38th week of 2020 patent applcation highlights part 74 |
Patent application number | Title | Published |
20200295934 | JOINT BLIND KEY ESCROW - A computer-implemented method for escrowing secret data in a server of a client-server network, the client-server network comprising: a first client having at least one public and private client key pairs, at least one trusted client having at least one public and private trusted client key pairs, a server having a public and private server key pairs, a blockchain system comprising a plurality of nodes which are configured to store the public keys of the elements of the client-server network. It is also described a computer-implemented method for obtaining secret data of a server wherein the secret data is escrowed with the above computer-implemented method for escrowing secret data in a server. System, computer-readable mediums and computer programs, which are configured to implement or perform said computer-implemented methods, are also described. | 2020-09-17 |
20200295935 | METHOD AND SYSTEM FOR SECURELY REGISTERING CRYPTOGRAPHIC KEYS ON A PHYSICAL MEDIUM FOR CRYPTOGRAPHIC KEYS, AND PHYSICAL MEDIUM PRODUCED - The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps:
| 2020-09-17 |
20200295936 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR LINKING A BLOCKCHAIN TO A DIGITAL TWIN - A computer implemented method and system is described which uses blockchain technology as a storage system for data acquired from a digital twin. The blockchain can be used to generate an immutable transaction history of data produced by the digital twin. In the case of an error, failure, incident, or accident, parties of interest can then access and analyse an immutable set of data. The blockchain network can also execute a digital smart contract based on the data received from a digital twin. The invention may be used in conjunction with the Bitcoin blockchain or another blockchain protocol. | 2020-09-17 |
20200295937 | SECURE AND ZERO KNOWLEDGE DATA SHARING FOR CLOUD APPLICATIONS - Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered. | 2020-09-17 |
20200295938 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PERFORMING HARDWARE-BACKED PASSWORD-BASED AUTHENTICATION - A system, method, and computer program product are provided for performing hardware-backed password-based authentication. In operation, a system receives a request to access software utilizing password-based authentication. Further, the system receives a password for the password-based authentication. The system computes a hash utilizing the password and a hardware-based authenticator associated with hardware of the system. Moreover, the system verifies that the hash computed utilizing the password and the hardware-based authenticator is correct for accessing the software. | 2020-09-17 |
20200295939 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PERFORMING HARDWARE BACKED SYMMETRIC OPERATIONS FOR PASSWORD BASED AUTHENTICATION - A system, method, and computer program product are provided for implementing hardware backed symmetric operations for password based authentication. In operation, a system receives a request to access software utilizing password-based authentication. Further, the system receives a password for the password-based authentication. The system computes a hash utilizing the password and a hardware-based authenticator associated with hardware of the system utilizing hardware backed symmetric encryption. Moreover, the system verifies that the hash computed utilizing the password and the hardware-based authenticator is correct for accessing the software. | 2020-09-17 |
20200295940 | SYSTEM AND METHOD FOR DEVICE REGISTRATION AND AUTHENTICATION - Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1)receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server. | 2020-09-17 |
20200295941 | UNTRUSTED CODE DISTRIBUTION - A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed. | 2020-09-17 |
20200295942 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR LINKING A BLOCKCHAIN TO A SET OF DIGITAL TWINS - A computer implemented method and system is described which uses blockchain technology as a storage system for data acquired from a set of digital twins. The blockchain can be used to generate an immutable transaction history of data produced by the set of digital twins. In the case of an error or failure, parties of interest can then access and analyse an immutable record of data. The invention may be used in conjunction with the Bitcoin blockchain or another blockchain protocol. | 2020-09-17 |
20200295943 | DATA SECURITY USING A BLOCKCHAIN LEDGER - The present disclosure relates to system(s) and method(s) for data security using a blockchain ledger. The system ( | 2020-09-17 |
20200295944 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ZERO ROUND TRIP SECURE COMMUNICATIONS BASED ON NOISY SECRETS - A system, method, and computer program product are provided for implementing zero round trip secure communications based on a noisy secret. In operation, a sender system utilizes a randomly generated message key for encrypting a message to send to a receiver system. The sender system selects a plurality of different sub-keys from a negotiated noisy secret to encrypt the randomly generated message key. The sender system encrypts the message utilizing the randomly generated message key. The sender system sends the encrypted message, all encrypted message keys, and a message MAC that is calculated and added for every sub-key, to the receiver system such that the receiver system is able to perform a MAC-based verification to test sub-key validity of the plurality of different sub-keys. | 2020-09-17 |
20200295945 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ZERO ROUND TRIP SECURE COMMUNICATIONS BASED ON A NOISY SECRET WITH A REDUCED MESSAGE SIZE - A system, method, and computer program product are provided for implementing zero round trip secure communications based on a noisy secret with a reduced message size, comprising: a) receiving, by a receiver system, an encrypted message including encrypted message keys, and message authentication code (MAC) information a message MAC that is calculated and added for every sub-key, from a sender system; b) obtaining, by the receiver system, a number of a plurality of sub-keys from the received encrypted message; c) obtaining, by the receiver system, a sub-key from the plurality of sub keys associated with the encrypted message; d) utilizing, by the receiver system, a key derivation function to derive a key encryption key and a key MAC key associated with the sub-key; e) calculating, by the receiver system, an encrypted message key MAC associated with the sub-key using the derived key MAC key; f) determining, by the receiver system, whether the calculated encrypted message key MAC matches a received MAC for the sub-key; g) determining, by the receiver system, that the sub-key does not have any noise if the calculated encrypted message key MAC matches the received MAC for the sub-key; h) determining, by the receiver system, that the sub-key has noise if the calculated encrypted message key MAC does not match the received MAC for the sub-key; i) repeating, by the receiver system, steps c though h until a noiseless sub-key is found or all of the plurality of sub-keys are determined to have noise; j) if all of the plurality of sub-keys are determined to have noise, adjusting, by the receiver system, bits of a selected sub-key one by one, for each of the plurality of sub-keys, until a sub-key with one noisy bit is found and corrected to a noiseless sub-key; k) deriving, by the receiver system, a key encryption key from the noiseless sub-key; l) utilizing, by the receiver system, the key encryption key derived from the noiseless sub-key to decrypt a message key associated with the encrypted message; and m) utilizing, by the receiver system, the message key to decrypt the encrypted message. | 2020-09-17 |
20200295946 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING ZERO ROUND TRIP SECURE COMMUNICATIONS BASED ON NOISY SECRETS WITH A POLYNOMIAL SECRET SHARING SCHEME - A system, method, and computer program product are provided for implementing zero round trip secure communications based on noisy secrets with a polynomial secret sharing scheme. In operation, a sender system identifies (e.g. negotiates, etc.) two negotiated noisy secrets associated with an encrypted message to send to a receiver system. The sender system utilizes a first negotiated noisy secret for sub-key selection. The sender system generates a secret polynomial using Shamir's polynomial-based secret sharing scheme with N points, where N is a positive integer, and a message key as a secret. The sender system divides the first negotiated noisy secret into a plurality of sub-keys. The sender system divides a second negotiated noisy secret into test blocks of a length equivalent to a length of a sub-key. The sender system utilizes each of the plurality sub-keys for encrypting a corresponding test block along with one unique point of the secret polynomial. Moreover, the sender system sends all encrypted test blocks and corresponding encrypted points of the secret polynomial to the receiver system with the encrypted message. | 2020-09-17 |
20200295947 | LEDGER-BASED CONFIDENCE MODEL FOR CONTENT TRANSFERS ACROSS A COMMUNICATION NETWORK - Embodiments of the disclosure provide a communication system and method to leverage distributed ledger technology as the basis upon which a trustless method can be deployed to validate file provenance and authenticity, while also supporting a strong form of non-repudiation. In one example, the method includes transferring electronic content from a sending communication device to the receiving communication device via Rich Communication Services. The method includes generating, at the sending communication device, file transfer parameters, identity signature and timestamp that are associated with the transfer of electronic content from the sending communication device. The method then includes causing the identity signature and timestamp to be written as part of a content transfer ledger. The method may also include securely providing the file transfer parameters associated with the transfer of electronic content from the sending device to one or more receiving communication devices as part of validating the electronic content. | 2020-09-17 |
20200295948 | SYSTEM FOR GENERATION AND VERIFICATION OF IDENTITY AND A METHOD THEREOF - The present disclosure relates to the field of identity generation and verification systems and discloses a system ( | 2020-09-17 |
20200295949 | BLOCKCHAIN-BASED CONTENT VERIFICATION - This disclosure relates to blockchain-based content verification. In one aspect, a method includes receiving, from a client device of a signer, a target transaction request for triggering presentation of a target electronic document. A smart contract for content verification of the target electronic document is invoked in response to receiving the target transaction request. A content verification program declared in the smart contract is executed. The executing includes reading content of the target electronic document from a blockchain and performing content verification on the target electronic document based on the content of the target electronic document read from the blockchain. A content verification result and the content of the target electronic document is returned to the client device for presentation to the signer. | 2020-09-17 |
20200295950 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SENSITIVE DATA RECOVERY IN HIGH SECURITY SYSTEMS - A system, method, and computer program product are provided for sensitive data recovery in high security systems. In operation, a client device receives a request by a user to initiate a data recovery process to recover data that is encrypted. The client device generates a new data recovery request key pair. The client device creates a data recovery request that includes a data recovery request public key. The client device signs the data recovery request using an identity private key that is associated with a certificate issued by a certification authority (CA). The client device sends the data recovery request to a server system storing the data. The server system accesses an offline data recovery subsystem (ODRS) storing a data recovery key pair to authenticate the user. The ODRS generates and stores a secret data recovery code. The client device receives the secret data recovery code that was communicated to the user. The client device sends the secret data recovery code along with the data recovery request to the server system. The server system verifies the received secret data recovery code against the stored secret data recovery code. The server system verifies a public key associated with the received data recovery request against a public key associated with a stored recovery request. The server system identifies the data recovery request as authenticated. The ODRS verifies a request signature associated with the data recovery request. The ODRS verifies the encrypted signature against encrypted and signed recovery data. The ODRS verifies that a user ID in a password reset request matches a user ID in a message encryption key signature. The ODRS decrypts the data recovery key pair and re-encrypts the data recovery key pair to the data recovery request public key. The ODRS stores the re-encrypted data recovery key pair associated with the data recovery request. The client device queries the server system to obtain the data. The server system returns the data to the client device. The client device decrypts the data using a data recovery private key. | 2020-09-17 |
20200295951 | SEAMLESS CERTIFICATE REPLACEMENT FOR ENDPOINTS IN HYPERCONVERGED INFRASTRUCTURE - Techniques for seamless certificate replacement for endpoints in hyperconverged infrastructure are disclosed. In one example, a certificate replacement request for an endpoint may be received. Upon receiving the certificate replacement request, a new certificate may be placed in the endpoint such that the endpoint includes an old certificate and the new certificate. Further, dependent endpoints having communication with the endpoint using the old certificate may be discovered and monitored. Furthermore, the new certificate of the endpoint may be placed in the discovered dependent endpoints and existing communication between the endpoint and each of the discovered dependent endpoints using the old certificate may be maintained. Upon completion of the existing communication, next communication between the endpoint and each of the discovered dependent endpoints may be enabled using the new certificate. Then, the old certificate may be decommissioned from the endpoint and the discovered dependent endpoints. | 2020-09-17 |
20200295952 | MUTUAL AUTHENTICATION OF CONFIDENTIAL COMMUNICATION - Embodiments of the invention relate to systems and methods for confidential mutual authentication. A first computer may blind its public key using a blinding factor. The first computer may generate a shared secret using its private key, the blinding factor, and a public key of a second computer. The first computer may encrypt the blinding factor and a certificate including its public key using the shared secret. The first computer may send its blinded public key, the encrypted blinding factor, and the encrypted certificate to the second computer. The second computer may generate the same shared secret using its private key and the blinded public key of the first computer. The second computer may authenticate the first computer by verifying its blinded public key using the blinding factor and the certificate of the first computer. The first computer authenticates the second computer similarly. | 2020-09-17 |
20200295953 | Generating key material for information security using a Resistive Processing Unit (RPU) accelerator array as a Physically Unclonable Function (PUF) - Crossbar arrays (e.g., Resistive Processing Unit (RPU) accelerators) are leveraged to create a Physically Unclonable Function (PUF) that exploits variations, such as statistical process variation in manufacture or operation, to generate key material to secure information in a computing environment. One environment is a cloud compute infrastructure whose shared resources are used to process workloads. During RPU accelerator use, the state of the RPU's bits are changed by reproducible inputs, e.g., stochastic pulses applied to change resistive values in the array, and the corresponding changes in the RPU array state captured. These responses, which cannot be reproduced from another device due to random device variations across chips that embody the RPUs, are then used to generate (or facilitate generation of) the cryptographic material. In one embodiment, inputs applied to the RPU accelerator array are generated from a pseudo-random number generator that is otherwise associated with the RPU accelerator. | 2020-09-17 |
20200295954 | PUF-BASED KEY GENERATION FOR CRYPTOGRAPHIC SCHEMES - Systems and methods for secure communication between devices where one device has a physical unclonable function (“PUF”) array of PUF devices and another device stores data representing characteristics of the PUF array include encryption schemes using repeated application of one-way cryptographic functions to message segments. The devices transmit or receive a processing instruction used to determined PUF devices whose measured characteristics are used to derive encryption keys. Messages are segmented and message information is securely transmitted by repeatedly application of a suitable one-way cryptographic function to each message segment where the number of applications of the function is determined by each message segment. Because both devices may independently generate the same encryption keys (including “public” keys which otherwise would need to be exchanged or published) by either measuring the PUF devices or retrieving data representing characteristics of the PUF devices, communications overhead is reduced and security is improved. | 2020-09-17 |
20200295955 | MULTIPLE PHASE PULSE POWER IN A NETWORK COMMUNICATIONS SYSTEM - In one embodiment, an apparatus comprises an input power interface for receiving input power, a power control system for transmitting DC (Direct Current) pulse power on multiple phases over a cable to a plurality of powered devices and verifying cable operation during an off-time of pulses in the DC pulse power, and a cable interface for delivery of the DC pulse power on the multiple phases and data over the cable to the powered devices. A method for transmitting multiple phase pulse power is also disclosed herein. | 2020-09-17 |
20200295956 | Power Sourcing Equipment, and Method and Apparatus for Power Over Ethernet - An Ethernet power sourcing equipment (P SE), and a method and an apparatus for power over Ethernet (PoE), where the Ethernet PSE includes a PSE chip, a master control processor, a power supplying port, and a preprocessor. The preprocessor is configured to determine whether the master control processor starts upon power-on, control the PSE chip to detect whether the power supplying port is connected to a valid powered device (PD) when the master control processor starts upon power-on, and control, according to a preset rule, the PSE chip to power on the valid PD when the power supplying port is connected to the valid PD. Hence, the Ethernet PSE has abundant management functions and can quickly power on a PD. | 2020-09-17 |
20200295957 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING WAKE-UP SIGNAL IN VEHICLE NETWORK - An operation method of a first end node of an Ethernet-based vehicle network is provided. The operation method includes detecting a local event and transitioning an operation state of a physical layer (PHY) of the first end node from a sleep state to a wake-up state. A pseudo PHY identifier (ID) is configured as a PHY ID of the first end node in response to the first end node operating in the wake-up state. A first beacon including the pseudo PHY ID is then transmitted and the first beacon indicates that the first end node operates in the wake-up state. | 2020-09-17 |
20200295958 | MULTICAST (P2MP) SUPPORT FOR PATH COMPUTATION ELEMENT CENTRAL CONTROLLER (PCECC) - Disclosed is a mechanism that provides the extensions of PCEP message and the objects to support PCECC with P2MP capability in downloading the labels for branch node of P2MP TE LSPs. In one implementation, various embodiments provide an apparatus, a system, a node and a method that receives a PCLabelUpd message with all the extensions and the objects to support PCECC with P2MP capability, detects the object and identifies that the label download is for P2MP TE LSP and for this LSP. In those embodiments, the apparatus/the system/the node acts as a branch node, and thereby the apparatus/the system/the node downloads all the labels specified in the object to data plane with respect to any existing branch node download mechanism for a P2MP TE LSP. | 2020-09-17 |
20200295959 | CONFERENCE INFORMATION MANAGEMENT SYSTEM, INFORMATION PROCESSING APPARATUS, AND CONTROL METHOD - A conference information management system including an information processing apparatus includes circuitry configured to acquire schedule information of conference stored in a server, from the server; create conference information of a specific conference, held or to be held using an electronic information board function of the infoiiiiation processing apparatus, based on the acquired schedule information; and store the created conference information in a storage destination. | 2020-09-17 |
20200295960 | BALANCED CONFORMITY IN CHAT CONVERSATIONS - Methods and systems for balanced conformity in chat conversations are disclosed. A method includes: collecting, by a computing device, data from an ongoing group chat; determining, by the computing device, a baseline tone for a plurality of participants in the ongoing group chat using the collected data; determining, by the computing device, a current tone for the plurality of participants in the ongoing group chat using the collected data; determining, by the computing device, a conformity risk score using the baseline tone and the current tone for the plurality of participants in the ongoing group chat; and in response to determining that the conformity risk score exceeds a first predetermined threshold, the computing device automatically inviting an additional participant to join the ongoing group chat. | 2020-09-17 |
20200295961 | CABLE MODEM INTERFACE MASK BASED VIRTUAL LOCAL AREA NETWORK MAPPING - A method to assign a service flow classification for a client device that is performed at a network interface device includes accessing a configuration file having an interface mask, and correlating interface mask bit values with at least one port of the network interface. The network interface device associates the client device with the at least one port of the network interface device and assigns a service flow classification based on the interface mask bit values for an access request received by the network interface device from the client device. The network interface device then communicates with a virtual local area network mapping device using the service flow classification. The virtual local area network mapping device maps the service flow into a VLAN for the service flow of the client device. | 2020-09-17 |
20200295962 | HOME AUTOMATION SYSTEM INCLUDING CHANGED CURRENT USAGE NOTIFICATION AND RELATED METHODS - A home automation (HA) system may include at least one HA operation device within a restroom of a user living area and an HA hub device to provide communications for the at least one HA operation device. The HA system may also include at least one controller configured to store historical operational data for the at least one HA operation device based upon a user within the restroom, and monitor operation of the at least one HA operation device, and determine therefrom whether current usage of the restroom has changed based upon the historical operational data. The at least one controller may be configured to generate a notification based upon the historical operations data and the determined current usage of the restroom. | 2020-09-17 |
20200295963 | COMMUNICATIONS ADAPTER APPARATUS FOR INTERFACING WITH AN APPLIANCE CONTROLLER - A communications adapter may be in operative communication with the controller of the appliance via a connector, cable, or wire configured to send and/or receive electrical signals, data, and/or power. Through the connector, the communications adapter may be configured to retrieve various types of appliance data (both real-time and static data) from the appliance controller. The communications adapter may then wirelessly communicate with a user device to relay the appliance data and receive user inputs. In this manner, the communications adapter provides a way to retrofit legacy appliances with wireless communication capabilities, which in turn enables the user to remotely monitor and control the appliances. | 2020-09-17 |
20200295964 | GAS FEE NOTIFICATION METHOD BASED ON COMPOUND INTERNET OF THINGS (IOT) AND IOT SYSTEM - The present invention relates to the field of Internet of Things (IoT), and provides a gas fee notification method based on a compound IoT and an IoT system. The IoT system includes a user platform, a plurality of service sub-platforms, a management platform, a sensor network platform and a plurality of object sub-platforms; and each of the object sub-platforms includes a gas meter. The gas fee notification method based on the compound IoT and the IoT system provided by the present invention can remind a user when a pricing tier for gas consumption of the user changes, and help the user plan the gas usage, thereby advocating the spirit of energy conservation and environmental protection. | 2020-09-17 |
20200295965 | SYSTEM AND METHOD FOR CONTROLLING MULTIPLE SERIAL CONTROL DEVICES IN AN EMERGENCY VEHICLE - A system, method and storage medium for configuring and operating a plurality of serial devices in an emergency response vehicle. The system may include a plurality of peripheral devices, each configured to receive and store an address, a controller configured to transmit addressable commands to each of the devices, at least two of the devices having a first device type wherein the addresses of each of the devices are selectable by a user. The method may include selecting a plurality of peripheral devices, each configured to receive and store an address, with at least two of the devices have a same device type, connecting each of the devices to a computer executing configuration software, detecting each of the devices, receiving an address for at least one of the devices, and storing the address in a storage medium. | 2020-09-17 |
20200295966 | TRANSMISSION DURATION REPORT AND TRANSMISSION TARGET TIME ALLOCATION FOR CONTROLLER AREA NETWORK SYNCHRONIZATION - A CAN network synchronization method identifies a sync master node from a plurality of nodes, and designates each of the remaining nodes as a sync slave node. The method further designates a message from the sync master node as a sync message, and assigns a lowest number to the message ID of the sync message. The method further assigns a unique node ID to each sync slave node, and assigns a unique message ID to a transmission duration report message from a sync slave node. The method further assigns a unique message ID to a transmission target time allocation message from the sync master node. The method also performs a handshake operation between the sync slave nodes and the sync master node to exchange message burst transmission durations (T | 2020-09-17 |
20200295967 | COMMUNICATION SYSTEM, CONTROLLED DEVICE, AND CONTROL METHOD FOR COMMUNICATION SYSTEM - A communication system includes a plurality of controlled devices each including communication IFs compliant with EtherCAT standards; network connected to communication IF of each of controlled devices, network connected to communication IF of each of controlled devices; control apparatus capable of sending out first control data for controlling controlled devices to network; control apparatus capable of sending out second control data for controlling controlled devices to network; and main control apparatus that performs first control that causes control apparatus to send out the first control data. Main control apparatus further performs second control that causes control apparatus to send out the second control data when the sent first control data fails to reach at least one of controlled devices. | 2020-09-17 |
20200295968 | System and Method of Establishing Communications with Multiple Information Handling Systems - In one or more embodiments, one or more systems, methods, and/or processes may receive, via a network, multiple subscription requests from respective multiple baseboard management controllers (BMCs) of respective multiple information handling systems (IHSs); may receive, via the network, authentication information from a first information handling system (IHS), different from each of the multiple IHSs; may determine that the first IHS is authenticated to access the multiple BMCs; may receive, via the network, multiple publication requests from the first IHS to access, via the network, the multiple BMCs respectively; may receive, via the network, multiple queries from the multiple BMCs respectively associated with the multiple subscription requests; may determine that the multiple publication requests are associated with the multiple subscription requests and are associated with the multiple queries associated with the multiple subscription requests; and may establish network communications with the first IHS and the multiple BMCs. | 2020-09-17 |
20200295969 | INTEROPERABILITY BETWEEN SEPARATE AND COLLAPSED SERVICE-LAYER AND TRANSPORT-LAYER TUNNELS - A first network device may generate a layer-3 virtual private network (L3VPN) route advertisement associated with the first network device. The L3VPN route advertisement may include a first portion, associated with a second network device included in an L3VPN with the first network device, for separate transport-layer tunnel and service-layer tunneling, and a second portion, associated with the second network device, for collapsed transport-layer and service-layer tunneling. The first network device may transmit the L3VPN route advertisement. | 2020-09-17 |
20200295970 | METHOD AND SYSTEM FOR AUTOMATIC SELECTION OF VIRTUAL NETWORK FUNCTIONS (VNF) IN A COMMUNICATION NETWORK - The method includes obtaining a first set of support and confidence parameters, identifying a first set of VNFs of a plurality of VNFs of the communication network based on the first set of support and confidence parameters, and determining association information by mining rules within VNFs of the first set of VNFs using the support and confidence parameters. A second set of VNFs, of the plurality of VNFs, are then selected based on the association information, and an operation of the communication network is controlled using the first set of VNFs and the second set of VNFs. | 2020-09-17 |
20200295971 | METHOD AND DEVICES FOR DATA TRANSMISSION IN SUBSTATION - Embodiments of the present disclosure relate to a data transmission method and associated devices. In the method, data collected by at least one monitoring device in a substation is received at a gateway. Further, a status of a connection between the gateway and a first network is detected, where the first network enables communication between the gateway and a server. Further, in response to detecting a disconnection between the gateway and the first network, the data is sent to a user device via a second network hosted by the gateway to enable the user device to forward the data to the server. | 2020-09-17 |
20200295972 | ADAPTIVE OTA LEAKAGE CANCELLATION FOR MMWAVE RADAR - Techniques provided herein are directed toward enabling short-range proximity detection using radar sensors by reducing or eliminating OTA leakage. Embodiments generally include performing spatial cancellation by using a plurality of transmit/receive pairs of antenna elements to implement analog and/or digital leakage cancellation on the transmit and/or receive side. According to some embodiments null space projection cancellation, OTA leakage tracking, or adaptive minimum variance distortionless response (MVDR) beamforming may be performed to help preserve of the OTA leakage cancellation efficacy over time. | 2020-09-17 |
20200295973 | METHOD FOR TRANSMITTING SRS, AND MOBILE TERMINAL FOR THE SAME - A method of transmitting a sounding reference symbol (SRS) at a user equipment (UE) includes receiving, from a base station, first information including information on at least one predetermined SRS sequence parameter configured in association with a frequency hopping pattern among SRS sequence parameters, generating an SRS sequence using a value of a parameter corresponding to a frequency hopping pattern configured in the UE with respect to the at least one predetermined SRS sequence parameter, and transmitting the SRS, to which the generated SRS sequence is applied, to the base station through SRS resources. | 2020-09-17 |
20200295974 | Serial Link Receiver with Improved Bandwidth and Accurate Eye Monitor - A receiver includes a decision circuit, a circuit to adjust an input signal of the decision circuit, a correction circuit and a control circuit. The decision circuit makes a data decision based on an input signal of the decision circuit. The circuit to adjust the input signal of the decision circuit adjusts the input signal of the decision circuit based on an input correction signal. The correction circuit combines a plurality of signals corresponding to different input correction parameters into a preliminary input correction signal. An input of the correction circuit is coupled to an output of the decision circuit. The control circuit maps the preliminary input correction signal into the input correction signal using a nonlinear code mapping. | 2020-09-17 |
20200295975 | INTEGRATING VOLTERRA SERIES MODEL AND DEEP NEURAL NETWORKS TO EQUALIZE NONLINEAR POWER AMPLIFIERS - The nonlinearity of power amplifiers (PAs) has been a severe constraint in performance of modern wireless transceivers. This problem is even more challenging for the fifth generation (5G) cellular system since 5G signals have extremely high peak to average power ratio. Nonlinear equalizers that exploit both deep neural networks (DNNs) and Volterra series models are provided to mitigate PA nonlinear distortions. The DNN equalizer architecture consists of multiple convolutional layers. The input features are designed according to the Volterra series model of nonlinear PAs. This enables the DNN equalizer to effectively mitigate nonlinear PA distortions while avoiding over-fitting under limited training data. The non-linear equalizers demonstrate superior performance over conventional nonlinear equalization approaches. | 2020-09-17 |
20200295976 | DATA GENERATION CIRCUIT AND TRANSMISSION DEVICE - According to one embodiment, a data generation circuit includes a storing circuit, and first and second selection circuits. The storing circuit is configured to store different data items and output the data items in different phases in response to clock signals. The first selection circuit is configured to select first data items one by one from the data items output from the storing circuit and output a first series of selected data items. The second selection circuit is configured to select second data items one by one, whose phase are different from the selected first data items, from the data items output from the storing circuit and output a second series of selected data items. | 2020-09-17 |
20200295977 | CONTINUOUS-TIME SAMPLER CIRCUITS - A continuous-time sampler has series-connected delay lines with intermediate output taps between the delay lines. Signal from an output tap can be buffered by an optional voltage buffer for performance. A corresponding controlled switch is provided with each output tap to connect the output tap to an output of the continuous-time sampler. The delay lines store a continuous-time input signal waveform within the propagation delays. Controlling the switches corresponding to the output taps with pulses that match the propagation delays can yield a same input signal value at the output. The continuous-time sampler effectively “holds” or provides the input signal value at the output for further processing without requiring switched-capacitor circuits that sample the input signal value onto some capacitor. In some cases, the continuous-time sampler can be a recursively-connected delay line. The continuous-time sampler can be used as the front end sampler in a variety of analog-to-digital converters. | 2020-09-17 |
20200295978 | EDGE ENHANCEMENT FOR SIGNAL TRANSMITTER - A signal transmitter circuit includes an output driver circuit configured to transmit a signal using a multi-level pulse amplitude modulation (PAM) scheme comprising a plurality of discreet signal levels. During operation, the output driver initiates a first transition of the signal to a first level of the multi-level PAM scheme from a second level of the multi-level PAM scheme, and initiates a second transition of the signal to the first level from a third level of the multi-level PAM scheme. The signal transmitter further includes a control circuit configured to control a slew rate of the signal transmitter circuit to cause the signal to reach a threshold voltage level at a first time, the first time occurring a first duration of time after the first transition is initiated, and to cause the signal to reach the threshold voltage level at a second time, the second time occurring the first duration of time after the second transition is initiated. | 2020-09-17 |
20200295979 | RADIO TRANSMISSION DEVICE AND RADIO RECEPTION DEVICE - A terminal is disclosed including a processor configured to map a phase tracking reference signal, PTRS, to at least one symbol used for an uplink shared channel starting from a leading symbol of the uplink shared channel; and a transmitter configured to perform transmission processing for the uplink shared channel and the PTRS. In other aspects, another terminal and a base station are also disclosed. | 2020-09-17 |
20200295980 | SOUNDING REFERENCE SIGNAL PROCESSING FOR LTE - A wireless communication receiver including a serial to parallel converter receiving an radio frequency signal, a fast Fourier transform device connected to said serial to parallel converter converting N | 2020-09-17 |
20200295981 | Method And Apparatus To Track Gain Variation In Orthogonal Frequency Division Multiplexing (OFDM) Systems - Gain variations during a packet can lead to significant performance degradation in communications systems that use high order quadrature amplitude modulation (QAM). A method and the associated apparatus track such variations in an OFDM system and completely eliminate any performance degradation. Gain estimation and compensation is employed with the use of pilot subcarriers in the payload of an OFDM data packet. Estimated pilot magnitude ratios are averaged, throughout the processing life of a packet, to yield accurate gain estimations. A gain compensation factor is used to adjust data carriers. An exclusion method is also employed to eliminate pilot carriers which contribute to noise. | 2020-09-17 |
20200295982 | DISPLAYING CONTENT ITEMS BASED ON DEVICE STATUS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for presenting content items. In one aspect, a method includes identifying an opportunity to present a content item at a device and in a manner that precludes a user from accessing content of one or more applications executing on the device. Data relating to a status of each of the one or more applications are identified. A level of urgency for a user to access content of the one or more applications is determined based on the data. A response to the opportunity to present a content item is selected based on the level of urgency for the user to access content of the one or more applications. The response is selected from a first response that causes presentation of the content item and a second response that precludes presentation of the content item. | 2020-09-17 |
20200295983 | NETWORK DEVICE, NETWORK COMMUNICATION SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - A network device includes circuitry configured to: generate log information; acquire a status notification from a device that records the log information, the status notification being designated by the device; change a processing mode of the log information, based on the acquired status notification; and transmit, to the device, based on the changed processing mode, the generated log information. | 2020-09-17 |
20200295984 | DATA DRIVEN SYSTEMS AND METHODS TO ISOLATE NETWORK FAULTS - Methods, systems and computer readable media for isolating network faults are provided. A data driven automation services module is provided Including a data connector, a data driven policy designer and a data driven self-service engine. The data connector collects data from the plurality of network data sources and integrates the data into shared communities for insight development. The data driven policy designer creates and stores templates and develops policies to implement service tasks to identify and isolate network problems. The data driven self-service engine integrates the network and its orchestration capabilities with big data technology to develop a plurality of microservices to perform service tasks. | 2020-09-17 |
20200295985 | CONTEXT BASED NOTIFICATIONS USING MULTIPLE PROCESSING LEVELS IN CONJUNCTION WITH QUEUING DETERMINED INTERIM RESULTS IN A NETWORKED ENVIRONMENT - In some implementations, a notification for presentation to a user is identified. An action for the user to perform in response to receiving the notification is identified, where the action is associated with the notification. Context data generated using sensor data from one or more devices associated with the user is received. The context data indicates a current context of the user, where the context data indicates at least one of an activity of the user or a physiological state of the user. The context data is used to evaluate an ability of the user to perform the action associated with the notification in the current context. A manner of providing of the notification by the one or more devices associated with the user is customized based on the evaluation of the ability of the user to perform the action. | 2020-09-17 |
20200295986 | DYNAMIC MONITORING ON SERVICE HEALTH SIGNALS - In non-limiting examples of the present disclosure, systems, methods and devices for monitoring telemetry data from a cloud-based application service are presented. Telemetry data for a plurality of operations for the cloud-based application service may be analyzed, wherein the analysis comprises comparing a first time series with a second time series, and where data from the second time series relates to operations that were executed prior in time compared with execution of operations related to the first time series. One or more operational changes in the cloud-based application service may be identified based on the analysis, and at least one telemetry monitor may be dynamically configured based on the one or more operational changes that were identified. | 2020-09-17 |
20200295987 | NETWORKING VISUALIZATIONS THAT UPDATE DATA MODEL AND DEPLOY VISUALIZATION - Systems and methods for generating a visual display of a topology of servers, user input may be received for updating configurations of impacted servers. An example method may include providing, by a processing device, a graphical user interface comprising a plurality of nodes associated with a network; receiving, via the graphical user interface, user input requesting a change to at least one of the plurality of nodes or to the network; determining one or more impacted nodes of the plurality of nodes impacted by the change; generating a physical change instruction and a configuration instruction for the one or more impacted nodes, wherein the physical change instruction represents a change to physical connectivity of one of the one or more impacted nodes and the configuration instruction represents a change of a configuration value of one of the one or more impacted nodes; and upon determining that the physical change instruction has been implemented on the one or more impacted nodes, initiating, by the processing device, the configuration instruction to change the configuration value. | 2020-09-17 |
20200295988 | SYSTEMS AND METHODS FOR AUTOMATICALLY CONFIGURING NETWORK ISOLATION - The system and methods described herein provided for automatically configuring a network port at a first network device with isolation parameter. A network device receives a network access message that includes network access parameters to be used when a second network device communicates with the first network device. The network device determines network isolation parameter based on the network access parameters to be used for a plurality of network packets received from the second network device. The network device determines whether the port of the network device is configured with the network isolation parameter, and, if not so configured, the network device automatically configures the port with the network isolation parameter. | 2020-09-17 |
20200295989 | PEER-TO-PEER NETWORK BOOST SYSTEM - A peer-to-peer (P2P) network boost system for boosting the transmission of specific packets between at least two electronic devices on the internet includes at least one boosting node and a hardware boosting device, wherein the hardware boosting device includes a geographical location judging module, a P2P matching module and a transmitting module. The boosting node is configured for receiving the specific packets and planning the transmitting route of the specific packet. The hardware boosting device judges the specific packets from a plurality of packets sent by the electronic device and sends the specific packets to the others electronic devices through the boosting node. The P2P network boost system achieves the network boosting function and optimizes the transmitting route through the hardware boosting device and the boosting node to improve the connecting quality and reduce the connecting cost. | 2020-09-17 |
20200295990 | SYSTEMS AND METHODS FOR INTENT-BASED SELF CONFIGURATION OF VIRTUAL NETWORK FUNCTIONS - Methods, systems and computer readable media for self-configuration of virtual network functions based on user intent are provided. In a network, a destination with an initial offering having a set of initial offering attributes is provided. A first virtual network function is connected to the destination that is capable of advertising the initial offering. A source having a set of need attributes defined by a user is also provided. The initial offering is advertised, and the source is connected to the first virtual network function. A second virtual network function with an added value is added and a modified offering having a set of modified attributes based on the set of initial offering attributes and the added value is created. The initial offering and the modified offering is advertised to the source. The best offering from the initial offering and modified offering is selected based on the first set of need attributes, the first set of modified offering attributes and the set of initial offering attributes. The first source is then connected to the first best offering. | 2020-09-17 |
20200295991 | ADAPTIVE NETWORK INTERFACE CONFIGURATION - Within a data center, network interfaces may vary greatly. Network controllers from various manufacturers may support different capabilities and may be implemented as different types of hardware devices. Embodiments provide techniques for adaptive configuration of a network interface that is migrated from a source IHS to a target IHS. A network migration tool evaluates discrepancies between the source network interface configuration and the target network interface configuration. Based on the identified discrepancies, the network migration tool determines whether the target network interface may be adapted to be compatible, or at least not incompatible, with the source network interface. Multiple IHSs may be evaluated as potential targets for migration to identify a target IHS that utilizes a target network interface that most closely aligns with the configuration of the source network interface, where this alignment includes adaptive modifications of the target network interface. | 2020-09-17 |
20200295992 | SYSTEM AND METHOD FOR SUPPORTING FAST HYBRID RECONFIGURATION IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - A hybrid reconfiguration scheme can allow for fast partial network reconfiguration with different routing algorithms of choice in different subparts of the network. Partial reconfigurations can be orders of magnitude faster than the initial full configuration, thus making it possible to consider performance-driven reconfigurations in lossless networks. | 2020-09-17 |
20200295993 | DOWNLINK PERFORMANCE OPTIMIZATIONS IN WIRELESS NETWORKS - Techniques for wireless optimizations are provided. A first set of values for a set of network benchmarks is received from a sensor device, where the set of network benchmarks define network performance dimensions, and include a number of retries needed to successfully transmit data. A second set of values for the set of network benchmarks is received from a wireless access point. The first set of values is mapped against the second set of values in an n-dimensional space, and an outlier dimension is identified, based on analyzing the mapped first and second sets of values. The wireless access point is then reconfigured, based on the identified outlier dimension. | 2020-09-17 |
20200295994 | DYNAMIC ACTION DASHLET FOR REAL-TIME SYSTEMS OPERATION MANAGEMENT - The present technology provides a system and method for automating on-boarding and management of IoT devices on data network. The disclosed technology further provides an interactive representation of various performance attribute with automatically generated actionable alert based on operator defined rules and performance-specific threshold values. Furthermore, disclosed technology provides for single-click activation of suggested actions at scale directed at once to all device units within one or more device groups reported in critical state. In this way the proposed technology enables rapid restoration of a network state. Offending device(s) may then be easily identified, from device units within the device category isolated in a resolution space, and managed according to one or more device-specific actionable alerts automatically generated on the offending device. | 2020-09-17 |
20200295995 | DISTRIBUTED TOOL FOR DETECTING STATES AND STATE TRANSITIONS IN REMOTE NETWORK MANAGEMENT PLATFORMS - A computing system may involve a time-series server device and computing devices. The time-series server device may be configured to: receive and store pre-defined trigger configurations; receive and store time-series data, wherein the pre-defined trigger configurations define states and/or state transitions for the received time-series data; apply, by way of a trigger engine, the pre-defined trigger configurations to the received time-series data to determine observed states and/or state transitions in the time-series data; and store, in transition storage, representations of the observed states and/or state transitions. One or more applications operating on computing devices may be configured to: transmit the pre-defined trigger configurations to the time-series server; transmit a stream of the time-series data to the time-series server; and repeatedly poll and receive, by way of a plurality of worker threads, the representations of the observed states and/or state transitions from the transition storage. | 2020-09-17 |
20200295996 | SYSTEMS AND METHODS FOR DYNAMICALLY CONFIGURING A NETWORK SWITCH FOR MONITORING - Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an IP address associated with a network switch. Embodiments may also include probing the network switch based, at least in part, on the received IP address to obtain first information regarding the network switch, wherein the first information includes at least one of a vendor of the network switch, a model of the network switch, and a firmware version of the network switch. Embodiments may further include configuring the processor to monitor the network switch based on processing of the first information. | 2020-09-17 |
20200295997 | DEVICE MANAGEMENT CLUSTERING - Various example embodiments for supporting device management clustering are presented. In at least some example embodiments, device management clustering is configured to enable a set of devices to be managed as a group. In at least some example embodiments, device management clustering is configured to enable a set of devices to be managed as a group based on access to only one of the devices in the set of devices to be managed rather than based on access to all of the devices in the set of devices to be managed. In at least some example embodiments, device management clustering includes creating a device management cluster including a set of devices and performing device management for the set of devices based on the device management cluster. | 2020-09-17 |
20200295998 | METHODS, CONTROLLER MANAGER AND CONTROLLER AGENT FOR ENABLING A CONNECTION BETWEEN A SWITCH OF A COMMUNICATION NETWORK AND A SWITCH CONTROLLER - A controller manager, a controller agent and methods therein, for enabling a connection between a switch of a communication network and a switch controller that performs logic switch operations. The controller manager obtains from the controller agent, measurements related to connectivity to a set of switch controllers. The controller manager then selects at least one switch controller in the set of switch controllers based on the obtained measurements, to control said switch, and instructs the controller agent to set up or route a connection between the switch and the selected at least one switch controller. | 2020-09-17 |
20200295999 | STANDARDIZATION OF NETWORK MANAGEMENT ACROSS CLOUD COMPUTING ENVIRONMENTS AND DATA CONTROL POLICIES - Network management of cloud computing environments subject to different data control policies is standardized in a manner that ensures compliance with the data control policies. An execution service remote from a cloud computing environment being managed implements workflows to manage different aspects of the cloud computing environment, including monitoring, incident management, deployment, and/or buildout. The execution service issues requests to perform management actions for network devices in the cloud computing environment. A device access service in the cloud computing environments receives the requests, and, in response to the requests, the device access service obtains access control data to access the network devices and perform the requested management actions for the network devices. | 2020-09-17 |
20200296000 | NETWORK MODIFICATION IMPACT PREDICTION - A system may include multiple network devices that communicate within a network domain, and a centralized control device configured to perform operations. The operations may include receive a request to modify one or more policies regarding traffic within the network domain, and in response to receiving the request, capture a snapshot of the network domain before modification of the one or more policies. The operations may also include, in response to receiving the request, generate a prediction of the network domain after modification of the one or more policies, and compare the snapshot of the network domain to the prediction of the network domain. The operations may additionally include, based on the comparison of the snapshot and the prediction, provide a predicted impact on the network domain, and, based on the predicted impact being above a threshold, provide an indication that the predicted impact is above the threshold. | 2020-09-17 |
20200296001 | CONCURRENT NETWORK REFORMATION FOR LOW-POWER AND LOSSY NETWORKS - In one embodiment, a device in a mesh network rooted at a root node receives a subroot selection notification. The subroot selection notification indicates that the device should function as a root of a sub-directed acyclic graph (DAG) were a power outage to occur. The device determines that a power outage has occurred. The device forms, after determining that a power outage has occurred, a sub-DAG that is rooted at the device by establishing one or more other devices in the mesh network as routing children of the device in the sub-DAG. The device joins the sub-DAG to a DAG rooted at the root node. | 2020-09-17 |
20200296002 | Methods and Apparatus for Communication Network - In some implementations of this invention, the performance of a network of reinforcement learning agents is maximized by optimizing the communication topology between the agents for the communication of gradients, weights or rewards. For instance, a sparse Erdos-Renyi network may be employed, and network density may be selected in such a way as to maximize reachability and to minimize homogeneity. In some cases, a sparse network topology is employed for massively distributed learning, such as across entire fleets of autonomous vehicles or mobile phones that learn from each other instead of requiring a master to coordinate learning. | 2020-09-17 |
20200296003 | DATA AGGREGATION BASED ON A HEIRARCHICAL TREE - At each delegate device and each non-delegate device of a logical device hierarchy, a data cube is generated. The logical device hierarchy includes more than one level, and each level includes one or more groups, and each group includes one delegate device and one or more non-delegate devices. At each delegate device, data cubes are received from the one or more non-delegate devices associated with the same group. At each delegate device, data cubes are received from delegate devices of a different group, and that delegate device is the parent of the delegate devices associated with a different group. At each delegate device, the received data cubes are aggregated into a weighted data cube. From each delegate device, the weighted data cube are outputted to the parent of the delegate device. | 2020-09-17 |
20200296004 | Measuring the Impact of Network Deployments - In one embodiment, a computing system may receive user inputs from an interactive user interface specifying a communication network and a geographic region of interest. The user interface may retrieve measurements of the communication network and a network deployment taken on the communication network. The system may generate project for measuring impact of the network deployment on the geographic region of interest. The system may access network performance data associated with time periods before and after the network deployment. The system may determine whether the impact is greater than a threshold based on incremental network metrics which may be determined based on the accessed network performance data and using one or more measurement methodologies. The system may send instructions for presenting a visualization of the impact within the user interface. The visualization may describe the geographic region of interest and incremental metrics with respect to the geographic region of interest. | 2020-09-17 |
20200296005 | SYSTEMS AND METHODS FOR ENHANCED INTENT-BASED SELF CONFIGURATION OF VIRTUAL NETWORK FUNCTIONS - Methods, systems and computer readable media for self-configuration of virtual network functions based on user intent are provided. A network having a plurality of virtual network functions each having a set of initial offering attributes is provided. An added virtual network function having a client and a set of added offering attribute is connected to a first virtual network function from the plurality of virtual network functions. Each initial set of offering attribute and the added offering attribute are advertised to each of the plurality of virtual network functions and the added virtual network function. An aggregate need of the client of the added virtual network function is determined and advertised. A second virtual network function from the plurality of virtual network functions is sought based on the aggregate need of the added virtual network function. The added virtual network function is connected to the second destination virtual network function. | 2020-09-17 |
20200296006 | Measuring the Impact of Network Deployments - In one embodiment, a computing system may determine network metrics for geographic regions connected by a communication network. The geographic regions may include a geographic region of interest impacted by a network deployment. The system may identify candidate control regions by clustering geographic regions of into a first group based on metric feature of network metric shared by the geographic regions. The system may select control regions by identifying a second group of geographic regions from the first group of geographic regions based on a comparison between the region of interest and each of the first group of geographic regions. The system may compare a first network metric of the geographic region of interest to first a metric baseline determined based on the one or more control regions. The system may determine whether the first network metric has a change greater than a threshold after the network deployment. | 2020-09-17 |
20200296007 | ENRICHED FLOW DATA FOR NETWORK ANALYTICS - Systems and methods provide for enriching flow data to analyze network security, availability, and compliance. A network analytics system can capture flow data and metadata from network elements. The network analytics system can enrich the flow data by in-line association of the flow data and metadata. The network analytics system can generate multiple planes with each plane representing a dimension of enriched flow data. The network analytics system can generate nodes for the planes with each node representing a unique value or set of values for the dimensions represented by planes. The network analytics system can generate edges for the nodes of the planes with each edge representing a flow between endpoints corresponding to the nodes. The network analytics system can update the planes in response to an interaction with the planes or in response to a query. | 2020-09-17 |
20200296008 | METHODS, SYSTEMS AND APPARATUS FOR CUSTOM INTERFACE SPECIFICATION IN A CLOUD MANAGEMENT SYSTEM - Methods, apparatus and articles of manufacture for custom interface specification in a cloud management system are disclosed. An example cloud management system includes: a first interface to communicate with a second interface external to the cloud management system; and a host to manage requests from the second interface and allocate resources to the second interface as a reverse proxy for the second interface with respect to a backend. The example host is to at least: add, at the request of the second interface, an endpoint with respect to the second interface; fetch, at the request of the second interface, data for the endpoint from the backend, the backend identified for the endpoint based on metadata in a component registry; and provide the data from the backend to the second interface. | 2020-09-17 |
20200296009 | COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS - A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces are presented via the touchscreen. The user interfaces include a security interface that provides control of functions of the security system and access to data collected by the security system, and a network interface that provides access to network devices. A camera at the premises is coupled to the touchscreen via a plurality of interfaces. A security server at a remote location is coupled to the touchscreen via a plurality of channels and a plurality of protocols. The channels include a short message service (SMS) channel, a remote control channel, and an asynchronous event channel. The security server comprises a client interface through which remote client devices exchange data with the touchscreen and the security system. | 2020-09-17 |
20200296010 | CROWD SOURCED SENSOR DATA MANAGEMENT SYSTEMS - A sensor data aggregation system is presented. The aggregation system can include a sensor interface configured to obtain sensor data from multiple sensing devices (e.g., cell phone, security cameras, vehicles, etc.) associated with an event. An aggregation server compiles the sensor data into one or more event feeds representing a dynamic, immersive sensory experience of the event. The event feed can then be presented to one or more social groups where social group members can affect the dissemination of sensor data. | 2020-09-17 |
20200296011 | SATISFYING SERVICE LEVEL AGREEMENT METRICS FOR UNKNOWN APPLICATIONS - In general, the disclosure describes techniques for assigning traffic originating from an unknown application to a link based on known application quality of experience metrics. For instance, a network device may receive an application data packet of a data flow for an application and determine an application signature of the application data packet. The network device may determine whether the application signature matches an entry in an application signature database, and if the application signature does not match, the network device may identify a class of the application based on one or more characteristics of the application data packet. The network device may then assign the application data packet of the data flow to a first link of a plurality of links based on the class of the application and quality of experience (QoE) metrics for each link. | 2020-09-17 |
20200296012 | ON-DEMAND PROBING FOR QUALITY OF EXPERIENCE METRICS - In general, the disclosure describes techniques for evaluating application quality of experience metrics over a software-defined wide area network. For instance, a network device may receive an application data packet of a data flow for an application. In response to receiving the application data packet, the network device may assign the data flow to a first link of a plurality of links and initiate a probing process for the data flow on the first link to determine one or more quality of experience (QoE) metrics for the first link. The network device may, at a later time, detect that the data flow is no longer being received. In response to detecting that the data flow is no longer being received, the network device may cease the probing process for the data flow on the first link. | 2020-09-17 |
20200296013 | REMOTE WIRELESS SNIFFER MANAGEMENT - An example method may include receiving, from a wireless sniffer, sniffer data for a window of time, where the sniffer data may include wireless signal data. The method may also include obtaining corresponding access point data from an access point in a wireless network for at least part of the window of time for which the sniffer data is received. The method may additionally include analyzing the sniffer data and the corresponding access point data to assess performance of the wireless network. | 2020-09-17 |
20200296014 | SYSTEMS AND METHODS FOR PROVIDING INDIVIDUALIZED COMMUNICATION SERVICE - A method for providing individualized communication service includes (1) recognizing a first client being communicatively coupled to a first local communication network, (2) determining an identity of the first client, (3) transporting first data between the first client and a first operator communication network, using the first local communication network in accordance with a first service profile associated with the first client, and (4) transporting the first data using the first operator communication network in accordance with the first service profile. | 2020-09-17 |
20200296015 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - An analysis ECU acquires information related to a first flow and information related to a second flow, the first flow and the second flow organizing packets transferred in a monitored system into respective groups. The analysis ECU acquires information related to a conversion that takes the first flow as input and the second flow as output. The analysis ECU acknowledges alert information generated in the monitored system and including information capable of identifying at least one flow. The analysis ECU generates, when the second flow is identified by the alert information, route information that includes at least one of the information related to the conversion and the information related to the first flow associated with the second flow in the information related to the conversion. | 2020-09-17 |
20200296016 | METHODS AND APPARATUS FOR CAPTURING AND/OR USING PACKETS TO FACILITATE FAULT DETECTION - Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets. | 2020-09-17 |
20200296017 | DYNAMICALLY VISUALIZING MICROSERVICES MESH TOPOLOGIES - Implementations for dynamically visualizing microservice mesh topologies are described. An example method may include receiving a first request for a first type of visualization of a microservice mesh comprising nodes, obtaining first information regarding the nodes of the microservice mesh corresponding to the first type of visualization, providing, in a graphical user interface (GUI), the first type of visualization of the microservice mesh using the first information, receiving a second request for a second type of visualization of the microservice mesh, obtaining second information regarding the nodes of the microservice mesh corresponding to the second type of visualization, the second type of visualization different form the first type of visualization, and providing, via an update to the GUI, the second type of visualization of the microservice mesh using the second information. | 2020-09-17 |
20200296018 | METHODS AND APPARATUS TO CREDIT STREAMING ACTIVITY USING DOMAIN LEVEL BANDWIDTH INFORMATION - Methods and apparatus to credit streaming activity using domain level bandwidth information are disclosed. An example apparatus includes a packet collector to collect data packets via a network interface, and a traffic analyzer to determine domain data of the data packets and associate bandwidth usage values with the domain data to define bandwidth usage data by domain. The apparatus also includes a bandwidth usage data storage to store the associated bandwidth usage data by domain. | 2020-09-17 |
20200296019 | DETERMINING PACKET LOSS IN A FRONTHAUL LINK - It is presented a method for determining packet loss in a fronthaul link of a radio access network. The method being performed in a packet loss determiner and comprising the steps of: obtaining a set of user equipments, UEs, that are all scheduled to communicate over a radio interface in a scheduling interval; creating a subset of UEs, comprising a number of UEs, from the set of UEs, that are the UEs in the set being most vulnerable to fronthaul packet loss; determining, for each UE in the subset of UEs, whether the communication in the scheduling interval was unsuccessful; and determining a packet loss in the fronthaul link depending on to what extent each one of the UEs in the subset of UEs is determined to have had unsuccessful use of the radio interface. | 2020-09-17 |
20200296020 | SEMICONDUCTOR DEVICE AND OPERATING METHOD THEREOF - A semiconductor device and an operating method thereof are provided. An operating method of a semiconductor device, includes monitoring a plurality of request packets and a plurality of response packets that are being transmitted between a master device and a slave device; detecting a target request packet that matches desired identification (ID) information from among the plurality of request packets; counting the number of events of a transaction including the target request packet by using an event counter; counting the number of request packets whose corresponding response packets are yet to be detected, from among the plurality of request packets by using a Multiple Outstanding (MO) counter; determining whether an MO count value of the MO counter is valid; and if the MO count value is invalid, resetting the event counter. | 2020-09-17 |
20200296021 | ANALYSIS APPARATUS AND ANALYSIS METHOD - A non-transitory computer-readable recording medium has stored a program that causes a computer to execute a process including: capturing transmission packets transmitted from a first apparatus to a second apparatus, and response packets including a timestamp counted at an interval; estimating the interval based on arrival times of two response packets and timestamps thereof; estimating a count time of a first timestamp of a first response packet, based on a first arrival time of one transmission packet, a second arrival time of the first response packet, and the first timestamp; calculating a reference time based on the count time, the first timestamp, and the interval; estimating a transmission time of the first response packet, based on the reference time, the first timestamp, and the interval; and estimating a communication time of the first response packet, based on the transmission time and the second arrival time. | 2020-09-17 |
20200296022 | METHOD AND APPARATUS FOR DETECTING TRAFFIC - Embodiments of the present disclosure relate to a method and apparatus for detecting traffic. The method includes: acquiring traffic information of at least two dimensions of a target IP; determining whether the traffic information of the at least two dimensions contains traffic information exceeding an abnormal traffic threshold of a corresponding dimension of the target IP; and in response to determining that the traffic information of the at least two dimensions contains the traffic information exceeding the abnormal traffic threshold of the corresponding dimension, determining that the traffic of the target IP is abnormal. | 2020-09-17 |
20200296023 | REAL-TIME APPLICATION-DRIVEN SYNTHETIC PROBING - In general, the disclosure describes techniques for evaluating application quality of experience metrics over a software-defined wide area network. For instance, a network device may receive an application data packet of a data flow for an application and send a first set of probe packets, configured according to an initial probing profile, over each of one or more links, The network device may monitor the data flow to determine one or more characteristics of the data flow and generate an updated probing profile based on the one or more characteristics of the data flow. The network device may then send a second set of one or more probe packets, configured according to the updated probing profile, over each of the one or more links. | 2020-09-17 |
20200296024 | SYSTEM AND METHOD FOR NETWORK COMMUNICATION MONITORING - A system for network communication monitoring, preferably including one or more network receivers, packet decoders, stream mergers, and/or memory. A method for network communication, preferably including receiving bitstreams, decoding packets, and/or merging packet streams. | 2020-09-17 |
20200296025 | Route Processing Method and Apparatus, and Data Transmission Method and Apparatus - A route processing method is implemented by a first PE device and includes receiving a VPN route that includes a second SRv6 VPN SID and a third SRv6 VPN SID from a second PE device; determining that the second SRv6 VPN SID is the same as a first SRv6 VPN SID; and establishing a second path based on the third SRv6 VPN SID, where when a first path directly connected to the first PE device and the second CE device is faulty, the second path is used by the first PE device to forward a packet to the second CE device. | 2020-09-17 |
20200296026 | HIGH PERFORMANCE SOFTWARE-DEFINED CORE NETWORK - A system comprising nodes configured to form a network comprising virtual links in an overlay network provisioned over an underlay network. The system includes at least one virtual machine (VM) at each node. The VM is coupled to the network and to a tenant of the node. The VM includes routing algorithms representing routing behaviors. At least one routing algorithm is configured to use feedback data of a set of virtual links to determine and continually adapt an optimal route through the network. The VM is configured to control routing of traffic flows according to the optimal route. | 2020-09-17 |
20200296027 | ENABLEMENT OF MULTI-PATH ROUTING IN VIRTUAL EDGE SYSTEMS - The technology disclosed herein enables multi-path routing in virtual edge systems of a virtual network environment. In a particular embodiment, a method provides establishing a connection for a communication with a client outside of the virtual network environment through a first virtual edge system of a plurality of virtual edge systems. The method further provides generating state information about the connection that indicates properties of the connection with respect to the first virtual edge system and updating a state information base of the first virtual edge system with the state information. Also, the method provides transferring the state information to one or more other virtual edge systems of the plurality of virtual edge systems and updating respective state information bases of the one or more other virtual edge systems with the state information. | 2020-09-17 |
20200296028 | PROACTIVE PREFIX DISAGGREGATION FOR TRAFFIC ASSURANCE IN DATA CENTER ROUTING - The present disclosure provides a proactive method of prefix disaggregation in a network fabric when one or more communication failures are detected. In one aspect, a method includes determining, by a first node of a network fabric, a corresponding prefix disaggregation policy for at least one second node of the network fabric, the corresponding prefix disaggregation policy identifying one or more network prefixes that are inaccessible via the first node when at least one communication failure is detected in association with the first node; sending the corresponding prefix disaggregation policy to the second node; and causing the second node to implement the prefix disaggregation policy upon detecting the at least one communication failure. | 2020-09-17 |
20200296029 | PLANNING AND MANAGING NETWORK PROBES USING CENTRALIZED CONTROLLER - In general, the disclosure describes techniques for measuring edge-based quality of experience (QoE) metrics. For instance, a network device may construct a topological representation of a network, including indications of nodes and links connecting the nodes within the network. For each of the links, the network device may select a node device of the two node devices connected by the respective link to measure one or more QoE metrics for the respective link, with the non-selected node device not measuring the QoE metrics. In response to selecting the selected node device, the network device may receive a set of one or more QoE metrics for the respective link for data flows flowing from the selected node device to the non-selected node device. The network device may store the QoE metrics and determine counter QoE metrics for data flows flowing from the non-selected node device to the selected node device. | 2020-09-17 |
20200296030 | Optimized Datapath Troubleshooting - A method is implemented by a switch in a Software Defined Networking (SDN) network to trace packets, where the switch includes a packet processing pipeline that includes a plurality of flow tables. The method includes receiving a packet, determining, at a first flow table of the packet processing pipeline, whether the packet is a trace packet that was recirculated based on content of a first field associated with the packet, and in response to a determination that the packet is trace packet that was recirculated, setting a first field associated with the packet to indicate that tracing is disabled for the packet, setting a second field associated with the packet to indicate that tracing is enabled for the packet, determining a flow table of the packet processing pipeline from which the packet was recirculated, and directing the packet to the flow table from which the packet was recirculated. | 2020-09-17 |
20200296031 | FLOW CONTROL DEVICE, COMMUNICATION SYSTEM, FLOW CONTROL METHOD, AND RECORDING MEDIUM - Provided is a flow control device for suppressing a consumption of a network bandwidth in multipoint-to-multipoint communication. The flow control device is a device for controlling a plurality of flow-processing devices that process a packet for predetermined communication. The flow control device include first means for calculating, for each of predetermined flow-processing devices located at an edge to an external network, a shortest path to another of the predetermined flow-processing devices, second means for determining, based on a number of times a link between flow-processing devices is included in the shortest path, a candidate link used in a communication path for the predetermined communication; and third means for calculating a candidate communication path for the predetermined communication, based on the determined candidate link. | 2020-09-17 |
20200296032 | MULTI-LAYER LSP CONTROL METHOD AND APPARATUS - Disclosed are a multi-layer LSP control method and apparatus. The method comprises: acquiring a label switched path (LSP) addition request, wherein the LSP addition request carries identifier information for identifying a layer associated group that the LSP is to be added to; and in response to the LSP addition request, adding the LSP to the layer associated group, wherein the layer associated group comprises: an upper-layer LSP and several lower-layer LSPs. | 2020-09-17 |
20200296033 | NETWORK SERVICES ACROSS NON-CONTIGUOUS SUBNETS OF A LABEL SWITCHED NETWORK SEPARATED BY A NON-LABEL SWITCHED NETWORK - In a first enclave of a label switching network (LSN), a protocol data unit (PDU) of the LSN is formatted to include a network service field specifying a service to be applied to the PDU. The service field can be positioned between PDU data link layer and network layer fields. The PDU specifies PDU routing/forwarding information for a path in the LSN ending in an LSN second enclave, and routing/forwarding for a destination between path segments in a non-LSN. The PDU is communicated from the first enclave, via the non-LSN, to the second enclave in accordance with the routing/forwarding information for the destination between path segments in the non-LSN. In the second enclave, each network service specified for the PDU is determined and then applied to the PDU. The second enclave transmits the network serviced PDU from the second enclave in accordance with the routing/forwarding information of the PDU in the label switching network. | 2020-09-17 |