28th week of 2022 patent applcation highlights part 68 |
Patent application number | Title | Published |
20220224604 | MPTCP INCAST PERFORMANCE EVALUATION MODEL BASED ON A QUEUING NETWORK - An MPTCP Incast performance evaluation model based on a queuing network is provided. The invention establishes a multi-level collaborative MPTCP Incast data transmission performance evaluation model of M/M/N/m | 2022-07-14 |
20220224605 | SIMULATING NETWORK FLOW CONTROL - A system simulator simulates operations of a plurality of interconnected devices in a simulation of a computing system. The system simulator implements a communication runtime in the simulation to receive a packet generated by a simulation of a first one of the plurality of devices to be sent to a simulation of a second one of the plurality of devices in the simulation. The communication runtime buffers the packet in its internal buffer and receives a query from the simulation of the second device based on buffer capacity in the simulation of the second device has capacity. The packet is sent from the communication runtime buffer to the simulation of the second device based on the query to simulate transmission of the packet from the first device to the second device on a link. | 2022-07-14 |
20220224606 | SYSTEM AND METHOD FOR ON-DEMAND NETWORK COMMUNICATION - A network system configured to provide software defined networking is described. The network system comprises networking hardware such as network controllers, memory and other storage devices, and processors. The processors execute instructions to implement various program modules. A user interface permits a user to generate a request for generating an on-demand network connection. A flow module generates a network flow request, based on the received request for generating the on-demand network connection, and transmits the network flow request to a controller module. The controller module controls the network controllers to generate the on-demand network connection based on the generated network flow request. | 2022-07-14 |
20220224607 | SLA PACKET STEERING IN NETWORK SERVICE FUNCTION CHAINING - This disclosure describes techniques that include adding information to a network service header in packets being processed by a set of compute nodes in a service chain. The information added to the network service header can be used during selection of the next hop in a service chain, and may be used to help ensure that service level agreements (SLA) are met with respect to one or more metrics. In one example, this disclosure describes a method that includes receiving, by a service complex having a plurality of service nodes, a packet associated with a service chain representing a series of services to be performed on the packet by one or more of the plurality of service nodes; identifying, by the service complex, one or more service chain constraints associated with the service chain; and modifying the packet, by the service complex, to include information about the service chain constraints. | 2022-07-14 |
20220224608 | VERIFYING SERVICE STATUS - A first device verification model is sent to a first agent on a first device providing at least a portion of the service. The first agent is able to monitor based on the first device verification model a parameter of the first device related to the service. A second device verification model is sent to a second agent on a second device providing at least a portion of the service, wherein the second agent is able to monitor based on the second device verification model a parameter of the second device related to the service. A report is received from the first agent of at least the parameter of the first device. A report is received from the second agent of at least the parameter of the second device. At least the parameter of the first device and at least the parameter of the second device are analyzed to determine whether the service is functioning as intended. | 2022-07-14 |
20220224609 | SYSTEMS AND METHODS FOR AUTOMATED VERIFICATION AND RECONFIGURATION OF DISCONNECTED NETWORK DEVICES - Systems and methods of disconnecting a network service provided over a network service path include using a computing device that obtains a service identifier assigned to network service and identifies a port of a network device included in a network service path associated with the service. The computing device transmits a request to the network device for port configuration data of the network device and based on the received port configuration data, determines whether the port is assigned to the network service. If so, the computing devices executes a remediation operation which includes transmitting a reconfiguration command to the network device that is adapted to cause the network device to update the port configuration data to free the port. | 2022-07-14 |
20220224610 | HEARTBEAT INFORMATION SENDING METHOD AND APPARATUS, AND HEARTBEAT SENDING NODE - Embodiments of this disclosure provides a heartbeat information sending method and apparatus, a heartbeat information processing method and apparatus, and a node. One example method includes: determining at least one heartbeat receiving node in which at least two follower data blocks corresponding to at least two leader data blocks in a heartbeat sending node are located; and when the at least one heartbeat receiving node is a single heartbeat receiving node, sending heartbeat information of the heartbeat sending node to the single heartbeat receiving node, where the heartbeat information of the heartbeat sending node is obtained after respective heartbeat information of the at least two leader data blocks are combined. | 2022-07-14 |
20220224611 | PRESCRIPTIVE ANALYTICS FOR NETWORK SERVICES - The disclosure provides an approach for prescriptive analytics for network services. Embodiments include receiving one or more rules for anomaly detection. Embodiments include receiving metric data of one or more services and collecting context data related to the metric data. Embodiments include determining a baseline for the metric data. Embodiments include detecting an anomaly based on analysis of the metric data in view of the baseline for the metric data and the one or more rules for anomaly detection. Embodiments include associating the anomaly with a subset of the context data that is related to the anomaly. Embodiments include determining a score for the anomaly based on the analysis and determining that a notification should be generated based on the score. Embodiments include providing the notification to a user interface for display. The notification comprises includes an indication of the anomaly and the subset of the context data. | 2022-07-14 |
20220224612 | METHOD AND APPARATUS FOR DETECTING SERVICE AND ANALYZING SERVICE CHARACTERISTIC USING NWDAF IN MOBILE COMMUNICATION SYSTEM - The disclosure relates to a communication method and a system for converging a 5 | 2022-07-14 |
20220224613 | METHODS AND APPARATUS FOR CAPTURING AND/OR USING PACKETS TO FACILITATE FAULT DETECTION - Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets. | 2022-07-14 |
20220224614 | TECHNOLOGIES FOR CAPTURING PROCESSING RESOURCE METRICS AS A FUNCTION OF TIME - Technologies for collecting metrics associated with a processing resource (e.g., central processing unit (CPU) resources, accelerator device resources, and the like) over a time window are disclosed. According to an embodiment presented herein, a network device receives, in an edge network, a request to provide one or more metrics associated with a processing resource, the request specifying a window indicative of a time period to capture the one or more metrics. The network device obtains the one or more metrics from the processing resource for the specified window and provides the obtained one or more metrics in response to the request. | 2022-07-14 |
20220224615 | Latency Assurance Method, System, and Apparatus, Computing Device, and Storage Medium - A latency assurance method is applied to a cloud platform and includes a service provision system and a latency assurance system. The service provision system includes a service created for a user according to a service requirement of the user. The latency assurance system is configured to provide a latency assurance cloud service for the user. The latency assurance cloud service provides latency assurance for the service of the user in the service provision system. The latency assurance method includes that the latency assurance system obtains a latency requirement parameter from the user and in a configuration interface, where the latency requirement parameter includes information about the service and a latency requirement that the service needs to meet. | 2022-07-14 |
20220224616 | End-to-End Network Performance Measurement, Diagnosis, and Tuning - Novel tools and techniques are provided for implementing end-to-end network performance measurement, diagnosis, and tuning. In various embodiments, a network diagnosis device may send a message to a computing system over a network, the message indicating that the network diagnosis device is communicatively coupled to a customer premises equipment (“CPE”) at a customer premises associated with a user and that it is ready to begin diagnosis. In response to receiving the message from the network diagnosis device, the computing system may initiate a network performance test of a network path between the network diagnosis device at the customer premises and a testing server in the network, via any intermediate nodes. The computing system may analyze the network performance data to identify any issues with the network service provided to the CPE and to isolate a source of any identified issues, and may send the results. | 2022-07-14 |
20220224617 | Systems And Methods For Analyzing Performance Silence Packets - In one embodiment, a method includes identifying, by a packet analyzer, one or more silence packets within a network and initiating, by the packet analyzer, a replacement of the one or more silence packets with one or more performance silence packets. The one or more performance silence packets are transmitted between a first node of the network and a second node of the network during a silence period. The method further includes receiving, by the packet analyzer, information associated with the one or more performance silence packets; and analyzing, by the packet analyzer, a connection between the first node of the network and the second node of the network using the information associated with the one or more performance silence packets. | 2022-07-14 |
20220224618 | TRANSCEIVER WITH INTEGRATED VISUAL INDICATOR FOR PORT LINK AND ACTIVITY - An active device module may include an active device, a housing configured to house the active device, and a visual indicator integrated within the active device module and configured to visually indicate status information associated with a port of an information handling system to which the active device module is communicatively coupled. | 2022-07-14 |
20220224619 | API DEPENDENCY ERROR AND LATENCY INJECTION - Described embodiments provide systems and methods for validating a microservice. A device intermediary to a plurality of microservices may identify a synthetic error and a first criteria for implementing the synthetic error to validate a first microservice of the plurality of microservices. The device may determine that the first criteria for implementing the synthetic error has been met. The device may receive a request from the first microservice to access a second microservice of the plurality of microservices. Responsive to the determination, the device may transmit, to the first microservice, a response on behalf of the second microservice, the response implementing the synthetic error. The device may validate that the first microservice one of handled or did not handle the synthetic error. | 2022-07-14 |
20220224620 | Accurate differential traceroute latency calculation between hops - Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include performing a plurality of traces between two nodes in a service path; obtaining latency measurements for each of the plurality of traces for each of one or more hops between the two nodes; and determining average latency between each of the one or more hops based on the latency measurements, adjusted average latency for each hop, and differential average latency for each hop. | 2022-07-14 |
20220224621 | Detection of network hops and latency through an opaque tunnel and detection misconfiguration of tunnels - Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include requesting a trace to a destination with a signature inserted into a trace packet; receiving a response to the trace packet; when the response does not include tunnel info, providing details in the response to a service where the details include parameters associated with a service path between the client and the destination; and, when the response includes tunnel info, segmenting the service path into a plurality of legs, causing a trace for each of the plurality of legs, and aggregating details for each of the plurality of legs based on the causing. | 2022-07-14 |
20220224622 | TCP traceroute using RST and SYN-ACK to determine destination reachability - Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods implemented by a traceroute application implementing a Transmission Control Protocol (TCP) stack in a processing device include sending a plurality of TCP packets via a raw socket to perform a trace to a destination; receiving responses to the plurality of TCP packets; detecting the responses in the TCP stack and diverting the responses to the raw socket; and aggregating the responses by the traceroute application to determine details of a service path from the processing device to the destination. | 2022-07-14 |
20220224623 | Adaptive probing to discover a protocol for network tracing - Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods provide adaptive probing of a service path in a network, wherein the service path includes a plurality of legs. The systems and methods include, for one or more legs of the plurality of legs, sending a number of probes using one of a plurality of protocols; responsive to receiving a response from the number of probes, determining the one of the plurality of protocols is successful and storing this protocol the one or more legs; and, responsive to failure to receive the response, sending a number of probes using another one of the plurality of protocols and continuing until a successful protocol is determined or all of the plurality of protocols fail. | 2022-07-14 |
20220224624 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO IMPROVE BANDWIDTH FOR PACKET TIMESTAMPING - Methods, apparatus, systems, and articles of manufacture are disclosed to improve bandwidth for packet timestamping. An example apparatus includes cache to store a pointer, the pointer indicative of an address in shared memory where a timestamp is to be stored, the pointer corresponding to a descriptor of data to be transmitted to a second device. The example apparatus also includes memory access control circuitry to parse the descriptor to determine the pointer and cause storage of the pointer in the cache. Additionally, the memory access control circuitry of the example apparatus is to set a control bit of the descriptor to indicate that the descriptor may be overwritten. | 2022-07-14 |
20220224625 | AGGREGATION-BASED DETERMINATION OF CLOUD COMPUTING SERVICE RESILIENCY TO CHAOS EVENTS - Techniques are described herein that are capable of performing an aggregation-based determination of resiliency of a cloud computing service to chaos events. Chaos events are executed against a cloud computing service during a time frame that includes multiple time periods. For each chaos event, service health indexes (SHIs) that correspond to the time periods are calculated. Each SHI indicates an extent to which indicators, which represent respective measurements of performance of the cloud computing service during the respective time period, satisfy respective criteria. The SHIs for each chaos event are analyzed to provide a respective resiliency score. At least some of the resiliency scores of the respective chaos events are aggregated to provide an aggregated resiliency score, which represents resiliency of the cloud computing service to the chaos events. | 2022-07-14 |
20220224626 | SYSTEM AND METHOD FOR DYNAMIC TUNING OF NEIGHBOR AGING - One embodiment provides a system and method for managing, at a network node, a data structure indicating neighbor node address information. During operation, the system can determine, based on a media access control (MAC) address or an Internet protocol (IP) address associated with an entry in the data structure, a type of the entry, and set a timeout value for the entry based on the determined type. In response to detecting that an entry corresponding to the MAC address expires in a MAC table maintained by the network node, the system can identify an interface on the network node to which a neighbor associated with the MAC address was previously coupled and transmit a unicast neighbor-probe packet on the identified interface to determine a connection status of the neighbor. | 2022-07-14 |
20220224627 | RAN TRANSPORT INTERFACE DISCOVERY - A method of operating a first node in a communication network includes detecting establishment of a new physical communication link with a second node in the communication network, receiving a link layer discovery protocol, LLDP, message from the second node, wherein the LLDP message may include a field that identifies an interface type that is to be supported over the new physical communication link, identifying a service associated with the identified interface type, and activating the identified service. | 2022-07-14 |
20220224628 | SYSTEM AND METHOD FOR FACILITATING SELF-MANAGING REDUCTION ENGINES - A switch equipped with a self-managing reduction engine is provided. During operation, the reduction engine can use a timeout mechanism to manage itself in different latency-induced or error scenarios. As a result, the network can facilitate an efficient and scalable environment for high performance computing. | 2022-07-14 |
20220224629 | BGP route aggregation exception systems and methods - Systems and methods for a Border Gateway Protocol (BGP) route aggregation exception include advertising, to BGP peers, of a plurality of prefixes using BGP route aggregation or summarization; detecting a failure that is local to the router affecting a prefix of the plurality of prefixes; and advertising an aggregation exception that identifies the prefix to all of the BGP peers. The systems and methods can also include detecting recovery of the failure; and sending a withdrawal of the aggregation exception to all of the BGP peers. | 2022-07-14 |
20220224630 | Methods, Nodes and Systems in a Communication Network - In a method performed by a first node associated with a first domain of a communications network, a first message is sent (302) to a second node associated with a second domain of the communications network. The first message comprises an indication of a resource in the first domain that is available to the second domain. The first message further comprises an anonymised first global unique identifier associated with the first domain. | 2022-07-14 |
20220224631 | Routing Control Method and Apparatus - A routing control method and apparatus includes receiving, by a first edge routing node, a BGP control packet, where the BGP control packet carries a first node identifier and first algorithm information, where the first node identifier indicates an SID of a destination routing node on a BGP forwarding path, where the first algorithm information indicates a requirement of the BGP forwarding path, where the first edge routing node belongs to a first AS and the destination routing node belongs to a second AS; determining, by the first edge routing node, forwarding path information of the data packet based on the first node identifier and the first algorithm information in the BGP control packet; and forwarding, by the first edge routing node, the data packet based on the forwarding path information. | 2022-07-14 |
20220224632 | ROUTING PROVIDER QUEUES - Disclosed are systems, methods, and non-transitory computer-readable media for routing provider queues. A message routing system receives a request to transmit a message to a destination device and selects a first routing provider from a plurality of routing providers that each have a separate message queue of a plurality of message queues, wherein the first routing provider is selected based on one or more characteristics of each of the plurality of routing providers. The message routing system adds the message into a first message queue designated to the first routing provider, and causes the message to be dequeued from the first message queue to the first routing provider for delivery to the destination device. | 2022-07-14 |
20220224633 | BIER FORWARDING ENTRY CONSTRUCTION METHOD, APPARATUS, AND SYSTEM - A bit index explicit replication (BIER) forwarding entry construction method is provided. The method includes receiving, by a second network device, a first message sent by a first network device, where the first message includes a host routing prefix of the first network device, first BIER information, and second BIER information. The first BIER information includes a bit index forwarding table identifier (BIFT ID) of the first network device, the second BIER information includes a bit forwarding router identifier (BFR ID) of at least one bit forwarding router (BFR) in a first area. The second network device constructs a BIER forwarding entry based on the first BIER information, the second BIER information, and the host routing prefix. | 2022-07-14 |
20220224634 | DEVICE, METHOD, MEDIUM AND COMPUTER PROGRAM PRODUCT FOR VOICE DATA TRANSMISSION - Device, method, medium and computer program product for voice data transmission. The device includes a processor that executes instructions in memory to: establish a call connection for voice data transmission with another device, wherein the said device parses and identifies the number of the said another device to determine whether the voice data transmission is associated with an international call, and when the voice data transmission is determined to be associated with an international call, the determine hop limit value for the voice data transmission as a first value greater than the default hop limit value; or when the voice data transmission is determined to not be associated with an international call, the hop limit value for the voice data transmission is determined as the default value; and generate packets for sending voice data based on the hop limit value determined when the call connection is established. | 2022-07-14 |
20220224635 | SYSTEMS AND METHODS FOR UTILIZING SEGMENT ROUTING OVER AN INTERNET PROTOCOL DATA PLANE FOR LATENCY METRICS REDUCTION - A device may provide path data identifying a primary path and one or more alternate paths for segment routing traffic in the network, and may receive performance data indicating a performance degradation in the primary path. The device may determine that the performance data satisfies a first threshold, and may request, based on the performance data satisfying the first threshold, alternate path performance data. The device may receive the alternate path performance data based on the request, and may compare the alternate path performance data for the one or more alternate paths. The device may select a particular alternate path, of the one or more alternate paths, based on comparing the alternate path performance data for the one or more alternate paths, and may trigger, based on the performance data satisfying a second threshold, a failover of the traffic from the primary path and to the particular alternate path. | 2022-07-14 |
20220224636 | SYSTEM AND METHOD FOR PERFORMING SYNCHRONIZATION OF MAXIMUM TRANSMISSION UNIT WITH ROUTER REDUNDANCY - One embodiment can provide a method and system for synchronizing MTU in a WAN edge with router redundancy. During operation, the system may determine a set of interfaces associated with a network device among a plurality of network devices coupled via inter-switch links. The system can determine a set of layer-3 MTU values corresponding to the set of network interfaces and can determine a highest layer-3 MTU value based on the set of determined layer-3 MTU values. The system can synchronize, via the inter-switch links, the highest layer-3 MTU value, resulting in a set of highest layer-3 MTU values at the network device. The system can determine, based on the set of highest layer-3 MTU values, a global highest layer-3 MTU value. The system can derive a layer-2 MTU value based on the global highest layer-3 MTU value and can configure a respective inter-switch link with the layer-2 MTU value. | 2022-07-14 |
20220224637 | METHODS AND APPARATUS FOR TRAFFIC CONTROL FOR APPLICATION-INDEPENDENT SERVICE MESH - Methods, apparatus, systems, and articles of manufacture are disclosed for traffic control for application-independent service mesh. In one example, processor circuitry to perform operations to instantiate ingress traffic management circuitry to receive ingress traffic events, at least one of the ingress traffic events to request access to a target microservice running on the second endpoint. The processor circuitry further performs operations to instantiate virtual service authorization circuitry to perform a look up of an authorization policy to the target microservice in the microservice catalog. Finally, the processor circuitry performs operations to instantiate endpoint selection circuitry to select the second endpoint to service the ingress traffic event in response to the authorization policy allowing access to the target microservice. | 2022-07-14 |
20220224638 | PREVENTING GENERATION OF DUPLICATE NETWORK ROUTES IN A SOFTWARE DEFINED WIDE AREA NETWORK - A system and a method of preventing generation of duplicate network routes in a Software Defined Wide Area Network (SD-WAN) are described. A network route management service receives network route information from a network device connected to a subnetwork present in the SD-WAN. The network route information is compared with a master network route information for identifying presence of one or more duplicate network routes in the network route information. Upon identification, the duplicate network routes are removed from the network route information, and the network route information excluding the one or more duplicate network routes is transmitted to the network device. | 2022-07-14 |
20220224639 | DEADLOCK-FREE MULTICAST ROUTING ON A DRAGONFLY NETWORK - Systems and methods are provided for managing multicast data transmission in a network having a plurality of switches arranged in a Dragonfly network topology, including: receiving a multicast transmission at an edge port of a switch and identifying the transmission as a network multicast transmission; creating an entry in a multicast table within the switch; routing the multicast transmission across the network to a plurality of destinations via a plurality of links, wherein at each of the links the multicast table is referenced to determine to which ports the multicast transmission should be forwarded; and changing, when necessary, the virtual channel used by each copy of the multicast transmission as the copy progresses through the network. | 2022-07-14 |
20220224640 | APPARATUSES AND METHODS FOR RESTORATION OF A LABEL-SWITCHED PATH IN A NETWORK - The disclosed apparatuses and methods are directed to data plane restoration in a network. A method comprises receiving a label-switched path (LSP) failure notification indicating a failure in a network; generating, by a node of the network, a fast-restoration (FR) message and transmitting the FR message to a second node of the message forwarding path. The FR message comprises: a plurality of forwarding instruction objects (FIOs) having forwarding instructions for the FR message for each node of a message forwarding path; and a plurality of label-switched path objects (LSPOs) having a restoration LSP data for each node of a protection detour path. Another method comprises receiving the FR message; generating a modified FR message based on the FR message; and transmitting the modified FR message to another node of the message forwarding path based on the FIO, prior to processing the FR message by the node. | 2022-07-14 |
20220224641 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM - An information processing method includes: receiving a request for search with respect to a memory circuit that searches for information stored in a memory, issued from a requester; storing order information in which the request is issued; determining whether or not to make the memory circuit perform search on the basis of a predetermined requirement not to make the memory circuit perform search and the request; creating a predetermined response in a case where the memory circuit is not made to perform search; and returning a response of the memory circuit and the predetermined response to the requester in the issued order on the basis of the order information. | 2022-07-14 |
20220224642 | OPTICAL DATA ROUTING VIA SWITCHLESS DECISION TREE - A method includes: receiving a packet in an optical domain, the packet including a data payload and a routing header indicative of a routing sequence for the data payload; reading a first bit of the routing header to make a routing decision for the data payload; stripping the first bit of the routing header in the optical domain to generate an updated routing header; and routing the data payload and the updated routing header based on the routing decision. | 2022-07-14 |
20220224643 | AUTO-CONFIGURATION OF ROUTES BETWEEN NEIGHBOR DEVICES - In some embodiments, a method inserts, by a first computing device, a first value for a capability in a first message that is used in a process to automatically exchange capability values with a second computing device. The first value for the capability indicates the first computing device requires a default route to reach the second computing device as a next hop for sending a packet to a destination. The first computing device sends the first message to the second computing device; and receives a second value for the capability in a second message from the second computing device. The second value indicating the second computing device will send the default route to reach the second computing device. When the default route is received from the second computing device, the first computing device stores the default route from the second computing device in a route table. | 2022-07-14 |
20220224644 | RETURN-LINK ROUTING IN A HYBRID NETWORK - Embodiments provide techniques for providing return-link routing in a hybrid communications network that includes a number of different networks having different characteristics. User terminal routing systems (UTRSs) provide interfaces between local user networks and the multiple communications networks of the hybrid network. Each UTRS can include a routing table having stored mappings that are populated according to forward-link communications (implicitly or explicitly), each associating a respective one of a plurality of routing table entries with one of the communications networks. When a UTRS receives return-link data from its respective local user network, the received data indicates a destination node. The UTRS can determine which of the stored mappings corresponds to the destination node and can route the received return-link data over a selected one of the communications networks in accordance with the identified one of the mappings. | 2022-07-14 |
20220224645 | END SYSTEM FOR AN AVIONICS COMMUNICATION SYSTEM AND ASSOCIATED AVIONICS COMMUNICATION SYSTEM - The present invention relates to an end system comprising at least one input port adapted to receive frames, and a configuration table comprising, for each identification value, a received frame of parameters for processing that frame. | 2022-07-14 |
20220224646 | METHOD FOR IMPLEMENTING SERVICE CONTINUITY AND RELATED DEVICE - A method for implementing service continuity, performed by a session management (SM) function (SMF) network element may include receiving a target relocation message, the target relocation message carrying target traffic routing information, the target traffic routing information comprising a target data network (DN) access identifier (DNAI) and network address translation (NAT) information, the NAT information comprising a target user equipment (UE) network address, a first application server (AS) network address, and a second AS network address, wherein a target UE corresponding to the target UE network address has established a target protocol data unit (PDU) session to a first PDU session anchor (PSA) user plane function (UPF) network element and is configured to communicate with a first AS corresponding to the first AS network address. | 2022-07-14 |
20220224647 | THROTTLING DATA STREAMS FROM SOURCE COMPUTING DEVICES - Local management of data stream throttling in data movement operations, such as secondary-copy operations in a storage management system, is disclosed. A local throttling manager may interoperate with co-resident data agents and/or a media agent executing on any given local computing device, whether a client computing device or a secondary storage computing device. The local throttling manager may allocate and manage the available bandwidth for various jobs and their constituent data streams—across the data agents and/or media agent. Bandwidth is allocated and re-allocated to data streams used by ongoing jobs, in response to new jobs starting and old jobs completing, without having to pause and restart ongoing jobs to accommodate bandwidth adjustments. The illustrative embodiment also provides local users with a measure of control over data streams—to suspend, pause, and/or resume them—independently from the centralized storage manager that manages the overall storage system. | 2022-07-14 |
20220224648 | METHOD FOR BALANCING CROSS-DOMAIN BROADCAST NETWORK LOAD OF BLOCKCHAIN, COMPUTER DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - A method for balancing a cross-domain broadcast network load of a blockchain includes is provided. By evenly distributing the load of cross-domain broadcasting to multiple cross-domain nodes, a utilization rate of a blockchain system can be increased, and ability of processing transactions in the blockchain can be improved. A computer device and a non-transitory computer-readable storage medium are further provided. | 2022-07-14 |
20220224649 | INFORMATION HANDLING SYSTEM CLOSED LOOP BANDWIDTH PRIORITIZATION - A host information handling system may aggregate a plurality of packets for transmission from the host information handling system to a plurality of client information handling systems. The host information handling system may then assign a priority value to each of the plurality of packets. The host information handling system may then determine that an aggregate size of the plurality of packets exceeds a threshold size. Based, at least in part, on the determination, the host information handling system may select a subset of the plurality of packets for transmission to the plurality of client information handling systems. The host information handling system may then transmit the selected subset of the plurality of packets to the plurality of client information handling systems. | 2022-07-14 |
20220224650 | METHOD AND APPARATUS FOR TRAFFIC DETECTION - Various embodiments of the present disclosure provide a method for traffic detection. The method which may be performed by a first network node includes receiving a message from a second network node. The method further includes determining packet flow description information for traffic detection according to the message. The packet flow description information may indicate a combination criterion for two or more packet flow descriptions, and/or a protocol matching criterion for a domain name in a packet flow description. According to the embodiments of the present disclosure, the packet flow description definition can be extended to support more accurate traffic detection. | 2022-07-14 |
20220224651 | ACTIVATION OF PDU SESSION AND QOS FLOWS IN 3GPP-BASED ETHERNET BRIDGES - Methods and apparatus, including computer program products, are provided for a 3GPP bridge for time sensitive networks. In some example embodiment, there may be provided an apparatus causes to at least: receive at least one management object, the at least one management object comprising routing information between an ingress port at a 3GPP bridge and an egress port at the 3 GPP bridge; determine, for the ingress port and the egress port combination, at least one quality of service constraint to provide a delay guarantee towards a destination media access control address, the determination based on the received at least one management object and one or more bridge delays indicating a delay between the ingress port and the egress port; and cause a change, based on the determined at least one quality of service constraint, to a protocol data unit session carrying a time sensitive network flow. | 2022-07-14 |
20220224652 | Multi-Timescale Packet Marker - A network node ( | 2022-07-14 |
20220224653 | Packet Forwarding Method, Device, and System - A packet forwarding method includes a first network device receiving a first message from a second network device via a second egress port of the second network device, where the first message measures a phase difference, and where the phase difference is a phase difference between a switching time of one of a plurality of first buffers of a first egress port of the first network device and a switching time of one of a plurality of second buffers of the second egress port of the second network device with a link delay taken into consideration. The first network device determines the phase difference based on the first message. Then, the first network device schedules, based on the phase difference, a second data packet sent via the first egress port. | 2022-07-14 |
20220224654 | DROPPED PACKET DETECTION AND CLASSIFICATION FOR NETWORKED DEVICES - In general, this disclosure describes a network device to determine a cause of packets being dropped within a network. An example method includes generating, by a traffic monitor operating on a network device, an exception packet that includes a unique exception code that identifies a cause for a component in the network device to discard a transit packet, and a nexthop index identifying a forwarding path being taken by the transit packet experiencing the exception. The method also includes forwarding the exception packet to a collector to be processed. | 2022-07-14 |
20220224655 | SMART BANDWIDTH ALLOCATION - A controller is provided for use with a CD, a WAN, and a service provider server, the HNC includes: a memory; and a processor configured to execute instructions stored on memory to cause the HNC to: establish a priority time period; associate the priority time period with a first application; establish a first service flow queue having a first QoS during priority period; establish a second service flow queue having a second QoS; receive first upstream packets and second upstream packets; assign the first upstream packets to a first upstream queue during the priority time period; assign the second upstream packets to a second upstream queue; receive first downstream packets and second downstream packets; assign the first downstream packets to a first downstream queue during the priority time period; and assign the second downstream packets to a second downstream queue. | 2022-07-14 |
20220224656 | PROGRAMMABLE LOGIC DEVICE WITH INTEGRATED NETWORK-ON-CHIP - Systems and methods for providing a Network-On-Chip (NoC) structure on an integrated circuit for high-speed data passing. In some aspects, the NoC structure includes multiple NoC stations with a hard-IP interface having a bidirectional connection to local components of the integrated circuit. In some aspects, the NoC stations have a soft-IP interface that supports the hard-IP interface of the NoC station. | 2022-07-14 |
20220224657 | TECHNOLOGIES FOR ACCELERATING EDGE DEVICE WORKLOADS - Technologies for accelerating edge device workloads at a device edge network include a network computing device which includes a processor platform that includes at least one processor which supports a plurality of non-accelerated function-as-a-service (FaaS) operations and an accelerated platform that includes at least one accelerator which supports a plurality of accelerated FaaS (AFaaS) operation. The network computing device is configured to receive a request to perform a FaaS operation, determine whether the received request indicates that an AFaaS operation is to be performed on the received request, and identify compute requirements for the AFaaS operation to be performed. The network computing device is further configured to select an accelerator platform to perform the identified AFaaS operation and forward the received request to the selected accelerator platform to perform the identified AFaaS operation. Other embodiments are described and claimed. | 2022-07-14 |
20220224658 | SWITCH FOR TRANSMITTING PACKET, NETWORK ON CHIP HAVING THE SAME, AND OPERATING METHOD THEREOF - A Network-on-Chip (NoC) includes a packet transmission switch, and a corresponding method of operating the NoC includes storing packets received from an input terminal in a buffer, storing buffer locations in which each of the packets is stored in an ordering queue of an output terminal, and sequentially outputting the packets from the output terminal according to the buffer locations. | 2022-07-14 |
20220224659 | AUTOMATED MESSAGING REPLY-TO - An automated messaging reply-to system can automatically select which message a potential reply message is replying to. The automated messaging reply-to system can obtain a message thread, a potential reply message, and a context. The automated messaging reply-to system can filter the message thread and generate model inputs based on the remaining messages, the potential reply message, and the context. The automated messaging reply-to system can apply the model input to a machine learning model, which can generate reply scores for the remaining messages. After generating reply scores, the automated messaging reply-to system can determine whether the remaining message with the highest reply score qualifies as an originating message being replied to. The automated messaging reply-to system can cause display of the potential reply message as a reply-to for the determined originating message. | 2022-07-14 |
20220224660 | AUTOSCALING A DISTRIBUTED STREAMING PLATFORM IN AN EVENT-DRIVEN MICROSERVICE ARCHITECTURE - A computer-implemented method and computer program product for autoscaling a streaming platform in an event-driven microservice architecture. Upon a new consumer being added to a consumer group, the streaming platform triggers a rebalance phase if the number of the consumers in the consumer group is less than the number of the partitions and assign a new partition if the number of the consumers in the consumer group is greater than the number of the partitions. Upon a consumer being removed from a consumer group, in response to determining that the number of partitions is greater than the number of consumers, the streaming platform stops message publishing to a partition that is consumed by the consumer, allows remaining messages in the partition to be consumed, and deletes the partition in response to determining that all the remaining messages are consumed. | 2022-07-14 |
20220224661 | ELECTRONIC DEVICE FOR RECEIVING OR TRANSMITTING RCS DATA AND OPERATION METHOD OF ELECTRONIC DEVICE - An electronic device and an electronic device operation method according to certain embodiments are provided. The electronic device may include: a memory configured to store a first message exchanged with an external electronic device; a wireless communication circuit; and a processor, wherein the processor is configured to: perform a registration procedure with a rich communication service (RCS) server; receive a user input for activating a specific function related to a message exchanged with the external electronic device; generate a second message including identification information of the specific function, identification information of a first message related to the specific function, at least a part of the first message, and/or input data; and transmit the second message to the external electronic device through the RCS server. In addition, certain embodiments may be possible. | 2022-07-14 |
20220224662 | PROGRESSIVE ATTACHMENTS SYSTEM - Disclosed are systems, methods, and computer-readable storage media to provide for progressive display of attachments on a mobile device. In some aspects, a method includes determining a sequence of media for presentation to a user, determining to insert new media between two media of the sequence of media. In some aspects, the new media may be a short form video. The method may further include receiving touch screen input while presenting the new media, and presenting additional media in response to the touch screen input. In some aspects, the additional media may be a long form video. In some aspects, additional input may be received while the additional media is presented. The new input may request a further media be presented. The further media may be a software installation dialog or a web page. | 2022-07-14 |
20220224663 | Message Display Method and Apparatus, Terminal, and Computer-Readable Storage Medium - This application provides a message display method and apparatus, a terminal, and a computer-readable storage medium. The method includes: displaying a session interface of a target session, and obtaining a message set of the target session; in response to that a plurality of continuous and repeated session messages are included in the message set, obtaining a target session message according to the plurality of continuous and repeated session messages; and replacing the plurality of continuous and repeated session messages in the message set with the target session message, and displaying a replaced message set in the session interface of the target session. | 2022-07-14 |
20220224664 | NETWORK-BASED MESSAGING SYSTEM WITH DATABASE MANAGEMENT FOR COMPUTER BASED INTER-USER COMMUNICATION - Methods and systems for network-based messaging systems with database management for supporting based inter-user communications, such as via computing devices, are disclosed. The methods and systems facilitate improved message transmission management for more efficient communications. The methods and systems can provide enhanced electronic communications, such as via electronic mail or text messaging. Improved communication tools are provided to better manage and/or control communications. The computing devices can be personal communication/computing devices, such as mobile, portable or handheld computing devices (e.g., smart phone, a laptop, a tablet, etc.). | 2022-07-14 |
20220224665 | Notification Message Preview Method and Electronic Device - A notification message preview method includes displaying, by an electronic device, a notification message in the message group on a first card, where the message group includes N notification messages, and other notification messages in the message group are hidden, receiving, by the electronic device, a preset operation from a user on the first card, and displaying, in response to the preset operation; by the electronic device, M notification messages in the message group on a second card, where the M notification messages are M of the N notification messages, and where the M notification messages include the notification message. | 2022-07-14 |
20220224666 | GENERATING AUTOMATED MESSAGES WITHIN MESSAGING THREADS THAT FACILITATE DIGITAL SIGNATURES BY VERIFIED USERS - This disclosure covers systems and methods that verify a user's identity and generate automated messages within a messaging thread to prompt the user to digitally sign a digital document. Before generating such automated messages, the disclosed methods and systems optionally cause a client device to transition from presenting a newsfeed comprising a third party's digital content item to (alternatively or additionally) presenting a messaging thread. For instance, in some embodiments, the methods and systems provide a messaging thread for a user and the third party upon receiving a selection by the user of an option within the newsfeed associated with the digital content item. Within the messaging thread, the methods and systems then generate automated messages that prompt the user to digitally sign the digital document, such as a digital petition or contract. | 2022-07-14 |
20220224667 | SYSTEMS AND METHODS FOR SHARING CONTENT - Systems, methods, and non-transitory computer-readable media can provide a messaging interface that includes a first option for exchanging ephemeral messages with users of a social networking system and a second option for exchanging non-ephemeral messages with users of the social networking system; determine that a user operating the computing device has selected the first option for sending an ephemeral message; and cause the ephemeral message to be sent through the social networking system. | 2022-07-14 |
20220224668 | UNIFIED APPLICATION MESSAGING SERVICE - In a cloud computing environment, a unified application messaging service of an enterprise computing platform enables application developers to rapidly develop and deploy application software using existing message broker services across heterogeneous user systems/devices communicating using different connection/communication protocols. The unified application messaging service includes a connection protocol registrar/tracker logic and a device list maintained with the most current polling status and connection protocol that a user system/device is currently using. | 2022-07-14 |
20220224669 | METHOD AND DEVICE FOR PROCESSING A REQUEST FOR ANONYMISATION OF A SOURCE IP ADDRESS, METHOD AND DEVICE FOR REQUESTING ANONYMISATION OF A SOURCE IP ADDRESS - A method for processing a request for anonymisation of a source IP address of an IP packet is described, the IP packet being transmitted by a transmitting device to a recipient device via a communications network, the transmitting device being connected to the network via a network terminal apparatus. The method is carried out by an anonymisation device positioned for cutting the flow between the network terminal apparatus and the recipient device, and comprises receiving the packet; establishing whether the source IP address has to be anonymised or not; if a result of the verification is negative, routing the packet to the recipient device; if the result of the verification is positive and if the anonymisation device has an address translation function: replacing the source IP address with an IP address of the anonymisation device; and. If the result of the verification is positive and if the anonymisation device does not have an address translation function, a step of routing the IP packet is routed to the recipient device via an apparatus of the network which has an address translation function. | 2022-07-14 |
20220224670 | COMMUNICATION METHOD AND RELATED DEVICE - Embodiments of this application disclose a communication method and a related device. The method includes: A symmetric device listens on N local public ports, where N is a natural number greater than 1; and when the symmetric device receives a hole punching packet from the N local public ports, the symmetric device sends a response packet to a cone device based on the hole punching packet, so that the symmetric device establishes a communication connection to the cone device, where the hole punching packet is sent by the cone device, and the response packet carries a first network information mapping relationship. The cone device may directly communicate with the symmetric device, so that there is no need for a server having a data relay function, and costs of deploying the server are reduced. | 2022-07-14 |
20220224671 | MULTICAST AND UNICAST MEDIUM ACCESS CONTROL (MAC) ADDRESS ASSIGNMENT PROTOCOL (MUMAAP) - Methods and apparatuses are described herein for multicast and unicast MAC address assignment protocol (MUMAAP). A first node may transmit, to a second node, based on a unicast MAC address of the second node or a multicast MAC address associated with the second node, a discover message that may include a first MAC address or a first range of MAC addresses. The first node may receive an offer message with a second range of MAC addresses. If the first node selects a second MAC address from the received second range of MAC addresses, the first node may transmit a request message indicating that the second MAC address or the second range of MAC addresses is allocated to the first node. The first node may receive an acknowledge message indicating that the second MAC address or the second range of MAC addresses is allocated to the first node. | 2022-07-14 |
20220224672 | GATEWAY DEVICE - Provided is a gateway device capable of reducing influence on intra-vehicle network communication from a cyber security attack that infringes availability represented by a DoS attack from an extra-vehicle network. Included are: an external-network-side transfer processing unit that transfers a communication frame received from an external network to an internal network; an internal-network-side transfer processing unit that transfers the communication frame transferred from the external network via the external-network-side transfer processing unit to the internal network; a transfer notification unit that gives a transfer notification to notify transfer of the communication frame from the external-network-side transfer processing unit to the internal-network-side transfer processing unit; and a monitoring unit that determines whether to transfer the communication frame based on at least one of a frequency of the transfer notification to the internal-network-side transfer processing unit and a transfer data amount of the communication frame transferred from the external-network-side transfer processing unit. | 2022-07-14 |
20220224673 | SYSTEM AND METHOD FOR ISOLATING DATA FLOW BETWEEN A SECURED NETWORK AND AN UNSECURED NETWORK - Methods and systems for isolating data flow between a secured network and an unsecured network may include a configurable flow control module, communicatively connected to the secured network and to the unsecured network; and a state selector module, associated with the flow control module and adapted to dynamically configure a state of the flow control module. The flow control module may include at least one hardware switch, configured to isolate between the secured network and the unsecured network, by allowing unidirectional transfer of data from the secured network to the unsecured network via a communication channel, based on the configured state. | 2022-07-14 |
20220224674 | SYSTEM AND METHOD OF BLOCKING ADVERTISING ON COMPUTING DEVICES BASED ON ESTIMATED PROBABILITY - Disclosed herein are systems and methods for blocking information from being received on a computing device. In one aspect, an exemplary method comprises, by a hardware processor, intercepting a Domain Name System (DNS) request, the intercepted DNS request being initiated by an advertising module of the computing device; obtaining a set of rules for a transmission of the intercepted DNS request; estimating a probability of the intercepted DNS request being a DNS request that was initiated by one or more actions of a user based on the obtained set of rules; and blocking displaying the advertisement information on the computing device based on the estimated probability, wherein the blocking displaying the advertisement information comprises blocking the advertisement information from being received on the computing device. | 2022-07-14 |
20220224675 | TECHNIQUES FOR PRIVATELY COLLECTING CONTENT DEDICATED TO A RECIPIENT FROM A PLURALITY OF CONTRIBUTORS - Techniques for privately collecting content dedicated to a recipient from a plurality of contributors are disclosed. In one particular embodiment, the techniques may be realized as a method for privately collecting content dedicated to a recipient from a plurality of contributors comprising: inviting the plurality of contributors to privately contribute content dedicated to a recipient before a deadline; receiving a first content from a first contributor dedicated to the recipient; receiving a second content from a second contributor dedicated to the recipient, wherein the first contributor is unable to access the second content and the second contributor is unable to access the first content; and presenting the first content and the second content to the recipient after the deadline. | 2022-07-14 |
20220224676 | METHOD FOR CONTROLLING A VEHICLE - A method for applying control to a vehicle. The method includes: receiving, by way of a second control unit of a second vehicle to which control is to be applied, a signal encompassing a message encrypted using a valid symmetrical key of a first control unit of a first vehicle; ascertaining, by way of the second control unit, a decryptability of the encrypted message using a valid symmetrical key of the second control unit or a symmetrical reserve key of the second control unit ascertained by way of the second control unit; ecrypting the encrypted message, depending on the ascertained decryptability, by way of the second control unit using the valid symmetrical key of the second control unit or the symmetrical reserve key of the second control unit; and applying control, based on the decrypted message, to the second vehicle to which control is to be applied. | 2022-07-14 |
20220224677 | USER INVITING METHOD AND APPARATUS, COMPUTER DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM - A user inviting method includes: obtaining a user identifier of a current login user, in response to a trigger operation for a target invitation link corresponding to a target two-dimensional code, the target two-dimensional code being encrypted by using a public key and used for indicating jump to a target invitation page; accessing the target invitation link based on the user identifier, and obtaining a private key corresponding to the public key in response to that the user identifier is consistent with a target user identifier corresponding to the target invitation link; decrypting the target two-dimensional code by using the private key, and displaying the target invitation page in response to that the target two-dimensional code is decrypted successfully; and submitting user information written to the target invitation page in response to a submitting operation for the target invitation page. | 2022-07-14 |
20220224678 | SYNCHRONIZED DATABASE AUTHORIZATION AUTOMATION - Systems and methods here may be used to, by a server computer in communication with a database and at least one user device, receiving an upload of a data file for authorization, processing the received data file for identifiers in a master entity authorization table, wherein processing the identifier is either extracting the identifier from metadata for the data file or extracting the identifier from the data file itself, triggering a process to identify eligible authorities for the received data file. | 2022-07-14 |
20220224679 | Authenticated Session Management Across Multiple Electronic Devices Using A Virtual Session Manager - A virtual session manager of an electronic device maintains a web session for a user across multiple electronic devices. The virtual session manager receives an authentication request from a first electronic device that is in a communication range of the device. The virtual session manager transmits the authentication request to an endpoint device with a grant token without providing the first electronic device with any access to the grant token. The virtual session manager will receive, from the endpoint device, a first access token in response to the first authentication request. The virtual session manager will transmit the first access token to the first electronic device so that the first electronic device can establish a virtual session with the first web resource. | 2022-07-14 |
20220224680 | MAKING LOCAL DATA AVAILABLE IN A CLOUD COMPUTING ENVIRONMENT - Local data can be made available in a cloud computing environment. A persistent remote connection may be established between a processor and a server. The server may receive a request for data from an external device through a network. The request for data may be sent through the persistent remote connection from the server to a first executable process of the processor. The processor may obtain the data from an application being executed by the processor separately from the first executable process. The data may be sent through the persistent remote connection from the processor to the server. The server may send the data to the external device through the network in response to the request. The persistent remote connection may be maintained in an open state regardless of a status of the request for data. | 2022-07-14 |
20220224681 | SHARING AUTHENTICATION BETWEEN APPLICATIONS - Systems and methods for sharing authentication between applications include receiving a request to share authentication from a first application with a second application. An account identifier and identity token for a user are obtained from the first application. Access to a communication application associated with the account identifier is verified as available. The account identifier and identity token are sent to a second application server for verification with a first application server. A verification message is received in the communication application from the second application server. The verification message is determined to contain confirmation information and authentication is shared from the first application with the second application. Related systems and methods include retrieving information associated with an operating system to facilitate sharing authentication between applications. | 2022-07-14 |
20220224682 | ONLINE AUTHENTICATION SYSTEMS AND METHODS - A server may include at least one server processor configured to execute an application. A desktop virtualization system may include at least one desktop virtualization processor. The desktop virtualization processor may be configured to instantiate a virtual desktop; authenticate a user of a client device; in response to authenticating the user of the client device, place the client device in communication with the virtual desktop through at least one network; launch a secure browser in the virtual desktop; and using the secure browser, place the client device in communication with the server through the at least one network. The application may be configured to perform processing in response to at least one command from the client device. The processing may include generating a one-time passcode, establishing a code word not communicated through the at least one network, and sending a message including the one-time passcode to a sender client device. | 2022-07-14 |
20220224683 | ONE-SHOT BEHAVIORAL BIOMETRICS FOR LOGIN AUTHENTICATION USING MACHINE LEARNING MODEL - In one approach, a method includes: receiving a reference login event input from a user, the reference login event input being associated with a first session of the user logging into an account; receiving a new login event input from the user, the new login event input being associated with a second session of the user logging into the account; accessing a machine learning model, wherein the machine learning model is trained using data selected based on a similarity of behavior between different users; and authenticating, with the machine learning model, the user for the account, based at least in part on the reference login event input and the new login event input. In examples, the reference and new login event inputs comprise one or more items of biometric data generated by interaction of the user in a web environment and/or a mobile environment for logging into the account. | 2022-07-14 |
20220224684 | VALIDATING SESSION TOKENS USING NETWORK PROPERTIES - Described embodiments provide systems and methods for validating session tokens using network properties. A first device having one or more processors coupled with memory may identify a session token from an initiation of a session between the first device and a second device via a network path of a plurality of network paths. The first device may determine that the first network path is to be trusted based at least on a property of the network path. The first device may validate the session token for use over the plurality of network paths, responsive to determining that the network path is to be trusted. The first device may provide, responsive to validating, the session token to the second device for use in communications over the plurality of network paths. | 2022-07-14 |
20220224685 | CONTEXT-BASED AUTHENTICATION OF A USER - In some implementations, a device may receive a notification to authenticate a user associated with a user account of an application server. The device may send, to the user device, an authentication request that prompts the user to provide a contextual description of an operation associated with the user account. The device may receive, from the user device, an authentication response that includes a described characteristic of the operation that is associated with a parameter of the operation. The device may determine whether the authentication response is valid based on a comparison of the described characteristic of the operation and the parameter of the operation. The device may cause, based on a determination that the authentication response is valid, performance of the operation based on the parameter. | 2022-07-14 |
20220224686 | SYNTHETIC GENOMIC VARIANT-BASED SECURE TRANSACTION DEVICES, SYSTEMS AND METHODS - Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with associated synthetic genomic variants. An embodiment of the present invention utilizes digital genomic data associated with an entity, such as a person, who may utilize a genome-based security device to complete a transaction. In one embodiment, a person may use a genome-based security device to communicate with an external device over a wireless or other communication interface, synchronize digital genomic data and an associated synthetic variant received from the external device with digital genomic data and associated synthetic variant stored on the genome-based security device. | 2022-07-14 |
20220224687 | DIRECT ACCESS TO EMBEDDED LINK VIA AUTHENTICATED APPLICATION - Direct access to embedded links via an authenticated application is described. In an example, a first user interface can be presented via a web browser of a computing device, wherein the first user interface includes an actuation mechanism corresponding to an object associated with a platform, and wherein the computing device is associated with an application associated with the platform. In at least one example, an indication of an interaction with the actuation mechanism can be received and based at least in part on (i) receiving the indication of the interaction with the actuation mechanism and (ii) a determination that the application is associated with an active authentication session, the object can be presented via a second user interface presented via the application. As such, direct access to the object can be provided via the authenticated application. | 2022-07-14 |
20220224688 | System and Method to Facilitate an Account Protection Check for Sets of Credentials - A system and a method are provided for facilitating an account protection check for the security of sets of credentials. The system and method allow a service provider to automatically lock a credential set of at least one user account if fraudulent activity is detected. A third-party server of a service provider requests a token from the system before the authentication process. User metadata is analyzed to detect potentially fraudulent activity from the user account. If the credential set is in a locked status or unlocked status, at least one remote server of the system respectively relays an invalidation token or a validation token to the third-party server. If the invalidation token is relayed to the third-party server, the service provider does not go through the authentication process. If the validation token is relayed to the third-party server, the service provider proceeds with the authentication process as standard procedure. | 2022-07-14 |
20220224689 | INFORMATION PROVIDING METHOD, INFORMATION PROVIDING SYSTEM, AND SERVER - An information providing method includes (i) starting, by a control device, a communication session with a server in response to establishment of a communication connection with a terminal, and (ii) issuing, by the server, temporary access information for accessing a service in a manner that depends on the communication session. The access information is different for each communication session. The information providing method further includes (iii) notifying, by the control device, the access information to the terminal, and (iv) providing, by the server, target information collected from the control device to the terminal in response to access from the terminal based on the access information. Accordingly, the threat to security when providing information of the control device is reduced. | 2022-07-14 |
20220224690 | Access Identifier Provisioning To Application - Methods and systems for performing on demand access transactions are disclosed. In one example, the method includes receiving, by a directory service computer from an authorizing computer, a file including a primary access identifiers and virtual access identifiers, the virtual access identifiers not being capable of being used at resource providers to conduct transactions. The method also includes receiving a request to provide an access token that is associated with an account, the request comprising information that identifies the account. The method further includes retrieving a virtual access identifier based on the identifying information; and requesting, by the directory service computer to a token service computer, that the access token be provisioned on the user device or an application computer associated with an application on the user device. | 2022-07-14 |
20220224691 | METHOD AND SYSTEM FOR LIVE DATING - Nextdate provides an online dating and game experience for all participants, including live streamers, contestants, and viewers. Nextdate offers advantages over both offline and online speed dating. In respect to offline speed dating, Nextdate is better in that it provides conversational prompts to the participants (the “star” and the contestant), as well as a “Love-o-meter” and audience comments that provide additional items and context to which the participants can respond. In respect to online speed dating, Nextdate includes features that remove the friction from traditional online dating experience and encourage user participation. Nextdate may be implemented as a standalone app or as a tab or feature of another video-centric social networking app. | 2022-07-14 |
20220224692 | MULTI FACTOR AUTHENTICATION - A method of multi-factor authentication, the method comprising computer executed steps, the steps comprising: from a computer of a cloud service, receiving data identifying a user logged-in to the cloud service after being successfully authenticated using a first authentication factor, communicating with a client device of the logged-in user, for receiving a second authentication factor from the logged-in user, determining whether the second authentication factor received from the logged-in user is valid, based on a result of the determining, determining a first user-permission policy for the logged-in user, and communicating the determined first user-permission policy to the computer of the cloud service, for the cloud service to base a restriction of usage of the cloud service by the logged-in user on. | 2022-07-14 |
20220224693 | CONFERENCE SECURITY FOR USER GROUPS - Systems and methods for conference security based on user groups are disclosed. In examples, a set of attendees (e.g., in a collaboration group) may be allowed access to a meeting by a host user with a specified access permission. The collaboration group may be in the network hosting the meeting or outside of the network. An attendee requesting access to the meeting may be verified based on the attendee's identity and membership status of the collaboration group. If an attendee's identity is not identified or if the attendee is not a member of the collaboration group, the requesting attendee may be denied access to the meeting. If the requesting attendee's identity is verified and the attendee is a member of the collaboration group, the attendee is allowed access to the meeting with their specified access permission. | 2022-07-14 |
20220224694 | RESOURCE APPROPRIATION IN A MULTI-TENANT ENVIRONMENT USING RISK AND VALUE MODELING SYSTEMS AND METHODS - Described embodiments provide systems and methods for resource appropriation in a multi-tenant environment using risk and value modeling. A resource server can provide a plurality of applications access to a plurality of resources in response to requests from clients based in part on risk scores and value scores. The resource server can generate and execute a risk model and a value model to determine a risk score and a value score for each of the applications. The resource server can use the risk and value scores to determine access to a particular resource for a requested application. The resource server can assign a first allocation of resource tokens to an application. The resource tokens can correspond to access privileges to plurality of resources. The resource server can dynamically modify the resource allocation for applications responsive to changes to a risk score or value score of a respective application. | 2022-07-14 |
20220224695 | Anchoring Client Devices for Network Service Access Control - Concepts and technologies of network service control for anchoring client devices for network service access control are provided herein. In one aspect of the concepts and technologies disclosed herein, a system is provided and can include a processor and a memory storing computer-executable instructions that, upon execution of the processor, configure the processor to perform operations. The operations can include receiving an anchor instantiation command to anchor one or more client devices to an authorized service location. The anchor instantiation command can initiate an anchor instantiation time period. The operations can include determining, during the anchor instantiation time period, a plurality of anchor attributes associated with the one or more client devices at the authorized location. The operations can include creating an anchor location token that represents the authorized service location based on the plurality of anchor attributes that were determined during the anchor instantiation time period. | 2022-07-14 |
20220224696 | MANAGED NETWORK CONTENT MONITORING AND FILTERING SYSTEM AND METHOD - A system and method for content request monitoring and filtering for a plurality of managed devices in a managed network uses a smart PAC file that is uniquely associated with a particular user using a particular managed device and a DNS look up to perform both the logging/monitoring of the content request and the filtering without a hardware appliance or partial proxying. | 2022-07-14 |
20220224697 | NETWORK TOPOLOGY - A network topology is provided that includes multiple data centers for building blockchain blocks. The data centers can process different subgroups of blocks, and then send updates to one another with information about new blocks. Additionally, some data centers may protect sensitive block body information, and instead may only share block headers. | 2022-07-14 |
20220224698 | GENERATING IMAGE DATA REPRESENTATIVE OF INDUSTRIAL AUTOMATION SYSTEM CONFIGURATIONS - A method, performed by at least one processor, comprising generating a first set of images representative of configuration data associated with an industrial automation system. An electronic display may display at least one image of the first set of images. The processor may detect a change in the configuration data and retrieve updated configuration data from the industrial automation system. The processor may encode the updated configuration data into a second set of images and display at least one additional image of the second set of images on the electronic display. | 2022-07-14 |
20220224699 | CENTRALIZED TOOL FOR IDENTIFYING AND BLOCKING MALICIOUS COMMUNICATIONS TRANSMITTED WITHIN A NETWORK - An apparatus includes a memory and a processor. The memory stores a first list of applications that includes a first application and a second list of applications that includes a second application. Each application of the first list is assigned to a first trust level, indicating that a probability that the application is malicious is less than a lower threshold. Each application of the second list is assigned to a second trust level, indicating that a probability that the application is malicious is greater than the lower threshold. The processor determines that the second application transmitted a communication destined for the first application, and that the first and second applications are assigned to different trust levels. In response, the processor determines that a probability that the transmitted communication is malicious is greater than a threshold and prevents the communication from reaching the computer system of the first application. | 2022-07-14 |
20220224700 | SYSTEM AND METHOD FOR CONNECTED VEHICLE CYBERSECURITY - A system and method for connected vehicle cybersecurity. A method includes creating, by a remote system, a normal behavior model based on a first set of data including at least one first event with respect to connected vehicles, wherein the first set of data is collected from data sources, wherein the remote system is remote from the fleet of connected vehicles; detecting, by the remote system, an anomaly based on the normal behavior model and a second set of data, the second set of data including a second event with respect to the connected vehicles, wherein each of the first set of data and the second set of data includes vehicle data related to operation of the connected vehicles, wherein each event represents a communication with the connected vehicles; determining, based on the detected anomaly, at least one mitigation action; and causing implementation of the at least one mitigation action. | 2022-07-14 |
20220224701 | INFERENCE MODELS FOR INTRUSION DETECTION SYSTEMS IN TIME SENSITIVE NETWORKS - Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious. | 2022-07-14 |
20220224702 | BUILDING AND MAINTAINING CYBER SECURITY THREAT DETECTION MODELS - Techniques for building and maintaining cyber security threat detection models are described. The techniques include data selection, algorithm selection, risk score algorithm selection, model outcome selection, and model automation. During data selection, data is received from various sources and in various formats. The data is then tokenized into vector form and compared to preexisting vectors. If the vectors are equal, the tokenized vector is saved in the database. If the vectors are not equal, a new vector, in key value pair format, is formed. After which, algorithms can be selected to detect anomalies within the data and assign a risk score to the data. Subsequently, a matrix is formed with the vector, selected algorithm, and parameters of the data that were analyzed. The matrix is then stored for application with future data based on a predetermined rule. The output can be modeled in various user-friendly methods. | 2022-07-14 |
20220224703 | Detection of latency, packet drops, and network hops through a tunnel by tracing hops therein - Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include receiving a request, from a client, for a trace of the tunnel; causing the trace inside the tunnel; obtaining results of the trace inside the tunnel; and sending the results of the trace inside the tunnel to the client so that the client aggregates these details with details from one or more additional legs to provide an overall view of a service path between the client and a destination. | 2022-07-14 |