33rd week of 2021 patent applcation highlights part 71 |
Patent application number | Title | Published |
20210258139 | WIRELESS COMMUNICATION APPARATUS AND COEFFICIENT UPDATE METHOD - A wireless communication apparatus includes: a processor that performs distortion compensation on a transmission signal by using a distortion compensation coefficient; an amplifying unit that amplifies the transmission signal; and a feedback path that feeds back a feedback signal to the processor. The processor executes a process including: acquiring, from a transmission signal at a first timing and feedback signals at a second timing that is before the first timing and at a third timing that is after the first timing, instantaneous delay associated with propagation delay of the feedback signals in the feedback path; calculating a mean value of the instantaneous delay acquired in a predetermined time period; adding delay associated with the calculated mean value to the transmission signal; and updating the distortion compensation coefficient by using the transmission signal to which the delay is added and the feedback signal. | 2021-08-19 |
20210258140 | COMMUNICATION DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - A communication device includes: a plurality of wireless communication sections, each of which is configured to wirelessly receive a signal from another communication device; and a control section configured to select a wireless communication section from which a specific reception time corresponding to an optimum parameter that is a reliability parameter indicating that the specific reception time is most appropriate for a processing target is detected, as a transmission communication section serving as a wireless communication section that transmits a signal from among the plurality of wireless communication sections, and configured to measure a distance between the transmission communication section and the other communication device on the basis of the specific reception time detected from a correlation computation result obtained from signals transmitted/received between the other communication device and the selected transmission communication section. | 2021-08-19 |
20210258141 | METHOD FOR RECOGNIZING EXPRESSION OF OPINION CAPABLE OF ENSURING ANONYMITY AND PREVENTING SYBIL ATTACKS, METHOD FOR REGISTERING THAT STORES USER?S IDENTIFICATION INFORMATION, AND METHOD FOR AUTHENTICATING THE USER - The present disclosure relates to a method for registering an anonymous digital identity of a user with an identification information storage module in an environment including a user terminal, an account module, and the identification information storage module. The user terminal and the account module generate a first identification ID, a first token, a second random value, a second encryption value, a second value, and a first validation value through mutual communication. On the basis of the information, the identification information storage module generates a third hash value, a second token, an eighth value, and a second validation value through mutual communication with the user terminal. The account module validates the first token, the second hash value, and the first and second validation values, and registers the anonymous identity with the identification information storage module. | 2021-08-19 |
20210258142 | BLOCKCHAIN CONTROL METHOD - A privileged node holds a secret key (SKEY), and normal nodes each hold a public key (PKEY). The normal nodes each include a transaction inputting unit that receives transaction data (TDATA), a transaction transmitting unit that transmits the TDATA, a transaction managing unit that manages a transaction history in a form of blockchain, and a block receiving unit that receives blocks from the privileged node. The privileged node includes a transaction receiving unit that receives TDATA from each of the normal nodes, a block generating unit that generates a signature value (SIG) on the basis of a SKEY, and generates a block containing TDATA and the SIG, and a block transmitting unit that transmits blocks. The transaction managing unit adds a block to the blockchain on condition that the authenticity of the SIG in the block is confirmed by using the PKEY. | 2021-08-19 |
20210258143 | BLOCKCHAIN SMART CONTRACT-BASED TRANSACTION HASH ACQUISITION METHODS AND SYSTEMS - Methods, systems and apparatus, including computer programs encoded on computer storage media, for acquiring a blockchain smart contract-based transaction hash. In one example, the method includes: adding, to an instruction set of a blockchain virtual machine associated with a blockchain network, a transaction hash acquisition instruction; deploying, in the blockchain virtual machine, transaction hash acquisition logic corresponding to the transaction hash acquisition instruction; adding, to an instruction set of a smart contract compiler, the transaction hash acquisition instruction; generating, by using the smart contract compiler, a service smart contract that includes at least the transaction hash acquisition instruction; and deploying, in the blockchain network, the service smart contract that includes at least the transaction hash acquisition instruction. | 2021-08-19 |
20210258144 | SYSTEMS AND METHODS FOR MARKING AND AUTHENTICATING SCARCE ITEMS - A system and method for marking, validating ownership, proving authenticity, tracking provenance, and verifying scarcity of items utilizing cryptology. A unique Origination Hash is generated in accordance with specific characteristics unique to each item plus the Purchaser Identity and an Origination Secret provided by the User. A physical representation of the Origination Hash is produced and attached, embedded, or formed in a discrete location on an item. A Birth Certificate, including a HashPrint is generated from the Origination Hash and is written to the BITCOIN Blockchain to generate an immutable, time stamped record of the purchase of the specific item by the user. Access to a secure website allows for verification of user ownership, the authentication of items, the transfer of items, and an item's Status. | 2021-08-19 |
20210258145 | BLOCKCHAIN COMPRESSION USING SUMMARY AND PADDING BLOCKS - Technologies for compressing a blockchain. In some examples, the technologies include removing selected blocks within a blockchain, and replacing the selected blocks with a summary block and a padding block. Each block of the selected blocks includes data in a certain state (such as data in an obsolete state). The technologies can include generating the summary block and padding blocks according to the data in the selected blocks and an original root hash included in the selected blocks and other blocks of the blockchain. The generating of the summary and padding blocks can include generating a new root hash in the summary and padding blocks that only replaces the original root hash in the summary and padding blocks. The generation of the new root hash can be based on a part of a header of a non-selected block of the blockchain directly linked to an end block of selected blocks. | 2021-08-19 |
20210258146 | VERIFIABLE REDACTABLE AUDIT LOG - A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log. | 2021-08-19 |
20210258147 | Sharing Encrypted Documents Within and Outside an Organization - A method and system of creating and managing encryption keys that facilitates sharing of encrypted content. The system may include an information management system with a key management server and a computing device having an encryption service module. The encryption service module detects operations at the computing device and encrypts a document with an encryption key created using user information and a secret. | 2021-08-19 |
20210258148 | KEY MANAGEMENT METHOD, SECURITY CHIP, SERVICE SERVER AND INFORMATION SYSTEM - A key management method includes: sending, by a security chip of a computer device, a request for obtaining a service key to a key management service; receiving, by the security chip, a service key ciphertext from the key management service, wherein the service key ciphertext is obtained by encrypting the service key by the key management service based on a migration key of the security chip; decrypting, by the security chip, the service key ciphertext based on the migration key to obtain the service key; storing, by the security chip, the service key in the security chip; and providing, by the security chip, the service key to an application program of the computer device when the application program needs to encrypt data based on the service key. | 2021-08-19 |
20210258149 | DEVICE FOR SECRET SHARING-BASED MULTI-PARTY COMPUTATION - A device participates in secret sharing-based MPC. Original data can be restored by combining a share of the device with a corresponding share of another device. The device includes means for acquiring random number and means for updating a share of the device on the basis of the acquired random number. A method for updating by the updating means is designed to perform update in a manner that a share of the device updated on the basis of the acquired random number is combined with the corresponding share of the other device updated on the basis of the random number to cancel an influence of the random number and restore the original data. | 2021-08-19 |
20210258150 | USING BLOCKCHAIN TO TRACK INFORMATION FOR DEVICES ON A NETWORK - Efficiently and reliably tracking information for devices in a network, for example, a heterogeneous network of a plurality of devices of different types, includes collecting and storing information in a computationally efficient and secure manner that ensures to a high degree of certainty the integrity of the information for future access and use. The information may be collected from one or more sensors/data sources, for example, over a predetermined period of time, and may be grouped into a single transaction record. The transaction record may be sent from a gateway to a server of a network cloud, for example, during a predefined time slot of cycle based in part on the number of gateways and sensors in the system. Each transaction record may include a one-way hash of, and a reference to, an immediately preceding transaction record for the overall system for which information is being tracked. | 2021-08-19 |
20210258151 | DYNAMIC DATA ENCRYPTION - Actuators and sensors in an intelligent system are controlled by setting encryption types and key lengths to individual applications based on the type of device and application being run. A server system | 2021-08-19 |
20210258152 | COMMUNICATION NODE, METHOD OF OPERATING THEREOF AND COLLABORATIVE SYSTEM - The present invention relates to a communication node, a method of operating the same, and a collaborative system. In an example of the present invention, there may be provided an operation method of a first communication node (a transmission node) comprising: a step of confirming whether data is to be transmitted to the receiving side communication node by a transmitting side communication node among communication nodes connected to each other on the network; a step for generating first control information for verifying authentication and integrity of the data; a step for generating a first control information including information for authenticating and verifying integrity of the data to be transmitted by the transmitting side communication node; a step for sharing the first control information with at least one or more participating communication nodes including the receiving side communication node through a channel formed in a block chain network; and a step for transmitting a message including the data through a channel formed in a network different from the block chain network. | 2021-08-19 |
20210258153 | NETWORK-BASED DEVICE REGISTRATION FOR CONTENT DISTRIBUTION PLATFORMS - A device can receive, from a network device, information that identifies a user device. The network device might have authenticated the user device based on the user device accessing a radio access network. The device can receive, from the user device, a request for a first token. The request can include an encrypted session identifier. A server device might have encrypted the session identifier. The device can determine the session identifier, and generate the first token based on the session identifier and the information that identifies the user device. The device can encrypt the first token using an application public key, and provide, to the user device, the encrypted first token. The user device can provide, to the server device, the encrypted first token. The server device can register the user device to receive content based on the encrypted first token. | 2021-08-19 |
20210258154 | NODE GROUP MANAGING DEVICE AND COMPUTING DEVICE FOR CONFIGURING GROUP KEY-BASED DUAL SIGNATURE TRANSACTION STRUCTURE IN BLOCKCHAIN NETWORK - A node group management device includes a communication interface managing a first group, to which some nodes belong among nodes that constitute a blockchain network sharing a distributed database, a memory that stores information related to a node of the first group (including a public key of each node of the first group), and a processor connected to the memory. All nodes participating in the blockchain network each include a private key and a public key. The processor operates according to instructions stored in the memory and generates a group private key allowing a transaction to be additionally signed based on said information while the transaction is signed with the private key when the node of the first group generates the transaction and configured to distribute the group private key to the first group so that the nodes of the first group hold the group private key in common. | 2021-08-19 |
20210258155 | SYSTEM AND METHOD FOR PROVIDING CRYPTOGRAPHICALLY SECURED DIGITAL ASSETS - A method of provisioning or distributing a cryptographic digital asset and supervising a secondary transfer of the digital asset includes receiving a transaction confirmation indicative of a completed transaction of a product from a first party to a second party; determining or receiving a unique owner identification (ID) code or wallet address of the second party; recording or transmitting a request to record ownership of the cryptographic digital asset to the unique owner identification (ID) code or wallet address of the second party; receiving a request to transfer the cryptographic digital asset to a second unique owner identification (ID) code or second wallet address; and recording or transmitting a request to record ownership of the cryptographic digital asset to the second unique owner identification (ID) code or second wallet address. | 2021-08-19 |
20210258156 | METHOD FOR UPDATING A SECRET DATA IN A CREDENTIAL CONTAINER - The invention is a method for updating a first secret data in a credential container including a subscriber identity module. The credential container comprises a set of secret parameters customized for a network operator and is configured to execute a symmetric mutual authentication algorithm using said set. The credential container receives from a remote server a second secret data enciphered using a second algorithm different from said symmetric mutual authentication algorithm and a subset of said secret parameters, the credential container deciphers the enciphered second secret data by using both the subset and a third algorithm and replaces the first secret data with the second secret data. | 2021-08-19 |
20210258157 | SAFEGUARDING CRYPTOGRAPHIC KEYS FROM MODIFICATION OR DELETION - Aspects of the invention include generating a cryptographic key to restrict access to a resource. The cryptographic key being defined by a key token. An exemplary method includes designating a storage field in metadata of the key token, in metadata of a cryptographic key data set record that includes the key token, or in a resource access control database that controls use of the cryptographic key for inclusion of an indicator that the cryptographic key may or may not be deleted or modified. The indicator in the designated storage field is set to indicate whether or not the cryptographic key may be deleted or modified. | 2021-08-19 |
20210258158 | SYSTEM AND METHOD FOR SECURELY TRANSFERRING DATA USING GENERATED ENCRYPTION KEYS - According to one example, a system includes a second computing device that has one or more processors configured to receive encrypted data from a first computing device, the encrypted data being encrypted based on a first encryption key. The one or more processors are further configured to generate a second encryption key that matches the first encryption key, decrypt the encrypted data using the second encryption key, and transmit the data for use. | 2021-08-19 |
20210258159 | INCREMENTAL ASSESSMENT OF INTEGER DATASETS - The disclosure is related to a computer implemented method for assessing a dataset of integers, where the dataset previously is split into a plurality of subsets of the integers. In some embodiments, the integers are integer public keys for encryption or decryption. According to a first aspect, each subset in the dataset has a product data structure that is generated for the product of the integers in the subset. Each ordered pair of subsets has a remainder data structure for computing the factors of the integers in the subsets of the ordered pair. When one or more integers are to be added to the dataset, the disclosed method proposes that a subset is created to include the one or more integers be added. A product data structure is then generated for the created subset to obtain the product of the integer(s) in the created subset. Distinct ordered pairs of subsets comprising a subset from the dataset and the created subset are then identified. For each distinct ordered pair identified, using the product data structure of the subsets, a remainder data structure is computed for obtaining common factors of the integers in the subsets of the distinct ordered pair. It is then determined if the common factors obtained for the integers in the subsets of each distinct ordered pair satisfies a given threshold. If so, it is validated that at least the one or more integers in the created subset do not have a common factor with any other integer in the dataset and an output is generated accordingly. If not, it is inferred that at least one of the one or more integers in the created subset share a common factor with at least one other integer in the dataset and an output is generated accordingly. | 2021-08-19 |
20210258160 | ARTIFICIAL INTELLIGENCE CERTIFICATION OF FACTSHEETS USING BLOCKCHAIN - A method for blockchain certification of artificial intelligence factsheets that includes receiving by a computing device, an artificial intelligence model. The computing device generates an artificial intelligence factsheet based upon logic of the artificial intelligence model. The computing device generates a blockchain link for a blockchain. The blockchain link certifies the artificial intelligence factsheet. The computing device transmits the blockchain link certifying the artificial intelligence factsheet to other computing devices. | 2021-08-19 |
20210258161 | METHODS AND SYSTEMS FOR A DIGITAL TRUST ARCHITECTURE - In some aspects, methods and systems for a digital trust architecture are provided. In some aspects, the architecture includes a user account provisioning process. The provisioning process may make use of in person verifications of some personal information to ensure authenticity of the user information. Once the authenticity of user information is established, an account may be created. The user account may include a user email account, with integrated access to digital certificates linked to the user account. Account creation may also automatically publish the new user's public key in a publicly accessible directory, enabling encrypted email information to be easily sent to the new user. | 2021-08-19 |
20210258162 | METHODS FOR SECURE CRYPTOGRAM GENERATION - Embodiments of the invention introduce efficient methods for securely generating a cryptogram by a user device, and validating the cryptogram by a server computer. A secure communication can be conducted whereby a user device provides a cryptogram without requiring the user device to persistently store an encryption key or other sensitive data used to generate the cryptogram. The user device and server computer can mutually authenticate and establish a shared secret. Using the shared secret, the server computer can derive a session key and transmit key derivation parameters encrypted using the session key to the user device. The user device can derive the session key using the shared secret, decrypt the encrypted key derivation parameters, and store the key derivation parameters. Key derivation parameters and the shared secret can be used to generate a single use cryptogram key, which can be used to generate a cryptogram for conducting secure communications. | 2021-08-19 |
20210258163 | MANAGEMENT OF DEVICES JOINING A NETWORK - A method by a management node for managing a device operable to join a network includes receiving from the device a request to join the network, the request including a device specific parameter and a token, and generating an authentication parameter from the device specific parameters and the token. The method further includes authorising the device to join the network if the authentication parameter fulfils a validity criterion. Generating an authentication parameter from the device specific parameters and the token includes generating an input including the device specific parameters and the token, computing a cryptographic function of the generated input and setting an output of the cryptographic function as the authentication parameter. Also disclosed are a method for operating a device, a management node, a device and a computer program. | 2021-08-19 |
20210258164 | METHODS AND SYSTEMS FOR UNIVERSAL STORAGE AND ACCESS TO USER-OWNED CREDENTIALS FOR TRANS-INSTITUTIONAL DIGITAL AUTHENTICATION - Described is an approach for an improved method, system, and computer program product that performs zero-knowledge proof of knowledge of user identification and/or authentication for a decentralized, trustless storage and management of user identification and/or authentication using one or more distributed ledger systems. | 2021-08-19 |
20210258165 | ACCESS CONTROL SYSTEM WITH ONE-TIME PASSWORD USING ENCRYPTED QUICK RESPONSE CODE - Systems and methods for controlling access to a lock with one-time password using an encrypted quick response (QR) code. A method for retrieving a password embedded in a QR code by use of a mobile device includes: capturing and scanning an image of a QR code that is displayed on a lock and includes information of an identification (ID) of the lock and a password encrypted with an encryption key; extracting the ID of the lock and the encrypted password from the scanned image; sending a request for access of the lock, the request including the ID of the lock and an ID of the user of the mobile device; receiving an access notification that includes a decryption key; decrypting the encrypted password using the decryption key; and displaying the decrypted password on a display of the mobile device. The decrypted password is used to unlock the lock. | 2021-08-19 |
20210258166 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS - Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. These systems and methods may provide for the secure transmission of sensitive information, such personally-identifiable information. In some examples, the sensitive information may be requested and securely shared when cryptographically signed by the user, and the user may control the access of viewers to the personally identifiable information or end users. | 2021-08-19 |
20210258167 | SYSTEMS AND METHODS FOR PROVIDING A TRUSTED KEYSTORE - Systems and methods for providing a trusted keystore are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for providing a trusted keystore may include: (1) selecting and storing a root Key Block Protection Key (KBPK) in a trusted domain; (2) for each key class: creating a keyblock with a class KBPK; and storing the keyblock in an untrusted keystore in an unfrosted domain; (3) loading keyblocks to a trusted key manager in the trusted domain; (4) decrypting the keyblocks with an encryption class key; (5) verifying the keyblocks under a MAC class key; (6) loading class keyblocks to the trusted key manager from the untrusted keystore; (7) writing the keyblocks to the untrusted keystore; and (8) writing class keyblock MACs in a hierarchy to the untrusted keystore. The number of levels in the hierarchy is based on an amount of available storage in the trusted domain | 2021-08-19 |
20210258168 | DIGITAL FILE ANTI-FORGERY PROTECTION - The invention relates to securing of an original digital file against forgery and falsifying of its associated data, and particularly of data relating to its belonging to a specific batch of original digital files, while allowing offline or online checking of the authenticity of a secured digital file and conformity of its associated data with respect to that of a genuine original digital file. The invention is particularly useful for securing print-ready digital files. | 2021-08-19 |
20210258169 | SPLIT-KEY WALLET ACCESS BETWEEN BLOCKCHAINS - An approach is disclosed for running a first smart contract on a first blockchain platform restricting access to a client's funds appropriated to a second smart contract running on a second blockchain platform. A transaction is received by invoking the first smart contract authorizing the second smart contract. In response to receiving an indication of a successful completion of the first smart contract, a plurality of client's authorization tickets are sent to the second smart contract. The invoked smart contract receives the set of authorization information and records the set of authorization information. After receiving a set of authenticated authorization tickets exceeding a predetermined threshold, the funds are released. | 2021-08-19 |
20210258170 | SELF-AUTHENTICATING DIGITAL IDENTITY - A method of creating and applying a self-authenticating digital identity for a user having an identity is described. | 2021-08-19 |
20210258171 | OPTICALLY SCANNABLE REPRESENTATION OF A HARDWARD SECURED ARTIFACT - Methods and systems for device authentication based on generating and displaying an optically scannable visual representation of a public portion of a hardware secured encryption key (EK) are described herein. A client certificate is encrypted with the public portion of the EK based on a scan of the displayed visual representation. A connection may be established between a computing device and a server using the encrypted client certificate and a private portion of the EK to authenticate the computing device. In some implementations, a request is received from a second computing device to access a first computing device, and includes data encrypted using a public portion of an EK acquired from a displayed optically scannable visual representation of the public portion of the EK. The second computing device is provided access to the first computing device based on decryption of the encrypted data using a private portion of the EK. | 2021-08-19 |
20210258172 | METHOD FOR MONITORING DIGITAL CERTIFICATES - The present invention relates to a computer-implemented method for monitoring, registering, and validating digital certificates in a private computer network not connected to the Internet. | 2021-08-19 |
20210258173 | GAIN CELL MEMORY BASED PHYSICALLY UNCLONABLE FUNCTION - A method is presented for employing a physically unclonable function (PUF) structure for chip authentication. The method includes connecting a plurality of gain cells to either a first multiplexer or a second multiplexer and receiving outputs from the first and second multiplexers by a current sense amplifier. The plurality of gain cells can be either two-transistor gain cell memories or three-transistor gain cell memories. | 2021-08-19 |
20210258174 | SECURE CRYPTOPROCESSOR - According to an example aspect of the present invention, there is provided a cryptoprocessor comprising physical unclonable function circuitry comprising at least one physical unclonable function, and at least one processing core configured to process a challenge received from outside the cryptoprocessor by at least deriving a response to the challenge by providing the challenge as input to the physical unclonable function circuitry, using the response as an encryption key to encrypt a second encryption key, and by causing the encrypted second encryption key to be provided to a party which issued the challenge. | 2021-08-19 |
20210258175 | COMMUNICATION TERMINAL, SENSING DEVICE, AND SERVER - Among information regarding a sensing device (IoT device), only particular content (attribute information) is disclosed. A communication terminal includes a packet-signal reception unit, an attribute-information extraction unit, and an attribute-information transmission unit. The packet-signal reception unit receives a packet signal transmitted from a sensing device around the communication terminal. The attribute-information extraction unit extracts attribute information on the sensing device from the packet signal transmitted from the sensing device around the communication terminal. The attribute-information transmission unit transmits the attribute information that has been extracted to a server. | 2021-08-19 |
20210258176 | ROLLER-SHAPED ELECTRONIC STAMP - A roller-shaped electronic stamp comprising a plurality of protrusions arranged on a surface of a cylindrical rotational body that rotates around a shaft, wherein a pattern of contact points provided by the plurality of protrusions represents data, and wherein the data is transmitted to an electronic terminal by rolling the surface of the cylindrical rotational body on a touchscreen of the electronic terminal. | 2021-08-19 |
20210258177 | POWERED COMMUNICATION DEVICE - A powered communication device ( | 2021-08-19 |
20210258178 | REPLICATING BROADCAST, UNKNOWN-UNICAST, AND MULTICAST TRAFFIC IN OVERLAY LOGICAL NETWORKS BRIDGED WITH PHYSICAL NETWORKS - A novel method for performing replication of messages in a network that bridges one or more physical networks to an overlay logical network is provided. A physical gateway provides bridging between network nodes of a physical network and virtual machines in the overlay logical network by serving as an endpoint of the overlay logical network. The physical gateway does not replicate messages from the bridged physical network to destination endpoints in the overlay logical network directly, but instead tunnels the message-to-be-replicated to a designated tunnel endpoint in the overlay logical network. The designated tunnel endpoint in turn replicates the message that was tunneled to it to other endpoints in the overlay logical network. | 2021-08-19 |
20210258179 | DISTRIBUTING WORK IN A DISTRIBUTED VIDEO CONFERENCING SYSTEM BY USING A CONSISTENT HASH FUNCTION - The present invention includes a method and a system providing balancing of work items required to be completed as a whole over the available computing systems in a video conference node cluster, in addition to providing sufficient redundancy among conference nodes by means of consistent hash functions. | 2021-08-19 |
20210258180 | PREDICTING UTILIZATION OF A SHARED COLLABORATION RESOURCE - Presented herein are techniques and systems associated with generating a predicted utilization likelihood for a shared collaboration resource. Integrated resource data associated with a meeting scheduled for a shared collaboration resource is obtained and analyzed using a machine-learned predictive model. The analysis generates a predicted utilization likelihood of the shared resource. An indication of the predicted utilization likelihood is provided to an output system, such as a graphical user interface. | 2021-08-19 |
20210258181 | METHOD, SYSTEM, AND NON-TRANSITORY COMPUTER READABLE RECORD MEDIUM FOR MANAGING MESSAGES BASED ON CONTEXT - A message management method includes receiving, by at least one processor of a computer system, a share request for a message group that includes at least one message among messages in a chatroom; and forwarding, by the at least one processor, based on receiving the share request, information about the message group to a server which stores the information about the message group in association with the chatroom and shares the message group with users in the chatroom. | 2021-08-19 |
20210258182 | LOCALIZED MULTICAST IN A LOW POWER AND LOSSY NETWORK BASED ON RANK-BASED DISTANCE - In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value. | 2021-08-19 |
20210258183 | Broadband Remote Access Server (BRAS) System-Based Packet Encapsulation - A BRAS system-based packet encapsulation method includes obtaining user access information when receiving a user access protocol packet and performing VXLAN GPE encapsulation on the user access protocol packet based on the user access information. The encapsulation structure includes a user information header that is used to store the user access information, and a quantity of bytes occupied by the user information header is less than or equal to 12. In this application, the foregoing encapsulation structure is used to encapsulate a packet. | 2021-08-19 |
20210258184 | NETWORK LAYER CHANNEL BONDING - Implementations of the disclosure are directed to network layer channel bonding. In one implementation, a method comprises: operating a first communication device to transmit data to a second communication device over multiple communication links, each of the communication links associated with a respective communication medium; receiving, at the first communication device, an input data stream for transmission to the second communication device, the input data stream comprising packets; determining, at the first communication device, a throughput and latency of each of the communication links; based on the determined throughput and latency of each of the communication links: dividing the packets into multiple sets, each of the sets configured to be transmitted by the first communication device over a respective one of the communication links; and transmitting, from the first communication device to the second communication device, each of the sets of packets over the set's respective communication link. | 2021-08-19 |
20210258185 | DIFFERENTIAL BUS NETWORK - A differential bus network comprising: a bus comprising two bus wires; at least three nodes each comprising: a transceiver comprising: bus terminals for coupling, respectively, to the two wires of the bus; a receiver arrangement configured to receive differential signalling from the bus terminals and determine a digital receive signal based on said differential signalling; and a transmitter arrangement configured to apply differential signalling to the bus terminals based on a digital transmit signal, the transmitter arrangement comprising a first transmitter configured to increase the potential difference between the wires of the bus to a first differential voltage state and maintain the first differential state and a suppression element configured to decrease the potential difference between the two wires of the bus towards a second differential voltage state, the transmitter arrangement further comprising a resistor coupled between the bus terminals configured to at least maintain the second differential voltage state. | 2021-08-19 |
20210258186 | COMMUNICATION SYSTEM - A communication system, in which a plurality of nodes communicate with each other according to a communication protocol, which wakes up some of the plurality of nodes when a communication frame containing specific start information occurs on or is transmitted to the communication bus, includes a master node determines, for each of slave nodes, a start condition, which is a condition for transition of a subject node from a sleep state to a normal state. The master node transmits, to the communication bus, the determined start condition tailored for each of the slave nodes for a reception thereof by each of the slave nodes. | 2021-08-19 |
20210258187 | ELECTRONIC CONTROL DEVICE, ELECTRONIC CONTROL METHOD, AND RECORDING MEDIUM - An electronic control device is connected to at least one bus of a mobile object, and includes: a controller that controls behavior of the mobile object; an anomaly detector that performs detection to detect an anomaly in communication data which flows through the at least one bus and which includes identification information for identifying control details related to the behavior of the mobile object; and an obtainer that obtains at least one piece of identification information corresponding to a result of the detection. | 2021-08-19 |
20210258188 | COMMUNICATION SYSTEM - A communication path in a loop form is formed by trunk lines and a redundant communication path, which is formed by a switch and a backup line. In order to be applied to a bus-type communication network such as a CAN, the switch is normally off, and the backup line is disconnected from a path in a steady state. A disconnection detection unit is provided at each of joint connectors. When any disconnection detection unit detects disconnection, the switch is closed to enable use of the redundant path. Further, content of a routing map of a central gateway is automatically rewritten to preferentially select the redundant path that is not disconnected, and thus the path is changed. | 2021-08-19 |
20210258189 | COMMUNICATION SYSTEM - A plurality of zones is formed in a communication network on the vehicle, and a communication path in a loop form is formed in each zone by zone trunk lines and a backup line. The backup line is connected by a switch only at the time of disconnection so that the loop is not closed. At the time of disconnection detection, an instruction is automatically given to rewrite content of routing maps on zone ECUs and a central gateway. Since each node preferentially selects a communication path that bypasses a disconnection portion from the start of communication by rewriting the content of the routing maps, it is possible to avoid an increase in communication delay. An inter-zone backup line connecting a plurality of zones is provided to enable the use of a new path across the plurality of zones at the time of disconnection. | 2021-08-19 |
20210258190 | METHOD AND SYSTEM FOR VIRTUAL AND PHYSICAL NETWORK INTEGRATION - The disclosure herein describes a virtual extensible local area network (VXLAN) gateway. During operation, the VXLAN gateway receives, from a physical host, an Ethernet packet destined for a virtual machine residing in a remote layer- | 2021-08-19 |
20210258191 | Information Transmission Method and System, and Convergence Gateway - An information transmission method and system, and a convergence gateway, where the method includes receiving, by the convergence gateway, a service request from first user equipment, where the service request includes identity information of the first user equipment and service information of the first user equipment, obtaining, by the convergence gateway, first user permission information of the first user equipment in a first network according to the identity information of the first user equipment, and determining, by the convergence gateway based on the first user permission information, a forwarding manner for forwarding the service information to second user equipment. A convergence service for a private network and a public network is implemented using the convergence gateway such that indoor communication signal quality can be improved, and network construction costs can be reduced. | 2021-08-19 |
20210258192 | Gateway Device and System and Method for Use of Same - A gateway device and system and method for use of the same are disclosed. In one embodiment, multiple wireless transceivers are located within an in-wall housing, which also interconnectedly includes a processor, memory, various physical ports and wireless transceivers. To improve convenience, the gateway device may establish a pairing with a proximate wireless-enabled interactive programmable device. Virtual remote control functionality for various amenities may then be provided. To improve safety, the gateway device may be incorporated into a geolocation and safety network. | 2021-08-19 |
20210258193 | CHANNEL ESTIMATION METHOD AND APPARATUS, DEVICE, BASE STATION, AND STORAGE MEDIUM - The present application relates to the technical field of wireless communication and provides a channel estimation method and apparatus, a device, a base station, and a storage medium. The method is applied in a first device, and includes: when a first message is transmitted between the first device and a second device, determining a resource block (RB) bearing the first message; determining at least one pilot symbol in the RB according to a carrier frequency and a subcarrier spacing of subcarriers included in the RB, and a relative speed between the first device and the second device; and estimating a current channel based on the at least one pilot symbol. In embodiments of the present application, at least one pilot symbol is determined in the RB according to the carrier frequency, the subcarrier spacing, and the relative speed. The carrier frequency and the relative speed are considered; therefore, the set pilot symbol matches the carrier frequency and the relative speed, which improves the accuracy of determining the pilot symbol, thereby improving the accuracy of channel estimation. | 2021-08-19 |
20210258194 | TRANSMITTER HAVING MERGED FFE AND XTC, AND TRANSMISSION METHOD THEREOF - Provided is a transmitter performing at least feed-forward equalizing and crosstalk cancellation, the transmitter including: a main driver ( | 2021-08-19 |
20210258195 | DATA CARRIER APPARATUS, DATA CARRIER DRIVE APPARATUS, DATA COMMUNICATION SYSTEM, IMAGE FORMING APPARATUS AND REPLACEMENT UNIT FOR THE SAME - A system includes a data carrier drive apparatus and a data carrier apparatus. The data carrier apparatus includes: an unit configured to output transmission data during a first state and adjustment data during a second state; and a current changer configured to change a current value of a current flowing from the data carrier drive apparatus to the data carrier apparatus according to data values of the transmission data and the adjustment data. The data carrier drive apparatus includes: a detector configured to detect a detection value corresponding to the current value of the current; a determiner configured to determine the data value of the transmission data by comparing the detection value with a threshold value during the first state; and an updater configured to update the threshold value based on the detection value during the second state. | 2021-08-19 |
20210258196 | Transmitting Signals - In one example aspect, a method of transmitting signals is provided. The method comprises transmitting a first multi-carrier on-off keyed signal comprising a plurality of on periods and a plurality of off periods. Transmitting the first signal in each on period comprises, for each subcarrier of a plurality of subcarriers, transmitting, from each antenna of a plurality of antennas, a frequency domain symbol associated with that subcarrier phase shifted by a respective factor of a set of factors associated with that subcarrier, wherein the set of factors associated with that subcarrier is different from the set of factors associated with at least one other subcarrier of the plurality of subcarriers. | 2021-08-19 |
20210258197 | GENERATING SEQUENCES FOR REFERENCE SIGNALS - Methods, systems, and devices for generating sequences for reference signals in mobile communication technology are described. An exemplary method for wireless communication includes transmitting data, which is modulated using a pi/2-binary phase shift keying (BPSK) modulation, and a reference signal using a plurality of subcarriers, where the reference signal comprises a sequence from a subset of sequences that contains 30 sequences, each with a predetermined length, and where the subset of sequences include at least a first number of fixed sequences and a second number of selected sequences. The method further enables constructing the sequences, which have low peak-to-average power ratio (PAPR) properties, for sequence lengths N=6, 12, 18, 24 and 30. | 2021-08-19 |
20210258198 | WIRELESS COMMUNICATION METHOD AND DEVICE - Provided are wireless communication methods and devices. In one embodiment, a wireless communication method performed by a wireless communication device comprises: transmitting a data packet repeatedly in multiple subframes including at least one normal subframe and at least one special subframe to another wireless communication device, wherein the available resources in the special subframe are different from that in the normal subframe, the data packet includes multiple modulated symbols which are divided into multiple modulated-symbol sets, in each subframe, each OFDM symbol is mapped by one of the modulated-symbol sets, and in every subframe, the modulated symbols in the same modulated-symbol set are mapped onto REs in one OFDM symbol in a fixed order. In another embodiment, multiple repetitions of the data packet are transmitted in each subframe, and in each special subframe, different repetitions are mapped onto REs with cyclic shift. | 2021-08-19 |
20210258199 | SYSTEM DISCOVERY AND SIGNALING - An extensible communication system is described herein. The system includes a first module for receiving a root index value and for generating a constant amplitude zero auto-correlation sequence based on the root value. The system further includes a second module for receiving a seed value and for generating a Pseudo-Noise sequence based on the seed value. The system further includes a third module for modulating the constant amplitude zero auto-correlation sequence by the Pseudo-Noise sequence and for generating a complex sequence. The system further includes a fourth module for translating the complex sequence to a time domain sequence, wherein the fourth module applies a cyclic shift to the time domain sequence to obtain a shifted time domain sequence. | 2021-08-19 |
20210258200 | METHOD FOR TRANSMITTING OR RECEIVING PHASE TRACKING REFERENCE SIGNAL BETWEEN TERMINAL AND BASE STATION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS SUPPORTING SAME - Disclosed are a method for transmitting or receiving a phase tracking reference signal between a terminal and a base station in a wireless communication system and an apparatus supporting the method. According to one embodiment applicable to the present invention, on the basis of association between the PT-RS and greater of the two demodulation reference signal (DMRS) port indices under code division multiplexing in the time domain (CDM-T), a terminal and a base station determine a first resource for the PT-RS, and transmit and receive same by means of the first resource, wherein the first resource is located on the same subcarrier as a second resource, which is for a PT-RS associated with the smaller of the two DMRS port indices under CDM-T, but on a different symbol than the second resource. | 2021-08-19 |
20210258201 | 16-QUADRATURE AMPLITUDE MODULATION (16-QAM) DOWNLINK CONFIGURATION - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may enable selection of a modulation order (Q | 2021-08-19 |
20210258202 | TRANSMITTER AND RECEIVER COMMUNICATION APPARATUS FOR NON-COHERENT COMMUNICATION - The disclosure relates to a transmitting communication apparatus and a receiving communication apparatus of a non-coherent communication system. The transmitting communication apparatus is configured to communicate with the receiving communication apparatus via a communication channel. The transmitting communication apparatus comprises a processing circuitry configured to: map a sequence of data bits into a modulation symbol of a plurality of modulation symbols defined by a modulation constellation, wherein the modulation constellation is defined by a tiling of a Grassmannian manifold into a plurality of cells and a Cartesian product of a plurality of auxiliary constellations, wherein the Cartesian product of the plurality of auxiliary constellations is mapped onto each cell of the plurality of cells and each auxiliary constellation defines a plurality of auxiliary symbols. The processing circuitry is further configured to transmit a modulated signal based on the modulation symbol via the communication channel to the receiving communication apparatus. | 2021-08-19 |
20210258203 | MISSING ALERT HANDLING SYSTEM AND MISSING ALERT HANDLING METHOD - [Problem] To propose a highly accurate scheme for addressing lost alarms. | 2021-08-19 |
20210258204 | ON-VEHICLE COMMUNICATION SYSTEM - Switching hubs such as relay devices capable of path control are arranged at a plurality of branch positions respectively on a wire harness including a trunk line of a communication line. Each of the relay devices includes a failure detection part, a routing map, and a path control part. The trunk line of the communication line is formed to make it possible to use a plurality of types of paths selectively. When the failure detection part in any relay device detects a failure, an instruction of path change is given to another relay device therefrom. When any relay device receives an instruction of path change from another relay device, the routing maps in the relay device receiving the instruction are switched according to a failure occurrence portion. A VLAN is constructed on an Ethernet communication network, and logical assignment of the VLAN is controlled by a central gateway. | 2021-08-19 |
20210258205 | NETWORK MONITORING DEVICE AND NETWORK MONITORING METHOD - In order to quickly estimate an abnormal transponder at low cost, a network monitoring device acquires, when sensing a failure occurrence channel, route information of the failure occurrence channel. The network monitoring device generates an adjacent channel table in which an adjacent channel being close in wavelength to the failure occurrence channel is extracted, then generates an interference channel table in which an interference channel sharing a common route with the failure occurrence channel among the adjacent channels is extracted, and then performs weighting on the interference channel, based on closeness of wavelength to the failure occurrence channel, and generates an influence channel table in which a weight is given to the interference channel. The network monitoring device estimates, based on the influence channel table, a channel with a large weight to be a channel having a possibility of exerting a negative influence on the failure occurrence channel. | 2021-08-19 |
20210258206 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - A communication apparatus that can communicate with a public communication network by using an in-vehicle communication module permanently installed in a vehicle or one or more external communication modules not installed permanently in the vehicle. The communication apparatus includes: a memory unit configured to store a selection table recording a criterion for selecting a communication module to be used for the communication; and a control unit configured to evaluate a plurality of the communication modules and acquire an evaluation result; and to select a communication module to be used for communication according to the evaluation result and the selection table. | 2021-08-19 |
20210258207 | ELECTRONIC APPARATUS, METHOD OF CONTROLLING SETTING DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM - A setting device for performing a network configuration of an electronic apparatus is provided with a touch panel, a communication device, and a processing device described below. To the touch panel, there is input information in accordance with an operation by a user. The communication device communicates with a wireless communication tag which stores certification information to be used for certification when performing a network configuration of the electronic apparatus, and which is provided to the electronic apparatus. The processing device obtains certification information received by the communication device to judge whether or not the certification information obtained and certification information input to the touch panel match each other, and transmits configuration information input to the touch panel as information representing the network configuration to the wireless communication tag to make the wireless communication tag store the configuration information when it is judged that the both parties match each other. | 2021-08-19 |
20210258208 | Fast Provisioning in Cloud Computing Environments - In one embodiment, a system includes a computing device providing a computing environment including a number of user accounts, where each of the user accounts is assigned specified privileges to execute particular commands or programs, receiving a request to temporarily escalate privileges for one of the user accounts during a specified duration, where the request includes an identifier of the user account, requested privileges, and the specified duration, granting the requested privileges for the specified duration in conjunction with specific restrictions on one or more prohibited activities that are normally permitted for user accounts with the requested privileges, monitoring, 1 0 during the specified duration, for any indication that the user account has attempted a prohibited activity, detecting an indication that the user account attempted one of the prohibited activities, and initiating an automated remediation corresponding to the indication. | 2021-08-19 |
20210258209 | User Defined Objects for Network Devices - Provided are systems and methods for configuring a network servicing node with user-defined instruction scripts. A method for configuring a network servicing node with user-defined instruction scripts may commence with receiving, from a user of the network servicing node, a user loadable program. The user loadable program may include at least the user-defined instruction scripts. The method may continue with receiving a data packet from a data network associated with the user. The method may further include determining a condition associated with the data packet. The method may continue with identifying, in a name table, a program name associated with a program using the condition. The program may be the user loadable program. The method may further include processing the data packet by getting an instruction of the user-defined instruction scripts from a storage module and applying the instruction to the data packet. | 2021-08-19 |
20210258210 | DATA DRIVEN USER INTERFACE FOR CONFIGURING DEVICE SETTINGS - Examples described here include systems and methods for configuring device settings for a number of user devices across an enterprise. A management server can provide a user interface at an administrator console for creating a profile and identifying an associated device type. The management server can then retrieve a schema file associated with the device type. Based on information in the schema file, the management server can populate the user interface at the administrator console with available configuration options pertaining to the device type. An administrator can configure the options and send instructions to the management server to deploy the profile across the number of user devices. The management server can instruct each user device to download a device configuration application from an application repository and transmit the settings information to an agent application of the user device that has permission to configure the device configuration application. | 2021-08-19 |
20210258211 | INTERNET OF THINGS GATEWAY ONBOARDING - Disclosed are various examples for gateway onboarding for IoT device management. In one embodiment, management service data is received. The management service data includes an enterprise identifier, and a management service address that specifies a network endpoint of the management service. A gateway is registered in association with the management service data based on receiving a registration request comprising: a gateway identifier, and the enterprise identifier. An activation request with the gateway identifier is received from the gateway, and the management service data is provided to the gateway. | 2021-08-19 |
20210258212 | DISTRIBUTION OF CONTENT IN CLOUD APPLICATIONS - Systems and methods of a configuration distribution microservice include reception of a first data structure comprising first configuration data of a first type and associated with a first tenant of a first microservice, determination of one or more other microservices associated with the first tenant and the first type of configuration data, and transmission of an instruction to the determined one or more other microservices to deploy the first configuration data. | 2021-08-19 |
20210258213 | WEARABLE ELECTRONIC DEVICE, MAIN ELECTRONIC DEVICE, SYSTEM AND CONTROL METHOD THEREOF - A wearable electronic device includes: an input module configured to receive a user manipulation for changing a configuration setting value of a main electronic device; and a communication module configured to transmit a control signal for changing a configuration setting value to the main electronic device. | 2021-08-19 |
20210258214 | NETWORK NODE - A network node is a first network node of a communication system including a user device and a plurality of network nodes, the network node including a reception unit that receives an inter-node message relating to a configuration of the user device from a second network node; a determination unit that determines whether a manner of updating the configuration of the user device is a full configuration or a delta configuration based on the inter-node message; and an updating unit that updates the configuration of the user device with the full configuration or the delta configuration based on the determination. | 2021-08-19 |
20210258215 | WIRELESS CONNECTION VALIDATION TECHNIQUES - In general, techniques are described for remotely monitoring, controlling, and/or adjusting configuration settings related to network access points located within a rental property. In some implementations, rental data that indicates a property that has been rented for a specified rental period is received. Sensor data collected by one or more sensors of the property during the specified rental period is obtained. A current occupancy of the property during the specified rental period is determined from the sensor data. Network data indicating network activity over a network access point of the property is obtained during the specified rental period. The network access point is configured during the specified rental period based at least on the network activity indicated by the network data and the current occupancy determined for the property from the sensor data. | 2021-08-19 |
20210258216 | SEAMLESS MULTI-CLOUD ROUTING AND POLICY INTERCONNECTIVITY - Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space. | 2021-08-19 |
20210258217 | DYNAMIC MANAGEMENT OF APPLICATION SERVERS ON NETWORK EDGE COMPUTING DEVICE - Embodiments of the present disclosure relate to a method, apparatus, device and computer readable storage media for management of application servers network edge computing device and a method, apparatus, device and computer readable storage media for performing management operation related to application servers network edge computing device. In example embodiments, at a management function module, a calling function deployment command is transmitted to a network edge computing device to deploy a calling function instance thereon, the calling function instance being configured to connect with application servers for respective applications and handle communications between terminal devices and the application server A management command for application servers on the network edge computing device is transmitted to at least one of the network edge computing device and the calling function instance, in response to a network condition meeting one of predetermined management policies. In this way, the strict latency requirement of particular applications can be met and resources can be utilized efficiently. | 2021-08-19 |
20210258218 | COMMUNICATION DEVICE AND COMMUNICATION METHOD - A communication device is disclosed including a communication unit configured to receive a message including an SCG configuration, wherein the communication unit transmits a message, which does not include the SCG configuration, to another communication device and causes the another communication device to perform full configuration. In other aspects, another communication device and a communication method are also disclosed. | 2021-08-19 |
20210258219 | MIGRATION OF EXISTING COMPUTING SYSTEMS TO CLOUD COMPUTING SITES OR VIRTUAL MACHINES - Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination virtual machine. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination virtual machine is determined based at least in part on the configuration of the source physical computing device. The destination virtual machine is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device. | 2021-08-19 |
20210258220 | CONFIGURATION OF DEVICE THROUGH MICROPHONE PORT - In one aspect, a device includes at least one processor, a touch-enabled display accessible to the at least one processor, and storage accessible to the at least one processor. The storage includes instructions executable by the at least one processor to detect a hover of a body part of a user or other physical object above the touch-enabled display, where the hover does not include the physical object physically touching the touch-enabled display. The instructions are also executable to identify a graphical object underneath the hover and to cache data associated with the graphical object prior to the graphical object being selected based on the physical object physically touching the touch-enabled display. | 2021-08-19 |
20210258221 | SYSTEMS AND METHODS FOR DESIGNING A SLICE INFRASTRUCTURE - A device associated with a network may receive a service profile for a network slice of the network, where the service profile includes one or more service characterizations of the network slice. The device may determine, based on thresholding rules and for each service characterization, whether the service characterization requires selection from a plurality of building blocks, to obtain a group of service characterizations requiring selection. The device may select, based on selection rules and for each service characterization of the group of service characterizations requiring selection, a building block from the plurality of building blocks, to obtain selected building blocks, where the selection rules map attributes of service characterizations to building blocks. The device may stack, based on stacking rules, the selected building blocks, to obtain a slice infrastructure for the network slice. The device may deploy the slice infrastructure for the network slice in the network. | 2021-08-19 |
20210258222 | TECHNIQUES FOR DYNAMIC NETWORK MANAGEMENT - Various embodiments are generally directed to techniques for dynamic network management, such as by monitoring and analyzing network parameters, such as network traffic and network configurations, to enable visualization of network state and improved situational awareness. Some embodiments are particularly directed to providing a graphical user interface (GUI) that utilizes various network parameters to map, characterize, and/or assign attributes to network traffic and resources. In many embodiments, network traffic may be monitored and/or routed based on their attributes. | 2021-08-19 |
20210258223 | TECHNIQUES FOR SUPPORTING MULTICAST BROADCAST CHANNEL BANDWIDTHS - Aspects described herein relate to determining a multicast broadcast (MB) bandwidth size for receiving an MB service, the MB bandwidth being different than each bandwidth size in the set of multiple configurable bandwidth sizes for receiving unicast services. | 2021-08-19 |
20210258224 | APPARATUS AND METHOD FOR TRANSMITTING ASSISTANCE INFORMATION IN A WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system or networks beyond 5G communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology. A method of a User Equipment (UE) in a wireless communication system, the method comprising: receiving, from a base station, configuration information on reporting assistance information associated with an overheating; detecting the overheating; and transmitting, to the base station, the assistance information including first information for controlling a bandwidth associated with at least one of a first frequency range or a second frequency range based on UE's preference, wherein a first frequency corresponding to the first frequency range is smaller than a second frequency corresponding to the second frequency range. | 2021-08-19 |
20210258225 | Frequency-Based Sorting Algorithm for Feature Sparse NLP Datasets - A managed infrastructure is provided. Systems, and associated methods, use frequency-based sorting logic relative to feature spare NLP datasets. | 2021-08-19 |
20210258226 | METHODS AND SYSTEMS FOR NEIGHBOR-ACKNOWLEDGED GRACEFUL INSERTION/REMOVAL PROTOCOL - Presented herein are systems, and methods thereof, that is configured to enter a maintenance mode to isolate itself from its neighbor and to gracefully cause neighbor devices to isolate themselves from the system, as to cause minimal or “zero” service disruption with its neighbors. The system broadcasts a maintenance-related message, via a standard transport layer, over routing protocols, to counter parts protocols at the neighbor device and waits for an acknowledgement message from the neighbor network devices. The broadcast and acknowledgement, through standard transport layer messaging, ensures that traffic generated by such protocols at the neighbor devices, regardless of manufacturer, are redirected before the system fully enters into the maintenance mode. | 2021-08-19 |
20210258227 | TOPOLOGY AND EVENT MONITORING SYSTEM - A method for locating performance problems in a network comprising associating one or more metadata to a plurality of monitored objects, collecting performance data from the plurality monitored objects to create a correlation of the performance data across two or more monitored objects matching predetermined set of metadata. Displaying said correlation on a map representing a plurality of devices, wherein said correlation can be used to isolate one or more devices impacting said performance data. | 2021-08-19 |
20210258228 | METHOD AND APPARATUS FOR PERFORMING DYNAMIC STATISTICAL PERIOD ADJUSTMENT REGARDING RATE ADAPTION - A method and apparatus for performing dynamic statistical period adjustment regarding rate adaption (RA) are provided. The method includes: collecting respective transmission results of multiple data packets to perform parallel processing, where the parallel processing includes statistical period control and RA control. The statistical period control includes: determining whether a first loop index reaches a monitored period threshold; performing first transmitting (TX) information statistics; calculating variance of TX information statistics results; and selectively adjusting a statistical period threshold. The RA control includes: determining whether a second loop index reaches the statistical period threshold; performing second TX information statistics; and performing the RA. The statistical period control may dynamically adjust the statistical period of the RA control, to enhance transmission efficiency of the wireless communications device. | 2021-08-19 |
20210258229 | ADAPTABLE REAL-TIME COMMUNICATIONS PLUGIN FOR VIRTUAL DESKTOP INFRASTRUCTURE SOLUTIONS - A plugin works with a remote desktop client that is executing on a client computing device to present a user interface of a communications application that is executing in a cloud computing environment. The plugin enables the remote desktop client to conduct audio and/or video communication with a remote computing device in a peer-to-peer manner rather than via the communications application. The plugin also enables the remote desktop client to determine a hardware-based media processing capability of the client computing device and leverage such capability in conducting the peer-to-peer audio and/or video communication with the remote computing device. Such hardware-based media processing capability may be used, for example, to process media received from the remote computing device, to process media captured from a media source of the client computing device, or as a basis for negotiating a media communication parameter with the remote computing device. | 2021-08-19 |
20210258230 | SYSTEMS AND METHODS FOR PATTERN-BASED QUALITY OF SERVICE (QOS) VIOLATION PREDICTION - Disclosed herein are systems and methods for pattern-based QoS violation prediction. In one exemplary aspect, a method may comprise identifying a service on a computing device that is connected to a plurality of client devices and determining a plurality of micro-services comprised in the identified service. The method may comprise parsing access information to detect that a first client device is accessing a micro-service. The method may comprise determining, for a first period of time, QoS evaluation parameters for the access between the micro-service and the first client device. The method may comprise identifying changes in the QoS evaluation parameters within the first period of time, detecting a predetermined QoS violation pattern, and executing a QoS action based on the predetermined QoS violation pattern. | 2021-08-19 |
20210258231 | METHOD AND SYSTEM FOR SELECTION AND ORCHESTRATION OF MULTI-ACCESS EDGE COMPUTING RESOURCES - Systems and methods described herein direct an end device to a multi-access edge computing (MEC) service instance among MEC instances with different service levels for different geographic areas. A network device stores a map of a geographic area with unique identifiable regions (UIRs) that each include cells for different wireless stations of a transport network. The network device receives application parameters, for a designated coverage area, for an application to be serviced using MEC resources. The network device associates the designated coverage area with one or more target UIRs from the map and deploys, when the MEC resources are available to support the application parameters, an instance of the application at a MEC cluster. The deployed instance of the application meets the application parameters for the target UIRs. The network device updates a MEC-domain name service (DNS) for the deployed instance of the application at the MEC cluster. | 2021-08-19 |
20210258232 | VARYING DATA FLOW AGGREGATION PERIOD RELATIVE TO DATA VALUE - In one example, the present disclosure describes a device, computer-readable medium, and method for varying the aggregation periods for data flows relative to the values of the data contained in the flows. For instance, in one example, a method includes intercepting a first flow and a second flow traversing a communications network, assigning a first value to the first flow and a second value to the second flow, wherein the first value is higher than the second value, aggregating the first flow into a first database record according to a first aggregation period, aggregating the second flow into a second database record according to a second aggregation period that is longer than the first aggregation period, and storing the first database record and the second database record in a database. | 2021-08-19 |
20210258233 | HIGHLY SCALABLE DISTRIBUTED CONNECTION INTERFACE FOR DATA CAPTURE FROM MULTIPLE NETWORK SERVICE SOURCES - A highly scalable distributed connection interface for data capture from multiple network service sources, comprising a connector module wherein, the connector module retrieves a plurality of operational data from a plurality of network data sources; employs a plurality of application programming interface routines to communicate with the plurality of operational data sources; | 2021-08-19 |
20210258234 | METHOD AND SYSTEM FOR DETERMINING NETWORK CONGESTION LEVEL AND SYNCHRONIZING CLOCK USING PRECISION TIME PROTOCOL - The disclosure relates to method and system for determining network congestion level. The method includes determining a round trip time (RTT) for each high priority and for each low priority packet transaction in the precision time protocol (PTP) protocol. The high priority and the low priority packet transactions are conducted between a master device and a slave device within a pre-defined time window. The method further includes determining an average high priority RTT and an average low priority RTT based on the RTT for each high priority packet transaction and for each low priority packet transaction respectively, computing an average delta RTT based on a difference between the average high priority RTT and the average low priority RTT, and determining an instantaneous network congestion level based on the average delta RTT and a reference delta RTT for a number of pre-defined time windows since a start of the slave device. | 2021-08-19 |
20210258235 | REINFORCEMENT LEARNING FOR JITTER BUFFER CONTROL - Disclosed in some examples are methods, systems, and machine-readable mediums which determine jitter buffer delay by inputting jitter buffer and currently observed network status information to a machine learned model that is trained using a reinforcement learning (RL) method. The model maps these inputs to an action to compress, stretch, or hold the jitter buffer delay, which is used by a recipient computing device to optimize the jitter buffer delay. The model may be trained using a simulator that uses network traces of past real streaming sessions (e.g., communication sessions) of users. By training the model through reinforcement learning, the model learns to make better decisions through reinforcement in the form of reward signals that reflect the performance of each decision. | 2021-08-19 |
20210258236 | SYSTEMS AND METHODS FOR SOCIAL GRAPH DATA ANALYTICS TO DETERMINE CONNECTIVITY WITHIN A COMMUNITY - Systems and methods for social graph data analytics to determine the connectivity between nodes within a community are provided. A user may assign user connectivity values to other members of the community, or connectivity values may be automatically assigned from third parties or based on the frequency of interactions between members. Connectivity values may represent such factors as alignment, reputation, status, and/or influence within a social graph of a network community, or the degree of trust. The paths connecting a first node to a second node may be retrieved, and social graph data analytics may be performed on the retrieved paths. Network connectivity values and/or other social graph data may be outputted to third-party processes and services for use in initiating automatic transactions or making automated network-based or real-world decisions. | 2021-08-19 |
20210258237 | METHOD AND DEVICE FOR DETERMINING A FIRST PARAMETER CHARACTERIZING A PACKET ERROR RATE - Method for determining a first parameter characterizing a packet error rate of a wireless packet-based data transmission in a radiocommunication system, comprising the following steps: determining a second parameter characterizing a bit error rate, BER, based on at least one operating parameter of the radiocommunication system, determining the first parameter based on the second parameter and a third parameter which characterizes a number of bits per data packet. | 2021-08-19 |
20210258238 | DATA CENTER TROUBLESHOOTING MECHANISM - A system to facilitate troubleshooting a hardware device in a network switching fabric is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a message from a hardware device indicating that a problem has been detected at the device, perform a troubleshooting operation to determine the problem at the hardware device and generate a report including the results of the troubleshooting operation. | 2021-08-19 |