51st week of 2015 patent applcation highlights part 62 |
Patent application number | Title | Published |
20150365273 | WIRELESS COMMUNICATION NETWORK BEARER MANAGEMENT - A method and system for configuring a service at a base station of a wireless communication network are disclosed. According to one aspect, a base station receives from a network node a service identifier that identifies a service to be provided via a plurality of bearers to a user equipment. The base station configures the plurality of bearers according to a service configuration associated with the service identifier. | 2015-12-17 |
20150365274 | LIVE PARTITION MOBILITY WITH SHARED PERSISTENT RESERVATIONS - According to one embodiment of the present invention, a method is provided. The method may include a computer registering a first instance of a logical partition on a source server with a logical unit and placing a first persistent reservation on the logical unit, wherein the first persistent reservation indicates that only the first instance of the logical partition can hold a reservation on the logical unit. The method may further include the computer registering a second instance of the logical partition on a destination server with the logical unit and downgrading the first persistent reservation, such that the first and second instances of the logical partition can hold persistent reservations on the logical unit. The method may further include the computer placing, by one or more computer processors, a second persistent reservation on the logical unit. | 2015-12-17 |
20150365275 | CLOUD ENVIRONMENT CONFIGURATION FOR CLOUD APPLICATIONS - Various embodiments of systems and methods for cloud environment configuration for cloud application are described herein. In an aspect, the method includes receiving a request for starting a cloud application. In response to the received request, binaries of the cloud application are invoked and the cloud environment configuration for the cloud application is identified. It is determined whether the binaries of the cloud application are to be uploaded independently of its cloud environment configuration. When the binaries are to be uploaded independently of its cloud environment configuration, the binaries and the cloud environment configuration are uploaded separately in different transactions onto cloud. In case the binaries are not to be uploaded independently of its cloud environment configuration, an archive including the binaries and the cloud environment configuration is generated and uploaded onto the cloud. | 2015-12-17 |
20150365276 | COMPONENT STRUCTURE OF A WIRELESS NODE - A wireless node comprises a central core ( | 2015-12-17 |
20150365277 | Persistent Network Resource And Virtual Area Associations For Realtime Collaboration - Apparatus and methods relating to persistent network resource and virtual area associations for realtime collaboration include managing and displaying an object associated with a virtual area that supports establishment of respective presences of communicants operating respective client network nodes. Examples of the object include an object that has one or more user-modifiable property fields and an object that is associated with screen sharing functionality of the client network node. | 2015-12-17 |
20150365278 | MOBILE NETWORK IOT CONVERGENCE - A method in a network device coupled with a packet data network (PDN) gateway of a mobile operator is described. The method includes transmitting configuration information to a low powered device gateway coupled with a plurality of low powered devices based on a received configuration request, wherein the low powered device gateway does not include a Subscriber Identity Module (SIM). The method further includes communicating with an AAA server to authenticate a selection of the plurality of low powered devices and establishing a GPRS Tunnel Protocol (GTP) tunnel with the PDN gateway. The method further includes receiving from the low powered device gateway collected data from the selection of the plurality of low powered devices and sending to the PDN gateway the collected data. | 2015-12-17 |
20150365279 | METHOD FOR ENABLING POINT-TO-POINT TRANSMISSION AND NETWORK CONNECTING DEVICE - A method is developed for enabling a host device to perform point-to-point (P2P) transmission. The method includes providing device identification, P2P program instructions and a server. The device identification is stored in an external device and the P2P instructions are installed on the host device. The server helps the host device to connect to other P2P devices under P2P approach. | 2015-12-17 |
20150365280 | METHOD FOR THE INSTALLATION WITH AN ELECTRONIC DEVICE OF AN OUTDOOR UNIT AND ELECTRONIC DEVICE FOR SUCH AN INSTALLATION - A method for installing an outdoor unit, the outdoor unit for receiving signals from a satellite, the method including determining, with an electronic device, pointing information to be applied to the outdoor unit; receiving signal quality information on the electronic device and from an indoor unit, the indoor unit including a modem or receiver and being connected to the outdoor unit, and pointing the outdoor unit according to the received signal quality information. | 2015-12-17 |
20150365281 | User-Configured On-Demand Virtual Layer-2 Network for Infrastructure-As-A-Service (IAAS) on a Hybrid Cloud Network - A virtual network is overlaid upon physical networks. The virtual network is a layer-2 network that expands an organization's LAN using virtual MAC addresses. A VN device driver shim intercepts LAN packets and their virtual MAC and IP addresses and encapsulates them with physical packets. As new nodes are created, a VN switch table is expanded so that all nodes on the virtual network can reach the new node. A copy of the VN switch table is stored on each node by a virtual network management daemon on the node. A VN configuration controller in a central server updates the VN switch tables. Organizations can expand their virtual network as nodes are created at remote cloud computing providers without action by the staff at the cloud computing provider. Hybrid cloud virtual networks include on-premises physical and virtual-machine nodes, and off-premises guest nodes and instances. | 2015-12-17 |
20150365282 | TEMPLATE BUILDER FOR END-TO-END PROVISIONING AND LIFECYCLE MANAGEMENT OF IT INFRASTRUCTURE AND SERVICES - A system for creating or modifying a template is disclosed that includes a plurality of application controls configured to allow a user to modify one or more application parameters for an application associated with each application control. A plurality of virtual machine controls are configured to allow a user to modify one or virtual machine parameters for a virtual machine associated with each virtual machine control and to allow a user to associate each virtual machine control with one or more application control. The application controls are configured to allow a user to associate each application control with one or more virtual machine control. | 2015-12-17 |
20150365283 | CRYPTOCURRENCY OFFLINE VAULT STORAGE SYSTEM - A system includes a memory that may store a customer account associated with a customer and a processor communicatively coupled to the memory. The processor is able to receive a request to deposit a quantity of cryptocurrency into the customer account and associate the quantity of cryptocurrency with the customer account. The processor is also able to deposit the quantity of cryptocurrency into a vault connected to a network and determine a total quantity of cryptocurrency deposited into the vault. The processor may also, in response to determining the total quantity of cryptocurrency deposited into the vault exceeds a threshold, facilitate the disconnection of the vault from the network. | 2015-12-17 |
20150365284 | METHODS AND SYSTEMS OF MANAGING AN INTERCONNECTION NETWORK | 2015-12-17 |
20150365285 | AD HOC WIRELESS MESH NETWORK - Provided is process of operating a wireless device configured to act as a node in an ad hoc multi-hop mobile network, the process including: snooping, with a wireless device, a packet transmitted from a sending node to a receiving node in a multi-hop wireless connection, the sending node and the receiving node being in a different location; extracting from the snooped packet an identifier of the sending node and an identifier of the receiving node; determining based on the identifier of the sending node, the identifier of the receiving node, and a record in memory of the wireless device that the wireless device is part of a multi-hop wireless connection including the sending node and the receiving node; determining that a signal strength of a signal conveying the snooped packet exceeds a threshold; and transmitting a kill packet to the sending node and the receiving node that reconfigures the multi-hop wireless connection to bypass the receiving node. | 2015-12-17 |
20150365286 | OPERATING A DUAL CHIPSET NETWORK INTERFACE CONTROLLER ('NIC') THAT INCLUDES A HIGH PERFORMANCE MEDIA ACCESS CONTROL CHIPSET AND A LOW PERFORMANCE MEDIA ACCESS CONTROL CHIPSET - Operating a dual chipset network interface controller (‘NIC’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a NIC control module, an amount of network traffic being processed by the NIC; determining, by the NIC control module, whether the amount of network traffic being processed by the NIC exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the NIC exceeds a predetermined threshold, configuring, by the NIC control module, the NIC to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the NIC does not exceed the predetermined threshold, configuring, by the NIC control module, the NIC to utilize the low performance media access control chipset for data communications operations. | 2015-12-17 |
20150365287 | METHODS AND APPARATUS TO DYNAMICALLY CONTROL CONNECTIVITY WITHIN VIRTUAL PRIVATE NETWORKS - Methods and apparatus to dynamically control connectivity within VPNs are disclosed. A disclosed example method includes a route server for storing an indication in an entry for a first pair of provider edge routers in a virtual private network (intra-VPN) connectivity database, the intra-VPN connectivity database including entries for a plurality of pairs of provider edge routers. The indication to define an additional connectivity for the first pair of provider edge routers beyond connectivity defined in a virtual private network routing and forwarding table associated with a first provider edge router of the first pair of provider edge routers. The first pair of provider edge routers including a second provider edge router to which the first provider edge router is to be communicatively coupled. | 2015-12-17 |
20150365288 | Programmable Data Network Management and Operation - Methods, systems, and devices for automatically and dynamically managing and coordinating network resources used by services between users over a data network having a network infrastructure. A network resources coordinator can include a knowledge store, rules library, rules engine, and orchestrator. The knowledge store can have a plurality of layered abstraction stores having stored thereon facts representative of a present state of the network. The rules library can include production rules representative of knowledge of the network and of users. The orchestrator can receive service requests from users and use the rules engine in conjunction with the production rules of the rules library and facts of the knowledge store to: determine network resources required and available for requested services, dynamically make automated decisions with respect to the network and users, detect and react to changes in the network in an automated fashion, and enforce constraints of the network. | 2015-12-17 |
20150365289 | ENERGY BASED NETWORK RESTRUCTURING - Energy based network restructuring can include retrieving a counter from a network device that is part of a network. Energy based network restructuring can also include calculating an expected load for the network device, wherein the expected load is based on a service agreement, a load history of a load on the network device, and the counter. Energy based network restructuring can include restructuring the network by allocating a network resource to the network device limited to fulfill the expected load and to reduce an energy consumption of the network device. | 2015-12-17 |
20150365290 | NETWORK VERIFICATION APPARATUS, NETWORK VERIFICATION METHOD AND PROGRAM - A device for network verification includes a verification information input unit that accepts input of information for verification which represents definition of a configuration of a network being verified and a behavior model of a component included in the network. The device also includes a verification code formulation unit that formulates, from the information for verification, a code for verification which verifies an over approximate model which is such a model that has corrected the behavior model so that the model obtained on correction does not have to resort to match conditions identifying a communication packet. The device also includes a model check execution unit that executes model checking using the code for verification, a counterexample validity confirmation unit that checks whether a counterexample obtained in the model checking is also present in an inherent behavior of the network, and a verified result output unit that outputs result of verification based on outputs of the model check execution unit and the counterexample validity confirmation unit. | 2015-12-17 |
20150365291 | USAGE POLICY FOR RESOURCE MANAGEMENT - A tool for a computing service using a computing usage policy. The tool receives by one or more computer processors, a configured usage policy. The tool validates, by one or more computer processors, the configured usage policy. The tool determines, by one or more computer processors, one or more rules governing the configured usage policy. The tool executes, by one or more computer processors, the one or more rules governing the configured usage policy. The tool manages, by one or more computer processors, one or more cloud service resources according to the configured usage policy. | 2015-12-17 |
20150365292 | SYSTEM AND METHOD FOR REROUTING SERVICES USING ROUTING POLICIES IN A MULTIPLE RESOURCE NODE SYSTEM - A method, system and computer program product for configuring active resource nodes in a distributed computing system controlled by an administrative control module. The method includes identifying a first configuration of active resource nodes having at least two or more active resource nodes and detecting a modification of a link representing at least one connection between the active resource nodes. In response to detecting the modification of the link, a routing policy table is retrieved and a second configuration of the active resource nodes are identified from the routing policy table including at least one new connection between the two or more active resource nodes. The distributed computing system is triggered to configure the two or more active resource nodes according to the second configuration and to establish the at least one new connection between the two or more active resource nodes. | 2015-12-17 |
20150365293 | ENFORCING POLICIES BASED ON INFORMATION RECEIVED FROM EXTERNAL SYSTEMS - A system for enforcing policies is described. The system can receive information about one or more computing devices from each of a mobile device management (MDM) system and a machine-to-machine (M2M) system. Each of the MDM system and the M2M system can receive information from or be in communication with the one or more computing devices. Based on the information received, the system can identify a policy from a set of policies, and transmit a request to either or both of the MDM system or M2M system to perform an action based on the identified policy. | 2015-12-17 |
20150365294 | SYSTEMS AND METHODS FOR MANAGING CALL CONNECTIONS FROM NON-ORIGINATING NODES IN NETWORKS - A method for performing an operation at a non-originating node of a connection includes receiving a request for the operation; determining information associated with the connection; and signaling, based on the information and the operation, an originating node to cause the originating node to perform call connection management on the connection. A non-originating node includes a plurality of ports with at least one connection thereon; and a controller communicatively coupled to the plurality of ports and operating a control plane, wherein, for an operation of call connection management on the at least one connection, the controller is configured to: determine information associated with the at least one connection on a link formed by a port; and signal, based on the information and the operation, an originating node of the at least one connection to perform the call connection management on the at least one connection. | 2015-12-17 |
20150365295 | ENDPOINT MAPPING IN A COMMUNICATION SYSTEM USING SERIAL SIGNAL SENSING - A method in a communication system ( | 2015-12-17 |
20150365296 | METHOD FOR OPERATING A NETWORK - A method for operating a network that has a network subscriber that is connected to a superordinate bus and to a subordinate bus comprises steps for the reception of a first superordinate data message by the network subscriber via the superordinate bus, the extraction of first data from the first superordinate data message by the network subscriber and for the transmission of a first subordinate data message by the network subscriber via the subordinate bus. In one case, the first subordinate data message comprises the first data. | 2015-12-17 |
20150365297 | RESOURCE PROVISIONING USING PREDICTIVE MODELING IN A NETWORKED COMPUTING ENVIRONMENT - An approach is provided for allowing a network computing (e.g., cloud computing) infrastructure to modify its resource allocation plan (e.g., an instance count) by using a Kth derivative vector plot, which may be generated using historical logs. Among other things, this approach enables an infrastructure to project an allocation forecast for a specified duration and adapt to changes in network traffic. | 2015-12-17 |
20150365298 | Method and Computing Device for Facilitating Review of a Document - A method, carried out by a computing device, includes displaying a summary of the sections of a document, identifying one or more sections that have been previously reviewed by a particular reviewer, but has changed since the reviewer last reviewed it, indicating the availability of a blacklined version of the section, and identifying the revision against which the blacklined version has been compared. The computing device may also identify sections that have not been reviewed, sections that have been reviewed and approved by the reviewer (including which revision was approved), and sections that have been reviewed but not approved. | 2015-12-17 |
20150365299 | LUCIDITY IN NETWORK MAPPING WITH MANY CONNECTIONS - The present disclosure describes methods, systems, and computer program products for providing improved lucidity in network mapping with many connections. One computer-implemented method includes determining a connection type and initial visual settings for a connection associated with a graphical mapping, for the connection type: define one or more visual appearance functions to change the connection's visual appearance based upon the configuration of an adjustment mechanism and define a Z-order function to determine the Z-order of the connection type in relation to other connection types, determining that the adjustment mechanism configuration has been changed, and adjusting the connection, by operation of a computer, according to a value of the one or more visual appearance functions based on a value of the adjustment mechanism configuration. | 2015-12-17 |
20150365300 | DISTRIBUTED USER INTERFACES AS A SERVICE - Technologies are generally described to send distributed user interface elements to a customer. In some examples, a virtualization server may receive an application to be provided to a customer. The virtualization server may separate the application into multiple user interface elements and encapsulate each user interface element with virtualization components for individual delivery to the customer. Subsequently, the virtualization server may then forward the encapsulated element(s) to one or more customer devices. | 2015-12-17 |
20150365301 | RULE BASED SUBSCRIPTION CLONING - Aspects of the present invention relate to techniques for providing a user with access to a service provided by a cloud infrastructure system based on an existing service. A user may be provided with a clone subscription based on a base subscription to an existing service provided by the cloud infrastructure system. A clone subscription can provide the user with an environment (e.g., a service) that is designated for one use (e.g., development and testing) different from another use (e.g., production) designed for a base subscription. Changes made to a base subscription may be propagated to the clone subscription based on rules. A clone subscription can be modified to vary the clone configuration independently from the base configuration. | 2015-12-17 |
20150365302 | DYNAMIC COLLABORATION SERVICE PLATFORM AND METHOD FOR PROVIDING AN APPLICATION SERVICE AT THE SAME PLATFORM - Exemplary embodiments relate to an apparatus and a method for providing a dynamic collaboration service. A dynamic collaboration service platform according to one embodiment may include a collaboration managing module configured to collect and manage a plurality of unit services required for collaboration to analyze application service specification related to an application service and provide the application service based on the analyzed result; a service operating module configured to install and operate the collected plurality of unit services; and an execution engine configured to provide a virtual machine for executing the plurality of unit services. | 2015-12-17 |
20150365303 | ANALYZING SCADA SYSTEMS - At least one aspect disclosed herein is directed to a SCADA project analysis system. The system includes memory ad at least one processor coupled to memory. The processor is configured to receive information regarding a supervisory control and data acquisition (SCADA) system configured to monitor an industrial process, the information describing at least one first programmable device within the SCADA system, identify at least one analyzer from a plurality of analyzers based on the information, the at least one analyzer being configured to generate an assessment of the SCADA system based on the information, the assessment describing at least one capability of the SCADA system, execute the at least one analyzer to generate the assessment of the SCADA system based on the information, and provide the assessment to an external entity. | 2015-12-17 |
20150365304 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - Managing a service is provided. Information is collected about use of a set of resources by the service. A request is received to verify information regarding a selected portion of a period of time during the use of the set of resources by the service. A description of the use of the set of resources by the service during the selected portion of the period of time is generated using the collected information in response to receiving the request to verify the information regarding the selected portion of the period of time during the use of the set of resources by the service. A response to the request is created using the generated description of the use of the set of resources by the service during the selected portion of the period of time as proof of validity of the information. | 2015-12-17 |
20150365305 | DOMAIN NAME SYSTEM TRAFFIC ANALYSIS - Systems, apparatus, and methods for selecting a domain name from a plurality of domain names. A set of network traffic data for a plurality of domain names is accessed. A change in network traffic is determined based on the set of network traffic data. The change in network traffic of each of the plurality of domain names is compared with each other. At least one domain name of the plurality of domain names is selected based on the comparing of the change in network traffic of each of the plurality of domain names with each other. An action relating to the domain name of the plurality of domain names that was selected is performed. | 2015-12-17 |
20150365306 | Systems and Methods for Multitasking on an Electronic Device with a Touch-Sensitive Display - Systems and methods for multitasking using touch-sensitive devices are disclosed herein. In one aspect, a method includes: displaying, on a touch-sensitive display (“TSD”) of a device, first and second applications such that the first and second applications occupy substantially all of the TSD and are separated at a border between the first and second applications. The method further includes: detecting a swipe gesture at the second application, the swipe gesture moving in a direction that is substantially parallel to the border. In response to detecting the swipe gesture, the method includes: determining whether the swipe gesture satisfies a threshold. Upon determining that the swipe gesture satisfies the threshold, the method includes: replacing the second application with an application selector that includes a plurality of selectable affordances corresponding to applications available on the device, the application selector being displayed in an area of the TSD previously occupied by the second application. | 2015-12-17 |
20150365307 | COMMUNICATION DEVICE FOR SEARCHING FOR SPECIFIC DEVICE, COMMUNICATION DEVICE CONTROL METHOD, AND RECORDING MEDIUM - A communication device that participates in a network includes a storing control unit that stores images, a search unit that searches for a predetermined external device from the network, a transmission unit that transmits stored images to the external device via the network, a determination unit that determines the frequency of participation in the network, and a changing unit that changes the time for searching for the external device according to determination results of the determination unit. | 2015-12-17 |
20150365308 | AUTOMATIC TRANSFORMATION OF MESSAGES BETWEEN SERVICE VERSIONS - A method and system are provided for automatic transformation of messages between service versions. The method includes collecting message data of messages sent to two or more versions of a service. Message data is identified as relating to a version of a service. Relationships are inferred between structure and content of messages sent to different versions of a service, and message transformation rules are created based on the inferred relationships. | 2015-12-17 |
20150365309 | METHODS AND SYSTEMS PROVIDING A SCALABLE PROCESS FOR ANOMALY IDENTIFICATION AND INFORMATION TECHNOLOGY INFRASTRUCTURE RESOURCE OPTIMIZATION - A method for anomaly identification and IT resource optimization includes retrieving, by a workload engine executing on a first computing resource, from a database populated by a client agent executing on a second computing resource, a metric associated with a process. The method includes analyzing, by the workload engine, the retrieved metric and the process. The method includes associating, by the workload engine, at least one workload with the process, responsive to the analysis. The method includes analyzing, by an exception engine executing on the first computing resource, the retrieved metric, the process, and the at least one workload; analyzing includes applying at least one workload rule to the at least one workload. The method includes identifying, by the exception engine, an operational anomaly within the process, responsive to the analysis by the exception engine. The method includes providing a recommendation for mitigating the operational anomaly. | 2015-12-17 |
20150365310 | REMOTE METERING FOR PANELIST WEB USAGE - A method for remotely recording Web usage by a panelist includes receiving at a remote processor, a command from a local client to display a Web page; identifying the local client and the panelist operating the local client; accessing the Web page; rendering the Web page in a remote browser; sending an image of the Web page to a local browser of the local client; and recording Web usage metrics associated with a display of the image on the local browser. | 2015-12-17 |
20150365311 | SCALABLE SOFTWARE MONITORING INFRASTRUCTURE, USING PARALLEL TASK QUEUING, TO OPERATE IN ELASTIC CLOUD ENVIRONMENTS - Provided are a method, a system, and a computer program product in which a plurality of cloud images that execute in a plurality of nodes are maintained by a monitoring server, in a cloud computing environment. The monitoring server maintains information on an increase and a decrease in number of the plurality of cloud images in the cloud computing environment. | 2015-12-17 |
20150365312 | EFFICIENTLY UTILIZING PROBE PACKETS WITHIN A NETWORK - According to one aspect, a method includes monitoring traffic between a first network element and a second network element, and determining when no packets have been sent from the first network element towards the second network element within a predetermined amount of time. When it is determined that no packets have been sent from the first network element towards the second network element within the predetermined amount of time, the method includes sending at least one smart probe packet from the first network element to the second network element | 2015-12-17 |
20150365313 | CONTROL APPARATUS, COMMUNICATION SYSTEM, TUNNEL ENDPOINT CONTROL METHOD, AND PROGRAM - A control apparatus includes: a connection detection unit configured to detect that a virtual machine has newly been connected to one of a plurality of tunnel endpoints each of which functions as an endpoint of a virtual tunnel used for a communication between virtual machines that belong to a virtual network; a virtual network determination unit configured to determine a virtual network to which the detected virtual machine belongs on the basis of information in which virtual machines and virtual networks are associated with each other; and a tunnel endpoint control unit configured to cause, if the tunnel endpoint has not participated in the determined virtual network, the tunnel endpoint to participate in the determined virtual network. | 2015-12-17 |
20150365314 | Controlling a Topology of a Network - Controlling a topology of a network includes determining a desired topology of a network, comparing the desired topology to a current topology of the network, and controlling the current topology with role assignments and parameter assignments to network components in the current topology to implement the desired topology with the current network components. | 2015-12-17 |
20150365315 | PROCESSING NICKNAME CONFLICT IN TRILL NETWORK - A first routing bridge (RB) according to an example determines whether there is a nickname conflict between nicknames of the first RB and a second RB. If there is a nickname conflict, the first RB determines whether it is a lower priority RB and may modify its nickname if it is lower priority and based on a broadcast of link state packet from the second RB. | 2015-12-17 |
20150365316 | Message Processing Method and System in Multi-Homing Access Overlay Network - A message processing method in a multi-homing access overlay network, comprising: when an edge device receives a data message from a multi-homing access bound interface, setting an identifier indicating that the data message is from multi-homing access in the overlay encapsulation performed on the data message, and sending the data message after the overlay encapsulation to the overlay network. | 2015-12-17 |
20150365317 | Optical line protection with digital dispersion compensation module - Embodiments of present invention provide an optical signal transportation system. The system includes a first and a second optical line protection (OLP) node; a working signal transmission medium and a protection signal transmission medium between the first and second OLP nodes providing transportation paths for an optical signal from the first OLP node to the second OLP node; and at least one digital dispersion compensation module (DDCM) connected to at least one of the working and protection signal transmission media inside the second OLP node, wherein the DDCM includes a plurality of dispersion compensation units (DCUs) with each DCU being capable of providing either a positive or a negative dispersion selected by an optical switch to the optical signal, and wherein the DDCM is capable of providing the optical signal a total dispersion determined by the optical switch of each of the plurality of DCUs. | 2015-12-17 |
20150365318 | Cross-domain protection interacting method and system - Disclosed are a cross-domain protection interacting method and system. The method includes: an interconnecting node on a cross-domain working path between a first domain and a second domain sends second identification information of the second domain to a first node in the first domain, wherein the first domain and the second domain are neighboring domains; when a link failure occurs in the first domain, an interconnecting backup node between the first domain and the second domain receives first failure state information sent by the first node, wherein the first failure state information carrying the second identification information; and the interconnecting backup node activates a second protection path in the second domain according to the second identification information, and uses a first protection path in the first domain and the second protection path to transmit a cross-domain service. The present invention can ensure protection independence in each domain and achieve an effect of interaction of cross-domain protection. | 2015-12-17 |
20150365319 | Active/Static Path Redundancy - Delivering every packet of a stream simultaneously along two different paths gives a high assurance that the destination will receive at least one of them, even if a single failure occurs. The present idea uses the topology protocols to know when to regenerate a dual stream after one failure occurs, so that the dual delivery, and thus assurance against further failures, is maintained. | 2015-12-17 |
20150365320 | METHOD AND DEVICE FOR DYNAMICALLY SWITCHING GATEWAY OF DISTRIBUTED RESILIENT NETWORK INTERCONNECT - A method and apparatus for dynamically switching a gateway of a DRNI are provided. The method includes: synchronizing information of main and backup gateways of each portal system between a portal system of a DRNI end point and other portal systems of the present end point; the portal system detecting whether an event which triggers switching the main and backup gateways occurs or not; and updating a gateway of a service or session when the event which triggers switching the main and backup gateways is detected, a portal system in which a new main gateway of the service or session is located starting to forward the service or session via the main gateway, and a portal system in which the backup gateway of the service or session is located stopping forwarding the service or session via the backup gateway. | 2015-12-17 |
20150365321 | MULTI-PEER ROUTING IN A NETWORK - Aspects of the present disclosure involve systems, methods, computer program products, and the like, for managing the distribution of content and/or communications from a computer network to an end user of the network. In general, the system receives a request for content from the network from a user of the network and determines a server or content providing component within the network to provide the content to the user. In addition, the network may reduce the number of components and distance requests for the content are transmitted through the associated networks. In one embodiment, the network may provide altered destination paths to one or more access networks through which the end user accesses the network. The altered destination paths may be used by the end user's service provider or local network to select an access network for accessing the computer network to minimize the impact on the computer network for providing the content to the end user. | 2015-12-17 |
20150365322 | PROVIDING VIRTUAL PRIVATE SERVICE CHAINS IN A NETWORK ENVIRONMENT - A method provided in one embodiment includes receiving a first data packet of a data flow at a first classifier in which the first data packet includes a first identifier. The method further includes determining a second classifier associated with the first identifier in which the second classifier is further associated with at least one service chain of a service chain environment. The method still further includes forwarding the first data packet to the second classifier. The second classifier is configured to receive the first data packet, determine a particular service chain of the at least one service chain to which the first data packet is to be forwarded, and forward the first data packet to the particular service chain. | 2015-12-17 |
20150365323 | DISTRIBUTED NETWORK ADDRESS AND PORT TRANSLATION FOR MIGRATING FLOWS BETWEEN SERVICE CHAINS IN A NETWORK ENVIRONMENT - An example method for distributed network address and port translation (NAPT) for migrating flows between service chains in a network environment is provided and includes distributing translation state for a flow traversing the network across a plurality of NAPT service nodes in the network, with packets belonging to the flow being translated according to the translation state, associating the flow with a first service chain at a flow classifier in the network, and updating the association when the flow migrates from the first service chain to a second service chain, with packets belonging to the migrated flow also being translated according to the translation state. The method may be executed at a pool manager in the network. In specific embodiments, the pool manager may include a distributed storage located across the plurality of NAPT service nodes. | 2015-12-17 |
20150365324 | HIGH-EFFICIENCY SERVICE CHAINING WITH AGENTLESS SERVICE NODES - An example method for distributed service chaining is provided and includes receiving a packet belonging to a service chain in a distributed virtual switch (DVS) network environment, the packet includes a network service header (NSH) indicating a service path identifier identifying the service chain. The packet is provided to a virtual Ethernet module (VEM) connected to an agentless service node (SN) providing an edge service such as a server load balancer (SLB). The VEM associates a service path identifier corresponding to the service chain with a local identifier such as a virtual local area network (VLAN). The agentless SN returns the packet to the VEM for forwarding on the VLAN. Because the VLAN corresponds exactly to the service path and service chain, the packet is forwarded directly to the next node in the service chain. This can enable agentless SNs to efficiently provide a service chain for network traffic. | 2015-12-17 |
20150365325 | SOFTWARE DEFINED NETWORKING BASED CONGESTION CONTROL - Methods and systems of adjusting bandwidth allocation by a network element in a communications network includes monitoring a data flow traversing a target port, determining a bandwidth allocation for the target port, determining a fair-share bandwidth allocation for the target port, and adjusting the bandwidth allocation for the target port based on the fair-share bandwidth allocation. The bandwidth allocation for the target port is a bandwidth that is currently allocated for the data flow. The fair-share bandwidth allocation is a proportional allocation of a total bandwidth of the network element. | 2015-12-17 |
20150365326 | CONTROLLING INCOMING TRAFFIC - A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. The method further includes selecting a particular one of the plurality of ingress routers to receive future incoming traffic based on at least the respective loads of the plurality of ingress routers. The method also includes creating a mapping between an internal source IP address and a client IP address. The internal source IP address relates to the particular one of the plurality of routers. The client IP address is for a client device accessing the Internet through the network. The method additionally includes rewriting a destination IP address of the incoming traffic based on the mapping. At least the monitoring, selecting, and creating steps are performed by a controller. | 2015-12-17 |
20150365327 | Reducing network and appliances load through cooperative control plane decisions - Systems and methods for forwarding data packets in a communications network, the method comprising: providing information included in a first portion of a data packet to a network policy unit, in response to a forwarding device receiving a data packet to be forwarded over one or more network routes; forwarding the data packet according to a flow policy, in response to the forwarding device receiving the flow policy from the network policy unit, wherein the flow policy applied to the data packet by the forwarding device is determined by the network policy unit based on the network policy unit performing an analysis of the information included in the first portion of the data packet in view of policy information provided to the network policy unit. | 2015-12-17 |
20150365328 | FLOW-BASED LOAD BALANCING - Methods and apparatuses are described for virtualizing routing of network traffic by offloading routing decisions to a controller in communication with a plurality of network devices. For load balancing applications, the controller may make up-front decisions as to both destination and route, rather than wait until traffic has been routed to a load balancing point before determining the destination. | 2015-12-17 |
20150365329 | INVERSE WEIGHTED ARBITRATION - A data communication apparatus includes a router, first and second packet producers, and a penalizer. The router is directly connected to the first and second producers. The penalizer assesses penalties against each producer whenever that producer is serviced. The penalty value depends at least in part on an expected extent to which the first producer requires service. The penalizer then accumulates penalties against each producer. | 2015-12-17 |
20150365330 | PACKET I/O SUPPORT FOR A LOGICAL SWITCH ROUTER ARCHITECTURE - A tool for packet transmission and delivery in a distributed system. The tool determines one or more packets is classified as a L3 packet. The tool determines translation of the one or more packets classified as L3 packets to one or more corresponding net devices. The tool sends the one or more packets classified as a non L3 packet to a user space packet dispatcher service. | 2015-12-17 |
20150365331 | Service Packet Processing Method, Apparatus, and System - The present invention discloses a service packet processing method, apparatus, and system. The method includes a first service atom receiving a second packet sent by a central switching device, where a first service packet is encapsulated in the second packet and the second packet further includes a first service path identifier. The first service atom performs first service processing according to information in the first service packet, to obtain a first processing result. The first service atom queries a first path switching entry according to the first processing result and the first service path identifier. The first service atom sends a third packet to the central switching device, where a source device identifier of the third packet is a device identifier of the first service atom, a second service packet is encapsulated in the third packet, and the third packet includes the second service path identifier. | 2015-12-17 |
20150365332 | TRANSMISSION PATH AND DATA PROCESSING METHOD FOR TRANSMISSION PATH - The present invention provide a transmission path, including: an FD storage module, configured to receive and store an FD; a calculating module, configured to determine, according to a length value of the first frame stored in the FD storage module, a volume of data stored in the transmission path; a determining module, configured to determine whether the volume of the data stored in the transmission path determined by the calculating module is greater than a preset data volume threshold; and an instructing module, configured to send a backpressure signal to the TM module when the determining module determines that the volume of the data stored in the transmission path is greater than the preset data volume threshold, where the backpressure signal is used to instruct the TM module to stop sending an FD of the second frame to the transmission path. | 2015-12-17 |
20150365333 | METHOD AND APPARATUS FOR REDUCING POOL STARVATION IN A SHARED MEMORY SWITCH - A switch includes a reserved pool of buffers in a shared memory. The reserved pool of buffers is reserved for exclusive use by an egress port. The switch includes pool select logic which selects a free buffer from the reserved pool for storing data received from an ingress port to be forwarded to the egress port. The shared memory also includes a shared pool of buffers. The shared pool of buffers is shared by a plurality of egress ports. The pool select logic selects a free buffer in the shared pool upon detecting no free buffer in the reserved pool. The shared memory may also include a multicast pool of buffers. The multicast pool of buffers is shared by a plurality of egress ports. The pool select logic selects a free buffer in the multicast pool upon detecting an IP Multicast data packet received from an ingress port. | 2015-12-17 |
20150365334 | JUNK INFORMATION FILTERING METHOD AND APPARATUS - A junk information filtering method, including: detecting an Hypertext Transfer Protocol (HTTP) request data packet set generated according to that a user visits a target uniform resource locator (URL) by using a browser of a client, where the HTTP request data packet set includes at least one junk information request data packet and at least one non-junk information request data packet; identifying the junk information request data packet in the HTTP request data packet set according to a preset classification rule; and preventing, according to a preset interception policy, a destination host corresponding to the junk information request data packet from returning a junk information response data packet to the client. The embodiments of the present invention further disclose a junk information filtering apparatus. According to the present invention, accuracy of web page junk information filtering can be improved and user traffic can be saved. | 2015-12-17 |
20150365335 | Adaptive Receive Path Learning To Facilitate Combining TCP Offloading And Network Device Teaming - One or more modules include a first portion that teams together multiple physical network interface ports of a computing system to appear as a single virtual network interface port to a switch to which the physical ports are linked. A second portion determines a receive port upon which a packet of a TCP session was received. A third portion assigns a transmit port to be the receive port, wherein the transmit port is used by the computing system to transmit packets of the TCP session. The third portion assigns the transmit port prior to a TCP offload engine (TOE) being enabled to offload from the system CPU processing of packets of the TCP session transceived on the assigned transmit/receive port. If a subsequent packet for the TCP session is received on a different second port, the transmit port is reassigned to be the second port. | 2015-12-17 |
20150365336 | METHOD TO SCHEDULE MULTIPLE TRAFFIC FLOWS THROUGH PACKET-SWITCHED ROUTERS WITH NEAR-MINIMAL QUEUE SIZES - A method to schedule multiple traffic flows through a multiplexer server to provide fairness while minimizing the sizes of the associated queues, is proposed. The multiplexer server minimizes a quantity called the maximum Normalized Service Lag for each traffic flow. In each time-slot, the normalized service lag of every traffic flow may be updated by adding the normalized lag increment value, whether or not there is a packet in the queue associated with the flow. In each time-slot, a multiplexer server selects a traffic flow to service with an available packet and with the maximum normalized service lag. When the traffic rate requested by each traffic flow is stable, the multiplexer server schedule may repeat periodically. Efficient methods to compute periodic schedules are proposed. The methods can be applied to packet-switched Internet routers to achieve reduced queue sizes and delay. | 2015-12-17 |
20150365337 | SYSTEMS AND METHODS FOR PERFORMING A SOFT-BLOCK OF A QUEUE BASED ON A SIZE OF A REMAINING PERIOD OF A GUARD BAND - A network device including first and second queues, a determination module, a counter module, a comparison module and a blocking shaper. The determination module determines a size of the second frame. The counter module determines an amount of time remaining in a guard band and converts the amount of time to a size representative of the time remaining in the guard band. The guard band refers to a period of time leading up to a window. The first frame is scheduled to be forwarded from the first queue during the window. The comparison module compares the size of the second frame to the size representative of the time remaining in the guard band and generates a result based on the comparison. The blocking shaper, based on the result, determines whether to permit or block transmission of the second frame from the second queue during the guard band. | 2015-12-17 |
20150365338 | SYSTEMS AND METHODS FOR BLOCKING TRANSMISSION OF A FRAME IN A NETWORK DEVICE - A network device including a queue, a timing module, an adjustment module, a register module and a blocking shaper. The queue is configured to store a frame. The timing module is configured to generate a local clock signal. The adjustment module is configured to determine (i) based on a first edge of a global clock signal, an expected time of a second edge of the global clock signal, and (ii) a window centered on the expected time of the second edge of the global clock signal. The register module is configured to capture a time of a first edge of the local clock signal. The adjustment module is configured to, based on the captured time of the first edge of the local clock signal and the time of the first edge of the global clock signal, generate an adjustment signal to center a second edge of the local clock signal in the window. The blocking shaper is configured to, subsequent to adjusting the second edge of the local clock signal, block transmission of the frame from the network device based on timing of the local clock signal. | 2015-12-17 |
20150365339 | COUNTER WITH OVERFLOW FIFO AND A METHOD THEREOF - Embodiments of the present invention relate to an architecture that extends counter life by provisioning each counter for an average case and handles overflow via an overflow FIFO and an interrupt to a process monitoring the counters. This architecture addresses a general optimization problem, which can be stated as, given N counters, for a certain CPU read interval T, of how to minimize the number of storage bits needed to store and operate these N counters. Equivalently, this general optimization problem can also be stated as, given N counters and a certain amount of storage bits, of how to optimize and increase CPU read interval T. This architecture extends the counter CPU read interval linearly with depth of the overflow FIFO. | 2015-12-17 |
20150365340 | PACKET TRANSMISSION APPARATUS AND PACKET RECEPTION APPARATUS - A packet transmission apparatus includes: while data included in a preceding packet having a low priority is being transmitted without fragmentation, when time has come to transmit a succeeding packet having a priority higher than that of the preceding packet, one or more processors configured to perform conversion processing for dividing the preceding packet into a plurality of fragment packets while the data is being transmitted; and a transmission unit configured to transmit the succeeding packet between a first fragment packet, and a second fragment packet among the plurality of fragment packets. | 2015-12-17 |
20150365341 | CLOUD-BASED RESOURCE AVAILABILITY CALCULATION OF A NETWORK ENVIRONMENT - An example method for cloud-based resource availability calculation of a network environment is provided and includes receiving a plurality of system error log (SEL) data in real time at a virtual appliance executing in a first network. The SEL data is received from a remote second network indicating system events associated with corresponding resources in the second network. The method further includes calculating a resource availability (RA) index indicative of availability of resources for workload deployment in the second network, and sending the RA index to a management application executing in the second network for appropriate management and allocation of resources in the second network. In specific embodiments, the method further includes receiving a SEL inventory associated with a specific resource in the second network, and updating the RA index based on the SEL inventory. | 2015-12-17 |
20150365342 | SYSTEM AND METHOD FOR ROUTING WORK REQUESTS IN AN ENTERPRISE - A resource allocation system of an enterprise is disclosed for allocating resources for a work request in an enterprise. The resource allocation system includes a monitor module configured to monitor the work request and availability of the resources in the enterprise, wherein the work request is characterized by one or more attributes. The resource allocation system further includes a resource matching module configured to match the attributes of the work request with the resources to determine one or more first type and second type of resources. The resource allocation system further includes an assignment module configured to assign the first type of resources to the work request while the second type of resources are unavailable, and re-assign the second type of resources to the work request when the second type of resources become available. | 2015-12-17 |
20150365343 | PARALLEL COMPUTER SYSTEM AND CONTROL METHOD - A plurality of nodes is provided with N-dimensional coordinates identified by N coordinate axes, and a connection relation of the nodes is managed using the N-dimensional coordinates. A management apparatus detects an available free node group from the plurality of nodes, upon acquiring a processing request having specified therein a number of nodes for each coordinate axis for a node group to be used for processing, and converts the number of nodes of two or more coordinate axes out of the number of nodes of the N coordinate axes specified in the processing request, according to the number of nodes aligned in each coordinate axis direction of the free node group. The management apparatus allocates nodes included in the free node group to the processing request, according to the converted number of nodes for each coordinate axis. | 2015-12-17 |
20150365344 | Sending Traffic Policies - Sending traffic policies includes identifying a location of an issue source with a first router in a network layer of an interconnected network and sending to a second router located along a route towards the issue source a traffic policy that addresses an issue caused with the issue source. | 2015-12-17 |
20150365345 | REDUCED BANDWIDTH DATA UPLOADING IN DATA SYSTEMS - Methods and apparatus for uploading data from a sender to a receiver. A data deduplication technique is described that may reduce the bandwidth used in uploading data from the sender to the receiver. In the technique, the receiver, rather than the sender, maintains a fingerprint dictionary for previously uploaded data. When a sender has additional data to be uploaded, the sender extracts fingerprints for units of the data and sends the fingerprints to the receiver. The receiver checks its fingerprint dictionary to determine the data units to be uploaded and notifies the sender of the identified units, which then sends the identified units of data to the receiver. The technique may, for example, be applied in virtualized data store systems to reduce bandwidth usage in uploading data. | 2015-12-17 |
20150365346 | APPARATUS AND METHOD FOR MULTILATERAL ONE-WAY COMMUNICATION - An apparatus and a method for multilateral one-way communication are provided. The apparatus includes a one-way input module unit, detachably mounted to a plurality of slots formed in a rail, for receiving data from an external transmission host and for transmitting the received data to an internal network through one-way communication; a one-way output module unit, mounted detachably to the plurality of slots formed in the rail, for transferring data of interest to an internal network through one-way communication, and transmitting data of interest to an external reception host, and a two-way module unit, mounted detachably to the plurality of slots formed in the rail, for performing data communication between the transmission host and the reception host in a bidirectional mode. | 2015-12-17 |
20150365347 | MULTI-USER GROUP SOCIAL NETWORK - Managing a social network comprises creating a unique first group code, creating a first personal wall including a link to the first group code, and creating a first group wall for the first group code. The first user receives an inquiry to join the first group code from a second user. The first group code is exchanged between the first user and the second user. The first group wall is converted from a locked to an unlocked state with respect to the second user. A second personal wall is created for the second user, the second personal wall including a link to the first group code. The first user is restricted from viewing the second personal wall, and vice versa. The first user can share, and the second user can see, a subset of data from the first personal wall with the first group wall, and vice versa. | 2015-12-17 |
20150365348 | SYSTEM, METHOD, SERVER SYSTEM, AND STORAGE MEDIUM - When a total of the number of application programming interface calls called from a plurality of clients is less than or equal to an upper limit number of application programming interface calls associated with a user identifier, a client who uses a service by calling the application programming interface is permitted to use a service. | 2015-12-17 |
20150365349 | AUTOMATED SERVER CLUSTER SELECTION FOR VIRTUAL MACHINE DEPLOYMENT - A device receives a virtual machine (VM) to be deployed, and identifies multiple network device clusters for possible VM deployment. The device applies a weighting parameter to at least one of the multiple network device clusters to favor selection of the at least one of the multiple network device clusters over other network device clusters. The device receives user selection of one or more network device clusters from the multiple network device clusters to generate a disabled group of network device clusters and an enabled group of network device clusters, wherein the disabled group of network device clusters excludes at least one of the multiple network device clusters. The device selects a network device cluster, from the enabled group of network device clusters, for deployment of the VM based on the weighting parameter applied to the at least one of the multiple network device clusters. | 2015-12-17 |
20150365350 | RESOURCE DOWNLOADING METHOD AND APPARATUS - Embodiments of the present invention provide a resource downloading method and apparatus. The method includes: intercepting an access request for current resources; finding, through a resource relationship index file, resources which have dependency relationships with the current resources and do not exist locally on the client as predicted resources, wherein the resource relationship index file is generated in advance according to dependency relationships between individual resources in the full client of a network application; and allocating a first thread from unoccupied threads available for downloading the predicted resources, and downloading the predicted resources locally to the client using the first thread. In addition, embodiments of the present invention provide a resource downloading apparatus. | 2015-12-17 |
20150365351 | SYSTEM AND METHOD FOR DYNAMIC PROVISIONING OF APPLICATIONS - Disclosed is a system and method for the automatic, dynamic provisioning of applications configured to provide users with applications and network communications specifically designed to support their particular task. The provisioning of such capabilities is based on the type of event the user is responding to, such that every time a particular event occurs, a specific set of applications and other toolsets will be provisioned to that user (e.g., onto their individual mobile communication devices, such as tablets, smartphones, or the like) on an ad-hoc basis tailored to that particular event. An inference engine and policy system are provided to intelligently and automatically predict and securely deploy resources to end users. Such inference engine and policy system automate some facets of the assessment process accounting for the manager's, supervisor's, commander's, etc. intent and proposed courses of action—greatly reducing the amount of time required to make good decisions about which applications and services should be employed for any particular operation. | 2015-12-17 |
20150365352 | Methods and Systems for Managing Capacity in a Virtualized Network - An embodiment of the disclosure includes a method including providing a network function virtualization (NFV) capacity for a plurality of virtual network functions (VNFs) on a computing platform. A network function virtualization management function creates at least one VNF to operate on the computing platform to perform a network function. Each of the VNFs has a definition comprising a plurality of parameters. At least one of the parameters is a capacity indication relative to a capacity of the network function for the respective VNF. | 2015-12-17 |
20150365353 | NETWORK MANAGEMENT DEVICE AND METHOD - A network management device includes a memory and a processor for managing a fabric being a logical network switch including a plurality of network switches. The processor is configured to accept data on port profiles including settings for ports of the fabric, and designation of lower ports that are external ports to which the port profiles of the fabric are to be applied, associate the upper port with the lower ports based on distances, inside the fabric, between each of upper ports and the lower ports, the upper ports being ports other than the lower ports among external ports of the fabric, generate a port profile for the upper port by integrating the port profiles of the lower ports based on the associating of the upper port with the lower ports, and set the generated port profile for the upper port. | 2015-12-17 |
20150365354 | NETWORK APPARATUS AND PACKET PROCESSING DEVICE - There is a need for a network interface supporting various line speeds to have a smaller size and provide more flexible accommodation than the related art. In the present invention, provided is a communication device including a transfer processing unit which has four connectors capable of coupling with network interface units to be accommodated in one slot, and a packet processing circuit configured to process a packet input from the network interface via any one of the connectors and output the packet toward the network interface unit to be coupled with the connector, and a path control unit configured to manage a path between the packet processing circuit and the connector. | 2015-12-17 |
20150365355 | HIERARCHICAL STATISTICALLY MULTIPLEXED COUNTERS AND A METHOD THEROF - Embodiments of the present invention relate to an architecture that uses hierarchical statistically multiplexed counters to extend counter life by orders of magnitude. Each level includes statistically multiplexed counters. The statistically multiplexed counters includes P base counters and S subcounters, wherein the S subcounters are dynamically concatenated with the P base counters. When a row overflow in a level occurs, counters in a next level above are used to extend counter life. The hierarchical statistically multiplexed counters can be used with an overflow FIFO to further extend counter life. | 2015-12-17 |
20150365356 | METHOD FOR PERFORMING PROTOCOL TRANSLATION IN A NETWORK SWITCH - A system and method are disclosed for processing a packet. Processing the packet comprises receiving the packet; translating the packet from a first protocol-specific format to a canonical packet format; translating the packet from the canonical packet format to a second protocol-specific format; and forwarding the packet. | 2015-12-17 |
20150365357 | MTU MANAGEMENT IN A VIRTUALIZED COMPUTER SYSTEM - A management module is implemented in a virtualization software of a virtualized computing device having one or more virtual machines and a virtual switch configured therein. The management module detects a mismatch between a maximum transmission unit (MTU) of the virtual switch and an MTU of a virtual network interface of a virtual machine. An error message may be immediately returned so that the MTU of the virtual network interface may be corrected in response thereto. Otherwise, an error flag indicating the MTU mismatch is set but the connection between the virtual switch and the virtual network interface is allowed to be established. The error flag may be used as a prompt to correct the MTU of the virtual network interface at a later time or to connect the virtual network interface to a different virtual switch. | 2015-12-17 |
20150365358 | Context-Aware Dynamic Policy Selection for Messaging Behavior - Messaging policies can be dynamically updated based on operations, administration, maintenance, and provisioning (OAMP) data generated by data plane entities of a messaging network. For example existing messaging policies may be dynamically modified based on OAMP data generated by message brokers and/or network elements (e.g., queues). As another example, new messaging policies may be dynamically created based on the OAMP data. As another example, an updated set of messaging policies may be selected from a pool of policies based on the OAMP data. Dynamically updating messaging policies can be achieved using information model processing frameworks, such as the next generation directory enabled networks (DEN-ng) model. Various events may trigger the creation of new messaging policies and metrics, such as adding new data plane entities and/or network elements to the network, receiving new messaging instructions, etc. | 2015-12-17 |
20150365359 | HTML5-BASED MESSAGE PROTOCOL - One embodiment of a web-based message protocol using HTML video and audio tags to dynamically serve the video and audio parts of an asynchronous multimedia message having message parts selected from the group consisting of video, audio, images, text, and links, by interpolating video and audio file names into the video and audio tags based on identifying data connecting a message part to a message. Other embodiments are described and shown. | 2015-12-17 |
20150365360 | METHOD AND APPARATUS FOR PROCESSING PUSH MESSAGE IN NOTIFICATION CENTER OF MOBILE TERMINAL, AND STORAGE MEDIUM - Disclosed are a method and an apparatus for processing a push message in a notification center of a mobile terminal, and a storage medium. The present invention relates to the field of terminal devices. The method comprises: establishing a specified clearing option in a notification center of a mobile terminal, the notification center being used for displaying a push message of each application and a processing option of each push message; and when a triggering instruction for the specified clearing option is received, clearing a displayed push message of each application according to a preset rule, the preset rule being used for determining push messages capable of being cleared in one time in the notification center. The apparatus comprises an establishing module and a clearing module. | 2015-12-17 |
20150365361 | System and Method for Management of Persistent and Irrefutable Instant Messages - The present disclosure includes systems and methods for providing instant messaging communication between users via a communication network. Instant messaging clients are executed at user devices of a first and second user. A data message is transmitted from the instant messaging client at the user device of the first user to the instant messaging client at the user device of the second user, the data message having a content portion and at least one associated attribute that is cryptographically generated. The cryptographic attribute plus any additional first user attributes irrefutably binds the ID of the first user to the message information content to form an irrevocable message. The availability of at least one user-selectable function by the instant messaging client at the user device of the second user is controllable, based on the at least one associated attribute. | 2015-12-17 |
20150365362 | METHOD AND SYSTEM FOR REMINISCE AND VENERATE THE DECEASED - A method for commemoration of the deceased, includes receiving instruction that specify actions to be performed on a computer server to serve a request of a computing device; creating a temporary database having a subset of contents in data storage, creating a data exchange platform upon request by a service account of a user for manipulating the temporary database to perform intended commemoration operations, translating the instructions to a commemoration operation, initiating a chat session on the data exchange platform between two or more chat accounts, monitoring activities on the data exchange platform and the chat session, displaying information on the data exchange platform within a display window showing activities performed by one or more accounts on the data exchange platform, and displaying information within a chat window in the display window showing the chat session conducted between the two or more users; and a system for implementing the same. | 2015-12-17 |
20150365363 | METHOD AND SYSTEM FOR EXCHANGING INSTANT MESSAGES BETWEEN ONE OR MORE USERS USING MEDIA AS REFERENCE - A system, method and computer program product for transmitting online content to one or more recipients through online messaging, including a selectable button embedded within online content; and an online messaging mechanism. The selectable button is configured upon selection to transmit the online content as a generated message to one or more recipients through the online messaging mechanism. | 2015-12-17 |
20150365364 | METHODS FOR INTERACTIVELY EXCHANGING GRAPHICAL OBJECTS BETWEEN NETWORKED USERS - A networking system may comprise a web site serviced by a web server assembly. The web site may generally comprise a combination of the following components: a crediting system, a chat bidding system, a performance bidding system, a telephony switching system, a media interaction system, a display system, a photo management system, and a messaging system. An exemplary embodiment of the chat bidding system may comprise a plurality of common user accounts, a queue, and a featured user account. Common users of the common user accounts may pose tasks to the featured user, and may make a pledge for each task. The tasks may be stored in, and sorted by, the queue based on their pledges. A featured user of the featured user account may be presented with a highest ranked task in the queue, and may choose to respond to the task or to skip the task. | 2015-12-17 |
20150365365 | METHOD AND APPARATUS FOR MODIFYING MESSAGE - The present invention relates to a method and an apparatus for modifying a previously sent UC message. The method of modifying a previously sent message in accordance with the present invention may include: receiving, by input of a user, a modified phrase of a message to be modified that is selected among a list of previously sent messages; generating a comparison string by adding at least one letter preceding the modified phrase and one letter following the modified phrase to the modified phrase; comparing a length of the comparison string with a length of an entire string of the message to be modified; transmitting a modification message having the comparison string included therein if the length of the comparison string is smaller than the length of the entire string of the message to be modified; and transmitting the entire string of the message to be modified having the modified phrase included therein if the length of the comparison string is greater than or equal to the length of the entire string of the message to be modified. | 2015-12-17 |
20150365366 | Method to stop cyber-bullying before it occurs - A method to stop cyber-bullying before it occurs by alerting the user (potential bully) to pause, review and rethink before posting a hurtful messages to the recipient (potential victim(s)) is the essence of this patent. ReThink is designed to be setup as an optional software installed as an extension, plugin or add-on on web browsers and as a customized keyboard or add-on app on mobile platforms (smart phones, cell phones, tablets, phablets, mobile devices) that detects hurtfulness on all text, image or videos posted or shared on the internet in all languages by a user. Upon detection, ReThink alerts the user to rethink the decision before posting message and provides a chance for the user to edit message to make it non-hurtful to recipients. ReThink is backed by a sound scientific research that has found that the ReThink method prevents cyber-bullying over 93% of the time in adolescent users. | 2015-12-17 |
20150365367 | Method and System for Providing Electronic Information to a Virtual Mailbox Based on a Geographical Address - A method is provided for providing electronic information to a virtual mailbox based on a geographical address. The method includes storing a collection of physical locations each associated with a physical location ID in a database, storing a collection of electronic information data packets in a digital library, each stored data packet associated with a pointer and comprising an electronic information data packet uploaded by a sender and the sender's instructions defining the distribution area. The method also includes running a query for retrieving pointers as a function of the physical location associated with an addressee's physical location ID and as a function of the sender's instruction associated with stored data packets, and creating an addressee interface for accessing the electronic information data packets associated with the retrieved pointers. A system for providing electronic information to a virtual mailbox based on a geographical address is also provided. | 2015-12-17 |
20150365368 | DATA GOVERNANCE FOR EMAIL SYSTEMS - An enterprise email governance system including an enterprise-wide email communication item events monitoring subsystem providing at least near real time indications of email communication item events and an enterprise-wide email communication item events storage subsystem receiving inputs from the monitoring subsystem and providing at least near real time user accessibility to the email communication item events. | 2015-12-17 |
20150365369 | USER INTERFACE FOR EMAIL INBOX TO CALL ATTENTION DIFFERENTLY TO DIFFERENT CLASSES OF EMAIL - A user interface for email users which calls attention to one or more categories of emails in different ways. In some species, at least three categories are used: branded senders with Trumarks; white list buddies; and fraudulent emails which are either not from the domain they purport to be from or in which the content was tampered. The preferred embodiment authenticates emails from branded senders and displays them with the sender's Truemark. Branded sender emails have their Truemarks displayed in the sender column of a list view in the preferred embodiment. In a preferred embodiment, white list senders have either an icon or other graphic or photo they choose displayed to the left or right of the sender column with their name in the sender column. In a preferred embodiment, fraudulent emails have a fraud icon displayed to the left or right of the sender column with a warning in the sender column. Antiphishing processing is also disclosed. | 2015-12-17 |
20150365370 | INTELLIGENT RESOURCE MANAGER SERVICE RECOVERY INCLUDING REQUEST RETRANSMISSIONS - A system for providing media services on behalf of a customer contact center includes: a processor; and a memory, wherein the memory has stored thereon instructions that, when executed by the processor, cause the processor to: transmit and receive signaling messages to and from a control server over an established data network connection; in response to the signaling messages, invoke a media device for transmitting media to an end-user device; detect loss of the data network connection; identify a configurable parameter for determining whether a failed message transmission should be retried; and in response to determining that the failed message transmission should be retried, re-transmitting the failed message to the control server. | 2015-12-17 |
20150365371 | Channels: Real Time, Internet Social Networking, Multichannel, Communication and Multimedia Sharing Application - Examples of use to explain the unique and innovative system and process: | 2015-12-17 |
20150365372 | SYSTEMS AND METHODS FOR USING SOCIAL NETWORK ANALYSIS TO SCHEDULE COMMUNICATIONS - Systems and methods for improving the effectiveness of communications over a social network. A method for controlling network communication, comprises analyzing a social network in response to a request made by a user to send a message to a node in the social network, delaying for a period of time sending of the message based on a result of the analyzing, and sending the message to the node in the social network after the period of time has elapsed. | 2015-12-17 |