing metrics are detected, and from the peaks a coarse time offset is determined. A correlation metric, at sample indexes within a region determined by the coarse time offset, is applied and, based on a peak, an estimated time offset is generated. A correlation metric of the estimated time offset is determined and, based on the correlation metric, an estimated frequency offset is generated. | 2019-04-04 |
20190104010 | SYSTEMS AND METHODS FOR DETERMINING THE NUMBER OF CHANNEL ESTIMATION SYMBOLS BASED ON THE CHANNEL COHERENCE BANDWIDTH - Various systems and methods are provided for channel estimation. These systems and methods (a) determine a coherence bandwidth for the channel, (b) adapt the channel estimation based on the coherence bandwidth, and (c) perform channel estimation by transmitting a channel estimation symbol over a channel. In some embodiments, the channel estimation is adapted based on the coherence bandwidth. This may include selecting a number of channel estimation symbols to transmit in a packet. Additionally, the number of channel estimation symbols transmitted in a packet can be selected by increasing the number of channel estimation symbols when the coherence bandwidth of the channel is high or decreasing the number of channel estimation symbols when the coherence bandwidth of the channel is low. | 2019-04-04 |
20190104011 | APPARATUS AND METHODS FOR UNIFORM CONSTELLATIONS AND NON-UNIFORM CONSTELLATIONS IN WIRELESS LOCAL AREA NETWORKS - This disclosure provides systems, devices, apparatus and methods, including computer programs encoded on storage media, for techniques for 4096 Quadrature Amplitude Modulation (4096-QAM) with Uniform Constellations and Non-uniform Constellations and 16384 Quadrature Amplitude Modulation (16384-QAM) with Uniform Constellations and Non-uniform Constellations in Wireless Local Area Networks (WLAN). These 4096-QAM and 16384-QAM techniques can be implemented in a QAM modulator circuit on the transmit side and in a QAM demodulator circuit on the receive side to increase peak data rate without the need for additional transmission power or bandwidth. | 2019-04-04 |
20190104012 | APPARATUS AND METHODS FOR MITIGATING A FAULT THAT ADVERSELY AFFECTS ULTRA-WIDEBAND TRANSMISSIONS - Aspects of the subject disclosure may include, a system that facilitates transmitting a plurality of ultra-wideband electromagnetic waves that propagates along a surface of a first transmission medium without requiring an electrical return path, wherein the first plurality of ultra-wideband electromagnetic waves conveys a plurality of communication signals, detecting an attenuation in the plurality of ultra-wideband electromagnetic waves that affects a propagation of the plurality of ultra-wideband electromagnetic waves along the first surface of the first transmission medium, and responsive to the detecting, redirecting at least a portion of the plurality of ultra-wideband electromagnetic waves to an interface of a second transmission medium. Other embodiments are disclosed. | 2019-04-04 |
20190104013 | TAKEOVER OF SECURITY NETWORK - A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system. | 2019-04-04 |
20190104014 | SELF-MONITORING - The present approach relates to event monitoring and management of an instance using a generated service map, allowing monitoring of CIs (e.g., applications) and connections that are currently active in a user's specific instance. A self-monitoring solution is generated for a user (e.g., via an application) that depicts status, configuration, and errors related to the user's instance. In certain implementations, the present techniques involve applying internal knowledge of the working of a user's instance and applications to perform the self-monitoring, and determine when an alert should be generated. Further, the present techniques may involve making a determination to provide a user with a self-help solution in addition or based on the self-monitoring of the user's instance. | 2019-04-04 |
20190104015 | Adaptive Capacity Management - Systems, apparatuses, and methods are described for managing concurrent requests from clients for services. Client computing devices may be permitted to use available capacity beyond their assigned quotas. When backpressure exists, connections with a client exceeding a proportion of excess capacity may be closed before connections with a client not exceeding a proportion of excess capacity. | 2019-04-04 |
20190104016 | ELECTRONIC DEVICE AND METHOD IN WIRELESS COMMUNICATION SYSTEM, AND WIRELESS COMMUNICATION SYSTEM - An electronic device and a method in a wireless communication system, and a wireless communication system are provided. The electronic device in a wireless communication system includes a processing circuit configured to: determine a parameter set for characterizing attributes of an acquisition object; and determine, based on the parameter set, acquisition configuration information concerning feature acquisition performed by an acquisition node on the acquisition object. With the electronic device, the method and the wireless communication system, a proper acquisition policy can be set for the acquisition object, such that feature acquisition can be properly performed on the acquisition object. | 2019-04-04 |
20190104017 | ACCELERATING MACHINE LEARNING AND PROFILING OVER A NETWORK - In some examples, a computing device executing an application may gather data associated with a usage of multiple computing resources (e.g., CPU, GPU, storage, memory, and the like) of the computing device, generate one or more packets to carry the data, and set a priority of each of the one or more packets. The computing device may send the one or more packets to a server, to other computing devices, or both. The server or the other computing devices may send a new profile. The computing device may modify a hardware and software configuration of the computing device based at least in part on the new profile to create a modified configuration and execute the application, resulting in the application having at least one of a reduced latency or an increased throughput using the modified configuration. | 2019-04-04 |
20190104018 | NETWORK CONTROL APPARATUS AND METHOD FOR POPULATING LOGICAL DATAPATH SETS - For a network control system that receives, from a user, logical datapath sets that logically express desired forwarding behaviors that are to be implemented by a set of managed switching elements, a controller for managing several managed switching elements that forward data in a network that includes the managed switching elements is described. The controller includes a set of modules for detecting a change in one or more managed switching elements and for updating logical datapath set based on the detected change. The logical datapath set is for subsequent translation into a set of physical forwarding behaviors of the managed switching elements. | 2019-04-04 |
20190104019 | SYSTEMS AND METHOD FOR SERVICE MAPPING - A system includes a non-transitory memory and one or more hardware processors. The one or more hardware processors are configured to read instructions from the non-transitory memory to perform operations including generating a service mapping illustrating a plurality of tiles, wherein each of the plurality of tiles corresponds to one or more services in an enterprise network and one or more lines extending between the plurality of tiles, wherein the one or more lines correspond to connections between the plurality of services, wherein a first tile of the plurality of tiles corresponds to a first service comprising a plurality of sub-services not depicted in the service mapping, and displaying an alert on the first tile corresponding to the first service when one or more of the plurality of sub-services encounters an error. | 2019-04-04 |
20190104020 | GUIDED CONFIGURATION ITEM CLASS CREATION IN A REMOTE NETWORK MANAGEMENT PLATFORM - A system may include a database disposed within a remote network management platform, a server device disposed in the platform, and a client device. The database may contain representations of configuration items, such as computing devices and software applications associated with the managed network. The server device may provide a graphical user interface including a sequence of panes to the client device. The sequence of panes may include an identifier pane, an identification rules pane, and a reconciliation pane. Each pane may include data entry fields that are operable to define a new class of configuration item. The server device may receive, by way of the graphical user interface, a definition of the new class that uniquely identifies configuration items of a particular type using at least the attributes. The server may store, in the database, the definition of the new class. | 2019-04-04 |
20190104021 | Automatic Network Assembly - Some examples provide a method for automatic network assembly. The following instructions may be used to implement automatic network assembly in a modular infrastructure. Instructions to automatically connect a management port to a management network. Instructions to automatically connect link ports to form a scalable ring. Instructions to automatically connect each modular infrastructure management device to a bay management network port. | 2019-04-04 |
20190104022 | POLICY-BASED NETWORK SERVICE FINGERPRINTING - A data center orchestrator, including: a hardware platform; a host fabric interface to communicatively couple the orchestrator to a network; an orchestrator engine to provide a data center orchestration function; and a data structure, including a network function virtualization definition (NFVD) instance, the NFVD instance including a definition for instantiating a virtual network function (VNF) on a host platform, including a telemetry fingerprint policy description (TFPD) for the VNF, wherein the TFPD includes information to collect telemetry data selected from a set of available telemetry data for the host platform. | 2019-04-04 |
20190104023 | SYSTEMS AND METHODS FOR DETERMINING ENTRY POINTS FOR MAPPING A NETWORK - The present approach relates to determining suitable entry points for initiating discovery and mapping of an enterprise service. For example, one or more tables may be utilized that include information regarding connections and/or communication between configuration items (CIs) of the enterprise service. From the tables, a graph may be created with nodes of the graph representing an internet protocol (IP) address and a port associated with the CIs, and edges of the graph representing the connections and/or communication between the CIs. The graph may be traversed according to outbound edges starting from a node with zero or few outbound edges. The nodes that are unreachable, or untraversed, may be flagged as suitable entry point candidates. In some embodiments, the flagged suitable entry point candidates may be reconciled with already known entry points included in the one or more tables. | 2019-04-04 |
20190104024 | BULK SERVICE MAPPING - Techniques related to bulk mapping network services are disclosed. The techniques include a system, comprising non-transitory memory devices, and hardware processors configured to execute instructions from the non-transitory memory devices to cause the system to determine a set of service entry point candidates for an organization based, at least in part, on network information received from load balancing servers, receive user input including a selection of a set of service entry points selected from the set of service entry point candidates, collect network information related to two or more service entry points of the set of service entry point candidates in parallel, the network information including returned errors associated with a respective service entry point, group the returned errors into category groups based on characteristics of the returned errors, and display the category groups on a display device for bulk resolution. | 2019-04-04 |
20190104025 | SYSTEMS AND METHODS FOR DETECTING, IDENTIFYING AND CATEGORIZING INTERMEDIATE NODES - A system and method for obtaining node information from a variety of potential sources and storing the information in a logical repository, and a system and method for identifying and categorizing Intermediate Nodes using a combination of requesting and responding node information. | 2019-04-04 |
20190104026 | MODELING ACCESS NETWORKS AS TREES IN SOFTWARE-DEFINED NETWORK CONTROLLERS - A network model is provided for modeling the nodes in networks such as access networks having a tree topology. Using the model, a network description can be generated that includes a node description for each node in the access network. A node description for a node includes an extra field to define child nodes relative to a modeled node. The node description also includes an extra field to describe a link from a modeled node to an upstream node. The connecting links and intermediate nodes of access nodes are exposed and can be manipulated. By providing a node description with child and link fields, a separate link data store can be avoided. | 2019-04-04 |
20190104027 | TWO-STAGE NETWORK SIMULATION - In an example, there is disclosed a computing apparatus, having: one or more logic elements, including at least a processor and a memory, providing a network simulation engine to: periodically perform a network traffic simulation; cache at least one network traffic simulation in a traffic state cache; receive a quest for additional network demand; and compute a network delta based at least in part on a difference between the request for additional network demand and the traffic state cache. | 2019-04-04 |
20190104028 | PERFORMANCE MONITORING AT EDGE OF COMMUNICATION NETWORKS USING HYBRID MULTI-GRANULAR COMPUTATION WITH LEARNING FEEDBACK - Example implementations disclosed herein are directed to monitoring communications networks in real time to ensure that they are performing in a desired fashion. Metrics such as utilization and latency are monitored to ensure that customer SLAs (Service Level Agreements) are met in a timely fashion. To detect problems in advance, example implementations predict the future values of metrics and detect events if the future value violates certain conditions. Example implementations build models that can predict the future values of metrics and analyze historical, near real time and real time streaming data so as to build predictive models. | 2019-04-04 |
20190104029 | TECHNIQUES TO ESTABLISH SERVICE LEVEL AGREEMENTS OR QUALITY OF SERVICE FOR REMOTELY ACCESSIBLE STORAGE DEVICES - Examples include techniques to establish service level agreements (SLAs or quality of service (QoS) for remote accessible storage devices. Examples include setting up SLA/QoS for an end-to-end path between a client computing node hosting an application and one or more remotely accessible storage devices coupled with a target host computing node. The client computing node and the target host computing node coupled through a networking fabric. | 2019-04-04 |
20190104030 | SYSTEM AND METHOD TO SUPPORT NETWORK SLICING IN AN MEC SYSTEM PROVIDING AUTOMATIC CONFLICT RESOLUTION ARISING FROM MULTIPLE TENANCY IN THE MEC ENVIRONMENT - A method for operating, by an MEC operator, a multi-access edge computing (MEC) system in which applications are provided by MEC tenants for deployment on MEC hosts of the MEC system and in which various levels of privileges are provided by the MEC operator to the MEC tenants. The method includes assigning, by an MEC broker, privileges to the MEC tenants; initiating, by the MEC broker via interactions with one or more of an MEC Orchestrator, an MEC platform manager, and a user app LCM proxy, operations. The operations can include one or more of application package on-boarding, application instance installation on selected MEC hosts, application provisioning, through configuration of appropriate parameters, and application life-cycle management operations including one or more of bootstrapping, termination, migration, scaling. The method further includes pre-validating, using the privileges provided to the MEC tenants, operation requests issued by the MEC tenants. | 2019-04-04 |
20190104031 | METHOD FOR PROVIDING OPERATING INFORMATION FOR A NETWORK - A method provides operating information for a network having a set of computing entities (CPE) for performing functions on data; a set of connecting entities (CNE) for connecting users and performing functions on data; and a set of forwarding entities (SFE) for forwarding data between the CPE and CNE. CNE are assigned to the CPE. At least part of the functions performed by the CNE are split and offloaded to the assigned CPE for performing the part of functions. The method includes: determining: a) network information, including network topology information and network capability information of the network, b) entity location information, including network locations of the entities, and c) function splitting information, including possible configurable functions which can be split; and, based on the determined information of a)-c), jointly optimizing: routing between the network entities, assignments of the CNE to the CPE, and function splits. | 2019-04-04 |
20190104032 | ELASTIC SERVICE PROVISIONING VIA HTTP-LEVEL SURROGATE MANAGEMENT - Content owners, origin servers, and other entities may wish to use elastic service provisioning to provide users improved service. For example, an origin server may wish to offload processing/network load to a surrogate server such that users of a service may experience improved performance. As another example, a content owner may wish to have content distributed to a number of surrogate servers to lower latency and improve bandwidth. | 2019-04-04 |
20190104033 | METHODS, APPARATUSES AND COMPUTER-READABLE STORAGE MEDIUMS FOR AUTOMATED ONBOARDING OF SERVICES IN THE USER SERVICES PLATFORM - A User Services Platform endpoint determines that applicable services are available for a connected device attached to a local network based on a neighbor discovery protocol message from the connected device; and outputs a User Services Platform device notification message to a User Services Platform endpoint associated with the local network. A User Services Platform administrative authority endpoint device determines an applicable service for a connected device based on a User Services Platform message identifying the connected device; provisions service elements for the applicable service to a User Services Platform endpoint associated with the applicable service and the connected device, the service elements enabling the User Services Platform endpoint to implement the applicable service in association with the connected device; and receives notification that the service elements for the applicable service have been provisioned at the User Services Platform endpoint. | 2019-04-04 |
20190104034 | METHOD FOR DETERMINING FEATURE UTILIZATION IN A SOFTWARE-DEFINED NETWORK - In a computer-implemented method for determining feature utilization in a software-defined network, an available feature set for the software-defined network is determined, wherein the available feature set is based on a version of the software-defined network. Features enabled on the software-defined network are determined. The features enabled in the software-defined network are compared to the available feature set. A network profile score is generated based on the comparing, where the network profile score includes constituent feature scores for features of the available feature set. The network profile score is presented in a graphical user interface, the network profile score providing an indication of feature utilization of the available feature set, where the graphical user interface allows for receiving a user interaction for presenting the constituent feature scores for the features of the available feature set responsive to the user interaction. | 2019-04-04 |