30th week of 2021 patent applcation highlights part 71 |
Patent application number | Title | Published |
20210234760 | SYSTEM, METHOD, AND APPARATUS TO SUPPORT MIXED NETWORK COMMUNICATIONS ON A VEHICLE - An example system includes a vehicle having a first network zone and a second network zone of a different type than the first network zone, a converged network device (CND) interposed between the zones, where the CND includes a policy management circuit that interprets a policy including a network regulation description, a configuration circuit that configures network interface circuit(s) in response to the policy, and the interface circuit(s) that regulate communications between end points of the network zones. | 2021-07-29 |
20210234761 | SYSTEM, METHOD, AND APPARATUS TO SUPPORT MIXED NETWORK COMMUNICATIONS ON A VEHICLE - An example system includes a vehicle having an Ethernet based network and a controller area network (CAN) based network; a CAN vehicle control device disposed onboard the vehicle and structured to control operation of a component of the vehicle; an Ethernet vehicle control device disposed onboard the vehicle and structured to electrically communicate with the CAN vehicle control device; an Ethernet switch disposed onboard the vehicle and having a plurality of physical ports connected to the Ethernet based network; a CAN gateway disposed onboard the vehicle and connected to the CAN based network and the Ethernet switch; and a network convergence circuit defined at least in part by the Ethernet switch and/or the CAN gateway, and structured to facilitate electronic communications between the Ethernet vehicle control device and the CAN vehicle control device. | 2021-07-29 |
20210234762 | SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL - An example system includes a vehicle having at least one network zone; a policy manager circuit structured to interpret a policy comprising an external data routing description, wherein the policy includes a default policy value; a configuration circuit structured to configure a gatekeeper interface circuit in response to the external data routing description and the external data service description; the gatekeeper interface circuit interposed between the at least one network zone and at least one external communication portal selectively couplable to an external device; and wherein the gatekeeper interface circuit is structured to regulate communications between end points of the first network zone and the at least one external communication portal, and to regulate communications between end points of the second network zone and the at least one external communication portal. | 2021-07-29 |
20210234763 | SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL - An example system includes a vehicle having at least one network zone; a policy manager circuit structured to interpret a policy including a local domain name server (DNS), an authorization description, and a firewall configuration description; a configuration circuit structured to configure a gatekeeper interface circuit in response to the policy; and a gatekeeper interface circuit interposed between the at least one network zone and an external communication portal selectively couplable to an external device, and further structured to regulate communications between end points of the at least one network zone and the external communication portal. | 2021-07-29 |
20210234764 | METHOD AND APPARATUS FOR CONFIGURING TRANSMISSION BANDWIDTH, AND DEVICE - The present application provides a method and apparatus for configuring a transmission bandwidth, and a device, for accelerating an activation speed of a carrier/BWP, reducing waiting time of a UE, and saving power consumption of the UE. The method comprises: determining a first carrier/first BWP; and sending a PDCCH to a user terminal UE by means of a second carrier/second BWP, the PDCCH being used for bearing instruction information for activating the first carrier/first BWP and sending a reference signal over the first carrier/first BWP, so that the UE may activate the first carrier/first BWP and receive the reference signal, wherein the reference signal is used by the UE for performing channel measurement and synchronous tracking on the first carrier/first BWP. | 2021-07-29 |
20210234765 | SYSTEM AND METHOD FOR SUPPORTING ON-DEMAND SETUP OF LOCAL HOST CHANNEL ADAPTER PORT PARTITION MEMBERSHIP IN A HIGH-PERFORMANCE COMPUTING ENVIRONMENT - Systems and methods for dynamically assigning membership in a data partition to an end-port of a requesting host channel adapter. An exemplary embodiment can provide a subnet manager configured to operate within a subnet of a network fabric. The subnet can include a plurality of nodes, and the plurality of nodes can include at least one switch and a plurality of end-nodes, where the subnet manager executes on one of the plurality of nodes. A host channel adapter of a node in the subnet can request membership for an end-port of the host channel adapter. In response to the request, the subnet manager can request data from the data store to confirm that the end-port is a member of an admin partition and that the admin partition is associated with the data partition in which membership was requested. | 2021-07-29 |
20210234766 | SYSTEM AND METHOD FOR THE COLLECTION, GENERATION, AND DISTRIBUTION OF SYNTHETIC METRICS FOR COMPUTER SYSTEM MANAGEMENT - A system defines, creates, uses, and distributes information about other entities by collecting network information, recombining and synthesizing new network metrics from the collected network information, and then publishing one or more synthetic metrics datum describing the operation of the synthetic device, using a facading processing system. The technology herein has applications e.g., in the areas of network and computer systems management. | 2021-07-29 |
20210234767 | VEHICLE MIDDLEWARE - The present disclosure describes a vehicle implementing one or more processing modules. These modules are configured to connect and interface with the various buses in the vehicle, where the various buses are connected with the various components of the vehicle to facilitate information transfer among the vehicle components. Each processing module is further modularized with the ability to add and replace other functional modules now or in the future. These functional modules can themselves act as distinct vehicle components. Each processing modules may hand-off processing to other modules depending on its health, processing load, or by third-party control. Thus, the plurality of processing modules helps to implement a middleware point of control to the vehicle with redundancy in processing and safety and security awareness in their applications. | 2021-07-29 |
20210234768 | PREDICTING FORWARDING DESTINATIONS FOR PACKETS - Some embodiments provide a method, executable by a network device, that receives a set of commands specifying an ingress interface of the network device and a set of packet attributes. The method further generates a test packet based on the set of packet attributes. The method also injects the test packet into a hardware packet processing pipeline of the network device so that the test packet appears, from the perspective of the hardware packet processing pipeline, to be received at the ingress interface of the network device. The method further processes the test packet through the hardware packet processing pipeline of the network device. The method also captures the test packet before the test packet exits an egress interface of a plurality of egress interfaces of the network device. | 2021-07-29 |
20210234769 | MACHINE LEARNING BASED END TO END SYSTEM FOR TCP OPTIMIZATION - Bypass network traffic records are generated for a web application. Sufficient statistics of network optimization parameters are calculated for network performance categories. The bypass network traffic records are partitioned for the network performance categories into network traffic buckets. Sufficient statistics and the network traffic buckets are used to generate network quality mappings. The network quality mappings are used as training instances to train a machine learner for generating network optimization policies to be implemented by user devices. | 2021-07-29 |
20210234770 | USER INTERFACES FOR CONTROLLING OR PRESENTING INFORMATION ABOUT MULTIPLE CELLULAR IDENTIFIERS ON AN ELECTRONIC DEVICE - In some embodiments, an electronic device presents settings user interfaces associated with cellular identifiers. In some embodiments, a first electronic device accesses a first cellular identifier regardless of the first electronic device's connection to a second electronic device and accesses a second cellular identifier when the first electronic device is connected to the second electronic device. In some embodiments, an electronic device presents visual indications of cellular identifiers in relation to communication functions. In some embodiments, an electronic device presents visual indications of the status of cellular identifiers active on the electronic device. In some embodiments, an electronic device presents alerts associated with one or more cellular identifiers that have been removed from the electronic device. | 2021-07-29 |
20210234771 | IDENTIFICATION AND DISPLAY OF CONFIGURATION ITEM INFORMATION - Example embodiments for identifying and displaying configuration item information are presented herein. A system may involve a proxy server application disposed within a managed network that includes configuration items and a server disposed within a remote network management platform managing the managed network. The server may receive a request to view information representative of a particular configuration item from a client device. Based on the request, the server may obtain the information and transmit a representation of a graphical user interface to the client device. The representation may include a health graphic, a relationship graphic, a timeline graphic, and an activity stream, each of which represent pertinent information about the particular configuration item. The representation may also include a tabbed interface that facilitates navigation between attributes corresponding to the particular configuration item and attributes corresponding to other configuration items in the managed network. | 2021-07-29 |
20210234772 | METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR CONFIGURING SERVICE INSTANCE - Embodiments of the present disclosure relate to a method, a device and a computer program product for configuring service instances. The method comprises, at a computing device being used to implement a first service instance in a cloud environment, receiving, from a service manager of the cloud environment, a hypervisor related to a configuration of the first service instance. The method further comprises determining, based on the hypervisor, first configuration information for configuring the first service instance. The method further comprises configuring the first service instance with the first configuration information. With this method, service auto-deployment, auto-configuration and auto-association are realized, thereby improving user efficiency of configuring services and user experience. | 2021-07-29 |
20210234773 | METHOD AND SYSTEM FOR DETERMINING A QUALITY OF EXPERIENCE DURING A REAL-TIME COMMUNICATION SESSION - A method for determining a Quality of Experience associated with a real-time communication session between user devices includes monitoring the real-time communication session and determining at least one quality indicator of the Quality of Experience, at least one first performance indicator of a Quality of Service, and at least one second performance indicator of the Quality of Service. Based on the quality indicator and the first performance indicator, the method determines, among a family of correlation functions indicative of the correlation between the Quality of Experience and a Quality of Service in respect of a generic real-time communication session, a correlation function which is indicative of the correlation between the Quality of Experience and the Quality of Service in respect of the monitored real-time communication session. Then the method applies the first performance indicator and the second performance indicator to the correlation function to determine said Quality of Experience. | 2021-07-29 |
20210234774 | System, Method and Apparatus for Managing Services and Applications - The disclosure provides a system, methods and a computer program product that facilitate management, distribution, licensing and provisioning of services. The disclosure includes a repository of one or more services wherein the repository can be populated or managed by one or more entities, organizations or individuals. The disclosure also includes a step of associating one or more services with context matching criteria, wherein the criteria can be matched against contextual information associated with environment/activity of a service consumption device and/or end user associated with the service consumption device. The disclosure also includes a step of delivering and/or enabling a subset of services from the repository on a service consumption device when contextual information of the service consumption device or an end user of the service consumption device matches the context matching criteria associated with the subset of services. | 2021-07-29 |
20210234775 | COMPUTING AND USING DIFFERENT PATH QUALITY METRICS FOR DIFFERENT SERVICE CLASSES - Some embodiments provide a method for quantifying quality of several service classes provided by a link between first and second forwarding nodes in a wide area network (WAN). At a first forwarding node, the method computes and stores first and second path quality metric (PQM) values based on packets sent from the second forwarding node for the first and second service classes. The different service classes in some embodiments are associated with different quality of service (QoS) guarantees that the WAN offers to the packets. In some embodiments, the computed PQM value for each service class quantifies the QoS provided to packets processed through the service class. In some embodiments, the first forwarding node adjusts the first and second PQM values as it processes more packets associated with the first and second service classes. The first forwarding node also periodically forwards to the second forwarding node the first and second PQM values that it maintains for the first and second service classes. In some embodiments, the second forwarding node performs a similar set of operations to compute first and second PQM values for packets sent from the first forwarding node for the first and second service classes, and to provide these PQM values to the first forwarding node periodically. | 2021-07-29 |
20210234776 | METHODS AND APPARATUS FOR ESTIMATING TOTAL UNIQUE AUDIENCES - Methods and apparatus for determining a unique audience exposed to media while reducing memory resources of a computing device are disclosed herein. An example apparatus includes means for logging a plurality of impressions based on impression requests from a plurality of client devices, the plurality of impressions corresponding to media accessed at the client devices; means for obtaining counts, the obtaining means to: obtain a count of demographic impressions logged by a database proprietor; and obtain a count of registered users of the database proprietor exposed to the media; and means for determining a unique audience size by: multiplying a count of the plurality of impressions by a square of the count of the registered users to generate a product; dividing the product by the count of the demographic impressions to generate a quotient; and determining the unique audience size based on a square root of the quotient. | 2021-07-29 |
20210234777 | METHODS AND NETWORK DEVICES FOR DETECTING AND RESOLVING ABNORMAL ROUTES - The embodiments herein relate to a method in a network device. In one embodiment, there proposes a method in a network device, comprising: determining a classification to which a route belongs based on one or more classification criteria; determining, based on the classification to which the route belongs, a detection mechanism for detecting whether the route is an abnormal route; detecting whether the route is an abnormal route using the determined detection mechanism. With the embodiments herein, the abnormal routes, especially the black hole routes, can be automatically detected and resolved in real time. | 2021-07-29 |
20210234778 | ADAPTIVE NETWORK SELECTION - Systems and methods for adaptive network selection are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive link capabilities for each of a plurality of communication links available to the IHS; receive link requirements for each of a plurality of applications executed by the IHS; and assign at least one of the plurality of applications to at least one of the plurality of communication links, at least in part, by matching a subset of link requirements to a subset of link capabilities. | 2021-07-29 |
20210234779 | MEASUREMENT SYSTEM AND MEASUREMENT METHOD - In a measurement system including a first transfer apparatus provided at a packet receiving edge of one network, a second transfer apparatus provided at a packet sending edge of the one network, and a measurement apparatus configured to receive a packet, the first transfer apparatus adds received time of the packet to the packet and transmits the packet, the second transfer apparatus receives the packet, adds sending time and a signature specific to the one network to the packet, and transmits the packet to which the received time, the sending time, and the signature are added, and the measurement apparatus receives the packet, and calculates a difference between the sending time and the received time to measure latency in the one network. | 2021-07-29 |
20210234780 | Optimizing Timeout Settings for Nodes in a Workflow - A unidirectional workflow execution engine is accessed. The unidirectional workflow includes at least a first node and a second node, where the first node is executed before the second node. A timeout setting of the first node is retrieved. An actual execution time of the first node is determined. A difference between the retrieved timeout setting and the actual execution time of the first node is calculated. A timeout setting of the second node is retrieved. The timeout setting of the second node is modified by adding, to the retrieved timeout setting of the second node, the calculated difference between the retrieved timeout setting and the execution time of the first node. | 2021-07-29 |
20210234781 | Reducing Startup Delays for Presenting Remote Media Items - In some implementations, a computing system can reduce startup delays for presenting remote media items. For example, when a user requests media content from a media service, the computing system can include information about the first media item to be played in the initial startup messages to reduce the number of roundtrips needed between client and server devices to present the first media item. A media item can include an introductory asset. The introductory asset can be a portion of the full media item that can be decrypted with a local key or not encrypted at all so that a media client can receive and start presenting the introductory media asset quickly while the full media item is being processed by the media client. In some implementations, the system can remove leading silence from the media item so that the amount of delay perceived by the user is reduced. | 2021-07-29 |
20210234782 | ESTIMATION OF NETWORK QUALITY METRICS FROM NETWORK REQUEST DATA - Network request data is collected over a time window. The network request data is filtered to generate bypass network traffic records. Network performance categories are generated from the bypass network traffic records. Sufficient statistics of network optimization parameters are calculated for the network performance categories. The sufficient statistics of the network optimization parameters are used to generate network optimization parameters to determine data download performances of web applications. | 2021-07-29 |
20210234783 | TUNABLE LOW COST NETWORK - Aspects of the subject disclosure may include, for example, a method comprising providing services over a network to a device, and constructing device capability and usage profiles. A level of service quality for the device is adjusted by adjusting a latency criterion regarding connection of the device to the network; adjusting a speed of transmissions to or from the device; and altering a routing of transmissions to or from the device. The network can be partitioned so that the adjusted service quality level is provided by a network portion having a predetermined level of resources. The adjusted service quality level can comprise a first level while the device is active and a second level while the device is inactive; the first level is higher than the second level. The first and second levels are lower than a service quality level provided by another network portion. Other embodiments are disclosed. | 2021-07-29 |
20210234784 | TELEMETRY CONFIGURATIONS FOR DOWNHOLE COMMUNICATIONS - Systems, apparatus, and methods are described for formatting and for performing data communications between a surface modem and one or more modems located in a logging tool of a bottom hole assembly for use in a wellbore environment. | 2021-07-29 |
20210234785 | CONTAINER NETWORK INTERFACE MONITORING - A system and method of accessing a container environment having one or more containers is provided. The method of the disclosure includes receiving the container network namespace assigned to the container as established in a container runtime, switching from a host container network namespace to the container network namespace of the container, opening the container network interface of the container network namespace for allowing access to packets received or transmitted by the container network interface, and accessing the packets. | 2021-07-29 |
20210234786 | USING HEART BEATS TO MONITOR OPERATIONAL STATE OF SERVICE CLASSES OF A QOS AWARE NETWORK LINK - Some embodiments provide a method for quantifying quality of several service classes provided by a link between first and second forwarding nodes in a wide area network (WAN). At a first forwarding node, the method computes and stores first and second path quality metric (PQM) values based on packets sent from the second forwarding node for the first and second service classes. The different service classes in some embodiments are associated with different quality of service (QoS) guarantees that the WAN offers to the packets. In some embodiments, the computed PQM value for each service class quantifies the QoS provided to packets processed through the service class. In some embodiments, the first forwarding node adjusts the first and second PQM values as it processes more packets associated with the first and second service classes. The first forwarding node also periodically forwards to the second forwarding node the first and second PQM values that it maintains for the first and second service classes. In some embodiments, the second forwarding node performs a similar set of operations to compute first and second PQM values for packets sent from the first forwarding node for the first and second service classes, and to provide these PQM values to the first forwarding node periodically. | 2021-07-29 |
20210234787 | AUTOMATIC RETRANSMISSION CAPABILITY IN HYPERVISOR - A packet is received by a hypervisor from a first virtualized execution environment, the packet to be provided to a second virtualized execution environment. It is then determined whether the packet was successfully delivered to the second virtualized execution environment. In response to determining that the packet was not successfully delivered to the second virtualized execution environment, a network policy is identified that indicates whether to subsequently provide the packet to the virtualized execution environment. In response to the network policy indicating that the packet is to be subsequently provided, the packet is provided to the virtualized execution environment again. | 2021-07-29 |
20210234788 | Detecting False Linkup States in Ethernet Communication Links - A system for detecting a false linkup state in an Ethernet communication link includes at least one processor programmed or configured to determine a block type of a block of bits received from a serializer/deserializer (SerDes), increment a first counter based on determining that the block type of the block of bits corresponds to a data block type or an error block type, determine whether the first counter satisfies a first threshold, enable a flag indicating that there is a false linkup state in an Ethernet communication link, and transmit a message indicating that there is a false linkup state for the Ethernet communication link to an Ethernet network device that is a link partner of the Ethernet communication link. A method and a computer program product are also provided. | 2021-07-29 |
20210234789 | METHODS, DEVICES AND SYSTEMS FOR DETERMINING A TARGET PATH - Aspects of the subject disclosure may include, for example, embodiments and a method. The method includes iteratively providing messages to each Node Processor. Each Node Processor represents a node of a group of nodes. The iteratively providing of the messages comprises providing first messages. Each first message includes a cost associated with a path of nodes visited by each first message. A selected path is obtained from each node having a lowest cost of a group of common endpoint costs for paths having common endpoints. A next group of messages includes the selected path. The iteratively providing of the messages results in selected paths. Also, the method include determining a target path from a remaining path. Other embodiments are disclosed. | 2021-07-29 |
20210234790 | GEOLOCATION SYSTEM AND METHOD - A system and method of obtaining a service area estimation for a router interface is disclosed. In an example, one method for obtaining a service area estimation for a router interface method includes determining hint information for indicating an association between the router interface and geolocation information obtained for one or more IP addresses serviced by the router interface; and processing the hint information to determine the service area estimation for the router interface. A system and method of obtaining a geolocation estimate for a device having an IP address which is serviced by a router interface for which an estimated service area has been obtained is also disclosed. | 2021-07-29 |
20210234791 | SERVICE ASSURANCE OF ECMP USING VIRTUAL NETWORK FUNCTION HASHING ALGORITHM - Techniques are presented for evaluating Equal Cost Multi-Path (ECMP) performance in a network that includes a plurality of nodes. According to an example embodiment, a method is provided that includes obtaining information indicating equal cost multi-path (ECMP) paths in the network and a branch node in the network. For the branch node in the network, the method includes instantiating a virtual network function that simulates an ECMP hashing algorithm employed by the branch node to select one of multiple egress interface of the branch node; providing to the virtual network function for the branch node, a query containing entropy information as input to the ECMP hashing algorithm that returns interface selection results; and obtaining from the virtual network function a reply that includes the interface selection results. The method further includes evaluating ECMP performance in the network based on the interface selection results obtained for the branch node. | 2021-07-29 |
20210234792 | Method and System for Switching Data Frames in a Network - The embodiments herein relate to a method and a system for switch data frames in a network comprising a plurality of switch devices. The method comprising: assigning to each switch device, a SW-ID, exchanging SW-IDs between switch devices; building a routing table, for each switch device; receiving a frame at a switch device. If the frame is a broadcast frame, generating separate copies of the frame; modifying a destination MAC address of each generated copy of the frame by including in the destination MAC address an indicator value; and further including the SW-ID of a corresponding switch device and based on the routing table and the cost indicating in the routing table, transmitting or forwarding each modified frame towards the switch device having the SW-ID indicated in the frame. | 2021-07-29 |
20210234793 | METHODS AND APPARATUS FOR SUPPORTING NETWORK ACCESS USING CABLE AND RADIO COMMUNICATIONS LINKS - Both wireless communication and communications via a cable modem are supported between a network node and a customer premises. Alternative communications links provide redundancy and the possibility to take advantage of the different types of links capacity to provide a level of service that would not be possible using a single communications link to a customer premises. In various embodiments a network node, such as a cable network node hubsite, has an optical connection to the Internet or another communications network and provides network access to one or a plurality of customer premises. The network node includes a wireless access point, e.g., pole mounted base station, as well as one or more cable modem interfaces to thereby allow for both wireless and cable modem based communications. This allows for packets of different applications to traverse different links and/or to switch between links in the event of maintenance or reliability issues. | 2021-07-29 |
20210234794 | A COMMUNICATION DEVICE FOR TRANSMITTING A TRANSMISSION CONTROL PROTOCOL SEGMENT OVER A COMMUNICATION NETWORK USING A MULTIPATH TRANSMISSION CONTROL PROTOCOL - A communication device for transmitting a Transmission Control Protocol (TCP) segment over a communication network using a Multipath Transmission Control Protocol (MPTCP) includes: a communication interface configured to establish an MPTCP data flow comprising a plurality of data sub-flows to a further communication device, and to receive a priority indicator from a network entity, wherein the priority indicator indicates a respective priority of a respective data sub-flow; and a scheduler configured to select, for the TCP segment, a data sub-flow from the plurality of data sub-flows based on the priority indicator. The communication interface is further configured to transmit the TCP segment via the selected data sub-flow to the further communication device. | 2021-07-29 |
20210234795 | SYSTEMS & METHODS FOR DETECTING COMMUNICATION LINK BREAKS - Systems and methods for detecting one or more physical communication link breaks are disclosed. An indication of a failure of one or more network layer links may be received. A physical layer link associated with the one or more network layer links may be determined based on the indication of the failure, and based on data indicating one or more associations between network layer links and physical layer links. A score may be determined indicating a probability that the physical layer link comprises a failure associated with a break in a physical communication link of the physical layer link based on determining a total quantity of the network layer links associated with the physical layer link, and based on a quantity of one or more network layer links associated with the indication of the failure. | 2021-07-29 |
20210234796 | LINK RESOURCE TRANSMISSION METHOD AND APPARATUS - Embodiments of this application provide a link resource transmission method and apparatus. The method includes the following steps. A first node floods first control routing information, where the first control routing information includes an identifier of an area in which the first node is located. A second node floods second control routing information, where the second control routing information includes an identifier of an area in which the second node is located. The first node determines, through comparison, whether the identifier of the area in which the first node is located is consistent with the identifier of the area in which the second node is located. When the identifier of the area in which the first node is located is consistent with the identifier of the area in which the second node is located, the first node transmits link data information of the first node to the second node. | 2021-07-29 |
20210234797 | METHOD, DEVICE, AND SYSTEM FOR DETERMINING ROUTE LEAK - This disclosure discloses a method, device, and system for determining a route leak. The method includes: receiving, by a network monitoring device managing a first autonomous system, an extended BMP packet sent by a first border node of the first autonomous system and an extended BMP packet sent by a second border node of the first autonomous system. The method includes determining, based on the extended BMP packet sent by the first border node and the extended BMP packet sent by the second border node of the first autonomous system, a receiving relationship of a route prefix received by the first border node from the second autonomous system, and a sending relationship of the route prefix sent by the second border node to a third autonomous system. The method further includes determining, based on the receiving relationship and the sending relationship, whether the route prefix is leaked. | 2021-07-29 |
20210234798 | DATA TRANSMISSION METHOD AND APPARATUS, COMPUTER READABLE MEDIUM, AND ELECTRONIC DEVICE - Disclosed are a data transmission method and apparatus, a non-transitory computer readable storage medium, and a computing device. The data transmission method is executed by a computing device, and includes: receiving first packets transmitted by a first device over multiple data channels; parsing the first packets to obtain address information of the first device, and performing aggregation on the first packets according to headers of the first packets, to obtain second packets, the designated address information comprising a virtual port assigned to the first device and associated with the address information of the first device; replacing source address information of the second packets with designated address information, to obtain third packets; and transmitting the third packets to a second device, the second device being a device that the first device needs to access. | 2021-07-29 |
20210234799 | METHOD AND SYSTEM FOR DATA MANAGEMENT IN AN EDGE SERVER - Example implementations relate to method and system for data management in a computing system, such as an edge server having a processing resource. During operation, the processing resource collects data from a plurality of smart devices and process a portion of the data at each edge-stage of a plurality of first edge-stages to generate partially processed data. Further, the processing resource evaluates a data processing load at an edge-stage of the plurality of first edge-stages based on a throughput of the edge-stage or a size of a data processing queue of a next edge-stage of the plurality of first edge-stages. The processing resource further pushes the partially processed data to the next edge-stage or a portion of the partially processed data to an external computing system and a remaining portion of the partially processed data to the next edge-stage, based on the data processing load at the edge-stage. | 2021-07-29 |
20210234800 | METHODS AND APPARATUS FOR SCALABLE NETWORK SECURITY FUNCTIONS - The present disclosure relates to scalable network security functions and handling of packet flows between network security zones in a communications network. Packets that are part of a bidirectional packet flow between the network security zones are received, and a determination is made as to an instance of a security application to which to assign the bidirectional packet flow for security processing. The determination is made based on relative loading of a plurality of identical instances of the security application running on a host machine. All of the received packets that are part of the bidirectional packet flow are directed for processing on the host machine by the one of the security application instances. | 2021-07-29 |
20210234801 | SAFELY ENGINEERING EGRESS TRAFFIC CHANGES - A network device can automatically select an execution plan from a set of possible execution plans that cause a first set of traffic assignments in a network to be changed to a second set of traffic assignments. A traffic assignment indicates assignments of the traffic to one or more tunnels, internal routes and/or peer links to be utilized for routing traffic received at provider edge routers through a network to prefixes. A traffic assignment can have various parameters such as bandwidth, transmission costs etc. Each execution plan has one or more steps, and each step has one or more traffic assignment changes progressing from the first set of traffic assignments to the second set of traffic assignments. The network device can automatically select an execution plan based on an evaluation metric determined for each execution plan. The evaluation metric can be a cost based metric or a quality based metric. | 2021-07-29 |
20210234802 | NETWORK SYSTEM AND NETWORK BAND CONTROL MANAGEMENT METHOD - [Problem] Provided are a network system and a network bandwidth control management method capable of preventing packets that need to preferentially flow from being discarded at a time of high load. | 2021-07-29 |
20210234803 | METHOD AND APPARATUS FOR TRANSMITTING PACKET MESSAGES BASED ON PRIORITY IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus for transmitting a plurality of packet messages based on priority in a wireless communication system ( | 2021-07-29 |
20210234804 | ACCURATE TRAFFIC STEERING BETWEEN LINKS THROUGH SUB-PATH PATH QUALITY METRICS - Some embodiments provide a method for quantifying quality of several service classes provided by a link between first and second forwarding nodes in a wide area network (WAN). At a first forwarding node, the method computes and stores first and second path quality metric (PQM) values based on packets sent from the second forwarding node for the first and second service classes. The different service classes in some embodiments are associated with different quality of service (QoS) guarantees that the WAN offers to the packets. In some embodiments, the computed PQM value for each service class quantifies the QoS provided to packets processed through the service class. In some embodiments, the first forwarding node adjusts the first and second PQM values as it processes more packets associated with the first and second service classes. The first forwarding node also periodically forwards to the second forwarding node the first and second PQM values that it maintains for the first and second service classes. In some embodiments, the second forwarding node performs a similar set of operations to compute first and second PQM values for packets sent from the first forwarding node for the first and second service classes, and to provide these PQM values to the first forwarding node periodically. | 2021-07-29 |
20210234805 | GENERATING PATH USABILITY STATE FOR DIFFERENT SUB-PATHS OFFERED BY A NETWORK LINK - Some embodiments provide a method for quantifying quality of several service classes provided by a link between first and second forwarding nodes in a wide area network (WAN). At a first forwarding node, the method computes and stores first and second path quality metric (PQM) values based on packets sent from the second forwarding node for the first and second service classes. The different service classes in some embodiments are associated with different quality of service (QoS) guarantees that the WAN offers to the packets. In some embodiments, the computed PQM value for each service class quantifies the QoS provided to packets processed through the service class. In some embodiments, the first forwarding node adjusts the first and second PQM values as it processes more packets associated with the first and second service classes. The first forwarding node also periodically forwards to the second forwarding node the first and second PQM values that it maintains for the first and second service classes. In some embodiments, the second forwarding node performs a similar set of operations to compute first and second PQM values for packets sent from the first forwarding node for the first and second service classes, and to provide these PQM values to the first forwarding node periodically. | 2021-07-29 |
20210234806 | FIRST NETWORK NODE, SECOND NETWORK NODE, AND METHODS PERFORMED THEREBY FOR TRACING A PACKET IN A PIPELINE - Methods for tracing a packet in a pipeline comprising a set of tables, in an SDN using OpenFlow. The packet comprises a trace bit, and is provided with a TTL value. A first network node indicates to a second network node to have each flow table decrement the TTL value by 1, based upon the trace bit. The first network node initially sets the TTL to be 1, and then sends the packet to a first table in the second network node. The first network node receives the packet, from another table in the set, and for every remaining table, and one table at a time: a) increments the TTL value by 1, and b) repeats the sending, and the receiving, until a last table is reached or a criterion is met. The first network node then indicates a route followed by the packet. | 2021-07-29 |
20210234807 | RADIO COMMUNICATION DEVICE AND RADIO COMMUNICATION METHOD - A radio communication device includes a reception unit that receives a part of data transmitted from a first communication device, via a first path including a radio channel between the radio communication device and the first communication device and that receives another part of data transmitted from the first communication device, via a second path that goes through a second communication device; a control unit that performs communication control in accordance with a state of data communication performed via the second path; and a transmission unit that transmits, to the first communication device via the first path by using control performed by the control unit in accordance with the state of the data communication performed via the second path, reception state information that specifies data that has been received or data that has not been received by the reception unit. | 2021-07-29 |
20210234808 | METHODS AND SYSTEMS FOR DATA TRANSMISSION - A method for data transmission may be implemented on an electronic device having one or more processors. The one or more processors may include a master queue including a master queue head and a plurality of primary ports that are connected to each other using a serial link. The method may include operating the master queue head to obtain a message. The method may also include operating the master queue head to segment the message into a plurality of segments. The method may also include operating the master queue head to transmit the plurality of segments to a first primary port of the plurality of primary ports in the master queue. The method may also include operating the first primary port to transmit the plurality of segments to a second primary port of the plurality of primary ports in the master queue. | 2021-07-29 |
20210234809 | TECHNIQUES FOR EXCESS RESOURCE UTILIZATION - Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer. | 2021-07-29 |
20210234810 | METHOD AND SYSTEM FOR SHARING USER CONFIGURATION DATA BETWEEN DIFFERENT COMPUTING SESSIONS - A method includes receiving a request from a client device to establish a first computing session for a first resource hosted on a virtual machine (VM). The method includes generating a session transfer key for accessing a second resource provided by a second resource provider. The method includes issuing instructions, to the VM that hosts the first resource, for establishing a second computing session to host the second resource, wherein the instructions include a mapping of the session transfer key to a session identifier. The method includes providing the instructions to the client device to establish the second computing session for the second resource without input for the second resource from the user of the client device. The establishment of the second computing session being between the VM and the second resource provider and based on the mapping of the session transfer key to the session identifier. | 2021-07-29 |
20210234811 | CONTROLLING OF COMMUNICATION NETWORK COMPRISING VIRTUALIZED NETWORK FUNCTIONS - A method comprising determining that at least one virtualized communication function or application providing services related to a communication network is instantiated, preparing an indication related to the instantiation of the at least one virtualized communication function or application, and causing transmission of the prepared indication to at least one of a network element of the communication network, a network function of the communication network, a communication function, an application and a database to which network elements, network functions, communication functions or applications in the communication network have access. | 2021-07-29 |
20210234812 | TRAFFIC BROKER FOR ROUTING DATA PACKETS THROUGH SEQUENCES OF IN-LINE TOOLS - Embodiments are disclosed for a network switch appliance with a traffic broker that facilitates routing of network traffic between pairs of end nodes on a computer network through a configurable sequence of in-line tools. | 2021-07-29 |
20210234813 | COMPUTERIZED SYSTEM AND METHOD FOR MULTI-FACTOR MESSAGE CLASSIFICATION AND DELIVERY - Disclosed are systems and methods for improving interactions with and between computers in content providing, searching and/or hosting systems supported by or configured with devices, servers and/or platforms. The disclosed systems and methods provide a novel messaging framework that automatically applies a multi-factor analysis technique to incoming and received messages in order to properly identify a message's type and category, which dictates the manner in which the message is displayed within a recipient's inbox. The disclosed framework operates on two levels: i) it determines whether a message is from a human or machine sender (H/M classification), and ii) it determines the messages category (MAGMA categorization). | 2021-07-29 |
20210234814 | HUMAN-MACHINE INTERACTION - A method for human-machine interaction based on a neural network is provided. The method includes: providing a user input as a first input for a neural network system; providing the user input to a conversation control system different from the neural network system; processing the user input by the conversation control system based on information relevant to the user input; providing a processing result of the conversation control system as second input for the neural network system; and generating, by the neural network system, a reply to the user input based on the first and second input. | 2021-07-29 |
20210234815 | SYSTEMS AND METHODS FOR CONTROLLING SECURE PERSISTENT ELECTRONIC COMMUNICATION ACCOUNT SERVICING WITH AN INTELLIGENT ASSISTANT - The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is provided that includes receiving, at an enrollment web portal, enrollment data including: enrollment credentials identifying a user for authentication, a phone number of a mobile device associated with the user, and consent by the user to persistently interact with an account servicing system via SMS texting. The method includes: processing the received enrollment data, authenticating the user responsive to processing the received enrollment data, storing the phone number of the mobile device associated with the user in a phone number data storage, and generating, responsive to the authenticating, a revocable token for persistent access to a natural dialogue module via a SMS texting gateway for the mobile device identified by the phone number. | 2021-07-29 |
20210234816 | COGNITIVE DETERMINATION OF MESSAGE SUITABILITY - Cognitive determination of whether a message is suitable for sending over a data communications network can include extracting tokens from the message prior to transmitting the message. One or more intended recipients of the message can be determined from the tokens. A machine learning classification model corresponding to the one or more recipients of the message can be selected. The machine learning classification model can be constructed based on tokens extracted from prior messages, which are combined to create a plurality of documents for training the machine learning classification model. The one or more tokens extracted from the message can be classified using the machine learning classification model. An alert message can be generated in response to determining based on the classifying that the message is unsuited for sending. | 2021-07-29 |
20210234817 | INFORMATION PROCESSING SYSTEM AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - An information processing system includes a processor configured to create and manage an exchange space in which a post of a communication message is received and accumulated, and manage relation information indicating a relation between the exchange spaces, and, in a case where a new exchange space is created, specify a relevant exchange space having a specific relation with the new exchange space among existing exchange spaces, perform weighting on setting information of the relevant exchange space based on the relation between the relevant exchange space and the new exchange space, and set the new exchange space based on the weighted setting information of each relevant exchange space. | 2021-07-29 |
20210234818 | METHOD, SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIUM FOR CONTROLLING INTERNET OF THINGS (IoT) DEVICE USING MESSENGER BOT - Provided is a method of controlling an Internet of Things (IoT) device using a messenger bot, the method including adding a chatroom with a bot for interaction between an IoT server and a user of a messenger; and instructing the IoT server to transmit a control signal to the IoT device in response to a control input that is input from the user to the bot through the chatroom. | 2021-07-29 |
20210234819 | MEDIA ENHANCEMENT SYSTEM - Embodiments of the present disclosure relate generally to systems for enhancing a first media item through the addition of a supplemental second media item. A user may provide a request to enhance a selected media item, and in response, an enhancement system retrieves and presents a curated collection of supplemental content to be added to the media, to the user. The user may review the curated collection of supplemental content, for example by providing a tactile input to scroll through the curated collection of content. | 2021-07-29 |
20210234820 | COGNITIVE ATTACHMENT DISTRIBUTION - A method, a computer program product, and a computer system cognitively distribute email attachments to recipients. The method includes receiving an email composition for an email to be transmitted to a plurality of recipients, the email composition including at least one attachment. The method includes determining recipient information indicative of respective characteristics of the recipients. The method includes determining a context of a select one of the at least one attachment. The method includes, for each recipient, determining a score indicative of an appropriateness of the selected attachment being distributed to the recipient based on the recipient information of the recipient and the context of the selected attachment. The method includes, as a result of the score for a select one of the recipients satisfying a scoring threshold, distributing the attachment to the selected recipient via the email. | 2021-07-29 |
20210234821 | CONFIGURABLE RESPONSE TRACKING AND MONITORING OF USERS WHO ARE RESPONDING TO AN EMAIL - Various systems and methods are provided for using a response tracking plugin to detect and inform users in real time when one or more recipients of an email are actively responding to that email. In one embodiment, the functionality disclosed herein can be applied to an email that was sent to a plurality of recipients, including at least a first and second recipient, and where the email comprises a plugin that is configured to enable response tracking. One such embodiment comprises receiving the email; monitoring for a first pulse from the second recipient of the email, where the pulse is configured to indicate that the second recipient of the email has begun a reply to the email; and in response to receiving the first pulse, displaying an indication that comprises information about the second recipient of the email. | 2021-07-29 |
20210234822 | GENERATING INTERACTIVE EMAILS AND TRACKING USER INTERACTIONS - Systems, methods, and related technologies are provided for generating interactive emails and tracking user interactions. In one implementation, an email an be received within an email client. The email can be rendered within the email client, such as by: presenting a first selectable element within the email client, presenting a second selectable element within the email client, and presenting one or more content items within the email client. A selection of the first selectable element can be received within the email client. In response to the selection of the first selectable element, a presentation of the one or more content items can be adjusted within the email client. | 2021-07-29 |
20210234823 | DETECTING AND IDENTIFYING TOXIC AND OFFENSIVE SOCIAL INTERACTIONS IN DIGITAL COMMUNICATIONS - A system for processing digital data signals, comprising at least one hardware processor adapted for identifying an offending social interaction by: receiving at least one signal from at least one other hardware processor, where each of the at least one signal is generated according to an action of a person and is associated with at least some of a plurality of entities, each entity having a plurality of basic entity confidence values of a plurality of basic entity attributes, and a plurality of combination entity confidence values of a plurality of combination entity attributes; and for at least one entity of the plurality of entities: updating at least one basic entity confidence value thereof according to a plurality of signal attribute values computed for the at least one signal; updating at least one combination entity confidence value thereof according to a relationship tree describing a semantic relationship. | 2021-07-29 |
20210234824 | MANAGING AN EPHEMERAL POST IN A SOCIAL NETWORKING SYSTEM - A method of posting ephemeral posts is disclosed. The method starts with receiving, from a user of a social network, a request to post an ephemeral post, the request including an ephemeral variable associated with a threshold event. The ephemeral post is posted on behalf of the user. Then an occurrence of the threshold event is monitored. When the threshold event has not occurred, the post is allowed to be accessible to at least one viewer other than the user. When the threshold event has occurred, the post is blocked from being accessible by the at least one view other than the user. | 2021-07-29 |
20210234825 | SOCIAL PLATFORM WITH ENHANCED PRIVACY AND INTEGRATED CUSTOMIZATION FEATURES - Embodiments provide a social networking platform offering various services, such as, facilitating aggregation and management of a user's interaction on one or more social networking platforms, offering enhanced control over the level of privacy associated with the flow of user data, offering tools to customize the user's exposure to advertisement-related content on the social networking platform(s), integrating features to control aspects of how data/content is presented to and visualized by the user, empowering the user to multicast direct messages to other users without the other users having to meet certain constraints, empowering the user to create and/or join a group based on messaging threads, and the like. One or more of these enhanced services/features are associated with a powerful framework of authentication/permission model for access control. | 2021-07-29 |
20210234826 | METHOD AND APPARATUS FOR SHARING USER EVENT BETWEEN CHATBOTS - Provided is a method by which a cross chatbot gateway allows an event to be shared between chatbotsu, and the method includes the steps of: receiving an event message from a first chatbot communicating with a first chatting server using a first chatting protocol, wherein the event message includes destination information and event information of a first user, who is a chatting counterpart of the first chatbot; and transmitting the event information to a second chatbot communicating with a second chatting server using a second chatting protocol, on the basis of the destination information. | 2021-07-29 |
20210234827 | UNIVERSAL ACTIONABLE NOTIFICATIONS - A notification service may act as an intermediary between message channels and/or other sources of actionable notifications and/or action items contained in messages, aggregating actionable notifications for a given recipient across multiple message channels and/or across multiple tools or services, sending notification messages with selectable response options to the recipient in a unified format, and processing the user's responses, e.g., by transmitting the responses back to the applicable sources. | 2021-07-29 |
20210234828 | METHOD FOR UPDATING A DATABASE OF A VOICE OVER IP NETWORK - A method for updating a database of a Voice over IP network by a gateway of a local network allowing access to the VoIP network. The method includes: receiving a message to initiate a VoIP call on the VoIP network coming from a terminal connected to the local network; determining a hardware identifier of the terminal from an IP address on the local network contained in the message; if the identifier is paired in the database with a telephone identity, transferring the message to the VoIP network; otherwise: setting up a VoIP channel between the terminal and a voice server hosted by the access gateway; obtaining by the voice server, via this channel, an authentication code of a user of the terminal; if the code is associated with a telephone identity allocated by the VoIP network, updating the database by pairing the identifier of the terminal with this telephone identity. | 2021-07-29 |
20210234829 | Local Transparent Extensibility and Routing Slip Extensibility for Business Process Execution Language - In order to achieve location transparency and routing slip extensibility, a system and a method for orchestrating a web service using Business Process Execution Language are disclosed. The method includes: receiving a message, wherein the message comprises an address identifying an extension element; determining, from the address, a location of the extension element identified by the address; responsive to determining the location of the extension element, directing the message to an appropriate location; and storing the message in a computer readable storage medium. | 2021-07-29 |
20210234830 | SYSTEM AND METHOD FOR NETWORK IP ADDRESS CAPACITY ANALYTICS AND MANAGEMENT - An embodiment of the present invention is directed to analyzing historical network capacity allocations, using machine learning to predict future capacity needs and automating network capacity management activities such as allocations and de-allocations. | 2021-07-29 |
20210234831 | HASH COLLISION PREVENTION SYSTEM - A hash collision prevention system includes a plurality of host devices and a plurality of networking devices. A host device address generation system retrieves network addressing information associated with the plurality of host devices, and identifies a hashing function utilized by the plurality of networking devices in transmitting data packets associated with the plurality of host devices. The host device address generation system then uses the hashing function and the network addressing information to determine a plurality of host device addresses that do not produce a hash collision, and provides the plurality of host device addresses for provisioning to the plurality of host devices. | 2021-07-29 |
20210234832 | Computer Security System and Method Based on User-Intended Final Destination - A system and method is described for protecting applications against malicious URL links by identifying a final destination. The system and method also includes enabling a user process to directly connect to the final destination, bypassing the original URL altogether; thereby bypassing the hacker's ability to use that URL to programmatically send the application to a malicious site. | 2021-07-29 |
20210234833 | APPLICATION FIREWALLS BASED ON SELF-MODELING SERVICE FLOWS - In various examples, firewalls may include machine learning models that are automatically trained and applied to analyze service inputs submitted to input processing services and to identify whether service inputs are desirable (e.g., will result in an undesirable status code if processed by a service). When a service input is determined by a firewall to be desirable, the firewall may push the service input through to the input processing service for normal processing. When a service input is determined by the firewall to be undesirable, the firewall may block or drop the service input before it reaches the input processing service and/or server. This may be used to prevent the service input, which is likely to be undesirable, from touching a server that hosts the input processing service (e.g., preventing a crash). | 2021-07-29 |
20210234834 | MULTI-LINK VPN LINK SELECTION SYSTEM - A multi-link VPN link selection system includes a multi-link VPN server device that provides a VPN connection to application server device(s) for a computing device. The computing device monitors each of its network interfaces that each provide a respective link to the VPN connection and, in response, identifies one or more QoS parameters associated with each of those network interfaces. When the computing device receives data traffic from application(s) operating on the computing device, it identifies a network transmission requirement associated with that data traffic, determines one of the network interfaces that is associated with one or more QoS parameters that satisfy the network transmission requirements associated with that data traffic; and transmits that data traffic via that network interface and over the respective link provided by that network interface to the application server device(s) via the VPN connection provided by the multi-link VPN server device. | 2021-07-29 |
20210234835 | PRIVATE CLOUD ROUTING SERVER CONNECTION MECHANISM FOR USE IN A PRIVATE COMMUNICATION ARCHITECTURE - A method for use with a public cloud network is disclosed. The method includes setting up at least one virtual machine, at least one private cloud call-back server (PCCBS) and at least one smart device client on the side of the PCCBS to provide cloud based web services, and at least one private cloud routing server (PCRS) and at least one smart device client on the side of the PCRS in a client server relationship. The virtual machine and PCCBS usually reside in a hyperscale data center, while the PCRS resides in the client's remote premises. The private cloud call-back server acts as a middleman to relay communication between the smart device client on the side of the PCCBS and the private cloud routing server. The PCCBS will call back the private cloud routing server on demand based on the smart device client request. The at least one private cloud call-back server includes a first message box associated therewith. | 2021-07-29 |
20210234836 | A PROXY NETWORK WITH SELF-ERASING PROCESSING ELEMENTS - Systems and methods are provided for maintaining data privacy in a communication system. The method includes: providing a proxy network which creates a plurality of ingress processing elements and a plurality of egress processing elements, wherein the ingress processing elements and the egress processing elements each include at least a private processing unit and a private memory area; receiving a request at a selected ingress processing element from a first server; routing the request from the selected ingress processing element to a selected egress processing element; forwarding the request from the selected egress processing element to a second server; and erasing both the selected ingress processing element and the selected egress processing element. | 2021-07-29 |
20210234837 | System and method to detect and prevent Phishing attacks - Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques. | 2021-07-29 |
20210234838 | SERVER FOR DETECTING A PROXY DEVICE IN A COMMUNICATIONS PATH AND RELATED METHODS - A computing device may include a processor and a memory. The processor may be configured to provide an encrypted second portion of a key to a client device in response to a match between data decrypted from an encrypted first portion of the key and a first portion of the key, the match being indicative of an absence of a proxy device. The processor may be configured to detect a loss in connectivity between the computing device and the client device based upon a mismatch between a decrypted second portion of the key and a second portion of the key, the mismatch being indicative of the proxy device. | 2021-07-29 |
20210234839 | DATA PRIVACY PLUG-IN FOR ENTERPRISE INSTANT MESSAGING PLATFORM - A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online. | 2021-07-29 |
20210234840 | METHOD AND SYSTEM FOR PRIVATE IDENTITY VERIFICATION - Methods, systems, and techniques for private identity verification involve obtaining a cryptographically secure commitment that is generated using a first user identifier and a private user identifier associated with the first user identifier; receiving, from an identity verification system, initial zero knowledge proof messages comprising the commitment; sending, to the identity verification system, a set of cryptographically secure known identifier commitments generated using a set of private user identifiers; receiving, from the identity verification system: (i) a zero knowledge proof response generated using the zero knowledge proof challenge; and (ii) proof that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers; and verifying that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers. | 2021-07-29 |
20210234841 | SECURING DATA COMPRESSION - Various embodiments are provided for securing data compression in a computer environment are presented. Encryption cycles of a data compression stream may be optimized by applying a first type of encryption on a first section and a last section of compressed data and a second type of encryption on a middle section of compressed data, the first type of encryption containing key information relating to the middle section of the compressed data. | 2021-07-29 |
20210234842 | TRACKING AND ANALYSES OF CONTENT PRESENTATION - Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service. | 2021-07-29 |
20210234843 | SECURED TRANSFER OF DATA BETWEEN DATACENTERS - In various embodiments, a method of transferring data between datacenters may be performed. The method may include running a first plurality of host programs and a first plurality of encryption units at a first datacenter. The method may further include establishing, between the first datacenter and a second datacenter, secure communication connections between each of the first plurality of encryption units and a corresponding one of a second plurality of encryption units running at the second datacenter. The method may further include transferring, by the first datacenter, data from the first plurality of host programs to a second plurality of host programs running at the second datacenter. | 2021-07-29 |
20210234844 | SENSOR NODES AND HOST FORMING A TIERED ECOSYSTEM THAT USES PUBLIC AND PRIVATE DATA FOR DUPLICATION - An edge node has a central processing operable to gather sensor node data via a sensor and store at least part of the sensor node data locally in a public region of a persistent storage. The edge node backs up duplicate portions of the sensor node data to public storage regions of peer-edge nodes. The edge node receives private data from a host that is coupled to the edge computing node and the peer edge nodes, and stores the private data in a private region of the persistent storage. The private region is protected from the peer edge nodes using distributed key management. | 2021-07-29 |
20210234845 | SECURE MESSAGE PASSING USING SEMI-TRUSTED INTERMEDIARIES - Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK. | 2021-07-29 |
20210234846 | MANAGE ENCRYPTED NETWORK TRAFFIC USING DNS RESPONSES - This present disclosure generally relates to managing encrypted network traffic using Domain Name System (DNS) responses. One example includes requesting an address; receiving a response from the resolution server including one or more addresses associated with the domain name; associating with the domain name a particular address selected from the received one or more addresses; receiving a request to resolve the domain name; sending a response to the request to resolve the domain name, the sent response including the particular address associated with the domain name; receiving a secure request for a resource, the secure request directed to the particular address associated with the domain name; and determining that the secure request is directed to the domain name based on the association between the particular address and the domain name. | 2021-07-29 |
20210234847 | SECURE PEER-TO-PEER CONNECTION NETWORK AND ASSOCIATED PROTOCOLS FOR A GROUP-BASED COMMUNICATION SYSTEM - Secure peer-to-peer connection network and/or protocols for a group-based communication system are described. In an example, a peer-to-peer connection request associated with a first identifier for a first client device and a second identifier for a second client device can be received. The first identifier and the second identifier can be compared to a group-based communication system validation registry associated with the group-based communication system and, based at least in part on a determination that the peer-to-peer connection request is authorized per the group-based communication system validation registry, a peer-to-peer connection between the second client device and the first client device can be established. | 2021-07-29 |
20210234848 | OFFLINE AUTHORIZATION OF INTERACTIONS AND CONTROLLED TASKS - A method is disclosed and includes receiving, by a first communication device, a first local authentication model, the first local authentication model being derived from a master authentication model at a remote server computer, and receiving a request to perform an interaction with a second communication device, the interaction being performed in an offline manner. The method may further include applying, by the first communication device, the first local authentication model to the interaction to determine a first authentication result and determining whether or not to allow the interaction to proceed based upon the first authentication result. The method may also include updating the first local authentication model using the master authentication model when the first communication device is online. | 2021-07-29 |
20210234849 | Decentralized Digital Communication Platform System and Method - A system and method for a user-centric decentralized digital communication platform aggregating multiple user groups within a defined organization, community or affiliated networks enables secure data transfer of complex multi-party data across multiple information systems, organizations, communities, and external affiliates. A comprehensive digital ecosystem, in which varied user groups within specific industries can identify, interact and manage everyday tasks and requests, provides an intuitive networking communication platform that can utilize distributed ledger technology to reward participation and exchange. The computer-implementable communication platform system is operable in combination with multiple information systems, and includes or provides a central remote abstraction layer, service or system for enabling inter-information system operations, and a single interface for client-to-information system interactions. The remote abstraction layer, service or system communicates with administrative clients associated with the multiple information systems and client devices having device authentication means for identifying and approving data release from select information systems. | 2021-07-29 |
20210234850 | SYSTEM AND METHOD FOR ACCESSING ENCRYPTED DATA REMOTELY - A process and system of enhancing the security of authentication mechanism that includes registering an authorized device having memory storage on an authentication platform; storing login credentials for at least one account in the memory of the authorized device; receiving on the authentication platform a request for login credentials from a secondary device; transmitting the request for credentials from the authentication platform to the authorized device; prompting a user to respond to the request to authorize transmission of the confidential data between the secondary device and the service provider; and transmitting the requested credentials from the memory on the authorized device to the secondary device when the user provides authorization via the authorized device. | 2021-07-29 |
20210234851 | INFORMATION COLLECTION SYSTEM AND INFORMATION COLLECTION METHOD - The information collection system is provided with an information collection server, a management server, and a communication device and collects information of an analysis device. The information collection server acquires the information about the analysis device and stores it. The management server stores the user information of the owner of the analysis device. The communication device can communicate with the information collection server and transmits the information about the analysis device to the information collection server. When the first authentication information transmitted from the communication device matches the second authentication information corresponding to the communication device stored in the information collection server, the information collection server acquires and stores the information about the analysis device transmitted from the communication device. The information collection server generates authentication information to be set to the communication device based on the user information stored in the management server. | 2021-07-29 |
20210234852 | PREVENTION OF TOKEN AUTHENTICATION REPLAY ATTACKS SYSTEM AND METHOD - A method including receiving, by a server computer, a request message from a token requestor computer on behalf of a user device. The request message comprising a first current token tracking value and a first function index value. The server computer can determine a second function index value. The server computer can then compare the first function index value to the second function index value. If the first function index value and the second function index value match, the server computer can determine a function based on the first function index value and a stored function table associated with the user device. The server computer can then determine a second current token tracking value based on the function, then compare the first current token tracking value to the second current token tracking value. The server computer can generate a response message in response to the comparing. | 2021-07-29 |
20210234853 | Shared Secret Vault for Applications with Single Sign On - Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An application may prompt a user to provide user entropy such as a passcode (e.g. a password and/or PIN). The application may use the user entropy to decrypt a user-entropy-encrypted vault key. Once the vault key is decrypted, the application may decrypt a vault database of the shared vault. The shared vault may store shared secrets, such as server credentials, and an unlock key. The application may store the unlock key, generate an unlock-key-encrypted vault key, and cause the shared vault to store the unlock-key-encrypted vault key, thereby “unlocking” the vault. The application may then use the unlock key to decrypt the vault database without prompting the user to provide user entropy again. | 2021-07-29 |
20210234854 | Confidence broker system - A Confidence Broker System is disclosed. One embodiment of the present invention includes a confidence broker ( | 2021-07-29 |
20210234855 | FULFILLMENT OF REQUESTS STORED ON A MESSAGE QUEUE - According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions that may cause the processor to determine whether a request is stored in a message queue, in which the apparatus may be inside of a domain and the message queue may be outside of the domain. Based on a determination that a request is stored in the message queue, the processor may pull the request from the message queue through a domain boundary, fulfill the request to cause a response to the request to be generated, and forward the response to the message queue through the domain boundary. | 2021-07-29 |
20210234856 | METHODS FOR MULTI-FACTOR ACCESS CONTROL IN ANONYMOUS SYSTEMS - The invention relates to methods for storing and finding data of clients which are identifiable by unique client identifiers on a memory device, wherein these data include at least client data identification values which the client assigns arbitrarily to the data, and these data of the client are found on the memory device exclusively by means of these client data identification values. An access control entity is provided which has an adaptable positive list as a listing of the client identifiers of the selected client which, exclusively in a session setup step, beginning with a session start enquiry, obtain a temporary supplementary information item from this access control entity and with this information item can store and find data on the memory device, each temporary supplementary information item losing its validity after a specific time period. | 2021-07-29 |
20210234857 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND APPLICATION PROVIDING METHOD - An application server of an authentication system includes a requesting part that makes a request for possession authentication which is authentication using an authenticator, when the requesting part receives a request for authentication of a user from a terminal, a verifying part that receives an authentication result of the possession authentication and information for verification from the authentication server, and verifies the validity of the authentication server on the basis of the received information for verification, and a providing part that provides a function related to the application to the terminal if the verifying part verifies that the authentication server is valid. The authentication server of the authentication system includes a possession authentication part and a result transmission part that transmits the authentication result of the possession authentication and the information for verification to the application server. | 2021-07-29 |
20210234858 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND AUTHENTICATION APPARATUS - In the authentication system, the application server includes an authentication requesting part that sends biometric authentication request information to an authentication server for requesting biometric authentication for the user, and a providing part that provides a function related to the application when the authentication succeeds, the authentication server includes a biometric authentication instructing part that sends a push notification including first instruction information to a mobile terminal, which is possessed by the user, when the biometric authentication request information is received, first instruction information instructing performance of the biometric authentication corresponding to the service ID included in said biometric authentication request information, and a result sending part that sends the authentication result to the application server that sent the biometric authentication request information when an authentication result of the biometric authentication corresponding to the first instruction information received from the mobile terminal. | 2021-07-29 |
20210234859 | NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, DATA ACCESS CONTROL METHOD, AND AUTHORIZATION SERVER - A non-transitory computer-readable storage medium storing a program that causes a processor included in an authorization server to execute a process, the process includes storing an association relationship between a plurality of users who are owners of data, and a consent portal with which each of the plurality of users performs user registration, when consent of a user to access to data of a first condition is asked for by a client, detecting a target user who is an owner of data that matches the first condition, extracting a consent portal with which the target user performs user registration, from the association relationship, and obtaining an intention of consent or non-consent to access to the data, from the target user by using the extracted consent portal, and controlling an access by the client to data in the resource server, in accordance with the obtained intention. | 2021-07-29 |