34th week of 2018 patent applcation highlights part 65 |
Patent application number | Title | Published |
20180241554 | CONFIGURABLE CRYPTO HARDWARE ENGINE - Apparatuses and methods associated with configurable crypto hardware engine are disclosed herein. In embodiments, an apparatus for signing or verifying a message may comprise: a hardware hashing computation block to perform hashing computations; a hardware hash chain computation block to perform successive hash chain computations; a hardware private key generator to generate private keys; and a hardware public key generator to generate public keys, including signature generations and signature verifications. The hardware hashing computation block, the hardware hash chain computation block, the hardware private key generator, and the hardware public key generator may be coupled to each other and selectively cooperate with each other to perform private key generation, public key generation, signature generation or signature verification at different points in time. Other embodiments may be disclosed or claimed. | 2018-08-23 |
20180241555 | LOW POWER WIDE AREA MODULE PERFORMING ENCRYPTED COMMUNICATIONS AND METHOD THEREOF - A low power wide area (LPWA) apparatus includes an LPWA module configured to perform first encrypted communications using a gateway and a session key, generate a secret key to perform a second encrypted communications with an application device, transmit the secret key encrypted using a public key to the application device, and transmit encrypted data based on the secret key to the application device and receive data from the application device. | 2018-08-23 |
20180241556 | SYSTEM AND METHOD FOR CONTENT PROTECTION BASED ON A COMBINATION OF A USER PIN AND A DEVICE SPECIFIC IDENTIFIER - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encryption key, and encrypting each class encryption key with an additional encryption key. Further disclosed are systems, methods, and non-transitory computer-readable storage media for encrypting a credential key chain. The method includes encrypting each credential on a computing device with a unique credential encryption key, encrypting each unique credential encryption key with a corresponding credential class encryption key, and encrypting each class encryption key with an additional encryption key. Additionally, a method of generating a cryptographic key based on a user-entered password and a device-specific identifier secret utilizing an encryption algorithm is disclosed. | 2018-08-23 |
20180241557 | CRYPTOGRAPHIC DEVICE HAVING PHYSICAL UNCLONABLE FUNCTION - Some embodiments are directed to an electronic cryptographic device arranged to determine a cryptographic key. The cryptographic device can include a physically unclonable function (PUF) arranged to produce a first noisy bit string during the enrollment phase and a second noisy bit string during the reconstruction phase, and a statistical unit arranged to execute a statistical test for verifying correct functioning of the physical unclonable function. The statistical test computes a statistical parameter for the physical unclonable function using helper data. The statistical test determines correct functioning if the statistical parameter satisfies a criterion of the statistical test. | 2018-08-23 |
20180241558 | 1:N BIOMETRIC AUTHENTICATION, ENCRYPTION, SIGNATURE SYSTEM - A biometric authentication system has a terminal which extracts and encodes feature data for authentication from acquired biometric information, and which transmits the encoded feature data for authentication. The system has a DB for storing encrypted authentication information, a search unit which searches for encrypted authentication information included in the DB, and a decryption unit which decrypts the encrypted authentication information searched for using encoded feature data for authentication as a decryption key. Accordingly, a user is uniquely identified using the obtained authentication information. Further, a processing unit performs authentication response processing with respect to the identified user, based on authentication information obtained by decryption. Thus, authentication is implemented without limiting user and terminal combinations, without reconfiguring a service server, and without requiring a user to enter an ID or present a card at the terminal, when a user utilizes existing services from one or plural terminals. | 2018-08-23 |
20180241559 | SEMICONDUCTOR DEVICE AND INFORMATION PROCESSING SYSTEM FOR ENCRYPTED COMMUNICATION - In a semiconductor device and an information processing system according to one embodiment, an external device generates external device unique information by using a unique code which is a value unique to the semiconductor device, and generates second information by encrypting the first information with the use of the external device unique information. The semiconductor device stores the second information and generates the principal device unique information independently of the external device, with the use of the unique code of the semiconductor device holding the second information, and decrypts the second information with the use of the principal device unique information to obtain the first information. | 2018-08-23 |
20180241560 | DEVICE ATTESTATION - Example implementations relate to attestation. For example, in an implementation, a target device attestation request is transmitted to a target device, where the target device attestation request includes an identity-based encryption (IBE) ciphertext and a retrieval index. The ciphertext is a nonce encrypted using a trusted platform module (TPM) public key together with an IBE public key. The TPM public key is retrieved from a TPM of the target device, and the IBE public key is an expected value presumed to be stored at the TPM. | 2018-08-23 |
20180241561 | REPLICATED ENCRYPTED DATA MANAGEMENT - Disclosed aspects relate to local encryption of a set of replicated data in a shared pool of configurable computing resources which has a set of member nodes. A first local encryption key for the first node of the set of member nodes may be determined. The first local encryption key for the first node of the set of member nodes may be generated. A second local encryption key for the second node of the set of member nodes may be determined. The second local encryption key may differ from the first local encryption key. The second local encryption key for the second node of the set of member nodes may be generated. A temporary key for utilization by both the first and second nodes may be generated. The set of replicated data may be updated using the first local encryption key, the temporary key, and the second local encryption key. | 2018-08-23 |
20180241562 | WIRELESS DEVICE AND METHOD FOR REKEYING WITH REDUCED PACKET LOSS FOR HIGH-THROUGHPUT WIRELESS COMMUNICATIONS - Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In sonic embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key. | 2018-08-23 |
20180241563 | IMAGE FINGERPRINTING - A computing system includes a memory ( | 2018-08-23 |
20180241564 | PAIRING OF DEVICES FOR FAR-FIELD WIRELESS COMMUNICATION - In one example, a method includes transitioning, responsive to determining that a charging coil of wireless charger is in proximity of an implantable medical device (IMD) and by the IMD, from operating in a non-pairing mode into a pairing mode of a far-field wireless communication protocol. In this example, operating in the paring mode comprises: receiving, by the IMD and via a transceiver of the far-field wireless communication protocol, a public encryption key from another device that is different than the wireless charger; and determining, based on the public encryption key of the other device and a public encryption key of the IMD, a link encryption key for future communication between the IMD and the other device. In this example, the method further includes communicating, by the IMD and based on the link encryption key, with the other device via the far-field wireless communication protocol. | 2018-08-23 |
20180241565 | Secret Sharing via Blockchains - Confidential, secret data may be shared via one or more blockchains. Mortgage applications, medical records, financial records, and other electronic documents often contain social security numbers, names, addresses, account information, and other personal data. A secret sharing algorithm is applied to any secret data to generate shares. The shares may then be integrated or written to one or more blockchains for distribution. | 2018-08-23 |
20180241566 | CRYPTOGRAPHIC HASH GENERATION SYSTEM - A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function. Further modules iteratively, corresponding to the number of blocks, apply the produced function to calculated monoid elements and the second monoid elements to produce a hash of the string. | 2018-08-23 |
20180241567 | SYSTEMS AND METHODS FOR PROTECTING DIGITAL MEDIA - Disclosed are systems, apparatus, and methods for protecting digital media. An exemplary method includes receiving digital media, encrypting the digital media using an encrypted file format to generate an encrypted file, displaying a context menu when the encrypted file is accessed, the context menu including a licensing screen, enabling a user to obtain a license to the digital media using the licensing screen of the context menu, and configuring the encrypted file to enable access to the digital media based on a term of the license. | 2018-08-23 |
20180241568 | VERIFICATION OF CODE SIGNATURE WITH FLEXIBLE CONSTRAINTS - Systems, apparatuses, and methods for signing, and verifying the signature of, code to be executed by a target device. An example method of determining a verification hash of a code image to be executed by a target device comprises receiving a header and code image, determining an image hash based on metadata and the code image, determining a fuses hash based on values of hardware fuses of the target device, determining an information hash based on information stored in memory, determining a verification hash based on the image hash, the fuses hash, and the information hash, verifying the verification hash against a code signature in the header, obtaining an unlock constant based on the verification hash, comparing the unlock constant with a stored predetermined value to unlock a memory region of the target device, and executing the code in the code image on the target device. | 2018-08-23 |
20180241569 | STORING, MIGRATING, AND CONTROLLING ACCESS TO ELECTRONIC DOCUMENTS DURING ELECTRONIC DOCUMENT SIGNING PROCESSES - Systems and techniques are disclosed that enable an electronic document signature service to ensure that it stores electronic documents on servers within particular geographic boundaries by tracking and verifying the geographic locations of the servers. The service uses data received from the servers that identifies the geographic locations of the servers. The service also verifies the geographic locations of the servers based on network information associated with the sending of the data. One exemplary technique involves receiving data that includes geographic location identifiers that identify the geographic locations of the servers. The technique further involves verifying the geographic locations of the servers based on geographic locations associated with Internet Protocol (IP) addresses of network locations from which the data was sent. The geographic locations of the servers are then used to identify an appropriate and/or best performing server to store an electronic document during an electronic document signing process. | 2018-08-23 |
20180241570 | SECURITY AUTHENTICATION METHOD, CONFIGURATION METHOD, AND RELATED DEVICE - The present invention provides a security authentication method, a configuration method, and a related device. A first terminal receives a public key for signature of a configuration device sent by the configuration device. The first terminal receives second signature information and second type information. The first terminal determines, according to at least the second type information and the second signature information, that the first terminal is to generate key information. In this way, the first terminal establishes a security connection between the first terminal and the second terminal. This effectively prevents a terminal from tampering with its role, and therefore effectively prevents a terminal from establishing a connection to an attacker terminal with a changed role, thereby further preventing the attacker terminal from obtaining information of the terminal, to effectively ensure security of the terminal. | 2018-08-23 |
20180241571 | SERVICE PROCESSING METHOD, DEVICE AND SYSTEM - The present disclosure relates to a service processing method, a service processing device and a service processing system, which belong to computer technologies. The method includes: a service execution request is transmitted to a service server; a verification notification carrying signature information is received from the service server; currently inputted biometric feature information is verified through a Trusted Execution Environment (TEE) system, when biometric feature information is consistent with pre-stored reference biometric feature information, a signature processing is performed on signature information, by using a pre-stored service private key, first to-be-verified signature information is obtained; and a verification request carrying first to-be-verified signature information is transmitted to the service server. By adopting the present disclosure, security may be enhanced. | 2018-08-23 |
20180241572 | TECHNIQUES FOR REMOTE SGX ENCLAVE AUTHENTICATION - Techniques for remote SGX enclave authentication are described. An attestation service may be used to attest that an enclave was successfully established on a Software Guard Extensions (SGX) enabled platform. Further, an attestation service may, in embodiments, be used as a notary system to attest that a public-key certificate was generated by a particular SGX enclave and, therefore, may be trusted by other remote enclaves for authentication. In an embodiment, a client-side SGX enclave may generate a public-private key pair (SK, PK), compute a cryptographic hash H of PK, create a report R containing H, obtain a quote Q on the report R from a quoting enclave component, obtain remote attestation response RA from an attestation service, and broadcast RA and PK to one or more server side SGX enclaves. Other embodiments are described and claimed. | 2018-08-23 |
20180241573 | Hardware Blockchain Corrective Consensus Operating Procedure Enforcement - A system may provide hardware acceleration for corrective blockchain-based record entry. Blockchain management circuitry (BMC) may receive a correction to a record entry. The BMC may access a consensus operating procedure. The BMC may apply the consensus operating procedure to the record entry to determine a corrective indicator. After completing the consensus operating procedure, the BMC may append a corrective block generated based on the record entry and corrective indicator to the blockchain. Accordingly, the system may ensure that corrective blocks added to the blockchain were generated in compliance with the consensus operating procedure. | 2018-08-23 |
20180241574 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus generates a public key pair in accordance with a certificate issuance request, generates a certificate signing request based on the public key pair and transmits an electronic certificate issuance request to an external apparatus. The information processing apparatus receives a response transmitted from the external apparatus as a response to the electronic certificate issuance request, obtains an electronic certificate included in the received response and causes an application to enable its use of the obtained electronic certificate. | 2018-08-23 |
20180241575 | Mobile Message Source Authentication - A control circuit receives from a mobile receiver a request for a certificate for a particular sourcing entity and responsively transmits to that mobile receiver a corresponding certificate. The certificate includes an entity logo that corresponds to a particular message sourcing entity and decryption information. The mobile receiver can employ the decryption information to decrypt an encrypted authenticated entity digital signature to thereby authenticate that a mobile message that included the signature was sourced by a particular sourcing entity and to also display the entity logo in conjunction with presenting the message sourced by the sourcing entity to thereby provide visual confirmation that the sourcing entity is indeed an authenticated source of the message. Presentation of the entity logo can be in combination with an additional graphic feature that specifically and uniquely represents and communicates that confirmed authentication (i.e., that the displayed logo in fact corresponds to the entity that sourced the message). | 2018-08-23 |
20180241576 | PHOTON-BASED CA AUTHENTICATION METHOD AND SYSTEM - The present application provides a photon-based CA authentication method, including: receiving, by a photon-based CA authentication terminal, an optical signal from a photon terminal, where the optical signal includes a user ID; verifying the user ID included in the optical signal; and providing, in response to successful user ID verification, a user certificate to a client to perform CA certificate authentication. | 2018-08-23 |
20180241577 | Proximity-Based Security - In one embodiment, a first computing device may establish a spatial gap, wherein the spatial gap is defined by a maximum distance from the first computing device for computing devices requesting validation of credentials. The first computing device may then exchange with a second computing device, data transmissions to execute a handshake protocol, wherein the first computing device transmits communication signals at a specified signal strength, and wherein the specified signal strength is configured based on the maximum distance. The first computing device may then determine that the second computing device remained within the spatial gap throughout the handshake protocol, and then grant access to the second computing device. | 2018-08-23 |
20180241578 | SMART BYPASS DIODE BRIDGE RECTIFIERS - Example implementations relate to smart bypass diode bridge rectifiers. For example, a device can include a power over Ethernet input. In some examples, the device can include a plurality of smart bypass diodes connected to the power over Ethernet input to form a bridge rectifier. In some examples, the device can also include a powered device connected to the bridge rectifier. | 2018-08-23 |
20180241579 | POWER SUPPLY SYSTEM, POWER SOURCING EQUIPMENT, AND ETHERNET Y CABLE - A power sourcing equipment is provided. The power sourcing equipment is connected to an Ethernet cable. The power sourcing equipment includes a switching circuit, a power circuit, and a detection circuit. The power circuit is coupled to a power supply output terminal via the switching circuit. The detection circuit is configured to control a state of the switching circuit according to a first resistance between a first pin and a second pin of the Ethernet cable. | 2018-08-23 |
20180241580 | METHOD AND APPARATUS FOR SPONTANEOUSLY INITIATING REAL-TIME INTERACTIVE GROUPS ON NETWORK - A method and apparatus are disclosed for spontaneously initiating real-time interactive groups on the network executed on a host. In one embodiment, the method includes at least one initiator terminal sending a theme message of chat invitation. The method further includes sending said theme message of chat invitation to at least one potential participant terminal. The method also includes said at least one potential participant terminal accepting said theme message of chat invitation to become at least one participant terminal, and to form an interactive group, wherein said interactive group includes said at least one initiator terminal and said at least one participant terminal. | 2018-08-23 |
20180241581 | DOG ALERT MOBILE APPLICATION - Implementations of a dog alert system are provided. In some implementations, a computer-implemented method comprises receiving information at a first computing device regarding a loose dog wherein the information includes a unique identification number for a loose dog wherein the information is transmitted over a network from a second computing device. In some implementations, the computer-implemented method further comprises retrieving at the first computing device information from storage based on the unique identification number wherein the retrieved information includes an address of a dog. In some implementations, the computer-implemented method further comprises transmitting at the first computing device an alert of a loose dog over a network to a plurality of computing devices based on the address of the dog, pre-stored locations of the plurality of computing devices, and a predefined range. | 2018-08-23 |
20180241582 | CONTROL SYSTEM, OPERATION DETERMINING APPARATUS, DEVICE, CONTROL METHOD, AND CONTROL PROGRAM - A storage unit (M | 2018-08-23 |
20180241583 | ETHERNET BUS, CONTROLLER AND METHOD FOR WAKING A CONTROLLER OF AN ETHERNET BUS - An Ethernet bus having at least two controllers, wherein the controllers each have a bus driver and a microprocessor, wherein at least the first controller has a voltage regulator that adjusts at least two voltage values for the operating voltage of the controller, wherein a first voltage value is provided for a sleep-operating state and the second voltage value is provided for a communication-operating state, wherein the bus drivers are each connected via at least two bus lines, each having a termination network connected to them, wherein the termination network has at least two resistors and a capacitor, wherein the two resistors are provided with one bus line each and are connected to one another at a center tap of the termination network, wherein the capacitor of the termination network is arranged between center tap and earth. Also disclosed is a method for waking a controller. | 2018-08-23 |
20180241584 | MEANS AND METHODS FOR REGULATING CAN COMMUNICATION - The present invention extends to methods, systems, devices, for manipulating operation of at least one electronic control unit (ECU) connected to a controller area network (CAN) bus, at least one said ECU comprising at least one error counter, by counting errors associated with at least one said ECU; and generating and broadcasting via said CAN at least one bit stream destined to at least one said ECU, thereby manipulating at least one said ECU status, determined by said ECU error counter and querying for its status state. | 2018-08-23 |
20180241585 | COMMUNICATIONS NETWORK, METHOD FOR OPERATING SAME, AND PARTICIPANTS IN A COMMUNICATIONS NETWORK - A communications network comprises a plurality of participants. A first participant transmits a message repeating sequence of N≥2 successive messages to a second participant. An action which can be performed by the second participant is assigned to each message in the sequence. The first participant begins to transmit one of the N messages at N successive transmission times T_I (I=0, . . . , N−1). Each of the N messages contains a field defining a waiting time assigned to the respective message | 2018-08-23 |
20180241586 | Path Detection Method in VxLAN, Controller, and Network Device - A path detection method in a virtual extensible local area network (VxLAN), a controller, and a network device, where the controller constructs a detection packet according to a detection request and sends the detection packet to a source network device corresponding to a source VxLAN tunnel endpoint (VTEP). The source network device forwards, level by level, the detection packet to a destination network device corresponding to a destination VTEP, and reports information such as an Internet Protocol (IP) address, an outbound interface number, and an inbound interface number to the controller level by level. Therefore, a real service path may be detected. | 2018-08-23 |
20180241587 | INTEGRATING AND CONTROLLING MULTIPLE LOAD CONTROL SYSTEMS - Systems and methods are disclosed for using one or more gateway systems for integrating multiple load control systems running multiple versions of software such that the load control systems may appear to a user and be controlled by the user as a unified load control system. Gateways that manage or have managed the same resource may be organized into a Gateway Group. Gateway Groups names may be used for prefix attachment to facilitate routing. For example, a Composite Gateway may receive a request associated with a resource from a user. The Composite Gateway may determine which Gateway actively manages that resource and/or is the Gateway is a member of a Gateway Group. The composite Gateway may then apply one or more policies to facilitate the request. For example, if the Composite Gateway receives an information request, it may apply an authorization policy, a routing policy, and/or an aggregation policy. | 2018-08-23 |
20180241588 | RADIO BASE STATION, USER TERMINAL AND RADIO COMMUNICATION METHOD - The present invention is designed to allow co-presence with other systems, and, furthermore, achieve improved spectral efficiency in cells (for example, unlicensed bands) in which pre-transmission listening is employed. The present invention provides a transmission section that transmits a channel state information measurement reference signal, and a control section that controls the transmission of the channel state information measurement reference signal by employing listening, and the control section controls the channel state information measurement reference signal to be transmitted without being multiplexed with data and/or a control signal, and controls configuration information of the channel state information measurement reference signal that is transmitted without being multiplexed with data and/or a control signal to be transmitted. | 2018-08-23 |
20180241589 | MULTIDROP DATA TRANSFER - Multi-drop communications channels can have significantly deep notches in their frequency response causing a corresponding limitation of the effective data transmission rate. A special time-ordered coding method is described which results in the emitted spectrum of the data stream transmitted into the channel having a notch at the same frequency as the notch in the channel frequency response, permitting channel receivers to successfully decode the transmitted data stream. The described coding method may be applied at various multiples of the channel notch frequency to support different throughput rates, and may be combined with other coding techniques such as group or vector signaling codes. | 2018-08-23 |
20180241590 | Method and Apparatus for Equalizing Signals - pa A system and apparatus are disclosed for a method and apparatus for equalizing signals. An apparatus that incorporates teachings of the present disclosure may include, for example, an equalizer having a channel estimation calculator for calculating a time domain channel estimation from a baseband signal, a Fast Fourier Transform processor for translating the time domain channel estimation to a frequency domain channel estimation, a tap weight calculator for calculating a frequency domain tap weight according to the frequency domain channel estimation, an inverse Fast Fourier Transform processor for translating the frequency domain tap weight calculation to a time domain tap weight calculation, and a filter for equalizing the baseband signal according to the time domain tap weight calculation. | 2018-08-23 |
20180241591 | TREE SEARCH-BASED DECODING - A method, device, and a computer program are provided to decode a signal received through a transmission channel in a communication system, the received signal being represented by a signal vector. The method comprises:
| 2018-08-23 |
20180241592 | DECISION FEEDBACK EQUALIZER AND INTERCONNECT CIRCUIT - There is provided a decision feedback equalizer including a comparison circuit configured to compare a value indicated as 2 | 2018-08-23 |
20180241593 | METHODS AND APPARATUS FOR TRANSMISSION AND RECEPTION WITH PARTIAL ALLOCATION IN ORTHOGONAL FREQUENCY DIVISION MULTIPLE ACCESS/SINGLE-CARRIER FREQUENCY DIVISION MULTIPLE ACCESS SYSTEMS - Techniques and apparatus for transmission and reception with partial allocation in orthogonal frequency division multiple access (OFDMA)/single-carrier frequency division multiple access (SC-FDMA) systems are provided. One technique includes determining first parameter(s) to apply to transmission/receive processing of a signal, based in part on a resource allocation for the signal. The resource allocation is partitioned out of a larger system bandwidth. Second parameter(s) to apply to the transmission/receive processing are determined based at least in part on the first parameter(s). Transmission/receive processing of the signal is performed in accordance with the first and second parameters. | 2018-08-23 |
20180241594 | Selective Power Amplifier - A transmitter comprising a power amplifier, a phase modulator, a switched DC-DC converter, all operating in dual mode, and a controller is disclosed. The power amplifier is arranged to selectively operate either in a first mode or in a second mode, wherein the first mode is a linear mode and the second mode is a non-linear mode in order to save power with least increasing cost in hardware. The transmitter is adapted to operate at different allocated bandwidths, for different radio standards while keeping minimum power consumption governed by the controller. A transceiver, a communication device, a method and a computer program are also disclosed. | 2018-08-23 |
20180241595 | MINIATURE WIRELESS COMMUNICATION SYSTEM - A wireless microphone with the remote transmitter using a duplicate of the radio frequency determining circuits of the radio receiver to insure that the remote transmitter frequency tracks the temperature drift of the radio receiver frequency, and also with a compressor to reduce the dynamic range of the sounds captured by the microphone. The superheterodyne radio receiver having small size and low current consumption by wiring the elements of the receiver in series rather than in parallel with the battery avoiding the use of switching regulators and also by using the same amplifier to amplify the antenna signal and the local oscillator signal and by adjusting the local oscillator current based on the strength of the received radio signal. The wires between the radio receiver and the speaker are part of the antenna for the radio receiver. | 2018-08-23 |
20180241596 | METHOD AND APPARATUS FOR SPECTRUM SPREADING OF A PULSE-DENSITY MODULATED WAVEFORM - Methods and systems are provided for spreading spectral density of digital-to-analog conversion output signals. A spreading circuit may spread a digital-to-analog converter (DAC) output signal over a particular frequency spectrum, with the spreading circuit receiving the DAC output signal; generating a plurality of internal control signals; and generating based on the DAC output signal and the one or more internal control signal a corresponding spread output signal. The Internal control signals may comprise at least a first control signal, generated based on sequences meeting at least one particular criterion, a second control signal, generated based on a feedback corresponding to an intermediate output generated within the spreading circuit. The spreading circuit may generate the first control signal based on zero-sum sequences. The spreading circuit may generate a stream of pulses based on the intermediate output, and may generate the feedback signal based on the stream of pulses. | 2018-08-23 |
20180241597 | METHOD FOR TRANSMITTING SIGNALS IN DCM MODE IN WIRELESS LAN SYSTEM, AND DEVICE FOR SAME - Disclosed according to one embodiment of the present invention is a method whereby a first station (STA) transmits signals using dual carrier modulation (DCM) in a wireless LAN system, comprising: modulating HE-SIG B field information and/or data field information on a wireless frame transmitted by the first STA and transmitting same to a second STA, wherein in the case of modulating the HE-SIG B field information and/or the data field information in a BPSK mode, if a random symbol C | 2018-08-23 |
20180241598 | SYSTEM AND METHOD FOR COMMUNICATING WRITE STREAM DATA SYMBOLS - A radio transmitter includes a data source, and write stream circuitry coupled to the data source. When a write stream mode is enabled and when there is valid write stream data available from the data source, the write stream circuitry is configured to transmit one or more write stream data symbols to a receiver. When there is no valid write stream data available from the data source, one or more idle symbols are transmitted to the receiver. Each of the idle symbols is randomly selected from a set of at least two idle symbols. | 2018-08-23 |
20180241599 | RECEIVING APPARATUS AND DECODING METHOD THEREOF - A receiving apparatus includes: a first decoder configured to decode a signal transmitted through a first layer from a layered division multiplexing (LDM) signal using a parity check matrix to generate low density parity check (LDPC) information word bits and parity bits; an encoder configured to encode the LDPC information word bits, generated by decoding the signal transmitted through the first layer, using the parity check matrix to generate parity bits corresponding only to preset columns in the parity check matrix; and a second decoder configured to decode a signal obtained by removing, from the LDM signal, a signal corresponding to the LDPC information word bits generated by decoding the signal transmitted through the first layer, the parity bits generated by the encoder, and the parity bits generated by the first decoder except the parity bits generated by the encoder, thereby to generate information word bits transmitted through a second layer. | 2018-08-23 |
20180241600 | Time Domain In Continuous DFT-S-OFDM for Sidelobes Reduction - Goal of the application is providing an alternative to the N-continuous algorithm in frequency domain for sidelobes reduction (OOB) suitable for SC-FDMA. A part of the time domain symbols is used as correction signal to ensure continuity of the signal and its derivatives at symbol boundaries, ie between previous symbol and guard interval (can be Zero Padding or Cyclic Pre-fix) of current symbol. Said time domain symbols are then FFT precoded, windowed, followed by IFFT and Guard Interval insertion. Also applied to FBMC. | 2018-08-23 |
20180241601 | Apparatus and Method for Transmitting and Receiving of Cyclic Shift Parameter for Supporting Orthogonality in MIMO Environment - A method includes: determining a Cyclic Shift (CS) parameter that implicitly indicates an orthogonality allocation rule and orthogonality-related information, by determining a multiple access state of a User Equipment (UE), and transmitting the determined CS parameter to the UE, wherein the orthogonality-related information includes an Orthogonal Cover Code indicated by the CS parameter, the orthogonality allocation rule is determined as a uniform scheme or a non-uniform scheme according to the CS parameter, determining the CS parameter by which the non-uniform scheme is applied if the UE is in a Single User Multiple Input Multiple Output state, and determining the CS parameter by which the uniform scheme is applied if the UE is in a Multiple User Multiple Input Multiple Output state. | 2018-08-23 |
20180241602 | DISCOVERY REFERENCE SIGNAL DESIGN FOR LTE IN UNLICENSED BANDS - DRS signaling are described herein in which the DRS transmissions may be used in a Long Term Evolution (LTE)-Licensed Assisted Access (LAA) Secondary Cell that is subject to Listen Before Talk (LBT). In some implementations, the DRS transmission may include continuous symbol transmission in order to ensure that other nearby nodes, such as WiFi nodes, do not begin to transmit on the channel. | 2018-08-23 |
20180241603 | METHOD FOR TRANSMITTING A REFERENCE SIGNAL HAVING A LOW PEAK TO AVERAGE POWER RATIO - Aspects of the description provide a method and devices to allow frequency domain spectral shaping (FDSS) to be used on both a reference sequence and data to enable low PAPR. Being able to use FDSS on both the reference sequence and data allows the FDSS to be transparent to the receiver. The method comprises obtaining a first sequence, wherein the first sequence is a base sequence of a set of base sequences, the set of base sequences comprising sub group base sequences, the first sequence obtained by cyclically repeating the sub group sequences at least once; and transmitting, by the device, a reference signal based on the first sequence. | 2018-08-23 |
20180241604 | APPARATUSES, SYSTEMS, AND METHODS FOR COMMUNICATING USING MIMO AND SPREAD SPECTRUM CODING IN BACKSCATTER OF AMBIENT SIGNALS - Apparatuses, systems, ambient RF backscatter transceivers, and methods for communicating using MIMO and spread spectrum coding of backscattered ambient RF signals are described. An example system may include an ambient RF backscatter transceiver that include an antenna configured to receive a backscattered ambient radio frequency (RF) signal, and a receiver coupled to the antenna. The receiver may be configured to demodulate the backscattered ambient RF signal using one of multiple input, multiple output multiplexing demodulation or spread spectrum code demodulation to retrieve the first data. The backscattered ambient RF signal may be generated by backscattering an ambient RF signal at a first frequency. The ambient RF signal may be configured to provide other data at a second frequency. | 2018-08-23 |
20180241605 | USAGE OF SYNCHRONIZATION SIGNAL BLOCK INDEX IN NEW RADIO - Based on at least a portion of an SS block index, a UE may scramble information and a base station may descramble the scrambled information. Specifically, a UE may determine an SS block index associated with an SS block for reception. The UE may scramble information based on at least a portion of the determined SS block index. The information may include at least one of data, control information, or a CRC associated with control information. The UE may transmit the scrambled information to a base station. A base station may receive, from the UE, information scrambled based on at least a portion of an SS block index. The scrambled information may include at least one of data or control information. The base station may descramble the scrambled information based on the at least the portion of the SS block index. | 2018-08-23 |
20180241606 | CIRCUIT, METHOD, AND RECEIVER APPARATUS FOR PERFORMING ON-THE-FLY IQ MISMATCH COMPENSATION - A method employed by a circuit included within a receiver apparatus and configured for performing IQ mismatch compensation when receiver apparatus is operating under data reception mode includes: transforming a data signal, which is generated by a radio frequency receiver under the data reception mode, from time domain into a plurality of frequency bin signals in frequency domain; calculating to obtain at least one frequency domain calibration parameter according to the plurality of frequency bin signals in frequency domain; and, updating at least one coefficient parameter of IQ mismatch compensation according to the obtained at least one frequency domain calibration parameter, to make IQ mismatch compensation compensate IQ mismatch based on the updated at least one coefficient parameter. | 2018-08-23 |
20180241607 | Telephone With A Universal Phone Number - A universal phone number service and method of providing a universal phone number service that allows a user to receive phone calls on any phone service with a single phone number. A telephone is disclosed that is associated with more than one phone number and a universal phone number, wherein any phone call placed to the universal phone number results in the call being completed to the telephone regardless of the service associated with the more than one phone number. | 2018-08-23 |
20180241608 | FORWARDING ETHERNET PACKETS - Forwarding Ethernet packets is disclosed, including: receiving an incoming packet; determining a value based at least in part on performing a hash operation on at least a portion of a destination Internet Protocol (IP) address included in the incoming packet; comparing the value against a pre-established look-up table to determine whether a corresponding index value is found, wherein the pre-established look-up table stores index values and corresponding data sets to respective ones of the index values; determining a destination media access control (MAC) address associated with the incoming packet based at least in part on whether the corresponding index value is found in the pre-established look-up table; and forwarding the incoming packet to a virtual machine associated with the determined destination MAC address. | 2018-08-23 |
20180241609 | REMOTE CASTING OF MEDIA CONTENT - In a desktop virtualization environment, a server-side agent can be employed on the server to function as a cast device. Applications executing on a remote desktop will therefore see the agent as a cast device and can direct cast requests to the agent. When the agent receives a cast request, it can forward the cast request to a client-side proxy. The proxy can then transmit the cast request to an actual cast device that is part of the same subnet as the client. In this way, an application executing on the server will be able to seamlessly cast content to a cast device that is not part of the same subnet. | 2018-08-23 |
20180241610 | PORT MIRRORING IN A VIRTUALIZED COMPUTING ENVIRONMENT - Example methods are provided for a network management entity to implement port mirroring in a virtualized computing environment. The method may comprise configuring a port mirroring session between a source virtual port and a destination virtual port. A source host may be configured using source session information and a destination host configured using destination session information such that packets passing through the source virtual port are mirrored and sent from the source host to the destination host. The method may also comprise: in response to detecting a status associated with the source virtual port, or the destination virtual port, that requires a reconfiguration of the port mirroring session, generating and send a first instruction to update the source session information at the source host, or a second instruction to update the destination session information at the destination host, or both. | 2018-08-23 |
20180241611 | SYSTEM AND METHOD FOR QUICKLY DETERMINING REASONABLE ALARM THRESHOLD OF NETWORK - The present invention provides a system and method for quickly determining a reasonable alarm threshold of a network, including: a presentation component for setting the template type and template parameter of an alarm simulation template, a working component for generating an alarm simulation task according to the alarm simulation template, a task component for executing the alarm simulation task to generate a data result set, and a storage component for storing and providing the data result set for the presentation component. The present invention adopts the asynchronous calculation, and adopts fragment manner during data statistics; the time period is divided into time slices and processed in parallel, and then aggregated, to improve the data processing rate; the similar alarm points are merged, thereby accurately obtaining the actual number of alarms and presenting in an incremental mode. | 2018-08-23 |
20180241612 | DIGITAL VIDEO SYSTEM USING NETWORKED CAMERAS - A computer system for deleting an archived stream. The computer system includes a computer having non-transitory memory for storing machine instructions that are to be executed by the computer. The machine instructions when executed by the computer implement the following functions: receiving a mode of archived stream deletion; receiving a deletion cutoff date and time; and deleting the archived stream based on the mode of archived stream deletion and the deletion cutoff date and time. | 2018-08-23 |
20180241613 | ADAPTIVE RECOVERY FROM NODE FAILURES IN A NETWORK SYSTEM - The present invention relates to a method and an apparatus for failure recovery in a network system, wherein a linked list is created, where each network node knows the network address of its neighbor node in at least one direction, wherein each network node sends a beacon to its neighbor node and has its neighbor node acknowledge receipt of the beacon, and wherein a network node checks with a switch device the port status of a port to which a neighbor node that has failed is connected in order to identify a replacement node. | 2018-08-23 |
20180241614 | TIME SLOT DETERMINATION - In one example in accordance with the present disclosure, a priority is determined for each element in a plurality of elements connected to a network. The plurality of elements may include a source element, a destination element and a first element selected for downtime. A reliability index is determined for each element in the plurality of elements and a plurality of alternate paths between the source element and destination element are determined, each alternate path including a corresponding plurality of elements. For each alternate path in the plurality, a total utilization of the corresponding plurality of elements of the alternate path may be determined for each of a plurality of time slots and a best time slot to be used as a time period for the downtime of the first element may be determined based on the total utilizations. | 2018-08-23 |
20180241615 | SYSTEM AND METHOD TO FACILITATE NETWORK ELEMENT FAILURE DETECTION AND SESSION RESTORATION IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and may include maintaining, by a Diameter Routing Agent (DRA), an availability status for a plurality of network elements; receiving a request associated with a user equipment (UE) session, wherein a first network element of the plurality of network elements is serving the UE session; determining that the first network element serving the UE session is unavailable; and re-establishing the UE session at a second network element of the plurality of network elements that is available, wherein the re-establishing is performed without terminating the UE session. | 2018-08-23 |
20180241616 | ENDPOINT ABSTRACTION FOR SERVICE-TO-SERVICE COMMUNICATION - The described technology is generally directed towards an abstraction and file model used for subscriber service and publisher service communication. The abstraction and file model enables dynamically changing the underlying communication mechanisms and introducing optimizations such as caching (reducing latency) and batching (improving bandwidth utilization) transparently, without any change to the subscriber or publisher code. The abstraction also facilitates introducing intermediate lightweight message-oriented middleware and provides for transparently scaling communication. | 2018-08-23 |
20180241617 | SYSTEM UPGRADE MANAGEMENT IN DISTRIBUTED COMPUTING SYSTEMS - Embodiments of system upgrade management in a cloud computing system are disclosed therein. In one embodiment, a computing device is configured to transmit, to a server in the cloud computing system, data representing an available upgrade applicable to a component of the server on which a virtual machine is executed to provide a corresponding cloud computing service to a tenant. The computing device is also configured to receive, from the server, a message containing a preferred time by the tenant to apply the available upgrade to the component of the server and in response to receiving the message, determine a time for applying the available upgrade to the component of the server in view of the preferred time by the tenant included in the received message and instruct the server to apply the upgrade to the component of the server according to the determined time. | 2018-08-23 |
20180241618 | HITLESS UPGRADE FOR NETWORK CONTROL APPLICATIONS - A method for upgrading a set of controller nodes in a controller cluster that manages a plurality of forwarding elements in a way that minimizes dataplane outages. The method of some embodiments upgrades the control applications of a subset of the controller nodes before upgrading a decisive controller node. Once the decisive controller node is upgraded, the method switches the controller cluster to use a new version of the control applications. | 2018-08-23 |
20180241619 | INTERFACE FOR A CLOUD RADIO ACCESS NETWORK - Various communication systems may benefit from improved communications for a cloud radio access network. For example, certain communication systems may benefit from an improved S1 interface that connects a network entity to front ends in a cloud radio access network. A method, in certain embodiments, may include receiving at least one setup message at a network entity from a plurality of front ends. Multiple connections may be established between the network entity and the plurality of front ends. The method may also include choosing at least one of the multiple connections to transmit another message to one of the plurality of front ends which map back to a common set of at least one radio access points, network nodes, or cells, and transmitting the another message through the chosen one of the multiple connections to the common set of at least one radio access points, network nodes, or cells. | 2018-08-23 |
20180241620 | WIRELESS NETWORK ENVIRONMENT CONFIGURATION SYSTEM AND METHOD THEREOF - A wireless network environment configuration system and method thereof are disclosed. A network device receives the network environment configuration from a master access point (AP) when the network device is in AP mode and the master AP exists; and the network device scans the wireless network to obtain a wireless network report when the master AP does not exist, and the network device calculates channels that are appropriate for all network device according to the wireless network report so as to generate the network environment configuration to transmit to all network devices in AP mode; and the network device connects with other network device in AP mode and having the network environment configuration to receive and store the network environment configuration when the network device in STA mode and the network environment configuration does not exist. Thus, the system and method thereof can improve convenience in setting wireless network. | 2018-08-23 |
20180241621 | FORWARDING UNIT AND CONTROLLER UNIT FOR SDN - A forwarding unit for a SDN system is provided, the forwarding unit being configured to forward data packets and comprising a memory module for storing at least one forwarding rule and a forwarding rule managing module, wherein the forwarding rule managing module is configured to activate the at least one forwarding rule according to a preset time condition and wherein the preset time condition comprises at least two activation times of the at least one forwarding rule and wherein the forwarding rule managing module is configured to activate the at least one forwarding rule at any one of the at least two activation times. | 2018-08-23 |
20180241622 | LOGICAL L3 PROCESSING FOR L2 HARDWARE SWITCHES - A method for configuring a managed forwarding element (MFE) to perform logical routing operations in a logical network on behalf of a hardware switch is described. The method of some embodiments receives data that defines a logical router that logically connects several different end machines operating on several different host machines to different physical machines that are connected to the hardware switch. The method, based on the received data, defines a number of routing components for the logical router. In some embodiments, the method then configures the MFE to implement the routing components in order to enable the MFE to perform logical routing operations on behalf of the hardware switch. | 2018-08-23 |
20180241623 | DISTRIBUTED PROCESSING SYSTEM, DATA PROCESSING METHOD, AND CONTROL NODE DEVICE - System and methods for distributed processing are provided. The distributed processing system may include a control node, a first computing node, and a second computing node. The control node may obtain a type and a characteristic identifier of to-be-processed characteristic data. The type may be used to identify a home computing node to process to-be-processed characteristic data. The home computing node may be an identified one of the first computing node or the second computing node. The control node may determine process index information based on the characteristic identifier. The control node may schedule data index information corresponding to the to-be-processed characteristic data to a processing process on the home computing node according to the process index information. The data index information may be used for instructing the home computing node to obtain the to-be-processed characteristic data so that the home computing node may processes the to-be-processed characteristic data. | 2018-08-23 |
20180241624 | VIRTUAL DEDICATED NETWORK AND RULE TABLE GENERATION METHOD AND APPARATUS, AND ROUTING METHOD - A method and an apparatus of generating rule tables for a virtual dedicated network, and a routing method are disclosed. The method includes determining virtual switches which act as switching nodes in a virtual dedicated network based on topological structure information of the virtual dedicated network; and using network identifiers of the virtual switches as keywords to configure and generate rule tables of the virtual dedicated network, the rule tables including at least the keywords which act as addresses of the switching nodes in the rule tables. The embodiments of the present disclosure can greatly reduce the number of table items in a rule table in a virtual dedicated network, and reduce the number of table items of transfer nodes and an amount of data of management and control nodes, thus effectively improving the system performance. | 2018-08-23 |
20180241625 | Apparatus and Method for Seamless Commissioning of Wireless Devices - An electronic device includes a first processor; a first commissioning element to communicate with external devices using wireless communication and a first memory storing programs for commissioning a target device onto a communication network. The communication network has configuration data including a network identifier and a network key. The programs provide a user interface for commissioning the target device. The target device includes a second processor, a second wireless radio, and a second commissioning element to receive the network configuration data. The target device decodes the network configuration data to commission the target device onto the communication network. The electronic device sends the network configuration data to the target device and receives confirmation that the target device has successfully connected to the communication network. The electronic device displays the success in a user interface. | 2018-08-23 |
20180241626 | HealthCheck Access Point - A method for enabling configuration at a base station may be provided by reading configuration information for a configuration wireless network at a cellular base station with Wi-Fi capability, where the configuration information may include a known Wi-Fi service set identifier (SSID). The method may further require synchronizing the configuration information with a coordination server and periodically scanning for the known Wi-Fi SSID in a non-access point (AP) mode. Additionally, the method may further require authenticating, at the coordination server, another device acting as an access point (AP) using RADIUS authentication and connecting to the known Wi-Fi SSID generated by the another device, the another device receiving the known Wi-Fi SSID from the coordination server. The method further includes establishing a secure network protocol connection between the base station and the another device for performing operational configuration of the base station, and authenticating the another device at the coordination server. | 2018-08-23 |
20180241627 | CONTAINERIZED SOFTWARE ARCHITECTURE FOR CONFIGURATION MANAGEMENT ON NETWORK DEVICES - A network device has a processor that executes software instructions for a primary control plane operable to program a primary data plane that processes packets received at the network device to determine how or whether the packets are to be directed into a network. The processor also executes software instructions for a secondary control plane operable to program a secondary data plane. The secondary control and data planes are software containerized versions of the primary control and data planes, respectively. One or more configuration changes to be made to the network device are received at the secondary control plane. Test packets are obtained from the primary data plane, and network processing decisions are executed by the secondary data plane on the test packets based on the one or more configuration changes. Results of the network processing decisions executed by the secondary data plane on the test packets are evaluated. | 2018-08-23 |
20180241628 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF, CONTROL METHOD OF SYSTEM, AND STORAGE MEDIUM - An information processing apparatus includes a memory device that stores a set of instructions, and at least one processor that executes the instructions. When executed, the instructions cause the information processing apparatus to perform operations including effecting control, if operating in a first mode where network settings thereof are performed in cooperation with an external terminal, to activate an access point for wireless communication using an SSID satisfying a predetermined format, and activate a service for accepting settings relating to the network, changing settings relating to the network thereof, at least following the service having received connection information from an external terminal, based on the connection information, and effecting control, if operating in a second mode different from the first mode, to activate an access point using an SSID not satisfying the predetermined format, with the service not accepting connection information from an external device. | 2018-08-23 |
20180241629 | VIRTUAL NETWORK MONITORING SYSTEM, VIRTUAL NETWORK MONITORING METHOD, AND RECORDING MEDIUM - To provide a virtual network monitoring system, etc., for facilitating the monitoring of a virtual network on the basis of a connection structure between a virtual node and the virtual network. Provided is a virtual network monitoring system that includes a control plane for transferring a virtual network control signal and a data plane for transferring a virtual network packet, wherein the virtual network monitoring system is provided with an agent means for acquiring a connection structure between a virtual node and the virtual network in a physical environment, a virtual network management means for acquiring a connection structure between a virtual node and the virtual network in a virtual environment, and a virtual network monitoring means for monitoring the virtual network on the data plane on the basis of the connection structure between the virtual node and the virtual network in the physical environment and the connection structure between the virtual node and the virtual network in the virtual environment. | 2018-08-23 |
20180241630 | METHOD AND APPARATUS FOR VIRTUALIZED NETWORK FUNCTION SCALING THAT IS INITIATED BY NETWORK MANAGEMENT AND/OR ELEMENT MANAGEMENT - A method and apparatus may include transmitting a scaling request. The scaling request comprises a request for virtualized network function expansion or virtualized network function contraction. The scaling request is transmitted to a second network node. A first domain is directed to application level details. A second domain is directed to virtualization level details. The scaling request comprises: (1) a relative target capacity that is generic to both the first domain and the second domain, (2) an absolute target capacity that is specific to the first domain, or (3) a relative target capacity that is specific to virtualized network function level targets. The method may also include receiving a notification that a virtualization network function has been updated based on the transmitted scaling request. | 2018-08-23 |
20180241631 | SYSTEMS AND METHODS FOR NETWORK TOPOLOGY VALIDATION - An information handling system may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to determine a topology of connectivity of various components of a system comprising multiple information handling system chassis and apply validation rules to the topology to validate the topology. | 2018-08-23 |
20180241632 | SYSTEMS AND METHODS FOR NETWORK TOPOLOGY DISCOVERY - An information handling system may include a processor, a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to: (i) responsive to a physical connection being made between components of a system comprising multiple information handling system chassis, receive a message; (ii) process information present in the message indicative of a topology of connectivity among the components of the system; and (iii) update a data structure defining the topology of connectivity of the various components of the system based on the information present in the message. | 2018-08-23 |
20180241633 | MANAGEMENT SYSTEM AND MANAGEMENT METHOD - A management system including one or more electronic apparatuses connected to a predetermined network and an information processing apparatus configured to collect operational data concerning each of the electronic apparatuses is provided. The information processing apparatus makes a request to acquire operational data from the electronic apparatus functioning as a node device of a mesh network different from the predetermined network via the mesh network. Moreover, the information processing apparatus collects operational data of a node device transmitted in response to the request. | 2018-08-23 |
20180241634 | METHODS AND SYSTEMS FOR INFERRING NETWORK STRUCTURE FROM CASCADES - Disclosed herein are systems, methods, and software for providing a network structure for a network. In one example, a method includes identifying an occurrence of a cascade amongst a plurality of nodes of the network. The method also includes determining respective activation times for each node of a plurality of activated nodes activated during the cascade. The method further includes, for each pairwise combination of activated nodes from the plurality of activated nodes, computing, based on the respective activation times, a connection probability that a pair of nodes from the plurality of activated nodes is connected by an edge. The method further includes mapping a true edge between two activated nodes of the plurality of activated nodes in the network based on computed connection probabilities for the each pairwise combination. | 2018-08-23 |
20180241635 | METHOD FOR ENABLING AUTOMATION OF MANAGEMENT AND ORCHESTRATION OF NETWORK SLICES - A method for managing a network function (NF) entity in a network slice instance. The method comprises actions of accessing descriptor entities (DE) that each DE describes deployment and operational behaviour of the NF entity, including at least one DE that relates to the network slice instance and issuing a request to update a configuration of the NF entity. The DE lies in the management plane. The update request is in accordance with policy in the accessed DEs. The method may also comprise the action of obtaining performance feedback information from the NF entity regarding performance of the NF entity. | 2018-08-23 |
20180241636 | Multi-Tier Fault Tolerant Network Design With Quality of Service Considerations - Concepts and technologies disclosed herein are directed to a multi-tier fault tolerant network design with Quality of Service (“QoS”) considerations. According to one aspect, a network planning system can identify at least one critical site of a plurality of sites. The critical site is considered to be critical for survivability of a network. The network planning system can construct a topology that connects the plurality of sites. The network planning system can determine a shortest path for each network link in the topology. The network planning system can check a service level agreement to determine a reliability requirement for each link in the topology that is not connected to the critical site. The network planning system can implement a reliable adaptive multipath provisioning algorithm to adaptively determine a bandwidth allocation on each link in the topology based, at least in part, upon the shortest path and the reliability requirement. | 2018-08-23 |
20180241637 | SYSTEM AND METHOD FOR PREDICTIVE MAINTENANCE - A system and method for predictive maintenance of multifunction peripherals includes a data collection agent configured to receive and store simple network management protocol (SNMP) data including metered data from one or more multifunction peripherals, and a service prediction system configured to selectively perform linear regression analysis on one or more of the metered data to predict one or more service events for at least one multifunction peripheral based on the linear regression analysis. Notifications for each predicted service event are sent to service technicians associated with the associated multifunction peripheral. Service technicians can preemptively perform service and maintenance functions on the multifunctional peripherals before error or faults occur on the multifunction peripherals. | 2018-08-23 |
20180241638 | Method and system for discovering and presenting access information of network applications - A method and system for discovering and presenting access information of network applications includes: collecting access information between IP endpoints from a network packet collection; generating network diagrams; determining whether application component information needs to be configured, if yes, configuring application components, while if no, outputting the network diagrams; mapping the configuration information of the application components to the access information between the IP endpoints to obtain the access information based on the application components; updating the network diagrams according to the access information based on the application components; and outputting the network diagrams. In the present invention, collecting the access information of the application components through analyzing network packets does not affect the performance and security of computing nodes and network equipment in network environment; timely finding changes in access relations of the application components through snapshotting and comparing access relation views of the application components. | 2018-08-23 |
20180241639 | ASSISTANT FOR MANAGEMENT OF NETWORK DEVICES - Management of devices on a wireless network is described. An assistant device can determine how a user used resources and/or devices outside of an environment. Based on how the user used those resources and/or devices, configuration settings of local devices within the environment can be updated to provide new resources or settings. | 2018-08-23 |
20180241640 | DATA PROCESSING METHOD AND DEVICE - Embodiments of this application disclose a data processing method and a device, so that a controller can also participate in a procedure of electing an active switch, thereby avoiding a problem in the prior art caused by a registration failure when an active switch determined by means of switch election registers with a controller, and improving active switch election efficiency. The method in the embodiments of this application includes: receiving, by a controller, registration requests of multiple switches in a same stack system, where the multiple switches include a target switch; and if the controller determines that the target switch meets a registration success condition, sending, by the controller, a registration success message to the target switch, and selecting the target switch as an active switch. | 2018-08-23 |
20180241641 | SYSTEM AND METHOD FOR CALCULATING SIP KPIs FOR A TIME WINDOW - A system and method is provided for calculating session initiation protocol (SIP) key performance indicators (KPIs) for multimedia communication in a network accessing network packets monitored over time. The method includes accessing network packets monitored over time, detecting a SIP response message of the monitored network packets, and accounting for the detected SIP response message in a time window of a series of consecutive time windows that includes the SIP response message's associated observed time. The SIP response message has an associated observed time at which the monitored SIP message was observed during monitoring. The method further includes pairing a SIP request message expected to be paired with the detected SIP response message with the detected SIP response message and accounting for the paired SIP request message in the time window with which the detected SIP response message is accounted. The method further includes calculating a KPI for the time window using the detected SIP response message and its paired SIP request message that are accounted for in the time window. | 2018-08-23 |
20180241642 | CONSISTENT PLACEMENT BETWEEN PRIVATE AND PUBLIC CLOUD DEPLOYMENTS OF APPLICATION SERVICES - A management method accesses a service template indicative of dependencies among tiers of an application service. A deployment schema is extracted from a public cloud provider and a cloud deployment template is generated in accordance with the schema. The service is then migrated from one deployment platform to another in accordance with the templates. Migration may be from an on-premises deployment to a public cloud deployment or vice versa. Migrating may include mapping application service requirements indicated in the service template to public cloud features available from the public cloud provider. The application template may identify a dependency between two tiers of the service placed within a performance-optimized domain of a premises deployment wherein mapping the application service requirements may include identifying, from the schema, an analogous domain for the public cloud provider and instantiating instances of the first tier and the second within an instance of the optimization domain. | 2018-08-23 |
20180241643 | PLACEMENT OF APPLICATION SERVICES IN CONVERGED INFRASTRUCTURE INFORMATION HANDLING SYSTEMS - A system and method access domain information indicating placement domains for an information handling system. The placement domains may include fault domains and optimization domains, wherein an optimization domain includes one or more resources wherein a tier instance for each tier of a multi-tier application service resource can be instantiated such that inter-tier communication is internal to the domain. Tier instances may be placed in accordance with the placement domains to achieve compliance with high availability and performance objectives. Management endpoints corresponding to each resource may be monitored and, responsive to detecting a change in the infrastructure, updated domain information indicative of updated placement domains may be accessed and used to determine whether the placement of the tier instances achieves compliance with the objectives. If the current placement fails to achieve the objectives, the plurality of tier instances may be re-placed in accordance with the updated placement domains. | 2018-08-23 |
20180241644 | SERVER PERFORMANCE EVALUATION THROUGH SINGLE VALUE SERVER PERFORMANCE INDEX - Technologies are described for evaluation of server performance through a single value SPI. Server performance dimensions to be used in overall server performance evaluation may be determined and monitored through continuous monitoring or sampling. The dimensions may include, but are not limited to, processor usage, memory usage, input/output usage, network usage, response time, latency, and similar parameters. A threshold value that identifies an average performance value for each dimension over a predefined time period may be determined for each dimension. A performance index may be determined for each dimension normalized by the corresponding threshold value. The SPI may be determined based on an averaging of the performance indices of the one or more dimensions and an alert or a report may be generated and/or a server operation may be adjusted based on an evaluation of the SPI. | 2018-08-23 |
20180241645 | Providing Mobile Device Management Functionalities - Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information. | 2018-08-23 |
20180241646 | SYSTEM AND METHOD FOR CYBER SENSING FOR POWER OUTAGE DETECTION - A method for cyber sensing for power outage detection includes receiving a selected geographic region for detection and monitoring of power outages; gathering Internet Protocol (IP) network addresses of IP networks within the geographical region; filtering the gathered IP network addresses of IP networks within the geographical region, wherein the gathered IP network addresses of IP networks within the geographical region are referred to herein as geo-relevant IP network addresses; calculating a baseline value for each geo-relevant IP network; scanning the filtered geo-relevant IP network once per predefined time interval, so that each individual IP address within each geo-relevant IP network is tested for response and determining how many devices within the geo-relevant IP network positively respond to the testing; periodically repeating the step of scanning and comparing scan results; and displaying results of scanning. | 2018-08-23 |
20180241647 | OUTGOING COMMUNICATION SCAM PREVENTION - One embodiment provides a method comprising intercepting an incoming communication for a user, and determining whether to classify the incoming communication as a suspicious incoming communication based on content of the incoming communication and a learned classification model or learned signatures. The method further comprises monitoring one or more outgoing communications from the user, and invoking an action relating to scam prevention in response to determining an outgoing communication from the user is linked to a suspicious incoming communication. | 2018-08-23 |
20180241648 | ADAPTIVE SESSION INTELLIGENCE EXTENDER - A method for monitoring performance of customized applications at transaction level in a computer network is provided. The method includes receiving, from a user, information related to a customized application. The received information includes at least an application definition and information related to customized application protocol. A template is generated for the customized application based on the received information. Performance of the customized application is monitored at transaction level using the generated template. | 2018-08-23 |
20180241649 | ENABLING ADDITIONAL METRICS IN A MONITORING SYSTEM TO DIAGNOSE PROBLEMS - Systems and methods for enabling additional metrics in a monitoring system to diagnose problems are disclosed. An example method may include collecting first metric data at a first collection frequency, determining whether the first metric data exceeds a first boundary defined by a first metric rule, responsive to determining that the first metric data exceeds the first boundary, collecting second metric data at a second collection frequency and collecting the first metric data at a third collection frequency, the second metric data and the third collection frequency defined by the first metric rule, determining whether the first metric data no longer exceeds the first boundary, and responsive to determining the first metric data no longer exceeds the first boundary, terminating collection of the second metric data while continuing to collect the first metric data at the first collection frequency. | 2018-08-23 |
20180241650 | AGGREGATE ENERGY CONSUMPTION ACROSS A NETWORK - This disclosure relates to determining aggregate energy consumption associated with sending content (e.g., media content, such as a video file, audio file, etc.) across a network. For example, node | 2018-08-23 |
20180241651 | APPLICATION-DRIVEN CROSS-STRATUM RESOURCE MONITORING - A method and system for application-driven proactive multi-stratum resource monitoring in software defined networks (SDN). A Cross-Stratum Optimization (CSO) service orchestrator obtains a service intent, a notification subscription, and a programmable performance rule specified by an application. The CSO service orchestrator collects streaming performance data in a network based on the notification subscription, evaluates performance of the network using the collected data and the programmable performance rule, and allocates one or more of storage, computer, and network resources based on the evaluation to ensure quality of service for the application. | 2018-08-23 |
20180241652 | CROSS-TENANT ANALYSIS OF SIMILAR STORAGE ENVIRONMENTS TO RECOMMEND STORAGE POLICY CHANGES - In one embodiment, a method includes determining a first set of similarity metrics for a first storage environment, the first set of similarity metrics being based on predetermined parameters related to the first storage environment, at least one of the predetermined parameters being relating to a redundancy of connections and devices in the first storage environment. In addition, the method includes obtaining a second set of similarity metrics for a second storage environment. Also, the method includes determining that the second storage environment is similar to the first storage environment by calculating a similarity measurement score between the sets of similarity metrics for the first and second storage environments. Moreover, the method includes re-aligning the first storage environment according to one or more identified aspects of the second storage environment that improve performance of the first storage environment. | 2018-08-23 |
20180241653 | CONNECTIVITY ROBUSTNESS IN WIRELESS SYSTEMS - Systems and methods are contemplated for reconfiguration of one or more MAC instances while the WTRU is operating using dual- or multi-MAC instance connectivity. For example, upon reception of RRC reconfiguration information that modifies one or more secondary MAC instances, the WTRU may transmit a reconfiguration complete message to a Macro eNB (MeNB) and may synchronize to small-cell or secondary eNB (SeNB), for example if triggered by one or more of an RRC flag, a physical downlink control channel (PDCCH) order (MeNB/SeNB), MAC activation information, etc. For example, the WTRU may synchronize to the SeNB for specific type(s) of RRC reconfigurations, but not other type(s) of RRC reconfigurations. Although examples may be described in terms of dual connectivity, the WTRU may establish connectivity and perform mobility procedures with more than two radio access network (RAN) nodes (e.g., eNBs), and the embodiments described may be equally applicable to those scenarios. | 2018-08-23 |