17th week of 2022 patent applcation highlights part 68 |
Patent application number | Title | Published |
20220131672 | METHOD AND DEVICE FOR REPETITIVE TRANSMISSION/ RECEPTION OF DOWNLINK CONTROL INFORMATION IN WIRELESS COMMUNICATION SYSTEM - A method and device for repetitive transmission/reception of downlink control information in a wireless communication system is disclosed, the method performed by a user equipment (UE) in the wireless communication system comprises transmitting, to a base station, first information related to physical downlink control channel (PDCCH) repetition transmission, the first information including second information associated with a number of blind decoding times of PDCCH candidates, receiving, from the base station, configuration information on a control resource set and a search space configured for PDCCH transmission, and receiving, from the base station, control information on a first PDCCH and a second PDCCH based on the first information and the configuration information, the second PDCCH being a repetition of the first PDCCH. | 2022-04-28 |
20220131673 | VALIDATION FOR CONTROL INFORMATION FOR SEMI-PERSISTENT SCHEDULING CANCELLATION - Control information such as downlink control information (DCI) may be used to indicate whether the DCI is for semi-persistent scheduling (SPS) cancellation. For example, the base station may transmit, to a user equipment (UE), first DCI to trigger an SPS configuration of a plurality of SPS occasions. The base station may further determine to cancel one or more SPS occasions of the plurality of SPS occasions, and transmit second DCI to trigger an SPS cancellation that cancels the one or more SPS occasions, the second DCI including at least a redundancy version field including one or more redundancy version values to indicate the SPS cancellation. | 2022-04-28 |
20220131674 | DETERMINATION OF GEOGRAPHIC RANGES IN SIDELINK COMMUNICATIONS INTRODUCTION - Certain aspects of the present disclosure provide methods and apparatus for determining a Zone identifier (ID), Zone Center, and negative acknowledgement (NACK) ranges. Included are operations and means at a receiving user equipment (UE) to determine a current geographic location (GLL) of the receiving UE, and select a Zone ID based on a two-dimensional (2-D) lookup into an indexed array with the current GLL, the indexed array storing Zone data for one or more geographic Zones. The Zone data for each geographic Zone may be indexed according to geographic position, and include a Zone ID, Zone center, and one or more NACK ranges, each NACK range corresponding with a geographic Zone disposed about the geographic Zone corresponding to the Zone ID. Operations further include performing a NACK operation based on the selected Zone ID and a NACK range. | 2022-04-28 |
20220131675 | ELECTRONIC DEVICE, WIRELESS COMMUNICATION METHOD, AND COMPUTER-READABLE MEDIUM - The present disclosure relates to an electronic device, a wireless communication method, and a computer-readable medium. The electronic device for wireless communication according to one embodiment comprises a processing circuit. The processing circuit is configured to obtain a set of collaborative devices of a target device, the set of collaborative devices comprising one or more collaborative devices. The processing circuit is further configured to control to send data for the target device to the target device and at least one collaborative device so that the at least one collaborative device forwards the data to the target device. | 2022-04-28 |
20220131676 | SYSTEM AND METHOD FOR UE TRIGGERED CSI-RS - Disclosed are systems, methods, and one or more computer-readable media (CRM) storing instructions for the triggering of a channel state information reference signal (CSI-RS) by user equipment (UE) in a wireless cellular network. The UE measures a downlink reference signal. The UE also determines a condition for triggering a channel state information reference signal (CSI-RS) is satisfied based on the downlink reference signal. Then, the UE transmits a request for a base station of the wireless cellular network to provide the CSI-RS to the UE based on the condition being satisfied. | 2022-04-28 |
20220131677 | WIRELESS COMMUNICATION METHOD AND USER EQUIPMENT FOR TRANSMISSION ON DIFFERENT BANDWIDTH PARTS - A wireless communication method, performed by a User Equipment, for transmission on different BandWidth Parts (BWPs) includes receiving, a radio resource control (RRC) message configuring a first Physical Uplink Control CHannel-Configuration (PUCCH-Config) for a first UpLink (UL) BandWidth Part (BWP) of a first cell and a second PUCCH-Config for a second UL BWP of a second cell; receiving, from the first cell, Downlink Control Information (DCI) including fields to indicate a duration and a switching indication; and transmitting a PUCCH on the second UL BWP after receiving the DCI if the switching indication indicates the second cell. | 2022-04-28 |
20220131678 | METHOD AND APPARATUS FOR ASYMMETRICAL COMMUNICATION - A method and system for controlling a full-duplex communication system to operate as a time domain duplexing system with dynamic bandwidth allocation. One method includes detecting a change in conditions which necessitates an updated transmit time allocation and generating a LLDP advertisement which reflects the updated transmit time allocation. The initiating port transmits the LLDP advertisement to a link partner to notify the link partner of the updated transmit time allocation and in response, the initiating port receives a link partner LLDP advertisement from the link partner. The updated transmit time allocation is provided to a TCI client and the TCI client updates the reconciliation sublayer with updated transmit time allocation. Then implementing, using the reconciliation sublayer, transmit time allocations for a PHY layer and a MAC layer. Transmitting the data with the PHY layer occurs over a channel during transmit time allocations as defined by the reconciliation sublayer. | 2022-04-28 |
20220131679 | Semi-Static and Dynamic TDD Configuration for 5G-NR - TDD configuration may be dynamically and/or semi-statically signaled to user equipment devices by a base station. Semi-static TDD configuration may include: an initial portion for downlink transmission; a flexible portion; and a terminal portion for uplink transmission. TDD structure of the flexible portion may be determined later by transmission of dynamic physical layer configuration information such as downlink control information (DCI) and/or slot format indicator (SFI). (The SFI may be included in a group common PDCCH of a slot.) The downlink portion and/or the uplink portion may include subsets whose nominal transmit direction is subject to override by transmission of dynamic physical layer configuration information. | 2022-04-28 |
20220131680 | ENHANCED DUPLEXING CAPABILITY SIGNALING - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first wireless node may transmit enhanced duplexing capability signaling that indicates a level from a plurality of levels, wherein the level corresponds to a supported enhanced duplexing capability of the first wireless node. The first wireless node may communicate with at least a second wireless node based at least in part on the supported enhanced duplexing capability of the first wireless node. Numerous other aspects are provided. | 2022-04-28 |
20220131681 | COMMUNICATION CONTROL APPARATUS AND COMMUNICATION CONTROL METHOD - In the related art, since there is a difference in communication delay time in a round-trip communication path due to packet clogging in a network configuration using a network relay device, there is a problem that time cannot be synchronized. In order to solve the above problem, in the present invention, a time synchronization unit | 2022-04-28 |
20220131682 | MISSION CRITICAL COMMUNICATION LINK HUB - A method for hub for interfacing between a wireless mission critical communication link (MCCL) and a wired MCCL. The hub includes a wired interface a providing a physical layer connectivity to the wired MCCL; a plurality of ports coupled to the wired interface; a wireless interface providing a physical layer connectivity to the wireless MCCL; and a processor; and a memory containing instructions that, when executed by the processing circuitry, configure the hub to: receive a signal from a primary device through the wireless MCCL; determine a wireless communication cycle of the primary device; determine a wired communication cycle of a secondary device, wherein the secondary device is connected via the wired MCCL; synchronize a start time of the wired communication cycle to a start of the wireless communication cycle; and send the received signal to the secondary device at the synchronized start time of the wired communication cycle. | 2022-04-28 |
20220131683 | TEXT WATERMARKING METHOD AND APPARATUS FOR HIDING INFORMATION INTO TEXT DOCUMENTS - One aspect of the present invention discloses a text watermarking method for hiding user information. The text watermarking method comprises inputting encryption variable set information with which to encrypt a target document, wherein the target document includes text, generating an encrypted block based on the encryption variable set information and embedding the encrypted block into the target document by using an embedding rule of the encrypted block. The encryption variable set information includes a predetermined random key value, a user ID, and information indicating the embedding rule of the encrypted block. The predetermined random key value and the information indicating an embedding rule of the encrypted block are managed in a non-disclosure manner. | 2022-04-28 |
20220131684 | HASH ALGORITHM METHOD, HASH ALGORITHM CIRCUIT, AND ELECTRONIC DEVICE - The present disclosure provides a hash algorithm circuit, a hash algorithm method, and an electronic device. The hash algorithm circuit is used to reduce fixed-length parallel data, and the reduced identifier can be used as an index reference, an identifier ID, an address extension bit, information summary, and so on. The hash algorithm circuit has the characteristics of low power consumption, low cost, etc., and can be integrated in a digital circuit. | 2022-04-28 |
20220131685 | METHOD AND APPARATUS FOR REGISTERING SHARED KEY - Provided is a method and apparatus for registering a shared key. A method of registering, by a second electronic device, a shared digital key in a target device includes receiving a digital key sharing attestation and a key tracking server (KTS) signature corresponding to the digital key sharing attestation, receiving an authentication request from the target device, and transmitting an authentication response including the digital key sharing attestation and the KTS signature to the target device in response to the authentication request. | 2022-04-28 |
20220131686 | SECURE KEY EXCHANGE USING KEY-ASSOCIATED ATTRIBUTES - A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface. | 2022-04-28 |
20220131687 | DEVICE AND METHOD FOR UPDATING IMMOBILIZER TOKEN IN DIGITAL KEY SHARING SYSTEM - The disclosure relates to a method of updating an immobilizer token. A target device according to various embodiments of the disclosure may generate a first temporary encryption key pair for encryption and decryption of an immobilizer token, may transmit, to an immobilizer token issuance device, an immobilizer token issuance request including a first temporary public encryption key of the generated first temporary encryption key pair, may receive, from the immobilizer token issuance device, an encrypted immobilizer token and a second temporary public encryption key generated by the immobilizer token issuance device, may decrypt the encrypted immobilizer token by using the second temporary public encryption key and a first temporary private encryption key of the first temporary encryption key pair, and may store the decrypted immobilizer token in a confidential mailbox of the digital key in a secure element. | 2022-04-28 |
20220131688 | AUTHENTICATION USING KEY AGREEMENT - A client may transmit an authentication request to a server. The server may initiate a key agreement process using a short-lived private key generated at the server and a public key of the device, generate a shared secret, and derive a symmetric key. The symmetric key may be used to encrypt a random challenge. Further, the server initiates a key agreement process for the client using the partial private key that was generated for the client and the short-lived public key generated at the server. A partial key agreement result and the encrypted random challenge may be transmitted to the client. The client may complete the key agreement process using the partial key agreement result and a respective portion of the private key. The client may derive the encryption key and decrypt the random challenge. An indication of the random challenge may be transmitted to the server, which authenticates the client. | 2022-04-28 |
20220131689 | COMMUNICATION DEVICE, COMPUTER PROGRAM PRODUCT, AND COMMUNICATION SYSTEM - According to an embodiment, a communication device includes a plurality of communication processors, and one or more processors. Each of the communication processors is configured to generate an encryption key by quantum key distribution with an external communication device, encrypt data by using the generated encryption key, and transmit the data to the external communication device. The one or more processors are configured to: divide data requested to be transmitted by an application into a plurality of pieces of transmission data; and determine, from among the plurality of communication processors, one or more communication processors to be used for transmission of the divided plurality of pieces of the transmission data. | 2022-04-28 |
20220131690 | HOMOMORPHIC ENCRYPTION WITH QUANTUM KEY DISTRIBUTION ENCAPSULATION - Systems and methods for processing and transmission of encrypted data are provided. The method includes: encrypting a first data set; encapsulating the encrypted first data set in a protective layer; and transmitting the encapsulated encrypted first data set to a destination over one or more communication channels. The encrypting is performed by using a homomorphic encryption (HE) technique. The encapsulating is performed by using a quantum key distribution (QKD) encapsulation technique to generate a QKD-protected layer. The communication channels may include a classical/non-quantum channel over which the QKD-encapsulated encrypted first set of data is transmitted and a quantum channel over which a quantum key distribution is conducted, or a single communication channel to conduct both. | 2022-04-28 |
20220131691 | UPDATING PUBLIC KEY CERTIFICATES IN NETWORK DEVICES USING A BLOCKCHAIN NETWORK - Examples relate to a BC network including a plurality of network devices deployed in a network. The plurality of network devices includes an authoritative network device that generates a transaction in a distributed ledger. The transaction includes location information of a new public key certificate to be deployed in each of the network devices. In order to verify the transaction, a network device of the plurality of network devices verifies, using a smart contract, whether the new public key certificate is valid and whether the new public key certificate is different from a previously recorded public key certificate in the distributed ledger. In response to successful verification by at least a predefined number of network devices of the plurality of network devices, each of the network device record the transaction in the distributed ledger. | 2022-04-28 |
20220131692 | System And Method For Reliable Destruction of Cryptographic Keys - The present disclosure provides for a logical treadmill of encryption keys which are created, distributed, and destroyed on a predictable schedule. It further provides for a read-only interface for a remote procedure call (RPC) infrastructure, the interface providing cryptographic oracle access to keys on the treadmill. | 2022-04-28 |
20220131693 | PUBLIC KEY PROTECTION TECHNIQUES - Methods, systems, and devices for public key protection techniques are described. An embedded multimedia card (eMMC) may be formatted to include a permanent write protect group that is configured to prevent disabling of write protection for data stored in the permanent write protect group. The eMMC may store a public key associated with a first host device in the permanent write protect group of the eMMC. A data package may be received from the host device and authenticated by using the public key stored in the permanent write protect group. The embedded memory controller may be configured to prevent modifying or writing data to a permanent write protect group. | 2022-04-28 |
20220131694 | ERROR-CORRECTING KEY AGREEMENT FOR NOISY CRYPTOGRAPHIC SYSTEMS - A system, method, and computer program product are provided for sending and receiving messages using a noisy cryptographic system. To send a message, N secret keys are negotiated using a noisy cryptographic system, where K secret keys are expected to be noiseless. A secret polynomial that includes the N secret keys is generated, and K points on the secret polynomial are derived. For each of the N secret keys, a secret key MAC key is derived and a secret key MAC is calculated using the derived secret key MAC key. A secret key MAC header is generated that includes an array of each of the secret key MACs and possibly a corresponding public key. Message integrity plaintext is generated that includes an encrypted message, the secret key MAC header, and an array of the K points on the secret polynomial. A final message that includes the message integrity plaintext is generated for being sent. | 2022-04-28 |
20220131695 | DISTRIBUTED SECURE COMMUNICATION SYSTEM - A distributed secure communication system includes a first System Control Processor (SCP) subsystem coupled to second and third SCP subsystems via a network. The first SCP subsystem identifies the second SCP subsystem, signs a first SCP authentication communication with a first private key to provide a first signed SCP authentication communication that it transmits to the second SCP subsystem. The first SCP subsystem receives a second signed SCP authentication communication from the second SCP subsystem, authenticates the second signed SCP authentication communication using a second public key associated with the second SCP subsystem and, in response, establishes a first secure communication channel with the second SCP subsystem. The first SCP subsystem then receives an attestation of an authentication of the third SCP subsystem from the second SCP subsystem and, in response, establishes a second secure communication channel with the third SCP subsystem without the transmission of signed SCP authentication communications. | 2022-04-28 |
20220131696 | SECURE FILE SHARING METHOD AND SYSTEM - Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set associated with a first user device, and causes the encrypted data set shares to be stored separately from each other in at least one remote storage location. The processor generates first and second encrypted keys by encrypting data indicative of the symmetric key with a first asymmetric key of first and second asymmetric key pairs associated with the first user device and a second user device, respectively, and causes the encrypted key to be stored in the at least one storage location. To restore the data set, a predetermined number of the two or more encrypted data set shares and at least one of the second asymmetric keys of the first and second asymmetric key pairs are needed. | 2022-04-28 |
20220131697 | Using Signed Tokens to Verify Short Message Service (SMS) Message Bodies - Aspects of the disclosure relate to message verification. A computing platform may generate a cryptographic key pair comprising a public key and a private key. The computing platform may publish, to a server, the public key. The computing platform may generate a short message service (SMS) message. The computing platform may sign, using the private key, the SMS message, which may include computing a cryptographic hash of the SMS message using the private key and embedding the cryptographic hash in an SMPP field of the SMS message. The computing platform may send, to a downstream computing system, the signed SMS message, where the downstream computing system may be configured to validate the signed SMS message using the cryptographic hash embedded in the SMPP field of the SMS message and by accessing the public key. | 2022-04-28 |
20220131698 | VERIFICATION OF BIOMETRIC TEMPLATES FOR PRIVACY PRESERVING AUTHENTICATION - Secure protocols for external-facing authentication are provided for both user templates stored on their devices and the biometric measurement captured by external sensors of an access device. The protocols provide different levels of security, ranging from passive security with some leakage to active security with no leakage. A packing technique is also provided. Zero-knowledge techniques are used during enrollment to validate a norm of user templates and knowledge of the plaintext biometric template. One enrolled, the verifier can sign the encrypted template for use in a later matching phase with an access device. | 2022-04-28 |
20220131699 | METHOD AND SYSTEM FOR MONITORING AND CONTROLLING HIGH RISK SUBSTANCES - In a system and method for globally tracking, monitoring, and authorizing the dispensing of valuable and high-risk products such as drugs, secure delivery devices are needed, coupled to a blockchain serving as a distributed database forming a ledger of the journey of the devices and the dispensing of the product, to allow changes to the ledger to be agreed upon by participants in the blockchain through a consensus mechanism. | 2022-04-28 |
20220131700 | Virtual Subscriber Identification Module and Virtual Smart Card - A system, method and apparatus to authenticate an endpoint having a secure memory device. For example, a card profile can be selected, configured, and/or stored into the secure memory device based on endpoint identity data representative of a component configuration of the endpoint, including the device identity representative of the memory device and other components. The card profile can be used by the endpoint to emulate a physical smart card and can be viewed a virtual smart card, such as a virtual subscriber identification module (SIM) card for accessing a cellular connection. | 2022-04-28 |
20220131701 | DONGLE FOR CIPHERING DATA - A dongle for ciphering, receiving and transmitting data to and from an external device is provided. The dongle includes a user interface configured to receive authentication data to confirm an identity of a user. The dongle is disabled for ciphering data unless an authorised user is identified. A data transfer channel is configured to couple the dongle to the external device to receive and transmit user data between the dongle and the external device. A hardware encryption engine is configured to perform a ciphering transformation on user data received from the external device. The dongle is configured to perform a return transmission to return the user data that has been transformed to the external device via the data transfer channel in real-time using a single data transfer channel without storage of the user data on the dongle. | 2022-04-28 |
20220131702 | TRACKING DATA THROUGHOUT AN ASSET LIFECYCLE - Aspects of the disclosure relate to enhanced tracking of data over an asset lifecycle. A computing platform may receive, via the communication interface, user account information as part of an onboarding process in which a first user account is created. The computing platform may then compute, using a cryptographic hash function, a first hash value associated with the first user account, wherein the first hash value provides a trackable, immutable code corresponding to the first user account. Thereafter, the computing platform may monitor one or more events in a transaction activity pool. Upon detecting a new activity associated with the first user account in the transaction activity pool, the computing platform may append the new activity to a record in a trackable log linked to the first hash value. | 2022-04-28 |
20220131703 | Authenticating Communications Between Physical Ports Using Knowledge of Shared Secrets - Techniques are provided for authenticating communications between physical ports using knowledge of shared secrets. One method comprises receiving, by a first entity, a connection request to establish a communication between physical ports of the first entity and a second entity; providing a first pseudo-random value to the second entity; obtaining a shared secret for communications with the second entity; generating a first hash value based on the shared secret and the first pseudo-random value; obtaining a second hash value from the second entity based on the shared secret and the first second pseudo-random value; and authenticating the communication in response to the first entity validating the first hash value using the second hash value. An encryption key based on the shared secret can protect communications between the physical ports of the first and second entities. | 2022-04-28 |
20220131704 | BLOCKCHAIN MACHINE COMPUTE ACCELERATION ENGINE - Embodiments herein describe a hardware accelerator for a blockchain node. The hardware accelerator is used to perform a validation operation to validate one or more transactions before those transactions are committed to a ledger of a blockchain. The blockchain may include multiple peer-nodes, each of which contains standard software running on a server or container. Instead of validating a block of transactions using software, the hardware accelerator can validate the transactions in a fraction of the time. The peer-node software then gathers the validation results from the hardware accelerator and combines the results with received block data to derive the block which is committed to the stored ledger. | 2022-04-28 |
20220131705 | BLOCKCHAIN-BASED DISTRIBUTED LEDGERS FOR IMAGE FORMING APPARATUSES - In one example, a cloud printing server may include a processor and a memory coupled to the processor. The memory may include a blockchain management component to register an image forming apparatus with a blockchain associated with multiple entities of a blockchain network, create a distributed ledger relating to the blockchain, create a ledger entry including information indicating operational state and configuration data of the image forming apparatus in the distributed ledger, and transmit an instance of the distributed ledger to the multiple entities including the image forming apparatus. | 2022-04-28 |
20220131706 | ODD INDEX PRECOMPUTATION FOR AUTHENTICATION PATH COMPUTATION - In one example an apparatus comprises a computer-readable memory, signature logic to compute a message hash of an input message using a secure hash algorithm, process the message hash to generate an array of secret key components for the input message, apply a hash chain function to the array of secret key components to generate an array of signature components, the hash chain function comprising a series of even-index hash chains and a series of odd-index hash chains, wherein the even-index hash chains and the odd-index hash chains generate a plurality of intermediate node values and a one-time public key component between the secret key components and the signature components and store at least some of the intermediate node values in the computer-readable memory for use in one or more subsequent signature operations. Other examples may be described. | 2022-04-28 |
20220131707 | Digital Signature Method, Signature Information Verification Method, Related Apparatus and Electronic Device - A digital signature method, a signature information verification method, a related apparatus and an electronic device are provided. The digital signature method includes: obtaining a to-be-sent file and a private key used by a first electronic device for digital signature, the private key including a first invertible matrix; generating L second tensors based on the first invertible matrix and a first tensor, the L second tensors including the first tensor and a tensor isomorphic to the first tensor; digitally signing the to-be-sent file based on a second invertible matrix and the first tensor, to obtain a first character string; constructing a hash value of a root node of a hash tree based on the L second tensors; generating signature information of the to-be-sent file based on the first character string, the first invertible matrix, the second invertible matrix, the L second tensors and the hash value of the root node. | 2022-04-28 |
20220131708 | EFFICIENT HYBRIDIZATION OF CLASSICAL AND POST-QUANTUM SIGNATURES - In one example an apparatus comprises verification circuitry to receive, in a RSA/ECDSA processor, an input message, compute, in the RSA/ECDSA processor, a hash digest (d) for the message, and provide the hash digest as an input to a XMSS/LMS processor. Other examples may be described. | 2022-04-28 |
20220131709 | Mutually Authenticated ECDHE Key Exchange for a Device and a Network Using Multiple PKI Key Pairs - A device can (i) store public keys Ss and Sn for a network and (ii) record private key sd. A network can record a corresponding private keys ss and sn. The device can (i) generate a device ephemeral PKI key pair (Ed, ed) and (ii) send public key Ed to the network. The device can receive an ephemeral public key Es from the network. The device can calculate values for A: an elliptic curve point addition over Ss, Sn, and Es, and B: (sd+ed) mod n. The device can input values for X and Y into an elliptic curve Diffie Hellman key exchange (ECDH) in order to determine a mutually derived shared secret X5, where the network can also derive shared secret X5. The device can (i) use X5 to derive a key K2 and (ii) decrypt a ciphertext from the network using key K2. | 2022-04-28 |
20220131710 | SYSTEM AND METHOD FOR A LOCAL SERVER WITH SELF-SIGNED CERTIFICATES - A system comprising a processor and a computer readable memory coupled to the processor, the computer-readable memory comprising computer program code executable by the processor to generate create a self-signed certificate, create a second certificate using the set of certificate generation parameters, the second certificate linked to the self-signed certificate, store the self-signed certificate in a certificate store of a first web browser; and store the second certificate in a local server certificate store to allow a local service to use the second certificate in a handshake to establish a secure socket connection with the first web browser in compliance with a mixed content security policy of the first web browser. | 2022-04-28 |
20220131711 | PROVIDING NOTIFICATION OF A CERTIFICATE OF VALIDITY TO A SERVICE PROVIDER - A media control device manages one or more digital certificates that may be related to communication of electronic content. An expiration date may be identified of at least one digital certificate. A validity time period may be identified of the at least one digital certificate. The validity time period may be based, at least in part, on a comparison between the expiration date and a target date. An expiration status of the at least one digital certificate may be determined. The expiration status may be negative when the validity time period is greater than a predetermined time period. The expiration status may be positive when the validity time period is less than, or equal to, the predetermined time period. An electronic notification indicating the expiration status for the at least one digital certificate may be sent when the expiration status is positive. | 2022-04-28 |
20220131712 | Electronic Devices and Corresponding Methods for Verifying Device Security Prior to Use - To ensure that an electronic device is a secure electronic device, a communication device transmits a request to authenticate the electronic device to a remote electronic device across a network. The communication device receives a security challenge. One or more processors of the electronic device obtain a response to the security challenge using a secret key stored in an encrypted memory of the electronic device. The communication device then transmits the response to the response to the security challenge to the remote electronic device. If the remote electronic device recognizes the response, it transmits a shared secret content marker, which can optionally be presented at a user interface of the electronic device. The request can be automatically initiated by a companion electronic device. | 2022-04-28 |
20220131713 | METHOD TO UTILIZE MISMATCH SIZE TO PRODUCE ADDITIONAL STABLE BIT IN TILTING PUF - A method for creating a physical unclonable function (PUF) bit for use with transistor circuitry includes performing a tilt test on a PUF cell of a transistor circuitry, comprising tilting the PUF cell at least once, and comparing a mismatch of a response of the PUF cell to a tilt threshold. A magnitude of the mismatch is determined. A mismatch magnitude below the tilt threshold is considered a first logic value” and a mismatch magnitude above the tilt threshold is considered a second logic value. The mismatch magnitude of the PUF cell is random. The absolute value of the mismatch magnitude is used as an entropy source to produce at least one PUF bit called a mirror PUF bit. | 2022-04-28 |
20220131714 | ETHERNET POWER SUPPLY DEVICE - An Ethernet power supply device is provided. The Ethernet power supply device includes a first switch, a second switch, and a processor. When the first switch detects that there is no adapter power supply, the first switch generates a first power supply according to a first network power from a first Ethernet network connector port. When the second switch detects that there is no adapter power supply, the second switch generates a second power supply according to a second network power from the second Ethernet network connector port. When there is no adapter power supply and the first power supply and the second power supply are at the same power level, the processor provides a first control signal to control the first switch to provide the first power supply to a power output terminal as an output power supply. | 2022-04-28 |
20220131715 | STATEFUL IGMP FASTLEAVE - Methods, systems, and computer readable media described herein can be operable to facilitate an IGMP fastleave using a listener reference count. A gateway proxy saves each listener for every specific multicast group, thus the gateway knows if a listener is the last one in the group when it receives a leave report from a listener. The gateway leaves the group immediately without sending specific query if the leave report comes from the last listener of the current group, thereby significantly reducing the leave latency. Otherwise, the standard procedure wins, and the gateway sends out a specific query when the leave report is not from the last listener. | 2022-04-28 |
20220131716 | Context-Dependent In-Call Video Codec Switching - A method for context-dependent in-call video codec switching includes receiving an indication that a far-side endpoint includes a capability to switch from an initial video codec to a secondary video codec during a call. During a call with the far-side endpoint, the method includes determining that a performance of an encoder satisfies a codec switching threshold. The codec switching threshold indicates that the performance of the encoder justifies switching from the initial video codec mid-stream of the call. During a call with the far-side endpoint, the method also includes switching from the initial video codec initially negotiated to govern the call to the secondary video codec. | 2022-04-28 |
20220131717 | SMART QUERY BUFFERING MECHANISM - A method, apparatus and computer program product for controlling a web-based presentation is described. In an embodiment of the invention, the already presented content and future content of the presentation is analyzed. When a user question is received from a user terminal communicatively coupled to the web-based presentation, the user question is buffered so that the system can determine whether content answering the user question has been or will be presented in the presentation based on the analyzed content. Responsive to the determination, the system will perform an action. In embodiments, the system will provide the user one of the following: 1) the system will provide a notification related to the answering content in a user interface, if the answering content has been, or will be, presented in the presentation, and maintaining the user question in a buffer state; or 2) the system will release the user question from the buffer state to allow the user question to be forwarded to a presenter of the presentation if the content has not been, and will not be, presented. | 2022-04-28 |
20220131718 | SYSTEM AND METHOD FOR CONTROLLING DEVICES - Systems and methods are described for controlling and orchestrating devices. The systems and methods receive information in the form of requests indicating that attributes of the devices are to be changed and generate event expressions corresponding to the requests or data. The event expressions are interpreted to select target devices having attributes to be changed as a result of the event, with device control commands being generated to change the attributes of the devices. The systems and methods may use near natural language syntax in the event expressions. The systems and methods may also use digital twins of the devices, with the digital twins having virtual attributes corresponding to the attributes of the devices. | 2022-04-28 |
20220131719 | FORWARDING DOMAIN ALLOCATION METHOD AND APPARATUS, STORAGE MEDIUM, AND ELECTRONIC DEVICE - Provided are a forwarding domain allocation method and device, a storage medium, and an electronic device. The method may includes: acquiring target messages from different input ports, the number of the acquired target messages being greater than or equal to the number of input ports; acquiring identifier information carried in the target message; and on the basis of the identifier information carried in the target message, allocating a forwarding domain to the target message. | 2022-04-28 |
20220131720 | METHOD FOR SUPPORTING PORT ASSOCIATION, GATEWAY SELECTION METHOD, AND COMMUNICATIONS DEVICE - Embodiments of this disclosure provide a method for supporting port association, a gateway selection method, and a communications device. The method for supporting port association, applied to a first communications device, includes: performing a first operation, where the first operation includes at least one of the following: determining a port corresponding to a port related information container; determining a port corresponding to a port related information container; and transmitting signaling related to the tunnel, where the signaling related to the tunnel includes a port related information container; or transmitting a port related information container to the tunnel. | 2022-04-28 |
20220131721 | VPWS signaling using Segment Routing - Systems and methods include obtaining a plurality of services supported at the node; determining a bitmask to represent the plurality of services supported at the node, wherein the bitmask includes a starting service and each subsequent bit representing another service of the plurality of services and with each bit in the bitmask set based on the plurality of services supported at the node; and transmitting an advertisement to nodes in the Segment Routing network with a starting Service SID value and the bitmask based on the plurality of services supported at the node. The plurality of services can include any of a Virtual Private Wire Service (VPWS) and a Flexible Cross Connect (FXC) service. | 2022-04-28 |
20220131722 | COMMUNICATION SYSTEM AND COMMUNICATION METHOD - when packets are received via any one of the plurality of inflow VRFs provided for respective route patterns, a chaining edge router ( | 2022-04-28 |
20220131723 | SENSING-ASSISTED CHANNEL ESTIMATION - Some embodiments of the present disclosure provide for use of a linear chirp signal as a basis for a sensing signal. Modification of the linear chirp signal by a signature function can allow a receiver of the sensing signal to determine an identity for a source of the sensing signal. Accordingly, upon processing the received sensing signal to obtain path parameter estimates, the receiver can direct a transmission of an indication of the path parameter estimates to the source of the sensing signal. Aspects of the present application relate to performing multi-node, multi-path channel estimation on the basis of processing the received sensing signal. Conveniently, the processing is performed with low complexity. | 2022-04-28 |
20220131724 | EQUALIZATION IN HIGH-SPEED DATA CHANNEL HAVING SPARSE IMPULSE RESPONSE - A physical layer transceiver, for connecting a host device to a wireline channel medium that is divided into a total number of link segments, includes a host interface for coupling to a host device, a line interface for coupling to the wireline channel medium, and feed-forward equalization (FFE) circuitry operatively coupled to the line interface to add back, into a signal, components that were scattered in time. Respective individual filter segments are selectably configurable, by adjustment of respective delay lines, to correspond to respective individual link segments. The FFE circuitry also includes control circuitry configured to detect a signal energy peak in at least one particular link segment and, upon detection of the signal energy peak in the particular link segment, configure a respective one of the respective individual filter segments, by adjustment of a respective delay line, to correspond to the respective particular link segment. | 2022-04-28 |
20220131725 | CHANNEL OCCUPANCY TIME (COT) STRUCTURE IN NEW RADIO (NR) SYSTEMS OPERATING ON UNLICENSED SPECTRUM - Some embodiments of this disclosure include systems, apparatuses, methods, and computer-readable media for use in a wireless network for generating and using slot format indicator (SFI) and channel occupancy time (COT) structure in new radio (NR) systems operating on unlicensed spectrum. For example, some embodiments are directed to a base station that includes radio front end circuitry and processor circuitry. The processor circuitry can be configured to generate a slot format indicator (SFI) associated with a channel occupancy time (COT) structure. The SFI indicates whether one or more slots associated with the COT structure are to be used for downlink (DL) symbols, uplink (UL) symbols, or flexible symbols. The flexible symbols form one or more gaps in the COT structure in response to the flexible symbols not being overridden as a DL transmission or a UL transmission. The processor circuitry can further be configured to transmit the SFI to a user equipment (UE). | 2022-04-28 |
20220131726 | WIDEBAND VECTOR MODULATOR PHASE SHIFTER - Methods and apparatus for implementing passive wideband phase shifters are described. The phase shifters exhibit good linearity over a wide range of frequencies. Furthermore at least some features are directed to allowing the phase shifters to be implemented in some embodiments in a relatively compact manner making such embodiments well suited for supporting arrays and/or other implementations where a large number of phase shifters are to be implemented in a relatively small chip area. | 2022-04-28 |
20220131727 | DOWNLINK (DL) POSITIONING REFERENCE SIGNAL (PRS) BANDWIDTH PART (BWP) CONFIGURATION REFERENCE SIGNAL DESIGN AND USER EQUIPMENT (UE) BASED POSITIONING ENHANCEMENTS FOR NEW RADIO (NR) POSITIONING - Systems, apparatuses, methods, and computer-readable media are provided for an access point (AP) for a wireless communication system. The AP includes processor circuitry configured to configure a bandwidth part (BWP) for downlink (DL) positioning reference signals (PRS) and a BWP for DL data transmission to a user equipment (UE), wherein the BWP for DL PRS provides DL PRS to the UE for a UE-based positioning operation. The processor circuitry is configured to select an action to be performed by the UE in response to receiving the configured BWP for DL PRS and the configured BWP for DL data transmission by the UE. The AP includes radio front end circuitry that is coupled to the processor circuitry and configured to transmit, to the UE, the configured BWP for DL PRS, the configured BWP for DL data transmission, and the selected action. The wireless communication is a 5G system or a 5G new radio (5G-NR) system. | 2022-04-28 |
20220131728 | Short Training Sequence Design Method and Apparatus - The application provides a short training sequence design method and apparatus. The method includes: determining a short training sequence, where the short training sequence may be obtained based on an existing sequence, and the short training sequence with comparatively good performance may be obtained through simulation calculation, for example, by adjusting a parameter, and sending a short training field on a target channel, where the short training field is obtained by performing inverse fast Fourier transformation IFFT on the short training sequence, and a bandwidth of the target channel is greater than 160 MHz. | 2022-04-28 |
20220131729 | METHOD FOR DETERMINING LINK AVAILABILITY FOR IAB NODE, AND NODE USING SAME METHOD - The present specification provides a method for receiving information on a guard symbol, which is performed by a node in a wireless communication system, the method comprising: receiving information on the guard symbol; and applying the information on the guard symbol, wherein the information on the guard symbol indicates the number of guard symbols for each combination of a mobile terminal (MT) operation and a distributed unit (DU) operation, and the guard symbol is a symbol that is not used on the basis of a transition between the MT operation and the DU operation. | 2022-04-28 |
20220131730 | SYMBOL PROCESSING METHOD AND APPARATUS - This application provides a symbol processing method and related apparatus. The method includes: dividing a plurality of obtained complex-valued symbols into a plurality of sets, where each set corresponds to one transmit symbol, and the plurality of sets include a first set corresponding to a first transmit symbol; and mapping a first sequence and a second sequence to the first set, where an end position of the first sequence is a position of intercepting a cyclic prefix (CP) in the first transmit symbol, and an end position of the second sequence is an end position of the first transmit symbol. By mapping the sequences to the sets, an original cyclic prefix (CP) can be extended using a sequence with a flexible length, and flexible guard periods of different lengths can be configured for different users by adjusting the length of the sequences. | 2022-04-28 |
20220131731 | METHOD AND DEVICE FOR TRANSMITTING AND RECEIVING WIRELESS SIGNALS IN WIRELESS COMMUNICATION SYSTEM - The present invention relates to a wireless communication system, and specifically, to a method and a device for the method, the method comprising: a step for receiving SRS configuration information; a step for performing a CAP for SRS transmission for each symbol, starting from the first symbol among a plurality of symbols, on the basis of the SRS configuration information; and a step for performing an SRS transmission process on the basis of a successful CAP in the Mth symbol among the plurality of symbols, wherein the SRS transmission is performed on the Mth symbol among the plurality of symbols on the basis of M being equal to or less than a reference value, and the SRS transmission is canceled even in all of the symbols after the Mth symbol among the plurality of symbols on the basis of M being greater than the reference value. | 2022-04-28 |
20220131732 | TRANSMITTING APPARATUS, RECEIVING APPARATUS, TRANSMITTING METHOD, AND RECEIVING METHOD - A transmitting apparatus includes a first signal generating unit that generates, on the basis of data a first signal transmitted by single carrier block transmission; a second signal generating unit that generates, on the basis of an RS, a second signal transmitted by orthogonal frequency division multiplex transmission; a switching operator that selects and outputs the second signal in a first transmission period and selects and outputs the first signal in a second transmission period; an antenna that transmits the signal output from the switching operator; and a control-signal generating unit that controls the second signal generating unit such that, in the first transmission period, the RS is arranged in a frequency band allocated for transmission of the RS from the transmitting apparatus among frequency bands usable in OFDM. | 2022-04-28 |
20220131733 | METHOD FOR DETERMINING LINK AVAILABILITY FOR IAB NODE, AND NODE USING SAME - The present specification provides a method for receiving gap symbol information, the method being performed by a node in a wireless communication system. The method is characterized by including: receiving the gap symbol information, wherein the gap symbol information indicates the number of gap symbols pertaining to switching between a mobile terminal (MT) operation and a distributed unit (DU) operation; and performing an integrated access and backhaul (IAB) operation on the basis of the gap symbol information, wherein the node does not perform the IAB operation on the symbol indicated by the gap symbol information. | 2022-04-28 |
20220131734 | BANDWIDTH CONSTRAINED COMMUNICATION SYSTEMS WITH FREQUENCY DOMAIN INFORMATION PROCESSING - The present disclosure provides techniques for bandwidth constrained communication systems with frequency domain information processing. A bandwidth constrained equalized transport (BCET) communication system can include a transmitter, a communication channel, and a receiver. The transmitter can include a pulse-shaping filter that intentionally introduces memory into a signal in the form of inter-symbol interference, an error control code (ECC) encoder, a multidimensional fast Fourier transform (FFT) processing block that processes the signal in the frequency domain, and a first interleaver. The receiver can include an information-retrieving equalizer, a deinterleaver with an ECC decoder, and a second interleaver joined in an iterative ECC decoding loop. The communication system can be bandwidth constrained, and the signal can comprise an information rate that is higher than that of a communication system without intentional introduction of the memory at the transmitter. | 2022-04-28 |
20220131735 | TRANSMITTER COMPLEX- AND REAL-VALUED IN-PHASE AND QUADRATURE MISMATCH PRE-COMPENSATORS - An in-phase and quadrature mismatch compensator for a quadrature transmitter includes a delay element, a complex-valued filter and an adder. The delay element receives an input transmit signal and outputs a delayed transmit signal. The complex-valued filter receives the input transmit signal and outputs a selected part of a filtered output transmit signal. The adder adds the delayed transmit signal and the selected part of the filtered output transmit signal and outputs a pre-compensated transmit signal. In one embodiment, the selected part of the filtered output transmit signal includes the real part of the complex-valued output transmit signal. In another embodiment, the selected part of the filtered output transmit signal includes the imaginary part of the complex-valued output transmit signal. Two transmit real-valued compensators are also disclosed that combine the in-phase and quadrature signals before being filtered. | 2022-04-28 |
20220131736 | SWITCH DEVICE FOR ONE-WAY TRANSMISSION - A switch device is provided. The switch device includes a switch and a one-way link circuit, wherein the switch including a first port, a second port, and a third port. The third port coupled to the second port via a first path and coupled to the first port via a second path. An input terminal of the one-way link circuit is coupled to the first port. | 2022-04-28 |
20220131737 | NETWORK DATA MANAGEMENT FRAMEWORK - A method includes receiving a plurality of inputs comprising data corresponding to a plurality of network elements, confirming presence of a given network element of the plurality of network elements on at least one network, and adding the given network element to a network element database. The method also includes interfacing with one or more network integration services of a plurality of network integration services to receive data corresponding to the given network element. The network element database is automatically updated with the received data, and the interfacing is performed via a message bus. | 2022-04-28 |
20220131738 | SERVICE LAYER RESORCE MANAGEMENT FOR GENERIC INTERWORKING AND EXTENSIBILITY - Lightweight, dynamic mechanisms are provided to support service layer interworking and resource extensibility. For example, one mechanism disclosed herein comprises defining a new service layer (SL) resource definition registration procedure that allows for specifying custom attributes of service layer resources to represent third party technology resources. A second mechanism disclosed herein comprises defining a new SL data model mapping registration procedure to map service layer resources to third party data models and to provide a new interworked retargeting indicator to the service layer. Further, a third mechanism disclosed herein comprises defining a SL generic interworking procedure to intelligently retarget requests toward interworked resources based on the interworked retargeting indicator provided by the data model mapping. | 2022-04-28 |
20220131739 | Method to Dynamicall Change Connectivity of Virtual Network Function (VNF) and Physical Network Function (PNF) Instances in New Radio (NR) Networks - Embodiments of a Network Manager (NM), a (NFVO), and methods of communication are disclosed herein. The NM may transfer, to the NFVO, an update NS request message to update the NS instance based on the new NSD. The NM may encode the update NS request message to include: an nsInstanceID parameter that identifies the NS instance, and an updateType parameter that indicates a type of update for the NS instance. One value of “AssocPnfWithPnfProfile” for the updateType parameter may indicate a request to associate the PNF of the NS instance with a new or updated PNF profile indicated by the new NSD. Another value of “AssocVnfWithVnfProfile” for the updateType parameter may indicate a request to associate the VNF of the NS instance with a new or updated VNF profile indicated by the new NSD. | 2022-04-28 |
20220131740 | METHOD AND SYSTEM OF A DYNAMIC HIGH-AVAILABILITY MODE BASED ON CURRENT WIDE AREA NETWORK CONNECTIVITY - In one aspect, a method useful for implementing high availability (HA) enhancements to a computer network, comprising the steps of: providing a first edge device of a local area network (LAN); providing a second edge device of the LAN; providing a gateway system to the LAN from a wide area network; detecting that an HA cable between the first edge device and the second edge device is disconnected; establishing a network connection between the gateway system and the second edge device; with the gateway system: determining that the first edge device is active and passing network traffic, implementing a network tunneling protocol with second edge device. | 2022-04-28 |
20220131741 | METHOD AND SYSTEM FOR DETECTING AND MITIGATING CABLING ISSUES WITH DEVICES IN SUBSTATION AUTOMATION SYSTEMS - The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue. | 2022-04-28 |
20220131742 | INFRASTRUCTURE APPLIANCE MALFUNCTION DETECTION - A management system is described. The management system includes an interface coupled to a plurality of infrastructure appliances and one or more processors to monitor each of the plurality of infrastructure appliances, detect a malfunction at a first of the infrastructure appliances, and transmit a display message to the first infrastructure appliance including a message to be displayed at one or more activity light indicators at the first infrastructure appliance. | 2022-04-28 |
20220131743 | CLOUD COMPUTING INFRASTRUCTURE PIPELINES WITH RUN TRIGGERS - Systems and methods of managing information technology infrastructure are described. A method includes identifying a run trigger between a first node and a second node, each node maintaining a configuration for a portion of a cloud computing infrastructure associated with executing a portion of a cloud-based application. The run trigger initiates in response to an action at the first node and comprises a source identifier identifying the first node and a destination identifier identifying the second node. Then a run is queued on the second node based on the run trigger, the run including a process executed on the second portion of the cloud computing infrastructure with data received by the second node and associated with a run source identifier. The run on the second node is then planned and executed, causing the cloud computing infrastructure to modify infrastructure resources associated with the second portion of the cloud computing infrastructure. | 2022-04-28 |
20220131744 | INTERCONNECTION PLATFORM FOR REAL-TIME CONFIGURATION AND MANAGEMENT OF A CLOUD-BASED SERVICES EXCHANGE - In one example, a cloud-based services exchange comprises a plurality of interconnection assets configured to connect a customer of the cloud-based services exchange to one or more cloud service providers, the plurality of interconnection assets including a virtual circuit by which the customer accesses a cloud service from the one or more cloud service providers; and an orchestration engine configured to modify the plurality of interconnection assets. | 2022-04-28 |
20220131745 | METHOD AND DEEP REINFORCEMENT NEURAL NETWORK (DRNN) MANAGEMENT SYSTEM FOR AN INTELLIGENT PLUG-AND-PLAY POINT-TO-MULTIPOINT INTERNET of THINGS (IoT) PLATFORM - An Internet of Things (IoT) system is disclosed which includes: a network; a plurality of IoT servers coupled together and serviced by the network; a plurality of IoT agents coupled to each other and to the plurality of IoT servers; and a plurality of IoT devices electrically coupled to the plurality of IoT agents, wherein the IoT servers and the IoT agents further includes a deep reinforcement neural network operative to generate an action map {a | 2022-04-28 |
20220131746 | DATA CENTER RESOURCE TRACKING - Disclosed herein are systems, methods, computer media, and apparatuses for providing resource tracking, such as in a data center environment. A control and monitoring node receives updates indicating instantiation of resources in the computing system network. The control and monitoring node determines that there are duplicate resources in the network, and then determines which of the duplicate resources to provide connectivity to. The control and monitoring node provides network configuration updates to various networking resources in the network to provide network connectivity to the one of the duplicate resources in the network. | 2022-04-28 |
20220131747 | METHODS AND APPARATUS FOR ENHANCING SCHEDULER FAIRNESS IN SMALL-CELL WIRELESS SYSTEMS - Methods and apparatus for enhancing packet scheduler fairness in a small-cell wireless communication network. In one embodiment, the methods and apparatus utilize “quasi-licensed” CBRS (Citizens Broadband Radio Service) wireless spectrum in conjunction with 3GPP wireless communication network (e.g. 4G LTE or 5GNR) for the delivery of services to a number of enhanced CPE (consumer premises equipment), such as fixed wireless apparatus (FWAe). The various FWAe report Channel Quality Indicator (CQI) data to their respective serving base stations over time, and each base station both builds a statistical characterization of each FWAe, and maps the CQI data to a prescribed configuration (e.g., to the Modulation and Coding Scheme (MCS)) adaptively for the transmission of the data to the FWAe, and development of a scheduler priority for each FWAe. In one implementation, once the CQI values are stable for a given FWAe, CQI reporting is terminated for a period of time. | 2022-04-28 |
20220131748 | VIRTUAL SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) AUTOMATION CONTROLLER - One or more virtual supervisory control and data acquisition (SCADA) controllers are provided. The virtual SCADA controller(s) may be deployed upon a detection of a failure of a physical SCADA controller. An on-site module may detect failure including a security breach which causes the physical SCADA controller to be disconnected from a network and the virtual SCADA controller(s) to take over control. The virtual SCADA controller(s) may be on-site or off-site. | 2022-04-28 |
20220131749 | GEOGRAPHIC SERVICE CLASSIFICATION AND ROUTING - Methods, systems, and computer programs are presented for managing resources to deliver a network service in a distributed configuration. A method includes an operation for identifying resources for delivering a network service, the resources being classified by geographic area. Further, the method includes operations for selecting service agents to configure the identified resources, each service agent to manage service pools for delivering the network service across at least one geographic area, the service agents being selected to provide configurability for the service pools. The method further includes operations for sending configuration rules, to the service agents, configured to establish service pools for delivering the network service across the geographic areas. Service traffic information is collected from the service agents, and the resources are adjusted based on the collected service traffic information. Updated respective configuration rules are sent to each determined service agent based on the adjusting. | 2022-04-28 |
20220131750 | SYSTEM, METHOD, AND APPARATUS TO SUPPORT MIXED NETWORK COMMUNICATIONS ON A VEHICLE - An example system includes a system comprising a vehicle having a first network and a second network; a first device on the first network; and a converged network device (CND) interposed between the first network and the second network and structured to facilitate communications between the first device and the second network; wherein the first network is of a different type than the second network. | 2022-04-28 |
20220131751 | SYSTEM, METHOD, AND APPARATUS TO SUPPORT MIXED NETWORK COMMUNICATIONS ON A VEHICLE - An example system includes a mobile system having an Ethernet based network and a controller area network (CAN) based network; a CAN control device disposed onboard the mobile system, connected to the CAN based network, and structured to control operation of a component of the mobile system; an Ethernet control device disposed onboard the mobile system, connected to the Ethernet based network, and structured to electrically communicate with the CAN control device; an Ethernet switch disposed onboard the mobile system and having a plurality of physical ports connected to the Ethernet based network; a CAN gateway disposed onboard the mobile system and connected to the CAN based network and the Ethernet switch; and a network convergence circuit defined at least in part by the Ethernet switch and/or the CAN gateway, and structured to facilitate electronic communications between the Ethernet control device and the CAN control device. | 2022-04-28 |
20220131752 | SYSTEM, METHOD, AND APPARATUS TO SUPPORT MIXED NETWORK COMMUNICATIONS ON A VEHICLE - An example system includes a vehicle having a first network and a second network of a different type than the first network; and a communication device interposed between the first network and the second network and structured to: generate network status data by monitoring communications of one or more devices on the first and/or the second networks; and transmit the network status data to a sensor device external to the vehicle. | 2022-04-28 |
20220131753 | SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL - An example method includes interpreting a policy comprising a network usage permission description; configuring a gatekeeper interface circuit in response to the network usage permission description; and regulating communications, using the gatekeeper interface circuit, between: end points of at least one network zone of a mobile system; and at least one of an external communications portal or an external device. | 2022-04-28 |
20220131754 | SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL - An example system includes a vehicle having a first network zone and a second network zone of a different type than the first network zone; a gatekeeper interface circuit interposed between the first network zone and a transceiver selectively couplable to an external device, and further interposed between the second network zone and the transceiver; a policy manager circuit structured to interpret a policy comprising an external data routing description; and a configuration circuit structured to configure the gatekeeper interface circuit in response to the external data routing description; wherein the gatekeeper interface circuit is structured to regulate communications between end points of the first network zone and the transceiver, and to regulate communications between end points of the second network zone and the transceiver. | 2022-04-28 |
20220131755 | SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL - An example system includes a vehicle having a first network zone and a second network zone of a different type than the first network zone; a gatekeeper interface circuit interposed between the first network zone and a transceiver selectively couplable to an external device, and further interposed between the second network zone and the transceiver; a policy manager circuit structured to interpret a policy comprising an external data access description; and a configuration circuit structured to configure the gatekeeper interface circuit in response to the external data access description; wherein the gatekeeper interface circuit is structured to regulate communications between end points of the first network zone and the transceiver, and to regulate communications between end points of the second network zone and the transceiver. | 2022-04-28 |
20220131756 | AUTO SWITCHING FOR ENTERPRISE FEDERATED NETWORK SLICE - A method in which an enterprise switches its devices to various federated network slices across operators based on cost, time, quality, and/or availability parameters defined in flexible rules managed by the enterprise. The method includes obtaining, by a controller of an enterprise, one or more parameters of a device served by a network slice of a core network. The method further includes, based on the one or more parameters of the device and one or more rules, determining, by the controller, whether a triggering event associated with a slice reselection occurred and based on the triggering event and the one or more rules, selecting, by the controller, a federated network slice from among a plurality of network slices provided by a plurality of core networks. The method further includes the controller causing the device to switch from the network slice to the federated network slice. | 2022-04-28 |
20220131757 | INTERDOMAIN PATH CALCULATION BASED ON AN ABSTRACT TOPOLOGY - A processor generates an abstract topology that represents domains in an actual topology of a network and border routers that interconnect the domains in the actual topology. The processor prunes, based on the abstract topology, one or more of the domains from the actual topology during path calculations on the actual topology. In some cases, the processor determines measures of reachability for the nodes to indicate whether the domains represented by the nodes represent are on a path from a source domain to a destination domain. The processor can then selectively prune a relationship to at least one edge in the actual topology or modify weights of edges between the nodes in the actual topology based on the ranks of the nodes in the abstract topology. | 2022-04-28 |
20220131758 | RELAY NODE MANAGEMENT FOR OVERLAY NETWORKS - Embodiments are directed to managing communication over networks. A gateway identifier (GID), a network address, source nodes, relays, or the like, may be determined based on an overlay network. Two or more relays may be ranked based on metrics associated with each relay such that a top ranked relay is designated as a preferred relay. | 2022-04-28 |
20220131759 | ADVANCED NETWORK TRACING IN THE DATA PLANE - Systems and methods provide advanced network tracing techniques in the data plane. A data plane packet processing system can receive a request to trace a class of network traffic. The system can receive a plurality of packets. The system can determine on a per packet basis whether to trace the plurality of packets. The system can mark a trace flag associated with a first packet in response to determining that the first packets corresponds to the class of network traffic. The system can capture a trace entry for the first packet in response to determining that the tracing flag has been marked. The trace entry can be configured to include or exclude a packet count, a packet header, a packet payload, and/or processing information. In addition, the trace buffer for storing trace entries can be configurable (e.g., fixed-size buffer, circular buffer, or dynamic buffer). | 2022-04-28 |
20220131760 | METHODS AND SYSTEMS FOR NETWORK VERIFICATION USING HIERARCHY-BASED MODEL - Methods and systems for network verification are described. An input binary decision diagram (BDD) is defined to represent an input header space to query for a network property of interest. The input BDD is provided as input to a device-level BDD representing a source device in a logical topology representing connections among devices of the network. Each device in the network is represented by a respective device-level BDD in the logical topology. An output BDD is calculated, representing an output header space outputted by a destination device in the logical topology. The output BDD is calculated by sequentially applying, to the input BDD, each device-level BDD in a logical path from the source device to the destination device. The output BDD is then reported, and the reported output BDD is compared with an expected output BDD, to verify the network property of interest. | 2022-04-28 |
20220131761 | PEER RISK BENCHMARKING USING GENERATIVE ADVERSARIAL NETWORKS - A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network. | 2022-04-28 |
20220131762 | SYSTEM FOR REAL-TIME IMITATION NETWORK GENERATION USING ARTIFICIAL INTELLIGENCE - Systems, computer program products, and methods are described herein for real-time imitation network generation using artificial intelligence. The present invention is configured to electronically receive, from a computing device of a user, a real dataset; initiate one or more machine learning algorithms on the real dataset; determine, using the one or more machine learning algorithms, one or more data distribution parameters associated with the real dataset; electronically receive, from the computing device of the user, a first shift parameter; skew the one or more data distribution parameters using the first shift parameter to generate one or more skewed data distribution parameters; and generate, using the one or more machine learning algorithms, an imitation dataset using the one or more skewed data distribution parameters. | 2022-04-28 |
20220131763 | SYSTEM CONFIGURATION DERIVATION DEVICE AND SYSTEM CONFIGURATION DERIVATION METHOD - A system configuration derivation device | 2022-04-28 |
20220131764 | METHOD OF CONTROLLING STATE CONTROL PARAMETER FOR ADJUSTING STATE OF NETWORK OF BASE STATION BY USING ANY ONE OF PLURALITY OF MODELS AND ELECTRONIC DEVICE PERFORMING THE METHOD - A method, performed by an electronic device, of controlling a state control parameter for adjusting a state of a network of a base station, using any one of a plurality of models, includes: obtaining information related to the state of the network from the base station, performing simulation on each of the plurality of models based on the obtained information related to the state of the network, selecting any one model from among the plurality of models based on a result of the performed simulation, and transmitting a value of the state control parameter, calculated using the selected any one model, to the base station to update the state control parameter. | 2022-04-28 |
20220131765 | SYSTEMS AND METHODS FOR MODELING AND SIMULATING AN IOT SYSTEM - Methods and systems to model, simulate and continuously analyze global non-functional properties, such as profitability, availability, security and performance, of complex Internet of Things (IoT) systems. This modeling enables the collaborative design, interoperability, documentation, simulation, testing, deployment, operations, analysis and optimization of connected services and IoT infrastructures. Various embodiments of the present invention may be characterized as a tool for modeling an IoT system and controlling the evolution of this system. The present invention enables a customer or any entity to describe and simulate an IoT system in different scenarios and, in turn, derive various estimates for what the customer will have to invest. This is of great benefit to entities since building out and implementing a complex IoT system is likely an expensive and time and resource consuming endeavor. | 2022-04-28 |
20220131766 | COGNITIVE MODEL DETERMINING ALERTS GENERATED IN A SYSTEM - The present invention discloses a system and method with associated feature capabilities for analyzing and resolving tickets raised in an IT environment. The system monitors health of multiple assets included in the environment and in case an alert is triggered, the system further analyses the alert and provides a recommendation on conversion of the alert to an incident ticket. The incident ticket can also be reported manually by human. Such tickets are then categorized based on certain influencing factors. To this end, a best possible resolution for each incident ticket is then recommended. Subsequently, automatic resolution scripts are identified intelligently and automatically to resolve the problem. | 2022-04-28 |
20220131767 | SYSTEM FOR IDENTIFYING AND ASSISTING IN THE CREATION AND IMPLEMENTATION OF A NETWORK SERVICE CONFIGURATION USING HIDDEN MARKOV MODELS (HMMs) - A device may receive a request for a network service configuration (NSC) that is to be used to configure network devices. The device may select a graphical data model that has been trained via machine learning to analyze a dataset that includes information relating to a set of network configuration services, where aspects of a subset of the set of network configuration services have been created over time. The device may determine, by using the graphical data model, a path through a set of states of the graphical data model, where the path corresponds to a particular NSC. The device may select the particular NSC based on the path determined. The device may perform a first group of actions to provide data identifying the particular NSC for display, and/or a second group of actions to implement the particular NSC on the network devices. | 2022-04-28 |
20220131768 | COMMUNICATION OF A MESSAGE USING A NETWORK INTERFACE CONTROLLER ON A SUBNET - A system, method, and apparatus may provide one or more tangible, nontransitory computer-readable storage media having stored thereon executable instructions to instruct a processor to: stripe an outgoing network message into two or more pieces; send a first piece to a receiver via a first network interface card (NIC), and a second piece to the receiver via a second NIC; and upon determining that the receiver failed to receive a piece of the outgoing network message, replay the piece that the receiver failed to receive via a third NIC. | 2022-04-28 |
20220131769 | ANALYZING WEBSITE PERFORMANCE - Techniques are described herein for determining an impact of slow performing webpages on a website. For example, a detection system may be provided to determine timing distributions for webpages by analyzing timing measurements for different timing metrics. The detection system may determine ranges of the timing distributions for slow and fast group of users of the website. The detection system may analyze user interactions of slow and fast group of users on the website. The detection system may further determine impacts of poor performing webpages on the website's performance based on the analysis of the user interactions on the webpages. The detection system may classify the impacts the webpages of the website and display the classifications to a website provider for identifying network operation(s) contributing to poor performance of the webpages. | 2022-04-28 |
20220131770 | SYSTEM AND METHOD FOR PREDICTING AND REDUCING SUBSCRIBER CHURN - A system and method for creating a model for predicting and reducing subscriber churn in a computer network. The method including: for a predetermined time period: retrieving traffic flow data per subscriber for a plurality of subscribers in the computer network; determining at least one metric per subscriber from the traffic flow data; determining at least one systemic feature associated with the plurality of subscribers; and storing the at least one amalgamated metric and feature; on reaching the predetermined time period create the model by: analyzing at least one metric and at least one feature for the predetermined time period; predicting, per subscriber, whether the subscriber is going to churn within a churn period in the future based on the analysis; validating the prediction by determining whether the subscriber actually churned during the churn period; and creating the model based on the validated predictions. | 2022-04-28 |
20220131771 | REAL-TIME SCALABLE VIRTUAL SESSION AND NETWORK ANALYTICS - Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience. | 2022-04-28 |