49th week of 2021 patent applcation highlights part 70 |
Patent application number | Title | Published |
20210385069 | SYSTEM AND METHOD FOR SECURELY STORING AND SHARING INFORMATION - The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core mechanism consisting of the key masters, the registries and the cloud lockboxes with application programming interfaces providing interaction with a wide variety of user-facing software applications. Together the mechanism provides full lifecycle encryption enabling cross-platform sharing of encrypted data within and between organizations, individuals, applications and devices. Further the mechanism generates chains of encrypted blocks to provide a distributed indelible ledger and support external validation. Triangulation among users, applications and the mechanism deliver both enterprise and business ecosystem cyber security features. Crowdsourcing of anomaly detection extends to users and to subjects of the data. Robust identity masking offers the benefits of anonymization while retaining accountability and enabling two-way communications. The mechanism may also provide high availability through multi-level fail over or operations to multiple instances of the core mechanism. | 2021-12-09 |
20210385070 | KEY BROKER FOR A NETWORK MONITORING DEVICE, AND APPLICATIONS THEREOF - A key broker monitors network traffic metadata and determines which decryption keys are required at one or more packet brokers in order to decrypt relevant traffic required by various network monitoring devices. The key broker retrieves the required keys from a secure keystore distributes them, as needed, to the network packet brokers, and dynamically updates the decryption keys stored in the network packet brokers in response to changes in network traffic. | 2021-12-09 |
20210385071 | KEY BROKER FOR A NETWORK MONITORING DEVICE, AND APPLICATIONS THEREOF - A key broker monitors network traffic metadata and determines which decryption keys are required at one or more packet brokers in order to decrypt relevant traffic required by various network monitoring devices. The key broker retrieves the required keys from a secure keystore distributes them, as needed, to the network packet brokers, and dynamically updates the decryption keys stored in the network packet brokers in response to changes in network traffic. | 2021-12-09 |
20210385072 | ELECTRONIC DEVICE CAPABLE OF PROTECTING CONFIDENTIAL DATA - An electronic device includes a first non-volatile memory and an application circuit. The first non-volatile memory stores first encrypted data encrypted with a global key. The application circuit includes a second non-volatile memory, a decryption unit, a local key unit, and an encryption unit. The second non-volatile memory stores the global key. The decryption unit is coupled to the first non-volatile memory and the second non-volatile memory. The decryption unit retrieves the global key from the second non-volatile memory and decrypts the first encrypted data with the global key to generate plain data. The local key unit generates or stores a local key. The encryption unit is coupled to the local key unit. The encryption unit encrypts the plain data with the local key to generate second encrypted data and overwrites the first encrypted data in the first non-volatile memory with the second encrypted data. | 2021-12-09 |
20210385073 | AUTONOMOUS DRIVING CONTROLLER ENCRYPTED COMMUNICATIONS - An autonomous driving controller includes a plurality of parallel processors operating on common input data received from the plurality of autonomous driving sensors. Each of the plurality of parallel processors includes communication circuitry, a general processor, a security processor subsystem (SCS), and a safety subsystem (SMS). The communication circuitry supports communications between the plurality of parallel processors, including inter-processor communications between the general processors of the plurality of parallel processors, communications between the SCSs of the plurality of parallel processors using SCS cryptography, and communications between the SMSs of the plurality of parallel processors using SMS cryptography, the SMS cryptography differing from the SCS cryptography. The SCS and/or the SMS may each include dedicated hardware and/or memory to support the communications. | 2021-12-09 |
20210385074 | AUTHENTICATION-GAINING APPARATUS, AUTHENTICATION APPARATUS, AUTHENTICATION REQUEST TRANSMITTING METHOD, AUTHENTICATION METHOD, AND PROGRAM - An authentication-gaining apparatus includes: an acquiring unit that acquires unique information; an encrypting unit that encrypts the unique information using a cryptographic key, thereby generating encrypted information; and a transmitting unit that repeatedly transmits an authentication request containing the encrypted information, to an authentication apparatus, during an authentication period, wherein multiple authentication requests respectively containing encrypted information obtained by encrypting multiple pieces of unique information are transmitted during the authentication period. An authentication apparatus includes: a receiving unit that repeatedly receives an authentication request transmitted from an authentication-gaining apparatus, during an authentication period; a decrypting unit that decrypts the encrypted information, thereby acquiring decrypted information; an authentication unit that judges whether or not the authentication-gaining apparatus is legitimate, using multiple authentication requests received during the authentication period and containing encrypted information that has been decrypted; and an output unit that outputs a judgment result by the authentication unit. | 2021-12-09 |
20210385075 | EFFICIENT AUTHENTIC COMMUNICATION SYSTEM AND METHOD - A method is disclosed. The method comprises transmitting, by an access device to a communication device, a resource provider certificate and an access device certificate. Then, establishing a secure channel between the access device and the communication device using data from the resource provider certificate and the access device certificate. Then, transmitting to or receiving data from the communication device using the secure channel. | 2021-12-09 |
20210385076 | SYSTEMS, METHODS AND SOFTWARE FOR SECURE ACCESS CONTROL TO DIGITALLY STORED INFORMATION - Systems, methods, and software for secure access control to digitally stored information. Owners of digitally stored information enter access control data using a first graphical user interface (GUI) on a first device. Vault space is allocated in memory for receiving and storing the information remotely from the first device. A keyholder and a guardian identified by the access control data are associated with the information. A keyholder access request for the information is transmitted via a second GUI on a second device. Responsive to determining the keyholder to be associated with the information, a third device of a guardian receives a notification of the access request, and the guardian may use a third GUI to transmit an access authorization. The information may be transmitted to the second device upon determining that the guardian is associated with the information. | 2021-12-09 |
20210385077 | SECURE GROUP COMMUNICATION IN A CLUSTER OF DEVICES - The method is aimed at providing secure multicast communication between a plurality of devices forming a cluster of devices connected to one another by a local network. The method provides for electing a key distribution device and generating a group encryption key in said key distribution device. A secure communication channel is then established between the key distribution device and each device of a group of devices to be connected to the cluster. The group encryption key is transmitted from the key distribution device to the devices to be connected to the cluster and stored thereby. When all devices of the cluster have received the group encryption key, multicast communication among the devices of the cluster can start. | 2021-12-09 |
20210385078 | PHASE DECODING METHOD AND APPARATUS FOR QUANTUM KEY DISTRIBUTION, AND CORRESPONDING SYSTEM - A phase decoding method and apparatus for quantum key distribution based on reflection with an orthogonal rotation of polarization, and a corresponding system. The method comprises: splitting an input optical pulse of an arbitrary polarization state into two optical pulses by a beam splitter; and, transmitting the two optical pulses respectively along two optical paths, with a relative time delay applied to them, and then reflecting them back to the beam splitter respectively by two reflecting devices to be combined and output by the beam splitter. A phase modulation is performed on at least one of the two optical pulses according to a quantum key distribution protocol, and two orthogonal polarization states of the optical pulse are reflected with an orthogonal rotation of polarization, so that each orthogonal polarization state of the optical pulse, after being reflected by the corresponding reflecting device, is transformed to a polarization state orthogonal thereto. | 2021-12-09 |
20210385079 | SECURE KEY AGREEMENT WITH UNTRUSTED PARTIES - Traditional key generation methods in a noisy network often assume trusted devices and are thus vulnerable to many attacks including covert channels. The present invention differs from previous key generation schemes in that it presents a mechanism which allows secure key generation with untrusted devices in a noisy network with a prescribed access structure. | 2021-12-09 |
20210385080 | GENERATOR OF PHYSICALLY UNCLONABLE CRYPTOGRAPHIC KEYS - Generator of physically unclonable cryptographic keys (PUF) has two adjustable speed ring oscillators (GPRS, GPRS′), which outputs (o-GPRS, o-GPRS′) are connected to inputs (i | 2021-12-09 |
20210385081 | Key Generation Method Based On Deep Learning Generative Adversarial Network - A key generation method based on a deep learning generative adversarial network includes: preparing a training set image; construction of a key generation network: constructing the key generation network according to a generator network and a discriminator network, and inputting the training set image to the key generation network; and training of the key generation network: training the key generation network by a deep learning method to generate a key. | 2021-12-09 |
20210385082 | TPM-BASED DATA INTEGRITY - The present disclosure provides for a system ensuring the integrity of received data. The system includes a processor, a trusted platform module, and a memory storing instructions. Upon a request from the processor, the trusted platform module generates an asymmetric key pair including a private key and a public key. The trusted platform module provides the public key and an encrypted private key to the processor. The processor generates a checksum of received content data and sends the checksum to the trusted platform module. The processor also loads the encrypted private key into the trusted platform module. The trusted platform module decrypts the encrypted private key, encrypts the checksum with the private key, and provides the encrypted checksum to the processor. The processor sends the content data together with the encrypted checksum to an external device. The external device may decrypt the encrypted checksum with the public key. | 2021-12-09 |
20210385083 | Security Token Expiration Using Signing Key Rotation - A method for expiring tokens includes obtaining a list of valid key identifications (IDs) for at least one valid cryptographic key configured to sign authentication tokens. The method also includes receiving an authentication token from a client authenticating and authorizing the client to access a resource and comprising an ID of a cryptographic key used to sign the authentication token. The method also includes determining whether the cryptographic key used to sign the authentication token is valid based on the list of valid key IDs for the at least one valid cryptographic key. When the cryptographic key used to sign the authentication token is valid, the method includes allowing the client access to the resource. | 2021-12-09 |
20210385084 | MONITORING A MANUFACTURING PROCESS - The present disclosure relates to monitoring processes. A processor creates a numerical representation of a nominal operation of the process. The processor then encrypts the numerical representation using homomorphic encryption to determine an encrypted numerical representation that blocks access to the numerical representation but allows calculations on the numerical representations. The processor proceeds by creating smart contracts on a blockchain platform using the encrypted numerical representation as a first input to the calculations of the smart contract. Next, the processor attempts execution of the smart contract using the current operation of the process as a second input to the calculations of the smart contract. The execution of the smart contract generates an output result by performing the calculations on the encrypted numerical representations. Based on the output of the execution of the smart contract, the processor finally determines that the current operation is outside the nominal operation. | 2021-12-09 |
20210385085 | SYSTEMS AND METHODS FOR AUTHENTICATED CONTROL OF CONTENT DELIVERY - The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device. | 2021-12-09 |
20210385086 | SYSTEMS AND METHODS FOR DISTRIBUTED VERIFICATION OF ONLINE IDENTITY - At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties. | 2021-12-09 |
20210385087 | ZERO-KNOWLEDGE IDENTITY VERIFICATION IN A DISTRIBUTED COMPUTING SYSTEM - A request to identify a data value may be received via a network at a designated one of a plurality of identity nodes. A query that includes the data value may be transmitted to an identity service associated with the designated identity node. A response message from the identity service may include one or more designated network identifiers corresponding with the data value. The designated identity node may communicate with the plurality of identity nodes to identify a plurality of network identifiers corresponding with the data value. A trust ledger may be updated to include a correspondence between a selected one of the network identifiers and the data value. | 2021-12-09 |
20210385088 | NETWORK ACCESS METHOD, USER EQUIPMENT, NETWORK ENTITY, AND STORAGE MEDIUM - The present application discloses a method, device, and system for providing security credentials to access a non-public network. The method includes receiving, by a terminal, an identifier of a first network and corresponding encryption information. The first network includes a non-public network. The encryption information includes encrypted security credentials for the first network. The terminal receives the identifier of the first network and the corresponding encryption information from a second network that is different from the first network. The method further includes decrypting, by the terminal, the encryption information. The encryption information is decrypted based at least in part on default credentials corresponding to the identifier of the first network. The security credentials of the first network are obtained based at least in part on the decrypted encryption information. | 2021-12-09 |
20210385089 | AUTHENTICATING DEVICES OVER A PUBLIC COMMUNICATION NETWORK - Apparatus and method for authentication components of a public network are disclosed. A master compares an actual HMAC with an expected HMAC, determines that component fails authentication when the actual HMAC does not match the expected HMAC and causes at least one operation to be inhibited when component fails authentication for a preset number of times while the component is connected to the public network. The actual HMAC is determined by the component. The expected HMAC and actual HMAC are independently determined using the same process and using a key. The same key is stored, in advance, in both the master and the component and not transmitted. The master generates a random number and sends the same to the component. The expected HMAC and actual HMAC are determined using the random number input into a one-way hash function. | 2021-12-09 |
20210385090 | INTEGRITY PROTECTION SCHEMES IN MOBILE COMMUNICATION - This invention introduces methods and mechanisms of partial integrity protection in mobile systems. A device comprising: a memory configured to store instructions; and a processor configured to execute the instructions to: generate a representation value based on protocol data unit (PDU) header data and payload data of a PDU; generate a message authentication code based on the representation value; and include the message authentication code in the PDU. | 2021-12-09 |
20210385091 | BLOCKCHAIN DRIVEN EMBEDDED VIDEO AND DIGITAL SIGNATURES ON SIGNED DOCUMENTS - Systems, devices and methods are provided for blockchain driven embedded video and digital signatures on signed documents. The present disclosure includes providing a video conference initiated with the process of signing a document. The video conference and the signing process and the video are recorded. The recorded video captures all conversations, understanding and the final signing by participants. Both the signature and the recorded signing event in video conference are stored with a hash value as a blockchain. | 2021-12-09 |
20210385092 | SECURING ATTESTATION USING A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK - The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly. | 2021-12-09 |
20210385093 | DIGITAL SIGNATURE TERMINAL AND SECURE COMMUNICATION METHOD - A digital signature terminal device and a secure communication method are provided. The digital signature terminal includes a first module and a second module. The first module includes a communication component configured to communicate with outside and includes a central unit. The central unit includes a memory configured to store data received by the communication component. The central unit is configured to receive an operation from a user, and is controlled, in response to the operation from the user, to be simultaneously connected to the second module and disconnected from the communication component or to be simultaneously disconnected from the second module and connected to the communication component. The second module includes a signature component configured to generate a digital signature for the data, and the second module is configured to send the digital signature to the memory. | 2021-12-09 |
20210385094 | PHYSICAL UNCLONABLE FUNCTION BASED TRUE RANDOM NUMBER GENERATOR, METHOD FOR GENERATING TRUE RANDOM NUMBERS, AND ASSOCIATED ELECTRONIC DEVICE - A Physical Unclonable Function (PUF) based true random number generator (TRNG), a method for generating true random numbers, and an associated electronic device are provided. The PUF based TRNG may include a first obfuscation circuit, a cryptography circuit coupled to the first obfuscation circuit, and a second obfuscation circuit coupled to the cryptography circuit. The first obfuscation circuit obtains a first PUF value from a PUF pool of the electronic device, and performs a first obfuscation function on a preliminary seed based on the first PUF value to generate a final seed. The cryptography circuit utilizes the final seed as a key of a cryptography function to generate preliminary random numbers. The second obfuscation circuit obtains a second PUF value from the PUF pool, and performs a second obfuscation function on the preliminary random numbers based on the second PUF value to generate final random numbers. | 2021-12-09 |
20210385095 | ETHERNET OVER BASIC INTERFACE BETWEEN ELECTRIC VEHICLE SUPPLY EQUIPMENT AND ELECTRIC VEHICLES - A communications interface between electric vehicle supply equipment and an electric vehicle includes: a first connection for connecting to a controller of the electric vehicle supply equipment; a second connection for connecting to a controller of the electric vehicle; and an Ethernet interface coupling the first and second connections for communication between the controller of the electric vehicle supply equipment and the controller of the electric vehicle. | 2021-12-09 |
20210385096 | METERING CLOUD WORKLOADS AT EDGE COMPUTING DEVICES - A system meters execution of an application module at an edge computing device. A secure workload package is transmitted securely from a workload provisioning service to the edge computing device. The secure workload package includes the application module, a trusted metering application, and a provisioning service authentication token. The provisioning service authentication token is verified in the secure workload package based on an edge device authentication token generated at the edge computing device. The trusted metering application is executed in a trusted execution environment of the edge computing device, responsive to verifying the provisioning service authentication token. The application module of the edge computing device is executed, wherein the trusted metering application is configured to monitor execution metrics of the application module on the edge computing device. The execution of the application module is managed based on the monitored execution metrics. | 2021-12-09 |
20210385097 | WORKFLOW AUTOMATION USING NEAR-FIELD COMMUNICATION - Disclosed are various approaches for initiating workflows with respect to physical resource devices on behalf of a user. A physical identifier can be affixed to a physical resource device. An identifier can be embedded within the physical identifier. A workflow application can initiate workflows upon detecting that a user has scanned or captured the identifier. | 2021-12-09 |
20210385098 | RESPONSIVE COMMUNICATION SYSTEM - A spoken communication system and method of communicating spoken communication, includes a server and at least one communication device that are in digital communication with each other over the Internet via a communication channel. The at least one communication device receives spoken communication and digitally communicate the spoken communication to the server. The spoken communication is isolated from interception on the Internet by deleting the spoken communication from the at least one communication device after digitally communicating the spoken communication to the server and deleting the spoken communication from storage on the server. Also, privacy is ensured to a user by avoiding building a database of user's habits or characteristics from the spoken communication. | 2021-12-09 |
20210385099 | USER ACCOUNT TELEMETRY WITHIN A COMMUNICATION PLATFORM - Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products for discovery of individual profile telemetry within a communication platform. The individual profile telemetry may represent an amount and/or frequency of communications between a user and one or more other users of the communication platform. In some examples, the individual profile telemetry may represent an amount of interactions the user has with an object of the communication platform, such as a communication channel, a communication transmitted via the communication channel, a direct messaging instance, or the like. The communication platform may determine the amount and/or frequency of interactions and provide an indication thereof to the user via an interface associated with the communication platform. | 2021-12-09 |
20210385100 | DIRECTED BROADCAST IN NETWORK FABRIC - This technology enables directed broadcasts in network fabrics. To enable a directed broadcast, a control plane node is configured to resolve directed broadcast addresses by mapping the directed broadcast address to a subnet address associated with the network fabric. A fabric border node receives a directed broadcast, extracts a destination address associated with the directed broadcast, and transmits a request to the control plane node to resolve the destination address. The control plane node retrieves the stored mapping and generates a map reply to the fabric border node with a multicast destination comprising the network fabric subnet address. The fabric border node encapsulates the directed broadcast with a header comprising the multicast destination and forwards the encapsulated directed broadcast to fabric edge nodes, which decapsulate the directed broadcast and deliver a data set from the directed broadcast to appropriate end point devices. | 2021-12-09 |
20210385101 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus is provided including: a control unit that controls transition of a providing subject that provides a function to a user, between devices, in which in a case where the transition of the providing subject is executed, the control unit causes a transition source device that is a transition source of the providing subject to dynamically output transition information indicating a situation of the transition. Furthermore, an information processing method is provided including: controlling transition of a providing subject that provides a function to a user, between devices, by a processor, in which the controlling further includes causing a transition source device that is a transition source of the providing subject to dynamically output transition information indicating a situation of the transition in a case where the transition of the providing subject is executed. | 2021-12-09 |
20210385102 | ELECTRONIC APPARATUS, SYSTEM AND METHOD FOR PROVIDING SERVICE BASED ON INTERNET OF THINGS - Provided are an electronic apparatus and a method thereof. The electronic apparatus forming an internet of things (IoT) environment includes a communicator, and a processor to, from among a plurality of electronic apparatuses forming the IoT environment, identify a first electronic apparatus that is capable of performing a first sub-service among a plurality of sub-services to provide a service, control the communicator to transmit, to the first electronic apparatus, information on a first application for performing the first sub-service that is received from a server, receive, from the server, a second application for performing a second sub-service which the electronic apparatus is capable of performing, among the plurality of sub-services, through the communicator, and perform the second sub-service through the received second application to provide the service in association with the first electronic apparatus that performs the first sub-service based on information on the first application. | 2021-12-09 |
20210385103 | APPLIANCE CONTROL SYSTEM AND SERVER - Based on home appliance information, network communication device identification information, and usage condition information of a home electric appliance, the server selects software for the network communication device corresponding to a home electric appliance from among a multiple pieces of software having a one-to-one relation with different types of a plurality of home electric appliances stored in a server storage unit, and transmits the software to the network communication device, the home appliance information being information with which the home electric appliance is identifiable, the network communication device identification information being information with which the network communication device is uniquely identifiable, the usage condition information being information on a usage environment and a usage function of the home electric appliance. The network communication device updates the software for the network communication device stored in the network communication device with the software transmitted from the server. | 2021-12-09 |
20210385104 | DOORBELL COMMUNICATION SYSTEMS AND METHODS - Doorbells often include a button to enable visitors to ring a chime to summon building occupants. In some embodiments, doorbells include a camera to take pictures of visitors. In several embodiments, doorbells include covers that are light filters. These light filters can cover infrared light sources such as infrared light emitting diodes. The light filters can pass infrared light while blocking visible light. In several embodiments, a front portion of a camera assembly fits through a hole in a light filter. Light filters can help secure camera assemblies and can form a portion of a doorbell's outer housing. | 2021-12-09 |
20210385105 | APPLIANCE NETWORK WITH MESSAGING - An appliance, communication system, and method thereof for a communicating on a network including an appliance interactive display coupled to an appliance communication module. The appliance communication module is configured to receive a message having an embedded interactive element configured to operate a functionality of the appliance embedded into the message. A return message is sent that relates to a post-cycle of operation of the embedded interactive element | 2021-12-09 |
20210385106 | INTEGRATION OF KNOB SENSORS IN MONITORING SYSTEMS - Techniques are described for using information from a knob sensor of an appliance in a property monitoring system. In some implementations, a monitoring system may be configured to receive sensor information from a knob, receive monitoring device information from a monitoring device and, based on the sensor information from the knob, identify a knob event. The monitoring system may integrate the knob event with the monitoring device information and analyze the integrated knob event and monitoring device information against one or more rules related to usage of the appliance in view of the state of the property. Based on analyzing the integrated knob event and monitoring device information, the monitoring system may determine whether to perform an action, such as notifying a user or activating an appliance. | 2021-12-09 |
20210385107 | SYSTEM AND METHOD FOR FULL-DUPLEX MEDIA ACCESS CONTROL USING REQUEST-TO-SEND SIGNALING - Full-duplex communications are provided by modifying the Media Access Control sub-layer of communication node protocols. The modification allows communication nodes to communicate with one another in full-duplex, where each node transmits and receives data simultaneously with other nodes in a single frequency. A timing of the simultaneous data transmissions, acknowledgments, and short-interframe-space waiting periods can be determined based on network-allocation-vector data transmitted in association with request-to-send or clear-to-send signals. | 2021-12-09 |
20210385108 | SYNCHRONIZATION OF ELEMENTS IN A NETWORK - A network-synchronization device may include a match filter. The match filter may be configured to generate events for synchronizing operation of elements of a network at least partially responsive to timing frames generated at a network switch. The events for synchronizing operation of the elements may include a first event generated at least partially responsive to first information associated with a first element and a second event generated at least partially responsive to second information associated with a second element. Related systems and methods are also disclosed. | 2021-12-09 |
20210385109 | METHOD AND APPARATUS FOR CHANNEL ESTIMATION FOR THREE-PHASE PLC SYSTEMS - A method and apparatus for channel estimation for a three-phase communication system. In one embodiment, the method comprises generating a first plurality of preamble patterns for use in a first data stream of two independent data streams; generating a second plurality of preamble patterns for use in a second data stream of the two independent data streams; transmitting the first and the second data streams via a communications channel comprising a three-wire three-phase system; receiving a version of the first data stream comprising the first plurality of preamble patterns and a version of the second data stream comprising the second plurality of preamble patterns; and generating, based on the received version of the first plurality of preamble patterns and the received version of the second plurality of preamble patterns, a channel estimation matrix for estimating the imbalance of the communications channel. | 2021-12-09 |
20210385110 | COMMUNICATION DEVICE, CONTROL METHOD OF COMMUNICATION DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM - A communication device communicates a physical (PHY) frame including a preamble and a data field. The preamble includes a Legacy Short Training Field (L-STF), a Legacy Long Training Field (L-LTF), a Legacy Signal Field (L-SIG), an EHT Signal Field (EHT-SIG-A), an EHT Signal Field (EHT-SIG-B), an EHT Short Training Field (EHT-STF), and an EHT Long Training Field (EHT-LTF), and the EHT-SIG-B includes a subfield indicating the number of spatial streams allocated to each of not less than one other communication device that communicates with the communication device, and the sum of the numbers of spatial streams is larger than 8. | 2021-12-09 |
20210385111 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - A communication device communicates a physical (PHY) frame including a preamble and a data field. The preamble includes a Legacy Short Training Field (L-STF), a Legacy Long Training Field (L-LTF), a Legacy Signal Field (L-SIG), an EHT (Extremely High Throughput) Signal Field (EHT-SIG-A), an EHT Short Training Field (EHT-STF), and an EHT Long Training Field (EHT-LTF), and the EHT-SIG-A includes at least one subfield indicating that the communication device performs communication in a frequency band more than 160 MHz. | 2021-12-09 |
20210385112 | COMMUNICATION DEVICE, COMMUNICATION METHOD THEREOF, INFORMATION PROCESSING DEVICE, CONTROL METHOD THEREOF, AND COMPUTER-READABLE STORAGE MEDIUM - A communication device communicates a radio frame including a preamble and a data field of a physical layer (PHY). The preamble includes an L-STF (Legacy Short Training Field), an L-LTF (Legacy Long Training Field), an L-SIG (Legacy Signal Field), an EHT-SIG-A (Extremely High Throughput Signal A Field), an EHT-STF, and an EHT-LTF, and the EHT-SIG-A includes a field indicating a standard that the radio frame complies with. | 2021-12-09 |
20210385113 | REFERENCE SIGNAL TRANSMISSION METHOD, APPARATUS, AND SYSTEM - Embodiments of the present invention disclose a reference signal transmission method, including: sending, by a terminal, a first reference signal and a second reference signal; and correspondingly, receiving, by a network device, the first reference signal and the second reference signal, where the first reference signal is mapped to a plurality of symbols and is used for estimation of channel state information, the second reference signal is mapped to at least two of the plurality of symbols and is used for phase tracking, and a subcarrier to which the second reference signal is mapped on one of the at least two symbols has a same frequency-domain location as a subcarrier to which the second reference signal is mapped on the rest of the at least two symbols. With the foregoing solution, accuracy of channel state information estimation can be improved. | 2021-12-09 |
20210385114 | ASK MODULATION - In accordance with some embodiments of the present invention, a wireless power receiver that ramps an ASK impedance is presented. A method of amplitude shift key (ASK) modulation in a wireless power receiver includes initiating transition of an ASK impedance from a first state to a second state, the ASK impedance being coupled to a resonant circuit that includes a wireless power receive coil that receives a time-varying magnetic field; transitioning the ASK impedance from the first state to the second state according to the transition over a plurality of switching cycles of the time-varying magnetic field; and holding the second state. | 2021-12-09 |
20210385115 | WIRELESS COMMUNICATION DEVICE - One example discloses an IEEE 802.11 compliant wireless communications device, including: a processor configured to generate a hybrid-physical protocol data unit (hybrid-PPDU) that includes a set of sub-PPDUs; a first sub-PPDU in the set of sub-PPDUs includes a first preamble portion and a first data payload portion; a second sub-PPDU in the set of sub-PPDUs includes a second preamble portion and a second data payload portion; wherein an OFDMA communications signal includes a set of symbol tones divided into a set of resource units (RUs); wherein the processor is configured to map the first sub-PPDU to a first RU within the set of RUs, and map the second sub-PPDU to a second RU within the set of RUs; and wherein the first preamble portion corresponds to a first 802.11 packet format, and the second preamble portion corresponds to a second 802.11 packet format. | 2021-12-09 |
20210385116 | REDUCING AMPLITUDE SIGNALING OVERHEAD IN PEAK SUPPRESSION INFORMATION - Methods, systems, and devices for wireless communications are described. A transmitting device may reduce a channel overhead of a peak suppression information message (PSIM) by reducing amplitude signaling of clipped peaks of a data signal. To avoid including amplitude information for each clipped peak of a time-domain data signal in a PSIM, the transmitting device may subtract a constant amplitude offset from each peak above a clipping threshold in the time-domain data signal. The transmitting device may indicate the amplitude offset in the PSIM, and a receiving device may reconstruct the data message based on the amplitude offset. In some examples, the transmitting device may indicate a peak to average power ratio (PAPR) in the PSIM, such as a PAPR of a maximum peak in the data signal. Based on the indicated PAPR, the receiving device may perform a calculation to determine the amplitude offset for reconstructing the data message. | 2021-12-09 |
20210385117 | Quickly Identifying RF Signals of Interest in RF Data Recordings - Analysis of signal spectrum within a defined time period is performed by storing a signal sample, providing a displayable representation of the signal, and providing a detailed representation or analysis of a portion of the signal sample. An electromagnetic signal is received and corresponding data is stored. A signature characteristic of the signal is identified by examining general file characteristics, such as RF data and header file information. Time and frequency characteristics of the signal are determined and digital I/Q signal data are processed. A selection of a portion of the received electromagnetic field is identified and vector signal processing is applied to create a second set of similar plots, corresponding to the identified selected portion to provide simultaneous display in two display windows, with the second display window displaying the identified selected portion. | 2021-12-09 |
20210385118 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - A communication device communicates a physical (PHY) frame including a preamble and a data field. The preamble includes a Legacy Short Training Field (L-STF), a Legacy Long Training Field (L-LTF), a Legacy Signal Field (L-SIG), an EHT Signal Field (EHT-SIG-A), an EHT Short Training Field (EHT-STF), and an EHT Long Training Field (EHT-LTF) and the EHT-SIG-A includes fields indicating a modulation scheme and information indicating which one of a UC (Uniform Constellation) scheme and an NUC (Non Uniform Constellation) scheme is used as the modulation scheme, and the data field includes data that has undergone modulation corresponding to the modulation scheme and the information indicated by the fields. | 2021-12-09 |
20210385119 | ANALOG-TO-DIGITAL CONVERTER SYSTEM, TRANSCEIVER, BASE STATION AND MOBILE DEVICE - An Analog-to-Digital Converter, ADC, system is provided. The ADC system comprises a plurality of ADC circuits and a first input for receiving a transmit signal of a transceiver. One ADC circuit of the plurality of ADC circuits is coupled to the first input and configured to provide first digital data based on the transmit signal. The ADC system further comprises a second input for receiving a receive signal of the transceiver. The other ADC circuits of the plurality of ADC circuits are coupled to the second input, wherein the other ADC circuits of the plurality of ADC circuits are time-interleaved and configured to provide second digital data based on the receive signal. Additionally, the ADC system comprises a first output configured to output digital feedback data based on the first digital data, and a second output configured to output digital receive data based on the second digital data. | 2021-12-09 |
20210385120 | Systems and methods for sideline processing in a Virtual Network Function - Systems and methods include one or more processing devices configured to implement a Network Operating System (NOS) that is configured to switch frames, wherein the one or more processing devices are connected to a plurality of Virtual Network Functions (VNFs) configured to operate in a chain having a service flow, and wherein the NOS is configured to implement frame classification for the frames in order to distribute the frames to the plurality of VNFs, such that some of the plurality of VNFs process a subset of the frames. | 2021-12-09 |
20210385121 | METHOD AND SYSTEM FOR ARCHITECTURE ANALYSIS OF AN ENTERPRISE - A method and system for architecture analysis on IT assets of an enterprise is provided. An asset information of an enterprise is received. The asset information is associated with information of a plurality of Information Technology (IT) assets utilized in the enterprise. Interdependency of IT assets among the plurality of IT assets is determined. The interdependency is determined based at least in part, on similarity of one or more lines of codes of plurality of IT assets. A dependency map of the plurality of IT assets is determined based on the interdependency of IT assets among the plurality of IT assets. | 2021-12-09 |
20210385122 | HEIRARCHICAL DATA STORAGE AND CORRELATION SYSTEM FOR CORRELATING AND STORING SENSORY EVENTS IN A SECURITY AND SAFETY SYSTEM - Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from one or more sensors are captured and analyzed to detect one or more events in the sensory data. The events are correlated by a correlation engine, optionally by weighing the events based on attributes of the sensors that were used to detect the primitive events. The events are then monitored for an occurrence of one or more correlations of interest, or one or more critical events of interest. Finally, one or more actions are triggered based on a detection of one or more correlations of interest, one or more anomalous events, or one or more critical events of interest. A hierarchical storage manager, having access to a hierarchy of two or more data storage devices, is provided to store data from the one or more sensors. | 2021-12-09 |
20210385123 | GENERATING INCIDENT RESPONSE ACTION RECOMMENDATIONS USING ANONYMIZED ACTION IMPLEMENTATION DATA - Described herein are systems, methods, and software to enhance the management of responses to incidents. In one example, a method of improving incident response comprises identifying an incident in an information technology (IT) environment associated with a first entity of a plurality of entities, and identifying action implementation information related to the incident. The method further anonymizes the action implementation information for the incident, and determines action suggestions based at least on the anonymized action implementation information. | 2021-12-09 |
20210385124 | HYBRID CLOUD INTEGRATION DEPLOYMENT AND MANAGEMENT - A system and method of deploying and managing an integration for a hybrid computing environment is disclosed. The proposed systems and methods provide an intelligent hybrid cloud architecture and environment that offers reduced deployment times, and little to no errors. The system incorporates an artificial intelligence (AI) powered solution that is API-enabled and pre-integrated with system chatbots, as well as providing a secure, accelerated integration with available cloud ecosystems. The proposed solution is able to analyze business processes and derive and build deep insights toward the enterprise cloud integration, improving security, design, and performance of the hybrid architecture. | 2021-12-09 |
20210385125 | DATA LINK ERROR FEEDBACK SIGNALING - A data link error feedback signaling system includes a transmitting network device and a receiving network device. The receiving network device may be operable to receive a network data unit from the transmitting network device over a data link, detect an error in the network data unit, and provide data link integrity information based on the error to the transmitting network device. The receiving network device may provide the data link integrity information by marking the data link flawed in a routing protocol, transmitting the data link integrity information via an informational protocol, and so on. The transmitting network device may respond to the data link integrity information, such as by marking the data link less preferred, marking the data link down, transmitting an alarm regarding the data link to a network operator, omitting taking an action upon determining that errors are below an error threshold, and so on. | 2021-12-09 |
20210385126 | DIAGNOSING INTERMEDIARY NETWORK NODES - This disclosure describes techniques for diagnosing a presence or malfunction of a network node. In an example method, a first network node receives an indication of a diagnostic transmission originating from a second network node. The second network node further receives a forwarded transmission corresponding to the diagnostic transmission. The first network node diagnoses at least one of a presence or a malfunction of an intermediary node between the first network node and the second network node based on at least one of the indications of the diagnostic transmission or the forwarded transmission. | 2021-12-09 |
20210385127 | FLEXIBLE ETHERNET COMMUNICATION METHOD AND NETWORK DEVICE - In an embodiment, the application provides a flexible Ethernet (FlexE) communication method, which includes: receiving, by a first network device by using a FlexE group, n first overhead blocks sent by a second network device, the FlexE group comprising n physical layer apparatuses (PHYs); and storing, by the first network device, the n first overhead blocks in n memories in the first time period. The method further includes simultaneously reading, by the first network device, the n first overhead blocks from the n memories, after a preset duration T starting from a moment at which a first overhead block is stored in a corresponding memory. The first overhead block is a last stored first overhead block in the n first overhead blocks, the duration T is greater than or equal to one clock cycle. | 2021-12-09 |
20210385128 | SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING THE VIRTUALIZATION OF ACCESS NODE FUNCTIONS - In accordance with embodiments disclosed herein, an exemplary system or computer implemented method for implementing the virtualization of access node functions may include, for example: a memory to store instructions for execution; one or more processors to execute the instructions; a control plane interface to communicably interface the system with an access node over a network, in which the access node is physically coupled with a plurality of broadband lines; a virtualized module to provide a virtualized implementation of a plurality of functions of the access node at the system, in which the virtualized module executes on a virtualized computing infrastructure; the control plane interface of the system to receive current operational data and current operating conditions for the plurality of broadband lines from the access node; the virtualized module to update the virtualized implementation of the plurality of functions of the access node at the system according to the current operational data and the current operating conditions received from the access node; an analysis module to analyze the current operational data and the current operating conditions received from the access node; an instruction module to generate control parameters to affect operation of the access node based on the analysis of the current operational data and the current operating conditions received; and the control plane interface to send the control parameters to the access node for adoption at the access node. Other related embodiments are disclosed. | 2021-12-09 |
20210385129 | TAMPER-RESISTANT SERVICE MANAGEMENT FOR ENTERPRISE SYSTEMS - A system and method for providing stringent tamper resistant protection against changes to key system security features. The tamper protection is configured such that any changes to the policy can only occur from a configuration manager console, thereby preventing local device admin users or other malicious actors from altering the setting. Thus, tamper protection locks the selected service and prevents security settings from being changed through third-party apps and methods. When a system administrator enables the feature for an enterprise's workstations, only administrators will be able to change the service settings across a company's computers. The tamper protection policy is digitally signed in the backend before being deployed to endpoints, and the endpoint verifies the validity and intent of the policy, establishing that it is a signed package that only security operations personnel with the necessary administrator rights can control. | 2021-12-09 |
20210385130 | Mobile Device Connection Device and Mobile Device Remote Plug-and-Play System - The present invention provides a mobile device connection device and a mobile device remote plug-and-play system. The mobile device connection device includes a USB port connected to a mobile device and a communication module for wireless communication with a WiFi access point (AP), and the mobile device connection device performs wireless communication through the WiFi AP. Instant plugging and unplugging can be achieved, the distance limitation can also be overcome, and the user experience is good. | 2021-12-09 |
20210385131 | METHODS AND APPARATUS TO CROSS CONFIGURE NETWORK RESOURCES OF SOFTWARE DEFINED DATA CENTERS - Methods and apparatus to cross configure network resources of software defined data centers are disclosed. Example instructions cause one or more processors to monitor a component of a network for a probe packet sent to the component. The example instructions cause the one or more processors to, in response to detecting the probe packet, determine whether the probe packet includes a unique source media access control (MAC) address that is included in a probe access control list (ACL), the unique source MAC address included in the probe ACL set by a decision engine. The example instructions cause the one or more processors to, in response to determining that the probe packet does not include the unique source MAC address, record probe packet receipt information indicating that the probe packet did not pass through a network port of the component and transmit the probe packet receipt information to the decision engine. | 2021-12-09 |
20210385132 | SOFTWARE DEFINED NETWORK LIFECYCLE TRACKING AND MANAGEMENT - A device in an evolved packet core (EPC) which includes a processor and a memory. The processor effectuates operations including receiving, from one or more devices residing within a customer premise equipment (CPE) portion of a telecommunications network, sensor data associated with one or more customers and in response to receiving the sensor data, generating a data request for an ecosystem status for the CPE portion of the telecommunications network. The processor further effectuates operations including obtaining customer information for the one or more customers and creating an analytics environment, using the customer information, for the one or more customers. The processor further effectuates operations including performing, within the analytics environment, analytics on the sensor data to determine a state of the CPE portion of the telecommunications network for the one or more customers and in response to performing analytics on the sensor data, optimizing the telecommunications network. | 2021-12-09 |
20210385133 | LEARNING BY INFERENCE FROM PREVIOUS DEPLOYMENTS - The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric. | 2021-12-09 |
20210385134 | Method and System for Determining Network Slice Topology, and Device - A method includes obtaining, by a management device, sub-interface information that includes a correspondence between an identifier of a first sub-interface of a first device and a first network slice identifier, a correspondence between an identifier of a second sub-interface of a second device and a second network slice identifier, and information indicating that the first sub-interface is directly connected to the second sub-interface, and determining, by the management device, a network slice topology based on the obtained sub-interface information. | 2021-12-09 |
20210385135 | Action Recommendation Engine (ARE) of a closed-loop Machine Learning (ML) system for controlling a network - Systems and methods for recommending actions in a closed-loop system are provided. In one embodiment, an Action Recommendation Engine (ARE) may include a processor and memory configured to store computer programs having instructions that cause the processor to obtain input data pertaining to a state of a network and obtain information regarding one or more historical actions performed on the network. Also, the instructions may cause the processor to utilize a Machine Learning (ML) model for imposing one or more current actions on the network, the one or more current actions selected from the group of procedures consisting of: a) suggesting one or more remediation actions that, when performed, transition the network from a problematic state to a normal state, and b) identifying one or more root causes in response to detecting a transition in the network from a normal state to a problematic state. | 2021-12-09 |
20210385136 | PERSONAL DIGITAL OPERATION ASSISTANT - Methods, systems, and computer-readable storage media for receiving, by a personal digital operation assistant (Pedoa) system, user input, processing, by the Pedoa system, the user input to determine an intent and one or more entities related to at least a portion of a landscape, transmitting, by a dispatcher of the Pedoa system, a request to one or more services of the Pedoa system based on the intent and the one or more entities, receiving, by the dispatcher, one or more responses from the one or more services of the Pedoa system, each response being responsive to the request, and providing, by the Pedoa system, output data to a user through one or more user interfaces (UIs), the output data representative of activity of one or more components within the landscape. | 2021-12-09 |
20210385137 | SYSTEM AND METHOD FOR QUALITY OF EXPERIENCE MANAGEMENT - A system and method for Quality of Experience (QoE) management on a network. The method including: determining a set of service categories for an operator's traffic, wherein at least one of the service categories is video streaming; mapping a plurality of traffic flows to each of the service categories; determining a target and minimum intent for each of the service categories; measuring a score and bandwidth use for each of the service category; determining whether each of the service categories are reaching an associated minimum bandwidth intent; if the minimum bandwidth intent is not being reached for at least one service category, adjusting the minimum intent for at least one of the service categories; allocating a bandwidth per service category based on the adjusted minimum intent; and shaping the traffic flow to the allocated bandwidth; otherwise allowing the traffic flow to continue with a current bandwidth allocation. | 2021-12-09 |
20210385138 | NETWORK PACKET CAPTURE MANAGER - The packet capture manager uses a multi-tiered storage for storing captured network traffic. Captured packets are stored on a primary storage with a time-to-live according to a retention policy. The packet capture manager receives instructions from one or more network monitoring devices identifying one or more captured packets as packets of interest. The packet capture manager flags the identified packets as packets of interest, moves the flagged packets to a secondary storage, and changes the TTL of the moved packets. A machine learning model analyzes historical data of the instructions received from the one or more network monitoring devices. The packet capture manager uses the machine learning model to identify packets of interest and move identified packets to the secondary storage without specific instructions from a network monitoring device. | 2021-12-09 |
20210385139 | DISPLAYING INTERACTIVE TOPOLOGY MAPS OF CLOUD COMPUTING RESOURCES - Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application. A cloud computing management application further may be configured to generate and cause display of interactive topology map representations of cloud computing resources based on the collected data, where an interactive topology map enables users to view an intuitive visualization of a collection of computing resources, efficiently cause performance of actions with respect to various resources displayed in the topology map, and analyze the collection of resources in ways that are not possible using conventional cloud computing service management consoles. | 2021-12-09 |
20210385140 | PACKET PROCESSING METHOD, DEVICE, SYSTEM, AND STORAGE MEDIUM - This application provides a packet processing method and related device, system, and storage medium, and pertains to the field of network technologies. This application provides a method for constructing a blockchain network based on an interior gateway protocol (IGP). A new IGP packet used to transmit a blockchain task is provided by extending the IGP. When receiving the new IGP packet, a network device can participate in execution of the blockchain task by using its idle computing power. The computing power of the network device is better utilized to construct the blockchain network, avoiding a waste of idle computing power of the network device. This improves the utilization of computing resources in the network device. | 2021-12-09 |
20210385141 | DETERMINING CONNECTIVITY TO A NETWORK DEVICE TO OPTIMIZE PERFORMANCE FOR CONTROLLING OPERATION OF NETWORK DEVICES - Techniques are described for determining connectivity to a network device to optimize performance for controlling operation of one or more network devices. A computing device may determine connectivity to a network device to send a request for information to the network device. The computing device can determine whether it has access to a network (e.g., a wireless network), which includes the network device. The computing device may determine whether it has authorization to communicate with the network device on the network. Authorization may be based on the registration of the network device to communicate with the computing device. When the computing device can access the network and when the computing is authorized to communicate with the network device, communication (e.g., a request) may occur using the network or by direct transmission to the network device. Otherwise, the computing device may communicate with the network device using a remote network. | 2021-12-09 |
20210385142 | METHOD AND DEVICE FOR DATA TRANSMISSION - Disclosed are a method and device for data transmission. The method comprises: before a transmitting end receives feedback information, the transmitting end continually transmits multiple packets carrying same information to the receiving end, the feedback information carrying indication information used for indicating whether the receiving end correctly receives at least some packets of the multiple packets; the transmitting end receives the feedback information transmitted by the receiving end; and the transmitting end transmits subsequent data on the basis of the feedback information. In the solution, the transmitting end can continually transmit multiple packets carrying same information to the receiving end until the transmitting end receives the feedback information transmitted by the receiving end, and the transmitting end then determines subsequent data transmission on the basis of the feedback information. In such data transmission mechanism, because a transmitting end continually transmits packets carrying same information to a receiving end, the reliability of data transmission is increased. | 2021-12-09 |
20210385143 | SYSTEM AND METHOD FOR USING REAL-TIME PACKET DATA TO DETECT AND MANAGE NETWORK ISSUES - A system and method is disclosed of extracting information from real-time network packet data to analyze connectivity data for client devices in a network. The method includes: detecting when client devices initiate a connectivity event; after detecting a connectivity event, waiting a period of time for the client device to either reach or fail to reach a network connected state; after waiting a period of time, recording connectivity event information; and sending the recorded connectivity event information to an analytics system for network incident and/or network congestion analysis. | 2021-12-09 |
20210385144 | IDENTIFYING REACHABILITY OF NETWORK-CONNECTED DEVICES - Techniques are disclosed for transmitting a message to a user device in accordance with a determination that another device is unreachable over a network. In one example, a server device, at a first location, may identify a controller device resident at a second location, whereby the controller device is configured to communicate with a router at the second location. The server device may also receive a list of user devices. The server device may transmit a ping message to the controller device via the router to determine whether the controller device is unreachable by the server device. The server device may subsequently transmit a message to a user device on the list in accordance with a determination that the controller device is unreachable by the server device, whereby the message includes instructions for the user device to determine whether the controller device is unreachable by the user device. | 2021-12-09 |
20210385145 | COMMUNICATION COUPLING VERIFICATION METHOD, STORAGE MEDIUM, AND NETWORK VERIFICATION APPARATUS - A communication coupling verification method executed by a computer, the communication coupling verification method includes identifying both setting information before a setting change of each of network devices arranged in a network and forwarding information before the setting change; identifying both setting information after the setting change and the forwarding information after the setting change; generating a first model before the setting change and a second model after the setting change by using the setting information before the setting change, the forwarding information before the setting change, the setting information after the setting change, and the forwarding information after the setting change; and determining influence of the setting change on the network based on a difference between the generated first model and the generated second model. | 2021-12-09 |
20210385146 | ESTIMATION METHOD, ESTIMATION APPARATUS, AND ESTIMATION PROGRAM - An estimation method includes: generating information regarding success or not success in a connectivity checking test between “N” nodes in a case in which a failure occurs in a verification target path including the nodes, the information being generated as pattern information for each failure location; selecting “M” network devices from among a plurality of network devices in accordance with occurrence of the failure; executing the connectivity checking test between the selected network devices; comparing a checking result of the connectivity checking test with pattern information that satisfies “N=M” in the pattern information; and estimating the failure location in the service path based on the failure location associated with the pattern information in a case in which the pattern information that satisfies “N=M” matches the checking result. | 2021-12-09 |
20210385147 | DEVICE AND METHOD FOR DELIVERING ACKNOWLEDGMENT IN NETWORK TRANSPORT PROTOCOLS - A first network device is configured to: transmit data packets and poll messages to a second network device; and receive, in response to each poll message, at least one status message from the second network device. The at least one status message indicates which of the data packets sent before that poll message have been correctly received at the second network device and/or have been lost. The first network device is configured to adapt a rate of transmitting the poll messages based on a set of parameters. Further, a second network device is configured to: receive data packets from a first network device; and transmit at least one unsolicited status message to the first network device, in case of certain conditions. | 2021-12-09 |
20210385148 | DETERMINING NODE BEHAVIOR IN DETERMINISTIC NETWORKS - This disclosure describes techniques for monitoring expected behavior of devices in a computing network. Behavior of network devices may include performing various functions associated with transferring data packets through the computing network. Monitoring expected behavior may include sending a probe packet into the computing network, and determining whether network devices behave as expected with respect to the probe packet. In some examples, behaviors such as replicating, forwarding, eliminating, ordering, and/or other functions regarding data packets may be validated using the present techniques. As computing networks and/or operations become more complex, assuring the expected behavior of network devices may become more important for the continued efficient, smooth, successful, and/or timely flow of data traffic. | 2021-12-09 |
20210385149 | LIVENESS DETECTION AND ROUTE CONVERGENCE IN SOFTWARE-DEFINED NETWORKING DISTRIBUTED SYSTEM - This disclosure describes techniques for improving speed of network convergence after node failure. In one example, a method includes storing, by SDN controller, an underlay routing table having routes for an underlay network of a data center and an overlay routing table having a set of routes for a virtual network of an overlay network for the data center, wherein the underlay network includes physical network switches, gateway routers, and a set of virtual routers executing on respective compute nodes of the data center; installing, within the underlay routing table, a route to a destination address assigned to a particular one of the virtual routers as an indicator of a reachability status to the particular virtual router in the underlay network. The SDN controller controls, based on presence or absence of the route within the underlay routing table, advertisement of the routes for the virtual network of the overlay network. | 2021-12-09 |
20210385150 | PROVISIONING NON-COLORED SEGMENT ROUTING LABEL SWITCHED PATHS VIA SEGMENT ROUTING POLICIES IN BORDER GATEWAY PROTOCOL - Techniques are described for provisioning non-colored segment routing label switched paths (LSPs) via segment routing policies in border gateway protocol (BGP). For example, an ingress router receives a segment routing policy advertisement specifying an endpoint of one or more paths, and a policy color field of the one or more paths, wherein the policy color field is specified with a designated value that causes the network device to store the one or more paths in a data structure that stores non-colored paths. The ingress router determines that the policy color is specified with the designated value. The ingress router, in response to determining that the policy color is specified with the designated value, stores the one or more paths in the data structure that stores non-colored paths. | 2021-12-09 |
20210385151 | SYSTEMS AND METHODS FOR PROVIDING A DYNAMIC-HYBRID FORWARDING INFORMATION BASE (DHFIB) - A routing system can provide a Dynamic-Hybrid Forwarding Information Base (DHFIB). A control component of the routing system can build a routing table that includes routing information (e.g., prefixes, addresses, etc.) for use by a first routing component. The routing table can be ordered or ranked based on traffic information from the first routing component. Then, the control component can create the DHFIB from the routing table, wherein the DHFIB is a portion of the routing table and related to the first routing component. As such, the portion of the routing table selected for the DHFIB can be the set of prefixes in the routing table that represent the most frequently routed or most important prefixes in the routing table. Finally, the control component can forward the DHFIB to the first routing component to allow the routing component to route communications. | 2021-12-09 |
20210385152 | A METHOD OF AND A NODE DEVICE FOR APPLICATION DATA EXCHANGE - In a network ( | 2021-12-09 |
20210385153 | System And Method For Bypassing A Content Delivery Network (CDN) - Systems, methods, and devices for delivering content (e.g., multimedia streams, video files, documents, images, text, operating system updates, app store downloads, etc.) from a content source to one or more receiver devices over an internet protocol (IP) network. Network devices may be configured to bypass a content delivery network (CDN) to deliver a bulk of the content via IP multicast, and to utilize the CDN and multipath connectivity between the content source and the receiver devices to deliver the remaining portions of the content via unicast. | 2021-12-09 |
20210385154 | MULTIPATH DATA TRANSMISSION METHOD AND DEVICE - A multipath data transmission method and device are provided, where a multipath proxy client and a multipath proxy gateway establish at least two multipath data subflows based on a first internet protocol (IP) address, and perform multipath data subflow data transmission. Based on the first IP address for establishing the at least two multipath data subflows between the multipath proxy client and the multipath proxy gateway, the multipath proxy gateway establishes a TCP connection to and performs TCP-based data transmission with an application server to be accessed by the multipath proxy client. MPTCP-based multipath data transmission based on IP address information of the multipath proxy client is implemented through proxy of the multipath proxy client and the multipath proxy gateway. | 2021-12-09 |
20210385155 | LOCAL REPAIR FOR UNDERLAY FAILURE USING PREFIX INDEPENDENT CONVERGENCE - This disclosure describes techniques for improving speed of network convergence after node failure. In one example, a method includes storing, by a virtual router agent of a compute node managed by a Software Defined Networking (SDN) controller, a forwarding information data structure with a shared liveness vector orthogonal to the forwarding path to indicate a liveness state of a plurality of overlay network tunnel endpoint next hops, wherein the shared liveness vector is shared by each of a plurality of members for a plurality of composite next hops that share a common list of the plurality of overlay network tunnel endpoint next hops; and in response to determining, by the virtual router agent, that the orthogonal liveness vector indicates that each of the plurality of overlay network tunnel endpoint next hops are reachable, distributing network traffic to one or more of the plurality of overlay network tunnel endpoint next hops. | 2021-12-09 |
20210385156 | INCOMING COMMUNICATION ROUTING - The present application includes operations related to routing communications. In some embodiments, the operations may include receiving, from a third-party communication address, an incoming communication directed toward a general communication address associated with a communication system. The operations may also include routing the incoming communication to a specific communication address associated with the communication system instead of to the general communication address based on a previous outgoing communication being from the specific communication address and being directed toward the third-party communication address. | 2021-12-09 |
20210385157 | METHODS TO IMPROVE ECMP FOR BGP SERVICES AND BGP FOR PROVIDER EDGES WITH HYBRID LABEL DISTRIBUTION - First and second egress nodes are each multi-homed to a customer edge (CE) that participates in virtual routing and forwarding (VRF). First forwarding information is configured on the first egress node. The first information includes VRF labels and defines forwarding of traffic based on the VRF labels and a status of a primary path to the CE. The VRF labels include a per-VRF label for the VRF and a per-CE label for the CE. Second forwarding information is configured on the second egress node. The second forwarding information includes the per-VRF label and the per-CE label, and defines traffic forwarding based on the VRF labels. Upon receiving traffic for the CE that carries the per-VRF label, the first egress node determines the status of the primary path, and forwards the traffic to either the CE over the primary path or to the second egress node, depending on the status. | 2021-12-09 |
20210385158 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A communication device includes a processor. The processor updates, when a port which is received a packet is connected to a first path or a second path, an identifier assigned to the packet from a value according to the path to a first value or a second value. The processor learns a correspondence relationship between a destination address of the packet and a transmission port by flooding the packet, and determines the transmission port based on the correspondence relationship. The processor updates, when the transmission port is connected to the first path or the second path, the identifier assigned to the packet of which the transmission port is determined to a value according to the first path or the second path. The processor discards the packet of which the identifier is updated to the second value by the first process and the transmission port is connected to the second path. | 2021-12-09 |
20210385159 | Industrial Software Defined Networking Architecture for Deployment in a Software Defined Automation System - An industrial software defined network (SDN) architecture, system and methods for centralized and simplified management of an industrial network is disclosed. The industrial SDN architecture comprises of an infrastructure plane including physical and virtual devices, a control plane comprising controllers to control and manage the physical and virtual devices in the infrastructure plane, the logically centralized controllers including a network controller, a virtualization management controller and a cybersecurity controller, an application plane comprising one or more end user industrial applications, and a platform plane comprising a set of software services and application programming interfaces (APIs) to define a communication interface to the application plane to the north and the control plane to the south to provide an industrial application in the application plane programmatic access to one or more of the plurality of the controllers in the control plane for simplified and centralized management of the industrial network. | 2021-12-09 |
20210385160 | PACKET FORMAT OF NETWORK ABSTRACTION LAYER UNIT, AND ALGORITHM AND APPARATUS FOR VIDEO ENCODING AND DECODING USING THE FORMAT, QOS CONTROL ALGORITHM AND APPARATUS FOR IPV6 LABEL SWITCHING USING THE FORMAT - The construction method of NALU (Network Abstraction Layer Unit) for IPv6 label switching and its using algorithms of video encoding, QoS control, and decoding are provided. According to an embodiment of the present invention, the NALU format is composed of the NALH (Network Abstraction Layer Header) including the label and the NAL (Network Abstraction Layer) payload. Here, the label is determined based on layer information which is combination of a spatial scalable level, a temporal scalable level, and a quality scalable level of the encoded data. The decoder uses the label to decide which one of multiple decoding modules is used to decode the current NAL payload. Moreover, the label can be included in the packet header so that the MANE (Media Aware Network Element) can use the label to decide whether to forward the packet or drop it. For example, the label in the packet header can be used for QoS control of video service by using the flow label field in IPv6 packet header. The IPv6 router can identify priority of the video packet by using the 20 bit long flow label, into which the label in NALH can be inserted. According to the embodiment, the MANE assumed in the MPEG and JVT (Joint Video Team) can be implemented effectively. | 2021-12-09 |
20210385161 | CONTAINERIZED MANAGEMENT OF FORWARDING COMPONENTS IN A ROUTER USING ROUTING ENGINE PROCESSOR - In the present disclosure, systems and techniques for network device hardware containerization is described. In one example, a network device of a network having a topology of network devices includes processing circuitry of a routing component wherein the processing circuitry generates user space containers to operate forwarding engines in each of a plurality of forwarding components of the network device; stores information for directing communications involving the plurality of forwarding components and the network devices; and configures, by at least one user space container running on the processing circuitry of the routing component, one or more corresponding forwarding engines in a respective forwarding component using the information. | 2021-12-09 |
20210385162 | COMMUNICATION METHOD AND RELATED DEVICE - This application discloses a communication method and a related device. The communication method includes: A first in-domain device determines an address length, where the “in-domain” refers to being in a local area network. Then, the first in-domain device receives a data packet, and extracts an address from the data packet based on the address length. Further, the first in-domain device forwards the data packet based on the address. | 2021-12-09 |
20210385163 | PACKET PROCESSING METHOD, PACKET FORWARDING APPARATUS, AND PACKET PROCESSING APPARATUS - This application discloses a packet processing method that is applied to an EVPN, where the EVPN includes a first network device and a second network device. The method includes: receiving, by the first network device, a VXLAN packet sent by the second network device, where the VXLAN packet includes a path identifier and a service packet, the path identifier indicates a path from the first network device to a VNF device through an IPU, and the service packet includes a destination IP address; determining, by the first network device based on the path identifier, first routing information; and forwarding, by the first network device, the service packet to the VNF device via the IPU based on the first routing information and the destination IP address. | 2021-12-09 |
20210385164 | SPLIT-BRAIN PREVENTION IN A HIGH AVAILABILITY SYSTEM DURING WORKLOAD MIGRATION - In some embodiments, a method receives a control message from a second host. The control message includes a first address to use as a next hop to reach an active workload that has migrated to the second host from another host. The method reprograms a local route table to include a policy to send packets to check a liveness of the active workload with the next hop of the first address. A packet is sent from a standby workload to the active workload using the next hop of the first address to check the liveness of the active workload. The packet is encapsulated and sent between the first host and the second host using an overlay channel between a first endpoint of the overlay channel on the first host and a second endpoint of the channel on the second host. | 2021-12-09 |
20210385165 | PROBABILISTIC SERVICE LEVEL AGREEMENTS (SLA) - Regulating transmission of data packets between a first network and a second network over a datalink. Embodiments include determining a first plurality of token bucket rate (TBR) parameters, each TBR parameter corresponding to a one of a first plurality of packet drop precedence (DP) levels and one of a first plurality of timescales (TS). The determination of the first plurality of bucket rate parameters is based on a peak rate requirement, the data link capacity, and a nominal speed requirement associated with the data link. Embodiments also include determining a second plurality of TBR parameters based on the first plurality of TBR parameters and a guaranteed rate requirement, the second plurality comprising a further DP level than the first plurality. Embodiments also include regulating data packets sent between the first network and the second network via the data link based on the second plurality of TBR parameters. | 2021-12-09 |
20210385166 | Systems and Methods for Adapting a WAN Egress Shaper Rate - In one embodiment, a method includes determining, by a first network component, a sender shaper drop value based on the following: a maximum sequence number; a minimum sequence number; and a sender sequence counter number associated with the first network component. The method also includes determining, by the first network component, a wide area network (WAN) link drop value based on the sender sequence counter number associated with the first network component and a receiver sequence counter number associated with a second network component. The method further includes determining, by the first network component, whether to adjust a sender shaper rate based on the sender shaper drop value and the WAN link drop value. | 2021-12-09 |
20210385167 | DISTRIBUTED NODE PROCESSING OF NETWORK TRAFFIC - A first network device may receive first traffic of a session that involves a service. The first network device may identify that the service is configured for distributed node processing. The first network device may identify a second network device that is configured for distributed node processing. The first network device may identify a state machine that is associated with the service. The first network device may determine, based on the state machine, a first function and a second function, wherein the first function is identified by a first label and the second function is identified by a second label. The first network device may process the first traffic based on the first function. The first network device may provide, to the second network device, the first traffic and the second label to permit the second network device to process second traffic in association with the second function. | 2021-12-09 |
20210385168 | SYSTEM AND METHOD FOR MANAGING VIDEO STREAMING CONGESTION - A system and method for managing video streaming on a computer network based at least in part on a state of a video streaming traffic flow. The method includes: reviewing a traffic flow to determine whether the traffic flow is a video streaming traffic flow; if the traffic flow is a video streaming traffic flow, determine at least one video characteristic associated with the video streaming traffic flow; determining a state of the video streaming traffic flow; determining a priority of the video streaming traffic flow based on the characteristics and the state of the video streaming traffic flow; and allocating bandwidth to the video streaming traffic flow based on the priority; otherwise, if the traffic flow is not a video streaming traffic flow, allowing the traffic flow to continue with the traffic flow's current priority. | 2021-12-09 |