48th week of 2017 patent applcation highlights part 69 |
Patent application number | Title | Published |
20170346624 | APPARATUS AND METHOD FOR DATA ENCRYPTION, APPARATUS AND METHOD FOR DATA DECRYPTION - Disclosed are an apparatus and method for data encryption and an apparatus and method for data decryption. The data encryption apparatus includes a key exchanger configured to generate a session key using a key exchange protocol, a cipher key generator configured to generate at least one of a cipher key and a key table from the session key, and an encryptor configured to encrypt data with the at least one of the cipher key and the key table generated from the session key. | 2017-11-30 |
20170346625 | Method and Apparatus for Duplicated Data Management in Cloud Computing - An approach is provided for managing data duplication in cloud computing. A method comprising, sending from a first device to a data center, data encrypted with a data encryption key for storing the encrypted data at the data center; encrypting the data encryption key according to an attribute-based encryption (ABE) scheme by using identity as an attribute in a deduplication policy for the data; issuing to a second device, a personalized secret attribute key which is derived from a public key of the second device according to the attribute-based encryption (ABE) scheme, wherein the personalized secret attribute key is to be used for decrypting the encrypted data encryption key at the second device, in combination with the policy. | 2017-11-30 |
20170346626 | QUANTUM RANDOM PULSE GENERATOR - Provided is a quantum random pulse generator having enhanced security using a phenomenon in which a radioactive isotope naturally collapses. The quantum random pulse generator includes a photodiode detection unit which has a photodiode disposed at the center of the photodiode detection unit on a top surface, a radioactive isotope emission unit which emits alpha particles discharged when an atomic nucleus naturally collapses toward a photodiode, and a plate which is disposed on a top surface of the radioactive isotope emission unit and supports the radioactive isotope emission unit. The alpha particles discharged by the emission unit come into contact with the photodiode to generate a random pulse. | 2017-11-30 |
20170346627 | COMMUNICATION WITH EVERLASTING SECURITY FROM SHORT-TERM-SECURE ENCRYPTED QUANTUM COMMUNICATION - A method of communicating a classical message M between a first party A and a second distant party B over a public channel F, comprises the steps of sharing a key between the parties, the shared key K comprising a short-term-secure key KS and/or a long-term-secure key KL; at A, encoding M as a quantum codeword, A using K to encode M into a first encrypted codeword belonging to a publicly known quantum code; communicating the first encrypted codeword from A to B over F whose output is a second codeword; unitarily transforming the second codeword into a third codeword by using a N-mode interferometer controlled by B, placed at the output of F and keyed by K; determining an estimate of M, at B, by performing a measurement on the third codeword and by processing the measurement using K. | 2017-11-30 |
20170346628 | COMPUTING SYSTEM HAVING AN ON-THE-FLY ENCRYPTOR AND AN OPERATING METHOD THEREOF - A path for transmitting encrypted data is completely separated from a path for transmitting unencrypted data. To this end, a virtual secure memory is created on an address space. If a central processing unit (CPU) writes data in the virtual secure memory, hardware stores the data in a specific area of a dynamic random access memory (DRAM) after automatically encrypting the data. In the case where the CPU intents to read data, the hardware sends the data to the CPU after automatically decrypting the data read from a specific area of the DRAM. | 2017-11-30 |
20170346629 | APPARATUS AND METHOD FOR PUBLIC KEY ENCRYPTION - Disclosed are an apparatus and method for public key encryption using a white-box cipher algorithm. An apparatus for public key encryption using a white-box cipher algorithm includes a key table generator configured to generate at least one key table from a cipher key, a hidden-key table generator configured to convert the at least one key table into at least one hidden-key table, and an encryption algorithm generator configured to generate a white-box implemented encryption algorithm by using the at least one hidden-key table and an inverse operation of the conversion and provide the generated encryption algorithm as a public key for encryption. | 2017-11-30 |
20170346630 | RELAY SERVICE FOR COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES - A relay service can relay messages between controllers and electronically controllable accessory devices that may be located remotely from the controllers. Relaying of messages by the relay service can be decoupled from any knowledge of the functionality of the accessory or the content of the messages. Device identification and relaying of messages can be managed using “relay aliases” that are meaningful only to the relay service and the endpoint devices (the controller and accessory). The endpoint devices can implement end-to-end security for messages transported by the relay service. | 2017-11-30 |
20170346631 | SECURELY RECOVERING A COMPUTING DEVICE - A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code. | 2017-11-30 |
20170346632 | METHOD FOR ON-BOARD PRIME NUMBER GENERATION - The present invention relates to a method to generate prime numbers on board a portable device, said method comprising the steps of, each time at least one prime number is requested:
| 2017-11-30 |
20170346633 | COMPUTING A SECURE ELLIPTIC CURVE SCALAR MULTIPLICATION USING AN UNSECURED AND SECURE ENVIRONMENT - A system for securely computing an elliptic curve scalar multiplication in an unsecured environment, including: a secure processor including secure memory, the secure processor configured to: split a secure scalar K into m | 2017-11-30 |
20170346634 | AUGMENTED REALITY SECURITY VERIFICATION - Providing visual security verification includes an electronic credential of a credential holder causing credential holder information to be transmitted to an augmented reality device, superimposing the credential holder information on to a live image of an immediate environment of the augmented reality device to provide a superimposed image, where the credential holder information includes a picture of the credential holder, and providing security verification based on a comparison of the picture of the credential holder and the live image. The information may be stored in the augmented reality device and an identifier of the credential holder from the electronic credential may be used to look up the information. The information may be provided by the electronic credential to the augmented reality device. The augmented reality device may cache information for a subset of the credential holders. The information may be stored in a cloud storage device. | 2017-11-30 |
20170346635 | USER AUTHENTICATION DEVICE - Examples disclosed herein involve a user authenticator that harvests energy from signals. An example involves an authentication manager to provide authentication information to an authorization device to enable access to a secure device in response to receiving a request signal from the authorization device for the authentication Information a power manager to harvest energy from the request signal to power the apparatus. | 2017-11-30 |
20170346636 | COMMUNICATIONS SECURITY SYSTEMS AND METHODS - Various examples are directed to systems and methods for communications security. For example, a computing device may generate a connection between the computing device and a client device. A first application executing at the computing device may send a first application session key to the client device via the connection. The first application may perform a cryptographic operation on a first message based at least in part on the first application session key to generate a first cryptographic result and send the first cryptographic result to the client device via the connection. The first application may receive a second cryptographic result from the client device via the connection and determine that the second cryptographic result was obtained with the first application session key. | 2017-11-30 |
20170346637 | ELECTRONIC APPARATUS, METHOD FOR ELECTRONIC APPARATUS AND INFORMATION PROCESSING SYSTEM - An electronic apparatus, a method for an electronic apparatus and an information processing system are provided. The electronic apparatus includes a processing circuit configured to: generate a request to be confirmed which is to be sent to other nodes in a network, the request to be confirmed including an electronic signature of the present node; acquire responses to the request to be confirmed which are from the other nodes, the response including an electronic signature of a corresponding node; and generate, based on the request to be confirmed, the acquired responses and an existing block chain, a new block. | 2017-11-30 |
20170346638 | SIGNING KEY LOG MANAGEMENT - Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested to perform one or more actions using the keys. The logging property can specify how to log use of a respective key. A key can also include a mutability property for specifying whether the logging property can be changed, and if so under what circumstances or in which way(s). The ability to specify and automatically enforce logging can be important for environments where audit logs are essential. These can include, for example, public certificate authorities that must provide accurate and complete audit trails. In cases where the data is not to be provided outside a determined secure environment, the key can be generated with a property indicating not to log any of the usage. | 2017-11-30 |
20170346639 | Public Key Infrastructure based on the Public Certificates Ledger - Systems and methods for managing public key certificates and supporting the users thereof. The certificates are cryptographically encapsulated objects that bind the identities of their owners to public keys and provide digital signature mechanisms for other users to verify the binding and correctness of other attributes of the certificate. Certificates include double links that reflect their validation and position in a public certificates ledger, thereby preventing insertion or removal of certificates in the ledger. Certificate protocols of the system include requesting issuance of certificates, issuing and returning certificates to their requesting users, storing certificates in the certificates ledger, requesting and distributing certificates to transaction partners, verification of certificates by transaction partners, and revoking certificates by their owners. These protocols are performed as direct peer-to-peer transactions between the members of the system. | 2017-11-30 |
20170346640 | TECHNOLOGIES FOR COLLECTIVE AUTHORIZATION WITH HIERARCHICAL GROUP KEYS - Technologies for secure collective authorization include multiple computing devices in communication over a network. A computing device may perform a join protocol with a group leader to receive a group private key that is associated with an interface implemented by the computing device. The interface may be an instance of an object model implemented by the computing device or membership of the computing device in a subsystem. The computing device receives a request for attestation to the interface, selects the group private key for the interface, and sends an attestation in response to the request. Another computing device may receive the attestation and verify the attestation with a group public key corresponding to the group private key. The group private key may be an enhanced privacy identifier (EPID) private key, and the group public key may be an EPID public key. Other embodiments are described and claimed. | 2017-11-30 |
20170346641 | Efficient Encrypted Software Distribution Mechanism - A method and system are provided for improved distributing of a complete software image to all electronic devices of a certain type or model while using encryption to limit its use to specific ones of those devices. In the method, the entire software image is encrypted with a global key and the encrypted software image is distributed to all devices which have the capability of running that software. The global software decryption key for decrypting the software image is uniquely encrypted for every device that is authorized to use the software and the encrypted global software key is distributed to those devices from a field or factory provisioning server across a point-to-point connection. | 2017-11-30 |
20170346642 | METHOD FOR AUTHENTICATING ATTRIBUTES IN A NON-TRACEABLE MANNER AND WITHOUT CONNECTION TO A SERVER - The present invention relates to a method, for a provider entity belonging to a provider group, to authenticate its belonging to an attribute provider group to a verification entity in a non-traceable manner without necessitating to share secret or large constants compromising privacy. Both entities comprise at least one attribute group arborescence, this attribute group arborescence being shared by the provider entity and the verification entity when the provider entity has the attribute. According to the invention, when a verification is triggered, the verification entity calculates a certificate from the attribute group arborescence, said certificate being calculated from the authentication tokens of the groups along the arborescence from the attribute verification group's token to the consumer group's token. | 2017-11-30 |
20170346643 | SECURE COMMUNICATIONS - A system including a sensor, a computing device and a Wireless Access Point (WAP). The sensor in response to receipt of an initiation signal, via a first communication channel, from a relatively proximal computing device, is arranged to generate and store first security information and to transmit, wirelessly via a second communications channel, a first message comprising information representing at least a part of the first security information. The WAP, which is remote from the sensor is arranged to receive and store the first message. The WAP is arranged to generate second security information and to transmit wirelessly to the computing device, via a third communications channel when the computing device is within range of the WAP, a second message comprising information representing at least a part of the second security information. The sensor is arranged to receive at least the second message via only the first communications channel. | 2017-11-30 |
20170346644 | SYSTEMS IMPLEMENTING HIERARCHICAL LEVELS OF SECURITY - Systems and methods for providing variable access authentication respond to the need of a hierarchical level of security, which may include the use of multiple physically unclonable functions (PUFs) and/or the distribution of a set of authentication keys with “don't care” states. Each of the multiple PUFs can drive a separate level of access control, while “don't care” states can be included in the authentication keys when the security risk levels are lower. These two methods can be implemented independently, or in a combination for higher levels of security. At one end of the embodiment the IT manager can have backdoor capabilities if a user forgot a password, on the other end access control to an Internet device needs to be extremely stringent when the user operates in unsafe territory. | 2017-11-30 |
20170346645 | NETWORK DEVICE CONFIGURED TO TRACK MULTICAST RECEIVERS - A first network device adapted for communication with one or more other network devices is configured to originate a first route identifying a tunnel for carrying traffic for a multicast, to originate a second route specifying a leaf information requirement for the multicast but not identifying a tunnel for carrying traffic for the multicast, and to track a plurality of receivers of the multicast based at least in part on leaf information received from the multicast receivers responsive to the specified leaf information requirement of the second route. The first route may comprise an inclusive route having a tunnel attribute that identifies an inclusive tunnel for the multicast and the second route may comprise a selective route having a tunnel attribute configured to indicate that it carries no tunnel information. Multicast traffic can be switched between an inclusive tunnel and a selective tunnel responsive to the multicast receiver tracking. | 2017-11-30 |
20170346646 | METHOD AND DEVICE FOR TRANSMITTING A DATA STREAM IN A MULTICAST TRANSMISSION MODE - In a communication network, a client has a plurality of network interfaces connecting it to a server able to deliver data streams on multicast groups. The client obtains a first request for subscription to a multicast group allowing to obtain a data stream. The client replaces the first subscription request with a plurality of second requests for subscription to a plurality of multicast subgroups able to supply data sub-streams which, once combined, allow to reconstruct the data stream. Each second subscription request is transmitted over a network interface with which the request was associated, so as to favour use of each available network interface. The client receives, over each network interface, a data sub-stream corresponding to the second subscription request transmitted over said network interface and reconstructs the data stream from the data sub-streams. | 2017-11-30 |
20170346647 | METHOD FOR MONITORING LICENSED-ASSISTED ACCESS CELL, DEVICE, AND BASE STATION - The present disclosure provides a method and device for monitoring a licensed-assisted access cell. The method includes user equipment receiving notification signaling from a base station, where the notification signaling is used to instruct the user equipment to monitor a target LAA cell. The user equipment monitors for a specified signal of the target LAA cell after receiving the notification signaling. In this way, user equipment does not need to continually monitor or receive a signal of an LAA cell and power consumption can be reduced. | 2017-11-30 |
20170346648 | GROUP COMMUNICATION SYSTEM AND GROUP COMMUNICATION METHOD - The present invention relates to a group communication system comprising three, four, five or six communication devices which communicate in a wireless network operating according to a short range radio standard; primarily voice communication between a group of people takes place via the wireless network, each person in the group of people carrying a communication device. | 2017-11-30 |
20170346649 | METHOD AND APPARATUS FOR CONTROLLING SMART HOME DEVICE TO UPLOAD DATA, METHOD AND APPARATUS FOR ACQUIRING DATA UPLOADED BY SMART HOME DEVICE - A method and an apparatus for controlling a smart home device to upload data and a method and an apparatus for acquiring data uploaded by a smart home device are provided. The method includes: acquiring operation status data of the smart home device; and according to binding relationships of the smart home device with application servers, sending the operation status data to all bound application servers; wherein the smart home device is bound to at least two application servers. | 2017-11-30 |
20170346650 | SOUND OUTPUT APPARATUS AND HUB FOR COMMUNICATION NETWORK - A hub includes a main body including a communication circuitry configured to wirelessly communicate with another device and a cover housing coupled to a top portion of the main body, the cover housing including a sidewall that extends in a vertical direction and a partition extending from an inner surface of the sidewall to divide an inside of the sidewall into upper and lower regions. The hub further includes a display panel positioned in the cover housing, the display panel providing a visual output; and a display Printed Circuit Board (PCB) positioned on the partition, the display panel being positioned on an upper surface of the display PCB. The cover housing further includes a rib protruding upward from the partition, the rib extending through a gap between the display PCB and the sidewall to contact with a periphery of the display panel. | 2017-11-30 |
20170346651 | SCALABLE SYSTEM AND METHODS FOR MONITORING AND CONTROLLING A SANITARY FACILITY USING DISTRIBUTED CONNECTED DEVICES - A system to control and to monitor the entirety of a sanitary facility by using various specialized connected devices that are distributed throughout the sanitary facility, communicating with one another and over the internet network. Each one of these connected devices carries out its function or functions by using the information communicated by the other connected devices. Each one of these connected devices carries out its function or some of its functions independently in the event of a breakdown in the communication with the other connected devices. From the mobile or fixed apparatuses such as a Smartphone, touchscreen tablet, computer, server, etc. that are connected to the Internet, the user or users can interact with the connected devices, can be alerted in real time to malfunctions, and can receive information regarding the condition of the sanitary facility. | 2017-11-30 |
20170346652 | METHODS AND SYSTEMS FOR NETWORK CONFIGURATION - Network and device configuration systems and methods are described. In an embodiment, a first user interface configured to receive from a user configuration information regarding a first network provided. Program code stored in computer accessible memory is configured to generate a barcode that includes information related to the first network configuration information, wherein the barcode can be scanned by a device having a barcode scanner and a network interface to configure the network interface to access the first network. | 2017-11-30 |
20170346653 | Home Control System - A home control system has at least one peripheral device, a controlling device, and a mobile device. The mobile device determines whether the controlling device is connectable. When the mobile device determines that the controlling device is connectable, the mobile device is connected to the at least one peripheral device via the controlling device and transmits a control signal to the at least one peripheral device. When the mobile device determines that the controlling device is unconnectable, the mobile device is directly connected to the at least one peripheral device and transmits the control signal to the at least one peripheral device. Therefore, when the controlling device is broken, a user may still operate the mobile device to control the at least one peripheral device. | 2017-11-30 |
20170346654 | METHOD, INTELLIGENT DEVICE, AND SYSTEM FOR CONTROLLING TERMINAL DEVICE - A method, device, and system for controlling a terminal device are disclosed. The method includes: traversing, by the intelligent device, pre-stored correspondences between control triggering requests and terminal devices in response to a control triggering request, to search multiple terminal devices for a target device corresponding to the control triggering request; determining whether a control protocol of the intelligent device is consistent with a control protocol of the target device when the intelligent device and the target device are in a connected state; when the control protocol of the intelligent device is consistent with the control protocol of the target device, receiving an input instruction and performing operation control on the target device according to the input instruction. By means of this application, effective intelligent control by an intelligent device on a terminal device such as a computer is implemented, and a requirement of a user is satisfied. | 2017-11-30 |
20170346655 | Radio - Provided is a radio formed to be capable of performing wireless communication with one driving apparatus, and configured to be connected, through one communication port via wired communication, to a slave control apparatus configured to be communicably connected to a master control apparatus with a predetermined communication method, the radio including an identification information collection unit collecting, from the one driving apparatus, identification information for identifying the one driving apparatus, when the radio is initially connected to the one driving apparatus via wireless communication, and a transfer control unit mediating data transfer between the master control apparatus and the one driving apparatus, such that the one driving apparatus is directly connected to the one communication port in a virtual manner, based on the identification information of the one driving apparatus collected by the identification information collection unit. | 2017-11-30 |
20170346656 | SYSTEM AND METHOD FOR DATA GENERATOR DRIVEN BUS CLOCK VOTING - Various embodiments of methods and systems for data generator driven bus clock voting are disclosed. An exemplary embodiment defines a first timing domain within a system on a chip to comprise a data generating component and a bus that includes a memory management unit. The bus serves to communicatively couple the data generating component to a memory component, such as a DDR. A second timing domain within the system on a chip comprises the memory component. With such a configuration, the embodiment may leverage the clock speed of the data generating component to set a clock speed for components in the first timing domain and, in doing so, the clock speed of the memory management unit is dictated by the first timing domain. | 2017-11-30 |
20170346657 | Methods and Systems for Communicating Using a Virtual Private Network - Systems and methods for communication. A network abstraction layer (NAL) is built on a public Internet; and a network virtualization layer (NVL) is built on the NAL. | 2017-11-30 |
20170346658 | SYSTEM AND METHOD FOR IDENTIFYING COMMUNICATION BETWEEN VIRTUAL SERVERS - A server, includes a virtual machine identifier assigning section to assign an identifier of a virtual machine operating on the server; and a network interface to transmit a packet including a Layer 2 header information which includes the identifier of the virtual machine and a first packet field, for a VLAN-Tag, wherein the network interface transmits the packet to a packet encapsulate section which encapsulates a second packet field including the Layer 2 header information with a virtual network identifier representing a virtual network to which the virtual machine belongs. | 2017-11-30 |
20170346659 | METHOD AND APPARATUS FOR ADDRESS RESOLUTION - Embodiments of the invention generally relate to address resolution in a wireless communication system. The access node may locally determine, responsive to receiving a second-layer network address associated with a destination communication device from a source communication device in the wireless communication system, a first-layer network address of the destination communication device from the second-layer network address. The access node may send, responsive to the first-layer network address being unavailable, a request for the first-layer network address to an address resolution server in the wireless communication system. In this way, the time and resources for address resolution may be saved, and the efficiency of the address resolution may be improved. | 2017-11-30 |
20170346660 | METHOD FOR RECEIVING RADIO SIGNALS IN A RECEIVING DEVICE, AND RECEIVING DEVICE - Radio signals are received in a receiving device having an internal radio receiver that is designed to carry out a channel estimation for error correction, in the course of a receiving process of the radio signals received in a radio channel. The internal radio receiver communicates with an external radio receiver, which receives the same radio signals as the internal radio receiver at the measuring time, carries out a channel estimation for error correction, and transmits the channel estimation to the internal radio receiver, wherein the internal radio receiver uses the channel estimation of the external radio receiver in order to improve its own channel estimation. | 2017-11-30 |
20170346661 | ETHERNET MAGNETICS INTEGRATION - An integrated circuit is disclosed and includes an Ethernet physical layer (PHY) with a plurality of communication channels. The communication channels coupled to a corresponding plurality of terminals. The integrated circuit further includes a plurality of electrical isolation circuits and a compensation circuit. At least one of the plurality of electrical isolation circuits is coupled to a corresponding one of the plurality of communication channels and electrically isolates the PHY from a corresponding one of the plurality of terminals. The compensation circuit is configured to compensate for at least one of baseline wander and parameter drift associated with at least one of the plurality of isolation circuits. The PHY and the plurality of isolation circuits are integrated on a single substrate. | 2017-11-30 |
20170346662 | SYSTEM, METHOD AND SOFTWARE PROGRAM FOR TUNEABLE EQUALIZER ADAPTATION USING SAMPLE INTERPOLATION - Various embodiments of the present invention solve the problem of generating intermediate-time information useable to drive ZFE adaptation (for example, in connection with a digital receiver). Further, various embodiments of the present invention increase flexibility by enabling user-specified over-peaking and/or under-peaking (i.e. configurable equalizer tuning) with respect to a ZFE convergence (or lock) criterion. | 2017-11-30 |
20170346663 | TRANSMISSION APPARATUS - A transmission apparatus includes a connector that couples a signal path to a receiver, an equalizer that performs an equalization operation on received signals to be input to the receiver via the connector, a controller that calculates a coefficient controlling an operation of the equalizer and sets the coefficient in the equalizer, and a detector that detects a mating fault of the signal path in the connector in response to the coefficient configured by the controller. | 2017-11-30 |
20170346664 | COMMUNICATON UNIT, CIRCUIT FOR QUADRATURE SAMPLING ERROR ESTIMATION AND COMPENSATION AND METHOD THEREFOR - A communication unit comprises a modem configured to generate a first and second test digital quadrature signal. The modem is configured to: estimate a first sampling error performance associated with a first quadrature path from the first received test digital quadrature signal; estimate a second sampling error performance associated with a second quadrature path from the second received test digital quadrature signal; and generate at least one sampling error compensation signal based on the first estimated sampling error performance and second estimated sampling error performance to be applied to at least one of the receiver and transmitter. | 2017-11-30 |
20170346665 | MODULATION AND EQUALIZATION IN AN ORTHONORMAL TIME-FREQUENCY SHIFTING COMMUNICATIONS SYSTEM - A method of receiving data including receiving, on one or more carrier waveforms, signals representing a plurality of data elements of an original data frame wherein each of the data elements are represented by cyclically time shifted and cyclically frequency shifted versions of a known set of waveforms. The method further includes generating, based upon the signals, a received data frame and generating an equalized data frame by performing an equalization operation using elements of the received data frame, the equalization operation correcting for distortion introduced into the signals during propagation of the carrier waveforms through a channel. | 2017-11-30 |
20170346666 | DC-DC CONVERTER AND WIRELESS COMMUNICATION DEVICE INCLUDING THE SAME - To provide a DC-DC converter capable of reducing noise and a wireless communication device including the same, the DC-DC converter according to an embodiment includes a pulse signal generation unit generating a pulse signal, a voltage conversion unit that has a switch portion provided between an input terminal and an output terminal and on/off controlled by the pulse signal, and outputs an output voltage obtained by stepping down an input voltage supplied to the input terminal, from the output terminal, and a control circuit that controls a value of a current flowing through the switch portion in an on-state based on a value of the input voltage. | 2017-11-30 |
20170346667 | TONE-PHASE-SHIFT KEYING: A NEW MODULATION SCHEME FOR SC-FDMA - A method of wireless communication by a user equipment includes determining an allocation of a set of tones in a symbol for conveying data. The method further includes determining to use m-ary phase shift keying (MPSK) to modulate the data onto a subset of tones of the set of tones. The method further includes modulating the data onto the subset of tones based on a mapping, wherein the mapping maps pairs of data values with a largest Hamming distance from each other to pairs of constellation points with a maximum Euclidean distance from each other. | 2017-11-30 |
20170346668 | TECHNIQUES TO MANAGE DWELL TIMES FOR PILOT ROTATION - Techniques to manage dwell times for pilot rotation are described. An apparatus may comprise a memory configured to store a data structure with a set of modulation and coding schemes (MCS) available to an orthogonal frequency division multiplexing (OFDM) system, each MCS having an associated pilot dwell time. The apparatus may further comprise a processor circuit coupled to the memory, the processor circuit configured to identify a MCS to communicate a packet using multiple subcarriers of the OFDM system, and retrieve a pilot dwell time associated with the MCS from the memory, the pilot dwell time to indicate when to shift a pilot tone between subcarriers of the multiple subcarriers during communication of the packet. Other embodiments are described and claimed. | 2017-11-30 |
20170346669 | METHOD AND APPARATUS FOR EXTRACTING RESOURCE BLOCK FROM SIGNAL - The embodiments disclose a method in a base station for extracting a resource block at a frequency band from a signal received from a terminal device in a radio communication system employing OFDM. The method comprising: removing a CP portion corresponding to the resource block from the signal; for each of a predetermined number of successive symbols in the signal after the CP portion corresponding to the resource block has been removed, performing a FFT of the symbol, extracting a frequency domain signal corresponding to the frequency band from the FFT of the symbol, performing an IFFT on the extracted frequency domain signal to yield a time domain signal, and storing the time domain signal to form a time sequence by concatenation; performing a FFT of the stored time sequence; and extracting subcarriers corresponding to the resource block from the FFT of the stored time sequence. | 2017-11-30 |
20170346670 | Spectral Stitching Method to Increase Instantaneous Bandwidth in Vector Signal Analyzers - Various embodiments are described of devices and associated methods for processing a signal using a plurality of vector signal analyzers (VSAs). An input signal may be split and provided to a plurality of VSAs, each of which may process a respective frequency band of the signal, where the respective frequency bands have regions of overlap. Each VSA may adjust the gain and phase of its respective signal such that continuity of phase and magnitude is preserved through the regions of overlap. The correction of gain and phase may be accomplished by a complex multiply with a complex calibration constant. A complex calibration constant may be determined for each VSA by comparing the gain and phase of one or more calibration tones generated with each region of overlap, as measured by each of the VSAs. | 2017-11-30 |
20170346671 | METHOD AND SYSTEM FOR SHARING APPLICATION, AND APPLICATION SERVICE PLATFORM - Embodiments of the present invention provide a method and a system for sharing an application, and an application service platform. The method comprises: an application service platform, according to an application-sharing request sent from a source client, generates an application-sharing link containing an identifier of the source client, and returns the application-sharing link to the source client; the source client shares the sharing link with the target client; the application service platform, after receiving the connection request to the sharing link sent by the target client, generates an application installation package carrying the identifier of the source client, and returns the application installation package to the target client; the target client installs the application according to the installation package; an application service platform, after receiving an application login request sent by the target client, builds a friend-relationship between a user of the source client and a user of the target client according to the identifier of the source client carried in the application login request. The present invention, by means of application sharing, is able to facilitate establishment of a friend-relationship, enhances application interaction, and improves user experience. | 2017-11-30 |
20170346672 | INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE - A method for information processing and corresponding electronic devices are provided. The method includes displaying a webpage of a first webpage style corresponding to a target link on a first display, acquiring a display parameter of a second display after the second display is connected, and determining whether the second display is of the same type as the first display to display the webpage via the first webpage style based on the display parameter. After determining that the second display is not of the same type as the first display, the method further includes sending a link request including identification information corresponding to a display type of the second display to the server to instruct the server to provide the webpage of a second webpage style, which is different from the first webpage style. The method further includes the second display displaying the webpage via the second webpage style. | 2017-11-30 |
20170346673 | IDENTIFYING WIRELESS SERVICE - This document discloses a solution where a frame transferred in a wireless network comprises a group address, and wherein the group address comprises a service identifier identifying a service provided in the wireless network. Apparatuses of the wireless network may employ the group address to identify the service. | 2017-11-30 |
20170346674 | AUTOMATED ELECTRONIC COMPUTING AND COMMUNICATION SYSTEM EVENT ANALYSIS AND MANAGEMENT - Systems, apparatuses, and methods for automatic automated electronic computing and communication system event analysis and management are disclosed. Automatic automated electronic computing and communication system event analysis and management may include identifying an event, generating a computer readable representation of the electronic computing and communication system using automated topology enumeration, identifying an element of the electronic computing and communication system based on the representation, identifying a metric for the element, automatically investigating to determine a value for the metric, generating a remediation priority for the element based on a metric weight associated with the metric and a network layer value associated with a network layer associated with a network layer role associated with the element, and generating a graphical representation of the electronic computing and communication system indicating the remediation priority. | 2017-11-30 |
20170346675 | DISTRIBUTED TRACE OF NETWORK PROCEDURES FOR NETWORK ELEMENTS IN CLOUD DEPLOYMENT - The present invention provides apparatuses, methods, computer programs, computer program products and computer-readable media regarding a distributed trace of network procedures for network elements in cloud deployment. The present invention comprises collecting, at a collecting entity, trace information elements for a plurality of network procedures from a plurality of network elements in a network, the trace information element including a trace sequence identifier and an index, the trace sequence identifier identifying a specific network procedure and the index identifying a particular event within the network procedure, in subsequent order for each network procedure based on the trace sequence identifier and the index, and restoring a flow of a network procedure based on the collected and arranged trace information elements for the network procedure. | 2017-11-30 |
20170346676 | ALARM CORRELATION IN NETWORK FUNCTION VIRTUALIZATION ENVIRONMENT - Correlation of information related to network operations may be useful in many communication systems. For example, certain wireless communication networks may benefit from alarm correlation in network function virtualization environments. A method can include correlating alarms within a lower layer of a network function virtualization environment. The method can also include forwarding at least one of the correlated alarms to an entity managing an upper layer of the network function virtualization environment for further correlation with upper layer alarms. | 2017-11-30 |
20170346677 | System and Method for Intelligent Discovery and Rescue of Devices in an Internet-of-Things Network - A device network includes an Internet-of-things (IoT) device, a gateway device, a communication device, and a monitor system. The monitor system establishes a first communication path to the IoT device via the gateway device, determines that the gateway device has failed and that the first communication path has been interrupted, determines that the communication device is within communications range of the IoT device, and directs the communication device to establish a second communication path between the IoT device and the monitor system via the communication device in response to determining that the communication device is within communications range of the IoT device. | 2017-11-30 |
20170346678 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING HIGH AVAILABILITY SUPPORT AT A BYPASS SWITCH - Methods, systems, and computer readable media for providing high availability support at a bypass switch are disclosed. One method occurs at a bypass switch. The method includes determining that an inline tool associated with a bypass switch is unavailable. The method also includes determining whether the inline tool is required or optional. The method further includes in response to determining that the inline tool is required, disabling at least one link associated with the bypass switch so as to trigger a switchover involving a second bypass switch. | 2017-11-30 |
20170346679 | Method and System for Reconstructing Unmanned Aerial Vehicle Formation Communication Topology Based on Minimum Cost Arborescence - The present disclosure provides a method and system for reconstructing UAV formation communication topology based on minimum cost arborescence, the method comprising: monitoring broadcast communication channel, and judging whether communication failure occurs in UAV in formation; modifying formation communication diagram according to the type of communication failure when communication failure occurs in the UAV; calculating minimum cost arborescence of modified formation communication diagram, and reconstructing UAV formation communication topology according to calculation results. The present disclosure realizes rapid reconstruction of communication topology so as to avoid occurrence of UAV collision accident and restore formation after detecting communication failure, by modifying formation communication diagram according to the type of communication failure and calculating minimum cost arborescence of modified formation communication diagram to reconstruct UAV formation communication topology when communication failure occurs in UAV. | 2017-11-30 |
20170346680 | Link Management Method, Device and System in Virtual Machine Environment - At least some embodiments of invention provide a method, device and system for link management in a Virtual Machine (VM) environment. The method includes: a heartbeat handshake link is established with a VM. After the heartbeat handshake link is successfully established, Link Aggregation Control Protocol (LACP) state information of a Physical Function (PF) of a plurality of a Network Interface Cards (NICs) is acquired. The LACP state information is sent to the VM through the heartbeat handshake link. | 2017-11-30 |
20170346681 | INCREMENTALLY MANAGING DISTRIBUTED CONFIGURATION DATA - A configuration management system provides a partitioned data model for collecting and representing configuration information from a diverse set of sources to allow easier modeling of very large, highly redundant sets of enterprise configuration information. The system partitions large configuration schema into logical subcomponents that can be combined, shared, and reused. The system also partitions instantiated data models into logical sub-models that can be combined, shared, reused, and incrementally updated. Each product team can provide its own configuration schema, which allows the domain experts in a particular field to provide reusable models for their products. These models may include sub-models that allow reuse of selected portions of the configuration schema. When the system stores data related to each portion of the model, it stores the data in a partitioned manner that makes incremental updates of each component of the model more straightforward and less resource intensive. | 2017-11-30 |
20170346682 | Upgrading of a Mobile Network Function - A traffic handling decision method, a network entity, a computer readable medium, and a traffic handling decision apparatus relate to upgrading a network service function within a mobile communication network. In this context the traffic handling decision apparatus distributes incoming request of the control plane to instances implementing the mobile network function either according to the current software version or an upgraded software version. | 2017-11-30 |
20170346683 | Automated Generation of Deployment Workflows for Cloud Platforms Based on Logical Stacks - A method implemented in a data center management node including obtaining, from memory, a physical stack describing a configuration of platform components across multiple operating platforms on a data center infrastructure, generating, by a processor, a graph describing correlations between the operating platforms and the data center infrastructure based on a platform library, wherein the platform library describes configurations of the platform components for each of the operating platforms separately, generating, by the processor, one or more logical stacks based on the graph, wherein the one or more logical stacks indicate deployable configurations of the operating platforms without depicting the platform components, and representing the logic stack to a user. | 2017-11-30 |
20170346684 | CONFIGURING SYSTEM RESOURCES FOR DIFFERENT REFERENCE ARCHITECTURES - A specification of an intent that identifies a desired service and a reference architecture is received. The desired service is rendered to provide instructions for dispatch to a plurality of devices having roles. Rendering the desired service includes invoking a service rendering program function based on the reference architecture and a role of a specific device. A new reference architecture may be implemented by specifying a new service rendering program function for the new reference architecture. | 2017-11-30 |
20170346685 | METHOD AND APPARATUS FOR CONFIGURATION UPLINK AND DOWNLINK CARRIERS - Embodiments of the present disclosure provide a method and an apparatus for configuring uplink and downlink carriers. In the embodiments of the present disclosure, the UE determines according to received uplink and downlink carrier configuration signaling, the pairing between the uplink and downlink carriers, and/or a timing reference downlink carrier for the uplink, and/or a pathloss reference cell for the uplink. Thus, the uplink and downlink carriers may be configured more flexibly. Further, through the configuration of the reference downlink carrier for the uplink timing and the uplink power control, the carrier aggregation performance and that on the unlicensed band may be supported more effectively, so as to improve the performance of the LTE system. | 2017-11-30 |
20170346686 | SUBNET STRETCHING VIA LAYER THREE COMMUNICATIONS - Systems and methods for stretching a subnet that do not require level 2 (L2) communications to be handled are provided. A user may gradually migrate VMs or applications instead of migrating an entire subnet at one time, may fail-over specific VMs without failing-over an entire subnet or renumbering IP addresses, may deploy applications to the cloud without the need to create a VPN, or may enable hybrid network connectivity without modifying routes or (re)configuring edge routers, among other benefits. The domains over which the subnet are stretched include a virtual gateway which is associated with the layer- | 2017-11-30 |
20170346687 | Self-Configuring Computer Network Router - A self-configuring router includes a resource allocator that automatically assigns processors to queues, such that queue workload is distributed as evenly as possible among the processors, and the processors are as fully utilized as possible. Consequently, packets do not remain on queues longer than necessary, thereby decreasing latency of packets traversing the router, and available and expensive resources, namely the processors, are kept busy. The router automatically allocates its own resources (processors) to its own queues. | 2017-11-30 |
20170346688 | Installation Devices for Connecting Pool or Spa Devices to a Local Area Network - An installation device for connecting a pool device or spa device to a local area network comprises at least one memory device configured to store a configuration file. The installation device configures a wireless access point or wireless router to enable a host device to connect to the local area network. The installation device is further configured to send the configuration file to the wireless access point or wireless router through the host device. The configuration file includes data to configure the wireless access point or wireless router in order to enable a pool device or, spa device to connect to the local area network. | 2017-11-30 |
20170346689 | USING VIRTUAL NETWORKING DEVICES AND ROUTING INFORMATION TO ASSOCIATE NETWORK ADDRESSES WITH COMPUTING NODES - Techniques are described for providing managed virtual computer networks that have a configured logical network topology with virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the virtual networking devices if they were physically present. In some situations, the networking functionality provided for a managed computer network of a client includes receiving routing communications directed to the virtual networking devices and using included routing information to update the configuration of the managed computer network, such as to allow at least some computing nodes of a managed computer network to dynamically signal particular types of uses of one or more indicated target network addresses and/or to dynamically signal use of particular external public network addresses based on such routing information. | 2017-11-30 |
20170346690 | METHODS, SYSTEMS AND APPARATUS TO IMPROVE CLUSTER EFFICIENCY - Methods, apparatus, systems and articles of manufacture are disclosed to improve cluster efficiency. An example apparatus includes a cluster manager to identify cluster resource details to execute a workload, a workload manager to parse the workload to identify services to be executed by cluster resources, and an optimization formula manager to identify service optimization formulas associated with respective ones of the identified services, and improve cluster resource efficiency by generating a cluster formula configuration to calculate cluster parameter values for the cluster resources. | 2017-11-30 |
20170346691 | NETWORK TOPOLOGY OPTIMIZATION - Methods and systems for generating a network topology that satisfies one or more service requirements under one or more constraints. The method comprises generating a set of candidate network topologies from a set of network resources, evaluating each of the candidate network topologies based on one or more constraints and one or more service requirements, and determining if a stop condition is satisfied. If the stop condition is not satisfied then the set of candidate network topologies is updated. If, however, the stop condition is satisfied then the best candidate network topology based on the evaluation is selected as the network topology. | 2017-11-30 |
20170346692 | CONFIGURING DEVICES USING DEVICE MANAGEMENT TEMPLATES - Tools are provided to enable a service technician or administrator to apply settings, via a mobile terminal, from configuration templates to a device, particularly when the device is accessible through a network. Such configuration templates may be obtained or downloaded to the mobile terminal from a device management server on a regular basis or as needed or on demand. | 2017-11-30 |
20170346693 | METHOD AND SYSTEM FOR EFFICIENT DISTRIBUTION OF CONFIGURATION DATA UTILIZING PERMISSIONED BLOCKCHAIN TECHNOLOGY - A method for propagating configuration data using a blockchain includes: storing a blockchain comprised of a plurality of blocks, each being comprised of a block header having a timestamp and one or more configuration transactions; receiving one or more configuration data items; generating a new configuration transaction for each configuration data item; hashing a most recent block identified based on the timestamp included in the respective block header to generate a previous block hash value; hashing a combination of the new configuration transactions and/or data associated therewith to generate a current block hash value; generating a new block header, the new block header including a current timestamp, the previous block hash value, the current block hash value, and a digital signature; generating a new block comprised of the new block header and each new configuration transaction; and updating the blockchain by appending the new block. | 2017-11-30 |
20170346694 | PROVIDING BACKUP AND RESTORE SERVICES TO NETWORK ATTACHED APPLIANCES IN A NETWORK - Provided are a computer program product, system, and method for providing backup and restore services to network attached appliances in a network. Configuration settings comprising configuration settings used in a network attached appliance are gathered and a unique identifier for the network attached appliance is determined. A backup request is generated including the configuration settings, the unique identifier, and a backup operation code. The backup request is broadcasted on the network to be received by the backup servers to store the configuration settings for the unique identifier. | 2017-11-30 |
20170346695 | DATA TRANSMISSION METHOD AND DEVICE - Provided are a data transmission method and device. The method includes that: N second-type nodes are grouped to form a third-type node, N being a positive integer more than or equal to 2; and data is transmitted in a network formed by the second-type nodes, the third-type node and a first-type node. | 2017-11-30 |
20170346696 | TECHNIQUES FOR CLOUD CONTROL AND MANAGEMENT - Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network. | 2017-11-30 |
20170346697 | SYSTEM AND METHOD FOR EFFICIENT BANDWIDTH ALLOCATION FOR FORKED COMMUNICATION SESSIONS - A request for a communication session is received. For example, a request to establish a voice communication session is received. The system determines whether the request for the communication session is to be forked to a plurality of communication endpoints. If the communication session is to be forked, a highest bandwidth requirement for the forked communication session is determined. The highest bandwidth requirement for the forked communication session is based on a highest bandwidth requirement of one or more codecs in the request for the communication session. The highest bandwidth requirement for the forked communication session is allocated so that the forked communication session can be established. | 2017-11-30 |
20170346698 | DETERMINING BANDWIDTH REQUIREMENTS FOR NETWORK SERVICES - Methods and systems for identifying the amount of a network's traffic that is attributable to each service running over the network. The method comprises generating a set of candidate demand vectors (each candidate demand vector comprising a predicted bandwidth value for each service) from the topology of the network, bandwidth utilization information for the network and routing information for the network; evaluating each of the candidate demand vectors against the bandwidth utilization information; and, determining if a stop condition is satisfied. If the stop condition is not satisfied then the set of candidate demand vectors is evolved. If, however, the stop condition is satisfied then the best candidate demand vector based on the evaluation is selected and output as the demand vector for the services. | 2017-11-30 |
20170346699 | METHOD AND APPARATUS FOR PREDICTING STORAGE DISTANCE - A system for answering queries ( | 2017-11-30 |
20170346700 | OVERLAY NETWORK MOVEMENT OPERATIONS - A method includes associating overlay network attributes (ONAs) with virtual networks. A movement operation is performed that includes re-assigning the virtual networks to servers of overlay networks based on management of the ONAs. | 2017-11-30 |
20170346701 | TELECOMMUNICATIONS NETWORK PLANNING - A method of simulating a scenario in a telecommunications network is provided. The method comprises: generating a network definition expressed in a common data model readable by first and second routing engines; generating a set of demand matrices describing demands on the network; incorporating a scenario definition into one or more of the network definition and the demand matrices; automatically determining a first aspect of a new network state associated with the scenario definition by determining a first optimised set of routes using the first routing engine based on the network definition and at least one of the demand matrices; and automatically determining a second aspect of the new network state by determining a second optimised set of routes using the second routing engine based on the first optimised set of routes and at least one other of the demand matrices. | 2017-11-30 |
20170346702 | COMPUTER IMPLEMENTED METHOD FOR DISPLAYING A USER INTERFACE - A computer implemented method for displaying a user interface in a monitoring system for monitoring a number of slave devices in a network by a master device includes the steps of: writing software code for monitoring a number of slave devices in a network; defining at least one display template with a number of data fields in the software code; compiling the software code including the defined display template; running the compiled software code; and while running the compiled software code on the master device, performing the steps of: selecting a slave device by a user from a list of slave devices connected to the network; loading and parsing a data file for the selected slave device; activating at least one of the data fields in the at least one display template depending on the parsed data file; and reading data from the selected device. | 2017-11-30 |
20170346703 | MONITORING NETWORK MANAGEMENT ACTIVITY - A device is configured to receive, from a network device, a first message associated with a network management activity performed by using an application of the network device. The device is further configured to determine whether the first message satisfies a criterion, and to classify the first message based on a type of the application when the first message satisfies the criterion. The device is also configured to receive, from the network device, a second message associated with the network management activity; to correlate the second message with the first message after classifying the first message; and to create a record for the network management activity based on the first message and the second message by using rules associated with the type of the application. | 2017-11-30 |
20170346704 | METHOD FOR CONTROLLING ON-DEMAND SERVICE PROVISIONING - The disclosure relates to a computer-implemented method for controlling on-demand service provisioning in a network, wherein the network comprises resources for providing a service. In the method, a service request is intercepted. At least one network function, indicated as a first network function, required for the service associated with the service request is determined. Then, the first network function is instantiated on a resource in the network for executing the service in the network. | 2017-11-30 |
20170346705 | MEASUREMENT COORDINATION IN COMMUNICATIONS - A method comprises analysing ( | 2017-11-30 |
20170346706 | INFRASTRUCTURE TESTING - Provided are examples of apparatus and methods which relate to infrastructure testing, such as end-to-end reliability testing of a network deployed across one or more clouds in a cloud computing system. In an example method, a machine-executable order describing a computing network is received at a platform management device. The computing network can include a plurality of provisioned computing resources. The platform management device can be configured to manage a plurality of disparate platforms of pooled computing resources, such as disparate clouds in the cloud computing system. The computing network is deployed by executing the machine-executable order. At least one function of each provisioned computing resource in the plurality of provisioned computing resources can be tested. The testing can include transmitting one or more calls to a respective application program interface of each provisioned computing resource in the plurality of provisioned computing resources. The computing network can be decommissioned thereafter. | 2017-11-30 |
20170346707 | Detecting Source Network Address Translation in a Communication System - Two nodes in a communication system exchange link monitoring protocol messages including special metadata that allows each node to determine the status of source NAT on communication links to and from the other node, e.g., if source NAT is present on the communication link, or if there is a change in source NAT configuration (e.g., from enabled to disabled, from disabled to enabled, or from one translation to another translation). The special metadata also allows true source information (e.g., source address and source port number) to be conveyed between nodes even in the presence of source NAT, because the source NAT device does not change the metadata in the message because the metadata is considered to be part of the message payload. In certain exemplary embodiments, knowledge regarding the presence of source NAT devices as well as the true source information conveyed through the source NAT devices via the special metadata can be used in the context of “stateful” routing. | 2017-11-30 |
20170346708 | CHANNEL QUALITY ASSESSMENT FOR A DATA LINK GROUP - A device for wireless communication includes a receiver configured to receive first usage data of a channel of a data link group. The first usage data is received from a device of the data link group and is associated with a time period. The device also includes a processor configured to determine second usage data of the channel that is associated with the time period and to determine an unusable channel time value of the channel based on the first usage data and the second usage data. | 2017-11-30 |
20170346709 | Link Status Monitoring Based on Packet Loss Detection - In exemplary embodiments of the present invention, special metadata is added to link monitoring protocol messages exchanged by pairs of adjacent nodes to allow such nodes to detect communication link failures and determine whether the failure affects an incoming communication link or an outgoing communication link. The link monitoring protocol messages may be augmented BFD messages. | 2017-11-30 |
20170346710 | SYSTEM FOR MONITORING RESOURCE UTILIZATION AND ELECTRONIC VALIDATION - A system for monitoring resource utilization and electronic validation includes an entity system having a network communication interface and a memory device storing a resource monitoring and utilization application and a resource application. A processing device is operatively coupled to the memory device, wherein the processing device is configured to execute computer-readable program code to: determine based on the utilization of the resource application to initiate the resource monitoring and utilization application; initiate the resource monitoring and utilization application; and transmit an electronic validation that a transaction executed by the resource application is complete. | 2017-11-30 |
20170346711 | SYSTEM FOR MONITORING RESOURCE UTILIZATION AND RESOURCE OPTIMIZATION - A system for monitoring resource utilization and optimization includes an entity system having a network communication interface and a memory device storing a resource monitoring and utilization application and a resource application. A processing device is operatively coupled to the memory device, wherein the processing device is configured to execute computer-readable program code to: determine based on the utilization of a resource application and/or a physical transaction related to the resource application to initiate the resource monitoring and utilization application; initiate the resource monitoring and utilization application to transmit information about the resource application to a user device. | 2017-11-30 |
20170346712 | COORDINATION OF SERVING ACCESS NODES IN SERVING CLUSTER - A method in a Serving Access Node (SAN) for coordinating with a number of other SANs within a terminal device-specific serving cluster to which the SAN belongs. The method comprises determining an assignment of a communication direction to a timeslot. The assignment of the communication direction to the timeslot is common to all SANs in the serving cluster. The method further comprises transmitting or receiving at least one test beam in the communication direction during the timeslot. Correspondingly, a SAN is disclosed in which the method is implemented. | 2017-11-30 |
20170346713 | METHODS AND APPARATUS TO CREDIT BACKGROUND APPLICATIONS - Methods, apparatus and computer readable storage medium are disclosed to monitor media exposure. Examples disclosed herein compare bandwidth usage of a first media presentation application executing in a background of a consumer device to a first threshold for bandwidth activity to determine if the first media presentation application is one of active or inactive, the first threshold based on a first bandwidth usage pattern of the first media presentation application. Examples disclosed herein determine a state of a second media presentation application executing in a foreground of the consumer device during the first time period as one of active or inactive based on whether a special event associated with the second media presentation application is detected. Examples disclosed herein log and report application event information including an identification of the first and second media presentation applications, a context of the first and second media presentation applications, and the state of the first and second media presentation applications. | 2017-11-30 |
20170346714 | Time-Multiplexed Fields for Network Telemetry - A first network device forwards a plurality of packets to the one or more network ports for transmission to a second network device, wherein ones of the packets include a field for indicating different, independent types of information. A field populator is configured to, for each of at least some packets among the plurality of packets: determine, from a set of different, independent types of information, a type of information to be included in the field of the packet according to a schedule known by the second network device, and populate the field in the packet only with data according to the type of information determined according to the schedule. | 2017-11-30 |
20170346715 | Distributed Procedure for Breadth-First Graph Traversal on Asymmetric Communication Topologies - The breadth-first search (BFS) starts with a root node. In the first stage, all neighbors of the root node are discovered and added to the nodes frontier. In the following stages, unvisited nodes from the neighbors of the frontier nodes are discovered and added to the frontier. To improve the parallelization of the BFS, the bottom-up search iterates over all unvisited nodes, where each unvisited node searches for its visited neighbors. Communication between nodes and clusters is pipelined with the execution of the BFS. | 2017-11-30 |
20170346716 | METHOD FOR ACQUIRING, BY SDN SWITCH, EXACT FLOW ENTRY, AND SDN SWITCH, CONTROLLER, AND SYSTEM - Embodiments disclose a method for acquiring, by a switch deployed in a software defined network (SDN), an exact flow entry, where the SDN network includes an SDN controller and multiple SDN switches, the SDN controller being configured to communicate with each SDN switch in an inband communication manner. The method includes establishing, by a first SDN switch, a reliable connection to the SDN controller, and sending a first control message based on a packet corresponding to a protocol for the reliable connection. Path information of the first SDN switch is added to the control message. Each SDN switch that receives the first control message adds path information of each SDN switch to the first control message, so that the SDN controller is provided with an entire path, so as to deliver a flow table to the first SDN switch. | 2017-11-30 |
20170346717 | METHOD AND APPARATUS FOR LEARNING MAC ADDRESS OF TRILL NETWORK - The present disclosure provides a method and apparatus for learning a MAC address of a TRILL network. The method comprises: learning, by a routing bridge connected to an end system, a MAC address of the end system; encapsulating the MAC address in a link-state packet, sending the link-state packet to a neighbor routing bridge; after the neighbor routing bridge receives the link-state packet, judging whether the MAC address in the link-state packet is locally present; if not, learning the MAC address in the link-state packet and setting a local confidence to a confidence of the MAC address in the link-state packet; if yes, updating a confidence of a local MAC address to the confidence of the MAC address in the link-state packet, increasing the confidence of the MAC address in the link-state packet by 1, and sending the link-state packet to all neighbor routing bridges except a receiving end. | 2017-11-30 |
20170346718 | ENFORCING STRICT SHORTEST PATH FORWARDING USING STRICT SEGMENT IDENTIFIERS - Various systems and methods for using strict path forwarding. For example, one method involves receiving an advertisement at a node. The advertisement includes a segment identifier (SID). In response to receiving the advertisement, the node determines whether the SID is a strict SID or not. If the SID is a strict SID, the node generates information, such as forwarding information, that indicates how to forward packets along a strict shortest path corresponding to the strict SID. | 2017-11-30 |
20170346719 | SHORTEST PATH SEARCH WITH CONSTRAINTS IN NETWORKS - Methods and systems are provided for determining a shortest path with a constraint in an optical network. The method includes identifying a permitted number of events defined by the constraint. The method further includes creating virtual nodes for each node in the optical network, the virtual nodes corresponding with the permitted number of events. The method also includes traversing the virtual nodes from a source node to a destination node with a shortest path algorithm, wherein traversing the virtual nodes comprises creating virtual links between the virtual nodes when the constraint is not violated, the virtual link corresponding with a physical link; and identifying a shortest path between the source node and the destination node from the virtual links, the shortest path not violating the constraint. | 2017-11-30 |
20170346720 | PATH COMPUTATION IN A SEGMENT ROUTING NETWORK - A method of path computation in a segment routing network, the network comprising a set of nodes. The method comprises receiving a request for computation of a path between end nodes in the network, the request including a constraint. The method further comprises determining a segment identifier-optimised path defined by a stack of one or more segment identifiers, wherein the segment identifier-optimised path meets the constraint. The determining of the segment identifier-optimised path comprises analyzing a topology of the network comprising: at least a sub-set of the nodes, links between adjacent nodes indicative of possible paths between the nodes, and virtual links between pairs of nodes indicative of possible paths between the pairs of nodes. The method further comprises outputting at least one segment identifier which defines the determined path. | 2017-11-30 |
20170346721 | BIDIRECTIONAL MULTICASTING OVER VIRTUAL PORT CHANNEL - Aspects of the subject technology relate to systems for arbitrating direct forwarder (“DF”) instantiation between VPC peers used to facilitating the transport of bidirectional multicast traffic over a L2/L3 network boundary. In some aspects, arbitration of DF instantiation on a given VPC peer can include determining a first set of metrics for a first VPC switch, determining a second set of metrics for a second VPC switch, and determining, at the first VPC switch, whether to instantiate a designated forwarder (DF) operation based on a comparison of the first set of metrics and the second set of metrics. Methods and machine-readable media are also provided. | 2017-11-30 |
20170346722 | ROUTE SELECTION SYSTEM FOR A COMMUNICATION NETWORK AND METHOD OF OPERATING THE SAME - A route selection system includes a hub controller in communication with multiple network hubs of a first network domain in which each of the hubs are in communication with a corresponding multiple routers of a second network domain. The hub controller is executed to obtain at least one performance measurement associated with a route terminating at the network hub, generate a border gateway protocol (BGP) advertisement with a preference value that is proportional to the received performance measurement, and transmit the generated advertisement to the network hub, the network hub forwarding the advertisement to the router configured in the other network domain. Upon receipt of the advertisements, the second network domain selects one of the routers for processing the route through the second network domain according to the performance measurement included in the advertisement. | 2017-11-30 |
20170346723 | FABRIC DISCOVERY FOR A CLUSTER OF NODES - Implementations of discovery functionalities in accordance with the present invention are characterized by being exceptionally minimalistic. A primary reason and benefit for such minimalistic implementations relate to these discovery functionalities being implemented via a management processor and associated resources of a system on a chip (SoC) unit as opposed to them being implemented on data processing components of a cluster of nodes (i.e., central processing core components). By focusing on such a minimalist implementation, embodiments of the present invention allow discovery functionalities to be implemented on a relatively low-cost low-power management processor coupled to processing cores that provide for data serving functionality in the cluster of nodes. | 2017-11-30 |