47th week of 2021 patent applcation highlights part 70 |
Patent application number | Title | Published |
20210367754 | COMPUTING DEVICE PROCESSING EXPANDED DATA - The present invention relates to a computing device for executing a first cryptographic operation of a cryptographic process on useful input data, said computing device comprising a first processor, a second processor and a selection circuit wherein: said selection circuit is configured: for receiving, from an input bus, expanded input data obtained by interleaving dummy input data with said useful input data, for determining positions of the dummy input data in said expanded input data, and for extracting said dummy input data and said useful input data from the expanded input data based on said determined positions, said first processor is configured for executing said first cryptographic operation of said cryptographic process on said extracted useful input data to obtain useful output data, said second processor is configured for executing a second operation on said extracted dummy input data to obtain dummy output data, said computing device being configured for having said operations executed such that leakage generated by said first cryptographic operation is jammed by leakage generated by the second operation. | 2021-11-25 |
20210367755 | DEVICES AND METHODS FOR PROTECTING CRYPTOGRAPHIC PROGRAMS - There is provided a device for protecting a cryptographic program implemented in a cryptographic computing device, the cryptographic computing device includes one or more processors, the cryptographic program comprising instructions and being associated with an initial execution order of the instructions. The device comprises a compiler to compile the cryptographic program, which provides an intermediate representation of the cryptographic program comprising instructions and variables used to execute the instructions. The device is configured to: determine a graph of dependencies comprising nodes and edges, each node of the graph representing an instruction of the intermediary representation, and each edge of the graph representing a variable of the intermediary representation; mask the graph of dependencies by replacing each variable of the graph of dependencies with a masked variable, the processing unit determining the masked variable by applying a masking scheme to the variable, which provides a masked graph of dependencies; determine at least a set of independent instructions using the masked graph of dependencies; determine an execution order for each set of independent instructions from the initial execution order, the execution order representing the order of execution of the set of independent instructions by at least one of the one or more processors. | 2021-11-25 |
20210367756 | METHODS, SYSTEMS, AND MEDIA FOR USING DYNAMIC PUBLIC KEY INFRASTRUCTURE TO SEND AND RECEIVE ENCRYPTED MESSAGES - Methods, systems, and media for transmitting encrypted messages are provided. In some arrangements, the method comprises: generating, using a hardware processor by a first application, a first public key and a first private key corresponding to a first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first message using the second public key corresponding to the second application; generating, by the first application, a third public key and a second private key; transmitting the encrypted message and third public key to the second application; receiving, from the second application, a second message and a fourth public key corresponding to the second application; and decrypting the second message using the second private key. | 2021-11-25 |
20210367757 | SECURE COMMUNICATION IN A TRAFFIC CONTROL NETWORK - The present disclosure includes apparatuses, methods, and systems for secure communication in a traffic control network. An embodiment includes a memory, and circuitry configured to receive a traffic control public key from a traffic control device, wherein the traffic control public key is received in response to providing, to the traffic control device, a request to modify content of the traffic control device, encrypt data corresponding to vehicle information using the traffic control public key, provide, to the traffic control device, the encrypted data to store the data in the traffic control device, and access a network of traffic control devices, including the traffic control device, via the data stored in the traffic control device. | 2021-11-25 |
20210367758 | METHOD AND SYSTEM FOR PRIVACY PRESERVING CLASSIFICATION OF WEBSITES URL - Malicious website detection has been very crucial in timely manner to avoid phishing. User privacy also needs to be maintained at the same time. A system and method for classifying a website URL have been provided. The system is configured to achieve end-to-end privacy for machine learning based malicious URL detection. The system provides privacy preserving malicious URL detection models based on Fully Homomorphic Encryption (FHE) approach either using deep neural network (DNN), using logistic regression or using a hybrid approach of both. The system is utilizing a split architecture (client-server) where-in feature extraction is done by a client machine and classification is done by a server. The client machine encrypts the query using FHE and sends it to the server which hosts machine learning model. During this process, the server doesn't learn any information about the query. | 2021-11-25 |
20210367759 | METHODS AND IMAGE PROCESSING DEVICES FOR ENCODING AND DECODING PRIVATE DATA - Methods and image processing devices for encoding and decoding private data are proposed. The method for encoding private data includes to receive an original video frame, mask at least one private area in the original video frame to generate a protected video frame, generate a first encoded frame by encoding the protected video frame, and generate at least one output bitstream for streaming or storage according to the first encoded frame. The method for decoding private data includes to receive at least one input video bitstream to obtain a first encoded bitstream and a second encoded bitstream, decode the first encoded bitstream to generate a protected video frame including image data associated with at least one private area, and output the protected video frame to a display queue such that the at least one private area is displayed. | 2021-11-25 |
20210367760 | INTEGRATED CIRCUIT PERFORMING FAST UNBREAKABLE CIPHER - An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality. | 2021-11-25 |
20210367761 | IDENTIFICATION OF A CREATOR OF AN ENCRYPTED OBJECT - Embodiments include encrypting an object such that the creator of the encrypted object can be identified. Aspects include receiving, by a processor, an unencrypted object that includes plaintext and metadata that describes the plaintext and obtaining, by the processor in response to a request from a user, a data encryption key (DEK) and a nonce key for the unencrypted object, the nonce key being unique to the user. Aspects also include encrypting, by the processor, the unencrypted object. The encrypting includes generating a nonce based at least in part of the plaintext and the nonce key and generating ciphertext and a metadata authentication tag comprising a signature of the metadata, the generating based at least in part on the plaintext, the metadata, the DEK, and the nonce. Aspects further include creating an encrypted object that includes the ciphertext, the metadata, and the metadata authentication tag. | 2021-11-25 |
20210367762 | OFF-CHAIN DATA SHARING SYSTEM AND METHOD THEREOF - An off-chain data sharing system according to an embodiment of the present invention includes a first storage node to store off-chain data, a blockchain node to store a ledger that records permission information of the off-chain data, and a data stream hub to relay data transmission and reception between the first storage node and a second storage node requesting the off-chain data by referring to the permission information. | 2021-11-25 |
20210367763 | BLOCKCHAIN-BASED DATA EVIDENCE STORAGE METHOD AND APPARATUS - Embodiments of the present application provide a blockchain-based data evidence storage method, a blockchain-based data check method, and relevant apparatuses. The data evidence storage method comprises: performing irreversible encryption on data content of a target file to obtain irreversibly encrypted data of the target file; storing the irreversibly encrypted data in a blockchain and obtaining on-chain evidence storage information of the irreversibly encrypted data; generating a digital watermark of the on-chain evidence storage information; embedding the digital watermark into the target file; and storing the target file embedded with the digital watermark of the on-chain evidence storage information. | 2021-11-25 |
20210367764 | BLOCKCHAIN ANALYTICS - A blockchain analytics system facilitates determination of parameters of blockchain objects for analytics. Examples of parameters of the blockchain object may include an identity of a participant, a role of a participant, a type of the blockchain object and the like. The system may store parameters of blockchain objects in the data repository. The system may use the determined parameters to generate a machine learning blockchain analytics model. The system may generate visualizations, detect pattern and/or for detecting anomalies based on the machine learning blockchain analytics model. | 2021-11-25 |
20210367765 | SYSTEM AND METHOD FOR REGISTERING A USER - According to an aspect of the present disclosure, a method performed by a verification platform for authorising a user incapable of providing digital consent comprises: receiving sensitive user information and a unique supervisor identifier; encrypting the sensitive user information using an encryption scheme with an associated encryption key to generate encrypted user information; sending an authorisation request message to a supervisor device associated with the unique supervisor identifier, wherein the authorisation request message comprises the encryption key and a request for authorisation in response; discarding the sensitive user information and the encryption key, such that the verification platform cannot access the sensitive user information; and, if the verification platform receives an authorisation response message from the supervisor device comprising a received encryption key, decrypting the encrypted user information using the received encryption key, such that the verification platform can successfully access the sensitive user information. | 2021-11-25 |
20210367766 | A COMPUTATION DEVICE USING SHARED SHARES - Some embodiments are directed to a computation device for performing a computation on at least a set of values. The values are stored in memory as a plurality of shares that define the value. An operation of the computation may be performed on a set of input values to obtain an output value. The output value may be defined by at least one shared share and at least one computed share. The at least one shared share may also define a further value, e.g., an output of a previously performed computation or an output of a further operation performed in parallel with the operation. The at least one computed share is computed from the at least one shared share and shares of the set of input values. A fault in the shared share affects the further value but a fault in the computed share, complicating share reduction attacks. | 2021-11-25 |
20210367767 | METHODS AND SYSTEMS FOR SECURE NETWORK COMMUNICATION - Methods and systems for executing a communication protocol are provided. One method includes receiving, by a security module of a first computing device, an API call to authenticate a certificate received from a second computing device to establish a communication session between the computing devices; selecting, by the security module, an authentication module to authenticate the certificate; generating, by an encryption module of the security module, a shared secret key for the communication session based on a private key of the first computing device and a public key of the second computing device; encrypting, by the encryption module, the shared secret key using an algorithm negotiated between the first computing device and the second computing device; generating, by the security module, an encrypted message for the second computing device; and transmitting, by the first computing device, the encrypted shared secret key and message to the second computing device. | 2021-11-25 |
20210367768 | RESTRICTING SECURITY KEY TRANSFER FROM A KEY MANAGEMENT SERVER IN AN ENTERPRISE - An enterprise key management server operates in association with a location service that maintains information defining at least one physical boundary of the enterprise. Upon receipt at the key management server of a request that requires release of key material, an additional security check is performed. When the request is received from a GPS-enabled storage device, the key management server queries the location service to determine whether that device is within the boundary. If so, the key material is released. If the requesting device does not provide its location, or if the location service determines that the device is not within the boundary, the key management server fails the request so that the key material is not released. In this manner, the disclosure of the key material to a device that is no longer within the confines of the enterprise, e.g., because it has been stolen, is averted. | 2021-11-25 |
20210367769 | EPHEMERAL REGIONS WITHIN NON-VOLATILE MEMORY DEVICES - A computing device that includes a non-volatile memory device comprising an ephemeral memory region therein, the ephemeral memory region being encrypted and comprising an associated encryption key; and firmware to cause the encryption key to be stored prior to any power loss to the computing device. | 2021-11-25 |
20210367770 | METHOD AND SYSTEM FOR PERFORMING SECURE DATA TRANSACTIONS IN A DATA CLUSTER - A method for securing data in a data cluster is performed by a data manager of a data cluster. The method includes receiving, by a data cluster, a write request for a user to write data to the data cluster, wherein the write request comprises an object identifier (OID) associated with data and a user identifier (UID) associated with the user; sending, to a key manager, an intermediate key request, wherein the intermediate key request comprises the UID; receiving, by the data cluster from the key manager, an intermediate key; processing the data to obtain a plurality of chunks and metadata associated with the plurality of chunks; generating an encryption key using the intermediate key and the OID; encrypting the metadata using the encryption key to generate encrypted metadata; deleting, after generating the encrypted metadata, the encryption key; and storing the encrypted metadata and the plurality of chunks in the data cluster. | 2021-11-25 |
20210367771 | PADDING ORACLE ELIMINATION IN RSA ENCRYPTION - A method, a computer program product, and a system for removing padding oracles in encryption techniques. The method includes padding a plaintext message using a padding scheme producing a padded plaintext message. The method also includes encrypting the padded plaintext message using a block cipher generating an encrypted data block of fixed-size as well as a hash value. The method further includes randomly generating an ephemeral key and an initialization vector. The method also includes prepending the hash value, the ephemeral key, and the initialization vector to the encrypted data block. The method includes performing an encryption technique to the encrypted data block prepended with the hash value, the ephemeral key, and the initialization vector. | 2021-11-25 |
20210367772 | COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR SHARING A COMMON SECRET - A method of sharing a first common secret among a plurality of nodes (A, B, C) for enabling secure communication for blockchain transactions such as on the Bitcoin blockchain is disclosed. The method comprises determining, for at least one first node (A) a plurality of second common secrets (S | 2021-11-25 |
20210367773 | QUANTUM KEY DISTRIBUTION METHOD AND SYSTEM BASED ON TREE QKD NETWORK - The present disclosure relates to a quantum key distribution (QKD) method based on a tree QKD network. In a tree network, when parent nodes of a source node and a destination node are the same node, if the parent nodes are untrusted nodes, the source node and the destination node take the parent nodes as an MDI-QKD detector to generate a key, and if the parent nodes are trusted nodes, a shared key is directly transferred through XOR relay; and when the parent nodes of the source node and the destination node are not the same node and there are discontinuous untrusted relay nodes in a transmission path, the untrusted nodes are taken as an MDI-QKD detector to generate a key, and then the shared key is transferred through XOR relay. | 2021-11-25 |
20210367774 | SYSTEMS AND METHODS FOR GENERATING TOKENS USING SECURE MULTIPARTY COMPUTATION ENGINES - Disclosed herein are systems and methods for generating tokens using SMPC compute engines. In one aspect, a method may hash, by a node, a data input with a salt value. The method may split, by the node, the hashed data input into a plurality of secret shares, wherein each respective secret share of the plurality of secret shares is assigned to a respective SMPC compute engine of a plurality of SMPC compute engines. The respective SMPC compute engines may be configured to collectively hash the respective secret share with a secret salt value, unknown to the plurality of SMPC compute engines. The respective SMPC compute engine may further receive a plurality of hashed secret shares from remaining SMPC compute engines of the plurality of SMPC compute engines, and generate a token, wherein the token is a combination of the hashed respective secret share and the plurality of hashed secret shares. | 2021-11-25 |
20210367775 | Devices, Systems, And Methods For Providing Security To IoT Networks And Sensors - The disclosure is related to a method for performing secure boot for IoT sensors where the verification process is done collaboratively between the sensor and the gateway. Further, a method of performing secure updates for IoT sensors where the verification process is done on the gateway. A method of authenticating an IoT sensor with an IoT gateway in which a first method of authentication is used upon first installing a device and occasionally thereafter and a second method is used for transactional communication. Still further, a method of computing an encryption key from a seed value that utilizes information specific to the sensor to create an encryption key unique to that sensor. | 2021-11-25 |
20210367776 | TRUSTED EXECUTION ENVIRONMENT-BASED KEY BURNING SYSTEM AND METHOD - The present disclosure provides a trusted execution environment-based key burning system. After a terminal device is enabled, a normal operating system is started, the normal operating system acquires key data to be burned and outputs a switching signal and the key data to be burned, a microprocessor receives the switching signal in a monitor mode and the microprocessor is switched to the secure operating system from the normal operating system, the secure operating system receives the key data to be burned and decrypts the data to be burned according to preset key data, to acquire and write the corresponding original key data into a secure storage area of the secure operating system. Due to the use of the trusted execution environment-based key burning, the key is burned, stored and used safely. In addition, the cryptography protects the key from unexpected damage in transmission and keeps the key integral. | 2021-11-25 |
20210367777 | Storage System and Method for Command Execution Ordering by Security Key - A storage system and method for command execution ordering by security key are provided. In one example, the storage system has a non-volatile memory, a volatile memory storing a plurality of keys, and a controller with a cache storing a subset of the plurality of keys. The storage system gives priority to a command whose key is stored in the cache in the controller over commands whose keys are stored only in the volatile memory. This avoids transferring a key from the volatile memory to the cache in the controller, thereby improving efficiency of the storage system. | 2021-11-25 |
20210367778 | SPLIT KEYS FOR WALLET RECOVERY - A system for split keys for wallet recovery includes an interface configured to receive a request to recover a user private key, and a processor configured to provide a request to a credential issuing authority for a first encrypted recovery key share, wherein the request includes a first identification credential, receive the first encrypted recovery key share from the credential issuing authority, provide a request to a trusted organization for a second encrypted recovery key share, wherein the request includes a second identification credential, receive the second encrypted recovery key share from the trusted organization, combine the first encrypted recovery key share and the second encrypted recovery key share to determine a recovered encryption key, and determine the user private key using the recovered encryption key. | 2021-11-25 |
20210367779 | Device and Method for Certifying Reliability of Public Key, and Program Therefor - Proving reliability of a second public key of a second key pair generated in association with a first key pair. A generator | 2021-11-25 |
20210367780 | ADAPTER APPARATUS AND PROCESSING METHOD - The present technology relates to an adapter apparatus configured to enabling a recording medium to be more safely and easily carried, and a processing method. An encryption processing part in an adapter apparatus encrypts data written in a storage apparatus, and a decryption processing part decrypts the data read from the storage apparatus. A key storage part stores the same common key as a key used to encrypt and decrypt the data and stored in another adapter apparatus. The present technology is applicable to encryption adapters configured to connect a USB memory to PCs placed at a worksite and home, respectively, for example. | 2021-11-25 |
20210367781 | METHOD AND SYSTEM FOR ACCELERATING VERIFICATION PROCEDURE FOR IMAGE FILE - A method and a system for accelerating verification procedure for an image file are provided. In the method, the system retrieves an image file from a first non-volatile memory, and calculates a hash value with respect to the image file. A combination of the hash value, a public key and a digital signature is compared with another hash value, public key and digital signature backup in a second non-volatile memory. A comparison result is generated for verifying the image file in the first non-volatile memory. After the image file is verified, the system can load the image file. Instead of the conventional technology that uses digital signature to verify the image file, the present method can effectively accelerate the verification procedure. | 2021-11-25 |
20210367782 | FAST UNBREAKABLE CIPHER - An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality. | 2021-11-25 |
20210367783 | MATCHING SYSTEM, METHOD, APPARATUS, AND PROGRAM - A matching apparatus generates a random number and transmits second encrypted data obtained by performing an operation of first encrypted data of each of first values related to a first binary vector encrypted and the random number to a matching request apparatus; transmits third encrypted data obtained by performing an operation of the second encrypted data and elements of a matching target second binary vector; based on a second value related to the first binary vector encrypted with the encryption key, the encrypted data and the random number, generates and transmits encrypted data and transmits the generated data to a verification apparatus as a query; and determines whether a count number of mismatched elements between the second binary vector and the first binary vector is less than or equal to a predetermined number based on values obtained by decrypting the encrypted data in the query. | 2021-11-25 |
20210367784 | SELF-AUTHENTICATING DOMAIN SPECIFIC BROWSER IDENTIFIERS - The present disclosure provides a secure, user-transparent, and highly efficient content provider-specific identifier read-only cookie (“ROC”). These ROCs can be generated by the client device and encrypted with a public key of the content provider, preventing third parties from indirectly identifying matches. The ROCs can include authentication token to enable the client device to determine whether the ROC was cached or otherwise misused by a content provider or other third-party. | 2021-11-25 |
20210367785 | METHOD AND DEVICE FOR SHARING CONTENT - Embodiments of the disclosure provide a method for sharing content and a related terminal device. The method is applicable by an electronic device. The electronic device obtains a target emoji sequence based on an instruction related to target content. The target emoji sequence corresponds to the target content. In addition, the electronic device obtains a sharing token based on the target emoji sequence. Furthermore, the electronic device shares the target content based on the sharing token. | 2021-11-25 |
20210367786 | SERVER-ASSISTED PRIVACY PROTECTING BIOMETRIC COMPARISON - Described herein are a system and techniques for enabling biometric authentication without exposing the authorizing entity to sensitive information. In some embodiments, the system receives a biometric template from a user device which is encrypted using a public key associated with the system. The encrypted biometric template is then provided to a second entity along with a biometric identifier. Upon receiving a request to complete a transaction that includes the biometric identifier and a second biometric template, the second entity may encrypt the second biometric template using the same public key associated with the system and perform a comparison between the two encrypted biometric templates. The resulting match result data file is already encrypted and can be provided to the system to determine an extent to which the two biometric templates match. | 2021-11-25 |
20210367787 | ENCLAVE POPULATION - A method is disclosed of a secure component (SC) of a local attestation server (LAS) for populating an enclave associated with the LAS. The SC comprises stored encrypted population information previously received in a data packet and encrypted by an encryption key matching a private decryption key of a trusted platform module (TPM) associated with the LAS. The method comprises receiving a public part of a temporary asymmetric key from the enclave, establishing a secure session between the SC and the TPM, sending (to the TPM by using the secure session) the encrypted population information and the public part of the temporary asymmetric key, receiving (from the TPM by using the secure session) the population information decrypted by the private decryption key and re-encrypted by the public part of the temporary asymmetric key, and transmitting the re-encrypted population information to the enclave. An additional method is also disclosed for enabling the population of the enclave. The additional method comprises receiving control parameters of the LAS, comprising the encryption key matching the private decryption key of the TPM, encrypting population information based on the control parameters and using the encryption key, and sending a data packet comprising the encrypted population information to the SC. Corresponding apparatuses and computer program product are also disclosed. | 2021-11-25 |
20210367788 | DIGITAL RE-SIGNING METHOD FOR SUPPORTING VARIOUS DIGITAL SIGNATURE ALGORITHMS IN SECURE SOCKETS LAYER DECRYPTION APPARATUS - The present disclosure relates to a digital re-signing method for supporting various digital algorithms in a secure sockets layer (SSL) decryption device, and the method, if an SSL communication connection request between a client terminal and a server in the SSL decryption device is detected, requests an SSL session to the server to establish the SSL session between the SSL decryption device and the server, and obtains related information of the server, identifies a type of a digital signature algorithm designated when establishing the SSL session, creates a private certificate regarding the server using the related information of the server with the designated digital signature algorithm, and if the designated digital signature algorithm is not identical to a digital signature algorithm of a root certificate of the SSL decryption device, creates an intermediate certificate of the SSL decryption device with the designated digital signature algorithm, digitally signs the private certificate with the intermediate certificate, digitally signs the intermediate certificate with the root certificate of the SSL decryption device, creates a private certificate chain where the private certificate digitally signed with the intermediate certificate, the intermediate certificate digitally signed with the root certificate, and the root certificate are connected by chain, and transmits the private certificate chain to the client terminal. | 2021-11-25 |
20210367789 | RETRIEVING PUBLIC DATA FOR BLOCKCHAIN NETWORKS USING HIGHLY AVAILABLE TRUSTED EXECUTION ENVIRONMENTS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Implementations include receiving a request for data from the data source, transmitting the request to a relay system that is external to the blockchain network and that includes a multi-node cluster including a plurality of relay system nodes, receiving a result provided from a relay system node, the result being digitally signed using a private key of the relay system node, verifying that the relay system node is registered, verifying an integrity of the result based on a public key of the relay system node and a digital signature of the result in response to verifying that the relay system node is registered, and transmitting the result to a client in response to verifying the integrity of the result. | 2021-11-25 |
20210367790 | SHARED BLOCKCHAIN DATA STORAGE - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for communicating and sharing blockchain data. One of the methods includes sending current state information associated with a current block of a blockchain to one or more shared storage nodes of the blockchain network; sending a hash value to the one of the one or more shared storage nodes for retrieving an account state stored in the historic state tree; receiving the account state in response to sending the hash value; and verifying, by the consensus node, that the account state is part of the blockchain based on the hash value. | 2021-11-25 |
20210367791 | EVENT COMMUNICATION AND VERIFICATION THROUGH A BLOCKCHAIN NETWORK - A method for verifying that event can take place before the event is executed is disclosed. A verification system is incorporated into an event processing network, such that the verification system can identify newly proposed events and determine whether they can be completed. The verification system can inform the network about verification results through distributed blockchain records. Other changes in event status can also be communicated through and stored in blockchain records. | 2021-11-25 |
20210367792 | NONVOLATILE MEMORY DEVICE STORING A PUBLIC KEY AND A SECRET KEY, AND AN ELECTRONIC DEVICE COMPRISING THE SAME - A nonvolatile memory device with high security is provided. A nonvolatile memory device comprises a memory cell array and a secure module, wherein the secure module is configured to process first data including information about the nonvolatile memory device stored in the memory cell array to generate a first password key, process second data including information about the nonvolatile memory device stored in the memory cell array to generate a second password key, generate a public key and a secret key by a public-key cryptography algorithm, using the first password key and the second password key, and provide the first password key, the second password key, the public key, and the secret key to the memory cell array, the memory cell array is configured to store the first password key, the second password key, the public key, and the secret key, the second data is different from the first data, a value of the first password key value and a value of the second password key are prime numbers, and the public key is provided to a host connected to the nonvolatile memory device. | 2021-11-25 |
20210367793 | SYSTEMS AND METHODS FOR SIGNING OF A MESSAGE - There is provided a requestor device for digital signing of a message, comprising: at least one hardware processor executing a code for: transmitting the message for signing thereof, in a single request session over the network to each one of a plurality of validator devices, wherein a beacon device computes and transmits over a network to each one of a plurality of validator devices a signature-data value computed and signed by the beacon device, receiving in a single response session from each one of the plurality of validator devices, a respective partial-open decrypted value computed for the signature-data value and the message, and aggregating the partial-opens decrypted values received from the plurality of validator devices to compute the digital signature of the message. | 2021-11-25 |
20210367794 | DEVICE PROVISIONING SYSTEM - Disclosed is an embodiment of a device provisioning system used for securely provisioning a device-to-be-provisioned with a unique identifier, such as a digital certificate. The device provisioning system uses a field programmable gate array that has been programmed to use encryption techniques in accordance in accordance with a public key infrastructure process to generate and issue a digital certificate. | 2021-11-25 |
20210367795 | Identity-Linked Authentication Through A User Certificate System - Systems, methods, apparatuses, and computer readable media for facilitating user identity authentication to a service provider by linking, on a user certificate system, identity-linked information to certificate information, such that the certificate information may be used to generate an identity message that the service provider may verify to confirm a user identity. An exemplary method comprises receiving identity-linked information, retrieving public certificate information, retrieving, from a hardware security module, a private key, causing transmission, over a second network to the service provider, of a notification that an identity message is available for access, the identity message based on the retrieved public certificate information and the retrieved private key, and upon reception, from the service provider, of a request for the identity message, generating and transmitting the identity message, wherein the identity message comprises at least an encrypted portion of the identity message encrypted using at least the private key. | 2021-11-25 |
20210367796 | COMMUNICATION ON TWO POWER SUPPLY CHANNELS - A Communication System includes a first power supply channel including a first impedance and a second impedance, and configured to transfer electrical power from a first power source to a first load. The first power supply channel is configured to electrically couple to the first power source via a first common mode choke. The communication system also includes a second power supply channel comprising a third impedance and a fourth impedance, and configured to transfer electrical power from a second power source to a second load. The second power supply channel is configured to electrically couple to the second power source via a second common mode choke. The communication system further includes a first transceiver comprising a first output pin electrically coupled to the first power supply channel and a second output pin electrically coupled to the second power supply channel at a first end of the communication system. | 2021-11-25 |
20210367797 | SYSTEMS AND METHODS FOR AN ONLINE MEDIA MARKETPLACE - Systems and methods for a comprehensive online media marketplace are provided that increase the efficiency of media sharing between consumers and content producers. In one embodiment, a method comprising streaming media content from a streaming platform to a consumer device, creating a stream report for the media content based on a smart contract associated with the media content, wherein the smart contract identifies a media content producer of the media content, recording the stream report on a blockchain, issuing tokens based on a pre-determined rate of inflation, and distributing a portion of the tokens to the media content producer based on the stream report. | 2021-11-25 |
20210367798 | GROUP CONTACT LISTS GENERATION - In some examples, a computer-implemented method includes accessing a contact database of a sending user, the contact database includes a plurality of contact records, each contact record of the plurality of contact records being associated with a respective user and including respective graphic data, identifying a first set of contact records of the plurality of contact records, each contact record of the first set of contact records having common graphic data as part of the respective graphic data, automatically including the first set of contact records in a contact group of a messaging application of the sending user, detecting a send message operation by a messaging application of the sending user, and causing presentation of a user-selectable graphic icon associated with the contact group within the messaging application, the user-selectable graphic icon being selectable by the sending user to send a message to the contact group. | 2021-11-25 |
20210367799 | STANDALONE MULTICAST BROADCAST SINGLE FREQUENCY NETWORK CELL ACQUISITION - Standalone MBSFN cells may provide an improved user experience for an individual with a non-legacy UE since the bandwidth of that cell is mostly allocated to broadcasting streaming services. However, an individual with a legacy UE may be able to detect cell acquisition information associated with a standalone MBSFN cell but not to acquire standalone MBSFN cells. In order to solve this problem, the present disclosure provides various UE avoidance schemes that enable non-legacy UEs to acquire a standalone MBSFN cell and prevents legacy UEs from trying to acquire a standalone MBSFN only cell. The apparatus may receive cell acquisition information associated with an eMBMS standalone cell. The apparatus may detect a UE avoidance scheme based on a characteristic associated with the cell acquisition information. The apparatus may perform cell acquisition with the eMBMS standalone cell based on the characteristic. | 2021-11-25 |
20210367800 | Dynamically Generated News Feed - Provided is a method and a system for dynamically generating a news feed and displaying the news feed to a plurality of participants in a meeting. The method is implemented by a central server including one or more processors. The method includes identifying in real time a trigger event initiated by at least one participant of the meeting. The trigger event is indicative of at least a reference, by the participant, to metadata associated with the meeting. The method includes capturing during the meeting one or more meeting snippets based on identification of the trigger event. The method includes receiving feedback on each of the one or more meeting snippets from the plurality of participants during the meeting. The method includes dynamically generating a news feed based on the captured meeting snippets and the feedback. Further, the method includes displaying the dynamically generated news feed to the plurality of participants. | 2021-11-25 |
20210367801 | CAPTURING MEETING SNIPPETS - Provided is a method that includes identifying a trigger event initiated by at least one participant of the meeting. The trigger event is indicative of at least a reference to meeting metadata associated with the meeting. Further, the method includes recording the meeting for a determined duration to generate a plurality of meeting snippets, based on the identification of the trigger event. A meeting summary may be generated based on aggregating the plurality of meeting snippets and the meeting metadata. | 2021-11-25 |
20210367802 | MEETING SUMMARY GENERATION - Provided is a method and a system for generating a summary of action points for participants in a meeting. The method is implemented by a central server including one or more processors. The method includes monitoring in real time, content consumed by participants during a first meeting and for a first defined time before the first meeting. The method includes tracking updates performed by participants to the content during and post the first meeting. The method includes identifying start time of a second meeting scheduled in continuation to first meeting based on calendar information associated with participants. The method includes generating summary of action points for participants based on content consumed by the participants during the first meeting and for the first defined time before the first meeting. The method includes displaying the summary to the participants before a second defined time of the start time of the second meeting. | 2021-11-25 |
20210367803 | HOME AUTOMATION (HA) SYSTEM COMMUNICATING A NETWORK ADDRESS USING FIRST AND SECOND WIRELESS PROTOCOLS AND RELATED METHODS - A home automation (HA) system may include a first HA device having a network address associated therewith. The first HA device may include a first wireless device to transmit the network address using a first wireless protocol, and a second wireless device using a second wireless protocol. The HA system may also include a second HA device. The second HA device may include a first wireless device to receive the network address from the first wireless device of the first HA device, and a second wireless device using the network address to communicate with the second wireless device of the first HA device using the second wireless protocol. | 2021-11-25 |
20210367804 | System and Method for Improving Content Fetching by Selecting Tunnel Devices - A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme. | 2021-11-25 |
20210367805 | USER SCENE AND SCHEDULE CREATION BASED ON TIME OF THE YEAR - A controller and method for a premises system are provided. The controller includes processing circuitry configured to: receive a plurality of system setting groups for controlling a plurality of premises devices where each system setting group including at least one respective device setting for each of the plurality of premises devices, determine at least one setting characteristic, the at least one setting characteristic including a calendar date, and select one of the plurality of system settings groups for controlling the plurality of premises devices based on the determined at least one setting characteristic. The controller includes a transceiver configured to transmit a control signal to each of the plurality of premises devices to control the plurality of premises devices according to the selected one of the plurality of system setting groups. | 2021-11-25 |
20210367806 | SYSTEMS AND METHODS FOR WIRELESS MONITORING AND CONTROL OF WATER SOFTENERS - A system for adapting a water softener for wireless communication is disclosed. In some embodiments, a system for adapting a water softener with a serial communication port for communication with a user via a remote server, an internet connection, and internet enabled device is provided, the system comprising: a wireless gateway device connected to a router; and a wireless adapter connected to the serial communication port, comprising: a gateway node; a transceiver; and a processor programmed to: establish a wireless connection with the wireless gateway; receive a first message from the water softener; cause the gateway node to modify the first message; cause the first modified message to be transmitted to the remote server via the wireless gateway; receive a second message from the remote server; modify the second message for output to the water softener; and transmit the second modified message to the water softener. | 2021-11-25 |
20210367807 | EXTERNAL MICROCONTROLLER COMMUNICATIONS - Messaging between an ultra-tag and external microcontroller. In an embodiment, a transmitting device is communicatively connected to a receiving device by a clear-to-communicate line and request line. When data to be transmitted has normal priority, the transmitting device detects whether the clear-to-communicate line indicates that the receiving device is available, indicates a request to transmit on the request line if so, waits until the receiving device is available and then indicates a request to transmit on the request line if not, after indicating a request to transmit, transmits the data when the clear-to-communicate line indicates that the receiving device is unavailable, and, after transmitting the data, releases the indication of the request to transmit on the request line. On the other hand, when the data has high priority, the transmitting device indicates a request to transmit on the request line, regardless of an indication on the clear-to-communicate line. | 2021-11-25 |
20210367808 | CANOPEN-BASED DATA TRANSMISSION GATEWAY CHANGEOVER METHOD, SYSTEM AND APPARATUS THEREOF - The present disclosure discloses a CANopen-based data transmission gateway changeover method, system and apparatus. The method includes: making an active gateway go alive, and mutually monitoring heartbeat packet status together with a standby gateway over an active-standby gateway communications network; keeping the active gateway alive and recording a breakdown of the standby gateway if no heartbeat packet of the standby gateway is detected within a preset heartbeat period and a heartbeat packet of the active gateway is successfully transmitted on the active-standby gateway communications network; requesting, by the active gateway over any in-vehicle communications network, the standby gateway to go alive if the heartbeat packet of the active gateway fails to be transmitted on the active-standby gateway communications network; stopping requesting, by the active gateway if no response is received from the standby gateway, the standby gateway in a first in-vehicle communications network to go alive, and requesting, over another in-vehicle communications network, the standby gateway to go alive; and keeping the active gateway alive and recording a breakdown of the standby gateway if still no response is received from the standby gateway. In this way, sound operation of an entire train is ensured and redundancy effects of a train network are improved. | 2021-11-25 |
20210367809 | MESHED VIRTUAL PRIVATE NETWORK SYSTEM - A meshed virtual private network system includes L junction nodes each including a device being capable of making a radio VPN communication and each being registered in advance, wherein L is an integer equal to or greater than 2, and a database, the meshed virtual private network system making communication to a receiver node from a sender node through the junction nodes, each of the junction nodes being capable of acting as a VPN server by carrying out predetermined steps. | 2021-11-25 |
20210367810 | USER STATION FOR A BUS SYSTEM, AND METHOD FOR TRANSMITTING A MESSAGE AT DIFFERENT BIT RATES IN A BUS SYSTEM - A user station for a bus system and a method for transmitting a message at different bit rates in a bus system is provided. The user station includes a communication control unit for creating a message for at least one further user station of the bus system. The communication control unit is designed to provide in the message a first phase to be transmitted at a first bit rate, and to provide a second phase to be transmitted at a second bit rate, which is faster or slower than the first bit rate. The communication control unit is designed to provide in the message between the first and second phase a predetermined bit pattern for a bit rate switchover between the first and second bit rate. The predetermined bit pattern includes, both before and after the bit rate switchover, a flank for synchronization. | 2021-11-25 |
20210367811 | GATEWAY DEVICE, COMMUNICATION SYSTEM, AND AUTOMATED WAREHOUSE SYSTEM - A first gateway device and a second gateway device each includes a network interface, a storage device, and a controller. The network interface is connected to an apparatus to perform communication with the apparatus and external communication. The storage device stores a first apparatus list and/or a second apparatus list. In response to receiving a connection request to the apparatus, the controller sends the connection request to the apparatus. In response to receiving a connection request to itself, the controller exchanges the first apparatus list and the second apparatus list with the other gateway device. In response to receiving data directed to an address included in the apparatus list, the controller transfers the received data to the apparatus assigned with the address. | 2021-11-25 |
20210367812 | TIME SYNCHRONIZATION OF MOBILE CHANNEL SOUNDING SYSTEM - In one example, a processing system of a mobile channel sounding transmitter including at least one processor may establish a wireless side link between the mobile channel sounding transmitter and a channel sounding receiver, transmit, to the channel sounding receiver, a wireless synchronization signal via the wireless side link, and transmit at least one channel sounding waveform in accordance with the wireless synchronization signal. In another example, a processing system of a channel sounding receiver including at least one processor may establish a wireless side link between a mobile channel sounding transmitter and the channel sounding receiver, obtain, from the mobile channel sounding transmitter, a wireless synchronization signal via the wireless side link, and obtain, from the mobile channel sounding transmitter, at least one channel sounding waveform in accordance with the wireless synchronization signal. | 2021-11-25 |
20210367813 | DOWNLINK CONTROL CHANNEL DETECTION METHOD, TERMINAL AND BASE STATION - The present disclosure provides a downlink control channel detection method, a terminal, and a Base Station (BS). The method includes: obtaining first and second auxiliary information from a BS, in which the first auxiliary information indicates a time-domain duration of a Control Resource Set (CORESET) of a downlink control channel, which is allocated by the BS, the second auxiliary information indicates a resource mapping mode from a Resource Element Group (REG) of CORESET to Control Channel Elements (CCE); performing a blind detection on the downlink control channel, based on the first and second auxiliary information. | 2021-11-25 |
20210367814 | COMMUNICATION METHOD AND DEVICE BASED ON PARALLEL SYSTEM, AND TERMINAL - A communication method and a communication device based on a parallel system, a terminal and a computer readable storage medium are provided. The parallel system includes a fieldbus and two or more communication nodes connected to the fieldbus in parallel. The communication method includes: acquiring a status parameter of a target communication node; converting the status parameter into a logic level signal; generating an input differential signal based on the logic level signal; sending the input differential signal to the fieldbus and synchronously receiving an output differential signal from the fieldbus, where the output differential signal is generated by the fieldbus by performing a wired-AND operation on input differential signals received from the two or more communication nodes; and acquiring information of the communication nodes connected to the fieldbus based on the output differential signal. | 2021-11-25 |
20210367815 | INTER-CARRIER INTERFERENCE COMPENSATION - An inter-carrier interference method comprises: receiving one or more OFDM signal comprising plural blocks of OFDM subcarriers of a first type and plural blocks of OFDM subcarriers of a second type, wherein the frequencies of the subcarriers of each block of OFDM subcarriers of the first type are contiguous and wherein the plural blocks of subcarriers of the first type are distributed amongst the plural blocks of subcarriers of the second type; for each of the plural blocks of subcarriers of the first type, estimating inter-carrier interference components; estimating inter-carrier interference components for the subcarriers of the second type using the inter-carrier interference components estimated for the plural blocks of subcarriers of the first type; and compensating for inter-carrier interference in the plural blocks of subcarriers of the second type using the inter-carrier interference components estimated for the sub-carriers of the second type, thereby to generate plural compensated blocks of subcarriers of the second type. | 2021-11-25 |
20210367816 | FRONT-END CIRCUITRY FOR A DATA RECEIVER AND RELATED SYSTEMS, METHODS, AND DEVICES - Front-end circuitry for a data receiver and related systems, methods, and devices are disclosed. The front-end circuitry includes a passive equalizer, which includes a signal input, an equalizer output including a first equalizer output and a second equalizer output, a first signal path, and a second signal path. The first signal path is between the signal input and the first equalizer output. The first signal path has a first frequency response. The second signal path is between the signal input and the second equalizer output. The second signal path has a second frequency response. The second frequency response exhibits substantially inverse behavior to that of the first frequency response. An amplifier circuit is configured to combine a first equalizer output signal from the first equalizer output with a second equalizer output signal from the second equalizer output to obtain an equalized output signal. | 2021-11-25 |
20210367817 | Starting a Time Alignment Timer Before Receiving an Initial Timing Advance Command - A wireless device receives a radio resource control (RRC) message comprising an indication that the wireless device starts a time alignment timer of a cell group in response to the RRC message. When the RRC message comprises the indication, the time alignment timer of the cell group is started before receiving an initial medium access control (MAC) timing advance command (TAC) for the cell group and after receiving the RRC message. | 2021-11-25 |
20210367818 | OFDM Communications System with Method for Determination of Subcarrier Offset for OFDM Symbol Generation - The middle subcarrier of the baseband OFDM signal of each numerology may need to be shifted appropriately with respect to other numerologies to comply with a nested grid. These shifts can be signalled to the UE with an associated overhead. Methods and systems are provided to reduce overhead for OFDM communication. Reduced overhead can translate into increased bandwidth for the system, and/or reduced power/battery consumption in the UE. A transmitter generates an OFDM signal associated with a first subcarrier spacing of a first numerology (μ), a middle subcarrier frequency of a set of usable resource blocks (RBs) of the first numerology being offset from a carrier frequency by a first offset having a value (k | 2021-11-25 |
20210367819 | METHODS AND APPARATUS FOR SIGNALING GUARD SYMBOLS IN INTEGRATED ACCESS AND BACKHAULING - Aspects of the present disclosure include methods, apparatuses, and computer readable media for receiving a medium access control (MAC) control element (CE) comprising at least a set of guard symbol values associated with a mobile termination (MT) and a distributed unit (DU), transitioning from first communication via one or more MT cells associated with the MT to second communication via one or more DU cells associated with the DU or from the second communication via the one or more DU cells associated with the DU to the first communication via the one or more MT cells associated with the MT during at least a guard symbol signaled by a guard symbol value of the set of guard symbol values; and transmitting or receiving information via the transitioned one or more MT cells or the transitioned one or more DU cells. | 2021-11-25 |
20210367820 | METHOD FOR TRANSMITTING DEMODULATION REFERENCE SIGNAL FOR UPLINK CONTROL SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND DEVICE THEREFOR - Disclosed herein is a method for transmitting a demodulation reference signal for an uplink control signal in a wireless communication system. | 2021-11-25 |
20210367821 | BROADCAST SIGNAL TRANSMITTING DEVICE AND BROADCAST SIGNAL TRANSMITTING METHOD WHICH USE CHANNEL BONDING - An apparatus and method for transmitting broadcast signal to which channel bonding is applied are disclosed. The apparatus according to the present invention includes an input formatting unit configured to generate baseband packets corresponding to a plurality of packet types using data corresponding to a physical layer pipe; a stream partitioner configured to partition the baseband packets into a plurality of partitioned streams corresponding to the plurality of packet types; BICM units configured to perform error correction encoding, interleaving and modulation corresponding to the plurality of partitioned streams, respectively; and waveform generators configured to generate RF transmission signals corresponding to the plurality of partitioned streams, respectively. | 2021-11-25 |
20210367822 | WIRELESS DEVICES AND SYSTEMS INCLUDING EXAMPLES OF MIXING INPUT DATA WITH COEFFICIENT DATA - Examples described herein include systems and methods which include wireless devices and systems with examples of mixing input data with coefficient data. For example, a computing system with processing units may mix the input data for a transmission in a radio frequency (RF) wireless domain with the coefficient data to generate output data that is representative of the transmission being processed according to the wireless protocol in the RF wireless domain. A computing device may be trained to generate coefficient data based on the operations of a wireless transceiver such that mixing input data using the coefficient data generates an approximation of the output data, as if it were processed by the wireless transceiver. Examples of systems and methods described herein may facilitate the processing of data for 5G wireless communications in a power-efficient and time-efficient manner. | 2021-11-25 |
20210367823 | WIRELESS DEVICES AND SYSTEMS INCLUDING EXAMPLES OF MIXING COEFFICIENT DATA SPECIFIC TO A PROCESSING MODE SELECTION - Examples described herein include systems and methods which include wireless devices and systems with examples of mixing input data with coefficient data specific to a processing mode selection. For example, a computing system with processing units may mix the input data for a transmission in a radio frequency (RF) wireless domain with the coefficient data to generate output data that is representative of the transmission being processed according to a specific processing mode selection. The processing mode selection may include a single processing mode, a multi-processing mode, or a full processing mode. The processing mode selection may be associated with an aspect of a wireless protocol. Examples of systems and methods described herein may facilitate the processing of data for 5G wireless communications in a power-efficient and time-efficient manner. | 2021-11-25 |
20210367824 | APPARATUSES AND METHODS OF SWITCHING BETWEEN DIFFERENT NUMEROLOGIES - A method, network node and wireless device are provided in which a method in the network node for switching between different numerologies supported by the network node includes determining at least one parameter that can be used by the network node for switching between a first signal operating with a first numerology and a second signal operating with a second numerology; switching between the first signal and the second signal based on the at least one parameter; and after the switching, operating at least one of the first signal and the second signal between the network node and a second node. | 2021-11-25 |
20210367825 | WIRELESS COMMUNICATION METHOD, TERMINAL DEVICE AND NETWORK DEVICE - A wireless communication method, a terminal device and a network device are disclosed. Said method includes: a terminal device determining a first number of a first SSB and a second number of the first SSB, the first number of the first SSB being used for indicating the timing position of the first SSB in a first time unit, and the second number of the SSB being used for determining QCL information about the first SSB; and the terminal device determining the timing position of the first SSB in the first time unit according to the first number of the first SSB, and determining a QCL relationship between the first SSB and other SSBs according to the second number of the first SSB. | 2021-11-25 |
20210367826 | USER EQUIPMENT (UE) TRANSMITTER AND BASE STATION RECEIVER FOR TRANSMISSIONS FROM A UE TO A BASE STATION - An apparatus for wireless communication includes a receiver configured to receive control information associated with a non-coherent transmission to a base station. The apparatus further includes a transmitter configured to perform the non-coherent transmission based on the control information. The non-coherent transmission includes transmission of a codepoint to the base station, and the codepoint is determined based a diagonalized base sequence parameter matrix, a first discrete Fourier transform (DFT) matrix of a first size, and a second DFT matrix of a second size. | 2021-11-25 |
20210367827 | TRANSMITTING APPARATUS AND MAPPING METHOD THEREOF - A transmitting apparatus is disclosed. The transmitting apparatus includes an encoder to perform channel encoding with respect to bits and generate a codeword, an interleaver to interleave the codeword, and a modulator to map the interleaved codeword onto a non-uniform constellation according to a modulation scheme, and the constellation may include constellation points defined based on various tables according to the modulation scheme. | 2021-11-25 |
20210367828 | Class of Symbol Constellations for Data Transmission - A transmitting device configured to obtain a message to be transmitted; map the obtained message onto a two-dimensional 2 | 2021-11-25 |
20210367829 | IOT APPLICATION LEARNING - A system and method for performing automated learning of an Internet-of-Things (IoT) application are disclosed. The automated learning is based on generation of application-agnostic events, allowing the automated learning to be performed without prior knowledge of the IoT application. | 2021-11-25 |
20210367830 | DYNAMIC EVENT PROCESSING FOR NETWORK DIAGNOSIS - Example methods and systems for dynamic event processing for network diagnosis are described. In one example, a computer system may monitor a runtime flow of multiple packets to detect a set of multiple events associated with the runtime flow. The computer system may perform a first stage of event processing by matching the set of multiple events to a set of multiple signatures that includes a first signature and a second signature. The first signature may be associated with a first mapping rule that is fully satisfied by the set of multiple events. The second signature may be associated with a second mapping rule that is partially satisfied. During a second stage of event processing, the second signature is disregarded. In response to diagnosing an issue associated with the runtime flow, remediation action(s) may be performed. | 2021-11-25 |
20210367831 | MULTI-DIMENSIONAL IMPACT DETECT AND DIAGNOSIS IN CELLULAR NETWORKS - A method for multi-dimensional impact detection and diagnosis of networks. The methods and systems dynamically explore only those network feature combinations that are likely to have problems by using a summary structure Sketch, for example. The method and systems capture fine-grained anomalies at a coarse level which allows for on-demand zoom into the finer-grained levels for further analysis. | 2021-11-25 |
20210367832 | METHODS AND SYSTEMS FOR APPLICATION AND POLICY BASED NETWORK TRAFFIC ISOLATION AND DATA TRANSFER - A method includes allocating an identifier to each of a plurality of policies each comprising a network-isolation identifier associated with a VXWAN directive and transmitting each of the plurality of policies to one or more devices in a network. | 2021-11-25 |
20210367833 | INFORMATION PROCESSING APPARATUS THAT PROVIDES REQUIREMENT MANAGEMENT SERVICE, NETWORK SYSTEM, METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus that facilitates attachment of a file to a ticket created by using a requirement management service. The information processing apparatus connects to a server that provides a requirement management service. A first acquisition unit acquires input items for creating a ticket, from the requirement management service. A setting unit sets parameters of the acquired setting items in accordance with a user operation. A generation unit generates a creation request for requesting creation of a ticket on which the set parameters are reflected. A second acquisition unit acquires data to be attached to the ticket as a file. A transmission unit transmits the creation request in a state having the acquired data attached thereto, to the server. | 2021-11-25 |
20210367834 | SYNCHRONIZATION OF LOGICAL NETWORK STATE BETWEEN GLOBAL AND LOCAL MANAGERS - Some embodiments provide a method for a global manager that manages a logical network configuration for multiple datacenters that each have a local manager for managing the logical network configuration within the datacenter. Based on detecting that a connection to a particular local manager of a particular datacenter has been restored after a period of unavailability, the method identifies a portion of the logical network configuration that is relevant to the particular datacenter. In a series of transactions, the method transfers the identified portion of the logical network configuration to the particular local manager. During the series of transactions, the method identifies modifications to the identified portion of the logical network configuration to be included in the series of transactions. Upon completion of the series of transactions, the method transfers a notification to the particular local manager indicating completion of the series of transactions. | 2021-11-25 |
20210367835 | METHOD AND APPARATUS FOR OPTIMIZING A SOFTWARE DEFINED NETWORK CONFIGURATION - In one example, a method and apparatus for optimizing a software defined network configuration are disclosed. In one example, the method determines a first network relative performance parameter for a current configuration of a network, based on respective weighting profiles associated with services for which the network carries data. The method then determines a second network relative performance parameter for a proposed configuration of the network, based on the respective weighting profiles associated with the services for which the network carries data. The proposed configuration is implemented in the network when the second network relative performance parameter is greater than the first network relative performance parameter. | 2021-11-25 |
20210367836 | Adaptive Channel Orchestration - A cellular communication apparatus includes antenna circuitry. A transceiver receives or transmits a signal using the antenna circuitry on a chosen channel of a portion of a radio spectrum. The portion of the radio spectrum is divided into one or more channels including the chosen channel each occupying a bandwidth of the portion of the radio spectrum. Control circuitry dynamically changes a configuration of the one or more channels of the radio spectrum and communication circuitry communicates the configuration of the one or more channels of the radio spectrum to one or more items of user equipment. | 2021-11-25 |
20210367837 | CONFIGURING SYSTEM RESOURCES FOR DIFFERENT REFERENCE ARCHITECTURES - A specification of an intent that identifies a desired service and a reference architecture is received. The desired service is rendered to provide instructions for dispatch to a plurality of devices having roles. Rendering the desired service includes invoking a service rendering program function based on the reference architecture and a role of a specific device. A new reference architecture may be implemented by specifying a new service rendering program function for the new reference architecture. | 2021-11-25 |
20210367838 | SYSTEM AND METHOD FOR DISTRIBUTED HOME AUTOMATION CONTROL - A distributed home automation system and method for control of devices located in rooms of a home that is divided into regions includes plural devices located in the rooms, with a first device located in a first room, and a second device located in a second room. The system includes a network of regional controllers in communication with each device and with each regional controller in the network. Each regional controller is configured to control only a preselected number of devices that is less than all of the devices. The system includes plural regional controllers configured to control less than all of the devices in all of the rooms. The network is also configured to allow the regional controllers automatically to configure or reconfigure each other, automatically and remotely. | 2021-11-25 |
20210367839 | METHOD AND SYSTEM FOR SIGNALING COMMUNICATION CONFIGURATION FOR IOT DEVICES USING MANUFACTURER USAGE DESCRIPTION FILES - A method at a network element for configuration for Internet of Things (IoT) devices using manufacturer usage description (MUD) files, the method including receiving at least one MUD Uniform Resource Locator (URL) from an IoT Device; sending, from the network element to at least one MUD Server based on the MUD URL, a Uniform Resource Indicator; responsive to the sending, receiving a plurality of MUD files from the MUD server; creating a plurality of policies from the plurality of MUD files, the plurality of policies corresponding to a normal mode of operation and a secondary mode of operation; and forwarding the plurality of policies to a gateway from the network element. | 2021-11-25 |
20210367840 | SENSOR KITS AT EDGE DEVICES FOR MONITORING AND MANAGING INDUSTRIAL SETTINGS - A variety of kits are provided that are configured with components, systems and methods for monitoring various industrial settings, including kits with self-configuring sensor networks, communication gateways, and automatically configured back end systems. | 2021-11-25 |
20210367841 | CONFIGURATION TECHNIQUES FOR MANAGED HOST OPERATING SYSTEMS AND CONTAINERIZED APPLICATIONS INSTANTIATED THEREBY - Embodiments described herein are directed to configuring managed computing devices utilizing containerized applications. For instance, a mobile device manager may provide configuration settings to a computing device via, for example, an enterprise network. A host operating system (OS) executing on the computing device determines and applies the settings that are applicable to the host OS. The configuration settings are stored for configuring containerized applications executing on the computing device. For instance, as new containerized applications are launched by the host OS, the containerized applications retrieve the configuration settings and determine and apply the settings that are applicable to the containerized applications. Results of applying the configuration settings to the host OS and the containerized applications are merged and sent to the mobile device manager. The host OS and the containerized application may, for example, implement the settings in order to be compliant with an enterprise's policy. | 2021-11-25 |
20210367842 | METHOD FOR CONFIGURING A FIREWALL EQUIPMENT IN A COMMUNICATION NETWORK, METHOD FOR UPDATING A CONFIGURATION OF A FIREWALL EQUIPMENT, AND CORRESPONDING DEVICE, ACCESS EQUIPMENT, FIREWALL EQUIPMENT AND COMPUTER PROGRAMS - A method for configuring a firewall equipment in a first communication network managed by an access equipment for accessing a second communication network. Such a method implements: obtaining characteristic information of a user equipment in the first network by analyzing its active interfaces in the network; generating configuration rules for configuring the firewall equipment on the basis of the obtained features and of a predetermined configuration model; and transmitting, to the firewall equipment, an update command message to update a configuration, including the determined configuration rules. | 2021-11-25 |
20210367843 | DETECTING AND RESOLVING MULTICAST TRAFFIC PERFORMANCE ISSUES - The subject disclosure relates to systems and methods for improving multicast traffic flows in a computer network. In some aspects, a method of the technology includes steps for receiving multicast traffic statistics from each of a plurality of switches in a computer network, aggregating the multicast traffic statistics into a time-series database, and identifying a low-performing multicast flow based on the time-series database. In some aspects, the method can include steps for automatically reconfiguring the computer network to improve the low-performing multicast flow. Systems and machine readable media are also provided. | 2021-11-25 |
20210367844 | DYNAMICALLY RECONFIGURING DATA PLANE OF FORWARDING ELEMENT TO ACCOUNT FOR POWER CONSUMPTION - Some embodiments of the invention provide a network forwarding element that can be dynamically reconfigured to adjust its data message processing to stay within a desired operating temperature or power consumption range. In some embodiments, the network forwarding element includes (1) a data-plane forwarding circuit (“data plane”) to process data tuples associated with data messages received by the IC, and (2) a control-plane circuit (“control plane”) for configuring the data plane forwarding circuit. The data plane includes several data processing stages to process the data tuples. The data plane also includes an idle-signal injecting circuit that receives from the control plane configuration data that the control plane generates based on the IC's temperature. Based on the received configuration data, the idle-signal injecting circuit generates idle control signals for the data processing stages. Each stage that receives an idle control signal enters an idle state during which the majority of the components of that stage do not perform any operations, which reduces the power consumed and temperature generated by that stage during its idle state. | 2021-11-25 |
20210367845 | DATA ANALYTICS ON INTERNAL STATE - Various embodiments are described herein to track and/or update the state of components within a network element. One embodiment provides for a network management system comprising a collector node including an ingest gateway to receive configuration and status data of a set of network elements coupled to the collector node via the network, the collector node further to store the configuration and status data from the set of network elements in a distributed database; a search engine to locate and retrieve the configuration and status data of a specified subset of the network elements at a specified time period; and an interface server to receive a request for the configuration and status data from an external requester, the interface server to facilitate provision of the configuration and status data in response to the request. | 2021-11-25 |
20210367846 | METHODS AND APPARATUS TO IMPLEMENT CLOUD SPECIFIC FUNCTIONALITY IN A CLOUD AGNOSTIC SYSTEM - Methods, apparatus, systems and articles of manufacture are disclosed that implement cloud functionality in a cloud agnostic system. An example apparatus includes: at least one memory; instructions in the apparatus; and processor circuitry to execute the instructions to: generate a blueprint including components of requested cloud resources and their relationships; provide an allocation flag to the blueprint, the allocation flag indicating the requested cloud resources are to be partially provisioned; transmit a first provisioning request to a cloud management platform, the cloud management platform to manage a plurality of cloud resources; and in response to the cloud management platform selecting cloud resources, transmit a second provisioning request to fully provision the selected cloud resources, the second provisioning request including constraints specific to the selected cloud resources. | 2021-11-25 |
20210367847 | FLASH CLASSIFICATION USING MACHINE LEARNING FOR DEVICE CLASSIFICATION SYSTEMS - In various embodiments, a device classification service makes a determination that an endpoint device in a network is eligible for expedited device classification based on a policy. The device classification service obtains, after making the determination that the endpoint device in the network is eligible for expedited device classification, telemetry data regarding the endpoint device generated by actively probing the endpoint device. The device classification service determines whether the telemetry data regarding the endpoint device matches any existing device classification rules. The device classification service generates, based on the telemetry data, a device classification rule that assigns a device type to the endpoint device, when the telemetry data does not match any existing device classification rules. | 2021-11-25 |
20210367848 | A METHOD OF COMMISSIONING A WIRED COMMUNICATION NETWORK - A method of commissioning a wired communication network, wherein said communication network is being configured to comprise a plurality of interconnected Data Forwarding Devices, DFDs in accordance with a network topology plan, wherein said network topology plan identifies how said plurality of DFDs are interconnected, and wherein each DFD has a plurality of ports for connecting to one or more further DFDs, wherein said method comprises the steps of generating link combination codes used to identify cables for interconnections in said network topology plan, wherein each link combination code is based on respective ports to which a respective cable is to be connected, generating unique port combination codes used to identify DFDs in said network topology plan, wherein each port combination code is based on respective ports with which a respective DFD is connected to further DFDs, and wherein said port combination codes are generated such that each DFD in said network topology plan utilizes different sets of ports for said interconnecting and applying said unique port combination codes to said plurality of DFDs. | 2021-11-25 |
20210367849 | DELAYED RECOMPUTATION OF FORMAL NETWORK TOPOLOGY MODELS BASED ON MODIFICATIONS TO DEPLOYED NETWORK TOPOLOGIES - Techniques are described herein for generating and modifying formal network topology models, and deploying network topologies based on the formal models across multiple workload resource domains. A topology deployment system may receive modification data for a deployed network topology, and analyze the modification data to determine whether the associated formal network topology model is to be recomputed. In some examples, modifications to a deployed network topology that do not impact operational performance or compromise functional equivalence with the underlying logical model, need not trigger a recomputation of the network topology model immediately and could be delayed. Modifications to deployed network topologies that do not trigger recomputations of the formal network topology model may be stored and tracked, so that subsequent recomputations of the model may incorporate the pending modifications. | 2021-11-25 |
20210367850 | TCLOS - Scalable network topology and system architecture - In one embodiment, a computer network system, includes a plurality of mesh networks, each mesh network including at least three interconnected respective internal switches with each respective internal switch being connected to each other one of the respective internal switches via a respective internal network connection, and Clos topology network connections connecting the mesh networks in a Clos topology arrangement. | 2021-11-25 |
20210367851 | SYSTEM AND METHOD FOR TOPOLOGY CONSTRUCTION IN HYBRID CLOUD ENVIRONMENTS - A system and method for topology construction in hybrid cloud environments includes receiving connection information from a local perimeter edge router of a local network that has a known topology and receiving connection information from a remote perimeter edge router of a remote network that is provided by a cloud provider. The received local perimeter edge router connection information is associated with the received remote perimeter edge router connection information. The associated connection information is normalized to a generic model, the generic model representing connections having different link layer policies in a generic way and the normalized connection information is applied to a network topology of the local network and the remote network. | 2021-11-25 |
20210367852 | DETERMINING FORMAL MODELS USING WEIGHTING FACTORS FOR COMPUTING ELEMENTS IN MULTI-DOMAIN ENVIRONMENTS - Techniques for deploying, monitoring, and modifying network topologies operating across multi-domain environments using formal models and weighting factors assigned to computing elements in the network topologies. The weighting factors restrict or allow the movement of various computing elements and/or element groupings to prevent undesirable disruptions or outages in the network topologies. Generally, the weighting factors may be determined based on an amount of disruption experienced in the network topologies if the corresponding computing element or grouping was migrated. As the amount of disruption caused by modifying a particular computing element increases, the weighting factor represents a greater measure of resistivity for migrating the computing element. In this way, topology deployment systems may allow, or disallow, the modification of particular computing elements based on weighting factors. Thus, the amount of disruption in the functioning of network topologies may be considered when optimizing the allocation of computing elements across multi-domain environments. | 2021-11-25 |
20210367853 | TRANSMIT SPECIFIC TRAFFIC ALONG BLOCKED LINK - Embodiments herein relate to transmitting specific traffic along a blocked link. A status of links between switches of a network is monitored. The status of the links is one of blocked and non-blocked. A blocked link is not used by a Spanning Tree Protocol (STP). At least one of the network switches is configured to transmit the specific traffic along the blocked link. | 2021-11-25 |