45th week of 2017 patent applcation highlights part 59 |
Patent application number | Title | Published |
20170324553 | SECURE PAYMENT AND AUTHENTICATION SYSTEM HAVING SECURITY FUNCTION ENHANCED BY USING QUANTUM CRYPTOGRAPHY - Disclosed herein are a quantum cryptography-based cryptographic communication system and an authentication, payment and transaction system via a relay device between a communication device and a server. A relay device for quantum cryptography authentication includes an optical receiver unit, an optical transmission unit, and a processor. The processor includes a quantum signal control unit, a user authentication unit, and a random number generation unit. The optical receiver unit receives a series of second quantum signals generated in such a manner that a series of first quantum signals generated by a first quantum filter and sent from a communication device pass through the second quantum filter of the relay device or a reception side, and the optical transmission unit transfers the series of second quantum signals to a server. | 2017-11-09 |
20170324554 | Public Key Cryptosystem Based On Partitioning Of Galois Field Elements - A post-quantum, public key cryptosystem is described which is polynomial based and where the private key polynomial has coefficients from a sub-set of Galois field elements and plain text message polynomials have coefficients from a second sub-set of Galois field elements. The public key polynomial is constructed using the inverse of the private key polynomial and a randomly chosen polynomial having coefficients chosen from a third sub-set of Galois field elements. Cipher texts are constructed using the public key and randomly chosen session key polynomials. Other more complicated embodiments are described. For implementation a small prime base field such as 2, 3 or 5 will usually be used in constructing the prime power Galois field. The system has the advantage of relatively small public key sizes. | 2017-11-09 |
20170324555 | SYSTEM AND METHOD FOR PREEMPTIVE SELF-HEALING SECURITY - The present system and method allow for preemptive, self-healing computer security. The system includes a user device processor and a PSS server processor. The two processors perform an initial Data Structure & Key Mutation (DSKM) method and an interval DSKM method at a given interval to protect secret information and prevent its exposure by attackers. When a user requests a site or service that is an attractive target for attackers, such as a bank site or monetary transfer service, the processors perform a Man in the Browser attack prevention method. When a packet is received or generated, the processors perform a Deep Protocol and Stateful Inspection and Prevention method to prevent receipt of malicious packets or the loss of sensitive information. Various forensics modules allow accurate forensic examination of the type, scope, and method of attack, as well as real-time protection of cloud-based services. | 2017-11-09 |
20170324556 | METHOD AND SYSTEM FOR CHEON RESISTANT STATIC DIFFIE-HELLMAN SECURITY - A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≦48. | 2017-11-09 |
20170324557 | INFORMATION PROCESSING APPARATUS AND METHOD FOR AUTHENTICATING MESSAGE - An information processing apparatus includes a shared information generation unit for generating shared information via a network, a communication unit configured to receive a message, a shared information verification unit configured to compare shared information in the message with the information generated by the shared information generation unit, and verify validity of the shared information in the message based on the comparison, a security code generation unit for generating a security code based on the shared information, a security code verification unit configured to compare a security code in the message with the security code generated by the security code generation unit, and verify correctness of the shared information in the message based on the comparison, and a processing determination control unit configured to determine normality of the message on the based on the verification by the shared information verification unit and the verification by the security code verification unit. | 2017-11-09 |
20170324558 | MANAGEMENT DEVICE, KEY GENERATING DEVICE, VEHICLE, MAINTENANCE TOOL, MANAGEMENT SYSTEM, MANAGEMENT METHOD, AND COMPUTER PROGRAM - An automobile is equipped with a management device including a communication part for communicating with an ECU mounted on an automobile, an encryption processor for generating an encrypted key by encrypting a key, a key generation part for generating the key, and a key storage unit for storing the key generated by the key generation part. The communication part transmits the encrypted key to the ECU, while the encryption processor encrypts the key generated by the key generation part. | 2017-11-09 |
20170324559 | PAIRING PROCEDURE - To automate establishment of an ad hoc connection between a user apparatus and a device, username-password pairs and identifying information-code pairs are maintained in a database server, and the user apparatus sends an inquiry comprising identifying information of the device and a username and a password of a user of the user apparatus, and receives in a response a code for establishing the ad hoc connection. | 2017-11-09 |
20170324560 | Method and Server for Providing Transaction Keys - A method and a server for providing transaction keys for a transaction system includes transaction units which use pre-delivered transaction keys, and are provided by a key provisioning server and wherein the transaction key usage is checked by a transaction checking server. A transaction key is derived from a master key of a transaction unit, wherein a varying derivation parameter is used in the step of deriving. The step of deriving comprises a first sub step of deriving a key from the master key and a second sub step of deriving the transaction key from the derived key. The first sub step or the second sub step of deriving is performed dependent on a security level of the transaction unit. | 2017-11-09 |
20170324561 | SECURE APPLICATION ATTACHMENT - To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token is received. A certificate with a public key and a private key is created and the public key is sent to the application. An application token that is encrypted using the public key is received from the application. The application token is unencrypted using the private key and compared to the client token. In response to the unencrypted application token matching the client token, an approval message is sent to the client to establish the communication session. The application can then establish a secure communication session with the client. | 2017-11-09 |
20170324562 | RECOVERY AGENTS AND RECOVERY PLANS OVER NETWORKS - Examples include sending and receiving recovery agents and recovery plans over networks. Some examples include receiving a recovery request over a network from a requestor, sending a response to the requestor over the network, sending an executable copy of a recovery agent with a validation measure to the requestor, establishing an encrypted connection with the requestor, receiving a second request from the requester over the encrypted connection, determining a recovery plan that includes a command executable by the recovery agent, and sending the recovery plan to the requester over the encrypted connection. In some examples, the recovery request includes data that identifies the requester and the response and the recovery plan are based on the data identifying the requester. | 2017-11-09 |
20170324563 | ENCRYPTED TEXT VERIFICATION SYSTEM, METHOD, AND RECORDING MEDIUM - In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result. | 2017-11-09 |
20170324564 | SYSTEMS AND METHODS FOR ENABLING TRUSTED COMMUNICATIONS BETWEEN ENTITIES - Systems and methods are described that enable trusted communications between two entities. In one implementation, a server for communicating with a device may include one or more processors configured to receive data and a device signature from the device. The device signature may be generated based on at least a first portion of the data. One or more processors may be further configured to transmit the data and the device signature to a second server and receive a second server signature from the second server. The second server signature may be generated based on at least a second portion of the data and transmitted to the server after the second server verified the device signature. Further, one or more processors may be configured to verify the second server signature and process the data. | 2017-11-09 |
20170324565 | INTER-WORKSPACE COMMUNICATIONS - Systems, methods, and software can be used to access an enterprise resource. In some aspects, configuration information for an enterprise application is received at an enterprise mobility management (EMM) client on a mobile device. A certificate that includes at least a portion of the configuration information is generated. The certificate is installed in an enterprise workspace on the mobile device. A configuration application is executed in the enterprise workspace on the mobile device to configure the enterprise application. | 2017-11-09 |
20170324566 | UNIFIED ENCRYPTION CONFIGURATION MANAGEMENT AND SETUP SYSTEM - The present technology relates to the field of configuration and setup of encrypted computer network transmission systems. In particular, the present technology relates to setting up and configuring network encryption systems, including MACsec, Internet Protocol Security (IPsec), and TLS protocols, in heterogeneous networks over Wireless Area Networks (WAN), Wireless Local Area Network (WLAN) or cellular links. In some embodiments, the present technology includes a method for setting up, configuring, and monitoring of encryption equipment providing encrypted links over WAN connections (typically IPsec VPN gateways and clients or TLS applications). The method includes communicating with encryption and PKI equipment necessary to automate the generation of encryption keys, digital certificates, and digital certificate signing requests. The method further includes communicating with the encryption equipment on one or both sides of an encrypted link to create security associations, and link encryption parameters, necessary for the encryptors to negotiate and establish encrypted links. | 2017-11-09 |
20170324567 | SIGNATURE VERIFICATION DEVICE, SIGNATURE GENERATION DEVICE, SIGNATURE PROCESSING SYSTEM, SIGNATURE VERIFICATION METHOD, AND SIGNATURE GENERATION METHOD - A signature verification device includes a communicator that receives a second server certificate including a second public key and receives signature data which is generated by encrypting a hash value derived from the second server certificate using a secret key forming a key pair with the first public key, a signature processor that decrypts the signature data by using the first public key stored in the storage to acquire a first hash value, a unidirectional function deriver that derives a second hash value from the second server certificate, and a signature verifier that determines a signature generation device generating the signature data to be correct in a case of the first hash value and the second hash value matching. Decrease of accuracy of signature verification is reduced with reduced cost and secured security. | 2017-11-09 |
20170324568 | Cryptographic Key Escrow - An escrow platform is described that can be used to enable access to devices. The escrow platform can be used to sign cryptographic network protocol challenges on behalf of clients so that the secrets used to sign cryptographic network protocol challenges do not have to be exposed to the clients. The escrow platform can store or control access to private keys, and the corresponding public keys can be stored on respective target platforms. A client can attempt to access a target platform and in response the target platform can issue a challenge. The client platform can send the challenge to the escrow platform, which can use the corresponding private key to sign the challenge. The signed challenge can be sent back to the client, which can forward it to the target platform. The target platform can verify the expected private key and grant access. | 2017-11-09 |
20170324569 | Method, Apparatus and System for Security Application for Integrated Circuit Devices - At least one method, apparatus and system disclosed involves providing a restricted access protocol for accessing a memory device. A first memory portion of a memory device is selected for providing an access confirmation. At least one of setting or resetting of memory cells of the first memory portion is performed. A first voltage is provided for switching the memory cells. The first voltage is associated with a predetermined switching probability. A first input signal comprising at least one address associated with the memory cells is provided. A first responsive signal is received in response to the input signal. The first responsive signal comprises data relating to the state of the memory cells. An access key is provided for the access confirmation based upon a relationship between the first input signal and the first responsive signals for providing an access key. | 2017-11-09 |
20170324570 | GROUP MANAGEMENT METHOD, APPARATUS, AND SYSTEM - Embodiments of the present disclosure relate to the field of computer and Internet technologies, and disclose a group management method, apparatus, and system. The method includes: obtaining an interface address corresponding to a group management operation; generating an interface call request carrying the interface address, the interface call request being used to call a group management interface provided by an open platform server, and the group management interface being used to perform a group management operation on a follower account following a target user account; and sending the interface call request to the open platform server. By means of group management, the follower account is properly and effectively managed, and moreover it is convenient for a user account operator to develop and implement services such as a group bulk messaging service. | 2017-11-09 |
20170324571 | METHOD AND APPARATUS FOR MULTIMEDIA BROADCAST MULTICAST SERVICE TRANSMISSION - The present disclosure relates to a Multimedia Broadcast Multicast Service (MBMS), and in particular to a method, system and network entity for configuring transmission parameters for providing MBMS service(s). In one embodiment, a network entity in communication with a plurality of network nodes within a geographical area is provided. The network entity includes a communication interface configured to receive a representation of signal quality measurement data associated with a plurality of non-Multimedia Broadcast Multicast Service, non-MBMS, user equipments, UEs. Each UE is served by at least one of the plurality network nodes. The network entity includes a processor communicatively coupled to the communication interface. The processor is configured to determine a combined signal quality data of a plurality of MBMS UEs based at least in part on the received representation of signal quality measurement data associated with the plurality of non-MBMS UEs. | 2017-11-09 |
20170324572 | HOST A CONFERENCE CALL - Examples disclosed herein relate to a conference call host. Examples include to establishing, by a first computing system, a first secure connection to a second computing system via a wireless network in response to receiving a secure connection request from the second computing system; the first computing system and the second computing system are in physical proximity to each other. Examples include to provide an operating system session to the second computing system through the secure connection while the first computing system and the second computing system remain in physical proximity to each other; the operating system is stored on and executable by the first computing system. Examples include to provide a connection to a conferencing platform to the second computing system via the first secure connection, the conference call at least among the first computing system, the second computing system, and a remote user. | 2017-11-09 |
20170324573 | INFORMATION PRESENTATION METHOD, APPARATUS AND SYSTEM - An information presentation method for resolving the problem of low sharing efficiency of a file operation process between a local user and a remote user in a teleconference process. The method mainly includes: obtaining screen projection information of a local terminal, wherein the screen projection information is information currently displayed on a display screen of the local terminal; and combining the screen projection information and multimedia information collected by an information collection device into a data stream, and then sending the data stream to a receiving end for presentation. The present disclosure also provides an information presentation apparatus and system. | 2017-11-09 |
20170324574 | Method of Enhanced Application Specific Congestion Control for Data Communication Mechanism - AT commands are used for controlling Mobile Termination (MT) functions and GSM/UMTS network services from a Terminal Equipment (TE) through Terminal Adaptor (TA). Application specific access control is an application/service specific access control mechanism for the operator to allow/prevent new access attempts from particular, operator-identified applications/services in the UE in idle mode. However, a TE does not always know the applicability of application specific access control. In accordance with one novel aspect, a new AT command interface that can report application specific access control status to the TE is proposed. It reduces wasteful signaling overhead by retries from the TE. Through the new AT command interface, the TE can query application specific access control status. Via unsolicited result code (URC), the MT can detect application specific access control applicability status change and report updated status to the TE. | 2017-11-09 |
20170324575 | Bit Indexed Explicit Replication Forwarding Optimization - Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string. The node traverses the bit string and selects an entry in a bit indexed forwarding table (BIFT). The entry includes a forwarding bit mask. Based on the forwarding bit mask and the bit string, the node forwards the packet. | 2017-11-09 |
20170324576 | MASTER MODULE - A master module includes a processor and a memory. The memory includes executable code that, when executed by the processor: provides a number of computational resources to a number of device modules. The device modules are vendor-sourced device modules. The vendors are entities that provide services associated with an internet-of-things device. | 2017-11-09 |
20170324577 | SMART VACATION - A method for security and/or automation systems is described. In some embodiments, the method may include detecting departure data relating to at least one of an occupant and a premises, identifying a likelihood of an absence in relation to the premises based at least in part on the departure data, and sending a confirmation request based at least in part on the identifying for the occupant associated with the premises to confirm the absence. In some cases, the absence may include the premises being unoccupied for at least a portion of a predetermined time period. The predetermined time period may include at least one night. | 2017-11-09 |
20170324578 | METHOD AND APPARATUS FOR PROVIDING USER ADAPTIVE SERVICE - A method for determining an operation to be performed for an object identified by a device, and an apparatus therefor are disclosed. In one embodiment, the method includes generating representative identification information of the terminal, transmitting, to a server, user information including the representative identification information of the terminal, and advertising the representative identification information of the terminal. According to another embodiment, a service receiver and a service provider can use all available services even while minimizing requirements that must be fulfilled. The present disclosure may be directed to a technology for a sensor network, machine to machine communication, machine type communication and Internet of things. The present disclosure may be applied to intelligent services (related to a smart home, a smart building, a smart city, a smart car or a connected car, healthcare, digital education, retail business, security, safety, and the like) on the basis of the technology. | 2017-11-09 |
20170324579 | COMMUNICATION CONTROL DEVICE AND COMMUNICATION SYSTEM - Provided are a communication control device and a communication system capable of detecting message transmission in the case where an invalid device transmits a message to a common communication line. A monitoring device decides a reference time point t | 2017-11-09 |
20170324580 | FAILURE PROTECTION METHOD BASED ON RING PROTECTION LINK, DEVICE, AND SYSTEM - Embodiments of the present disclosure provide a failure protection method based on a ring protection link, a device, and a system, and nodes in the ring protection link include a forwarding device in an SDN. The method includes: receiving, by a network controller, a high-priority failure message sent by a first node, where the failure message includes information used to indicate a failure; obtaining, according to the failure message, data information about port state changes that are of the nodes and that are caused by the failure; and sending a high-priority switching message to each of the nodes, so that each of the nodes updates a local MAC address table according to the switching message, where the switching message includes the data information about port state changes that are of the nodes and that are caused by the failure. | 2017-11-09 |
20170324581 | System and Method for Cloud-Networked Stand-Alone Dual Modulation LAN - A cloud-networked stand-alone local area network (LAN) is disclosed. A stand-alone LAN is networked to a server outside the stand-alone LAN, and the server is part of a cloud of servers. The server includes hardware processors that process system operation information updates from a user for the stand-alone LAN, hardware memory that stores the system operation information updates; and a transceiver for communicating the system operation information updates to the stand-alone LAN. The stand-alone LAN includes a primary network hub (PNH) having a microcontroller that stores the system operation information, a cloud-side transceiver networked to the cloud of servers for receiving the system operation information updates from the server, and a PNH LAN long range transceiver that communicates via a long range spread spectrum or a narrowband frequency shift keying signal. The stand-alone LAN also includes a peripheral device having a microcontroller and an actuation mechanism. | 2017-11-09 |
20170324582 | Services Execution - An edge switch receives a VM classification policy and an executing policy corresponding to each VM class distributed by a policy controller. The executing policy comprises information of each service node for processing a message and an executing sequence of the each service node. The edge switch receives a message sent by a VM connected to the edge switch, determines a VM class corresponding to the message according to the VM classification policy and determines an executing policy corresponding to the VM class. The edge switch encapsulates the message according to information of each service node to be executed by a VM of the VM class and an executing sequence, and sends the message, so that the message is sequentially sent to the each service node to be executed by the VM of the VM class to execute a service policy. | 2017-11-09 |
20170324583 | TECHNIQUES FOR ROUTING FROM AN ENDPOINT WITH SIMULTANEOUS ASSOCIATIONS TO MULTIPLE NETWORKS - A node within a wireless endpoint device may be coupled to multiple heterogeneous networks simultaneously. The node is configured to select between the different networks based on various constraints associated with the endpoint device, applications executing on the endpoint device, traffic routed by the endpoint device, and constraints associated with the multiple networks. Based on these different constraints, and based on the current operating mode of the node, the node rates each network, and then selects the network with the highest rating to be used for routing purposes. | 2017-11-09 |
20170324584 | Forwarding Path Link Table Packet In Software Defined Network - A forwarding path link table packet is generated, the forwarding path link table packet comprises forwarding information of each SDN switch on a forwarding path; and the forwarding path link table packet is delivered to any one of SDN switches on the forwarding path, to enable the forwarding path link table packet to be delivered among SDN switches on the forwarding path, so as to cause each SDN switch that receives the forwarding path link table packet to generate a forwarding flow table entry of the SDN switch according to the forwarding information of the SDN switch in the forwarding path link table packet, and forward the forwarding path link table packet on the forwarding path. | 2017-11-09 |
20170324585 | METHODS AND SYSTEMS FOR PRIORITIZING NAMESERVERS - Methods, devices and systems are disclosed for dynamically adjusting the load priority of a backup nameserver in a computer network based on the health and responsiveness of primary and backup nameservers. | 2017-11-09 |
20170324586 | METHODS AND SYSTEMS FOR SERVICE INTERWORKING BETWEEN SERVERS USING DIFFERENT USER IDENTIFICATION SYSTEMS - According to at least some example embodiments, service interworking methods and systems are provided to identify registered users using different user identification systems performed by a first server having at least one processor and configured to identify registered users using a first user identification system, the method comprising: generating a first reference identifier of a first user in association with a first identifier identifying the first user in the first user identification system; managing the first reference identifier in association with the first identifier; receiving a second identifier identifying the first user in a second user identification system from the first user; and transmitting the first reference identifier and the second identifier to a second server configured to identify registered users using the second user identification system. | 2017-11-09 |
20170324587 | PREAMBLE DETECTION AND TIME-OF-ARRIVAL ESTIMATION FOR A SINGLE-TONE FREQUENCY HOPPING RANDOM ACCESS PREAMBLE - A receiver baseband processor and method for performing preamble detection and Time-of-Arrival, ToA, estimation for a single-tone frequency hopping random access preamble. The processor FFT processes a received signal and identifies logical tones. For each logical tone, the processor reads received symbols; determines a ToA estimate; forms a statistic based on the ToA estimate; compares the statistic to a preamble threshold; and when the statistic is greater than or equal to the threshold, determines a preamble is present and utilizes the ToA estimate for a timing advance command. | 2017-11-09 |
20170324588 | Device and Method for Adaptive Channel Estimation - A method to be performed at a station configured to connect to a Long Term Evolution radio access network (LTE-RAN) to utilize enhanced Multimedia Broadcast Multicast Services using a Multicast-Broadcast Single-Frequency Network (MBSFN). The method including receiving a MBSFN subframe having a MBSFN subframe structure including a plurality of Orthogonal Frequency-Division Multiplexing (OFDM) symbols, a first one of the OFDM symbols having a first reference symbol inserted therein, a second one of the OFDM symbols having a second reference symbol inserted therein, determining a rate of change of channel conditions being experienced by the station and performing a non-destaggered channel estimation when the rate of change of channel conditions is greater than a predetermined threshold, the non-destaggered channel estimation using a first Channel Impulse Response (CIR) at the first OFDM symbol and a second CIR at the second OFDM symbol. | 2017-11-09 |
20170324589 | System for Transmitting Control Signals Over Twisted Pair Cabling Using Common Mode of Transformer - A method for transmitting control systems over twisted pair cabling. The method includes: receiving a first single-ended transmission signal; converting the first single-ended transmission signal to a first differential transmission signal; transmitting the first differential transmission signal over a first two pairs of wires via a common mode of a transformer; receiving a first differential reception signal over a second two pairs of wires via the common mode of the transformer; and converting the first differential reception signal to a first single-ended reception signal. | 2017-11-09 |
20170324590 | SYSTEM AND METHOD FOR ITERATIVE COMPENSATION FOR LINEAR AND NONLINEAR INTERFERENCE IN SYSTEM EMPLOYING FTN SYMBOL TRANSMISSION RATES - An approach for increasing transmission throughput of a non-linear wireless channel, and efficient decoding of the transmitted signal via a simplified receiver, is provided. A signal reflects a source signal, and includes linear inter-symbol interference based on a faster-than-Nyquist signaling rate and a tight frequency roll-off, and non-linear interference based on high-power amplification for transmission over the wireless channel. The signal is received over a non-linear wireless channel, and is processed via a plurality of decoding iterations. A set of soft information of a current decoding iteration is generated based on a current estimate of the source signal and a final set of soft information from a previous decoding iteration. The current estimate of the source signal is based on an estimate of the linear ISI and the non-linear interference, which is based on the final set of soft information from the previous decoding iteration. | 2017-11-09 |
20170324591 | Selectable-tap Equalizer - A signaling circuit having a selectable-tap equalizer. The signaling circuit includes a buffer, a select circuit and an equalizing circuit. The buffer is used to store a plurality of data values that correspond to data signals transmitted on a signaling path during a first time interval. The select circuit is coupled to the buffer to select a subset of data values from the plurality of data values according to a select value. The equalizing circuit is coupled to receive the subset of data values from the select circuit and is adapted to adjust, according to the subset of data values, a signal level that corresponds to a data signal transmitted on the signaling path during a second time interval. | 2017-11-09 |
20170324592 | EQUALIZATION CIRCUIT, SEMICONDUCTOR APPARATUS AND SEMICONDUCTOR SYSTEM USING THE SAME - An equalization circuit may include a buffer configured to sense an input signal according to a reference voltage. The equalization circuit may include a reference voltage generator configured to generate the reference voltage. The reference voltage may be changed in conformity with noise of the input signal. | 2017-11-09 |
20170324593 | EQUALIZATION CIRCUIT, SEMICONDUCTOR APPARATUS AND SEMICONDUCTOR SYSTEM USING THE SAME - An equalization circuit may include a buffer configured to sense an input signal according to a reference voltage. The equalization circuit may include a reference voltage generator configured to generate the reference voltage. The reference voltage may be changed in conformity with noise of the input signal. | 2017-11-09 |
20170324594 | EQUALIZED MULTI-SIGNALING MODE DRIVER - A transmit circuit can be configured to output two-level pulse amplitude modulation (PAM-2) or four-level pulse amplitude modulation (PAM-4). In the PAM-2 mode, pre-tap feed-forward equalization (FFE) and post-tap FFE can be applied to the PAM-2 signal by pre-taps and post-taps, respectively. In the PAM-4 mode, at least one post-tap is repurposed to generate, along with the main tap, the main PAM-4 signaling levels. At least one PAM-2 FFE tap is repurposed to apply FFE in the PAM-4 mode. | 2017-11-09 |
20170324595 | CIRCUITS AND METHODS FOR FREQUENCY OFFSET ESTIMATION IN FSK COMMUNICATIONS - Disclosed embodiments include a receiver having an input that receives a frequency shift key (FSK) signal having a preamble comprising preamble symbols, a phase compensator that applies a compensation vector to one of first and second samples of a first preamble symbol, wherein applying the compensation vector to the one of the first and second samples produces a compensated sample, a demodulator that determines a phase offset between the compensated sample and the other one of the first and second samples of the first preamble symbol, and a frequency offset mapper that determines a frequency offset based at least upon the phase offset. The receiver applies the frequency offset to the FSK signal. | 2017-11-09 |
20170324596 | PHASE MEASURING DEVICE AND APPARATUSES USING THE PHASE MEASURING DEVICE - The inventive phase measuring device includes a first A/D converter | 2017-11-09 |
20170324597 | Apparatus and Method for Sending and Receiving Broadcast Signals - A broadcast signal receiver is disclosed. A broadcast signal receiver according to an embodiment of the present invention comprises a synchronization & demodulation module performing signal detection and OFDM demodulation on a received broadcast signal; a frame parsing & deinterleaving module performing parsing and deinterleaving of a signal frame of the broadcast signal; a demapping & decoding module performing conversion of data of at least one Physical Layer Pipe (PLP) of the broadcast signal into the bit domain and FEC decoding of the converted PLP data; and an output processing module outputting a data stream by receiving the at least one PLP data. | 2017-11-09 |
20170324598 | System and Method for High Efficiency Wireless Local Area Network Communications - System and method embodiments are provided for high efficiency wireless communications. In an embodiment, a method in a network component for transmitting a frame of two different fast Fourier transform (FFT) sizes includes generating a frame, wherein the frame comprises orthogonal frequency-division multiplexing (OFDM) symbols in two different FFT sizes, wherein the frame comprises a first portion and a second portion, wherein the first portion comprises a first FFT size and the second portion comprises a second FFT size; and transmitting the frame during a single transmission opportunity. | 2017-11-09 |
20170324599 | ENHANCED MULTIPLE INPUT MULTIPLE OUTPUT PREAMBLE FRAME - This disclosure describes systems, methods, and devices related to an enhanced multiple input multiple output (MIMO) preamble frame. A device may determine a MIMO frame including a first section and a second section. The device may generate an enhanced MIMO frame including at least in part a modified first section and the second section of the MIMO frame. The device may determine a first stream and a second stream associated with at least one antenna of the device. The device may cause to send the enhanced MIMO frame to one or more first devices on the first stream. The device may cause to send the MIMO frame to the one or more first devices on the second stream. | 2017-11-09 |
20170324600 | TRANSMITTER AND METHOD OF TRANSMITTING PAYLOAD DATA, RECEIVER AND METHOD OF RECEIVING PAYLOAD DATA IN AN OFDM SYSTEM - A transmitter transmits payload data using Orthogonal Frequency Division Multiplexed (OFDM) symbols. The transmitter comprises a frame builder configured to receive the payload data to be transmitted and to receive first signalling data for use in detecting and recovering the payload data at a receiver, and to form the payload data and the first signalling data into frames for transmission, the first signalling data forming a part of the frames with the payload data. A modulator is configured to modulate a first OFDM symbol with the first signalling data and to modulate one or more second OFDM symbols with the payload data. A signature sequence processor provides a signature sequence, a combiner combines the signature sequence with the first OFDM symbol, and a transmission unit transmits the first and second OFDM symbols. The signature sequence provided by the signature sequence processor comprises at least one of a first synchronisation sequence or a second message sequence, the first synchronisation sequence and or the second message sequence being combined by the combiner with the first OFDM symbol. The first synchronisation sequence is provided for a receiver to detect and to recover the first signalling data from the first OFDM symbol and the second message sequence provides message information to the receiver. The message information may be used to convey a specific message to a user such as an emergency warning relating to a natural disaster such as an earthquake or a tsunami warning. | 2017-11-09 |
20170324601 | MODULATION AND EQUALIZATION IN AN ORTHONORMAL TIME-FREQUENCY SHIFTING COMMUNICATIONS SYSTEM - A system and method of providing a modulated signal useable in a signal transmission system. The method includes transforming, perhaps with respect to both time and frequency, a data frame including a plurality of data elements into a transformed data matrix. The transformed data matrix includes a plurality of transformed data elements where each of the plurality of transformed data elements is based upon each of the plurality of data elements. The method further includes generating the modulated signal in accordance with the transformed data elements of the transformed data matrix. | 2017-11-09 |
20170324602 | METHOD OF COMPENSATING CARRIER FREQUENCY OFFSET IN RECEIVERS - A method to compensate a carrier frequency offset (CFO) in a receiver is disclosed. The method includes receiving discrete time samples, obtaining a sample vector from the received discrete time samples, obtaining tentative CFO estimates based on the sample vector, selecting a CFO having a greatest compensation coefficient from the tentative CFO estimates, and compensating the CFO in the received discrete time samples. | 2017-11-09 |
20170324603 | TONE MAP SELECTING DEVICE AND METHOD - A tone map selecting device includes: a bit-number-per-symbol providing circuit, providing a plurality of bit numbers per symbol, each of which associated with a tone map; a calculating circuit, performing a predetermined calculation on the bit numbers per symbol to generate a calculation result; and a selecting circuit, identifying one of the bit numbers per symbol that satisfies a predetermined relationship with the calculation result, and selecting the tone map associated with the bit number per symbol satisfying the predetermined relationship as a default tone map. | 2017-11-09 |
20170324604 | IN AND RELATING TO COMMUNICATION NETWORK RESOURCING - A base station is configured to communicate with at least a first user equipment (UE) and a second UE, wherein the base station is configured to communicate with the first UE using a first modulation scheme, and with the second UE using a second, different, modulation scheme, wherein communications with the first and second UEs are arranged to be substantially orthogonal to each other. A method of allocating resources in a communication network comprising a base station operable to communicate with a first user equipment (UE) and a second UE, the method comprising using a first modulation scheme for communication with the first UE, and using a second, different, modulation scheme for communication with the second UE, wherein communications with the first and second UEs are configured to be substantially orthogonal to each other. | 2017-11-09 |
20170324605 | APPARATUS AND METHOD FOR MODULATION/DEMODULATION FOR TRANSMITTING AND RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a 5G or pre-5G communication system to be provided for supporting a higher data transmission rate beyond 4G communication systems such as LTE. A method for modulation in a transmitter for transmitting a signal in a wireless communication system according to an embodiment of the present invention comprises: a step for determining a modulation scheme; a step for, if the determined modulation scheme corresponds to a specific modulation scheme, converting encoded information bits to quadrature amplitude modulation (QAM) symbols in accordance with a predetermined QAM modulation order, selecting a sequence corresponding to an element of an integer vector in a predetermined sequence set, repeating the converted QAM symbols for a predetermined sequence length, and outputting signals by multiplying the repeated QAM symbols and the selected sequence; and a step for transmitting the outputted signals to a receiver. | 2017-11-09 |
20170324606 | SERIAL COMMUNICATIONS TAP DEVICE - A serial tap device consists of a first serial port, a second serial port directly connected to the first serial port by multiple serial lines, and a switch configured to selectively connect one or more of the multiple serial lines to a convertor module. The convertor module is configured to convert serial communications signals from the one or more serial lines to transistor-transistor logic (TTL) level signals. The serial tap device includes a communications module and a processor which operates to capture data from the TTL level signals, generate packets containing the captured data, and transmit the packets to a communications network, such as the internet, through the communications module. The serial tap device may be connected inline, between two serial devices, in order to capture data exchanged in serial communication flows between the devices and transmit the captured data to a remote server. | 2017-11-09 |
20170324607 | METHODS, SYSTEMS, AND MEDIA FOR MEDIA TRANSMISSION AND MANAGEMENT - Methods, systems, and media for media transmission and management are provided. In some implementations, a method for media content management is provided, the method comprising: receiving a portion of a media data stream from a first computing device prior to the first computing device processing the portion of the media data stream; processing the portion of the media data stream to identify an object of interest within the media data stream; determining an entity associated with the object of interest; associating a content item with the object of interest based on the determined entity; generating a first representation of the portion of the media data stream, wherein the first representation is associated with the content item; receiving a second representation of the media data stream from a second computing device; determining whether the second representation matches the first representation; and transmitting the content item associated with the first representation to the second computing device for placement within the media data stream in response to determining that the second representation matches the first representation. | 2017-11-09 |
20170324608 | WIRELESS COMMUNICATIONS SYSTEM, BASE STATION, AND TERMINAL - A wireless communications system includes a packet core network, and a wireless access network including a base station and a terminal. The wireless communications system includes plural terminals; and a base station configured to perform a process related to a proximity-based communications service between the plural terminals and when a failure in a connection between the base station and the packet core network occurs, the base station causes execution of proximity-based communication between the plural terminals by using the process related to the proximity-based communications service and performing authentication and authorization of communication with a terminal connected to the base station among the plural terminals. | 2017-11-09 |
20170324609 | Virtual Machine Fault Tolerance Method, Apparatus, and System - A virtual machine fault tolerance method, including receiving a network request, and separately sending the network request to a primary virtual machine and a secondary virtual machine, receiving a network response data packet, where the network response data packet is a primary-end data packet transmitted by the primary virtual machine or a secondary-end data packet transmitted by the secondary virtual machine, comparing data of the received network response data packet with the peer-end data according to data byte order when peer-end data is stored, and generating and sending a newly created data packet to the client when the compared data is the same, where the newly created data packet includes the compared data. Hence, network performance and computing performance of the primary virtual machine can be improved without modifying network protocol stacks of the primary virtual machine and the secondary virtual machine. | 2017-11-09 |
20170324610 | Transmitting Digital Data In Two-Wire Communication Networks - The present disclosure relates to communication networks. Some embodiments may include a communication network with two or more network nodes each comprising: a receiver discerning the signal quality of received signals; a transmitter sending signals at different data rates; and a controllable terminating impedance. A network node transmits the discerned signal quality to one or more additional network nodes, a network node records the signal qualities and corresponding values of the terminating impedances of the respective network nodes. A network node prescribes for additional network nodes a new respective value to set as a terminating impedance. A network node determines new terminating impedance values to optimize the data rate between the various network nodes and the signal quality at each of the network nodes. | 2017-11-09 |
20170324611 | TECHNIQUES TO DYNAMICALLY CONFIGURE TARGET BITRATE FOR STREAMING NETWORK CONNECTIONS - Techniques to dynamically configure target bitrate for streaming network connections are described. An apparatus may comprise a streaming component operative to establish a streaming network connection with a second client device at a first client device; and a stream configuration component operative to determine inter-arrival rate information for the streaming network connection; provide the inter-arrival rate information to an inter-arrival rate analysis component; receive a preliminary target bitrate from the inter-arrival rate analysis component in response to providing the inter-arrival rate information to the inter-arrival rate analysis component; determine round-trip time information for the streaming network connection; determine an assigned target bitrate and a packet size setting for the streaming network connection based on the preliminary target bitrate and the round-trip time information; and configure the streaming component to perform the streaming network connection with the assigned target bitrate and the packet size setting. Other embodiments are described and claimed. | 2017-11-09 |
20170324612 | NETWORK FUNCTION VIRTUALIZATION - Examples for network function virtualization are described. These examples include accessing definition data defining a virtual network function, the virtual network function comprising one or more components. The definition data is then instantiated to generate an instance of the virtual network function. Physical computing resources may then be assigned to the instance of the virtual network function. | 2017-11-09 |
20170324613 | SYSTEM AND METHOD OF PROCESSING MEDIA TRAFFIC FOR A HUB-BASED SYSTEM FEDERATING DISPARATE UNIFIED COMMUNICATIONS SYSTEMS - A system and method of processing media traffic for a hub-based system federating disparate unified communications systems is disclosed. According to one embodiment, a system includes a federation server that is configured to connect to a first unified communications system and a second unified communications system, where the federation server receives a media call initiation request from a first client of the first unified communications system, where the media call initiation request initiates a media call with a second client of the second unified communications system, and where the federation server provides a uniform resource locator to the second client based on the media initiation request, wherein the uniform resource locator is configured to direct a user on the second client to a browser to accept the media call. | 2017-11-09 |
20170324614 | DYNAMIC TRACKING DEVICE RECONFIGURATION - A tracking device can be reconfigured after an amount of operation to preserve the battery capacity of the tracking device and to ensure that the tracking device can be operated for a pre-determined threshold period of time. The tracking device can provide diagnostic information representative of a state of the tracking device, such as a current power capacity of the tracking device's battery, to a mobile device within a threshold proximity of the tracking device. The mobile device can then provide the diagnostic information to a tracking server, which in turn can provide reconfiguration instructions to the mobile device. The mobile device can then pass on the reconfiguration instructions to the tracking device, in response to which the tracking device can reconfigure itself | 2017-11-09 |
20170324615 | QUALITY OF SERVICE FOR HIGH NETWORK TRAFFIC EVENTS - A computer program product with instructions for providing quality of service includes identifying a high network traffic event at a node, providing a user score to each user account of a plurality of user accounts, wherein the plurality of user accounts corresponds to a plurality of user devices connected to the node, and responsive to identifying the high network traffic event, providing instructions to a subset of user devices of the plurality of user devices, wherein the instructions instruct the subset of devices to enter a low traffic mode, and wherein each device of the subset of devices corresponds to a user account with a user score below a threshold. | 2017-11-09 |
20170324616 | SYSTEM AND METHOD FOR SUPPORTING SUBNET NUMBER ALIASING IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - System and method for supporting subnet number aliasing in a high performance computing environment. In accordance with an embodiment, a fabric member can be assigned, by a global fabric manager, an alias fabric local subnet number in order to keep a fabric running after a fabric reconfiguration. The alias fabric local subnet number can be assigned for a period of time, the period of time being static, configurable, or indefinite. | 2017-11-09 |
20170324617 | TESTING AND VALIDATION OF USER EQUIPMENT FOR A CELLULAR NETWORK - Compatibility and/or compliance testing for a wireless cellular network may be performed using a testing system that includes a device that implements multiple base stations in a single hardware device. Additionally, a network simulation server may simulate a core portion of the wireless cellular network. Test cases, such as test cases defined using a scripting language, may be received and the test cases may be interpreted to obtain configuration information for the testing system. Based on the configuration information, the base stations and the simulated network devices may be initially configured. After configuration, and based on the test case, a UE may be controller to interact with the simulated network in a manner implements the desired compatibility and/or compliance tests. | 2017-11-09 |
20170324618 | MODULAR ARCHITECTURE FOR COMPUTER NETWORK OPERATIONS - Disclosed embodiments include a method of operation of a distributed network system. The method includes nodes of the network system that send messages over a protocol-independent message bus, and other nodes that receive the messages. Content from the received messages can be stored in a database distributed among nodes of the network system. At least some of the content stored in the database is published. The published content can be accessed by one or more applications to perform one or more functions. | 2017-11-09 |
20170324619 | Network Management Method, Device, and System - A network management method, device, and system used for network management and pertains to the communications field, where the method includes detecting bandwidth required by a first data flow, determining whether the bandwidth required by the first data flow is greater than a preset bandwidth value when the bandwidth required by the first data flow becomes higher, and allocating bandwidth to the first data flow when the bandwidth required by the first data flow is greater than the preset bandwidth value. Hence, a problem that a controller has relatively low efficiency when performing network management is resolved, thereby improving efficiency of performing network management by the controller. | 2017-11-09 |
20170324620 | INFRASTRUCTURE RESOURCE STATES - The present disclosure discloses infrastructure resource states which may be configured for use in managing both infrastructure resources (IRs) and virtualized infrastructure resources (VIRs). The new resources states may include a Network Unequipped (NU) state, a Network Equipped (NE) state, a Network Ready (NR) state, a Service Ready (SR) state, an Out-of-Service (OOS) state, and an In-Service (IS) state. The infrastructure resource states may be configured to enable resource transfers in a programmable virtual infrastructure having one or more tenants (e.g., Owners, BUs, Partners, Customers, or the like) at one or more hierarchical layers. The infrastructure resource states may be configured to support VIR management for multi-owner virtualization such that multiple owners may manage resource allocation of the network infrastructure of the communication network and multi-tenant virtualization such that multiple tenants, at one or more hierarchical layers, may share portions of the network infrastructure of the communication network. | 2017-11-09 |
20170324621 | MANAGING COMMUNICATION NETWORKS AND COMPARING NETWORK TOPOLOGIES - In some implementations, a method includes obtaining a first visual representation of a first network topology of a network and a second visual representation of a second network topology. The first network topology includes a first set of network devices and a first set of connections between the first set of network devices. The second network topology includes a second set of network devices and a second set of connections between the second set of network devices. The method also includes alternating between presenting the first visual representation and presenting the second visual representation based on user input. | 2017-11-09 |
20170324622 | Method and Device for Network Tomography - A method of monitoring performance of a network using network tomography comprises obtaining ( | 2017-11-09 |
20170324623 | DETERMINING RACH ROOT SEQUENCES AS A FUNCTION OF ACCESS POINT CONFIGURATION USING GRAPH COLORING - A network device that determines RACH root sequences for AP devices within a given market. The network device can utilize a specialized graph coloring process or algorithm that has been adapted to, e.g., ensure that no two neighboring AP devices share the same RACH root sequences, provided certain additional constraints not found in graph coloring theory are met. For example, AP devices can have multiple RACH root sequence, whereas in traditional graph coloring problems, each vertex typically has only one color. | 2017-11-09 |
20170324624 | Non-Disruptive Display of Video Streams on a Client System - In one embodiment, a method includes launching, by a client system of a first user, a video-call session; receiving, by the client system of the first user, a video stream including video captured at a client system of a second user; and displaying the video stream in a small-overlay-window on a display of the client system of the first user, wherein the small-overlay-window is positioned over an active application. | 2017-11-09 |
20170324625 | PATH CONTINUITY DETERMINATION IN AN AGGREGATE FLOW ENVIRONMENT - Mechanisms for path continuity determination in an aggregate flow environment. An ingress node and a downstream node for which a path continuity check is desired are determined. The ingress node devolves, from an aggregate flow entry, one or more microflows that comprise packets which are destined for the downstream node. The downstream node is directed to generate corresponding microflows. Each microflow is associated with a continuity set identifier and has one or more timers, such as an idle timer and/or a hard timeout timer. Upon timeout of one of the timers, the ingress node and the downstream node send a microflow termination message that contains the continuity set identifier to a controller node. The controller node determines a path continuity status between the ingress node and the downstream node based on a receipt of one or more microflow termination messages from the ingress node and the downstream node. | 2017-11-09 |
20170324626 | PROVIDING USER METRICS FOR AN UNKNOWN DIMENSION TO AN EXTERNAL SYSTEM - A social networking system may provide user metrics for unknown dimensions to an external system using received hash codes from user devices performing actions on the external system. Embodiments of the invention receive hash codes generated by external systems that are embedded in redirect Uniform Resource Locators (URLs) that are executed by user devices. The social networking system may match the received hash codes to identifying information about users, e.g., user identifiers. The user profile information may be reported to external systems based on hash codes in an aggregated format without disclosing identifying information about users. In one embodiment, a hash code may include identifying information of an administrator of an external system to enable the administrator to merge information about users of the social networking system with other unknown dimensions of information about the users that is known by the external system. | 2017-11-09 |
20170324627 | DIAGNOSTIC TESTING IN NETWORKS - Methods and apparatus are disclosed for obtaining diagnostic test results in respect of network elements in a network, the test results being obtained from a population of probes associated with network elements. The method comprises receiving a first-stage set of probe reports comprising, in respect of probes in an initial subset, a test result and metadata, each test result indicating a state of the network element associated with the probe; identifying a specific subset of probes in the initial subset wherein the test results from the probes in the specific subset satisfy a predefined condition; determining a subsequent subset based on the metadata of the probes in the specific subset; and triggering the probes in the subsequent subset to provide a second-stage set of probe reports comprising test results indicating states of network elements associated with probes in the subsequent subset. | 2017-11-09 |
20170324628 | SYSTEMS AND METHODS TO CHOOSE AN OPTIMAL PATH FROM MULTIPLE HIGH LATENCY LINKS - The present invention is directed towards systems and methods for selecting a path or link from a plurality of links between intermediary devices, based on characteristics of links between the intermediary devices and end nodes of the communication flow. The link choice may be determined from latency, packet drop rates, jitter, congestion, or other characteristics of the links to the end nodes. Link selection may further be based on traffic priority or transport layer quality of service (QoS) requirements of the connection, load balancing requirements, or other such features. | 2017-11-09 |
20170324629 | METHOD AND COMPUTING DEVICE FOR SHAPING TRAFFIC ACROSS A WIDE AREA NETWORK - A method for shaping traffic across a wide area network is disclosed. The method involves advertising a data rate limit across a wide area network (WAN) from a first node, measuring the rate of data received at a WAN interface of the first node, and, if the measured rate of data received at the WAN interface of the first node exceeds a maximum threshold, advertising a reduced data rate limit across the WAN, and, if the measured rate of data received at the WAN interface of the first node is below a minimum threshold, advertising an increased data rate limit across the WAN. | 2017-11-09 |
20170324630 | ENHANCED CARRIER SENSING FOR MULTI-CHANNEL OPERATION - In various embodiments, a multi-channel request-to-send and a multi-channel clear-to-send may be used in a wireless communications network to assure that a subsequent multi-channel communications exchange between two devices takes place only over channels that are sensed by both devices as being free. | 2017-11-09 |
20170324631 | BUS GUARDIAN IN A DATA BUS - A control system is disclosed, including a first control device, a second control device and a driver component for driving signals on a data bus. The first control device includes a data output which is connected to a data input of the driver component, and a monitoring device for deactivating the data output in the event of a fault. A deactivation signal of the second control device for the driver component is fed to a data input of the first control device, and the first control device is configured to deactivate the data output in the event of an error signal at the data input. | 2017-11-09 |
20170324632 | Network Packet Forwarding Systems And Methods To Push Packet Pre-Processing Tasks To Network Tap Devices - Network packet forwarding systems and methods are disclosed to push pre-processing tasks to network tap devices. In certain embodiments, packet flows from multiple monitoring points within a packet network communication system are monitored by a plurality of network tap devices to generate tapped packet flows associated with monitored network traffic flows. The tapped packet flows are transmitted from each network tap device to a tap controller, and the tap controller generates pre-processing rules based upon the tapped packet flows. Control messages including the pre-processing rules are then transmitted from the tap controller to the network tap devices, and the tapped packet flows are pre-processed at the network tap devices using the pre-processing rules to generate pre-processed packet flows. These pre-processed packet flows are then transmitted back to the tap controller where they are further processed and output to one or more destination devices. | 2017-11-09 |
20170324633 | Control of Applications That Use System Resources - System resources on a computer system are conserved by controlling the applications that use those system resources. This can be accomplished by monitoring an indication of use of a system resource by a plurality of applications, determining whether the indication of use exceeds a predetermined threshold of use, if the indication of use exceeds the predetermined threshold of use then bundling the applications using that system resource into a resource group, and assigning a resource usage rate to the resource group for a period of time, the assigned resource usage rate being below the indication of use of that system resource, and the assigned resource usage rate applying collectively to the applications in the resource group. | 2017-11-09 |
20170324634 | MONITORING NETWORK TRAFFIC TO DETERMINE SIMILAR CONTENT - In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content. | 2017-11-09 |
20170324635 | AVAILABLE BANDWIDTH ESTIMATION SYSTEM, AVAILABLE BANDWIDTH ESTIMATION METHOD, RECEPTION APPARATUS, AND RECEPTION APPARATUS PROGRAM STORAGE MEDIUM - Failure to identify an accurate rising position of a queueing delay alone has led to the inability to ensure estimation precision. An available bandwidth estimation method comprises: transmitting a packet train constituted by packet pairs arranged at equal intervals, each of the packet pairs comprising two packets of the same size arranged at a zero transmission interval, with the packet size of the packet train increasing at a constant rate; receiving the packet train; calculating an observation delay of the packets included in the received packet train; calculating a serialization delay on the basis of the reception interval between the two packets constituting each packet pair included in the received packet train; removing the calculated serialization delay from the calculated observation delay, thereby calculating a queueing delay; and estimating an available bandwidth on the basis of the calculated queueing delay. | 2017-11-09 |
20170324636 | METHOD OF MONITORING A SERVER RACK SYSTEM, AND THE SERVER RACK SYSTEM - A method of monitoring a server rack system includes: initializing each of a rack management controller (RMC), a rack back plate (RBP) and a baseboard management controller (BMC); transmitting by the RMC an initiation message to RBP; transmitting by the RBP initiation messages to the BMC and the RMC, respectively; transmitting by the BMC an initiation message to RBP transmitting by the BMC a real-time monitoring output associated with a condition of a server to the RBP after receiving the initiation message transmitted by the RBP; and transmitting by the RBP at least a portion of the real-time monitoring output received from the BMC to the RMC after receiving the initiation message transmitted by the RMC. | 2017-11-09 |
20170324637 | POLLING PARAMETER ADJUSTMENT - An approach, executed by a computer, for adjusting polling parameters. The approach includes one or more processors polling an endpoint application using an initial polling quantity and an initial polling frequency. The approach includes determining a first number of events not consumed in a queue of a listening application and a second number of events in a queue at the endpoint application at an end of a polling cycle. Furthermore, the approach includes adjusting at least one of the initial polling quantity and the initial polling frequency based, at least in part, on a comparison of the first number of events not consumed in the queue of the listening application and the second number of events in the queue at the endpoint application at the end of the polling cycle. | 2017-11-09 |
20170324638 | METHOD AND SYSTEM FOR INTERFERENCE DETECTION AND MITIGATION - In a method for adjusting the modulation of information onto subcarriers transmitted on a network, a first modulation profile of a network node on the network is set a first density. A plurality of messages in support of a link maintenance operation (LMO) on the network are monitored. The first modulation profile of the network node is updated to a second modulation profile having a second density. The updating is based on the monitored messages. Interference is detected by determining that a link between the first network node and a second network node on the network is not conveying a predetermined class of messages correctly. The first network node is set to a third modulation profile more robust than the first and second modulation profiles in response to the detected interference. The third modulation profile is common to each network node on the network. | 2017-11-09 |
20170324639 | SESSION AWARE ADAPTIVE PACKET FILTERING - A method performed by a network device includes: receiving a first packet by the network device, wherein the first packet is tapped from a network; identifying a session to which the first packet belongs when the first packet has one or more values that at least partially match one or more terms, wherein the act of identifying the session is performed by the network device; receiving a second packet by the network device; determining whether the second packet belongs to the session; and performing a packet processing action by the network device based on the identified session; wherein the session is identified based on a first criterion, and the act of determining whether the second packet belongs to the session is performed based on a second criterion that is different from the first criterion. | 2017-11-09 |
20170324640 | NOTIFYING ORIGINAL STATE LISTENERS OF EVENTS IN A DOMAIN MODEL - Notifying original state listeners within a domain model. Identifying listener registration information pertaining to a listener. Monitoring a hierarchical relationship tree for an observable event, whereby the hierarchical relationship tree includes model objects, and whereby an observable event includes one or more of a change to a model object, an error condition associated with a model object, and the hierarchical relationship tree returning to an original state. Determining that a first observable event to the hierarchical relationship tree has occurred. Transmitting a notification to the listener detailing the occurrence of the first observable event. Determining that a second observable event to the hierarchical relationship tree has occurred. Determining that a third observable event to the hierarchical relationship tree has occurred, whereby the third observable event includes the hierarchical relationship tree returning to an original state. Transmitting a notification to the listener detailing the occurrence of the third observable event. | 2017-11-09 |
20170324641 | MODIFIED SLOW START FOR BACKGROUND CONNECTIONS - A system communicates packets of data between two computers starting at an initial rate. The system then enters a slow start mode and increases the rate. As the rate increases, the system monitors acknowledgement data indicating a round trip time (RTT) associated with individual packets. When the RTT meets or exceeds a threshold, the system exits the slow start mode and continues the background connection a selected rate. The selected rate is based on the acknowledgement data associated with one or more packets having an RTT that meet or exceed the threshold. The features disclosed herein mitigate some of the issues with the LEDBAT protocol and other congestion control techniques, some which may include queue overflows and unnecessary slowdowns. | 2017-11-09 |
20170324642 | INITIAL AND PERIODIC SLOWDOWNS FOR BACKGROUND CONNECTIONS - The technologies disclosed herein provide improvements to the Low Extra Delay Background Transport (LEDBAT) protocol. In some scenarios, a LEDBAT connection cannot obtain accurate measurements for the base delay that it relies on. Slowing down a connection, initially and periodically, can ensure that base delay measurements begin accurately and remain accurate throughout the life of a connection. Data is communicated between two computers in a slow start mode, where a rate of the communication is increased over time from an initial rate. When one or more conditions are met, e.g., an interval lapses, the communication is slowed for a predetermined time period. The communication of the data then resumes in a slow start mode, where a rate of the communication is increased over time from an initial rate. | 2017-11-09 |
20170324643 | BINARIZING SECONDARY TRANSFORM INDEX - An example device for decoding video data includes a memory configured to store video data and one or more processors implemented in circuitry and configured to determine a maximum possible value for a secondary transform syntax element for a block of video data, entropy decode a value for the secondary transform syntax element of the block to form a binarized value representative of the secondary transform for the block, reverse binarize the value for the secondary transform syntax element using a common binarization scheme regardless of the maximum possible value to determine the secondary transform for the block, and inverse-transform transform coefficients of the block using the determined secondary transform. | 2017-11-09 |
20170324644 | MULTIPLE TOPOLOGY-TRANSPARENT ZONES HAVING A COMMON EDGE NODE - The system and method of the present disclosure relates to technology for a network system supporting multiple topology transparent zones (TTZs) on an edge node. TTZs have a topology including TTZ nodes consisting of edge nodes and internal nodes connected together by internal links. The edge nodes may also be connected to external nodes outside of the TTZ. The edge node is responsible for generating and distributing link state advertisements (LSAs) to generate virtual paths from the edge node to other edge nodes in each of the TTZs. Each TTZ sharing the edge node and each external node neighboring one of the other edge nodes of the TTZs is virtualized by distribution of the LSAs. However, the internal topology of each TTZ is concealed from each of the other TTZs sharing the edge node and from any neighboring external node connected to one of the other edge nodes. | 2017-11-09 |
20170324645 | SYSTEM AND METHOD FOR SUPPORTING VM MIGRATION BETWEEN SUBNETS IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - System and method for supporting virtual machine migration in a high performance computing environment. In accordance with an embodiment, when a virtual machine migrates from a first subnet to a second subnet, a gateway port at the first subnet can, upon receiving packets addressed to the migrated virtual machine, consult a memory lookup table to discover the virtual machine's new addresses. The gateway port can update the packet accordingly. The memory lookup table can be addressed based on a GUID of the virtual machine. | 2017-11-09 |
20170324646 | SYSTEM AND METHOD FOR SUPPORTING FLEXIBLE P_KEY MAPPING IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - System and method for supporting flexible partition key (P_Key) mapping in a high performance computing environment. In accordance with an embodiment, when such computer environments comprise more than one subnet and/or forwarding domain that support inter-subnet partitions, the P_Keys comprising such inter-subnet partitions can change across domain boundaries. In such situations, a partition key of a packet can be updated upon entry to a new subnet and/or forwarding domain. | 2017-11-09 |
20170324647 | END POINT MAPPING SERVICE TO ASSIST TRANSPORT SEGMENT ROUTING - Methods, devices, and systems for mapping transport segment labels to packet network endpoints using a mapping server. In some implementations, an end point address in an edge domain is received from an edge router, a mapping of one of the end point address to a transport segment label is received from a network device, the mapping is stored in a non-transitory memory device, and the mapping is transmitted to the edge router. | 2017-11-09 |
20170324648 | TECHNIQUE FOR SELECTING A PATH COMPUTATION ELEMENT BASED ON RESPONSE TIME DELAY - A technique efficiently selects a path computation element (PCE) to compute a path between nodes of a computer network. The PCE selection technique is illustratively based on dynamic advertisements of the PCE's available path computation resources, namely a predictive response time (PRT). To that end, the novel technique enables one or more PCEs to dynamically send (advertise) their available path computation resources to one or more path computation clients (PCCs). In addition, the technique enables the PCC to efficiently select a PCE (or set of PCEs) to service a path computation request based upon those available resources. | 2017-11-09 |
20170324649 | Method for Calling Routing Algorithm, SDN Controller, and SDN-OAF - The document discloses a method for invoking a routing algorithm, an SDN-OAF, and an SDN controller. The method includes pre-configuring a customized routing algorithm; an SDN controller receiving a path computation request from an application, invoking a corresponding customized routing algorithm according to information about the customized routing algorithm carried in the path computation request to compute a service path. | 2017-11-09 |
20170324650 | AUTOMATED DETERMINATION OF TREE ATTRIBUTES AND ASSIGNMENT OF RECEIVER IDENTIFIERS BY DISTRIBUTED ELECTION IN MULTICAST ARCHITECTURES RELYING ON PACKETS IDENTIFYING INTENDED RECEIVERS - Exemplary methods include a first network device participating in an election process to determine a designated bit forwarding router (D-BFR). The methods include in response to determining the first network device is elected to be the D-BFR, performing D-BFR operations comprising assigning one or more bitmask positions (BMPs) to one or more bit forwarding egress routers (BFERs) and advertising the assigned one or more BMPs. The method may further include one or more of determining an elected bitmask (BM) length based on maximum local BM lengths advertised by other BFRs and determining an elected tree type based on supported tree types advertised by other BFRs. | 2017-11-09 |
20170324651 | TRACEROUTE TO RETURN AGGREGATED STATISTICS IN SERVICE CHAINS - A packet is received at a network device hosting a service function that is part of a service chain. The packet is sent to the network device from an originating network device. The content of the packet is analyzed to determine that the packet comprises a request for statistical values to be aggregated by the network device. The statistical values are aggregated at the network device. A report comprising the statistical values aggregated at the network device is generated. The report is sent to the originating network device. | 2017-11-09 |
20170324652 | IN-FLOW PACKET PRIORITIZATION AND DATA-DEPENDENT FLEXIBLE QOS POLICY - A method, operational at a device, includes receiving at least one packet belonging to a first set of packets of a packet flow marked with an identification value, determining that the at least one packet is marked with the identification value, determining to change a quality of service (QoS) treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received, and sending a request to change the QoS treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received to trigger a different QoS treatment of packets within the packet flow, responsive to determining to change the QoS treatment. Other aspects, embodiments, and features are also claimed and described. | 2017-11-09 |