04th week of 2017 patent applcation highlights part 62 |
Patent application number | Title | Published |
20170026169 | MEMORY DEVICE, HOST DEVICE, AND MEMORY SYSTEM - A control circuit causes a first cryptographic module to perform a dummy operation in a command processing period and a data processing period in which a second cryptographic module performs a normal operation while the first cryptographic module does not perform a normal operation. | 2017-01-26 |
20170026170 | Data Security System with Identifiable Format-Preserving Encryption. - A data security method including creating a token-including plaintext by including a predefined token into a plaintext, generating a cyphertext by encrypting the token-including plaintext using format-preserving encryption, generating a decrypted cyphertext by decrypting an input text, determining whether the decrypted cyphertext includes a first predefined token, if the decrypted cyphertext includes the first predefined token, recreating the plaintext by removing the first predefined token from the decrypted cyphertext, and if the decrypted cyphertext does not include the first predefined token, using the input text as the plaintext. | 2017-01-26 |
20170026171 | CRYPTOGRAPHIC PROTECTION OF I/O DATA FOR DMA CAPABLE I/O CONTROLLERS - Technologies for cryptographic protection of I/O data include a computing device with one or more I/O controllers. Each I/O controller may be coupled to one or more I/O devices. Each I/O controller may generate a direct memory access (DMA) transaction that includes a channel identifier that is indicative of the I/O controller and that is indicative of an I/O device coupled to the I/O controller. The computing device intercepts the DMA transaction and determines whether to protect the DMA transaction as a function of the channel identifier. If so, the computing device performs a cryptographic operation using an encryption key associated with the channel identifier. The computing device may include a cryptographic engine that intercepts the DMA transaction and determines whether to protect the DMA transaction by determining whether the channel identifier matches an entry in a channel identifier table of the cryptographic engine. Other embodiments are described and claimed. | 2017-01-26 |
20170026172 | Methods and Systems for Storing and Retrieving Data - Through use of the technologies of the present invention, one is able to store and to retrieve data efficiently. One may realize these efficiencies by coding the data and storing coded data that is of a smaller size than original data. | 2017-01-26 |
20170026173 | DISTRIBUTED OBJECT ROUTING - Storing a file to prevent unauthorized reconstruction of the file, including: generating an index of the file; partitioning the file into a plurality of chunks, wherein the index of the file includes an assigned routing path for each of the plurality of chunks; and routing each chunk into an assigned storage provider through the assigned routing path. Key words include partitioning and index. | 2017-01-26 |
20170026174 | METHOD, DEVICE, AND SYSTEM FOR ESTABLISHING SECURE CONNECTION - A method includes: securely obtaining, by a first device, a first public key estimated value of a second device in an out-of-band manner; encrypting an asymmetric encryption public key by using the first public key estimated value; sending the encrypted asymmetric encryption public key to the second device; receiving an encrypted first key-exchange public key sent by the second device; decrypting the encrypted first key-exchange public key by using an asymmetric encryption private key; performing an operation based on the decrypted first key-exchange public key, to obtain a second public key estimated value; and when the first public key estimated value is consistent with the second public key estimated value, determining that the decrypted first key-exchange public key is correct, generating a shared key by using a key-exchange private key and the first key-exchange public key, and establishing a secure connection to the second device by using the shared key. | 2017-01-26 |
20170026175 | METHODS FOR QUANTUM KEY DISTRIBUTION AND RELATED DEVICES - A method for distributing a quantum digital key is described. The method comprises the use of an optical broadband source to generate an optical broadband signal. The optical broadband signal may be transmitted from a first party to a second party through an optical communication channel. The optical broadband signal may be transmitted with a low brightness, such as less than one photon/(sec-Hz), so as to be immune from passive attacks. Furthermore, a method for detecting the presence of active attackers is described. The method may comprise a coincidence measurement configured to measure the level of entanglement between an optical detection signal and an optical idler signal. | 2017-01-26 |
20170026176 | VEHICULAR ENTROPY FOR RANDOM NUMBER GENERATION - A method is provided for producing cryptographic keys, while a vehicle is in operation, for use in secure vehicle communications. The method may include obtaining unique entropy data from an entropy source based on dynamically changing, transient variables related to the operation of the vehicle, optionally in a driving mode. The method may include seeding a random number generator with the unique entropy data to generate at least one random number. A plurality of cryptographic keys are generated based on the at least one random number. A secure communication exchange may be established using the plurality of cryptographic keys. A non-transitory computer-readable medium is also provided having instructions embodied thereon that, when executed by a processor, perform the above operations as an algorithm in a vehicle. | 2017-01-26 |
20170026177 | Mutable Fields in Digital Certificates - By implementing a mutable certificates approach, a server to which a digital certificate has been issued may update one or more certificate fields without the need for a new certificate or other intervention from the issuing certificate authority. A certificate authority uses extensions to identify fields that a server may update, and to identify a set or range of allowable values for those fields. A server may use the extensions to identify one or more fields to be updated, and the values to which those fields should be updated. The server may sign those field values with its private key. A client, upon receiving a digital certificate from a server with fields for updating, validates the field values using the server's public key, and then proceeds to update the certificate field values. | 2017-01-26 |
20170026178 | COMPUTATIONAL METHOD, COMPUTATIONAL DEVICE ANDCOMPUTER SOFTWARE PRODUCT FOR MONTGOMERY DOMAIN - In Elliptic Curve Cryptography (ECC), one performs a great number of modular multiplications. These are usually done by Montgomery Multiplication algorithm, which needs the operands to be preprocessed (namely, converted to the Montgomery Domain), which is normally done by an equivalent of a long division. We provide a method to perform this conversion by a single Montgomery multiplication on the raw data. The method is formulated for elliptic curve points represented in Jacobian coordinates but can be extended to other representations. | 2017-01-26 |
20170026179 | Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment - Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request. The token-owning process signs the request to indicate that it endorses the request. A receiving server accepts a request if (1) the token-owning process endorses the request by signing the request; (2) the token is valid (token is signed by its issuer and the digital signature is verified and unexpired); (3) user entity, which can be a real user or a deployment or a server process, that is represented by the token has the authorization to access the specified resources; and (4) the token-owning process is authorized to endorse the user entity represented by the token to access the specified resources. | 2017-01-26 |
20170026180 | METHOD AND DATABASE SYSTEM FOR SECURE STORAGE AND COMMUNICATION OF INFORMATION - A secure communications system for the secure storage and communication of authenticated user identity and personal information. The system includes a database of anonymised, individually encrypted user records. Access to the records is only permissible using a user key which is stored in a user keychain on a client device. The keychain itself is password protected and cryptographically tied to the client device. | 2017-01-26 |
20170026181 | TECHNOLOGIES FOR TRUSTED I/O FOR MULTIPLE CO-EXISTING TRUSTED EXECUTION ENVIRONMENTS UNDER ISA CONTROL - Technologies for secure programming of a cryptographic engine include a computing device with a cryptographic engine and one or more I/O controllers. The computing device establishes one or more trusted execution environments (TEEs). A TEE generates a request to program the cryptographic engine with respect to a DMA channel. The computing device may verify a signed manifest that indicates the TEEs permitted to program DMA channels and, if verified, determine whether the TEE is permitted to program the requested DMA channel. The computing device may record the TEE for a request to protect the DMA channel and may determine whether the programming TEE matches the recorded TEE for a request to unprotect a DMA channel. The computing device may allow the request to unprotect the DMA channel if the programming TEE matches the recorded TEE. Other embodiments are described and claimed. | 2017-01-26 |
20170026182 | METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE - A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. | 2017-01-26 |
20170026183 | SOLID STATE STORAGE DEVICE WITH COMMAND AND CONTROL ACCESS - Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C | 2017-01-26 |
20170026184 | DETECTION OF FRAUDULENT DIGITAL CERTIFICATES - Systems and methods for verifying a digital certificate are provided. According to one embodiment, a trusted digital certificate of a server is collect by a network security device from a channel. The trusted digital certificate is stored by the network security device within a storage. A digital certificate of the server captured by a certificate inspector is receive by the network security device. The network security device verifies whether the captured digital certificate is an authentic certificate of the server and returns a result of the verification to the certificate inspector. | 2017-01-26 |
20170026185 | METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION AMONG CONSTRAINED DEVICES - In one example, an apparatus such as an authorization server and method for secure communication between constrained devices issues cryptographic communication rights among a plurality of constrained devices. Each of the plurality of constrained devices comprises no more than one cryptographic algorithm code module per cryptographic function. The method includes receiving a cryptographic communication rights request associated with at least a first of the plurality of constrained devices in response to a cryptographic algorithm update request, and includes providing a response including an identification of a subset of the plurality of constrained devices that have cryptographic communication rights with the identified first of the plurality of constrained devices. A software update server then updates the cryptographic code modules in the sub-set of the plurality of constrained devices. | 2017-01-26 |
20170026186 | DETECTION OF FRAUDULENT DIGITAL CERTIFICATES - Systems and methods for verifying a digital certificate are provided. According to one embodiment, a network security device intercepts a session between a client and a server, wherein a secure channel is requested to be established between the client and the server in the session. The network security device captures a digital certificate that is being sent from the server to the client, wherein the digital certificate is used for authenticating the server in connection with establishing the secure channel. The network security device verifies the authenticity of the server certificate and performs an action with respect to the session based on a result of the verifying. | 2017-01-26 |
20170026187 | DEVICE-LEVEL AUTHENTICATION WITH UNIQUE DEVICE IDENTIFIERS - An embodiment may include transmitting a manufacturer security certificate to a provisioning server device, and establishing, with the provisioning server device, a secure connection based on the manufacturer security certificate. The embodiment may also involve transmitting, over the secure connection, device data that characterizes the client device, and receiving, over the secure connection, a server security certificate. The embodiment may further include obtaining a unique client device identifier, where the unique client device identifier is stored in a secure memory element of the client device. The embodiment may additionally include, possibly based on the server security certificate and the unique client device identifier, accessing protected information available to a particular pre-validated server device. | 2017-01-26 |
20170026188 | System Apparatus and Device for Facilitating Network Edge Device Backup and Methods of Operation Thereof - Disclosed is a system apparatus and device for facilitating the backup of network edge devices, such as video cameras, and methods of operation thereof. A monitoring circuit(s) may detect inoperable electrical power condition(s) (IEPC) on the power-line of a network edge device. Upon detection of an IEPC a backup power source may provide electrical power to the edge device. Upon detection of a connectivity fault between the edge device and its packet sink, a packet sink emulator may emulate a packet sink of the edge device. The disclosed system apparatus and device may implement a Power over Ethernet (PoE) power backup device for providing power to one or more edge devices, the device comprising: a PoE input port, an auxiliary power input port, a PoE output port, a power storage circuits, and power management circuits for detecting available power, switching between power sources, and regulate the power switching based on power detection outputs. | 2017-01-26 |
20170026189 | INTELLIGENT POWER SOURCE, CAPABLE OF DIGITAL COMMUNICATION VIA THE POWER LINE - INTELLIGENT POWER SOURCE, CAPABLE OF DIGITAL COMMUNICATION VIA THE POWER LINE, suitable for powering LEDs ( | 2017-01-26 |
20170026190 | POINT-TO-POINT AND POINT-TO-MULTIPOINT COMMUNICATIONS - A network, such as wired and/or wireless LAN, is configured to have both point-to-point and point-to-multipoint connections. The point-to-multipoint connection(s) is used to communicate information between a plurality of the stations (or modem, or transceivers) in the network, whereas the point-to-point connection(s) are used to communicate information between only 2 stations in the network with the ability to, for example, maximize performance (rate/reach/BER/latency/etc) between those two stations. A master station allocates one or more frequency bands to the various point-to-multipoint and point-to-point connections. | 2017-01-26 |
20170026191 | VIRTUAL WATER COOLER DISCUSSION SESSIONS - A computing device including a processing device determines that a contact center agent (CCA) is in a non-contact session mode. A particular open conference session of a plurality of open conference sessions is identified. A CCA device associated with the CCA is connected to the particular open conference session. | 2017-01-26 |
20170026192 | METHOD AND DEVICE FOR PROCESSING INTERRUPTION OF GROUP COMMUNICATION SERVICE - Disclosed are a method and device for processing the interruption of a group communication service, which are used for adjusting a continuity parameter of a group communication service after the interruption of the group communication service occurs, so as to ensure the continuity of a subsequent group communication service. The method for processing the interruption of a group communication service provided in the embodiments of the present application comprises: receiving, by a network side, recording information about the continuity of a group communication service which is reported by at least one user equipment (UE), wherein the recording information about the continuity of the group communication service comprises recording information about the continuity of the group communication service during the interruption of the group communication service in the case where the UE is switched between a unicast transmission manner and a multicast transmission manner or the UE is switched between cells; and according to the recording information about the continuity of the group communication service which is reported by at least one UE, judging, by the network side, whether a continuity parameter of the group communication service is adjusted. | 2017-01-26 |
20170026193 | INTERNET PROTOCOL BASED AUDIO ALERT SYSTEM - An internet protocol based audio alert system for managing security across a site has a network of a central server computer ( | 2017-01-26 |
20170026194 | HOME AUTOMATION DEVICE - The present disclosure relates to a home automation system that is automated based on user preferences provided by a social networking system, where the home automation system provides a short-range, high-speed wireless connection that is contained within the safe boundaries of a home. Briefly described, the home automation system employs one or more home automation devices to control various home devices within the home based on detection of one or more users' social profile, where each home automation device is configured to broadcast and communicate via a short-range, multi-gigabit-per-second (MGbps) wireless communication link that can be utilized by the various home devices. Furthermore, each home automation device is configured to be self-tuning, thereby enabling automatic efficient management of the MGbps wireless communication link. | 2017-01-26 |
20170026195 | SMART HOME WIRELESS CONTROL SYSTEM - A smart home wireless control system includes a mobile control terminal, a plurality of remote-controlled devices and a signal access point (AP), wherein the mobile control terminal and the remote-controlled devices exchange data through the AP, each remote-controlled device includes an access controller and a controlled appliance connected to the access controller, the inside of the access controller is provided with a wireless signal station and a counter, the mobile control terminal detects the signal intensities of the wireless signal stations of each remote-controlled device, and the mobile control terminal conducts smart control on the remote-controlled devices according to the changes of the received signal intensities of the remote-controlled devices. | 2017-01-26 |
20170026196 | CONFIGURABLE OBD ISOLATION - An on-vehicle device for a driver monitoring system can be configured to be isolated from the vehicle bus while connected to the vehicle's OBD port. In a fully-isolated mode, the device only receives power and ground from the vehicle's OBD port and there is no other communication sent or received from the vehicle bus. In a passive mode, the device can obtain some information from the vehicle bus but does not request any information on the vehicle bus. The device may be undetectable on the vehicle bus. Optionally, the device receives commands via a communication interface to be switched among the three modes: fully active mode, fully isolated mode and passive mode. The commands may come from a server and may be communicated over the internet or over a cell network to a communication module on the device. | 2017-01-26 |
20170026197 | SCALABLE GATEWAYS FOR A FABRIC SWITCH - One embodiment of the present invention provides a switch. The switch includes a gateway subgroup module, a tunnel management module, and a packet processor. The gateway subgroup module operates the switch in conjunction with a remote switch to form a gateway subgroup. The switch and the remote switch actively operate as tunnel gateways. The tunnel management module maintains a data structure indicating whether a tunnel source subnet is associated with the gateway subgroup. The packet processor decapsulates a tunnel-encapsulated packet in response to a tunnel source subnet of the tunnel-encapsulated packet being associated with the gateway subgroup. | 2017-01-26 |
20170026198 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM - A communication device performs information communication through a communication line based on communication data specified by a CAN protocol. A communication necessity determination unit determines whether or not the information communication through the communication line is necessary based on external information obtained from an external device. When the information communication is necessary and a communication error is detected, a communication control unit stops the information communication during a fixed period and restarts the information communication after the fixed period elapses. When the information communication is unnecessary, the communication control unit stops transmitting communication data until a predetermined transmission restarting condition is satisfied. | 2017-01-26 |
20170026199 | SCALABLE TELECOMMUNICATIONS SYSTEM - One aspect is directed to a node unit for a scalable telecommunications system. The node unit is configured to have inserted therein a respective power amplifier module and duplexing module for each of a plurality universal digital RF transceiver modules. The node unit is configured to communicatively couple an input of each power amplifier module to an output of the respective universal digital RF transceiver module. The node unit is configured to communicatively couple each universal digital RF transceiver module to respective external equipment via a duplexing module. At least one module comprises a module identifier. The system controller is configured to read the at least one module identifier and to configure the operation of at least one of universal digital RF transceiver modules, universal digital transport interface modules, and universal backplane module based on the at least one module identifier. | 2017-01-26 |
20170026200 | COMMUNICATIONS NETWORK - A method of configuring a network element, for example an amplifier in a VDSL network. Configuration is transmitted to the amplifier using a common mode voltage signal so that there is no interference with the telephony or DSL signals. | 2017-01-26 |
20170026201 | WIDEBAND RF DEVICE - An RF device includes an impedance transformation circuit having a plurality of first RF couplers. Each first RF coupler includes a first portion of a first transmission line winding disposed on at least one first printed circuit board (PCB) and is configured to be electromagnetically coupled to a first portion of a second transmission line winding disposed on at least one second printed circuit board (PCB). The RF device also includes a balun circuit includes a plurality of second RF couplers coupled to balanced port connections, each second RF coupler including a second portion of the first transmission line winding wound around the first portion of a first transmission line winding and configured to be electromagnetically coupled to a second portion of the second transmission line winding wound around the first portion of a second transmission line winding. | 2017-01-26 |
20170026202 | PAM DATA COMMUNICATION WITH REFLECTION CANCELLATION - The present invention is directed to data communication systems and methods. More specifically, embodiments of the present invention provide a communication system that removes reflection signals. A digital data stream is processed through both tentative path and the main path. The tentative path uses a first DFE device and a reflection cancellation circuit to generate a correction signal for removing reflection signal from the digital data stream. A second DFE device removes ISI and other noises from the corrected digital data stream. There are other embodiments as well. | 2017-01-26 |
20170026203 | Phase Noise Tracking and Reduction - A group of data symbols for a current block of data symbols in multiple blocks received over a communication channel is equalized, based on a pilot block, to generate a group of equalized symbols. The group of equalized symbols is de-rotated as a function of a current phase estimate to determine initial de-rotated equalized symbols. The phase estimate is an estimate of phase caused by noise for blocks previous to the current block. Additionally, a phase metric is calculated from real and imaginary parts of the initial de-rotated equalized symbols, wherein the phase metric estimates phase caused by noise for the current block. The current phase estimate is updated with the phase metric. The initial de-rotated equalized symbols are de-rotated by the phase metric to determine final equalized and de-rotated symbol estimates. The final equalized and de-rotated symbol estimates are output. Apparatus, methods, and computer program products are disclosed. | 2017-01-26 |
20170026204 | TRANSMISSION UNIT, RECEPTION UNIT, AND COMMUNICATION SYSTEM - A transmitter includes: a transmission control circuit that determines whether or not to perform an emphasis on a data signal, based on a transition pattern of the data signal; and a transmission driver that selectively performs the emphasis based on a result of the determination by the transmission control circuit, to generate at least one transmission signal. | 2017-01-26 |
20170026205 | INTERFERENCE-EXCISING DIVERSITY RECEIVER ADAPTATION USING FRAME SYN- CHRONOUS SIGNAL FEATURES AND ATTRIBUTES - An apparatus and digital signal processing means are disclosed for excision of co-channel interference from signals received in crowded or hostile environments using spatial/polarization diverse arrays, which reliably and rapidly identifies signals with transmitted features that are almost-periodic over known framing intervals, and exploits those features to develop diversity combining weights that substantively extract those signals from that environment, based on differing diversity signature, timing offset, and carrier offset of those signals. In one embodiment, the signal identification and extraction is performed in an appliqué that can be implemented without coordination with an actual radio transceiver. | 2017-01-26 |
20170026206 | SYSTEM AND METHOD FOR PREVENTING PHANTOM DATA COMMUNICATION LINKS - A method and a system for preventing phantom data communication links from occurring that substantially eliminates or reduces at least some of the disadvantages and problems associated with previous data communication network management techniques. In accordance with a particular embodiment of the present disclosure a method for managing data communications is provided that comprises the step of providing a central office data communication switch that comprises a plurality of data communication ports. A port controller causes the ports to estimate various physical characteristics of the incoming signals from network termination points. This processing of incoming signals leads to the precise detection of phantom links and their immediate termination. Thus, this method prevents the formation of phantom links that may occur if physical conductors which are susceptible to crosstalk interference with connected conductors erroneously convey a response signal back to an unattached port within the head-in switching system. | 2017-01-26 |
20170026207 | MICROWAVE RECEIVER AND MAGNETORESISTIVE DEVICE - A microwave receiver includes a magnetoresistive element to which a microwave is input, a magnetic field application unit, and a DC bias current application unit. The magnetoresistive element includes a free magnetic layer, a fixed magnetic layer, and a nonmagnetic spacer layer interposed between the free magnetic layer and the fixed magnetic layer. The magnetic field application unit applies a magnetic field to the free magnetic layer. The DC bias current application unit applies a DC bias current to the magnetoresistive element, and includes an input terminal. The DC bias current is made variable by adjusting a DC voltage that is applied to the DC bias current application unit via the input terminal. | 2017-01-26 |
20170026208 | DATA TRANSMITTER MODIFYING A STANDARD-BASED RADIO SIGNAL - Embodiments of the present invention provide a data transmitter for transmitting a radio signal, the data transmitter being configured to modify a standard-based radio signal in order to transmit a modified radio signal, the amplitude of which, in a frequency band, additionally has a bit sequence. | 2017-01-26 |
20170026209 | DEMODULATING CIRCUIT AND THE METHOD THEREOF - The present invention discloses a demodulating method for a demodulating circuit. The demodulating method comprises a step of utilizing a wave-shaping voltage step-down circuit to perform a wave-shaping process for a modulating input signal. A separate circuit of modulating input signal is filtering data zero of the modulating input signal and reserving data one of the modulating input signal. A triggering circuit of data recover is used to start the count of data span, until the data count is completed. A data recover circuit is used to recover the data. | 2017-01-26 |
20170026210 | WIDEBAND FREQUENCY SHIFT MODULATION USING TRANSIENT STATE OF ANTENNA - Described herein are architectures, platforms and methods for implementing modulating a radiating signal of a high Q antenna in order to transmit from one frequency to one or more different frequencies which may be in the same narrow band frequency spectrum or in a wide band frequency spectrum. | 2017-01-26 |
20170026211 | EXTRACTING CARRIER SIGNALS FROM MODULATED SIGNALS - Methods, systems, and apparatus for detecting a center frequency of an input signal, the input signal including a carrier signal modulated with a modulation signal. Detecting a frequency of a second signal. Determining a difference signal between the center frequency of the input signal and the frequency of the second signal. Modifying the frequency of the second signal based on the difference signal to provide the carrier signal. And, outputting the carrier signal. | 2017-01-26 |
20170026212 | PACKET MODE AUTO-DETECTION IN MULTI-MODE WIRELESS COMMUNICATION SYSTEM, SIGNAL FIELD TRANSMISSION FOR THE PACKET MODE AUTO-DETECTION, AND GAIN CONTROL BASED ON THE PACKET MODE - A method for automatically detecting a packet mode in a wireless communication system supporting a multiple transmission mode includes: acquiring at least one of data rate information, packet length information and channel bandwidth information from a transmitted frame; and determining the packet mode on the basis of the phase rotation check result of a symbol transmitted after a signal field signal and at least one of the data rate information, the packet length information and the channel bandwidth information acquired from the transmitted frame. | 2017-01-26 |
20170026213 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - A method and an apparatus for transmitting broadcast signals thereof are disclosed. The apparatus for transmitting broadcast signals, the apparatus comprises an encoder for encoding service data corresponding to each of a plurality of data transmission path, wherein each of the data transmission path carries at least one service component for broadcast services, an encoder for encoding signaling data, wherein the signaling data includes static data and dynamic data, a frame builder for building signal frames, wherein each of signal frames includes the encoded service data and the encoded signaling data, wherein each of signal frames belongs to one of the broadcast services, wherein the static data remain constant in the signal frames belonging to the broadcast service in a duration of a super frame and the dynamic data changes by the signal frames, a modulator for modulating the signal frames by an OFDM (Orthogonal Frequency Division Multiplex) scheme and a transmitter for transmitting the broadcast signals carrying the modulated signal frames. | 2017-01-26 |
20170026214 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - A method and an apparatus for transmitting broadcast signals thereof are disclosed. The apparatus for transmitting broadcast signals comprises an encoder for encoding DP (Data Pipe) data corresponding to each of a plurality of DPs, a mapper for mapping the encoded DP data onto constellations, a time interleaver for time interleaving the mapped DP data at DP level, a frame builder for building at least one signal frame including the time interleaved DP data, a modulator for modulating data in the built at least one signal frame by an OFDM (Orthogonal Frequency Division Multiplex) scheme and a transmitter for transmitting the broadcast signals having the modulated data. | 2017-01-26 |
20170026215 | TRANSMITTER, RECEIVER AND SYSTEM FOR FILTERBANK MULTICARRIER COMMUNICATION - The present invention is directed to a transmitter and receivers for filterbank multicarrier (FBMC) communication. The transmitter comprises a processor adapted to calculate two auxiliary pilot symbols, and a precoder adapted to insert the two calculated auxiliary pilot symbols into a symbol structure of symbols, the symbols adjacently surrounding a main pilot symbol, wherein the precoder is adapted to insert the two auxiliary pilot symbols at two symbol positions of the symbol structure, which are symmetric to the main pilot symbol P in a time domain and/or in a frequency domain. | 2017-01-26 |
20170026216 | Cancellation Pulse Generator Scheduling Method and System - Provided a CPG scheduling method and system. The method includes that: peak cancellation components generate and send a CPG calling request to a CPG scheduling component; the CPG scheduling component configures at least one CPG to the peak cancellation component corresponding to the CPG calling request from a CPG sharing resource pool to generate at least one cancellation pulse according to a scheduling strategy and the CPG calling request; and the CPG scheduling component receives the at least one cancellation pulse generated by the at least one configured CPG according to the CPG calling request, and transmits the at least one cancellation pulse to the peak cancellation components corresponding to the CPG calling request to implement peak cancellation processing. By implementing the present disclosure, the problem of incapability in accomplishing all peak cancellation tasks of a peak cancellation component of a certain stage in the related art is solved. | 2017-01-26 |
20170026217 | Orthogonal Differential Vector Signaling Codes with Embedded Clock - Orthogonal differential vector signaling codes are described which support encoded sub-channels allowing transport of distinct but temporally aligned data and clocking signals over the same transport medium. Embodiments providing enhanced LPDDR interfaces are described which are suitable for implementation in both conventional high-speed CMOS and DRAM integrated circuit processes. | 2017-01-26 |
20170026218 | Pre-Coding in Multi-User MIMO - In a multi-user communication system, a pre-coder in a transmitter comprises a Discrete Fourier Transform (DFT) spreader configured to spread data symbols with Fourier coefficients to generate DFT-spread data symbols. An OFDM modulator, such as an inverse-DFT, modulates the DFT-spread data symbols onto OFDM subcarriers to produce a pre-coded OFDM transmission signal. The DFT spreader is configured to reduce the transmission signal's peak to average power. | 2017-01-26 |
20170026219 | RECEIVER AND METHOD OF RECEIVING - A receiver comprises a radio frequency demodulation circuit configured to detect and to recover a received signal. The received signal has been formed and transmitted by a transmitter to carry the payload data as Orthogonal Frequency Division Multiplexed (OFDM) symbols in one or more of a plurality of time divided frames, each frame including a preamble including a plurality of bootstrap OFDM symbols, one or more of the bootstrap OFDM symbols of the preamble carrying signalling data represented as a relative cyclic shift of a signature sequence which has been combined with the one or more of the bootstrap OFDM symbols. The receiver comprises a detector circuit configured to detect and to convert a useful part of the bootstrap OFDM symbols into the frequency domain, a bootstrap processor configured to detect the signalling data from the bootstrap OFDM symbols in the frequency domain, using an estimate of the channel transfer function determined from one or more of the bootstrap OFDM symbols, and a demodulator circuit configured to recover the payload data from the payload OFDM symbols using the signalling data. The bootstrap processor comprises an equaliser configured to reduce an effect of the channel transfer function in the frequency domain from the bootstrap OFDM symbols carrying the signalling data, a signature sequence remover configured to remove an effect of the signature sequence in the frequency domain from the bootstrap OFDM symbols carrying the signalling data, and a slope estimator configured to detect an average change in phase between adjacent sub-carriers of the bootstrap OFDM symbols after the effects of the channel transfer function and the signature sequence have been removed from the bootstrap OFDM symbols carrying the signalling data. A signalling data detector is configured to identify the signalling data based on the detected average change in phase, which is representative of the cyclic shift applied to the signature sequence. Accordingly, embodiments of the present technique can provide an arrangement for detecting the signalling data from the bootstrap OFDM symbols in the frequency domain. | 2017-01-26 |
20170026220 | RECEIVER AND METHOD OF RECEIVING - A receiver for detecting and recovering payload data from a received signal, the receiver comprising a radio frequency demodulation circuit configured to detect the received signal, the received signal carrying the payload data as Orthogonal Frequency Division Multiplexed, OFDM, symbols in one or more of a plurality of time divided frames, each frame including a preamble including a plurality of bootstrap OFDM symbols. One or more of the bootstrap OFDM symbols of the preamble carry signalling data represented as a relative cyclic shift of a signature sequence carried by the bootstrap OFDM symbols, the signalling data providing an indication of parameters for detecting and recovering the payload data carried by the one or more frames. The receiver comprises a detector circuit configured to detect and to convert a useful part of the one or more of the bootstrap OFDM symbols into the frequency domain and a bootstrap processor. The bootstrap processor is configured to generate, using the signature sequence, an estimate of a channel transfer function from a first bootstrap OFDM symbol, and to decode the signalling information carried by one or more other bootstrap OFDM symbols using the estimate of the channel transfer function and the signature sequence. A demodulator circuit is configured to recover the signalling data from the one or more bootstrap OFDM symbols using the estimate of the channel transfer function. The bootstrap processor is configured to generate, for each of the one or more other bootstrap OFDM symbols, an updated version of the channel transfer function, to equalise each of the one or more other bootstrap OFDM symbols using the updated version of the channel transfer function for each of the one or more other bootstrap OFDM symbols, and to detect the signalling data carried by the one or more other bootstrap OFDM symbols by correlating the equalised one or more other bootstrap OFDM symbols with a reproduced version of the signature sequence. Embodiments of the present technique provide an improvement in detecting and recovering signalling data carried by the bootstrap signals by updating the channel transfer function for each bootstrap OFDM symbols. | 2017-01-26 |
20170026221 | RECEIVER AND METHOD OF RECEIVING - A receiver for detecting and recovering payload data from a received signal comprises a radio frequency demodulation circuit configured to detect the received signal. The received signal has been formed and transmitted by a transmitter to carry the payload data as Orthogonal Frequency Division Multiplexed (OFDM) symbols in one or more of a plurality of time divided frames, each frame including a preamble including a plurality of bootstrap OFDM symbols. One or more of the bootstrap OFDM symbols of the preamble carrying signalling data represented as a relative cyclic shift of a signature sequence which has been combined with the one or more of the bootstrap OFDM symbols. A bootstrap processor is configured to detect the signalling data from the bootstrap OFDM symbols using an estimate of the channel transfer function determined from one or more of the bootstrap OFDM symbols, and a demodulator circuit is configured to recover the payload data from the payload OFDM symbols using the signalling data. The bootstrap processor comprises a channel shaper, which is configured to convolve a time domain copy of the signature sequence with the estimate of the channel impulse response to generate a channel shaped signature sequence, a cross-correlator and a cyclic shift detector. A cross-correlator is configured to cross-correlate the useful part of each of the one or more bootstrap OFDM symbols with the channel shaped copy of the signature sequence, and the cyclic shift detector is configured to estimate the signalling data conveyed by each of the one or more bootstrap OFDM symbols by detecting a cyclic shift of the signature sequence present in each of the one or more bootstrap OFDM symbols from a peak of the samples representing a result of the cross-correlation. Accordingly the signalling data can be detected by identifying the cyclic shift of the signature sequence by cross-correlating the signature sequence with the bootstrap OFDM symbols carrying the signature sequence in the time domain, which can provide a more efficient implementation. | 2017-01-26 |
20170026222 | SIGNAL PROCESSING METHOD - A signal method of processing in a receiver a signal that has been encoded and interleaved in a transmitter comprising: receiving a signal, process the signal to obtain a stream of soft metrics representing bit probability of symbols in a predetermined constellation; applying to said soft metric a compression operation that preserves the total length of each group of soft metrics relative to a same constellation symbol; rearranging the stream of compressed soft metrics so as to inverse the interleaving done in the transmitter. | 2017-01-26 |
20170026223 | SIGNAL MULTIPLEXING APPARATUS USING LAYERED DIVISION MULTIPLEXING AND SIGNAL MULTIPLEXING METHOD - An apparatus and method for multiplexing signals using layered division multiplexing are disclosed. A signal multiplexing apparatus according to an embodiment of the present invention includes a combiner configured to combine a core layer signal and an enhanced layer signal at different power levels to generate a multiplexed signal, a power normalizer configured to reduce power of the multiplexed signal to power corresponding to the core layer signal, and a time interleaver configured to perform interleaving applied to both the core layer signal and the enhanced layer signal. | 2017-01-26 |
20170026224 | RESILIENT SEGMENT ROUTING SERVICE HUNTING WITH TCP SESSION STICKINESS - According to one aspect, a method includes obtaining a segment routing (SR) packet from an endpoint via a first router at a first server along a path, the SR packet including an SR list and a last address, the last address being an address of a requested service. The method also includes determining, at the first server, whether the requested service is available from the first server, wherein determining whether the requested service is available from the first server includes opening the SR packet, parsing an SR header of the SR packet, and performing a lookup in a service table. Finally, the method includes modifying the SR packet at the first server when it is determined that the requested service is not available from the first server; and forwarding the SR packet along the path. | 2017-01-26 |
20170026225 | NETWORK RELIABILITY ASSESSMENT - The present disclosure pertains to systems and methods for assessing reliability of communication links in a software defined network (SDN). In one embodiment, a system may include an SDN architecture subsystem configured to generate SDN architecture information and a bandwidth subsystem configured to generate bandwidth information. A latency subsystem may receive the bandwidth information from the bandwidth subsystem and may be configured to generate latency information using the bandwidth information. A failover subsystem may receive the SDN architecture information, the bandwidth information, and the latency information and generate a failover assessment and a failover route for the communication link. A reliability assessment subsystem may receive the SDN architecture information, the bandwidth information, and the latency information, and the failover assessment and generate a reliability assessment. A traffic routing subsystem may receive the reliability assessment and route data traffic to the failover route based on the reliability assessment. | 2017-01-26 |
20170026226 | COMMUNICATION DEVICE WITH PERSISTENT CONFIGURATION AND VERIFICATION - The present disclosure pertains to systems and methods for establishing communication with a remote communication device in a software defined network (SDN) during time when an SDN controller is unavailable. In one embodiment, a local communication device may be configured to receive a plurality of data flows from an SDN controller and to store the plurality of data flows in a persistent data memory. The device may generate a unique identifier for the local communication device that is transmitted to a remote communication device. Following a disruption the results in the SDN controller being unavailable, the local communication device may recover into a default configured state based on the plurality of data flows in the persistent data memory. The local communication device may then transmit the unique identifier to the remote communication device after the disruption to begin a process of reestablishing communication with the remote communication device. | 2017-01-26 |
20170026227 | METHODS AND SYSTEMS FOR SWITCHING NETWORK TRAFFIC IN A COMMUNICATIONS NETWORK - A switching system includes memory and a switching circuit. The memory stores a port priority table and a trigger source and condition table. The switching circuit for switches network traffic between a number of ports based on the port priority table, the trigger source and condition table, and port health status data. Switching network traffic includes: determining a priority path for a first port using the port health status data and the trigger source and condition table; determining a second port specified as a destination for network traffic arriving at the first port by the port priority table for the priority path; and routing incoming network traffic from the first port to the second port. | 2017-01-26 |
20170026228 | METHOD AND APPARATUS FOR DIAGNOSING FAULTS IN A HYBRID INTERNET PROTOCOL NETWORK - An Ethernet switch can receive an internet protocol query packet generated by a receiver for collecting telemetry data between a source and the receiver in a multicast network, translate the internet protocol query packet to an Ethernet query packet, collect in the Ethernet query packet telemetry data from the Ethernet switch where at least one telemetry field of the Ethernet Switch includes an arrival time of the Ethernet query packet at the Ethernet switch, and submit the Ethernet query packet to the next network element of the multicast network. An internet protocol router can receive an Ethernet query packet generated by an Ethernet switch having at least one field for telemetry for collecting telemetry data between a source and a receiver, translate the Ethernet query packet to an internet protocol query packet, and submit the internet protocol query packet to the next network element. Additional embodiments are disclosed. | 2017-01-26 |
20170026229 | FAILURE DETECTION METHOD AND DEVICE - The present disclosure discloses a fault detection method and device. The method includes: receiving, by a terminal device, a fault detection instruction entered by a user, and determining a service type of a to-be-detected fault according to the fault detection instruction; determining fault detection content according to the service type; starting to detect the fault detection content to obtain a detection result; and presenting the detection result. In this way, whether in a period of deploying or in a period of using the terminal device, the fault detection instruction is directly triggered when there is a need to determine whether the terminal device is faulty, and then the fault detection content corresponding to the service type of the to-be-detected fault is detected, which effectively implements a self-detection capability of the terminal device, increases a fault locating speed, and improves fault detection accuracy. | 2017-01-26 |
20170026230 | Maintaining Resource Availability During Maintenance Operations - One or more aspects of this disclosure may relate to using a configurable server farm preference for an application, desktop or other hosted resource. Additional aspects may relate to moving server farm workloads based on the configurable server farm preference. Further aspects may relate to performing reboot cycles, a reboot schedule and on-demand rebooting. Yet further aspects may relate to staggering individual machine reboot operations over a specified period of time and performing reboot operations such that some machines are available for user sessions during a reboot cycle. | 2017-01-26 |
20170026231 | INTERNET SERVICE PROVIDER MANAGEMENT PLATFORM - Some embodiments include an internet service provider (ISP) system capable of delegating network policy configuration tasks to ISP franchisee accounts. For example, the ISP system can establish, via a backhaul channel, a network tunnel from an access point hosting a local area network (LAN) to a gateway server connected to a wide area network (WAN). The ISP system can authenticate an ISP franchisee account operating a mobile device. The ISP franchisee account can configure, from the mobile device, a network usage policy associated with using the network tunnel, the gateway server, and/or application services available through the gateway server. The ISP system can authenticate a subscriber account operating a subscriber device to connect with the WAN from the LAN. The ISP system can enforce, at the gateway server, the network usage policy when the customer device is using the access point to access the WAN through the gateway server. | 2017-01-26 |
20170026232 | SYSTEM AND METHOD FOR DETERMINING THE CONFIGURATION OF SWITCHES IN VIRTUAL LINK TRUNKING ENVIRONMENTS - A system and method of determining the configuration of a network switching unit includes a network switching unit having one or more hardware processors. The one or more hardware processors are configured to execute code to cause the network switching unit to perform operations. The operations include detecting an inter-domain link aggregation group (LAG) associated with a first domain ID and receiving an inter-domain LAG detection message from a peer network switching unit. The inter-domain LAG detection message includes a second domain ID. In response to determining that the first domain ID and the second domain ID match, the network switching unit performs further operations including assigning a virtual link trunking (VLT) identifier to the inter-domain LAG, transmitting a VLT configuration message to the peer network switching unit, and forwarding network traffic to a first domain associated with the first domain ID using a VLT associated with the VLT identifier. | 2017-01-26 |
20170026233 | AUTO-PROVISIONING EDGE DEVICES IN A COMMUNICATION NETWORK USING CONTROL PLANE COMMUNICATIONS - In one embodiment, a network controller identifies a first sign of life for an edge device in a communication network (e.g., when the network controller receives an encapsulated workflow request for the edge device over a control plane of the communication network). The network controller further imports the encapsulated workflow request from the edge device over the control plane, determines configuration parameters for a tenant and a tenant network from the encapsulated workflow request, and transmits the configuration parameters to the edge device to provision the edge device for the tenant according to the configuration parameters. | 2017-01-26 |
20170026234 | AUTO PROVISIONING OF BULK ACCESS POINTS - Provided are devices, computer-program products, and methods (e.g., methods implemented by a network device), for automatic provisioning of an access point. In some implementations, a network device may receive a request for provisioning information. In some implementations, a group name is determined. In these implementations, the group name may be determined suing information provided in the request. In some implementations, provisioning information is selected. In these implementations, selecting the provisioning information includes using the group name. In some implementations, the selected provisioning information is transmitted. In these implementations, provisioning information facilitates self-configuration of un-provisioned network devices. | 2017-01-26 |
20170026235 | Service Provisioning In A Communication Network - A method of provisioning a service in a communication network is described, in which the service comprises at least one virtual network function and at least one virtual network path, which at least one virtual network function and at least one virtual network path are to be implemented in the communication network. The method including obtaining affinity constraints and/or anti-affinity constraints relating to mapping the at least one virtual network path onto the communication network, optionally obtaining affinity constraints and/or anti-affinity constraints relating to mapping the at least one virtual network function onto the communication network, and mapping the at least one virtual network function and at least one virtual network path onto the communication network subject to said constraints. | 2017-01-26 |
20170026236 | A METHOD AND A SYSTEM FOR THE DETERMINISTIC AUTOCONFIGURATION OF A DEVICE - A method for deterministic auto-configuration of a device upon connection to an apparatus includes as a first step, during a first-time connection of the device to the apparatus, a generation of a device-specific configuration data structure, wherein this configuration data structure identifies the configuration data of the device and/or the apparatus, which configuration data was determined during a first-time connection of the device to the apparatus. The next step is storing of the configuration data structure in the device and/or in the apparatus. During a renewed connection of the device to the apparatus, the first-time configuration data of the device and/or the apparatus is determined by means of the configuration data structure, and the device and/or the apparatus correspondingly furnishes the first-time configuration data. The system is equipped in such a way as to execute the stated method. | 2017-01-26 |
20170026237 | ROUTER AND METHOD FOR ESTABLISHING A NETWORK CONNECTION USING THE ROUTER - A method for establishing a new network connection using a router includes receiving notification of switching network modes of the router, and detecting whether a new network connection is established by the router. When the new network connection is disabled, the clients are disconnect from a LAN port of the router, a recertification request from the clients is refused, and the recertification request after a first predetermined time duration is received. Thus, a network connection is established. | 2017-01-26 |
20170026238 | Time and Motion Tracking of Health Status - A health status for a user is determined at a first network connected device based on health history stored at the first network connected device. Energy usage of a second network connected device utilized by the user is monitored by the first network connected device via messages sent to the first network connected device. A change in the health status of the user is predicted by the first network connected device based upon the messages sent to the first network connected device. Operation of at least one of the second network connected device or another network connected device is modified in response to predicting the change in the health status of the user. | 2017-01-26 |
20170026239 | DYNAMIC PORT TYPE DETECTION - An aspect includes dynamic port type detection. Packet routing paths are defined in a table of a switch for flows within a network based on a communication received on a secure channel between a network controller and the switch. A link initialization frame that includes a protocol identifier is received at a port of the switch. Based on successfully decoding the protocol identifier, the port is configured to a mode of operation compatible with the protocol identifier. The table in the switch is updated to configure one or more other ports of the switch to the mode of operation compatible with the protocol identifier. A handshake response is sent to acknowledge the successful decoding of the protocol identifier. | 2017-01-26 |
20170026240 | SYSTEM AND METHOD FOR MONITORING AND MANAGING OBJECTS ACROSS DATA CENTERS - A computer implemented method for monitoring and managing one or more objects on granular object level across datacenters is provided. The method includes following steps: (i) creating an application id; (ii) searching the one or more objects across the datacenters; (iii) adding the one or more objects to the application ID; (iv) monitoring configurations of the one or more objects; (iv) providing a graphical depiction of logs of the one or more objects; (v) providing an option to check a work order and configuration changes of the one or more objects; (vi) providing a graphical depiction of the configuration changes occurred on the one or more objects over a period of time; (vii) providing a trend graph for the one or more objects; and (viii) creating a new rule for the application ID to monitor and manage the one or more objects on granular object level. | 2017-01-26 |
20170026241 | TRANSPARENT AUTO-NEGOTIATION OF ETHERNET - A system for negotiating Ethernet link settings between interconnected nodes in a network having an Ethernet protocol stack that includes a PCS sub-layer with an auto-negotiation function. The system comprises connecting an intermediate device coupled between two network nodes via optical or copper interfaces, with the link settings between each node and the connected intermediate device being the same, thereby bypassing the auto-negotiation of the PCS sub-layer in the intermediate device. The intermediate device may transparently send negotiation messages from each node to the other during the link negotiation phase without interacting with those messages. Instead of the intermediate device, a single form pluggable (SFP) device may be connected between the two network nodes via optical or copper interfaces on the network side and via an SFP slot on the device side. | 2017-01-26 |
20170026242 | SYSTEM AND METHOD FOR USE OF A NON-BLOCKING PROCESS WITH A RESOURCE POOL IN A COMPUTING ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for use of a non-blocking process with a resource pool, for example a connection pool, or another type of computing environment. A generic wait-free approach can be used with a variety of different types of resource pools and pool elements. Threads which require access to a collection of resources do not have to wait for a lock on that collection of resources to become available. Although a borrowing thread may still be required to wait for a particular resource to be released, the wait-free approach allows the thread to browse through a list of available resources. The approach can be used with connection pools, or with other types of computing environments, to provide improved scalability in such systems. | 2017-01-26 |
20170026243 | CONFIGURATION OF A SOFTWARE DEFINED NETWORK - The present disclosure pertains to systems and method for configuration of communication flows in a software defined network (“SDN”). In one embodiment, a system is operable to configure a communication flow between a first host and a second host. A mode selection subsystem is configured to cause a plurality of network devices in a network connecting the first communication host and the second communication host to transition between an open mode and an SDN operating mode. In the open mode, the network devices may discover a communication path between the first host and the second host. An analysis subsystem may receive information from the plurality of network devices information about the discovered path, and a topology discovery subsystem may be configured to create a communication flow corresponding to the discovered path. The communication flow may allow communication between the first host and the second host in the SDN operating mode. | 2017-01-26 |
20170026244 | LOW LATENCY FLOW CLEANUP OF OPENFLOW CONFIGURATION CHANGES - One or more processors receive a notification of a failure of a first delivery device of a plurality of delivery devices of an OpenFlow network, to deliver a data packet. One or more processors determine the flows of flow tables belonging to delivery devices that are affected as a result of the failure of the first delivery device. The flows are determined by accessing an index of flow mappings maintained in cache storage in which at least one of the affected flows includes a pattern of information fields and actions that match a pattern of information fields and actions of the data packet, and one or more processors send instructions to the delivery devices of the network to perform an asynchronous activity on respective flow tables of the delivery devices that include the flows affected as a result of the failure of the first delivery device. | 2017-01-26 |
20170026245 | REFRESH OF THE BINDING TABLES BETWEEN DATA-LINK-LAYER AND NETWORK-LAYER ADDRESSES ON MOBILITY IN A DATA CENTER ENVIRONMENT - A method for assisting communication of a source host upon movement from a first Data center (DC) to a second DC is disclosed. The method includes identifying that the source host has moved from the first DC to the second DC, ensuring that packets identifying a source as the source host in the second DC are copied to a control plane network element, and, for a first destination host identified in a first packet copied to the control plane network element and identified as a host that is not in the second DC, updating an Address Resolution Protocol (ARP)/Neighbor Discovery Protocol (NDP) cache of the source host by sending, to the source host, a first ARP message/unsolicited neighbor advertisement specifying a Media Access Control (MAC) address of an edge router associated with the source host in the second DC as a destination MAC address for the first destination host. | 2017-01-26 |
20170026246 | REFRESH OF THE BINDING TABLES BETWEEN DATA-LINK-LAYER AND NETWORK-LAYER ADDRESSES ON MOBILITY IN A DATA CENTER ENVIRONMENT - A method for assisting communication of a source host upon movement from a first Data center (DC) to a second DC is disclosed. The method includes identifying that the source host has moved from the first DC to the second DC, ensuring that packets identifying a source as the source host in the second DC are copied to a control plane network element, and, for a first destination host identified in a first packet copied to the control plane network element and identified as a host that is not in the second DC, updating an Address Resolution Protocol (ARP)/Neighbor Discovery Protocol (NDP) cache of the source host by sending, to the source host, a first ARP message/unsolicited neighbor advertisement specifying a Media Access Control (MAC) address of an edge router associated with the source host in the second DC as a destination MAC address for the first destination host. | 2017-01-26 |
20170026247 | ACCESS NETWORK RELATED INFORMATION PROVISIONING SYSTEM, CONTROL APPARATUS, METHOD OF CONTROLLING THE SAME, COMMUNICATIONS TERMINAL, METHOD OF CONTROLLING THE SAME, PROGRAM, AND STORAGE MEDIUM - A control apparatus initiates, in response to a predetermined condition being satisfied, a provisioning, to a communications terminal, of information of a portion of a management object. The control apparatus generates, and transmits to the communications terminal, one or more commands comprising information of the portion including information of a reference node which is a leaf node of the management object and which contains reference information specifying a sub-tree comprising specific access network related information. The communications terminal receives the one or more commands, stores the information of the portion comprised in the one or more commands in accordance with the one or more commands, and acquires the specific access network related information of the sub-tree using the reference information of the reference node included in the information of the portion. | 2017-01-26 |
20170026248 | Dynamic Neighboring Cell Measurements - A method is disclosed of a wireless communication device connectable to a subscriber identity module and adapted to communicate with a wireless communication network using one of a first radio access technology and a second radio access technology. The method comprises determining if the subscriber identity module supports the second radio access technology and determining if the wireless communication network supports emergency call using the second radio access technology. If the subscriber identity module does not support the second radio access technology, the method comprises performing neighboring cell measurements for the second radio access technology only if the wireless communication network supports emergency call using the second radio access technology. Corresponding computer program product, arrangement and wireless communication device are also disclosed. | 2017-01-26 |
20170026249 | METHOD FOR GATHERING TRAFFIC ANALYTICS DATA ABOUT A COMMUNICATION NETWORK - There is provided a method for gathering traffic analytics data about a communication network that includes applying a heuristic that focuses on specific attributes of the communications relationships between the system assets of a network. | 2017-01-26 |
20170026250 | Method and Apparatus for Anomaly Detection in a Network - The disclosure provides a method ( | 2017-01-26 |
20170026251 | SCREENING INFORMATION FOR A COVERAGE MODEL - It is disclosed to determine whether information useable for a generating/updating process that comprises generating and/or updating at least one model for a coverage area of a communication node shall be discarded or made available to said generating/updating process. | 2017-01-26 |
20170026252 | COMMUNICATION HOST PROFILES - The present disclosure pertains to systems and methods for automating the configuration of communication hosts in a software defined network (SDN) associated with an electric power transmission and distribution system. The systems and methods presented herein may utilize communication host profiles to specify various repeatable attributes and customizable attributes that may be utilized to configure the communication host and the SDN. In one embodiment, a system may comprise a communication host profile subsystem configured to select a communication host profile associated with a communication host. The host communication profile subsystem may configure the communication host based on one or more repeatable attributes and on one or more customizable attributes specified in the host communication profile. A traffic routing system may further configure a plurality of communication flows in the SDN based on the communication host based on the host communication profile. | 2017-01-26 |
20170026253 | USER-INITIATED QUALITY OF SERVICE MODIFICATION IN A MOBILE DEVICE - A system and method that facilitates mobile device selection among available qualities of service is described herein. A mobile device presents a user interface to enable selection of change to a current quality of service on the mobile device. The user interface further enables selection of one or more parameters associated with the selected change to the current quality of service. In response to the selection, the mobile device transmits to the telecommunications network the selected change in quality of service. The mobile device then receives the selected change in quality of service if the telecommunications network is able to accommodate the selected change. | 2017-01-26 |
20170026254 | METHOD AND USER INTERFACES FOR MONITORING, INTERPRETING AND VISUALISING COMMUNICATIONS BETWEEN USERS - A computer implemented method for monitoring a plurality of communications between a first correspondent and a second correspondent, the method comprising: receiving metadata for each of the plurality of communications; determining one or more measures of association between the first and second correspondent, wherein said determining comprises identifying one or more indicators of association in said metadata; and storing in memory the one or more measures of association between the first and second correspondence. | 2017-01-26 |
20170026255 | GATHERING MONITORING DATA RELATING TO THE OPERATION OF A DATA PROCESSING SYSTEM - A system, apparatus and method for gathering monitoring data relating to the operation of a data processing system are disclosed. The data processing system comprises a monitor controller and a plurality of monitors which gather monitoring data relating to the operation of the data processing system. Each monitor does not send its monitoring data to the monitor controller unsolicited, but merely indicates to the monitor controller that it has such data ready for transmission. In response to reception of a data ready signal from more than one monitor, the monitor controller selects one of these monitors and sends it a data transmission command, thereby avoiding resource contention in a shared resource between data transmissions from more than one monitor. | 2017-01-26 |
20170026256 | EXPORTING REAL TIME NETWORK TRAFFIC LATENCY AND BUFFER OCCUPANCY - Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information is captured describing occupancy of the buffer caused by packet flow through the buffer in the network device. Analytics packets are generated containing the information. The analytics packets from the network device for retrieval of the information contained therein for analysis, replay of buffer occupancy, etc. | 2017-01-26 |
20170026257 | METHODS AND APPARATUS FOR OPERATING AN ACCESS NETWORK - Methods and apparatus are disclosed for operating an access network including data connections ( | 2017-01-26 |
20170026258 | Detecting and Alerting Performance Degradation During Features Ramp-up - Computerized techniques are described for detecting performance degradation during features ramp up. A first version of web content is sent to first client devices. The first version of the web content lacks a particular feature. First performance data that indicates performance of each first client device with respect to processing the web content is received. A second version of the web content is sent to second client devices. The second version of the web content has the particular feature. Second performance data that indicates performance of each second client device with respect to processing the web content is received. The first performance data is compared with the second performance data to determine a difference between a processing metric associated with the first version of the web content and a processing metric associated with the second version of the web content. | 2017-01-26 |
20170026259 | SYSTEM AND METHOD FOR JITTER-AWARE BANDWIDTH ESTIMATION - A receiver and method for estimating an available bandwidth of a data channel streaming video data are provided. In one embodiment, the receiver includes: (1) a physical interface configured to receive the video data from a network, (2) a packet memory configured to store frames of the video data, (3) a dispersed packet time calculator configured to calculate a total time for one of the frames to go through the data channel, and (4) a bandwidth estimator configured to determine the available bandwidth of the data channel based on a number of data units received for the one frame and the total time. | 2017-01-26 |
20170026260 | DETERMINING CONNECTIONS OF A NETWORK BETWEEN SOURCE AND TARGET NODES IN A DATABASE - In an embodiment of the invention, a system determines connections between source and target nodes in a network by determining edges with common nodes between the source and target nodes within the network for each of one or more hops. Each determined edge links a pair of nodes in a network path between the source and target nodes. The system removes certain edges from the determined edges to produce a resulting set of edges. In particular, each removed edge is an edge that includes a node within a loop in the network or is an edge that is unconnected to another edge. The system determines connections between the source and target nodes based on the resulting set of edges. Embodiments of the present invention further include a method and computer program product for determining connections between source and target nodes in a network in substantially the same manners described above. | 2017-01-26 |
20170026261 | DETERMINING CONNECTIONS OF A NETWORK BETWEEN SOURCE AND TARGET NODES IN A DATABASE - In an embodiment of the invention, a system determines connections between source and target nodes in a network by determining edges with common nodes between the source and target nodes within the network for each of one or more hops. Each determined edge links a pair of nodes in a network path between the source and target nodes. The system removes certain edges from the determined edges to produce a resulting set of edges. In particular, each removed edge is an edge that includes a node within a loop in the network or is an edge that is unconnected to another edge. The system determines connections between the source and target nodes based on the resulting set of edges. Embodiments of the present invention further include a method and computer program product for determining connections between source and target nodes in a network in substantially the same manners described above. | 2017-01-26 |
20170026262 | DEEP PATH ANALYSIS OF APPLICATION DELIVERY OVER A NETWORK - Techniques for deep path analysis of application delivery over a network are disclosed. In some embodiments, deep path analysis of application delivery over a network includes monitoring a network path between an agent and a destination; determining the network path between the agent and the destination; and generating a graphical visualization of the network path. | 2017-01-26 |
20170026263 | File Block Placement in a Distributed Network - Pipelines for distributing file block in distributed file system network can be determined using a crawler algorithm. The crawler algorithm can iteratively identify links in a pipeline from for a starting node to one or more data storage nodes. In each iteration the pipeline can be extended based on the costs associated with the links on the pipeline with the resulting cost propagated as the pipeline is extended. The link costs indicate congestion on the links. Costs may also be back propagate from the data storage nodes. | 2017-01-26 |
20170026264 | TRANSMISSION DEVICE AND TRAFFIC AMOUNT MEASUREMENT METHOD - A transmission device includes: one or more processors; and a memory configured to store a program which is executed by the one or more processors, wherein the one or more processors is configured to: measure a communication traffic amount on a line; calculate a degree of change in the communication traffic amount; compare the degree of change in the communication traffic amount with a threshold; and measure, in accordance with a comparison result, the communication traffic amount on the line in accordance with one of a first measurement cycle and a second measurement cycle that is shorter than the first measurement cycle. | 2017-01-26 |
20170026265 | METHODS AND SYSTEMS FOR DETERMINING PERFORMANCE CAPACITY OF A RESOURCE OF A NETWORKED STORAGE ENVIRONMENT - Methods and systems for a networked storage system are provided. One method includes filtering performance data associated with a resource used in a networked storage environment for reading and writing data at a storage device; and determining available performance capacity of the resource using the filtered performance data. The available performance capacity is based on optimum utilization of the resource and actual utilization of the resource, where utilization of the resource is an indicator of an extent the resource is being used at any given time, the optimum utilization is an indicator of resource utilization beyond which throughput gains for a workload is smaller than increase in latency and latency is an indicator of delay at the resource in processing the workload. | 2017-01-26 |
20170026266 | BANDWIDTH ESTIMATION CIRCUIT, COMPUTER SYSTEM, METHOD FOR ESTIMATING AND PREDICTING THE BANDWIDTH AND COMPUTER READABLE PROGRAM PRODUCT - The present invention relates to a bandwidth estimation circuit for estimating and predicting the bandwidth of a computer system, the bandwidth estimation circuit comprising: a memory unit which is configured to store multiple predetermined bandwidth envelopes, wherein each one of the predetermined bandwidth envelopes is assigned to a feature of a code of an application program; a bandwidth measurement unit which is configured to online measure the bandwidth of a data transaction based on the code; a selection unit coupled either to the memory unit and the bandwidth measurement unit and configured to find the nearest bandwidth envelopes in the memory unit for the measured bandwidth; a calculation unit which is configured to calculate a ratio between the selected bandwidth envelopes, to construct a new bandwidth envelope by applying an interpolation function based on the calculated ratio and to calculate an estimated bandwidth by applying the new bandwidth envelope. The present invention also relates to a computer system, a method for estimating and predicting the bandwidth and a computer readable program product. | 2017-01-26 |
20170026267 | SPAM FLOOD DETECTION METHODOLOGIES - A computer-implemented method and system are provided in which characteristics of a website are analyzed to determine whether the website represents a potential source of spam, and, in response to the analyzing, flags content of the website as spam content. To analyze the website, a total number of posts associated with the website is computed and a publication frequency for the total number of posts can then be calculated. Based on the computed total number and the calculated publication frequency, it can be determined whether the website in its entirety represents spam content. For instance, the calculated publication frequency can be compared to a threshold frequency, and when the calculated publication frequency is greater than the threshold frequency, the website in its entirety as can be identified and flagged as spam content. | 2017-01-26 |
20170026268 | SPAM FLOOD DETECTION METHODOLOGIES - A computer-implemented method and system are provided in which characteristics of a website are analyzed to determine whether the website represents a potential source of spam content. The analysis can include generating a characterizing signature of a webpage containing a content item, and obtaining an occurrence count for the generated characterizing signature. The characterizing signature is derived from formatting data of the webpage. When the obtained occurrence count is greater than a threshold count, the content item can be identified as spam content, and flagged as spam content. | 2017-01-26 |