18th week of 2021 patent applcation highlights part 84 |
Patent application number | Title | Published |
20210135860 | QUANTUM COMMUNICATIONS SYSTEM HAVING QUANTUM KEY DISTRIBUTION AND USING A TALBOT EFFECT IMAGE POSITION AND ASSOCIATED METHODS - A quantum communications system may include communications system that operates with a quantum key distribution (QKD) system, which includes a transmitter node, a receiver node, and a quantum communications channel coupling the transmitter node and receiver node. The transmitter node may cooperate with the quantum communications channel defining at least one Talbot effect image position along the quantum communications channel. The receiver node may be located along the quantum communications channel at the at least one Talbot effect image position. | 2021-05-06 |
20210135861 | QUANTUM COMMUNICATION SYSTEM HAVING QUANTUM KEY DISTRIBUTION AND USING A MIDPOINT OF THE TALBOT EFFECT IMAGE POSITION AND ASSOCIATED METHODS - A quantum communications system includes a communications system that operates with a quantum key distribution (QKD) system, which includes a transmitter node, a receiver node, and a quantum communications channel coupling the transmitter node and receiver node. The transmitter node may cooperate with the quantum communications channel defining a Talbot effect image position along the quantum communications channel. The receiver node is located along the quantum communications channel at a midpoint of the Talbot effect image position. | 2021-05-06 |
20210135862 | SYSTEM AND METHOD FOR VERIFYING THE NO-LATER-THAN DATE-OF-EXISTENCE, DATA INTEGRITY, IDENTITY OF THE RECORDER, AND TIMESTAMP OF THE RECORDING FOR DIGITAL CONTENT - A system and method for recording and verifying the data integrity, identity of the recorder, and no-later-than date-of-existence for digital content of an arbitrary size is provided. The provided system and method employ blockchain technology to ensure immutability and accessibility of digital content state, digital content recorder identity, and timestamp of recording for the recorded digital content. The provided system and method also generate meta-data files associated with the recorded digital content that consist of a manifest file, a signature file, and a signature block file. The meta-data files are included into the digital content in order to facilitate the verification of the digital content against the records held in the blockchain. | 2021-05-06 |
20210135863 | METHOD, DEVICE AND SYSTEM FOR ENCRYPTING INTERACTIVE DATA - The disclosure provides a method, a device and a system for encrypting interactive data. In an aspect, the method includes: receiving a request for accessing a network from a terminal device, the request includes a device identifier of the terminal device; generating a random encryption code according to the device identifier; and feeding back the random encryption code to the terminal device so that the terminal device encrypts interactive data using the random encryption code after accessing the network. In another aspect, the method includes: transmitting a request for accessing a network to a gateway device, the request includes a device identifier of a terminal device; receiving a random encryption code fed back by the gateway device, the random encryption code is information for encrypting interactive data during the terminal device accessing the network; and encrypting interactive data with the random encryption code. | 2021-05-06 |
20210135864 | PRIVATE KEY UPDATING - There is provided mechanisms for updating a private key of a host entity. The private key is based on parameters negotiated between the host entity and a key issuer. The host entity further has a group public key that is generated by the key issuer and associated with the private key. A method is performed by the host entity. The method comprises obtaining a need to acquire a new private key. The method comprises, in response thereto, performing a private key update procedure with the key issuer using the public key and the current private key, wherein parameters for the new private key are negotiated with the key issuer. The method comprises generating the new private key using the negotiated parameters. | 2021-05-06 |
20210135865 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD - The invention provides cryptographic techniques for ensuring and controlling security in respect of blockchain transactions which transfer digital assets or entities from one resource to another. The blockchain may be the Bitcoin blockchain or an alternative protocol. An embodiment of the invention provides a computer-implemented method for improving the security, anonymity and/or control of a value-mixing blockchain transaction having a plurality of participating nodes, each node having a respective output address to which the transaction is to allocate value. The method includes, each participating node, in a first sequence, encrypting its output address using that node's public key, adding the encrypted output address to a set of output addresses for the transaction, and if there is more than one encrypted output address in the set, shuffling the order of the encrypted output addresses in the set. Each participating node, in a second sequence, identifies its encrypted output address in the set, and replaces its encrypted output address with its unencrypted output address. The result is a shuffled set of output addresses that cannot be linked to a particular input. | 2021-05-06 |
20210135866 | System and Method for Efficiency in Interoperability - Systems and methods for efficient operation of computing devices related to transmission and retrieval of data from multiple distributed ledgers are provided, in which the system houses incorporates and API to permit the posting and retrieval of data to and from such ledgers. Use of validation of multiple ledgers and a common identifier for related data provides for efficient operation of the hardware and databases to reduce processing time and increase processing speeds. Such systems and methods permit coordinated interaction of multiple posting and retrieval computers while maintaining accuracy and interoperability of the data in each of the multiple ledgers, whether public or private. | 2021-05-06 |
20210135867 | BLOCKCHAIN MULTI-PARTY SHARED-GOVERNANCE-BASED SYSTEM FOR MAINTAINING DOMAIN NAME INFORMATION - Provided by embodiments of the present application is a blockchain multi-party shared-governance-based system for maintaining domain name information, wherein a Root blockchain is formed by first network nodes where respective top-level domain registries are located, and domain name operation information needs to be confirmed by authoritative nodes among the first network nodes after a consensus process. Since the authoritative node is generated by means of voting by each first network node, each network node in the Root blockchain in the system participates in the consensus process for the domain name operation information. Through such a decentralized method for maintaining domain name information, the final state will not be affected by a mistake or an attack on one network node, resulting in higher security and better stability of the entire system compared to the centralized maintenance method. Furthermore, all the domain name operation information is stored in each first network node in the Root blockchain to prevent malicious tampering, and a reliable data source is provided for update of domain name. | 2021-05-06 |
20210135868 | SYSTEM AND METHOD FOR AUTHENTICATING A TRANSACTION - A system and method for authenticating a transaction are provided. In a method at a server computer of an authentication service provider, an authentication request is received which requests authentication of a transaction and includes transaction details describing the transaction. An encryption key being unique to the authentication service provider and a user mobile device is obtained. An authentication prompt including at least some of the transaction details is generated. A payload including the authentication prompt is encrypted using the encryption key to output an encrypted payload. The encrypted payload is provided via a first communication channel to a user for acquisition and decryption by the user mobile device using a decryption key corresponding to the encryption key. | 2021-05-06 |
20210135869 | USING IP HEURISTICS TO PROTECT ACCESS TOKENS FROM THEFT AND REPLAY - An embodiment disclosed herein is related to computing systems and method for a computing system to generate an access token that includes an IP address from a request. In the embodiment, a request is received for access to one secured data items. The request may include user credentials that specify that a user making the request is permitted to access the secured data items. The user credentials are validated and an Internet Protocol (IP) address that the request was sent from is determined. An access token is generated that includes the IP address that the request was sent from. | 2021-05-06 |
20210135870 | SECURE DISTRIBUTION NETWORKS - Secure distribution of data objects using a unique quantum-safe cryptographic key provided to a user requesting the data object that has been authenticated using a zero-knowledge authentication. A user may access the system by way of the zero-knowledge authentication to request access to a data object of a data library. The system may generate and associate a unique quantum-safe cryptographic key for the instance of the data library to be provided to the authenticated user. The data object is encrypted using the unique quantum-safe cryptographic key. The encrypted data object and the unique quantum-safe cryptographic key are provided to the authenticated user. Other instances of the data object may also be encrypted with other unique quantum-safe cryptographic keys. In turn, access to a unique quantum-safe cryptographic key may not be useful in decrypting other instances of the data object, and other data objects may not be decrypted using a given unique key for a given data object instance. | 2021-05-06 |
20210135871 | SECURE WORKLOAD CONFIGURATION - Described are techniques for secure workload configuration including a method comprising receiving a workload definition file at a worker node and from a master node, where the workload definition file comprises an encrypted immutable definition, a partially immutable definition with a predefined range of values and a first value modified by the master node, and a variable definition with a second value modified by the master node. The method further comprises decrypting, by the worker node, the encrypted immutable definition to generate a decrypted immutable definition. The method further comprises verifying, by the worker node, that the first value satisfies the predefined range of values. The method further comprises, in response to decrypting the encrypted immutable definition and verifying that the first value satisfies the predefined range of values, executing a workload based on the workload definition file in a virtual computing environment. | 2021-05-06 |
20210135872 | IMPLICIT ATTESTATION FOR NETWORK ACCESS - A method and apparatus for use in a trusted network environment together or separately employ an implicit attestation that a requesting computing resource is in a trusted state before access to a network resource is granted. The method includes: verifying that a requesting computing resource is in a trusted state; accessing the private key using the released key authorization value; and creating a digital signature for the requesting device from the accessed private key. The apparatus may implement the method. | 2021-05-06 |
20210135873 | METHODS AND DEVICES FOR SECURE APPLICATION AUTHENTICATION USING A ONE-WAY ENCRYPTED AUTHENTICATION TOKEN - A client application component of a device may provide a request to an authentication component of the device for an authentication token, in order to authenticate an application with a server. The authentication component may generate the authentication token to be one-way encrypted, based on a server token and a data string associated with security information corresponding to the application, and device information that identifies the device. The client application component may receive the authentication token from the authentication component. The client application component may generate, based on the authentication token, a client token and transmit the client token to the server to authenticate the client application. | 2021-05-06 |
20210135874 | SYSTEMS AND METHODS FOR OUT-OF-BAND AUTHENTICITY VERIFICATION OF MOBILE APPLICATIONS - Example embodiments of systems and methods for application verification are provided. An application may generate a cryptographic key, and encrypt the cryptographic key with a predefined public key. A server, in data communication with the application, may include a predefined private key. The application may transmit the cryptographic key to the server. The server may receive, from the application, the cryptographic key; decrypt the cryptographic key using the predefined private key; encrypt an authorization token using the decrypted key; and transmit, to the client application, the authorization token via an out-of-band channel. The application may receive, from the server, the authorization token via the out-of-band channel; and decrypt the authorization token to obtain access to one or more services associated with the server. | 2021-05-06 |
20210135875 | FALSE POSITIVE REDUCTION IN ELECTRONIC TOKEN FORGERY DETECTION - Disclosed embodiments provide for detection of fraudulent electronic security tokens. A compromised private key allows forgery of electronic security tokens, which then allow access to computer resources. Some embodiments track sequence numbers issued by a token issuing authority and are then able to predict sequence numbers issued by the token issuing authority going forward. Some embodiments also determine validity of a token based, at least in part, on a service or client attempting to access resources using the token. For example, some of the disclosed embodiments maintain reputation data for clients or services utilizing electronic tokens, and make determinations on whether a token is likely valid based on the client or services reputation. | 2021-05-06 |
20210135876 | BLOCKCHAIN-ENABLED CONTACT CENTER - Disclosed is a contact center that stores data related to a consumer in a blockchain. More specifically, disclosed is a methodology for conducting and concluding a communication with the consumer; creating a record of the communication; encrypting the record of the communication with asymmetric cryptography; and updating the blockchain with the record of the communication. | 2021-05-06 |
20210135877 | Methods, systems, and devices for managing digital assets - Embodiments relate to methods, systems, devices, and computer readable medium for managing digital assets, such as cryptocurrencies and public key and private key pairs. The method may include forming a first payload (or the owner payload). The first payload may include the public key of the digital asset or a corresponding public address for the public key of the digital asset. The method may also include performing a proof of ownership setup process for an owner of the digital asset. The proof of ownership setup process may include generating a proof of ownership hash. The proof of ownership hash may be generated by hashing at least the first payload. The method may also include signing, using the private key of the digital asset, the proof of ownership hash to arrive at a signed proof of ownership hash. | 2021-05-06 |
20210135878 | Authentication Mechanism for 5G Technologies - Embodiment mutual authentication and security agreement (MASA) protocols may use independently generated integrity and/or encryption keys to securely communicate private information exchanged between UEs and various network-side devices (e.g., base stations, MMEs, HSSs, etc.). In particular, embodiment MASA protocols may use an initial authentication request (IAR) encryption key (KIAR | 2021-05-06 |
20210135879 | DECENTRALIZED GROUP SIGNATURE SCHEME FOR CREDENTIAL SYSTEMS WITH ISSUER ANONYMIZATION - A decentralized group signature method for an issuer-anonymized credential system includes (a) an initial system setup operation of defining elements of a group signature method and information that is generated and shared by each group member, (b) an initial group member setup operation, (c) a group member participation operation of adding a new group member to a group, (d) a group signature operation of putting a group signature on a specific message, (e) an operation of verifying the group signature, (f) an operation of removing anonymity from a group signature for a specific group member with agreement of group members, and (g) an operation of revoking a specific group member with agreement of the group members. Exclusive authority of a group manager is distributed to the group members. | 2021-05-06 |
20210135880 | SYSTEM AND METHOD FOR GENERATING DIGITAL MARKS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating digital marks. One of the methods includes: obtaining entity information of an entity; transmitting the entity information to one or more nodes of a blockchain for storage in the blockchain; obtaining a transaction identification associated with storing the entity information in the blockchain; and generating a digital mark for the entity based at least on the transaction identification. | 2021-05-06 |
20210135881 | INDUSTRIAL CONTROL SYSTEM REDUNDANT COMMUNICATIONS/CONTROL MODULES AUTHENTICATION - A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second communications/control modules are configured to perform an authentication sequence including: transmitting a request datagram from the first communications/control module to the second communications/control module, the request datagram including a first nonce, a first device authentication key certificate, and a first identity attribute certificate; transmitting a response datagram from the second communications/control module to the first communications/control module, the response datagram including a second nonce, a first signature associated with the first and second nonces, a second device authentication key certificate, and a second identity attribute certificate; and transmitting an authentication datagram from the first communications/control module to the second communications/control module when the response datagram is valid, the authentication datagram including a second signature associated with the first and second nonces. | 2021-05-06 |
20210135882 | VERIFICATION-BASED SERVICE AUTHORIZATION - The present specification discloses a service authorization method, apparatus and device. In one aspect, the method includes: obtaining, by a first execution unit that runs in a first security environment, information to be verified; generating, by the first execution unit that runs in the first security environment, a verification result of the information to be verified; signing, by the first execution unit that runs in the first security environment, the verification result using a signature verification private key to provide signature information; obtaining, by a second execution unit that runs in a second security environment, the signature information from the first execution unit; verifying, by the second execution unit that runs in the second security environment, the signature information using a signature verification public key corresponding to the signature verification private key; and in response to verifying the signature information, performing service authorization based on the verification result. | 2021-05-06 |
20210135883 | DETECTION AND PREVENTION OF UNAUTHORIZED EXECUTION OF SEVERLESS FUNCTIONS - Methods and systems for detecting and responding to fabricated or unauthorized events received by serverless computing environments are provided. In one embodiment the method is provided that includes receiving an event from an event source external to the serverless computing environment for execution by function. The method may then include creating a message that includes the events and signing the message with an identifier of the event source. The message may then be received at the function and the identifier of the event source may be validated. The event may then be executed with the function of the serverless computing environment if the identifier of the event sources successfully validated. However, if the identifier of the event source is not successfully validated, execution of the event with the function may be prevented. | 2021-05-06 |
20210135884 | SERVER/SERVER CERTIFICATES EXCHANGE FLOW - Embodiments herein describe providing a certificate signed by a local CA to an unauthenticated server rather than obtaining a certificated signed by a third-party CA. A server that already has a certificate that was signed by a third-party CA may want to establish secure connection with an unauthenticated server which does not have a signed certificate. The unauthenticated server needs a certificate signed by a CA trusted by the server that already has a signed certificate (referred to herein as the authenticated server). To do so, the unauthenticated server sends login credentials to the authenticated server so that this server knows it can trust the unauthenticated server. In turn, the authenticated server can send its signed certificate to the unauthenticated server so it can verify the authenticated server. Once verified, the authenticated server generates a signed certificate for the unauthenticated server using a local CA. | 2021-05-06 |
20210135885 | CONTROL OF INFORMATION UNITS FOR ENCRYPTION - In response to receiving a login request message with a security indicator enabled for security, a storage port establishes a security association by transmitting a response indicating a login accept with the security indicator enabled for security. In response to establishing the security association, the storage port modifies a protocol behavior for transmitting and receiving information units. | 2021-05-06 |
20210135886 | SECURITY DEVICE INCLUDING PHYSICAL UNCLONABLE FUNCTION CELLS, OPERATION METHOD OF SECURITY DEVICE, AND OPERATION METHOD OF PHYSICAL UNCLONABLE FUNCTION CELL DEVICE - A security device includes a physical unclonable function (PUF) cell array that includes a plurality of PUF cells connected with a first word line, a controller that selects a target PUF cell of the plurality of PUF cells and outputs a control signal based on the target PUF cell, a decoder that applies a first voltage to the first word line in response to the control signal, a bit line selection circuit that outputs a target current across a bit line connected with the target PUF cell and a sum current corresponding to a sum of currents across the remaining bit lines connected with other PUF cells, and a bit determiner that outputs a target bit of the target PUF cell based on the target current and the sum current, and the security device generates a security key based on the target bit for responding to an authentication requests. | 2021-05-06 |
20210135887 | CORRELATION-BASED ROBUST AUTHENTICATION TECHNIQUE USING HELPER DATA ONLY - A privacy-preserving, mutual PUF-based authentication protocol that uses soft data to exchange and correlate Helper Data bitstrings instead of PUF response bitstrings as a means of authenticating chips to prevent attacks. | 2021-05-06 |
20210135888 | METHODS AND SYSTEMS FOR TRACKING OWNERSHIP OF GOODS WITH A BLOCKCHAIN - In one aspect, a computerized method for digitally tracking ownership of goods with a blockchain includes the steps of providing a blockchain. The blockchain includes a set of blockchain ownership records provided in a chronological mathematical proof format such that specified data exists in a specific chronological order. The method includes the step of saving a smart contract that references a real-world object in the blockchain. The smart contract includes a tool for tracking ownership of the real-world object. With a computer application, the method enables an owner of the real-world object to modify an owner data portion of the smart contract to a new owner entity to change the ownership of the real-world object in the blockchain. The method includes the step of updating the owner data portion of the smart contract in the blockchain to include the new owner entity. | 2021-05-06 |
20210135889 | MINING MACHINE AND METHOD FOR LIMITING COMPUTING POWER - A method applied to a mining machine for limiting computing power includes utilizing a dictionary library and a timestamp to control Nonce combination that can be tried per unit time. If all strings in the dictionary library have been tried, as long as a time difference between time of generating most recent timestamp and the current time is less than a preset threshold, the mining machine must wait in sleep state and cannot resume mining until the time difference exceeds the preset threshold. The present disclosure can avoid a situation that the calculation power of the mining machine is too strong and causes a monopoly of the calculation power. | 2021-05-06 |
20210135890 | INITIALIZATION AND SYNCHRONIZATION FOR PULSE POWER IN A NETWORK SYSTEM - In one embodiment, a method includes transmitting from power sourcing equipment, low voltage pulse power to a powered device in a communications network, performing a safety test, enabling high voltage pulse power operation at the power sourcing equipment upon passing the safety test, and transmitting high voltage pulse power from the power sourcing equipment to the powered device. The powered device synchronizes with a waveform of the low voltage pulse power. | 2021-05-06 |
20210135891 | SYSTEM AND METHOD TO PROVIDE EXPLICIT MULTICAST LOCAL IDENTIFIER ASSIGNMENT FOR PER-PARTITION DEFAULT MULTICAST LOCAL IDENTIFIERS DEFINED AS SUBNET MANAGER POLICY INPUT IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - Systems and methods for providing explicit multicast local identifier assignment for per-partition default multicast local identifiers defined as subnet manager policy input in a high performance computing environment. In accordance with an embodiment, an explicit multicast local identifier (MLID) assignment policy can be provided (as, e.g., administrative input) that explicitly defines which MLIDs will be used for which partitions in a subnet. Further, an MLID assignment policy can also define which dedicated MLIDs will be associated with given multicast group identifiers (for example, partition independent MLIDs). By employing such an MLID assignment policy, a new or restarted master subnet manger can observe and verify the MLIDs used for existing partitions, instead of generating new MGID to MLID mappings. In this way, changes in MLID associations for any corresponding MGID can be avoided as a result of master SM restarts or failovers, or any subnet-merge operations. | 2021-05-06 |
20210135892 | Automatic Detection Of Presentation Surface and Generation of Associated Data Stream - Techniques for automatic detection of a presentation surface and generation of an associated data stream include receiving, in connection with a communication session, a first media stream capturing a portion of an environment including a presentation surface; detecting the presence in the first media stream of the presentation surface; detecting usage of the presentation surface during the conferencing session; generating, in response to the detected usage of the presentation surface, a second media stream dedicated to the presentation surface from the first media stream; and transmitting the second media stream dedicated to the presentation surface to one or more recipient devices. | 2021-05-06 |
20210135893 | Automated Videoconference Systems, Controllers And Methods - A mobile computing device includes a touchscreen configured to display a user interface for receiving user input, memory hardware configured to store computer-executable instructions and information regarding scheduled conference calls, and processor hardware configured to execute the computer-executable instructions. The computer-executable instructions include communicating with a server via one or more wired/and or wireless communication networks, and parsing the information stored on the mobile computing device according to a parsing protocol to obtain information regarding at least one scheduled conference call. The instructions further include, in response to receiving user input via the user interface, transmitting at least a portion of the obtained information regarding the at least one scheduled conference call to the server to control a system controller in communication with the server to initiate the at least one scheduled conference call via a videoconferencing codec. | 2021-05-06 |
20210135894 | Data Transmission Control Method, Data Transmission Control Apparatus, and Electronic Device - A data transmission control method includes: acquiring identities of multiple conference members required to attend a conference when a local area network conference request is detected, wherein the conference members correspond to multiple second NAN devices; determining communication levels of the conference members based on the identities of the conference members, and establishing a corresponding relation between transmission levels of data resources and the communication levels of the conference members; creating a first NAN conference group, and inviting the at least one second NAN device to join the first NAN conference group; and performing data transmission in the first NAN conference group based on the corresponding relation. | 2021-05-06 |
20210135895 | PRIVATE COLLABORATION SPACES FOR COMPUTING SYSTEMS - This disclosure describes a computing system that automatically detects users in visual proximity and adds the users to a private collaboration space enabling the users to share digital content. In one example, the computing system includes a video processing engine configured to detect, from first image data representative of a first physical environment that includes a second user, the second user, wherein the first image data is captured by an image capture system of a head-mounted display (HMD) worn by a first user. The computing system also includes a collaboration application configured to add, in response to detection of the second user, the second user to a set of users associated with a private collaboration space in which the set of users access shared digital content, wherein the set of users includes the first user. | 2021-05-06 |
20210135896 | THROTTLING AND PRIORITIZATION OF MULTIPLE DATA STREAMS - Techniques for prioritization of data streams include transmitting a plurality of data streams to a first device over a network where each data stream is configured to cause the first device to perform a specific function, dynamically detecting a bandwidth limitation limiting an amount of available bandwidth for transmitting the plurality of data streams, dynamically determining bandwidth reduction criteria by identifying a first subset of the plurality of data streams to stop transmitting based on the specific function that each respective data stream causes the first device to perform, temporarily stopping transmitting of the first subset of data streams configured to cause the first device to perform a first set of functions, and continuing to transmit a second subset of data streams not included in the first subset of the data streams to the first device to cause the first device to continue to perform a second set of functions. | 2021-05-06 |
20210135897 | SMART DEVICE ACTIVE MONITORING - A wake-up command is received from a user. A smart device for receiving is awakened for processing a user prompt in response to receiving the wake-up command. A user-defined event is received within the user prompt. During the user-defined event, the smart device is to remain awake and monitor a predetermined set of user activities without additional wake-up commands. The predetermined set of user activities is monitored during the user-defined event using the smart device. | 2021-05-06 |
20210135898 | DEVICES, METHODS, AND SYSTEMS FOR HANDS FREE FACILITY STATUS ALERTS - Devices, methods, and systems for hands free facility status alerts are described herein. One system includes a computing device for hands free building automation notifications, comprising a memory and a processor to execute executable instructions stored in the memory to: receive a notification of an event from a building automation system, modify the notification to include only pre-defined attributes of the notification that are displayable on a user interface of a wearable device, and transmit the modified notification to the wearable device. | 2021-05-06 |
20210135899 | VEHICLE COMPUTER SYSTEM - A vehicle computer system, the vehicle computer system comprises a processor body structure and a processor auxiliary structure. The processor auxiliary structure is detachably connected externally to one side of the processor body structure. The assisting processor structure is configured to assist the processor body structure to improve the computing capability of the vehicle computer system. | 2021-05-06 |
20210135900 | DATA TRANSMISSION METHOD, DATA STRUCTURE, AUTOMATION NETWORK AND UNLOCKER - A method for transmitting data in an automation network by telegrams, where the automation network comprises a master subscriber, slave subscribers and at least one unlocker, connected to each other via a data-line network. The slave subscribers are divided into segments. The master subscriber sends locked telegrams for processing by the slave subscribers, each having a telegram identifier used to assign a locked telegram to a segment. At least one segment is assigned to at least one unlocker. If the unlocker receives a locked telegram, the unlocker checks, by the telegram identifier in the locked telegram, whether the locked telegram for the assigned segment is intended to release the locked telegram, as an unlocked telegram for processing by the slave subscribers, provided that the locked telegram is intended for the segment assigned to the unlocker. | 2021-05-06 |
20210135901 | METHOD FOR ESTABLISHING COMMUNICATION CONNECTION - Embodiments disclosed include a method for establishing a communication connection. The method includes: receiving a connection request message transmitted by a first terminal, the connection request message carrying a first user identifier and a second user identifier; determining a second relay node corresponding to the second user identifier, the second relay node being a relay node communicatively connected to a second terminal; transmitting the connection request message to the second relay node through a relay path to the second relay node, so that the second relay node transmits the connection request message to the second terminal; and transmitting, in response to receiving a connection confirmation message returned by the second terminal, the connection confirmation message to the first terminal, so that the first terminal establishes a communication connection with the second terminal based on the connection confirmation message. | 2021-05-06 |
20210135902 | DETERMINISTIC FORWARDING ACROSS L2 AND L3 NETWORKS - According to one or more embodiments of the disclosure, a first tunnel router may receive a reservation request to establish a deterministic path between a first node and a second node. The first tunnel router may determine, based on the reservation request, a destination address of the second node. The first tunnel router may identify, based on the destination address of the second node, a second tunnel router associated with the second node. The first tunnel router may encapsulate a deterministic packet sent by the first towards the second node into a tunnel packet, wherein a multicast address in a header of the tunnel packet is set to the destination address of the second node. The first tunnel router can forward the tunnel packet along the deterministic path. The multicast address in the header of the tunnel packet causes nodes to send the tunnel packet according to the deterministic path. | 2021-05-06 |
20210135903 | VXLAN MULTI-TENANT INTER-NETWORKING DEVICE PACKET FORWARDING SYSTEM - A VXLAN multi-tenant inter-networking device packet forwarding system includes a first aggregated networking device coupled to a first host device and a second aggregated networking device that is coupled to second host devices. The first aggregated networking device receives a data packet from the first host device and, in response, identifies a virtual network associated with the first host device. Based on a first and second portion of a virtual network identifier that identifies the virtual network, the first aggregated networking device generates respective first and second packet forwarding identifiers. The first aggregated networking device then provides the first and second packet forwarding identifiers in the data packet, and forwards the data packet to the second aggregated networking device. The second aggregated networking device may then forward the data packet to one of the second host devices based on the first and second packet forwarding identifiers in the data packet. | 2021-05-06 |
20210135904 | CLOUD GATEWAY DEVICE AND METHOD FOR OPERATING A CLOUD GATEWAY DEVICE - A cloud gateway device ( | 2021-05-06 |
20210135905 | RECIPROCAL CALIBRATION FOR CHANNEL ESTIMATION BASED ON SECOND-ORDER STATISTICS - A wireless communication method includes receiving, by a first wireless device during a training phase, reference tones using a first number of resource elements from a transmitter of a second wireless device, wherein the first wireless device comprises multiple receiving antennas, estimating, by the first wireless device, from the receiving the reference tones, a second order statistics of wireless channels between the multiple receiving antennas and the transmitter of the second wireless device, and performing channel estimation, during an operational phase subsequent to the training phase, using the second order statistics and reference tones received on a second number of resource elements, wherein the second number is less than the first number. | 2021-05-06 |
20210135906 | SIGNAL GENERATION APPARATUS AND METHOD, AND SYSTEM - This application provides a signal generation apparatus and method, and a system. The signal generation apparatus includes an encoder, a serializer, an equalizer, and N amplifiers. The encoder is configured to encode to-be-sent data, to obtain a first electrical signal. The serializer is configured to perform parallel-to-serial processing on the first electrical signal, to obtain a second electrical signal. The equalizer is configured to process the second electrical signal, to obtain a third electrical signal. The third electrical signal is amplified by the N amplifiers, to obtain N pairs of differential signals, where N is an integer greater than 2. In embodiments of this application, the N amplifiers amplify differential signals to obtain N pairs of differential signals, and the N pairs of differential signals are directly used as drive signals, so that power consumption for generating a drive signal can be reduced. | 2021-05-06 |
20210135907 | ADPATIVE RECEIVER WITH PRE-CURSOR CANCELATION - A data receiver circuit includes a summer circuit configured to receive an input signal that encodes multiple data symbols, and combine the input signal with a feedback signal to generate an equalized input signal, which is used to generate a clock signal. The data receiver circuit also includes multiple data slicer circuits that sample, using the clock signal and multiple voltage offsets, to generate multiple samples for a particular data symbol. A precursor compensation circuit included in the data receiver circuit may generate an output value for the particular data symbol using the multiple samples. The data receiver circuit also includes a post cursor compensation circuit that generates the feedback signal using at least one of the multiple samples and a value of a previously received sample. | 2021-05-06 |
20210135908 | SYSTEMS AND METHODS FOR RELATIVE INTENSITY NOISE CANCELATION - The present invention is directed to communication methods and systems thereof. In a specific embodiment, a noise cancelation system includes a slicer that processes a data stream generates both PAM symbols and error data. An RIN estimator generates RIN data based on the PAM symbols and the error data. A filter removes non-RIN information from the RIN data. The filtered RIN data includes an offset term and a gain term, which are used to remove RIN noise from the data stream. There are other embodiments as well. | 2021-05-06 |
20210135909 | METHOD AND APPARATUS FOR DETECTING SIGNAL IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a pre-5 | 2021-05-06 |
20210135910 | DATA TRANSMISSION DEVICES WITH EFFICIENT TERNARY-BASED DATA TRANSMISSION CAPABILITY AND METHODS OF OPERATING SAME - A data transmission device includes first and second lines, and a transmitter configured to convert received binary data into ternary data and output the ternary data onto the first and second lines by toggling only one of the first and second lines during each of a plurality of consecutive 2-bit data transmission time intervals. A receiver is also provided, which is configured to receive the ternary data from the first and second lines and convert the received ternary data into binary data. The transmitter is configured to output the ternary data onto the first and second lines using return-to-zero toggling during each of the 2-bit data transmission time intervals. | 2021-05-06 |
20210135911 | Computer 5G, 4G, 3G and 2G cellular and Wi-Fi communications - Computers communicating in 5G, 4G, 3G and 2G cellular systems and in wireless Wi-Fi networks. Computers having location finding information and touchscreen generated signals for control of communications or of location of the computer. A fingerprint generated signal is used for authentication of the computer. | 2021-05-06 |
20210135912 | AMPLITUDE-SHIFT KEYING DEMODULATION FOR WIRELESS CHARGERS - A power transmitter includes: a first switch coupled between a first node and a reference voltage node; a second switch configured to be coupled between a power supply and the first node; a coil and a capacitor coupled in series between the first node and the reference voltage node; a first sample-and-hold (S&H) circuit having an input coupled to the first node; and a timing control circuit configured to generate a first control signal, a second control signal, and a third control signal that have a same frequency, where the first control signal is configured to turn ON and OFF the first switch alternately, the second control signal is configured to turn ON and OFF the second switch alternately, and where the third control signal determines a sampling time of the first S&H circuit and has a first pre-determined delay from a first edge of the first control signal. | 2021-05-06 |
20210135913 | A FIRST NETWORK NODE AND A METHOD THEREIN FOR GENERATION AND TRANSMISSION OF A BINARY PHASE SHIFT KEYING (BPSK) SIGNAL - A first network node (NN) and a method therein for generation and transmission of a Binary Phase Shift Keying (BPSK) signal to a second NN. The first and second NNs are operating in a communications network. The first NN generates a third bit stream x(n) from a first bit stream d(n) of data for transmission, wherein each output bit comprised in the third bit stream depends on a transition in bit values between two input bits from the first bit stream. Further, the first NN generates a fourth bit stream y(n) from the third bit stream by expanding the third bit stream by a predetermined factor M. By means of a CPM signal generating module, the first NN generates a BPSK signal based on the fourth bit stream. Furthermore, the first NN transmits the BPSK signal to an OFDM signal receiving module of the second NN. | 2021-05-06 |
20210135914 | APPARATUS AND METHOD FOR SENDING AND RECEIVING BROADCAST SIGNALS - A broadcast signal receiver is disclosed. A broadcast signal receiver according to an embodiment of the present invention comprises a synchronization & demodulation module performing signal detection and OFDM demodulation on a received broadcast signal; a frame parsing & deinterleaving module performing parsing and deinterleaving of a signal frame of the broadcast signal; a demapping & decoding module performing conversion of data of at least one Physical Layer Pipe (PLP) of the broadcast signal into the bit domain and FEC decoding of the converted PLP data; and an output processing module outputting a data stream by receiving the at least one PLP data. | 2021-05-06 |
20210135915 | METHOD, SOFTWARE AND DEVICE FOR GENERATING CHANNEL ESTIMATES - A method of generating channel estimates of a communication channel in an OFDM system includes receiving reference symbols from at least one time-frequency observation block of a predetermined block size infrequency and time. Subspace-transformed reference symbols are generated from the received reference symbols. The subspace-transformed reference symbols are subspace filtered to generate a channel estimate for a communication channel target time. A latency between a communication channel time instant of a currently received reference symbol and the communication channel target time is smaller than the observation block size in time. | 2021-05-06 |
20210135916 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - A method and an apparatus for transmitting broadcast signals thereof are disclosed. The apparatus for transmitting broadcast signals comprises an encoder for encoding service data, a mapper for mapping the encoded service data into a plurality of OFDM (Orthogonal Frequency Division Multiplex) symbols to build at least one signal frame, a frequency interleaver for frequency interleaving data in the at least one signal frame by using a different interleaving-seed which is used for every OFDM symbol pair comprised of two sequential OFDM symbols, a modulator for modulating the frequency interleaved data by an OFDM scheme and a transmitter for transmitting the broadcast signals having the modulated data, wherein the different interleaving-seed is generated based on a cyclic shifting value and wherein an interleaving seed is variable based on an FFT size of the modulating. | 2021-05-06 |
20210135917 | COMMUNICATION SIGNAL PROCESSING METHOD, AND BASE STATION AND HEADEND DEVICE USING THE SAME - A communication signal processing method comprises obtaining transmission delay value difference data relating to a difference in transmission delay values in a communication network that varies depending on whether or not a redundant path is used, obtaining redundancy status data relating to whether the redundant path is used, and controlling a parameter of a communication signal transmitted by the communication network based on the transmission delay value difference data when the redundant path is used as a result of determination according to the redundancy status data. | 2021-05-06 |
20210135918 | CYCLIC PREFIX DISTRIBUTION - Methods, systems, and devices for wireless communications are described. A wireless device may identify, for an initial slot of a periodic interval, a number of symbols included in the initial slot and a length of cyclic prefixes used for the symbols included in the initial slot based on a subcarrier spacing that is configured for wireless communication. The length of a first set of cyclic prefixes may be based on a length of a cyclic prefix calculated for an initial symbol of the initial slot at the configured subcarrier spacing. The wireless device may perform communications based on the determined number of symbols and length of cyclic prefixes included in the initial slot. Performing communications may include allocating resources based on a length of the cyclic prefixes used for the symbols included in the initial slot. | 2021-05-06 |
20210135919 | METHOD AND DEVICE FOR PERFORMING COMMUNICATION BY USING ORTHOGONAL OR NON-ORTHOGONAL CODE MULTIPLE ACCESS SCHEME IN WIRELESS COMMUNICATION SYSTEM - Provided are a method and a device for transmitting uplink data by using a non-orthogonal code multiple access scheme in a wireless communication system. Particularly, a terminal receives control information from a base station. The terminal selects a terminal-specific codeword or receives allocation information of the terminal-specific codeword on the basis of the control information. The terminal transmits uplink data by using the terminal-specific codeword. The terminal-specific codeword is determined as a codeword having a value with a low peak-to-average power ratio (PAPR), when the terminal is located on the outside of a cell. The terminal-specific codeword is determined as a codeword having a value with a high PAPR, when the terminal is located in the center of the cell. | 2021-05-06 |
20210135920 | TERMINAL APPARATUS AND BASE STATION APPARATUS - Proper use of a sparse code prevents PAPR performance from improperly degrading. | 2021-05-06 |
20210135921 | Information Transmission Method, Network Device and Terminal Device - Implementations of the present disclosure provide an information transmission method, a network device and a terminal device. The method includes: a network device sends first configuration information to a terminal device through a first control channel, wherein the first control channel is a control channel in a resource for which a first numerology is used, the first configuration information is used for indicating configuration in a resource for which a second numerology is used, and the first numerology is different from the second numerology. | 2021-05-06 |
20210135922 | METHOD AND APPARATUS FOR REFERENCE SIGNAL CONFIGURATION - Methods and an apparatus for reference signal (RS) configuration. A method implemented in a network device is provided in which a plurality of reference signal (RS) ports to be used for RS transmission are determined based on at least one of different RS configuration patterns, different port multiplexing types and different number of symbols to be used for RS transmission. Each of the plurality of RS ports is indexed with a respective port index and at least two of the plurality of RS ports share a same port index. A plurality of RS configurations are determined at least based on the plurality of RS ports. In addition, at least one RS configuration from the plurality of RS configurations is allocated for a terminal device served by the network device. The at least one RS configuration indicates at least one RS port to be used for RS transmission. | 2021-05-06 |
20210135923 | PACKET DETECTION METHOD AND COMMUNICATION DEVICE - A packet detection method is disclosed. The packet detection method includes the following operations: receiving a wireless communication signal; calculating a delay correlation function of the wireless communication signal; calculating a delay related output value and a threshold value according to the delay correlation function; and determining whether the wireless communication signal satisfies a feature of a wireless network packet or not according to the delay related output value and the threshold value. | 2021-05-06 |
20210135924 | NETWORK MONITORING SYSTEM AND METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - A network monitoring system ( | 2021-05-06 |
20210135925 | MULTI-DIMENSIONAL IMPACT DETECT AND DIAGNOSIS IN CELLULAR NETWORKS - A method for multi-dimensional impact detection and diagnosis of networks. The methods and systems dynamically explore only those network feature combinations that are likely to have problems by using a summary structure Sketch, for example. The method and systems capture fine-grained anomalies at a coarse level which allows for on-demand zoom into the finer-grained levels for further analysis. | 2021-05-06 |
20210135926 | Radio Network Node, Wireless Device and Methods Performed Therein - Embodiments herein relate to a method performed by a radio network node ( | 2021-05-06 |
20210135927 | BEAM FAILURE RECOVERY METHOD, TERMINAL DEVICE, AND NETWORK SIDE DEVICE - A beam failure recovery method, a terminal device, and a network side device are provided. The method includes: receiving higher layer signaling, where the higher layer signaling includes configuration information of a control resource set for beam failure recovery CORESET-BFR configured for the terminal device. The configuration information of the CORESET-BFR includes at least one of the following: a cell index of a cell on which the CORESET-BFR is located and a BWP index of a bandwidth part BWP on which the CORESET-BFR is located. | 2021-05-06 |
20210135928 | Handling Sidelink Scheduling Request - A wireless device receives, from a base station, one or more radio resource control messages indicating: a first mode in which the wireless device receives one or more sidelink grants for first sidelink transmissions; and a second mode in which the wireless device selects one or more sidelink resources for second sidelink transmissions. The wireless device triggers a sidelink scheduling request (SR) procedure based on sidelink data becoming available while operating in the first mode. A switch is made to the second mode for the second sidelink transmissions of the sidelink data in response to a failure of the sidelink SR procedure. The sidelink data is transmitted while operating in the second mode. | 2021-05-06 |
20210135929 | NETWORK FAULT DETECTION AND QUALITY OF SERVICE IMPROVEMENT SYSTEMS AND METHODS - A Quality of Service (QoS) improvement system and method for transport network fault detection and QoS improvement so that a telecommunication network service provider can analyze the root cause on chronic performance issues and recommend potential solutions is disclosed. The system runs performance analysis on each AAV (mobile backhaul) or other transport networks and collects performance related metrics data. The system then selects a subset of the data related to certain key performance indicators (KPIs), such as latency, jitter, packet loss ratio, and availability. On this subset of KPI-related data, the system applies clustering techniques to identify clusters with similar performance issues. For each cluster, the system binds the AAV performance KPI data with one or more of the following site features—health, location, vendor, market, service type, etc.—to create a cluster map. The system can then generate inferences on root causes of the performance issues. | 2021-05-06 |
20210135930 | MANAGEMENT OF DATA TRANSPORT NETWORKS - The invention provides a device for processing a subset of network orchestration computations to support management of network functions within a service chain spanning multiple domains of a data transport network. The device comprises receiving logic arranged to receive computation inputs expressed in terms of a data model for describing the data transport network; processing logic arranged to process the computation inputs; and outputting logic arranged to output an output of the processing logic, the output expressed in terms of the data model. | 2021-05-06 |
20210135931 | SYSTEM AND METHOD FOR PROVIDING AN INTELLIGENT EPHEMERAL DISTRIBUTED SERVICE MODEL FOR SERVER GROUP PROVISIONING - A system for distributing firmware, comprising a group controller operating on a processor and configured to perform an algorithmic process of sending an update task with a download host to one of two or more group members. A group member operating on a processor and configured to perform an algorithmic process of receiving the update task with the download host and to request a payload file from the download host. | 2021-05-06 |
20210135932 | OPTIMISATION OF NETWORK PARAMETERS FOR ENABLING NETWORK CODING - Methods and devices for propagating transactions in a network of nodes, each node having one or more connections to other nodes. The method includes receiving a plurality of incoming transactions over a time period; combining the plurality of incoming transactions using network coding to generate a composite message; sending the composite message to one or more nodes in the network; and determining an adjusted time period based on an equilibrium constant parameter and a count of transactions in the plurality of incoming transactions received over the time periodk. | 2021-05-06 |
20210135933 | METHOD FOR CREATING RESOURCES AND CORRESPONDING REGISTRATION METHOD, SERVER, AND CLIENT DEVICE - A method for creating resources and a corresponding registration method, server, client device, and computer readable storage medium. The method for creating resources includes: receiving a registration request; determining a registration type corresponding to the registration request; creating a resource corresponding to the registration type on the basis of the registration type. | 2021-05-06 |
20210135934 | BULK DISCOVERY OF DEVICES BEHIND A NETWORK ADDRESS TRANSLATION DEVICE - In one example, a network management system discovers a plurality of network devices behind a network address translation device, such as a firewall. The network management system may receive a model of a seed network device, generate a first activation configuration and commit the first activation configuration on the seed network device. The network management system may connect to the seed network device and discover neighboring devices from information in the seed network device. The network management system may connect to the neighboring devices, automatically create a model of the neighboring network devices, generate s activation configurations for the neighboring network devices and commit the activation configurations on the neighboring network devices. The network management system may iterative perform these steps until it discovers all the discoverable network devices behind the network address translation device. | 2021-05-06 |
20210135935 | BULK DISCOVERY OF DEVICES BEHIND A NETWORK ADDRESS TRANSLATION DEVICE - A network management system may discover a plurality of network devices behind a network address translation device, such as a firewall. The network management system may receive a model of N network devices, generate a bulk activation configuration for the N network devices and commit the bulk activation configuration on a seed network device. The network management system may receive a request for a first connection from a first neighboring network device and may connect to the first neighboring network device. The first neighboring network device may have received the bulk activation configuration from the seed device. The network management system may determine whether the first neighboring network device is one of the N network devices and commit a second activation configuration on the first neighboring network device if it is one of the N network devices. A plurality of neighboring network device may be configured in this fashion. | 2021-05-06 |
20210135936 | Restoring Settings of Customer Premises Equipment - Novel tools and techniques are provided for implementing configuration data and settings on customer premises equipment (“CPE”), and, more particularly, to methods, systems, and apparatuses for implementing storage, retrieval, and transfer of configuration data and settings in response to receiving a request to reset the CPE. In operation, the CPE might set one or more configuration settings associated with a user and/or a customer premises on the CPE. Next, the CPE might receive a request to reset the CPE. In response to receiving the request to reset the CPE, the CPE might store one or more configuration settings. The CPE may then reset. In response to resetting the CPE, the CPE might retrieve the one or more configuration settings and configure the CPE with the one or more configuration settings associated with the at least one of the user or the customer premises. | 2021-05-06 |
20210135937 | EQUIPMENT DEPLOYING SYSTEM AND METHOD THEREOF - An equipment deploying system and method, which are adapted for a plurality of electronic equipment in an area, are provided. In the method, multiple sub-areas in the area are defined, and a corresponding operation configuration of the electronic equipment respectively for at least one of sub-areas in the area is set correspondingly. Location information of the electronic equipment physically located in the area and equipment information of the electronic equipment are obtained. Whether the location information of the electronic equipment corresponds to one of the sub-areas is determined. In response to the determination that the location information of the electronic equipment is corresponding to one of the sub-areas, the corresponding operation configuration is provided to the corresponding electronic equipment according to a location determined result and the equipment information. The electronic equipment can perform a corresponding operation according to the corresponding operation configuration. Accordingly, the efficiency of equipment deployment can be improved. | 2021-05-06 |
20210135938 | ADMIN CHANGE RECOMMENDATION IN AN ENTERPRISE - Techniques are described herein that are capable of providing a recommendation of an admin change (i.e., an admin change recommendation) in an enterprise. A type of intended admin change that an administrator is to perform with regard to an enterprise is determined. The type is cross-referenced with information indicating admin changes made by administrator(s) in environment(s) of enterprise(s) and values of metrics resulting therefrom to identify subsets of the information to which the type corresponds. A causal relationship is inferred between admin change(s) made after an admin change of the type and an increase in value(s) of metric(s) that are indicated by information in the subsets. A recommended admin change is recommended to be performed by the administrator based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the value(s) of at least one of the respective metric(s). | 2021-05-06 |
20210135939 | GATEWAY DEVICE FOR MONITORING DEPLOYED EQUIPMENT - A system that provides for managing deployed resource interaction devices/equipment through a gateway device that is capable of monitoring the performance of the resource interaction devices/equipment to determine a need for revisions/updates to the resource interaction event application, additional services and/or different resource interaction devices types. | 2021-05-06 |
20210135940 | SELECTIVELY THROTTLING IMPLEMENTATION OF CONFIGURATION CHANGES IN AN ENTERPRISE - Techniques are described herein that are capable of selectively throttling an implementation of configuration changes in an enterprise. For instance, incremental phases of the implementation on respective subsets of clients are selectively throttled during respective periods of time by performing operations for each subset during a respective phase that precedes a respective next phase of the implementation. The operations include gathering information regarding the phase from the clients in the subset; generating a score that indicates an extent to which metrics associated with the implementation are satisfied during the phase based at least in part on the information; comparing the score to a reference score for the subset to determine whether the score is within a tolerance associated with the reference score; and selectively throttling the next phase of the implementation based at least in part on whether the score is within the tolerance. | 2021-05-06 |
20210135941 | APPLICATION SERVICE CONFIGURATION SYSTEM - A computing system implementing an application service can receive network data from computing devices of clients of the application service. The system can determine, from the network data, that a network latency for a subset of the computing devices crosses above a latency threshold. Based on determining that the subset of computing devices utilize a common network service provider, the system can transmit a set of configuration signals to the subset of computing devices, which modify a set of default application configurations of the designated application to compensate for the network latency. | 2021-05-06 |
20210135942 | AUTOMATIC DEVICE NAMING FOR FAST DEVICE REPLACEMENT - Techniques for automatically configuring a computing device in a computing environment are provided. One embodiment includes determining that the computing device has been added to a computing environment and that at least one feature of the computing device is unconfigured. Device name data specifying at least two potential device identifiers for the computing device is received from a plurality of endpoint devices communicatively coupled to the computing device. A first device identifier is selected from the at least two potential device identifiers and device configuration data associated with the first device identifier is requested from a device configuration server. The at least one feature of the computing device can then be configured using the device configuration data. | 2021-05-06 |
20210135943 | SYSTEMS AND METHODS FOR WORKSPACE CONTINUITY AND REMEDIATION - Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described. In some embodiments, a client Information Handling System (IHS) may include a processor and a memory, the memory having program instructions that, upon execution by the processor, cause the client IHS to: receive, from a workspace orchestration service, one or more files or policies configured to enable the client IHS to instantiate a first workspace based upon a first workspace definition; allow a user to execute a non-vetted application in the first workspace; determine that the first workspace is compromised; and receive, in response to the determination, from the workspace orchestration service, one or more other files or policies configured to enable the client IHS to instantiate a second workspace based upon a second workspace definition, where the second workspace definition allows execution of a vetted application corresponding to the non-vetted application. | 2021-05-06 |
20210135944 | DATA TRANSMISSION METHOD AND CORRESPONDING DEVICE - This application provides example data transmission methods and corresponding example devices. One example method includes sending, by a first device, a first packet to a second device, where the first packet includes transmission policy negotiation information, and where the transmission policy negotiation information is used to negotiate a transmission policy used when the second device uses a multipath connection. The first device can then receive a second packet from the second device, where the second packet includes first policy information, and where the first policy information indicates a transmission policy used when the second device uses the multipath connection. The first device can then transmit data with the second device based on the first policy information by using a transmission policy corresponding to the first policy information. | 2021-05-06 |
20210135945 | NETWORK APPARATUS, AND METHOD FOR SETTING NETWORK APPARATUS - An object of the present disclosure is to provide a network device and a method for setting the network device that can, in developing functional modules, perform abnormality detection based on statistical information and setting verification in consideration of a dependency relationship between the functional modules and statistical information and can address a change in a policy in the setting verification and a change in a condition in the abnormality detection. In the network device according to the present disclosure, an existing setting of each module, external information, a dependency relationship, and a policy are collected at one location (setting verification unit) by using a common language. When a new setting is made to the modules, a new dependency relationship is set, or new external information is acquired, the new setting is sent to the setting verification unit and checked against the existing setting, the external information, and the dependency relationship. Then, when the new setting is in a normal range of the policy, the new setting is made to the modules. | 2021-05-06 |
20210135946 | Wireless Device Feedback For Semi-persistent Scheduling Release - A wireless device may receive first configuration parameters, second configuration parameters and a third configuration parameter. The first configuration parameters are for a first SPS configuration and comprise a first configuration index and a first HARQ codebook identifier. The second configuration parameters are for a second SPS configuration and comprise a second configuration index and a second HARQ codebook identifier. The third configuration parameter indicates a deactivation state associated with the first configuration index and the second configuration index. A DCI is received that comprises a HARQ process number field. A value of bit(s) of the HARQ process number field indicates the deactivation state. The first HARQ codebook identifier may be the same as the second HARQ codebook identifier. An acknowledgement is transmitted indicating reception of the DCI. | 2021-05-06 |
20210135947 | LOW-LATENCY AND HIGH-BANDWIDTH DATA CABLE - A data cable compatible with twisted-pair standards and equipment uses separate coaxial wires with unique dielectric properties to transmit each of the signals and provide lower latency, greater bandwidth, and lower loss. This design addresses the latency issues that limit the physical size of supercomputers and can be significant for high-performance computing projects, cryptocurrency mining, high-frequency trading, and other time-sensitive applications via the use of a dielectric with a low refractive index and physical design that meets specifications for ethernet cables. The design provides for flexibility in overall shielding and the connections of shields for individual elements to address the likelihood of electromagnetic interference in an environment. The dimensions and choice of dielectric can be modified to provide higher velocity factors and/or greater bandwidth. | 2021-05-06 |
20210135948 | DISCOVERING A COMPUTER NETWORK TOPOLOGY FOR AN EXECUTING APPLICATION - There are disclosed devices, system and methods for continual automated discovering of a topology of a computer network of physical network objects for an application. A first physical network object selects portions of sets of data messages being sent over time by the application and related network objects; and collects network configuration and time dimension information, and timeseries information from the portions of messages. A second physical network object receives the information and uses it to determine topology information for the application over time, which includes unique keys of, types of objects of, types of relationships between pairs of, groupings of, time dimension data of and metrics data of the physical network objects. The topology information can be stored; and can be queried to create and display a graph representation of the topology information that changes over time. | 2021-05-06 |
20210135949 | CLOUD SERVICE INTERDEPENDENCY RELATIONSHIP DETECTION - A computer system includes a processor, a memory, a data collector, a relationships analyzer, and a topological map generator. The data collector retrieves performance data in a specific set of performance categories for computing resources in a computing system for a time interval. The relationships analyzer, for each computing resource-to-computing resource pair in the computing system, performs a correlation analysis of the respective behavior values of the computing resources in the pair, and identifies the computing resource-to-computing resource pairs that have correlation values exceeding a pre-determined threshold level as having performance interdependencies. The topological map generator prepares an undirected graph of the computing resources that have performance interdependencies, and displays the undirected graph as a topographic map of the computing resources in the computing system. | 2021-05-06 |
20210135950 | METHOD AND APPARATUS FOR CONTROLLING DISAGGREGATED RADIO ACCESS NETWORKS - Aspects of the subject disclosure may include, for example, obtaining a model of a communication network, applying first data to the model to generate an updated model, processing the updated model to establish a first control, enabling first communications in the communication network in accordance with the first control, obtaining first parametric data regarding the first communications in the communication network that are based on the first control, processing the first parametric data in accordance with the updated model to generate an updated first control, and enabling second communications in the communication network in accordance with the updated first control. Other embodiments are disclosed. | 2021-05-06 |
20210135951 | TIME SERIES DATA ANALYSIS - The present approach relates to the use of time series analyses to estimate times or time intervals when a user of IT resources is likely to schedule or request that an operation is run on those services. In certain implementations, the present approach performs forecasting using time series data and supervised machine learning techniques. These techniques may be used to help predict future times when an operation or operations may be requested for execution. Based on these predicted future time, automations (e.g., the automated execution of operations) may be scheduled so as to effectively utilize available resources and efficiently perform the operations. | 2021-05-06 |
20210135952 | DEVICE INTERFACE MATCHING USING AN ARTIFICIAL NEURAL NETWORK - An example method includes receiving first information from a first interface of a network infrastructure device. The method receives second information from a second interface of the network infrastructure device. The method compares a first value to a corresponding second value using a comparison selected, in part, due to a data type of the first value and the second value. The method determines whether the first interface and the second interface have provided matching data, based on inputting an output of the comparison into a first node of an ANN. | 2021-05-06 |
20210135953 | SYSTEMS AND METHODS FOR COMMUNICATION FLOW MODELING - Disclosed communication flow modeling solution is significantly streamlined in a user friendly way to shield users from the technical complexities usually required. At design time, an orchestration flow modeling application receives user instruction to open or create a communication flow modeling project. Per configuration specific to an enterprise associated with the user, a custom drag-and-drop communication flow modeling environment with a canvas and modeling entities is provided. Responsive to the user dragging and dropping a set of modeling entities from the menu onto the communication flow modeling canvas and drawing connections between them, the orchestration flow modeling application logically connects the modeling entities to form a valid communication flow and stores it in a database. The communication flow undergoes an approval process. Once approved, it is activated for execution by an orchestration server. The orchestration server automatically orchestrates services needed by the communication flow at runtime without user programming. | 2021-05-06 |
20210135954 | TELECOMMUNICATION EVENT OBJECT CLASSIFICATION BASED ON INFORMATION FROM MULTIPLE PROTOCOLS - A method performed by a computing system that collects information on transactions in a telecommunication system includes receiving an event object. The event object includes parameters associated with a telecommunication event. The method further includes classifying the event object, using a classification mechanism, as one of a plurality of Key Performance Indicators (KPIs) by using the parameters, including considering events from multiple protocols for classifying event objects. The method further includes, after classifying the event object, inferring relationships between a set of inputs and a set of outputs, the set of inputs including information types from the event object and the set of outputs including KPIs. | 2021-05-06 |
20210135955 | CONTROL APPARATUS, CONTROL SYSTEM, CONTROL METHOD OF CONTROL APPARATUS, AND RECORDING MEDIUM - A control apparatus comprises a first operating state reception part that receives the operating state of an application as a first operating state from two or more terminals; a second operating state presuming part that presumes terminal priority and a second operating state to which the first operating state will transition for each of the terminals on the basis of the first operating state received by the first operating state reception part; an assumption determining part that specifies as a control target terminal a terminal to be controlled with the assumption that the operating state has changed before the operating state changes on the basis of the terminal priority and the second operating state; and an assumption control part that executes predetermined processing assuming that the operating state of the control target terminal has changed to the second operating state presumed by the second operating state presuming part before the operating state of the control target terminal changes. | 2021-05-06 |
20210135956 | SYSTEMS AND METHODS FOR UPDATING THE CONFIGURATION OF A CLOUD SERVICE - The present disclosure facilitates improving the operation of a cloud service by updating its configuration information and its resource requirements. The resource utilization of the cloud service can be monitored, and a decision logic module can determine whether action is required. When action is required, an update can be prepared and applied, and notifications can be generated about the condition and its resolution. Resolutions can require correlation of multiple cloud services to provide real-time access to information that is not otherwise available to a single entity. Resolutions can be learned and predicted in a number of ways using a predictive engine. | 2021-05-06 |
20210135957 | INTELLIGENT DISTRIBUTED MULTI-SITE APPLICATION PLACEMENT ACROSS HYBRID INFRASTRUCTURE - A method of deploying a network service across multiple data centers, each having a cloud management server running a cloud computing management software to provision virtual infrastructure resources thereof for a first tenant among a plurality of tenants, includes maintaining for each data center static inventory data that indicate virtual infrastructure resources that are available thereat to the first tenant, identifying, in response to a network service request for the first tenant, a virtual network function associated with the network service, generating commands to deploy the virtual network function based on a descriptor of the virtual network function, selecting one of the data centers in which the virtual network function is to be deployed based on the descriptor of the virtual network function and the static inventory data of each data center, and issuing the commands to the selected data center to deploy the virtual network function. | 2021-05-06 |
20210135958 | NETWORK SERVICE LIFE CYCLE MANAGEMENT GRANT METHOD AND APPARATUS - This application provides a network service life cycle management grant method, including: receiving, by a first NFVO, an NS LCM operation request from a sender, where the NS LCM operation request carries an identifier of a first NS instance and a type of an NS LCM operation; sending, by the first NFVO, a grant request to a second NFVO based on the NS LCM operation request, to request the second NFVO to permit the first NFVO to perform virtual resource management for the NS LCM operation performed for the first NS instance. Accordingly, a grant management mechanism is used between the first NFVO and the second NFVO, to implement target consistency. | 2021-05-06 |
20210135959 | SUPPORT TICKET PLATFORM FOR IMPROVING NETWORK INFRASTRUCTURES - A support ticket platform improves the provision and maintenance of network infrastructures. A support ticket platform can include a support ticket server and a support ticket database that employ a unique architecture and configuration to provide such improvements in a scalable manner. The support ticket platform can be configured to automatically detect network issues and to leverage its unique architecture and configuration to automatically create support tickets to represent the network issues. The support ticket platform can employ network and company objects to rapidly create a large number of support tickets and to enable management of the support tickets as a group. The support ticket platform can also leverage its unique architecture and configuration to provide a number of additional functions for improving the provision and maintenance of network infrastructures. | 2021-05-06 |