24th week of 2021 patent applcation highlights part 80 |
Patent application number | Title | Published |
20210184836 | PROVIDING DATA AUTHORIZATION BASED ON BLOCKCHAIN - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for providing blockchain-based data authorization. One of the methods includes receiving, by a blockchain node, a data acquisition transaction submitted by a data user for obtaining target data possessed by a data owner, determining, by the blockchain node, that the data user has obtained authorization of the target data, and executing, by the blockchain node, a smart contract invoked by the data acquisition transaction to provide one or more of the target data and a computational result of one or more predetermined computational operations performed based on the target data to the data user. | 2021-06-17 |
20210184837 | METHODS AND APPARATUSES FOR READING BLOCKCHAIN DATA - Methods and apparatuses for retrieving blockchain data are disclosed. One method comprises: receiving a data retrieving request that comprises a target transaction identifier; identifying a transaction storage location that corresponds to the target transaction identifier as a target transaction storage location based on a pre-stored correspondence between transaction identifiers of transactions recorded on a blockchain associated with the blockchain network and transaction storage locations of the transactions; and retrieving data from the target transaction storage location in the blockchain. | 2021-06-17 |
20210184838 | METHOD AND APPARATUS FOR ESTABLISHING TRUSTED CHANNEL BETWEEN USER AND TRUSTED COMPUTING CLUSTER - Some embodiments of the present specification provide a method and an apparatus for establishing a trusted channel between a user and a trusted computing cluster. According to the method, when a user wants to establish a trusted channel with a trusted computing cluster, the user only negotiates a session key with any first trusted computing unit in the cluster to establish the trusted channel. Then, the first trusted computing unit encrypts the session key using a cluster key common to the trusted computing cluster to which the first trusted computing unit belongs, and sends the encrypted session key to a cluster manager. The cluster manager transmits the encrypted session key in the trusted computing cluster, so that other trusted computing units in the cluster obtain the session key and join the trusted channel. Thus, the user establishes a trusted channel with the entire trusted computing cluster. | 2021-06-17 |
20210184839 | SECURE COMMUNICATION METHOD - A secure communication method between at least one first entity and at least one second entity with a communication link in at least one network, includes a step of encryption, by the first entity, using a symmetric encryption algorithm, of content using a first key specific to the first entity; a step of aggregation, in a message, of the encrypted content with at least one key generation parameter specific to the first entity; a step of sending, by the first entity, of the message to the second entity; a step of determination, by the second entity, of the first key specific to the first entity using the key generation parameter specific to the first entity, of a first secret known by the second entity and of a key generating function; a step of decryption, by the second entity, of the encrypted content of the message received, using the first key. | 2021-06-17 |
20210184840 | Encrypted Search with a Public Key - A method for searchable encryption with a public key includes receiving an operation request front a user device associated with a user requesting that encryption of data associated with the user. The data includes a corpus of documents stored on a remote storage device. The method also includes receiving a public key associated with the user. The public key includes an asymmetric cryptographic public key. The method also includes generating a random data key. The data key includes a symmetric cryptographic key. The method also includes encrypting, using the data key, a search index for the corpus of documents based on keywords within the corpus of documents. The method also includes encrypting, using the public key, the data key and sending the encrypted data key to a user device associated with the user. | 2021-06-17 |
20210184841 | SECURE DISTRIBUTION AND MANAGEMENT OF CRYPTOGRAPHIC KEYS WITHIN A COMPUTING ENVIRONMENT USING DISTRIBUTED LEDGERS - The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely distribute and manage cryptographic keys within a computing environment using permissioned distributed ledgers. By way of example, an apparatus may receive a registration request and a first digital signature applied to the registration request from a device. Based on a validation of the first digital signature, the apparatus may approve the registration request and apply a second digital signature to the registration request and the first digital signature. In some examples, the second digital signature may be indicative of the approval of the registration request by the apparatus. The apparatus may also transmit the registration request and the first and second digital signatures to a computing system, which may validate the first and second digital signatures and perform operations that record a public cryptographic key of an application program executed at the device onto a distributed ledger | 2021-06-17 |
20210184842 | An ECDHE Key Exchange for Server Authentication and a Key Server - A server can receive a device public key and forward the device public key to a key server. The key server can perform a first elliptic curve Diffie-Hellman (ECDH) key exchange using the device public key and a network private key to derive a secret X1. The key server can send the secret X1 to the server. The server can derive an ECC PM key pair and send to the device the server public key. The server can conduct a second ECDH key exchange using the derived server secret key and the device public key to derive a secret X2. The server can perform an ECC point addition using the secret X1 and secret X2 to derive a secret X3. The device can derive the secret X3 using (i) the server public key, a network public key, and the device private key and (ii) a third ECDH key exchange. | 2021-06-17 |
20210184843 | SECURE MANAGEMENT AND REGENERATION OF CRYPTOGRAPHIC KEYS WITHIN A COMPUTING ENVIRONMENT USING PERMISSIONED DISTRIBUTED LEDGERS - The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely manage and regenerate cryptographic keys using permissioned distributed ledgers. For example, a device may receive, from a first computing system, data indicative of a recordation of a first public key onto a distributed ledger. Based on an occurrence of a regeneration condition, the device may transmit, to a second computing system, a second public key and a first digital signature, and the second computing system may validate the first digital signature, apply a second digital signature to the second public key, and transmit the second public key and the digital signatures to the first computing system. The device also receives, from the first computing system, additional data indicative of a recordation of the second public key onto the distributed ledger, and based on the additional data, the device may invalidate the first private key. | 2021-06-17 |
20210184844 | COMMUNICATION TERMINAL, SERVER APPARATUS, AND PROGRAM - A communication terminal which is capable of reducing load of a server apparatus by reutilizing a message key to be used for encrypting a message is provided. The communication terminal includes a session key storage part which stores a session key which is shared with another communication terminal and which is not shared with the server apparatus, a message key generating part which generates a message key, a message key storage part which stores the message key to be reutilized in association with a message key identifier, a message encrypting part which generates a message encrypted text based on a common key cryptosystem using the message and the message key, a message key encrypting part which generates a message key encrypted text based on a common key cryptosystem which can perform re-encryption using the session key and the message key, and an encrypted text transmitting part which transmits a group identifier which is an identifier of a group to which an own terminal belongs, the message key encrypted text or the message key identifier, and the message encrypted text to the server apparatus. | 2021-06-17 |
20210184845 | SECURE, DECENTRALIZED, AUTOMATED PLATFORM AND MULTI-ACTORS FOR OBJECT IDENTITY MANAGEMENT THROUGH THE USE OF A BLOCK CHAIN TECHNOLOGY - Secure management of keys and identities of an object manufactured by a manufacturer having a manufacturer key pair, and a client having a client key pair, the management being carried out using a decentralized blockchain database. The method includes generation of a manufacturing key pair; and publication and recording, in the blockchain, of the decentralized object identifier used to obtain the public key of the object. When a client purchases the object from the manufacturer, the method includes providing, by the object manufacturer, the object identifier, and the public manufacturing key to the client; and updating the blockchain. When the object is switched on for the first time, the object enrolls itself by generation of a utilization key pair; auto-enrollment using the manufacturing key pair; and replacement, in the blockchain, of the public manufacturing key associated with the object identifier with the public utilization key associated with the object identifier. | 2021-06-17 |
20210184846 | Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure - A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key. | 2021-06-17 |
20210184847 | AUTHENTICATION THROUGH SECURE SHARING OF DIGITAL SECRETS PREVIOUSLY ESTABLISHED BETWEEN DEVICES - Applications executing on phones, tablets and other client devices can be designed to authenticate with network services, but reliably identifying a client device that is not previously known to the service can be difficult. A television receiver or other trusted device that is previously known to the service, however, can act as an intermediary for initially delivering the client's identifying data to the authentication service. After the authentication service has received reliable identifying information about the client from another trusted device, the service is able to directly authenticate the client device in subsequent transactions by requesting and verifying receipt of the same secret identifier. | 2021-06-17 |
20210184848 | ENCRYPTION KEY ROTATION FRAMEWORK - Techniques are described herein for efficiently and expeditiously performing key rotation and key replacement. In an embodiment, a key replacement request is received that specifies one or more key names of a plurality of key names. A location-to-key-name mapping that maps the plurality of key names to a plurality of encrypted-data locations is used to determine one or more encrypted-data locations that are mapped to the one or more key names. A first set of messages is generated where each message identifies a table that is associated with the one or more encrypted-data locations. The first set of messages is stored in a queue for processing by a first plurality of worker processes. Each worker process of the first plurality of worker processes retrieves a message of the first set of messages from the queue and generates a message of a second set of messages that identifies a subset of encrypted data records from the table identified in the message of the first set of messages. Each message of the second set of messages is stored in a distinct queue which is assigned to a worker process of a second plurality of worker processes. Each worker process of the second plurality of worker processes retrieves the message from the assigned queue, decrypts the subset of encrypted data records identified in the respective message, re-encrypts the decrypted data records using a new encryption key that corresponds to a new key name, and stores the re-encrypted data records in a database. | 2021-06-17 |
20210184849 | PARAMETERISABLE SMART CONTRACTS - The invention relates to distributed ledger technologies such as consensus-based blockchains. Computer-implemented methods for parameterized smart contracts are described. The invention is implemented using a blockchain network, which may be, for example, a Bitcoin blockchain. A first transaction is received at a node in a blockchain network to validate, with the first transaction including a first script that, as a result of being executed, causes the node to at least obtain data and a first set of field values of the first transaction. A second transaction is obtained, with the second transaction including a second script that, as a result of being executed, causes the node to at least determine, based at least in part on the data supplied as a result of execution of the first script, a set of constraints, and verily, based at least in part on the first set of field values, that the set of constraints are applicable to the first transaction. The first transaction is validated according to the set of constraints as a result of execution of the first script and the second script. | 2021-06-17 |
20210184850 | SECURE MANAGEMENT OF TRANSFERS OF DIGITAL ASSETS BETWEEN COMPUTING DEVICES USING PERMISSIONED DISTRIBUTED LEDGERS - The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely manage transfers of digital assets between computing devices using permissioned distributed ledgers. By way of example, an apparatus may receive, from a first device, a request to transfer a digital asset to a second device and a first digital signature applied to the request. Based on a validation of the first digital signature, the apparatus may approve the request and apply a second digital signature to the request and the first digital signature indicative of the approval of the request by the apparatus. The apparatus may also transmit the request, the first digital signature, and the second digital signature to a computing system, which may validate the first and second digital signatures and perform operations that record the first public key and asset data identifying the digital asset within at least one element of a distributed ledger. | 2021-06-17 |
20210184851 | AUTHENTICATION DEVICE, SYSTEM AND METHOD - The present invention relates to secure transmission and reception of electronic messages using an authentication device. The authentication device includes a light sensor that is used to scan a visual element displayed on a display of a user device in conjunction with an electronic message having an encrypted payload. The visual element encodes a unique identifier that the authentication device transmits to a server, receiving in response a cryptographic key stored in association with the unique identifier and usable to decrypt an encrypted payload of the electronic message. The authentication device can also generate encryption keys and corresponding unique identifiers suitable for encryption of payloads of electronic messages. | 2021-06-17 |
20210184852 | SYSTEM AND METHOD FOR SECURELY TRANSMITTING NON-PKI ENCRYPTED MESSAGES - An embodiment of an automatic key delivery system is described, An automatic key delivery system comprises the following operations. Herein, a first token is generated and provided to a first network device. Thereafter, a first key value pair, including the first token and a first key segment of a cryptographic key, is received by a first relay server and a second key value pair, including the first token and a second key segment of the cryptographic key, is received from a second relay server. In response, a second token to be provided to the first relay server and the second relay server. Thereafter, the first and second key segment are returned from the first and second relay servers based on usage of the second token as a lookup in order to recover the cryptographic key for decryption of an encrypted content from the first network device. | 2021-06-17 |
20210184853 | SYSTEMS CONFIGURED TO MANAGE USER-RELATED EXTERNAL PARTY-ACTIVITY SOFTWARE OBJECTS BY USING MACHINE-READABLE INDICIA AND METHODS OF USE THEREOF - Systems for helping a user manage external party-activity software objects by using machine-readable indicia. In one embodiment, an exemplary computer-implemented method may comprise receiving a first request to link a digital profile of the application end user associated with the entity with a third-party entity. In response to receiving the first request, the second request is sent to a second server associated with the third-party entity, and a third request is received from the application end user for accessing at least one user-related external party-activity software object via the first server by using machine-readable indicia. A user interface is generated including the at least one user-related external party-activity software object based on the machine-readable indicia, and the at least one user-related external party-activity software object requires the user to complete the at least one activity associated with the third-party entity and is displayed within the user interface without the computing device associated with the application end user communicating with the second server associated with the third-party entity. The at least one user-related external party-activity software object comprises data fields that may be pre-populated with user-related, external party-related information. | 2021-06-17 |
20210184854 | DEVICE VALIDATION USING TOKENS - The present subject matter relates to techniques for validating an electronic device using tokens. In an example, the technique may include generating a token based on a unique identifier of the electronic device, a device signature, and a time-stamp of the electronic device. The token is shared with a user device to establish a session. The token is rotated at a fixed time interval. Upon successful verification of the token, a command received from the user device is executed on the electronic device. | 2021-06-17 |
20210184855 | SYSTEM AND METHOD OF MULTI-ROUND TOKEN DISTRIBUTION USING A BLOCKCHAIN NETWORK - A computer-implemented method to participate in a token transfer process for transferring a first quantity of token from a sender node to a recipient node using a blockchain is disclosed. The token transfer process includes a plurality of participating nodes and execution of a set of indirect token transactions between multiple pairs of the participating nodes. The method is implemented at a participating node and includes: obtaining a subset of the set of indirect token transactions, the subset including only those transactions for which the participating node is either an input node or an output node, wherein the set of indirect token transactions is generated based on the first quantity of tokens and a predefined number of transaction rounds in the token transfer process; for each indirect token transaction in the subset, collaborating with a respective second participating node included in the indirect token transaction to generate a commitment channel for the indirect token transaction between the participating node and the second participating node; and collaborating with all other participating nodes in executing the indirect token transactions of the subset using the generated commitment channels. | 2021-06-17 |
20210184856 | System and Method for Zero-Knowledge, Anonymous Verification and Management - A verification system using additional factors such as biometrics can provide a tenant system with the ability to verify the identity of an end user. The enrollment and verification can be performed without sharing identity knowledge between the tenant and the verification ensuring the privacy of the end user. The enrollment and verification can also be performed in an auditable way while maintaining anonymity. | 2021-06-17 |
20210184857 | BIOMETRIC SENSOR ON PORTABLE DEVICE - A method and system for secure remote digital interactions through the use of biometric templates is disclosed. In one example, the method includes an interaction that prompts the use of obtaining a first biometric template and comparing it to a second biometric template to determine if they match. The match process is performed on a portable device. | 2021-06-17 |
20210184858 | MULTI-FACTOR AUTHENTICATION FOR ACCESS CONTROL USING A WEARABLE DEVICE - A system and method for providing multi-factor authentication for access through a door, but without the user having to repeat a physical act of providing authentication every time that the door is opened, wherein the first time through the door, multi-factor authentication is provided to the access control system, and wherein each subsequent access through the door, multi-factor authentication is performed automatically and without intervention of the user as long as the user has a wearable device providing at least one factor of the multi-factor authentication, and the user has not removed the wearable device since the multi-factor authentication was last provided to the access control system. | 2021-06-17 |
20210184859 | VALIDATION AND CERTIFICATION OF DIGITAL ASSETS USING A BLOCKCHAIN - Systems and methods for validation and certification of digital assets using a blockchain are provided. An example method includes, using a hash function to generate at least one hash of at least one digital asset, the digital asset being associated with a plurality of digital assets, storing the hash to a database, determining that the plurality of digital assets have been digitally certified by an authorized user, in response to the determination, storing a record on the blockchain, the record including the hash of the digital asset associated with the plurality of digital assets, and upon receiving a request to verify authenticity of the digital asset, determining a further hash of the digital asset, and determining whether the hash stored on the blockchain matches the at least one further hash to selectively verify the authenticity of the digital asset. | 2021-06-17 |
20210184860 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ZERO ROUND TRIP SECURE COMMUNICATIONS BASED ON NOISY SECRETS - A system, method, and computer program product are provided for implementing zero round trip secure communications based on a noisy secret. In operation, a sender system utilizes a randomly generated message key for encrypting a message to send to a receiver system. The sender system selects a plurality of different sub-keys from a negotiated noisy secret to encrypt the randomly generated message key. The sender system encrypts the message utilizing the randomly generated message key. The sender system sends the encrypted message, all encrypted message keys, and a message MAC that is calculated and added for every sub-key, to the receiver system such that the receiver system is able to perform a MAC-based verification to test sub-key validity of the plurality of different sub-keys. | 2021-06-17 |
20210184861 | DECRYPTION AND VARIANT PROCESSING - A plurality of byte ranges forms a sample for content output from a player device, and includes at least one double-encrypted byte range. The plurality of byte ranges is stored in a secured memory, and the at least one double-encrypted byte range is partially decrypted to generate at least one decrypted singe-encrypted byte range. The plurality of byte ranges is stored in an unsecured memory using the at least one decrypted single-encrypted byte range in place of the at least one double-encrypted byte range. | 2021-06-17 |
20210184862 | Signatures Of Updates Exchanged In A Binary Data Synchronization Protocol - In a distributed system, data is shared between three or more electronic devices. The first device generates and signs an object that includes the data. A second device receives the signed object and determines whether the signed object is valid. If valid, the second device will generate a validated signed object and send it to a third device. The third device will validate the object by determining whether the object includes valid signatures of both the first and second devices. | 2021-06-17 |
20210184863 | METHOD AND SYSTEM FOR REGULATION OF BLOCKCHAIN-BASED PAYMENTS - A method for ensuring regulatory oversight of transaction activity and storage thereof on a blockchain includes: establishing a secure communication channel between a first computing system associated with a first entity and a second computing system associated with a second entity; receiving transaction data from the first computing system, wherein the transaction data includes a first digital certificate from the first computing system and second digital certificate from the second computing system; identifying a regulatory node that has regulatory oversight of the first entity or the second entity; transmitting at least a portion of the transaction data to the regulatory node; receiving a third digital certificate from the regulatory node; and posting a transaction hash including the first digital certificate, second digital certificate, and third digital certificate to a blockchain. | 2021-06-17 |
20210184864 | METHODS AND SYSTEMS FOR IMPLEMENTING MIXED PROTOCOL CERTIFICATES - A system for implementing mixed protocol certificates, the system includes a subject device designed and configured to receive, from an issuing device, a first digital certificate, wherein the first digital certificate further comprises a first digital signature public and private key pair according to a first digital signature protocol and a second digital signature public key according to a second digital signature protocol, wherein the second digital signature protocol is distinct from the first digital signature protocol, to generate a second digital certificate, wherein generating the second digital certificate comprises generating a subject digital signature signing the certificate, the subject digital signature generated as a function of the second digital signature protocol and to provide the first digital certificate and the second digital certificate to a verifying device. | 2021-06-17 |
20210184865 | IN-VEHICLE CONTROLLER AND METHOD FOR EMBEDDING CERTIFICATE FOR SAME - An in-vehicle controller and a method for embedding a certificate for the same are provided. disclosure The method may include: transmitting a public key request from a first server to a controller requiring a certificate embedding; generating a key pair including a private key and a public key by a hardware security module included in the controller according to the public key request and transmitting the public key in the key pair to the first server via the controller; transmitting a hash of a certificate signing request (CSR) message to the controller when the first server generates the CSR message based on the public key; when the hardware security module signs the hash with the private key, transmitting the signed hash to the first server via the controller; and completing a generation of the CSR message by the first server based on the signed hash. | 2021-06-17 |
20210184866 | ENFORCEABLE PSEUDONYMOUS REPUTATION THROUGH CHAINED ENDORSERS - Techniques are disclosed to provide enforceable pseudonymous reputation through chained endorsers. In various embodiments, a request associated with a chained endorsement operation is received via a communication interface. A client identity information is extracted from the request. Data comprising or associated with the client identity information is combined with a secret value. A one-way transform of the combined value is performed. A result of the one-way transform is returned to a client with which the chained endorsement operation is associated. | 2021-06-17 |
20210184867 | USER AUTHENTICATION WITH SELF-SIGNED CERTIFICATE AND IDENTITY VERIFICATION - In embodiments, an authentication server interfaces between a user device with a self-signed certificate and a verifying computer that accepts a user name and password. The user device generates a self-signed certificate signed by a private key on the user device. The self-signed certificate is transmitted to a verifying party computer over a network. The verifying party stores the self-signed certificate with user identification data, including at least one of a user name, user address, user email, user phone number, user tax ID, user social security number and user financial account number. In subsequent communications, the verifying party receives a certificate chain including the self-signed certificate, and matches that with the user identification data stored in a database. | 2021-06-17 |
20210184868 | NETWORK NODE ENCRYPTION METHOD AND APPARATUS - A method for network node encryption is provided. A node encryption request is received for a network node. Subsequently, node data information of the network node according to the node encryption request is acquired by the apparatus. The node data information includes a preset link. Next, an application to a third party for an encryption certificate is transmitted via the apparatus and the application includes the node data information. The third party sends a verification file once the application is received to verify an authority to the preset link. The verification file is stored subsequently. The third party verifies the storing of the verification file and sends an encryption certificate. The encryption certificate is received and deployed on the network node via the apparatus. | 2021-06-17 |
20210184869 | MUTUAL AUTHENTICATION PROTOCOL FOR SYSTEMS WITH LOW-THROUGHPUT COMMUNICATION LINKS, AND DEVICES FOR PERFORMING THE SAME - Discussed is a mutual authentication protocol, and systems, methods and devices implementing the same. Such a protocol may be used, as a non-limiting example, by devices coupled by low throughput connections for speedy authentication to establish a secure communication session. | 2021-06-17 |
20210184870 | CAPACITOR BASED PHYSICAL UNCLONABLE FUNCTION - The present disclosure relates to a PUF apparatus for generating a persistent, random number. The random number is determined by selecting one or more PUF cells, each of which comprise a matched pair of capacitors that are of identical design, and determining a value that is accurately and reliably indicative of a random manufacturing difference between them, based in which the random number is generated. The random manufacturing differences between the capacitors creates the randomness in the generated random number. Furthermore, because the random manufacturing difference should be relatively stable over time, the generated random number should be persistent. | 2021-06-17 |
20210184871 | MEMORY DEVICE AND MEMORY SYSTEM HAVING THE SAME - A memory system includes a plurality of memory cells at intersections between a plurality of word lines and a plurality of bit lines, and a plurality of bit line sense amplifiers connected to the plurality of bit lines, the plurality of bit line sense amplifiers configured to write data to or read data from the plurality of memory cells through the plurality of bit lines, a redundancy bit line sense amplifier among the plurality of bit line sense amplifiers configured to generate a physically unclonable function (PUF) key including a unique random digital value. | 2021-06-17 |
20210184872 | AUTHENTICATION APPARATUS AND METHOD - An interface element connected to a device and a security die-chip are fabricated in a single package. The security die-chip may provide a security authentication function to the interface element that does not have the security authentication function. The security die-chip may include a physically unclonable function (PUF) to provide a private key, and a hardware security module to perform encryption and decryption using the private key. | 2021-06-17 |
20210184873 | CABLE ISOLATION SYSTEM - A cable isolation system that includes a cable that includes a first end, a second end, and a cable transmission medium that extends between the first end and the second end. The cable isolation system also includes a first connector that is located on the first end of the cable, that is coupled to the at least one cable transmission medium, and a second connector that is located on the second end of the cable, that is coupled to the at least one cable transmission medium. A cable isolation device is provided in at least one of the cable, the first connector, or the second connector and transitions between a non-isolated state that allows data to be transmitted via the cable transmission medium, and an isolated state that prevents data from being transmitted via the cable transmission medium. | 2021-06-17 |
20210184874 | BITRATE UTILIZATION FEEDBACK AND CONTROL IN 5G-NSA NETWORKS - Disclosed are technologies for optimally utilizing | 2021-06-17 |
20210184875 | Charging Control for Non-Public Network - A session management function sends, to a policy control function, a policy request message. The policy request message comprises a non-public network identifier of a non-public network through which a wireless device accesses a public land mobile network. The policy request message comprises an identifier of the public land mobile network. The session management function receives, from the policy control function, a policy response message comprising a charging control policy. | 2021-06-17 |
20210184876 | AUTOMATIC CONFERENCE MANAGEMENT TOOL - Techniques are described herein for implementing a conference management tool to start, schedule, and manage conferences. The techniques include receiving a scheduling request to schedule a conference from a user device via a communication channel. The communication channel can include a chatbot that is configured to access a calendar and an address book to fulfill the scheduling request. The chatbot may add a calendar association comprising the conference information to the calendar and retrieve contact information associated with one or more participants of the conference from the address book. The chatbot may also send a conference notification to the one or more participants, wherein the conference notification includes conference information that is associated with a conference code that may be presented to the user device. | 2021-06-17 |
20210184877 | Context-Dependent In-Call Video Codec Switching - A method for context-dependent in-call video codec switching includes receiving an indication that a far-side endpoint includes a capability to switch from an initial video codec to a secondary video codec during a call. During a call with the far-side endpoint, the method includes determining that a performance of an encoder satisfies a codec switching threshold. The codec switching threshold indicates that the performance of the encoder justifies switching from the initial video codec mid-stream of the call. During a call with the far-side endpoint, the method also includes switching from the initial video codec initially negotiated to govern the call to the secondary video codec. | 2021-06-17 |
20210184878 | MESSAGING TO ENFORCE OPERATION SERIALIZATION FOR CONSISTENCY OF A DISTRIBUTED DATA STRUCTURE - Disclosed embodiments provide for collaborative access to a distributed data structure. Operations such as inserting, deleting, and annotating are performed by various clients participating in the collaboration. A serialization service enforcing a single order of these operations and ensures the operations and order are communicated to all of the clients participating in the collaboration. Once all clients have acknowledged particular operations, this information is also communicated to all of the clients, such that the clients may perform maintenance activities on the collaboration data structures. The result is a rolling collaboration window shared by all of the clients of the collaboration, with a bottom of the collaboration window defined by a lowest ordered operation not yet acknowledged by all clients of the collaboration, and a highest ordered operation as assigned by the serialization service. | 2021-06-17 |
20210184879 | SYSTEM AND A METHOD FOR FACILITATING MEETING CONTENT FOR ATTENDING A MEETING - A system and a method for facilitating meeting content to be referred for attending a meeting. The system receives a current meeting information associated with the meeting. The system computes similarity scores corresponding to a plurality of past meeting information against the current meeting information. The system identifies a past meeting information with highest similarity score and a set of past service provider entities from the past meeting information. The system identifies a past skillset based on a set of past service provider parameters associated with the set of past service provider entities and correlates the past skillset with a current skillset associated with at least one current service provider entity to identify a skill gap, between the past and current skillsets. The system extracts and facilitates meeting content to the at least one current service provider entity for attending the meeting based on the identified skill gap. | 2021-06-17 |
20210184880 | BITMAP BASED RESOURCE SCHEDULING IN A WIRELESS NETWORK - A device for operation in a wireless network may comprise a transmitter configured to transmit protocol information to a plurality of base stations. The protocol information may comprise resource scheduling information and sequence number information. The resource scheduling information may include a bitmap which indicates whether subchannels are organized consecutively or whether subchannels are distributed. The sequence number information may allow the plurality of base stations to sequentially order received packets. The transmitter may be further configured to transmit data, to the plurality of base stations, in accordance with the resource scheduling information and the sequence number information. | 2021-06-17 |
20210184881 | DELEGATION OR REVOCATION OF TRIGGER EXECUTION IN AN AUTOMATED ENVIRONMENT - A triggered action set for a first device can be defined by the first device. Instructions for executing the triggered action set can be provided by the first device to a second device. Subsequent to providing the instructions, the first device can monitor the status of the second device; if the delegate device enters a state in which it is presumed to be unavailable to execute the trigger, the first device can monitor for a triggering event associated with the triggered action set and send a control message to an accessory device in response to detecting the triggering event. | 2021-06-17 |
20210184882 | VARIABLE INFORMATION COMMUNICATION - A method, system, computer readable storage medium, or apparatus provides for obtaining first information of a user (e.g., a user profile), wherein the user may be associated with a mobile device; based on the first information of the user, determining whether to communicate with the user via local area communication or wide area communication (e.g., a communication context) during a first period; determining to communicate via wide area communication during the first period; based on the determining to communicate via the wide area communication during the first period, sending an alert to invite the user associated with the mobile device to communicate with a remote domain (e.g., a remote physical location, such as a home, business, park, etc.); and based on acceptance of the invite, assigning a token for the user associated with the mobile device to further communicate with the remote domain. | 2021-06-17 |
20210184883 | LOCATION-BASED DEVICE AUTOMATION - This disclosure describes systems, methods, and computer program products for identifying a presence of a plurality of mobile devices at a geographic location, determining security system automation settings for the geographic location based on the identified plurality of mobile devices, and based on the determination, configuring a security system automation setting for the geographic location. | 2021-06-17 |
20210184884 | FLEET OF HOME ELECTRONIC SYSTEMS - Systems and methods to manage a fleet of home electronic systems are described. The system receives event information at a home fleet management application for managing a first set of home electronic systems including a second set of home electronic systems. The event information includes sensor information. The system aggregates the sensor information according to geographic areas to generate aggregated sensor information. The geographic areas include a first geographic area. The system receives first selection information that selects a first action identifier and the first geographic area. The first action identifier identifies a first action and the first geographic area identifies the second set of home electronic systems. The system communicates first action information to the second set of home electronic systems responsive to receiving the first selection information. The first action information causes a thermostat to establish a temperature range in the second plurality of home electronic systems. | 2021-06-17 |
20210184885 | METHOD FOR MANAGING ACCESS CONTROL LIST BASED ON AUTOMOTIVE ETHERNET AND APPARATUS USING THE SAME - Disclosed herein are a method for managing an access control list based on an automotive Ethernet and an apparatus for the same. The method includes analyzing a new access control rule that is input to a vehicle in which the automotive Ethernet is applied, searching for any one target unit to manage the new access control rule in consideration of at least one of a destination and an application target corresponding to the new access control rule, and storing the new access control rule by transmitting a storage request message corresponding to the new access control rule to the target unit. | 2021-06-17 |
20210184886 | In-vehicle information processing for unauthorized data - A network hub is provided for an onboard network system. The onboard network system includes first and second networks for transmission of first-type and second-type frames following first and second communication protocols. The network hub includes a receiver that receives a first-type frame. A processor determines whether or not the first-type frame received by the receiver includes first information that is a base for a second-type frame to be transmitted to the second network, to obtain a determination result, and selects a port to send a frame based on the first-type frame based on the determination result. A transmitter sends the frame based on the first-type frame to a wired transmission path connected to the port selected by the processor based on the first-type frame received by the receiver. | 2021-06-17 |
20210184887 | LABEL BASED ISOCHRONOUS CONNECTION UPDATE - This disclosure describes systems, methods, and devices related to label based isochronous connection update. A central Bluetooth low energy (BLE) device may send a plurality of labels to a peripheral BLE device during a setup of a BLE communication to notify the peripheral BLE device of one or more labels to be used during the BLE communication. The central BLE device may determine a channel variation between the central BLE device and the peripheral BLE device. The central BLE device may send a first label to the peripheral BLE device to indicate an isochronous (ISO) parameter update that will occur at a first time offset based on the channel variation. The central BLE device may implement the isochronous parameter update at the first time offset based on the channel variation. | 2021-06-17 |
20210184888 | METHOD FOR OPERATING A SENSOR ARRANGEMENT IN A MOTOR VEHICLE ON THE BASIS OF A DSI PROTOCOL - The invention relates to a method for operating a sensor arrangement ( | 2021-06-17 |
20210184889 | CAN COMMUNICATION PROTOCOL SYSTEM FOR EXCHANGING FUEL AND/OR OPERATING FLUID CONSUMPTION-OPTIMIZING AND NOISE-OPTIMIZING MESSAGES BETWEEN DRIVE COMPONENTS AND OUTPUT COMPONENTS - A CAN communication protocol system for exchanging fuel consumption-optimizing and/or operating fluid consumption-optimizing and noise-optimizing messages between drive components and output components, which also help to increase the overall availability of the system, and method. Described is also a CAN communication protocol system for an internal combustion engine for exchanging fuel consumption-optimizing and/or operating fluid consumption-optimizing and noise-optimizing messages between drive components and output components, which also help to increase the overall availability of the system. | 2021-06-17 |
20210184890 | Apparatus and Method for Diagnosing Sleep of CAN for Vehicle - A controller area network (CAN) sleep diagnosis apparatus can be used with a vehicle. A CAN signal detector is configured to detect a CAN signal from a CAN that connects a plurality of controllers and a CAN sleep diagnosis unit is configured to diagnose whether the CAN enters a sleep state. A memory unit is configured to determine whether to store data received from the CAN signal detector and the CAN sleep diagnosis unit depending on whether the CAN enters the sleep state and to store the data in a memory. A diagnosis unit is configured to check the data stored in the memory and to diagnose a non-sleep state of the CAN. | 2021-06-17 |
20210184891 | SURGICAL INSTRUMENT WITH SINGLE WIRE DIGITAL COMMUNICATION OVER DIFFERENTIAL BUS - A single wire digital communication system for use with an ultrasonic surgical instrument and an ultrasonic surgical instrument including a single wire digital communication system. The single wire digital communication system includes first transmitter logic buffer and first receiver logic buffer operably coupled to a first single wire device via a first single wire communication bus. The single wire digital communication system also includes a first differential transceiver operational amplifier operably coupled to the first transmitter logic buffer via a first transmitter signal line and operably coupled to the first receiver logic buffer via a first receiver signal line. A second differential transceiver operational amplifier is operably coupled to the first differential transceiver operational amplifier via at least one differential bus. A second single wire device is operably coupled to the differential bus and configured to communicate with the first single wire device. | 2021-06-17 |
20210184892 | METHOD OF CONTROLLING COMMUNICATION SYSTEM, COMMUNICATION SYSTEM, AND RELAY DEVICE - A method includes: (a) transmitting, by the control device, control data containing one of the plurality of second parameters to the relay device; (b) determining, by at least one of the control device or the relay device, whether the one of the plurality of second parameters matches one of the plurality of first parameters; and (c) transmitting, by the relay device, the control data received from the control device in (a), using one of the plurality of interfaces of the relay device for which the one of the plurality of second parameters is set if it is determined in the determining that the one of the plurality of first parameters matches the one of the plurality of second parameters. | 2021-06-17 |
20210184893 | ETHERNET CONNECTIVITY USING LAYER 2 TO LAYER 3 MULTIPLEXING - A provisioning method and apparatus provided herein are directed to provisioning of customer equipment (CEs) remotely located at different customer sites via Ethernet. By assigning a CE IP address to a CE where the CE IP address is associated with a plurality of virtual local area network (VLAN) tags and assigning an aggregation equipment (AE) IP address to an AE, first communication between the CE and the AE may be established using the CE IP address and the AE IP address, a VLAN tag from the plurality of VLAN tags at the CE based on information received from the AE may automatically be selected, and second communication between the CE and the AE may be established using the selected VLAN tag. | 2021-06-17 |
20210184894 | ACTN Virtual Network Augmentation for Resource Sharing - A method of managing a virtual network, VN, comprising a plurality of VN members comprises associating ( | 2021-06-17 |
20210184895 | SYSTEM AND METHOD FOR DISTRIBUTED FLOW STATE P2P SETUP IN VIRTUAL NETWORKS - Systems and methods for virtual network implementation and management based on a peer-to-peer metadata exchange are disclosed. Metadata pertaining to a flow traversing a virtual network overlaying an underlying network is generated in accordance with actions executed to send data packets via the underlying network relative to the virtual network. The metadata is encapsulated in one or more control packets sent to a set of nodes of the underlying network. Each node of the set of nodes maintains a copy of the metadata received in the one or more control packets in a local data store. The metadata is accessed via the local data store when needed to process packets of the flow. | 2021-06-17 |
20210184896 | ELASTIC VPN THAT BRIDGES REMOTE ISLANDS - A network device employs a transmitter configured to transmit a registration request to a software defined network (SDN) controller. The network device employs a receiver to receive a reply from the SDN controller. The reply indicates a plurality of provider edge (PE) devices coupled to a carrier network. The network device employs a processor to cause the transmitter and receiver to establish a plurality of asymmetric connections to a virtual private network (VPN) operating over a wide area network (WAN) via the PE devices. | 2021-06-17 |
20210184897 | PACKET PROCESSING METHOD AND GATEWAY DEVICE - A packet processing method and a gateway device are provided. The method includes: A first gateway device receives, by using a first link, a first one-arm BFD echo packet returned by a network device, where the first one-arm BFD echo packet includes identification information, and the identification information is used to uniquely identify a second gateway device. The first gateway device determines, based on the identification information, to forward the first one-arm BFD echo packet to the second gateway device. The first gateway device sends the first one-arm BFD echo packet to the second gateway device. The network device is multi-homed connected to the first gateway device and the second gateway device. The first gateway device and the second gateway device form a multi-active gateway. According to the method, efficiency of detecting, by using a one-arm BFD echo session in a VXLAN multi-active gateway scenario is improved. | 2021-06-17 |
20210184898 | FLOW GENERATION FROM SECOND LEVEL CONTROLLER TO FIRST LEVEL CONTROLLER TO MANAGED SWITCHING ELEMENT - A network system that includes a first set of network hosts in a first domain and a second set of network hosts in a second domain. Within each of the domains, the system includes several edge switching elements (SEs) that each couple to the network hosts and forward network data to and from the set of network hosts. Within the first domain, the system includes (i) an interior SE that couples to a particular edge SE in order to receive network data for forwarding from the edge SE when the edge SE does not recognize a destination location of the network data and (ii) an interconnection SE that couples to the interior SE, the edge SE, and the second domain through an external network. When the edge SE receives network data with a destination address in the second domain, it forwards the network data directly to the interconnection SE. | 2021-06-17 |
20210184899 | COMMUNICATION SYSTEM AND METHOD USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM) WITH PHYSICAL LAYER SECURITY - A system includes first and second sets of communication devices. A processor coupled to the first set of communication devices produces a first encoded vector and transmits the first encoded vector to the second set of communication devices via a communication channel that applies a channel transformation to the first encoded vector during transmission. A processor coupled to the second set of communication devices receives the transformed signal, detects an effective channel thereof, and identifies left and right singular vectors of the effective channel. A precoding matrix is selected from a codebook of unitary matrices based on a message, and a second encoded vector is produced based on a second known vector, the precoding matrix, a complex conjugate of the left singular vectors, and the right singular vectors. The second encoded vector is sent to the first set of communication devices for identification of the message. | 2021-06-17 |
20210184900 | INTERFERENCE MITIGATION - Symbols are received on a downstream channel. A value of a channel synchronization parameter is determined based on the received symbols. An interference event on the downstream channel is detected. In response to detecting the interference event: an output signal is determined based on at least one cached value of the channel synchronization parameter, the at least one cached value being determined based on symbols received prior to and offset from said detecting of the interference event. | 2021-06-17 |
20210184901 | LORA ADVANCED RECEIVER - A LoRa receiver for processing digital chirp spread-spectrum modulated signals with an advanced module for the determination of the timing error and/or of the frequency error arranged to estimate a position of a frequency discontinuity in each symbol, extract one or more frequency-continuous fragments out of each symbol, dechirp the coherent fragments, determine a timing error, and/or a frequency error, and/or a modulation value, and/or a SNR. | 2021-06-17 |
20210184902 | FLEXIBLE WAVEFORM SYNTHESIS IN NR-SS - Flexible waveform synthesis is disclosed for new radio (NR) shared spectrum (NR-SS) networks. In order to accommodate variable transmission resources, a transmitter may construct an M×N grid to model a resource element (RE) map of transmission resources available to the transmitter within a shared communication channel, where M corresponds to a number of symbols for a scheduled physical signal and N corresponds to a number of tones of a transmission bandwidth for the transmitter. The transmitter may then map the M×N grid to the RE map and puncture one or more REs associated with the subbands unavailable for transmission in the transmission resources. The transmitter may then transmit a transmission according to the unpunctured REs of the RE map. | 2021-06-17 |
20210184903 | SYSTEMS AND METHODS FOR IDENTIFYING POLARIZATION/QUADRATURE CHANNELS IN DUAL-POLARIZATION COHERENT OPTICAL TRANSMISSION - Described are systems and methods for identifying the phase and polarization of independent modulation streams in quadrature channels of a coherent transmission system by using digital code. As a result, phase rotation and polarization of streams that during transmission may have become rotated and swapped around in the channel are correctly labeled and depermuted according to a known and predictable order. | 2021-06-17 |
20210184904 | BASE STATION, USER EQUIPMENT, CONTROL CIRCUIT, AND STORAGE MEDIUM - A base station in a radio communication system in which a radio frame including sub-frames is transmitted/received between a base station and a user equipment using an orthogonal frequency division multiple access scheme. The base station includes: a first multiplexer multiplexing downlink control information in first OFDM symbol positions of the sub-frames in a frequency domain by allocating resources in a manner that the resources are dispersed in the frequency direction in units of resource blocks each constituted by sub-carriers; a second multiplexer multiplexing user information in OFDM symbol positions other than the first OFDM symbol positions of the sub-frames in the frequency domain by allocating resources in a manner that the resources are dispersed in the frequency direction in units of resource blocks; and an inserter inserting a guard time before and after the first OFDM symbol position. | 2021-06-17 |
20210184905 | TRANSMITTER AND METHOD OF TRANSMITTING AND RECEIVER AND METHOD OF DETECTING OFDM SIGNALS - A transmitter transmits payload data using Orthogonal Frequency Division Multiplexed (OFDM) symbols. The first OFDM symbol is a first type having a number of sub-carriers which is less than or equal to the number of sub-carriers of the one or more second OFDM symbols of a second type and a guard interval for the first OFDM symbol is selected in dependence upon the longest possible guard interval of the second OFDM symbol. Accordingly an OFDM communications system can be formed in which data is transmitted using a frame structure in which a guard interval is adapted to allow a mix of different types of OFDM symbols. | 2021-06-17 |
20210184906 | NUMEROLOGY COMBINATION SETS FOR MULTI-CARRIER OPERATION - Systems and methods for determining a set of numerologies for performing multicarrier operation of a user equipment for operating signals on at least a first carrier in a first cell and a second carrier in a second cell are provided. | 2021-06-17 |
20210184907 | METHOD AND APPARATUS FOR GENERATING SPREAD SYMBOLS - The present disclosure provides a method and apparatus for generating spread symbols. The method includes: determining a spreading sequence according to a spreading sequence matrix, where the spreading sequence matrix is generated according to performance parameters of a plurality of user terminals; and spreading initial symbols by using the determined spreading sequence to generate spread symbols. | 2021-06-17 |
20210184908 | Sounding Reference Signal Design - Methods and devices for assigning sounding reference signals (SRS) resources to UEs in a wireless communication network are provided. Configuration information is sent to a UE, the configuration information pertaining to a first sequence identifier (ID) to be used by the UE to generate a plurality of SRS sequences to be sent by the UE as at least part of a first SRS. Each SRS sequence of the plurality of SRS sequences is a function of a respective SRS sequence root that is a function of the first sequence ID. The first sequence ID may be a UE-specific sequence ID that is a function of a UE-specific ID associated with the UE, such as a Cell-Radio Network Temporary Identifier (C-RNTI). | 2021-06-17 |
20210184909 | METHOD AND DEVICE FOR TRANSMITTING OR RECEIVING SUPERPOSITION CODING SIGNAL BY USING DEVICE-TO-DEVICE COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM - The present application discloses a method for transmitting an uplink relay signal by a relay terminal in a wireless communication system. Specifically, the method comprises the steps of: superposition encoding relay data and side link data according to a predetermined power ratio so as to generate the uplink relay signal; and transmitting the uplink relay signal and a superposition encoding-specific reference signal sequence corresponding to the power ratio to a base station and a target terminal. | 2021-06-17 |
20210184910 | CODING AND MODULATION APPARATUS USING NON-UNIFORM CONSTELLATION - A coding and modulation apparatus and method are presented. The apparatus ( | 2021-06-17 |
20210184911 | User Selectable Optimization of Data Transmission Compression for Electronic Devices - A process for modifying wireless data compression for a wireless electronic device includes displaying an application for modifying data compression on a display of the electronic device. The process further includes receiving a request from a user to modify a current data compression with a new data compression through an input device, evaluating the requested new data compression request in view of predetermined information of the user with a processor, and updating the wireless data compression with the new data compression after the evaluation with the processor. | 2021-06-17 |
20210184912 | SERVICE OAM VIRTUALIZATION - A SOAM virtualization system for a network having at least first and second maintenance entities coupled to each other comprises a network controller coupled to at least one of the first and second maintenance entities through a tunnel for virtualizing a SOAM network function on the at least one of the first and second maintenance entities to which the network controller is coupled. The network controller may be coupled to the first and second maintenance entities through first and second tunnels, respectively. The first maintenance entity may an originator device, and the second maintenance entity may be a destination device, with the network controller virtualizing the SOAM network function on both devices. The network controller may send a packet containing a tunnel header and a SOAM frame via the first tunnel to the originator device, which then sends the packet containing the SOAM frame to the destination device. | 2021-06-17 |
20210184913 | Out-of-Band Monitoring and Provisioning - A method is disclosed for out-of-band data communication with a base station in a wireless network, the method comprising: determining, at a base station in a cellular access network, the base station configured to use a coordination server and to a first core network for providing network access to user equipments (UEs), an occurrence of an event regarding a communication problem related to the base station; sending an out-of-band message, via an embedded UE module coupled to the base station attached to a second core network, to the coordination server, based on the occurrence of the event at the base station; updating, at the coordination server, a stored status for the base station, thereby enabling a status of the base station to be updated at the coordination server via an out-of-band message. | 2021-06-17 |
20210184914 | NETWORK DIAGNOSIS IN SOFTWARE-DEFINED NETWORKING (SDN) ENVIRONMENTS - Example methods and systems are provided for network diagnosis. One example method may comprise: detecting an egress packet and determining whether each of multiple network issues is detected for the egress packet or a datapath between a first virtualized computing instance and a second virtualized computing instance. The method may also comprise: generating network diagnosis code information specifying whether each of the multiple network issues is detected or not detected; generating an encapsulated packet by encapsulating the egress packet with an outer header that specifies the network diagnosis code information; and sending the encapsulated packet towards the second virtualized computing instance to cause a second computer system to perform one or more remediation actions based on the network diagnosis code information. | 2021-06-17 |
20210184915 | DEEP FUSION REASONING ENGINE (DFRE) FOR PRIORITIZING NETWORK MONITORING ALERTS - In one embodiment, a service that monitors a network detects a plurality of anomalies in the network. The service uses data regarding the detected anomalies as input to one or more machine learning models. The service maps, using a conceptual space, outputs of the one or more machine learning models to symbols. The service applies a symbolic reasoning engine to the symbols, to rank the anomalies. The service sends an alert for a particular one of the detected anomalies to a user interface, based on its corresponding rank. | 2021-06-17 |
20210184916 | NODE HEALTH PREDICTION BASED ON FAILURE ISSUES EXPERIENCED PRIOR TO DEPLOYMENT IN A CLOUD COMPUTING SYSTEM - To improve the reliability of nodes that are utilized by a cloud computing provider, information about the entire lifecycle of nodes can be collected and used to predict when nodes are likely to experience failures based at least in part on early lifecycle errors. In one aspect, a plurality of failure issues experienced by a plurality of production nodes in a cloud computing system during a pre-production phase can be identified. A subset of the plurality of failure issues can be selected based at least in part on correlation with service outages for the plurality of production nodes during a production phase. A comparison can be performed between the subset of the plurality of failure issues and a set of failure issues experienced by a pre-production node during the pre-production phase. A risk score for the pre-production node can be calculated based at least in part on the comparison. | 2021-06-17 |
20210184917 | COMMUNICATIONS METHODS AND APPARATUS FOR MINIMIZING AND/OR PREVENTING MESSAGE PROCESSING FAULTS - The present invention relates to methods and apparatus for detecting, minimizing and/or preventing message processing faults and in particular message processing fault avalanches at a single processing device and among a cluster of message processing devices. An exemplary method embodiment includes: enabling message blocking at a Session Border Controller (SBC) for Session Initiation Protocol (SIP) messages including a first key value in response to a first threshold number of SIP messages including the first key value having caused a SIP message processing failure; receiving, at the SBC, a SIP message including at least one key value; determining if message blocking is enabled for one or more key values included in the SIP message; and dropping by the SBC the SIP message in response to determining that message blocking is enabled for one or more key values included in the SIP message, but otherwise processing the SIP message by the SBC. | 2021-06-17 |
20210184918 | DEVICE, COMPUTER PROGRAM AND METHOD - A method of managing a computer network is described. The method comprising: identifying a characteristic of data traffic being sent over the computer network; and applying a policy to at least part of the network, the policy defining the operation of at least part of the network in event of a failure within the network and being defined on the basis of the characteristic of the data traffic. | 2021-06-17 |
20210184919 | PROCESSING METHOD AND DEVICE FOR LINK RECOVERY PROCESS, AND TERMINAL - Embodiments of the present disclosure provide a processing method and device for a link recovery procedure, and a terminal. The method comprises: a terminal determining that there is no need to monitor a downlink control channel on a first cell; and the terminal skipping a link recovery procedure, or the terminal determining a set of reference signals and executing, on the basis of the set of reference signals, a link recovery procedure. | 2021-06-17 |
20210184920 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE, AND RECORDING MEDIUM - A master-slave communication system ( | 2021-06-17 |
20210184921 | NETWORK DEVICE MAINTENANCE - A method to access a device may include obtaining, at a first device, data over a short-range wireless network from a second device. The data may originate at a remote system that sends the data to the second device through a network connection over a wide area network. The method may also include in response to a fault at the second device, obtaining, at the first device from the remote system, a maintenance command for the second device. The maintenance command may be obtained by the first device over an analog voice network. The method may also include directing, from the first device to the second device, the maintenance command over the short-range wireless network to enable the second device to perform the maintenance command. | 2021-06-17 |
20210184922 | VIRTUAL NETWORK ELEMENT PROVISIONING - A wireless communication network comprises network circuitry which hosts a Virtual Network Function (VNF). A VNF controller instantiates the VNF in the network circuitry and transfers instantiation information for the VNF to provisioning circuitry. The provisioning circuitry receives the instantiation information for the VNF and establishes a provisioning data link to the VNF. The provisioning circuitry transfers network provisioning data to the VNF over the provisioning data link. The VNF controller de-instantiates the VNF in the network circuitry and responsively transfers de-instantiation information for the VNF to the provisioning circuitry. The provisioning circuitry receives the de-instantiation information for the VNF and terminates the provisioning data link to the VNF. The VNF controller may comprise a Network Function Virtualization Management and Orchestration (NFV MANO) computer. | 2021-06-17 |
20210184923 | UTILIZING MACHINE LEARNING TO REDUCE CLOUD INSTANCES IN A CLOUD COMPUTING ENVIRONMENT - A device receives, from a cloud computing environment, cloud instance information associated with cloud instances in the cloud computing environment, and processes the cloud instance information, with a machine learning model, to determine containers for one or more of the cloud instances and whether cloud instances should be removed from the cloud computing environment. The device causes a first subset of the cloud instances to be removed from the cloud computing environment, based on determining which of the cloud instances should be removed, and causes the containers to be created for a second subset of the cloud instances based on determining the containers. The device receives, from the cloud computing environment, cloud container information associated with the containers created in the cloud computing environment, and causes one or more of the containers to be scaled based on the cloud container information. | 2021-06-17 |
20210184924 | METHOD FOR SECURE ENROLLMENT OF DEVICES IN THE INDUSTRIAL INTERNET OF THINGS - The present invention provides a system and method for remote configuration and management of internet of thing devices, whereby applications do not need to explicitly participate in a particular configuration scheme and the application configuration and management can be performed securely and remotely while the Secure Remote Management engine is architecturally decoupled from the bearing protocols used by the remote enterprise to configure and manage the device or devices. | 2021-06-17 |
20210184925 | MODEL-DRIVEN TECHNIQUE FOR VIRTUAL NETWORK FUNCTION REHOMING FOR SERVICE CHAINS - A system that determines whether a trigger has occurred within a cloud infrastructure. The system, in response to determining that a trigger has occurred, extracts characteristics from one or more virtual network functions (VNFs) of a service chain. The system, in response to extracting characteristics from the one or more VNFs, determines rehoming actions for each of the one or more VNFs. The system, in response to determining rehoming actions, predicts a rehoming delay or a chain downtime for each of the rehoming actions for each of the one or more VNFs. The system determines an optimal rehoming action from the rehoming actions for at least one of the one or more VNFs using the rehoming delay or the chain downtime for each rehoming action of the rehoming actions. The system performs the optimal rehoming action for the at least one of one or more VNFs. | 2021-06-17 |
20210184926 | NETWORK MANAGEMENT DEVICE AND NETWORK MANAGEMENT METHOD - [Problem] To realize highly flexible network management in accordance with a parameter on which a user places importance. | 2021-06-17 |
20210184927 | SOFTWARE DEFINED NETWORK LIFECYCLE TRACKING AND MANAGEMENT - A device in an evolved packet core (EPC) which includes a processor and a memory. The processor effectuates operations including receiving, from one or more devices residing within a customer premise equipment (CPE) portion of a telecommunications network, sensor data associated with one or more customers and in response to receiving the sensor data, generating a data request for an ecosystem status for the CPE portion of the telecommunications network. The processor further effectuates operations including obtaining customer information for the one or more customers and creating an analytics environment, using the customer information, for the one or more customers. The processor further effectuates operations including performing, within the analytics environment, analytics on the sensor data to determine a state of the CPE portion of the telecommunications network for the one or more customers and in response to performing analytics on the sensor data, optimizing the telecommunications network. | 2021-06-17 |
20210184928 | METHODS AND APPARATUS TO DEPLOY SECURITY-COMPLIANT WORKLOAD DOMAINS - An example apparatus to configure a workload domain for security compliance includes a configuration normalizer to generate normalized workload domain configuration settings by normalizing workload domain configuration settings of a deployed workload domain based on a format of compliance configuration settings; a drift comparator to compare the normalized workload domain configuration settings with the compliance configuration settings before deploying an application in the workload domain; a post start-up controller to generate updated workload domain configuration settings by modifying ones of the workload domain configuration settings, the modifying of the ones of the workload domain configuration settings being based on the comparison of the normalized workload domain configuration settings with the compliance configuration settings; and a compliance verifier to determine whether the updated workload domain configuration settings satisfy the compliance configuration settings. | 2021-06-17 |
20210184929 | SYSTEM AND METHOD FOR AUTOMATED MANAGEMENT ACCESS POINT NETWORK CONNECTION - An information handling system includes a network interface device and a service processor coupled to an internal network interface. The service processor receives a network connection request from a mobile device connected to the network interface device via the internal network interface, and in response to receiving the network connection request assigns an interne protocol address to the mobile device. The service processor redirects an outbound hypertext transfer protocol request from the mobile device, intercepts the outbound hypertext transfer protocol request from the mobile device, and serves a management application interface page associated with the service processor. | 2021-06-17 |
20210184930 | SYSTEM AND METHOD FOR AUTOMATING ZERO TOUCH PROVISIONING OF CLOUD NETWORKS - The present is directed to systems, methods, and devices for Zero Touch Provisioning (“ZTP”). The system can include a computing network including at least one transit router and a triggering device, and at least one server coupled with the computing network. The server can: generate a topology map characterizing the computing network, link an identifier with a configuration file for devices in the computing network, receive a trigger signal from a triggering device coupled to the computing network, launch a ZTP algorithm, send an initial configuration file and executable first scripts to the triggering device, which first scripts direct the triggering device to: collect information identifying other devices in the computing network coupled to the triggering device, and to generate a unique identifier based on the collected information, receive a request including the unique identifier for a configuration file, and download the configuration file to the triggering device. | 2021-06-17 |
20210184931 | Devices, Systems and Processes for Rapid Install of IoT Devices - Devices, systems, and processes for rapid installation of numerous Internet-of-Things (IoT) devices are described. For at least one embodiment, a system for installing multiple Internet-of-Things (IoT) devices may include a multi-device hub communicatively coupled to each of multiple IoT devices. One or more gateways are coupled to the multi-device hub. One or more IoT servers are coupled to at least one of the one or more gateways. The multi-device hub is configured to facilitate a bulk installation of the multiple IoT devices by executing non-transient computer instructions for registering and activating each of the IoT devices with use with one or more IoT servers. | 2021-06-17 |
20210184932 | VIRTUALIZED SOFTWARE-DEFINED NETWORK - A method may include generating a set of instructions for a set of devices in software-defined network (SDN) to monitor a set of characteristics. The method may also include sending the set of instructions to the set of devices in the SDN via a control plane that is isolated from a packet forwarding path. The method may further include receiving monitor data via the control plane from at least one device of the set of devices in the SDN. The method may also include determining a change to a set of parameters of the SDN. The method may include generating a policy based on the change to the set of parameters of the SDN. The method may include sending the policy to the set of devices in the SDN. | 2021-06-17 |
20210184933 | Mobile Microcell Deployment Scheduler And Management System - A system includes a super microcell configured to communicate on a mobile network and a plurality of mobile microcells in communication with the super microcell. Each of the plurality of mobile microcells are configured to move in tandem with a mobile platform. The system also includes an edge management system in communication with the super microcell and the mobile microcell, a scheduling engine in communication with the edge management system, wherein the scheduling engine configured to determine service coverage of the plurality of mobile microcells based on routes of the mobile platforms. | 2021-06-17 |
20210184934 | POSITION PARAMETERIZED RECURSIVE NETWORK ARCHITECTURE WITH TOPOLOGICAL ADDRESSING - A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities. | 2021-06-17 |
20210184935 | HIERARCHICAL FOG NODES FOR CONTROLLING WIRELESS NETWORKS - A method includes obtaining performance characterization values from endpoints managed by a first fog node at a first hierarchical level in a hierarchy of fog nodes. The method includes changing a first operating characteristic of the wireless network based on the performance characterization values. The first operating characteristic affects the operation of one or more of the endpoints. The method includes transmitting a portion of the performance characterization values to a second fog node at a second hierarchical level in the hierarchy of fog nodes. The method includes changing a second operating characteristic of the wireless network based on an instruction from the second fog node. The second operating characteristic affects the operation of the first fog node and/or other fog nodes at the first hierarchical level. Changing one or more of the first operating characteristic and the second operating characteristic satisfies an operating threshold for the wireless network. | 2021-06-17 |