46th week of 2021 patent applcation highlights part 71 |
Patent application number | Title | Published |
20210359845 | IMPROVED VEHICLE COMMUNICATION - The present disclosure includes methods and apparatuses comprising a processor and an external communication component coupled to the processor. The external communication component, in response to determining that an approaching entity is within a particular proximity of the external communication component, is configured to generate an external private key and an external public key, provide the external public key to a communication component of the approaching entity, receive data from the communication component of the approaching entity in response to providing the external public key to the communication component of the approaching entity, decrypt the received data using the external private key, and provide authorization to the approaching entity to transit through a limited access gate based on the decrypted received data. | 2021-11-18 |
20210359846 | SECURE MULTI-PARTY REACH AND FREQUENCY ESTIMATION - Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device. | 2021-11-18 |
20210359847 | Exchanging Cryptographic Key Information - A computer-implemented method is provided for exchanging cryptographic key information between a device and a central point comprises obtaining a cryptographic secret, wherein the cryptographic secret is known to the central point. The method furthermore comprises obtaining a public key of the central point. The method furthermore comprises generating a cryptographic key pair for the device with a private key of the device and a public key of the device. The method furthermore comprises signing the cryptographic secret with the private key of the device. The method furthermore comprises encrypting the cryptographic secret signed with the private key of the device with the public key of the central point. The method furthermore comprises providing the encrypted and signed cryptographic secret, an address of an electronic mailbox of the device, and the public key of the device for the central point via an electronic mailbox of the central point. | 2021-11-18 |
20210359848 | SIGNATURE DEVICE, VERIFICATION DEVICE, SIGNATURE METHOD, VERIFICATION METHOD, AND COMPUTER READABLE MEDIUM - A signature device ( | 2021-11-18 |
20210359849 | SYSTEMS AND METHODS FOR UTILIZING QUANTUM ENTROPY IN SINGLE PACKET AUTHORIZATION FOR SECURE NETWORK CONNECTIONS - A device may receive, from a client device, a request with a single packet authorization (SPA) packet that includes data identifying a universal client device identifier. The device may generate a shared key associated with the universal client device identifier, and may determine that the SPA packet matches a comparison message authentication code (MAC) generated based on the shared key. The device may provide, based on the SPA packet matching the comparison MAC, a MAC associated with the SPA packet to the client device to enable the client device to validate the device. | 2021-11-18 |
20210359850 | MUTATION PROCESSING FOR EVENTS - A system for committing event data includes an interface and a processor. The interface is configured to receive input data and receive a client key. The processor is configured to generate an Nth sequence number; determine an Nth event hash using the input data, an N−1 signature, and the Nth sequence number; encrypt the Nth event hash with the client key to generate an Nth signature; generate an Nth event from the input data, the N−1 signature, the Nth sequence number, and the Nth signature; and, in response to an aggregate N−1 of one or more prior events being valid, apply Nth event onto the aggregate N−1. | 2021-11-18 |
20210359851 | QUERY AND PROJECTION PROCESSING FOR EVENTS - A system for querying a state of aggregate N or creating a projection comprises an interface and a processor. The interface is configured to receive request to query the state of the aggregate N or to create a projection up to a target event and receive a client key. The processor is configured to rehash each event input data of the aggregate N with its corresponding sequence number and a prior event signature to generate a hash value; reencrypt the hash value using the client key to create a check signature; determine whether the check signature is equal to the prior event signature; in response to each check signature being equal to the prior event signature, replay the events of the aggregate N to generate and provide the state of the aggregate N; and in response to a check signature not being equal to the prior event signature, indicate that the aggregate N is not valid. | 2021-11-18 |
20210359852 | AUDITING FOR EVENTS - A system for auditing event data includes an interface and a processor. The interface is configured to receive an audit query request and a client key. The processor is configured to determine whether the audit query request is valid; determine whether a chain of events is stored in an audit store, wherein the chain of events is associated with the audit query request; and in response to determining that the chain of events is stored in the audit store, provide data for the audit query request. | 2021-11-18 |
20210359853 | Hashing Schemes for Cryptographic Private Key Generation - Techniques are disclosed relating to generation of cryptographic private keys. In some embodiments, a computing system receives a request for a private key for use with a service that uses a key of a first length, where the request specifies a key of a second length that is less than the first length. The system then generates a hashing scheme based on the second length and a key computation time, where the hashing scheme includes a number of hashing rounds and a set of hashing functions. The system creates a synthetic key of the second length and uses the synthetic key and the hashing scheme to create a normal key of the first length, where the synthetic key permits a user to access the service by supplying the synthetic key and without having to supply the normal key. The disclosed cryptographic techniques may advantageously allow for memorization of private keys. | 2021-11-18 |
20210359854 | SECURITY CREDENTIAL DERIVATION - In some examples, a device includes a memory, a processor, and a controller separate from the processor to derive a security credential based on information comprising a key accessible by the controller. The controller communicates the derived security credential in a secure manner to a program code executable on the processor, and uses the derived security credential to protect data stored in the memory against unauthorized access. | 2021-11-18 |
20210359855 | SECURE STORAGE OF ANCHOR PASSPHRASE FOR DBMS - A system and method to receive, by a database service from an encryption service of a database provider in a cloud environment, an encryption key passphrase stored in a secure storage separate and distinct from a database persistence and object store of the database service, the encryption key passphrase used as a key to encrypt and decrypt a key storage of the database service that stores one or more keys used by the database service; and to use the encryption key passphrase by a recovery service of the database provider in the cloud environment to recover the database service and its associated key storage. | 2021-11-18 |
20210359856 | CLOUD TOKEN PROVISIONING OF MULTIPLE TOKENS - A method is disclosed. The method includes receiving, by a token service computer, a token request message, the token request message being originated from a token requestor computer. The method also includes determining, by the token service computer, two or more access tokens based upon a single credential, and then transmitting the two or more access tokens to the token requestor computer in a token response message. | 2021-11-18 |
20210359857 | CARD IDENTIFICATION SYSTEM WITH SCRAMBLE CODING ABILITY - A card identification system with scramble coding ability is proposed, in that the card ID, device code and validation period and mobile current time are encrypted and encoded by using a master key and a scrambling variable to form a 2D code. The 2D code is time varied. As a result, the coder receiving end of a decoder must decode and decrypt the 2D code based on the master key and the scrambling variable in a validation period. If the time is over the validation period, a new 2D code is generated at a sending end. If one 2D code is copied, the copied 2D code is only effective in the validation period. Therefore, the system can assure the safety of the identification of a person. The 2D code are usable in various status, such as an employee card, a visitor card, an attendance card. | 2021-11-18 |
20210359858 | APPARATUS, METHOD AND SOFTWARE FOR ELECTRONIC VOTING DURING WEB CONFERENCE - A user apparatus, a method and software for an electronic voting during a web conference are presented. The method includes: receiving a digital identifier of a user into a digital wallet; receiving a digital voting right into the digital wallet in response to generating a cryptographical proof of the digital identifier and transmitting the cryptographical proof of the digital identifier; receiving a digital ballot into the digital wallet in response to generating a cryptographical proof of the digital voting right and transmitting the cryptographical proof of the digital voting right; machine-reading a digital voting place identifier from a machine-readable code during a web conference; and casting a vote by filling out the digital ballot, generating a cryptographical proof of the digital ballot and transmitting the cryptographical proof of the digital ballot, the digital ballot and the digital voting place identifier; wherein the digital wallet is used with a multi-factor authentication including an authentication of the user with the biometric authentication device, and wherein the digital identifier of the user, the digital voting right and the digital ballot are processed as verifiable credentials. | 2021-11-18 |
20210359859 | SYSTEMS AND METHODS FOR DETECTING DEVICE LOCATION AND USAGE - Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert. | 2021-11-18 |
20210359860 | TECHNIQUES FOR SECURE BLOCKCHAIN ROUTING - Described herein are systems and methods for providing secure blockchain routing utilizing an extended blockchain protocol. In some embodiments, a blockchain routing node may join an overlay network including a plurality of blockchain routing nodes. The blockchain routing node may receive a plurality of forwarding tables from the plurality of blockchain routing nodes in accordance with an extended blockchain protocol. The blockchain routing node may determine a routing table for the overlay network based at least on part on the plurality of forwarding tables. In some embodiments, the blockchain routing node may route a payload message to a destination blockchain routing node in the overlay network in accordance with the determined routing table. | 2021-11-18 |
20210359861 | MICROCODE SIGNATURE SECURITY MANAGEMENT SYSTEM BASED ON TRUSTZONE TECHNOLOGY AND METHOD - The present invention provides a microcode signature security management system based on a Trustzone technology, and belongs to the field of data security storage. The microcode signature security management system comprises the steps of: starting a normal operating system after the hardware equipment is started; acquiring the signature-encrypted microcode file and outputting the signature-encrypted microcode file and a switching signal by the normal operating system; receiving the switching signal and starting the monitor mode by the microprocessor to start a secure operating system; receiving the signature-encrypted microcode file, performing signature verification on the signature-encrypted microcode file, loading the file when the signature verification passes, otherwise outputting microcode error information when the signature verification fails by the secure operating system. The present invention has beneficial effects that the security of microcode is ensured on the basis of a secure operating system (secure os) safety environment to which a system layer is inaccessible. A cryptography tool measure is adopted, so that the security, integrity and correctness of loaded microcode are ensured, and the risk of breaking, modifying and replacing an existing microcode management mechanism is lowered. | 2021-11-18 |
20210359862 | SYSTEMS AND METHODS FOR SYNCHRONIZING ANONYMIZED LINKED DATA ACROSS MULTIPLE QUEUES FOR SECURE MULTIPARTY COMPUTATION - Disclosed herein are systems and methods for synchronizing anonymized linked data across multiple queues for SMPC. The systems and methods guarantee that data is kept private from a plurality of nodes, yet can still be synced within a local queue, across the plurality of local queues. In conventional SMPC frameworks, specialised data known as offline data is required to perform key operations, such as multiplication or comparisons. The generation of this offline data is computationally intensive, and thus adds significant overhead to any secure function. The disclosed system and methods aid in the operation of generating and storing offline data before it is required. Furthermore, the disclosed system and methods can help start functions across multi-parties, preventing concurrency issues, and align secure input data to prevent corruption. | 2021-11-18 |
20210359863 | METHOD FOR CREATING A HIERARCHICAL THRESHOLD SIGNATURE DIGITAL ASSET WALLET - A method for creating a hierarchical threshold signature digital asset wallet using a hierarchical distributed key generator (DKG) and a signature protocol includes steps of generating a public key by users and the digital asset wallet service platform, securing and controlling a portion of shares, sending a transaction signing request, validating the transaction signing request, creating a signature of the signed transaction, and uploading the signed transaction to the corresponding digital asset blockchain network and monitoring the execution of the signed transaction. | 2021-11-18 |
20210359864 | CONFIDENTIAL BLOCKCHAIN TRANSACTIONS - A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction. | 2021-11-18 |
20210359865 | CERTIFICATE RENEWAL PROCESS OUTSIDE APPLICATION SERVER ENVIRONMENT - A computer-implemented method, a system, and a computer program product for renewing a digital certificate. According to an embodiment of the present invention, the computer-implemented method comprises copying a digital certificate, from a first computer, onto a second computer, and requesting, from the second computer, renewal of the digital certificate by a certificate authority. The method further comprises loading a renewed digital certificate from the certificate authority, and saving the renewed digital certificate on the second computer. The renewed digital certificate is checked, on the second computer, for specified conditions, and the renewed digital certificate is copied from the second computer onto the first computer. | 2021-11-18 |
20210359866 | DECENTRIALIZED KEY MANAGEMENT SYSTEM AND METHOD - A decentralized key management system according to an embodiment of the present disclosure includes a bootstrap for generating a key and obtaining a certificate corresponding to the generated key, a memory for receiving the key and the certificate from the bootstrap and storing the key and the certificate, a container, in response to a mount command of the bootstrap, for reading the key and the certificate from the memory and being mounted with the key and the certificate, and a controller for generating the bootstrap, and deleting the bootstrap after the container mounts the key and the certificate. | 2021-11-18 |
20210359867 | Capability Enabling Method and Apparatus - A capability enabling method and apparatus are provided, to resolve a prior-art problem that security of executing a service by using a TEE +SE security architecture cannot be ensured. In this application, an SE establishes, with a TEE, a session used for communication. The SE sends, to the TEE by using the session, an obtaining instruction used to obtain a security certificate of the TEE. The TEE receives, by using the session, the obtaining instruction from the SE. After receiving the obtaining instruction, the TEE generates the security certificate based on attribute information of the TEE, and sends the generated security certificate to the SE by using the session. After the SE receives, by using the session, the security certificate sent by the TEE, the SE determines, based on the security certificate and a preset security policy, that the TEE is in a secure state. After the SE determines that the TEE is in the secure state, the SE enables a first capability for a third-party service in the SE, where the first capability is implemented based on a second capability of the TEE. | 2021-11-18 |
20210359868 | Cryptographic Operation - A method is suggested for providing a response, wherein the method comprises: obtaining a challenge from a host, determining the response based on the challenge, determining an auxiliary value based on the response or the challenge, providing the auxiliary value to the host, obtaining a random value from the host, checking the validity of the challenge based on the random value, and providing the response to the host only if the challenge is valid. Also, according methods running on the host and system are provided. Further, corresponding devices, hosts and systems are suggested. | 2021-11-18 |
20210359869 | TRANSISTOR-BASED PHYSICALLY UNCLONABLE FUNCTION - An integrated circuit is fabricated using a semiconductor fabrication process. One or more uncontrollable random physical processes in the semiconductor fabrication process can cause small differences between the integrated circuit and other similarly designed integrated circuit. These small differences can cause transistors of the integrated circuit to have different threshold voltages. The integrated circuit can use these different threshold voltages to quantify its physical uniqueness to differentiate itself from other integrated circuits similarly designed and fabricated by the semiconductor fabrication process. | 2021-11-18 |
20210359870 | PRINTED MARKING FOR AN AUTHENTICATION METHOD, AND METHOD OF PRINTING AND OF AUTHENTICATING A PRINTED MARKING - A method of printing and of authenticating a marking, having a visible printed anti-copy pattern produced by pseudorandom noise that is generated on the basis of a secret generation key, includes processing at least one image of the printed anti-copy pattern. The anti-copy pattern is printed onto a marking substrate using predetermined printing conditions. The phase of marking control involves: regenerating the pseudorandom noise on the basis of the secret generation key; creating, computationally, a digital file of an image of a simulated printed anti-copy pattern which corresponding to a projected printing quality of the regenerated pseudorandom noise; capturing at least one image of the printed anti-copy pattern; and comparing the captured image of the printed anti-copy pattern with the image of the simulated anti-copy pattern in order to determine, computationally, a mathematical distance between the image of the printed anti-copy pattern and the image of the simulated anti-copy pattern. | 2021-11-18 |
20210359871 | POLICY AND CHARGING CONTROL (PCC) IN INFORMATION CENTRIC NETWORKING - Systems and methods of providing policy and charging control in an information-centric network are described. An interest packet is transmitted from a content consumer to a holder through a gNB, ICN-PoA and ICN-GW. The interest packet has a prefix identifying content to be retrieved and a type field indicating an interest packet. The ICN-PoA modifies the interest packet to include a type of service (TS) field having the identity of the consumer and then transmitted to the ICN-GW when the content is neither created nor cached inside the 5G network. A data packet that includes the prefix, a type field indicating a data packet and the TS field is returned from the ICN-GW. The data packet is modified by the ICN-PoA to remove the TS field and transmitted to the consumer. The interest and data packets are logged and reported to an ICN-CF for generation of charging records. | 2021-11-18 |
20210359872 | AUTOMATIC CORRECTION OF ERRONEOUS AUDIO SETTING - Electronic conferences can often be the source of frustration and wasted resources as participants may be forced to contend with extraneous sounds, such as conversations not intended for the conference, provided by an endpoint that should be muted. Similarly, participants may speak with the intention of providing their speech to the conference but speak while their associated endpoint is muted. As a result, the conference may be awkward and lack a productive flow while erroneously muted or non-muted endpoints are addressed. By detecting erroneous audio settings, endpoints can be prompted or automatically corrected to have the appropriate audio state. | 2021-11-18 |
20210359873 | CHANNELING MESSAGING COMMUNICATIONS IN A SELECTED GROUP-BASED COMMUNICATION INTERFACE - Provided is a group-based communication interface configured to allow users of the interface to communicate within group-based communication channels and across group-based communication channels to provide relevant information to other users efficiently and effectively. Group-based messaging communications across the plurality of group-based communication channels can be channeled to specific receiver channels providing relevant information to users of the group-based communication interface thereby increasing the efficiency and effectiveness of group-based messaging communications and the lifetime of the system. | 2021-11-18 |
20210359874 | SYSTEMS AND METHODS FOR STRUCTURING INFORMATION IN A COLLABORATION ENVIRONMENT - A computer-implemented machine learning method for improving a collaboration environment is provided. The method comprises receiving text data for one or more users of the collaboration environment. The method further comprises generating a statement by partitioning the text data. The method further comprises determining an act using the statement and generating a thread using at least the statement and the act. The method further comprises generating an actor list using at least the thread, and generating an actionable item using the actor list and the thread. | 2021-11-18 |
20210359875 | ARTIFICIAL INTELLIGENT REFRIGERATOR AND CONTROL METHOD OF THE SAME - An artificial intelligent refrigerator includes: a main body; a storage compartment provided inside the main body and comprising a plurality of separate storage sections; a door part for opening and closing the storage compartment; a memory in which user authentication information corresponding to each of the storage sections is registered; and a controller that, once a user is authenticated through a predetermined authentication means, opens the door part and unlocks a storage section belonging to the authenticated user, among all of the storage sections, to make the corresponding storage section available. | 2021-11-18 |
20210359876 | Managed Switch With Physically Distributed Ports - A ring-based switch has nodes with a link management logic having forward and reverse link outputs couplable to other nodes, forward and reverse link inputs adapted couplable to other nodes, and memory coupled to the link management logic. The link management logic has a first mode where packet bursts are received through the forward link input and transmitted on its forward link output. The link management logic has a second mode where packet bursts are received through the forward link input and transmitted on its reverse link output; and a third mode where packet bursts are received through the reverse link input and transmitted on its forward link output. The node transmits test packets over the forward link output and, if no acknowledgment is received over the reverse link input within a predetermined test-time interval, the link management logic configures in the second mode. | 2021-11-18 |
20210359877 | METHOD FOR ROUTING TELEGRAMS IN AN AUTOMATION NETWORK, AUTOMATION NETWORK AND NETWORK DISTRIBUTOR - A method for routing telegrams in an automation network with network subscribers interconnected via a data line network. At least network subscriber is a master subscriber, which sends telegrams to the network subscribers via the data line network. At least one network subscriber is a network distributor having a plurality of input/output ports, where input/output ports to which segments with further network subscribers are connected are designated as end ports. The master subscriber assigns a port address to each end port, and assigns the port address as an identifier to a telegram intended for processing for a segment with further network subscribers. If the network distributor receives a telegram with a port address of an end port of the network distributor as an identifier, the network distributor outputs the telegram directly via the input/output port of the network distributor corresponding to the end port of the port address. | 2021-11-18 |
20210359878 | APPARATUS, SYSTEM, AND METHOD FOR INCREASING BANDWIDTH UTILIZATION IN ENCAPSULATION TUNNELS - A disclosed method may include (1) identifying a packet that enters a start point of an encapsulation tunnel that spans at least a portion of a network, (2) discovering a maximum transmission unit of the encapsulation tunnel, (3) determining whether a size of the packet satisfies a size threshold that is based at least in part on the maximum transmission unit of the encapsulation tunnel, (4) detecting an encapsulation-triggering event in connection with the packet, and then in response to detecting the encapsulation-triggering event, (5) forwarding the packet via the start point of the encapsulation tunnel toward an end point of the encapsulation tunnel. Various other systems, methods, and computer-readable media are also disclosed. | 2021-11-18 |
20210359879 | PACKET FORWARDING METHOD AND NETWORK DEVICE - This application provides a packet forwarding method and a network device. The method specifically includes: A first network device forwards a first packet from a second network device to a corresponding local virtual machine based on the virtual network identifier in the first packet, and does not need to forward the packet according to a virtual routing and forwarding VRF table. This prevents the packet from being forwarded to another network device again, and ensures normal forwarding of the packet. | 2021-11-18 |
20210359880 | SECURING A CONNECTION FROM A DEVICE TO A SERVER - This invention is directed to a communication processing apparatus that secures a safe connection from a non-IP-connection device to an IP-connection cloud (server). This communication processing apparatus includes a first connection unit that connects devices, a second connection unit that connects to servers, a switching unit that switches connections of the devices and the servers between the first connection unit and the second connection unit, a determiner that determines whether connection of a device to the first connection unit is permitted or unpermitted, and a connection controller that controls the switching unit in accordance with a determination result from the determiner. | 2021-11-18 |
20210359881 | DATA PROCESSING DEVICE AND DATA PROCESSING SYSTEM - An edge system ( | 2021-11-18 |
20210359882 | SRS CARRIER SWITCHING FOR ADDITIONAL SRS - Methods, apparatuses, and computer-readable medium for SRS are provided. An example UE may receive an SRS configuration and a downlink transmission scheduling an uplink transmission, the uplink transmission being scheduled on a CC, the SRS configuration comprising one or more additional SRS symbols relative to a first set of SRS symbols associated with an aperiodic trigger Type 1 or a periodic trigger Type 0, the one or more additional SRS symbols being scheduled on a destination CC at least one of the one or more additional SRS symbols overlapping at least partially with the uplink transmission. The example UE may drop or delay transmission of at least a part of an SRS in the one or more additional SRS symbols on the destination CC or at least a part of the uplink transmission on the source CC. | 2021-11-18 |
20210359883 | HIGH BANDWIDTH CONTINUOUS TIME LINEAR EQUALIZATION CIRCUIT - A high bandwidth continuous time linear equalization (HBCTLE) circuit is disclosed. The HBCTLE circuit includes a continuous time linear equalization (CTLE) circuit and a gain circuit coupled with an output of the CTLE circuit. A feedback circuit is coupled between the output of the CTLE circuit and an output of the gain circuit. | 2021-11-18 |
20210359884 | CONTINUOUS TIME LINEAR EQUALIZATION CIRCUIT - A continuous time linear equalization (CTLE) circuit is disclosed. The CTLE circuit includes a passive CTLE circuit and an active CTLE circuit. The active CTLE circuit includes a differential transistor pair and the output of the passive CTLE is configured to drive gates or bases of the differential transistor pair. | 2021-11-18 |
20210359885 | MULTI-GENERATION COMMUNICATION IN A WIRELESS LOCAL AREA NETWORK (WLAN) - This disclosure provides methods, devices and systems for wireless communication, and particularly, for generating or receiving a multi-generation physical layer protocol data unit (PPDU). The multi-generation PPDU may concurrently include a first generation-specific preamble based on a first generation of a wireless communication specification (such as that defined by the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards) and a second generation-specific preamble based on a second generation of the wireless communication specification in a same transmission. The generation-specific preambles may be generated based on bandwidth portions of a wireless channel that each generation-specific preamble will occupy in the multi-generation PPDU. One or more of the generation-specific preambles may be modified based on an aggregate bandwidth of the multi-generation PPDU. This disclosure includes several options for modifying one or more generation-specific preambles or data fields to accommodate their use in a multi-generation PPDU. | 2021-11-18 |
20210359886 | RECONFIGURATION OF ACTIVE COMPONENT CARRIER SET IN MULTI-CARRIER WIRELESS SYSTEMS RELATED APPLICATION - In a multi-carrier wireless system, a wireless mobile station comprising a control circuit. The control circuit is configured to receive first data according to a first configuration of two or more component carriers. The control circuit is further configured to receive signaling information indicating that a change of configuration to a second component-carrier configuration is pending, the change of configuration comprising a change in the number of component carriers to be used for data transmission or a change to a set of active component carriers, with the number of active component carriers remaining the same. The control circuit is further configured to selectively activate, de-activate, or reconfigure one or more transceiver components during a pre-determined guard interval of greater than one subframe, based on the signaling information. The control circuit is further configured to receive second data according to the second component-carrier configuration, after the guard interval. | 2021-11-18 |
20210359887 | Demodulation Reference Signal Sequence Generation Method and Apparatus - The present disclosure provides a method ( | 2021-11-18 |
20210359888 | DATA MODULATION AND DEVICE AND DEMODULATION DEVICE FOR THE MULTICARRIER SYSTEM - A data modulation and device and demodulation device for the multicarrier system are provided. The data modulation method includes: performing different cyclic shifting on data sequences of L continuous symbols respectively, L≥2; and modulating the cyclically shifted data sequences by use of a waveform function, an independent variable range of the waveform function being greater than or equal to a symbol interval of the L modulated symbols. The technical solution solves the technical problems in which the related art is not compatible with a LTE system or effectively suppressing out-of-band leakage or flexibly adjusting a symbol interval to adapt to different channel environments and exhibits poor demodulation performance, thus achieving effective suppression of the out-of-band leakage, having higher compatibility with the LTE system and improving demodulation performance and flexibility of adjusting a symbol interval by simple cyclic shifting. | 2021-11-18 |
20210359889 | SYMBOL GENERATOR AND SYMBOL GENERATION METHOD - Embodiments include devices and methods for generating a preamble symbol and also transmitting and receiving a signal comprising the preamble symbol. It is proposed a preamble symbol which achieves a robust and simple frame detection and synchronization, quick and reliable detection of embedded signaling data at low complexity and with a low Peak to Average Power Ratio (PAPR). The proposed preamble symbol has three parts, denoted front part, central part and back part. The front part and the back parts comprise a similar correlation sequence which is used for preamble detection, coarse time synchronization and fractional frequency error estimation. While the central part comprises consecutive blocks of samples comprising a predetermined reference information and signaling data which are used for coarse frequency synchronization and conveying data. | 2021-11-18 |
20210359890 | PEAK REDUCTION TONE ALLOCATION TECHNIQUES - Aspects presented herein may improve the efficiency and performance of the tone reservation PAPR reduction technique by allocating peak reduction tone based at least in part on a channel condition, such as based on the signal to noise ratio of the channel. In some aspects, a transmitting device measures a signal to noise ratio for a plurality of tones within a frequency resource. The transmitting device selects a location of one or more reserved tones (e.g., peak reduction tones) among one or more tones based at least in part on an SNR for one or more tones. The transmitting device transmits data to a receiving device in a subset of the plurality of tones that does not include the one or more peak reduction tones. Other aspects and features are also disclosed. | 2021-11-18 |
20210359891 | METHOD AND APPARATUS FOR DOWNLINK OFDMA HAVING DFT-PRECODING APPLIED THERETO - The disclosure relates to a 5G or 6G communication system for supporting a higher data transfer rate beyond a 4G communication system, such as LTE. A method by a base station in a communication system according to an embodiment may include: determining the number of DFT-precoding chunks on which DFT precoding is performed; determining a power backoff value of a power amplifier (PA) of the base station; transmitting information indicating the number of DFT-precoding chunks to a terminal; transmitting downlink control information (DCI) including a resource allocation field, configured based on the number of DFT-precoding chunks, to the terminal; and transmitting data to the terminal according to the resource allocation field included in the DCI. | 2021-11-18 |
20210359892 | LOW OVERHEAD TRACKING REFERENCE SIGNAL FOR FREQUENCY TRACKING - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may determine a tracking reference signal (TRS) pattern to be used for receiving a TRS. The TRS pattern may indicate a plurality of TRS symbols of the TRS, one or more TRS symbols of the plurality of TRS symbols having a bandwidth that is different than a bandwidth of at least one other TRS symbol of the plurality of TRS symbols, or having a discontinuous tone allocation. The UE may receive the TRS based at least in part on the TRS pattern. Numerous other aspects are provided. | 2021-11-18 |
20210359893 | METHOD AND DEVICE FOR SENDING DISCOVERY SIGNAL ON UNLICENSED CARRIER, AND ACCESS POINT - Provided are a method and apparatus for occupying an unlicensed carrier to send a discovery signal, and an access point. The method includes the following steps. A parameter of a discovery signal sent on an unlicensed carrier by an access point is configured. The access point sends the discovery signal on the unlicensed carrier. The technical solution of the present disclosure can reduce the time for processing items other than data sending (such as synchronization) after each time the access point preempts a resource, and can improve the spectral efficiency of the unlicensed carrier. | 2021-11-18 |
20210359894 | FACILITATION OF REDUCTION OF PEAK TO AVERAGE POWER RATIO FOR 5G OR OTHER NEXT GENERATION NETWORK - Because the number of transmitted layers can vary dynamically, the number of transmitted demodulation reference signals (DM-RS) can also vary. However, because the network node can know the number of ports, transmitted layers, or the rank, the network node can utilize the number as part of the scheduling information via a downlink or an uplink control channel. Therefore, the DMRS sequence generation can modified such that it depends on the number of ports, transmitted layers, or the rank, thereby generating a different random sequence for different ports. | 2021-11-18 |
20210359895 | TRANSMITTER COMPLEX- AND REAL-VALUED IN-PHASE AND QUADRATURE MISMATCH PRE-COMPENSATORS - An in-phase and quadrature mismatch compensator for a quadrature transmitter includes a delay element, a complex-valued filter and an adder. The delay element receives an input transmit signal and outputs a delayed transmit signal. The complex-valued filter receives the input transmit signal and outputs a selected part of a filtered output transmit signal. The adder adds the delayed transmit signal and the selected part of the filtered output transmit signal and outputs a pre-compensated transmit signal. In one embodiment, the selected part of the filtered output transmit signal includes the real part of the complex-valued output transmit signal. In another embodiment, the selected part of the filtered output transmit signal includes the imaginary part of the complex-valued output transmit signal. Two transmit real-valued compensators are also disclosed that combine the in-phase and quadrature signals before being filtered. | 2021-11-18 |
20210359896 | METHODS AND APPARATUS FOR TRANSMIT IQ MISMATCH CALIBRATION - A method of pre-compensating for transmitter in-phase (I) and quadrature (Q) mismatch (IQMM) may include sending a signal through an up-converter of a transmit path to provide an up-converted signal, determining the up-converted signal, determining one or more IQMM parameters for the transmit path based on the determined up-converted signal, and determining one or more pre-compensation parameters for the transmit path based on the one or more IQMM parameters for the transmit path. In some embodiments, the up-converted signal may be determined through a receive feedback path. In some embodiments, the up-converted signal may be determined through an envelope detector. | 2021-11-18 |
20210359897 | SYSTEM FOR CENTRALIZED MONITORING AND CONTROL OF IOT DEVICES - A system for centralized monitoring and control of Internet of Things (IoT) devices comprises an abstraction module development utility and an IoT device management system. The abstraction module development utility determines one or more device-specific user interface (UI) interactions for performing an action for each of a plurality of different IoT device types and generates an abstraction module for each of the different IoT device types. The IoT device management system is configured to generate one or more non-device-specific API calls for performing the action with respect to a particular IoT device, determine an IoT device type from among the plurality of different IoT device types for the particular IoT device, and direct the one or more non-device-specific API calls for performing the action to the abstraction module for the determined IoT device type for execution against the particular IoT device. | 2021-11-18 |
20210359898 | METHODS, SYSTEMS, AND DEVICES FOR PROVISIONING AN APPLICATION ON A NETWORK NODE ACCORDING TO MOVEMENT PATTERNS AND APPLICATION PARAMETERS FOR MOBILE DEVICES - Aspects of the subject disclosure may include, for example, identifying a plurality of mobile devices implementing an application, and identifying a group of mobile devices from among the plurality of mobile devices according to a first movement pattern of the group of mobile devices. Further aspects can include identifying a first mobile edge compute (MEC) node at a first location according to a proximity threshold that does not include a MEC agent for the application, and identifying a second MEC node at a second location that includes the MEC agent for the application according to the proximity threshold. Additional aspects can include determining a first network relative performance (NRP) metric associated with a first communications between the group of mobile devices and the second MEC node. The first communications are associated with the application. Other embodiments are disclosed. | 2021-11-18 |
20210359899 | Managing Event Data in a Network | 2021-11-18 |
20210359900 | BEAM FAILURE RECOVERY - Systems, methods and instrumentalities are disclosed for WTRU-initiated beam recovery including beam switching and/or beam sweeping. A WTRU may be configured to detect a beam failure condition, identify a candidate beam for resolving the beam failure condition, and send a beam failure recovery request to a network entity. The WTRU may include the candidate beam in the beam failure recovery request and may receive a response from the network entity regarding the request and/or a solution for the beam failure condition. WTRU-initiated beam recovery may be used to resolve radio link failures and improve system performance by avoiding the necessity to perform an acquisition procedure. Additionally, beam sweeping may be performed at a sub-time unit level to provide a fast sweeping mechanism. | 2021-11-18 |
20210359901 | DATA DRIVEN SYSTEMS AND METHODS TO ISOLATE NETWORK FAULTS - Methods, systems and computer readable media for isolating network faults are provided. A data driven automation services module is provided including a data connector, a data driven policy designer and a data driven self-service engine. The data connector collects data from the plurality of network data sources and integrates the data into shared communities for insight development. The data driven policy designer creates and stores templates and develops policies to implement service tasks to identify and isolate network problems. The data driven self-service engine integrates the network and its orchestration capabilities with big data technology to develop a plurality of microservices to perform service tasks. | 2021-11-18 |
20210359902 | BEAM RECOVERY METHOD AND APPARATUS, AND TERMINAL AND STORAGE MEDIUM - Provided are a beam recovery method and apparatus, a terminal and a storage medium. The method includes: in a beam recovery process, in response to determining processing of a current stage in the beam recovery process being unsuitable to be implemented on an active bandwidth part (BWP), determining a target BWP of the current stage according to the active BWP and a switch mapping relationship determined for the current stage, switching to the target BWP to perform the processing of the current stage, and continuing to perform the beam recovery process until implementing a beam recovery. | 2021-11-18 |
20210359903 | UE REQUESTED BFD/BFR REFERENCE SIGNAL - This disclosure provides systems, devices, apparatus and methods, including computer programs encoded on storage media, for a UE-requested BFD/BFR reference signal. In aspects, the UE may transmit, to a base station, a request for a list of a set of beams for BFD and a list of a set of candidate beams for BFR. The UE may receive, from the base station based on the transmitted request, information indicating the set of beams for BFD and the set of candidate beams for BFR. | 2021-11-18 |
20210359904 | SYSTEM AND METHOD FOR EFFICIENT NETWORK RECONFIGURATION IN FAT-TREES - Systems and methods are provided for supporting efficient reconfiguration of an interconnection network having a pre-existing routing comprising. An exemplary method can provide, a plurality of switches, the plurality switches comprising at least one leaf switch, wherein each of the one or more switches comprise a plurality of ports, and a plurality of end nodes, wherein the plurality of end nodes are interconnected via the one or more switches. The method can detect, by a subnet manager, a reconfiguration triggering event. The method can compute, by the subnet manager, a new routing for the interconnection network, wherein the computing by the subnet manager of the new routing for the interconnection network takes into consideration the pre-existing routing and selects the new routing for the interconnection network that is closest to the pre-existing routing. The method can reconfigure the interconnection network according to the new routing. | 2021-11-18 |
20210359905 | NETWORK FUNCTION UPGRADE METHOD, SYSTEM AND APPARATUS - A method, system and apparatus to upgrade a plurality of network elements with a single procedure. The method including the selection of a network element group to be upgraded, obtaining a list of network element associated with the network element group, and performing a software upgrade to each of the network elements on the list of network elements within the network element group. The system having one or more processors and memory storing instructions that, when executed by the one or more processors, cause the system to execute the method. The apparatus including a non-transitory computer readable medium having instructions that, when executed, cause one or more processors to execute the method. | 2021-11-18 |
20210359906 | HIERARCHICAL CONFIGURATION OF NETWORKED COMMUNICATION DEVICES - A device and method for receiving a configuration setting update at a networked endpoint device. The method comprises: receiving a data packet from a head-end device, including one or more parameter updates including: a parameter identification, a designated parameter value for a parameter identified by the parameter identification, and a predetermined level assignment for the designated parameter value. The method further includes updating a record of two or more records of each parameter with its designated parameter value, the two or more records associated with differentiating level assignments defining a prioritized hierarchy of parameter values for the parameter at the endpoint device, where the updated record is associated with the predetermined level assignment. The method further includes running an application using a selected parameter value recorded at a highest priority level assignment of the differentiating level assignments for which parameter values are presently recorded at the endpoint device. | 2021-11-18 |
20210359907 | SYSTEM FOR CONFIGURING WI-FI ACCESS POINTS - A system for configuring a Wi-Fi access point for communication with the Internet includes a Wi-Fi access point configuration system connected with one or more cellular networks and being configured to receive information from at least one of the one or more cellular networks. The Wi-Fi access point configuration system is connected with the Wi-Fi access point to configure the Wi-Fi access point according to the information received from the at least one of the one or more cellular networks. | 2021-11-18 |
20210359908 | LINKING MULTIPLE ENROLLMENTS ON A CLIENT DEVICE - Disclosed are various examples for facilitating enrollment of a client device into more than one management framework. A client device can be enrolled with a management service as a fully managed device. The client device can also be enrolled with the management service as a personal or bring-your-own-device (BYOD), which causes a workspace to be created on the device that is segregated from the rest of the client device. Both enrollments can be managed by a remotely executed management service. | 2021-11-18 |
20210359909 | METHOD FOR INFORMATION CONFIGURATION, APPARATUS, ELECTRONIC DEVICE, STORAGE MEDIUM AND PROGRAM PRODUCT - A method for information configuration, an apparatus, an electronic device, a storage medium and a program product. By searching for a computing device within a searching range of devices, and sending device configuration information to a searched computing device, the cost of human resources is reduced and the configuration efficiency of computing devices is improved. | 2021-11-18 |
20210359910 | PACKET DATA UNIT (PDU) STRUCTURE FOR SUPPORTING DISTRIBUTED RELAY CONTROL PROTOCOL (DRCP) - A method supporting distributed resilient network interconnect (DRNI) in a link aggregation group at a network device is disclosed. The method starts with encapsulating a distributed relay control protocol data unit (DRCPDU) in a frame, wherein the DRCPDU includes a protocol data unit (PDU) structure. The PDU structure includes a type field indicating that the DRCPDU is for DRCP, a version field indicating a version number of the DRCP, and a set of type/length/values (TLVs) including: a terminator TLV indicating an end of the PDU structure, a portal information TLV indicating characteristics of the first portal, a portal configuration information TLV indicating configuration information of the first portal, a DRCP state TLV indicating variables associated with an intra-portal link (IPP), a home ports information TLV and a neighbor ports information TLV. The method continues with transmitting the frame encapsulating the DRCPDU from the network device to a neighbor network device. | 2021-11-18 |
20210359911 | CONFIGURING A DEVICE TO HAVE CERTIFICATE(S) BY ORDERING ASYNCHRONOUS WORK REQUESTS - Techniques are described herein that are capable of configuring a device to have certificate(s) by ordering asynchronous work requests. Portions of work that are to be performed to configure a device to have certificate(s) are performed based at least in part on a triggering event that indicates that the device is to be configured. Asynchronous work requests that are configured to, when executed, initiate performance of the respective portions of the work are generated. A hierarchical work tree that includes hierarchical nodes that represent the respective portions of the work is generated. The hierarchical work tree defines an order in which the portions of the work are to be performed. The asynchronous work requests are executed in the order defined by the hierarchical work tree, which initiates creation of the certificate(s) and delivery of the certificate(s) to the device. | 2021-11-18 |
20210359912 | NETWORK SLICING IN RADIO INTERFACE - This document discloses a solution for addressing network slices in a radio interface between a station and an access node. According to an aspect, the station is granted access to a network slice and, when transmitting a data frame of the network slice, the network slice is identified in the data frame by a medium access control address of the data frame. | 2021-11-18 |
20210359913 | Device Provisioning - The disclosure relates to provisioning end devices, such as wireless end devices. In one aspect, a wireless end device may be provisioned with a backend system without requiring a user to enter information to connect the wireless end device to a local wireless network. Moreover, the wireless end device may be provisioned with a single user action. In one example, the single action may be a single click on an activation portal. The single action may trigger the backend system to detect the wireless end device with the help of one or more gateways at one or more premises, and to associate the wireless end device with a user account. The backend system may also facilitate configuring the wireless end device to connect to the proper or desired network at a premises. | 2021-11-18 |
20210359914 | METHODS, SYSTEMS AND APPARATUS FOR DYNAMICALLY EXTENDING A CLOUD MANAGEMENT SYSTEM BY ADDING ENDPOINT ADAPTER TYPES - Methods, apparatus and articles of manufacture for dynamically extending a cloud management system by adding endpoint adapter types are disclosed. An example cloud management system includes: an interface to communicate with an external device; a host to manage requests and allocate resources through one or more virtual machines; and an endpoint registry to include an endpoint adapter and metadata defining the endpoint adapter, the endpoint adapter to specify communication between at least one of the host or the external device and an endpoint. In the example cloud management system, the host is to at least enable, via the interface, the external device to access the endpoint registry a) to register an endpoint adapter configuration with the endpoint registry and b) to retrieve the endpoint adapter configuration from the endpoint registry. | 2021-11-18 |
20210359915 | SYSTEMS AND METHODS FOR FULL HISTORY DYNAMIC NETWORK ANALYSIS - Provided herein are methods and systems for determining a historical state of a dynamic network. The methods may comprise continuously obtaining data associated with a system from a plurality of different data sources; constructing a full history dynamic network (FHDN) of the system using the data; and providing a state of the system for a historical time instance in response to a query of the FHDN for the historical time instance. | 2021-11-18 |
20210359916 | COMMUNICATION APPARATUS, CONTROL METHOD FOR CONTROLLING COMMUNICATION APPARATUS, AND STORAGE MEDIUM - A communication apparatus includes an acquisition unit configured to acquire slice information regarding a network slice specified by a network, and a control unit configured to control display according to a result of the acquisition of the slice information. | 2021-11-18 |
20210359917 | Playback Device Connection - Techniques for automatically configuring necessary parameters of a device to be coupled to a network with minimum human intervention are disclosed. In one embodiment, a wired and/or wireless Ad-hoc network is established to facilitate communications among a group of devices. When a new device is added to the network, a rudimentary communication path is initially established between one of the devices in the network and the new device such that necessary parameters (e.g., SSID, WEP security, channel frequency) can be exchanged for the new device to function properly in the network. To ensure the parameters are exchanged in a secure fashion, an additional public security procedure can be used between the two devices. | 2021-11-18 |
20210359918 | SYSTEMS AND METHODS FOR CHAINING CONTROL-PLANE VIRTUAL FUNCTIONS FOR ENSURING END-TO-END QUALITY OF SERVICE (QOS) OF INTERNET SERVICES - Described herein are systems and methods for QoS chaining based on control-plane virtual functions for ensuring end-to-end Quality of Service (QoS) of Internet services. The QoS chaining coordinates broadband service delivery via an orchestrated “chain” or Network Service (NS) consisting of control-plane Virtual Network Functions (VNFs) running in the cloud or virtual infrastructure. Separate service elements, network elements, network domains or other service plane or data plane elements or systems have a separate corresponding VNF in the control plane provide monitor and control functions. QoS is ensured End-to-End (E2E) across the chain of VNFs by coordination through the QoS chain or by a coordinating or integrating E2E orchestrator or E2E VNF. The VNFs may be chained, may communicate directly with each other, and may communicate directly with the E2E orchestrator, may communicate with each other through the E2E orchestrator, or may communicate through a shared database. | 2021-11-18 |
20210359919 | Network Service Management Method, Related Apparatus, and System - A network service management method, where the method may include: receiving, by a second network functions virtualization orchestrator (NFVO), a first request sent by a first NFVO; establishing, by the second NFVO, a first connection between the nested network service instance and the composite network service instance and a second connection between the nested network service instance and a member instance in the composite network service instance based on the service access point instance and the information about the service access point instance; and establishing a network connection between the nested network service instance and a member instance in the nested network service instance based on the service access point instance and the information about the service access point instance. | 2021-11-18 |
20210359920 | TICKET-BASED PROVISIONING OF CLOUD INFRASTRUCTURE FOR A SAAS PROVIDER - Systems and methods for ticket-based provisioning of cloud infrastructure from one or more cloud providers to build one or more computing workspaces of an enterprise. A provisioning platform provides a module catalog having one or more infrastructure-as-code (IAC) modules, each including code that is executable to provision cloud computing resources for the cloud infrastructure from the cloud providers to build the computing workspaces of the enterprise. A service catalog has one or more electronic entries mapped to and corresponding with the IAC modules of the module catalog. The service catalog receives one or more tickets that each specify at least one of the electronic entries in the service catalog, to bind each specified electronic entry with a corresponding IAC module, causing the provisioning platform to instantiate on the more cloud providers the computing resources for the cloud infrastructure corresponding to the ticket. | 2021-11-18 |
20210359921 | QOE-BASED CATV NETWORK CAPACITY PLANNING AND UPGRADE SYSTEM - Systems and methods for analyzing network parameters in a data communications network so as to maintain a desired Quality of Experience (QoE) of at least one subscriber. | 2021-11-18 |
20210359922 | INFORMATION MANAGEMENT METHOD - A server apparatus receives a device ID indicating one electrical home appliance among one or more electrical home appliances and a gateway ID indicating that the one electrical home appliance belongs to a same owner, a same group, or a same home as the one or more electrical home appliances, determines whether or not the one electrical home appliance is a newly connected electrical home appliance, using a management database that manages device IDs indicating the one or more electrical home appliances and the gateway ID, and when it is determined made that the one electrical home appliance is a newly connected electrical home appliance, provides an information device, which is associated with the gateway ID and which differs from the one electrical home appliance, with notification information for confirming whether or not it is to be permitted to collect the log information from the one electrical home appliance. | 2021-11-18 |
20210359923 | PACKET FLOW MONITORING DEVICE, PACKET DATA EXTRACTION DEVICE, EXTRACTION DATA AGGREGATION DEVICE, AND PROGRAM - A packet flow monitoring device, a packet data extraction device, an extraction data aggregation device, and a program for efficiently and highly accurately monitoring a packet flow in a video or audio communication system constructed by an Ethernet (registered trademark) frame or IP packet network. This packet flow monitoring device includes: a packet data extraction device that replicates all passing packets that pass through one or a plurality of specific network switches on the network and extracts and aggregates some predetermined pieces of information in the replicated passing packets to form and output an extraction data report packet; and an extraction data aggregation device that receives the extraction data report packet, analyzes the extraction data report packet so as to aggregate the predetermined pieces of information in the replicated passing packets included in the extraction data report packet for each packet flow, and records the aggregated information as aggregation data. | 2021-11-18 |
20210359924 | MONITORING A STALE DATA QUEUE FOR DELETION EVENTS - A computer-implemented method, system, and computer-readable media are disclosed herein. In embodiments, the computer-implemented method may entail receiving, by a data service, live data associated with an entity. The entity may be, for example, a customer of the data service. The method may then route the live data to a dual-queue system of the data service. The live data may be loaded into a live data queue of the dual queue system for processing. Processing may entail generating summary statistics from the live data. An alert may then be transmitted to the customer in response to detecting the occurrence of one or more alert events. In embodiments, the alert events may include events identified in the summary statistics. Additional embodiments are described and/or claimed. | 2021-11-18 |
20210359925 | TECHNIQUE FOR DETERMINING PERFORMANCE OF INDUSTRIAL PROCESS CONTROL - A technique for determining performance of industrial process control is provided, wherein local controllers of the industrial process are coupled via a wireless communication network to a central controller and supervised by a supervisory system that captures operational information from the local controllers. A method implementation of the technique includes receiving first event records captured from the wireless communication network, receiving second event records captured from the supervisory system, correlating at least the first and second event records that pertain to substantially the same period of time in a correlation record, and determining a performance indicator on the basis of information included in one or more correlation records. | 2021-11-18 |
20210359926 | TECHNIQUE FOR MONITORING A REDUNDANCY STATUS OF A CONNECTION - A technique for monitoring a redundancy status of a connection established between a User Equipment, UE, and a cellular network is disclosed, wherein the connection is established using redundant communication paths between the UE and the cellular network. A method implementation of the technique is performed by a first node of the cellular network and comprises triggering determining a current redundancy status of the connection, the current redundancy status indicating whether or not the redundant communication paths are fully disjoint on at least a portion of the redundant communication paths, and triggering sending a redundancy notification to a second node of the cellular network, the redundancy notification including an indication of the determined current redundancy status. | 2021-11-18 |
20210359927 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - A server as an information processing device includes: a communicator that communicates with mobile a body; a monitoring data storage that stores past monitoring data of the mobile body received by the communicator; and an alive monitor that determines whether a current state of the mobile body is anomalous, based on the past monitoring data stored in the monitoring data storage. | 2021-11-18 |
20210359928 | MODEL FOR TEMPLATE BASED TESTING IN SDN NETWORKS - A method for testing a software defined network (SDN) including a plurality of equipment, including: selecting a test case, wherein the test case includes a test step to be performed on an equipment of the SDN and wherein the test step includes a template logical indicator and a variable file logical indicator; executing the test case including obtaining a network definition for the SDN, obtaining a template for the equipment in the SDN to be tested indicated by the template logical indicator at run time, populating variable values in the obtained template using variable values from a variable file indicated by the variable file logical indicator at run time, and executing a first test step indicated in the template using the populated variable values. | 2021-11-18 |
20210359929 | ANALYSIS OF ROUTING POLICY APPLICATION TO ROUTES - Techniques described herein relate to performing an analysis of application of a routing policy to a route. Specifically, the techniques relate to a command that may be executed to evaluate the steps of the routing policy (e.g., a route map). A copy of a live route map may be made. Receipt of the command may cause the steps of the routing policy to be simulated using the copy. The simulation may return results of analyzing the outcome of each step in the routing policy. Based on the results, an updated routing policy copy may be generated that changes one or more steps in the routing policy. The updated routing policy copy may then be re-simulated to determine if the changes caused the intended effect. If so, the live routing policy may be replaced with the updated routing policy copy. | 2021-11-18 |
20210359930 | Forwarding Path Determining Method, Apparatus, and System - A forwarding path determining method includes: determining, by a path computation node, a first SR-BE forwarding path from a first node to a second node in a first virtual network; determining a second SR-BE forwarding path from the first node to the second node in a physical network; and when the first SR-BE forwarding path completely overlaps the second SR-BE forwarding path, determining the first SR-BE forwarding path as a target forwarding path from the first node to the second node in the first virtual network; or when the first SR-BE forwarding path does not completely overlap the second SR-BE forwarding path, determining, by the path computation node, a first SR-TE forwarding path according to the physical network and the first virtual network, and determining the first SR-TE forwarding path as a target forwarding path from the first node to the second node in the first virtual network. | 2021-11-18 |
20210359931 | Packet Scheduling Method, Scheduler, Network Device, and Network System - A network device adds an extreme low latency (ELL) service packet to an ELL queue, and adds a (time sensitive) TS service packet to a TS queue. A packet in the TS queue is sent within a time window corresponding to the TS queue, and the packet in the TS queue is not allowed to be sent within a time period beyond the time window corresponding to the TS queue. When a remaining time period obtained by subtracting a time period required by a to-be-sent TS service packet within the time window from the time window is greater than or equal to a first threshold, a packet in the ELL queue is allowed to be sent within the time window corresponding to the TS queue. The first threshold is a time period required for sending one or more ELL service packets in the ELL queue. | 2021-11-18 |
20210359932 | OPERATIONS, ADMINISTRATION, AND MANAGEMENT/MAINTENANCE RESPONSE REPLICATION - In one example, a responder obtains an Operations, Administration, and Management/Maintenance (OAM) probe packet from a network entity operating as an initiator in a network, provides, to the initiator, a first response to the OAM probe packet over a first network path in the network, and further provides, to the initiator, a second response to the OAM probe packet over a second network path in the network that is different from the first network path. In another example, an initiator provides an OAM probe packet to a network entity operating as responder in a network, obtains, from the responder, a first response to the OAM probe packet over a first network path in the network, and further obtains, from the responder, a second response to the OAM probe packet over a second network path in the network that is different from the first network path. | 2021-11-18 |
20210359933 | SYSTEM AND METHOD FOR A MULTICAST SEND DUPLICATION INSTEAD OF REPLICATION IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - Systems and methods for multicast send duplication instead of replication in a high performance computing environment. A method can provide a plurality of switches, a plurality of hosts, the plurality of hosts being interconnected via the plurality of switches, wherein a host of the plurality of hosts comprises a multicast sender node, the sender node comprising a system image generation module and a current message sequence module. The method can organize the plurality of switches into two rails, the two or more rails providing redundant connectivity between the plurality of hosts. The method can send two or more duplicate multicast packets on different rails. Upon a receiving node receiving at least two versions of the same multicast packet, only one will be delivered to the communication stack/clients above the layer that handles the encapsulation header. | 2021-11-18 |
20210359934 | Link Group Configuration Method and Device - A link group configuration method includes obtaining first status information of M links between a source end device and a receive end device, where the first status information indicates a status of a differential delay between any two of the M links, obtaining first capability information of the receive end device, where the first capability information indicates a first capability of performing differential delay compensation on the M links by the receive end device, grouping N of the M links into a first link group based on the first status information and the first capability information, and sending first configuration information to a second device, where the first configuration information includes information used to indicate the first link group. | 2021-11-18 |
20210359935 | TUNNEL-BASED NETWORK CONNECTIVITY FOR COMPUTING CLUSTERS - Methods and systems for communicating between nodes within computing clusters. In one embodiment, a method is provided that includes receiving, at a first node within a first cluster, a packet for transmission from a second node within the first cluster. The packet for transmission may be received via a local tunnel of the first cluster. A routing agent of the first node may identify a first destination address included within the packet for transmission and determine that the first destination address corresponds to a second cluster. The routing agent may also generate a second destination address corresponding to a third node of the second cluster and transmit the packet to the second destination address via an external tunnel between a plurality of clusters including the first cluster and the second cluster. | 2021-11-18 |
20210359936 | Cell Site Gateway - A cell site gateway comprises a first interface, a second interface, and a third interface. The first interface is configured to communicate with a cellular base station. The second interface is configured to communicate with a network gateway. The third interface is configured to receive, from a control server, control information for a forwarding layer and comprising a first label and a second label. The forwarding layer is configured to: remove the first label from first packets received from the network gateway via the second interface; attach the second label to second packets received from the cellular base station; and transmit the second packets to the network gateway via the second interface. | 2021-11-18 |
20210359937 | SYSTEM AND METHOD FOR SCALABLE MULTI-HOMED ROUTING FOR VSWITCH BASED HCA VIRTUALIZATION - Systems and methods are provided for supporting scalable multi-homed routing for virtual switch based host channel adapter (HCA) virtualization in a subnet. An exemplary method can provide one or more switches, a plurality of host channel adapters, a plurality of hypervisors, and a plurality of virtual machines. The method can arrange the plurality of host channel adapters with one or more of a virtual switch with prepopulated local identifiers (LIDs) architecture or a virtual switch with dynamic LID assignment architecture. The method can further perform a multi-homed routing for the subnet, wherein at least one of the plurality of host channel adapters comprises two virtual switches, wherein the two virtual switches are treated as endpoints of the subnet, and wherein the multi-homed routing for the subnet ensures that each the two virtual switches are routed through independent paths. | 2021-11-18 |
20210359938 | A METHOD AND PROGRAM PRODUCT FOR ELECTRONIC COMMUNICATION BASED ON USER ACTION - A system, method and program product for electronic communication includes checking and determining if a current called number of a subscriber is on a list of recent calls made by an onward caller where either the onward caller or the receiving caller enter a certain combination of symbols using the onward calling device or the receiving device respectively when the call is in progress. Calling route used to establish a connection between the onward caller and the subscriber is concluded as a low-quality route. Subscriber ID is extracted and included on the list of low quality routes. Request is made for a list of all possible routes for communication between the onward caller and receiver user. A comparison of the list of all possible routes and low quality routes is made. A route not earlier marked as a low-quality route is identified and selected. An electronic communication between the onward caller and receiving user is established using the selected route. | 2021-11-18 |
20210359939 | PACKET PROCESSING METHOD AND NETWORK APPARATUS - This application provides a packet processing method, including: receiving, by a current network node, a first packet; determining, by the current network node, a flow identification corresponding to the first packet, where the first packet does not include the flow identification; obtaining, by the current network node based on the first packet and the flow identification, a second packet, where the second packet includes the flow identification and an IOAM header, and in the second packet, the flow identification is located before the IOAM header; and sending, by the current network node, the second packet to a next network node. This resolves a problem that as a quantity of passed IOAM nodes increases, traffic classification performed by a subsequent node consumes a longer delay, thereby deteriorating forwarding performance. | 2021-11-18 |
20210359940 | CONTROL DEVICE, CONTROL METHOD, AND PROGRAM - A control device is connected to a plurality of networks, dispatches a packet received from a user terminal to a network among the plurality of networks, and includes a memory and a processor configured to execute receiving a DNS query packet transmitted from the user terminal, and based on a query target of the DNS query packet, dispatching the DNS query packet to a network among the plurality of networks; and receiving a packet, determining a destination of the packet based on a destination address of the packet, and transmitting the packet to the determined destination. | 2021-11-18 |
20210359941 | TRANSFORMING A MULTI-LEVEL HYBRID HIERARCHICAL FORWARDING INFORMATION BASE FORMAT - A network device may receive forwarding data associated with a multi-level hybrid hierarchy forwarding information base of the network device. The network device may process the forwarding data to generate a first set of transformed forwarding next hop entries. The network device may process the first set of transformed forwarding next hop entries, associated with default forwarding classes, to generate a second set of transformed forwarding next hop entries. The network device may process the first set of transformed forwarding next hop entries, associated with all classes of traffic, to generate a third set of transformed forwarding next hop entries. The network device may group the sets of transformed forwarding next hop entries, based on transformed group next hop entries, to generate a final set of transformed forwarding next hop entries. The network device may transform the final set of transformed forwarding next hop entries into a particular format. | 2021-11-18 |
20210359942 | SEGMENT ROUTING EXTENSION HEADERS - A system and method are disclosed for using segment routing (SR) in native IP networks. The method involves receiving a packet. The packet is an IP packet and includes an IP header. The method also involves updating the packet. Updating the packet involves writing information, including a segment routing segment identifier, to the destination address of the packet. | 2021-11-18 |
20210359943 | AVOIDING MARKERS FOR LONGEST PREFIX MATCH BASED ON BINARY SEARCH TREE ALGORITHM - In one embodiment, a packet processing apparatus includes interfaces, a memory to store a representation of a routing table as a binary search tree of address prefixes, and store a marker with an embedded prefix including k marker bits providing a marker for an address prefix of a node corresponding to a prefix length greater than k, and n additional bits, such that the k marker bits concatenated with the n additional bits provide another address prefix, packet processing circuitry configured upon receiving a data packet having a destination address, to traverse the binary search tree to find a longest prefix match, compare a key with the k marker bits, extract an additional n bits from the destination address, and compare the extracted n bits with the n additional bits, and process the data packet in accordance with a forwarding action indicated by the longest prefix match. | 2021-11-18 |
20210359944 | Flow-Based Load Balancing - Methods and apparatuses are described for virtualizing routing of network traffic by offloading routing decisions to a controller in communication with a plurality of network devices. For load balancing applications, the controller may make up-front decisions as to both destination and route, rather than wait until traffic has been routed to a load balancing point before determining the destination. | 2021-11-18 |