07th week of 2019 patent applcation highlights part 69 |
Patent application number | Title | Published |
20190052513 | MULTIPLEXERS WITH PROTECTION SWITCHING - The present invention is directed to data communication. In certain embodiments, the present invention provides switching mechanism for choosing between redundant communication links. Data received from a first set of communication links are processed to have alignment markers removed, and first figure of merit value is determined based on the data without alignment markers. Similarly, a second figure of merit value is determined for the data received from the second set of communication links. A switch selects between the first set of communication links and the second set of communication links based on their respective figure of merit values. Alignment markers are inserted into the data transmitted through the selected set of data links. There are other embodiments as well. | 2019-02-14 |
20190052514 | SYSTEM FOR DECOMPOSING EVENTS FROM MANAGED INFRASTRUCTURES WITH SEMANTIC CURVATURE - Methods and system are provided for decomposing events from managed infrastructures. The system decomposes events from a managed infrastructure and includes a first engine that receives data from a managed infrastructure which includes managed infrastructure physical hardware. The infrastructure physical hardware supports the flow and processing of information. A second engine determines common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure. Membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to support the flow and processing of information. Events are produced that relate to the managed infrastructure. The events are converted into words and subsets used to group the events that relate to failures or errors in the managed infrastructure, including the managed infrastructure physical hardware. The events have textural context. Semantic meaning is applied to the textual context of the events. A change to a managed infrastructure physical hardware component is made. | 2019-02-14 |
20190052515 | ELECTRONIC VOLUME CORRECTOR WITH CLOUD ENABLED HEALTH MONITORING OF ASSOCIATED GAS DISTRIBUTION EQUIPMENT - A system and method for distributed error detection in gas distribution systems comprises sensors coupled to a metering device, and configured to collect sensor information indicative of an operation of the metering device. An electronic volume corrector associated with the metering device serves as a gateway for transmission of sensor information indicative of the operation of the metering device. A computer system is configured to receive sensor information indicative of an operation of the metering device provided by an electronic volume corrector, identify parameters indicative of deviations from the intended operation of the metering device, perform pattern comparisons of the sensor information with reference information, and provide a performance indication of the metering device. | 2019-02-14 |
20190052516 | CORRELATION ACROSS NON-LOGGING COMPONENTS - Systems are provided for logging transactions in heterogeneous networks that include a combination of one or more instrumented components and one or more non-instrumented components. The instrumented components are configured to generate impersonated log records for the non-instrumented components involved in the transaction processing hand-offs with the instrumented components. The impersonated log records are persisted with other log records that are generated by the instrumented components in a transaction log that is maintained by a central logging system to reflect a complete flow of the transaction processing performed on the object, including the flow through the non-instrumented component(s). | 2019-02-14 |
20190052517 | CORRELATION ACROSS NON-LOGGING COMPONENTS - Systems are provided for logging transactions in heterogeneous networks that include a combination of one or more instrumented components and one or more non-instrumented components. The instrumented components are configured to generate impersonated log records for the non-instrumented components involved in the transaction processing hand-offs with the instrumented components. The impersonated log records are persisted with other log records that are generated by the instrumented components in a transaction log that is maintained by a central logging system to reflect a complete flow of the transaction processing performed on the object, including the flow through the non-instrumented component(s). | 2019-02-14 |
20190052518 | NETWORK PERFORMANCE ROOT-CAUSE ANALYSIS - A data-driven approach to network performance diagnosis and root-cause analysis is presented. By collecting and aggregating data attribute values across multiple components of a content delivery system and comparing against baselines for points of inspection, network performance diagnosis and root-cause analysis may be prioritized based on impact on content delivery. Alerts may be generated to present recommended courses of action based on the tracked performance analysis. | 2019-02-14 |
20190052519 | METHOD AND NETWORK NODE FOR MANAGING RESOURCE ALLOCATION IN TRAFFIC RESTORATION - A method and a network node for managing allocation of network resources in restoration of traffic in a connection oriented network are disclosed. The method comprises restoring a first traffic from a first path on an alternative path if the first path is affected by a first failure and assigning a reserved status to resources of the first path no longer used for carrying the first traffic. If a second path is affected by a second failure the method comprises restoring a second traffic from the second path, wherein the restoration of the second traffic does not use the resources having the reserved status. | 2019-02-14 |
20190052520 | COOPERATIVE ACTIVE-STANDBY FAILOVER BETWEEN NETWORK SYSTEMS - A method of determining the state of each peer node in a pair of first and second peer nodes is provided. The first node is configured as a confirmed active node and the second node is configured as a standby node. The second node transitions into a tentative active mode when a predetermined number of heartbeat messages are lost between the pair nodes while the first and second nodes remain functional. The second node receives a first message from the first node after the heartbeat messages are established between the peer nodes. The first message indicates that the first node is in the confirmed active mode. In response to the first message, the second node transitions from the tentative active mode into the standby mode and sends a second message from the second node to the first node indicating that the second node is in the standby mode. | 2019-02-14 |
20190052521 | HIGH AVAILABILITY STORAGE POOL COMPOSE MECHANISM - Systems and method for automatically composing resources with redundant fabric switches to support dual path HA storage access operation in a data center are provided. A data management module can be used to determine one or more drives in the data center that are connected to fabric switches. The fabric switches have a same chassis ID. The data management module can then associate the one or more drives to a first computer system via one fabric switch of the fabric switches, and associate the one or more to a second computer system via the other one fabric switch of the two fabric switches. In response to receiving a request from a specific user, the data management module can compose suitable resources of the data center to match the request based at least upon the one or more drives, the two switches, the first computer system, and the second computer system. | 2019-02-14 |
20190052522 | VEHICLE COMMUNICATIONS - A vehicle system includes a telematics control unit (TCU) coupled to a plurality of vehicle controllers. The TCU is configured to periodically record in a log wireless activity data relating to an authentication, attachment, signaling, detachment, and handover procedure of the TCU to provide one or more remote vehicle services. The TCU is further configured to, responsive to detecting a cellular malfunction from the logged data, wirelessly transmit at least a portion of the log that corresponds to the cellular malfunction offboard the vehicle for a remote server configured to diagnose operation of the TCU. | 2019-02-14 |
20190052523 | SYSTEM AND METHOD TO DEFINE INTERNET CONTROL RULES IN WI-FI BASED ON LAYOUT - The present disclosure is a method for method for applying control rules to a mobile device in an environment. The method comprises the first step of loading a virtual boundary of an environment onto a Wi-Fi router, which is wirelessly connected to an access point in the environment. Such virtual boundary can be a layout of a home, office, or other building. Next, the method includes the steps of assigning a control rule to the virtual boundary, receiving a data packet at the Wi-Fi router from a Wi-Fi enabled mobile device in the virtual boundary and connected to the access point, and applying the control rule to the data packet. | 2019-02-14 |
20190052524 | IDENTIFYING AND AUTOMATING A DEVICE TYPE USING IMAGE DATA - Techniques for identifying a type of an electronic device using image data corresponding to the electronic device are provided. For example, a method may include receiving image data and textual data corresponding to an electronic device. The image data and textual data may be analyzed, and a type of the electronic device can be identified based on the analysis. Usage data associated with other electronic devices of the same type may be analyzed, and further processing may be performed based on the analysis of the usage data. In some embodiments, the further processing may include transmitting a message to a user device, the message including content related to usage of the electronic device. | 2019-02-14 |
20190052525 | INTELLIGENT ROLE SELECTION FOR DUAL-ROLE DEVICES - Embodiments described herein are directed to mechanisms that enable roles (e.g., host vs. function, power provider vs. power consumer, master vs. slave, server vs. client, source vs. sink, upstream vs. downstream) to be dynamically assigned between two interconnected dual-role devices in an intelligent and deterministic manner based on the available context on each device. | 2019-02-14 |
20190052526 | Device Configuration Method and Apparatus that are Based on Network Configuration Protocol - A device configuration method, apparatus, and system based on Network Configuration Protocol (NETCONF), and belong to the field of communications technologies. The method includes establishing, by a network management device, a model of configuration data using a predefined Yet Another Next Generation (YANG) model, and sending the configuration data to a managed device based on NETCONF. The predefined YANG model includes n reference fields and one or more object fields separately corresponding to each reference field. Hence, resolves problems that when an extension field is added to a NETCONF message to indicate a target lower-level device of configuration data in the NETCONF message in a device cascading scenario, solution universality is relatively poor, configuration processing efficiency is relatively low, and a data storage processing procedure is relatively complex. | 2019-02-14 |
20190052527 | ADAPTING DEMODULATION REFERENCE SIGNAL CONFIGURATION IN NETWORKS USING MASSIVE MIMO - Based on the receipt of a demodulation reference signal from a user equipment, a determination can be made by the network node that a demodulation reference signal configuration is not suitable for the condition of a transmission link between the network node and the user equipment. In response to this determination, the demodulation reference signal configuration can be modified. | 2019-02-14 |
20190052528 | NETWORK FUNCTION VIRTUALIZATION MANAGEMENT ORCHESTRATION APPARATUS, METHOD - There is provided an apparatus comprising: a unit that receives, from a sender, a registration request of an execution condition of a lifecycle of a virtual function under a virtual environment and registers the execution condition of the lifecycle in a storage unit; a unit that secures in advance one or more resources necessary for execution of the lifecycle in the virtual function; a unit that determines whether or not the execution condition of the lifecycle registered in the storage unit is satisfied; a unit that instructs the execution of the lifecycle when the execution condition of the lifecycle is satisfied; and a unit that notifies the lifecycle execution result to the sender of the registration request of the execution condition of the lifecycle. | 2019-02-14 |
20190052529 | NETWORK DEVICE SYSTEM, METHOD FOR IMPLEMENTING NETWORK DEVICE SYSTEM AND COMPUTER-READABLE STORAGE MEDIUM - A network device system, a method for implementing a network device system and a computer-readable storage medium. The method includes: determining first times needed by functional modules of a network device in implementing respective functions according to processing abilities of physical resources; estimating second times needed by the functional modules in implementing respective functions according to the first times of the functional modules and empirical factors corresponding to the functional modules; determining physical resources needed by the network device according to the second times of the functional modules; and determining a scheduling scheme of the functional modules at current configurations according to the physical resources needed by the network device and scheduling schemes corresponding to different configurations of the functional modules. Hence, resources may be flexibly configured to meet different demands for traffics, thereby ensuing transmission quality while improving energy efficiency. | 2019-02-14 |
20190052530 | DYNAMIC TRAFFIC-AWARE INTERFACE QUEUE SWITCHING AMONG PROCESSOR CORES - Examples include techniques for monitoring a data packet transfer rate at an interface queue, and based at least in part on a comparison of the data packet transfer rate to a threshold, assigning the interface queue from a core of a first class to a core of a second class or assigning the interface queue from a core of the second class to a core of the first class. | 2019-02-14 |
20190052531 | SYSTEMS AND METHODS FOR SERVICE MAPPING - A system includes a non-transitory memory and one or more hardware processors. The hardware processors are configured to read instructions from the non-transitory memory to perform operations including generating a service mapping illustrating a plurality of discovered configuration items connected to a network and one or more connections between the plurality of discovered configuration items, wherein at least one of the plurality of discovered configuration items comprises a virtual platform server, receiving input data from the generated service mapping associated with the virtual platform server, wherein the input data indicates one or more manual configuration item additions, validating the input data of the one or more manual configuration item additions, update the service mapping to include the one or more manual configuration item additions, generating a specified number of tasks to be performed by the service mapping, and determining an amount of time for the updated service mapping to respond to the set number of tasks. | 2019-02-14 |
20190052532 | CROSS LAYER SIGNALING FOR NETWORK RESOURCE SCALING - Cross layer signaling for network resource scaling is disclosed. For example, a service executed on a container associated with a bandwidth setting is associated with a load balancer including a service traffic monitor and a latency setting included in a network switch with a network bandwidth monitor, both monitors communicating with a policy engine. The network bandwidth monitor determines first and second bandwidth usage rates of the service over a first time period and a later second time period. The service traffic monitor determines first and second request rates of the service over third and fourth time periods overlapping with the first and second time periods. The policy engine calculates first and second ratios of the first and second bandwidth usage rates to the first and second request rates. The latency setting or the bandwidth setting is increased based on comparing the first and second ratios. | 2019-02-14 |
20190052533 | DISCOVERY AND CONFIGURATION OF AN OPEN NETWORKING ADAPTER IN A FABRIC NETWORK - Implementations generally relate methods, systems, and computer readable media for discovery of an open network adapter. In some implementations, a method includes receiving, by a software-defined network (SDN) controller, a notification of an open networking adapter (ONA) establishing a connection with a switch, the ONA having an address associated therewith. The method further includes identifying the switch based on a lookup of the address of the ONA in forwarding tables of a neighboring switch of the SDN controller. The method further includes applying a service profile configuration to a port of the switch where the ONA is connected. | 2019-02-14 |
20190052534 | MANAGING HETEROGENEOUS CLUSTER ENVIRONMENT - An embodiment includes a method for use in managing a cluster comprising a plurality of computers, each computer comprising at least one hardware processor coupled to at least one memory. The method comprises a computer-implemented manager: collecting access pattern data for the plurality of computers; based at least in part on the access pattern data, determining that at least a first one of the plurality of computers is overutilized; and responsive to determining that the first computer is overutilized, moving stored data from the first computer to at least a second one of the plurality of computers. | 2019-02-14 |
20190052535 | NETWORK TOPOLOGY SYSTEM AND BUILDING METHOD FOR TOPOLOGIES AND ROUTING TABLES THEREOF - A network topology system having a plurality of nodes for data exchange is provided, with the number of said nodes being N. The nodes are sequentially connected to form a ring communication configuration. N is an even integer. The i-th node of said nodes connects to the [(i+m) mod N]-th and [(i+p) mod N]-th nodes according to a connection rule. The j-th node of said nodes connects to the [(j−m) mod N]-th and [(j+p) mod N]-th nodes according to the connection rule. i and j are non-negative integers and are less than N. m and p are integers and not larger than N. Here, i and m are odd numbers, and j and p are even numbers. | 2019-02-14 |
20190052536 | Methods, Systems and Computer Program Products for Identifying Endpoints in a Network - Methods for identifying in range endpoints in a network are provided. The methods includes providing a map including endpoints in the network, the endpoints including target endpoints, out of range endpoints and non-out of range endpoints; positioning a grid over the map including the endpoints in the network, the grid including a plurality of subsections each having a defined radius, locating a target endpoint on the map and in one of the subsections of the grid; and identifying a plurality of endpoints within subsections of the grid within a defined range of the target endpoint. | 2019-02-14 |
20190052537 | HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTURE - In various exemplary embodiments, a system and associated method for providing a hybrid cloud computing environment are disclosed. For example, a system may authorize an enterprise user based on an enterprise identity. Once authenticated, embodiments may use mapping data and a cloud role to determine an identity to use when the enterprise user accesses a cloud. | 2019-02-14 |
20190052538 | LLDP BASED RACK MANAGEMENT CONTROLLER - What is disclosed is a system and method to use discovery packets, such as in an LLDP message, for determining operational status of a rack system. A network device is connected to the port of a switch. Operational data may be sent or received via a discovery packet to the network device. The operational data may be determined by a management agent on the network device and sent to a management controller via the discovery packet. The operational data may be determined by the management controller and sent to the network device. | 2019-02-14 |
20190052539 | PROGRAMMABLE TESTER FOR MASTER-SLAVE DEVICE NETWORKS - Embodiments include apparatuses, methods, and systems for testing that include a programmable tester coupled to a master-slave device network having a master device and at least one slave device. The programmable tester is to receive a configuration mode from a host to test a function of a selected device of the master device or the at least one slave device. The configuration mode is to indicate that the programmable tester is to be configured to operate in a slave mode or in a master mode. The programmable tester is further configured according to the configuration mode, to send test data to test the function of the selected device, determine a test result based on response data by the selected device to the test data, and indicate whether the selected device is in a faulty state with respect to the function. Other embodiments may also be described and claimed. | 2019-02-14 |
20190052540 | METHODS AND SYSTEMS FOR IMPROVED COMPUTER NETWORK ANALYSIS - A computer-implemented method for determining service flow rank based on service flow dependency is provided. The method includes receiving a plurality of data flow information for a plurality of data flows. Each data flow of the plurality of data flows includes a source, a destination, a start time, and an associated service. The method also includes determining a plurality of dependency sets based on the plurality of data flow information. Each dependency set of the plurality of dependency sets includes at least a first data flow and a second data flow. The method further includes calculating a plurality of dependency strengths based on the plurality of dependency sets, calculating a plurality of total service scores based on the first data flows of the plurality of dependency sets, and calculating a plurality of service flow ranks based on the plurality of dependency strengths and the plurality of total service scores. | 2019-02-14 |
20190052541 | SERVER SIDE CONTENT DELIVERY NETWORK QUALITY OF SERVICE - Aspects of the present disclosure involve systems and methods for monitoring and quantifying the performance of a content delivery network (CDN) from a client side perspective based on server side events. In one particular embodiment, one or more content servers of the CDN may provide connectivity or other performance information to a collector device or site. This information may be reported by each of the content servers for each request for content received at the server. The collector site may then store the received performance information in a database for analysis by one or more systems. | 2019-02-14 |
20190052542 | SYSTEM AND METHOD FOR PROVIDING VISUALIZATIONS OF COMPUTING INFRASTRUCTURE USING A DOMAIN-SPECIFIC LANGUAGE FOR CLOUD SERVICES INFRASTRUCTURE - A system and method for generating a visualization of cloud-based computing system based on a domain-specific language file is provided. In one or more examples, the domain-specific language file is compiled so as to generate a data file. The data file is parsed to generate an intermediate file that converts the computing resources found in the data file into symbolic representations. The intermediate file is then processed so as to produce a position for each symbol within the symbolic representation. Finally, the symbolic representation is rendered using a markup language such as HTML. | 2019-02-14 |
20190052543 | VISUALIZATION OF INTRA-VEHICULAR COMMUNICATIONS NETWORKS - Methods, systems, computer-readable media, and apparatuses are presented for computer-assisted visualization of network devices. One example involves receiving a plurality of standardized network description files describing a plurality of vehicular communication networks connecting a plurality of electronic control units (ECU) for a vehicle. Each of the plurality of standardized network description files may describe a vehicular communication network in the plurality of vehicular communication networks. Each vehicular communication network may comprise a subset of the plurality of ECUs and one or more network communications paths interconnecting the subset of ECUs. The example can further involve automatically generating, based on the standardized network description files, a visual topology representation of the plurality of vehicular communication networks connecting to the plurality of ECUs. The visual topology representation may include at least one ECU connected to at least two vehicular communication networks in the plurality of vehicular communication networks. | 2019-02-14 |
20190052544 | CLOUD SECURITY TOOL - An apparatus includes a scanner and a cloud engine. The scanner determines that a first cloud environment is of a first type and that a second cloud environment is of a second type that is different from the first type. The cloud engine selects a first tool and a second tool. The cloud engine also sets a first parameter and a first configuration for the first tool and a second parameter and a second configuration for the second tool. The cloud engine further receives a first alert that a security vulnerability in the first cloud environment has been detected and a second alert that resource consumption in the second cloud environment has exceeded a threshold. The cloud engine communicates a first solution to resolve the security vulnerability in the first cloud environment and a second solution to lower resource consumption in the second cloud environment. | 2019-02-14 |
20190052545 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SERVING AN APPLICATION FROM A CUSTOM SUBDOMAIN - In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for serving an application from a custom subdomain can enable improved data security, enhanced system performance, optimized resource utilization, etc. | 2019-02-14 |
20190052546 | APPARATUS AND METHODS FOR MANAGING SERVICE DELIVERY TELEMETRY - Apparatus and methods for managing service delivery quality levels and telemetry. In one embodiment, an entity (such as a Session Resource Manager or SRM) receives network layout data from the network. The SRM uses the layout data to generate a mapping of the network. The SRM also receives performance data related to the interconnections of the network. The performance data is then applied to the mapping such that, in one variant, an visual overlay showing network flow and/or performance analytics is created. Based on this mapping showing layout and corresponding performance, the SRM generates rules for delivery of services. The rules may detail preferred routes and service level information. The rules are the distributed to nodes along the delivery route and delivery is executed in compliance with the rules. | 2019-02-14 |
20190052547 | AUTOMATED SLA NON-COMPLIANCE DETECTION AND PREVENTION SYSTEM FOR BATCH JOBS - A method and system is disclosed herein for detecting one or more violations in managing service level agreements (SLA) in an information technology service management (ITSM). A batch job system is characterized by the set of jobs and dependencies between jobs. Each job is in turn characterized by run-time, from-time and SLA definitions. SLAs can be of two kinds Start-time and End-time. Start-time SLA requires that the job execution starts before the specified time while End-time SLA necessitates that the job finishes its execution before the specified time. To optimize processing time required for executing one or more batch jobs the disclosure identifies SLA violations and solves them to produce a set of actionable levers. | 2019-02-14 |
20190052548 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR AUTOMATICALLY CERTIFYING A VIRTUAL NETWORK FUNCTION (VNF) FOR USE IN A NETWORK FUNCTION VIRTUALIZATION (NFV) BASED COMMUNICATION NETWORK - A system, method, and computer program product are provided for automatically certifying a Virtual Network Function (VNF) for use in a Network Function Virtualization based (NFV-based) communication network. In use, an online automated VNF certification system receives information associated with at least one VNF. Further, the online automated VNF certification system performs a first level of certification for the at least one VNF by validating metadata corresponding to the information associated with the at least one VNF. Additionally, the online automated VNF certification system performs a second level of certification for the at least one VNF, including testing deployment based functionality associated with the at least one VNF and validating results of testing the deployment based functionality. Still yet, the online automated VNF certification system performs a third level of certification for the at least one VNF by executing one or more test cases associated with the at least one VNF and validating results of executing the one or more test cases. Moreover, the online automated VNF certification system identifies the at least one VNF as certified as a result of performing the third level of certification for the at least one VNF. | 2019-02-14 |
20190052549 | SYSTEMS AND METHODS FOR DOMAIN-DRIVEN DESIGN AND EXECUTION OF METAMODELS - An order is received indicating a network service model. A context of the order is identified. A deployment plan is generated using the network service model, the deployment plan facilitating an instantiation of a contextually-motivated network service instance as a set of normalized lifecycle management (LCM) operations performed against each of a plurality of associated service entities. The deployment plan is deployed, the deploying including binding each of the normalized LCM operations, based on the context of the order, to one or more respective micro-capabilities, each of the respective micro-capabilities having previously been onboarded to the system as one or more corresponding modeled objects capable of being declaratively composed, each of the corresponding modeled objects including a mapping of object properties, object behaviors, and standard LCM operations to one or more existing micro-capabilities of the system. The deploying also including managing execution of the one or more respective micro-capabilities and associated resources, associated storage, and associated network and service allocation and configuration, to instantiate the contextually-motivated network service instance. | 2019-02-14 |
20190052550 | SYSTEM AND METHOD FOR PROVIDING A SERVICE MANAGEMENT ENGINE FOR USE WITH A CLOUD COMPUTING ENVIRONMENT - A system and method for providing a service management engine for use with a cloud computing environment. In accordance with an embodiment, enterprise software applications (e.g., Fusion Middleware applications) can be instantiated as services within a cloud platform, where they are then made accessible by other (e.g., customer) applications. In an embodiment, a service management engine (SME), in communication with an orchestration engine, can be used to provision services as one or more different service types, according to a service definition package (SDP). Service types can be instantiated according to the configuration of the cloud platform itself, and the contents of the SDP, including discovering, provisioning, and associating service types with system resources, to address different customer requirements. | 2019-02-14 |
20190052551 | CLOUD VERIFICATION AND TEST AUTOMATION - Various communication systems may benefit from an improved cloud verification platform. For example, a cloud verification platform that can test and verify the underlying cloud infrastructure on behalf of the cloud application in an automated and systematic fashion may be helpful. A method may include connecting to a cloud verification service for testing a cloud infrastructure. The method may also include triggering execution of a virtual network function on the cloud infrastructure. In addition, the method may include testing a key attribute of the cloud infrastructure with the executed virtual network function using the cloud verification service. Further, the method may include sending a metric of the key attribute of the cloud infrastructure or the virtual network function to a user equipment. | 2019-02-14 |
20190052552 | METHOD AND SYSTEM FOR NETWORK ELEMENTS TO INTERNALLY PROBE THEIR FORWARDING ELEMENTS - In general, the invention relates to a method and system for probing forwarding elements of network elements. | 2019-02-14 |
20190052553 | ARCHITECTURES AND METHODS FOR DEEP PACKET INSPECTION USING ALPHABET AND BITMAP-BASED COMPRESSION - A signature matching hardware accelerator systems and methods for deep packet inspection (DPI) applies two different compression processes to a deterministic finite automaton (DFA) used for content awareness application processing of packet flows in a communication network. Signatures related to awareness content are represented through simple strings or regular expressions in a database and are converted into a automaton, which is a state machine using the characters and state transitions to match data in incoming packets. The two compression processes include applying an alphabet compression process to reduce redundant characters and related state transitions, and then applying a two dimensional bitmap-based compression process to further reduce redundant state transitions. | 2019-02-14 |
20190052554 | REAL-TIME CONFIGURATION DISCOVERY AND MANAGEMENT - Embodiments are directed to monitoring network traffic in a network. A network monitoring engine may monitor networks to collect characteristics associated with network flows. The network monitoring engine may be arranged to identify entities on the network based on characteristics associated with the network flows. The network monitoring engine may provide entity profiles based on the identified entities and the characteristics. A configuration management engine may compare the entity profiles with configuration item (CI) entries in a database. The configuration management engine may provide discrepancy notices based on differences discovered during the comparison. Accordingly, the network monitoring engine may execute one or more policies to perform one or more additional actions based on the one or more discrepancies notices. Also, the configuration management engine may perform audits of an organization's information technology infrastructure to identify one or more violations of compliance policies. | 2019-02-14 |
20190052555 | MEASURING AND COMPENSATING FOR JITTER ON SYSTEMS RUNNING LATENCY-SENSITIVE AUDIO SIGNAL PROCESSING - A system and method receives one or more captured signals through a captured audio path and produces one or more playback signals through a playback audio path. The system and method executes one or more signal processing functions and measures the delays within the playback audio path and captured audio path during operation of the one or more signal processing functions. The system and method stores the measured delays in a memory and compensates the one or more signal processing functions for the playback delay and the capture delay. | 2019-02-14 |
20190052556 | METHOD AND SYSTEM FOR PROBING FORWARDING ELEMENTS OF NETWORK ELEMENTS - In general, the invention relates to a method and system for probing forwarding elements of network elements. | 2019-02-14 |
20190052557 | METHODS AND SYSTEMS FOR ENHANCED ROUND TRIP TIME (RTT) EXCHANGE - Disclosed are systems, methods and devices for obtaining round trip time measurements for use in location based services. In particular implementations, a fine timing measurement request message wirelessly transmitted by a first transceiver device to a second transceiver device may permit additional processing features in computing or applying a signal round trip time measurement. The fine timing measurement may include one or more files specifying a requested number of fine timing measurement messages requested for transmission from the first wireless transceiver device in response to fine timing measurement request message. Such a signal round trip time measurement may be used in positioning operations. | 2019-02-14 |
20190052558 | METHOD AND SYSTEM FOR ROUTING CONNECTIONS IN A SOFTWARE-DEFINED WIDE AREA NETWORK - In accordance with an embodiment of the invention, a method for routing connections in an SD-WAN is disclosed. The method involves receiving TURN server performance metrics via Border Gateway Protocol (BGP) and receiving network performance metrics from calculations made using Service Level Agreement (SLA) protocol data units (PDUs) for TURN servers in an SD-WAN, generating a score for at least one TURN server in the SD-WAN based on the received TURN server performance metrics and received network performance metrics for the at least one TURN server, selecting a TURN server based on the score generated for the at least one TURN server, and routing a connection over the selected TURN server. | 2019-02-14 |
20190052559 | METHOD AND SYSTEM TO AVOID TEMPORARY TRAFFIC LOSS WITH BGP ETHERNET VPN MULTI-HOMING WITH DATA-PLANE MAC ADDRESS LEARNING - Embodiments are directed to a process and system for recovering from data link failure in a network, by retaining, in a first provider edge device, path information for a first host coupled to a second host over the network in a control plane, upon indication of withdrawal of the first host from a second provider edge device, starting a timer controlling a period of re-advertisement and re-routing to the first host, removing, in the first provider edge device, the first host from a data plane, and generating, in the first provider edge device, a new route to advertise the first host address to cause other provider edge devices to receive the new route and adjust their respective control plane routes prior to expiration of the timer. | 2019-02-14 |
20190052560 | MULTI-CHANNEL COMMUNICATION - Multi-channel communication over wired and/or wireless communication mediums is contemplated. The multi-channel communication may be of the type sufficient to facilitate data delivery utilizing two or more channels/paths associated with an access point configured to facilitate communications with a plurality of devices. The multi-channel communications may be controlled to maximize performance through limitations placed on communications permitted over one or more of the channels/paths. | 2019-02-14 |
20190052561 | STITCHING LABEL-SWITCHED PATHS BETWEEN AUTONOMOUS SYSTEMS WITH INTERNET PROTOCOL ROUTING - Systems and methods for routing traffic through a network along Label-Switched Paths (LSPs) that may extend across multiple autonomous systems include performing Internet Protocol (IP) routing lookups as a packet is transmitted along the LSP. In one implementation, a packet having a predetermined value (which may be inserted by an upstream network device) is received at a network device after travelling along a first segment of an LSP. In response to identifying the predetermined label value of the packet, the network device may perform an IP routing lookup using IP routing information included in the packet to identify a next hop for the packet. The network device may then update a label of the packet such that the packet is routed along a second segment of the LSP and transmit the communication packet to the next hop. | 2019-02-14 |
20190052562 | METHOD FOR PROCESSING DATA IN ETHERNET, DEVICE, AND SYSTEM - A data processing method, a related device, and a system are provided. The method executed by a first network device includes receiving PDH frame data; loading the PDH frame data and a stuffing bit into a virtual container to obtain the virtual container that includes the PDH frame data, where the stuffing bit in the virtual container carries information about a clock frequency difference between a clock frequency of the Ethernet and a clock frequency of the PDH frame data; and performing virtual-container PWE3 encapsulation on the virtual container to obtain a virtual-container PWE3 packet. In at least some embodiments, difficulty in recovering the clock frequency of the PDH frame data when the PDH frame data is transmitted in the Ethernet is reduced, clock frequency jitters and drifts caused by the clock frequency recovery are reduced, and user experience is improved. | 2019-02-14 |
20190052563 | DATA REPRODUCTION DEVICE FOR PLANT-MONITORING CONTROL SYSTEM - A data reproduction device ( | 2019-02-14 |
20190052564 | Network element with congestion-aware match tables - A network element includes a plurality of ports and processing circuitry. The ports are configured for connecting to a communication network. The processing circuitry is configured to receive a packet from the communication network via one of the ports, to assign the packet to a selected queue, to verify whether the packet matches a rule, wherein matching the packet to the rule depends on whether the selected queue is congested, and, when the packet matches the rule, to apply to the packet an action associated with the rule. | 2019-02-14 |
20190052565 | DETERMINATION AND INDICATION OF NETWORK TRAFFIC CONGESTION - In one embodiment, a system comprising memory and processor(s), the processor(s) at least adapted to compute representative latency value(s) for a network device, based on a plurality of latency values obtained for a plurality of packets which passed through the network device over a period of time, the plurality of latency values indicative of latency between ingress to and egress from the network device, obtain latency value(s) for packet(s) which passed through the network device after the period of time, the latency value(s) indicative of latency between ingress to and egress from the network device, determine a determination of congestion level(s) for the network device, including analyzing at least one of the latency value(s) in relation to at least one of the representative latency value(s), and generate an indication in accordance with the determination, the indication to be outputted on at least one output device. | 2019-02-14 |
20190052566 | CONGESTION AVOIDANCE IN A NETWORK SWITCH DEVICE - Packets received by a network switch device from upstream network devices, coupled to respective ones of a plurality of ports of the network switch device, are temporarily stored in an internal memory of the network switch device. In response to detecting a first congestion state in the internal memory, the network switch device transmits a first flow control message via a first subset of ports, without transmitting the flow control message via any port not included in the first subset of ports, to cause upstream network devices in a first subset of upstream network devices to temporarily suspend transmission of packets to the network switch device. The network switch device alternates between causing different subsets of the network devices to temporarily suspend transmission of packets to the network switch device, while continuing to monitor congestion in the internal memory of the network switch device. | 2019-02-14 |
20190052567 | NON-RANDOM FLOWLET-BASED ROUTING - There is disclosed in one example a network switch, including an ingress port and a plurality of egress ports to provide a plurality of paths for a packet; a switching circuit to provide network switching; circuitry to identify the start of a flowlet; circuitry to select a non-random path for the flowlet; circuitry to latch the selected path for the flowlet; and a load balancer to receive a packet, match the packet to the flowlet, and direct the packet to the selected path. | 2019-02-14 |
20190052568 | DYNAMIC QUALITY OF SERVICE FOR OVER-THE-TOP CONTENT - A method, non-transitory computer readable medium and apparatus for changing a quality of service for data packets that are delivered over-the-top are disclosed. For example, the method includes a processor that identifies the data packets as video data packets that are delivered over-the-top in a communication network, changes the quality of service associated with the data packets from a best effort quality of service level to a higher priority quality of service level, monitors the data packets until no video data packet is identified in the data packets and changes the quality of service associated with the data packets back to the best effort quality of service level from the higher priority quality of service level. | 2019-02-14 |
20190052569 | CROSS-SESSION NETWORK COMMUNICATION CONFIGURATION - In a general aspect, a method for data communication over a data channel on a data path between a first node and a second node includes maintaining data characterizing one or more current or previous data communication connections traversing the data channel and initiating a new data communication connection between the first node and the second node including configuring the new data communication connection at least in part according to the maintained data. | 2019-02-14 |
20190052570 | MULTI-PATH NETWORK COMMUNICATION - A method for data communication between a first node and a second node over a number of data paths coupling the first node and the second node includes transmitting messages between the first node and the second node over the number of data paths including transmitting a first subset of the messages over a first data path of the number of data paths, and transmitting a second subset of the messages over a second data path of the number of data paths. The first data path has a first latency and the second data path has a second latency substantially larger than the first latency, and messages of the first subset of the messages are chosen to have first message characteristics and messages of the second subset are chosen to have second message characteristics, different from the first message characteristics. | 2019-02-14 |
20190052571 | MINIMAL BUFFER NETWORK ARBITER - A network arbiter and associated method for linking and controlling the rate of data transmission between a sender on a connected network and a client with an advertised receive window are disclosed. The network arbiter comprises a downstream temporary storage for temporarily storing data in transmission from the sender to the client, an upstream temporary storage for temporarily storing data in transmission from the client to the sender and a processor operatively connected to the downstream temporary storage and the upstream temporary storage. The processor is configured to alter the advertised receive window in order to modulate the rate of data transmission. | 2019-02-14 |
20190052572 | Method And Apparatus For Avoiding Packet Fragmentation In Mobile Communications - Various solutions for avoiding packet fragmentation with respect to user equipment and network apparatus in mobile communications are described. An apparatus may determine a first maximum transmission unit (MTU) configuration of a session via a first network interface. The apparatus may determine a second MTU configuration of the session via a second network interface. The apparatus may determine a tunnel overhead size between the second network interface and the first network interface. The apparatus may select a transport protocol to generate a packet according to the second MTU configuration and the tunnel overhead size. The apparatus may transmit the packet via the second network interface. | 2019-02-14 |
20190052573 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a memory; and a processor coupled to the memory and configured to determine whether a size of data is equal to a predetermined threshold or less when degradation occurs on a communication path to a destination information processing apparatus of the data; transmit the data to another information processing apparatus different from the destination information processing apparatus and coupled to the destination information processing apparatus when it is determined that the size of the data is more than the predetermined threshold; and transmit the data to the destination information processing apparatus through the communication path when it is determined that the size of the data is the predetermined threshold or less. | 2019-02-14 |
20190052574 | RESOURCE AUTHORIZATION METHOD FOR DEPLOYMENT OF VIRTUAL NETWORK FUNCTION, VIRTUAL NETWORK FUNCTION MANAGER, AND NETWORK FUNCTION VIRTUALIZATION ORCHESTRATOR - The present disclosure provides a resource authorization method for deployment of a VNF, a VNFM, an NFVO, a storage medium and a device. The resource authorization method includes steps of: determining, by the VNFM, whether or not there is a resource request; in the case that there is the resource request, transmitting, by the VNFM, a resource authorization request to the NFVO; receiving, by the VNFM, a resource authorization response from the NFVO, the resource authorization response containing a resource authorization result; and processing, by the VNFM, the resource authorization result. | 2019-02-14 |
20190052575 | METHODS AND SYSTEMS PROVIDING A SCALABLE PROCESS FOR ANOMALY IDENTIFICATION AND INFORMATION TECHNOLOGY INFRASTRUCTURE RESOURCE OPTIMIZATION - A method for anomaly identification and IT resource optimization includes retrieving, by a workload engine executing on a first computing resource, from a database populated by a client agent executing on a second computing resource, a metric associated with a process. The method includes analyzing, by the workload engine, the retrieved metric and the process. The method includes associating, by the workload engine, at least one workload with the process, responsive to the analysis. The method includes analyzing, by an exception engine executing on the first computing resource, the retrieved metric, the process, and the at least one workload; analyzing includes applying at least one workload rule to the at least one workload. The method includes identifying, by the exception engine, an operational anomaly within the process, responsive to the analysis by the exception engine. The method includes providing a recommendation for mitigating the operational anomaly. | 2019-02-14 |
20190052576 | INTERNET-BASED PROXY SECURITY SERVICES - A proxy server receives from a client device a request to perform an action on an identified resource that is hosted at an origin server for a domain. The proxy server receives the request as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server and the origin servers are owned by different entities. The proxy server analyzes the request to determine whether a visitor belonging to that request poses a threat. If the proxy server determines that the visitor poses a threat, the proxy server blocks the request and transmits a block page to the client device that indicates that the request has been blocked. | 2019-02-14 |
20190052577 | MOCA CONNECTIVITY BETWEEN RF AMPLIFIERS OR SPLITTER DEVICES - A bi-directional RF signal amplifier includes a housing with an RF input port. A power divider network within the housing terminates to a plurality of active RF output ports. An active communications path connects the RF input port to the power divider network. A passive communications path connects the RF input port to a passive RF output port. A MoCA input/output port is provided on the housing. A MoCA signal path connects the power divider network to the MoCA input/output port, and a MoCA pass filter is located along the MoCA signal path. In another embodiment, a passive splitter includes a housing with an RF input port, a power divider network, and a plurality of CATV/MoCA RF output ports. A CATV communications path connects the RF input port to the power divider network. A MoCA input/output port is provided on the housing. A MoCA signal path connects the power divider network to the MoCA input/output port, and a MoCA pass filter is located along the MoCA signal path. | 2019-02-14 |
20190052578 | HARMONIZED CONTROL PLANES, SYSTEMS AND METHODS - A network switch comprises a plurality of optical physical transport layer resources and a control plane management engine capable of receiving, via a request over a network interface, at least one control plane provisioning policy that maps at least one upper layer resource to at least some of the optical physical transport layer resources. The control plane management engine provisions at least some of the optical physical transport layer resources for use by at least one virtual control plane, which operates according to rules of the control plane provisioning policy. The control plane management engine is configured to manage network traffic among the at least some optical physical transport layer resources and external networking nodes according to the at least one virtual control plane. | 2019-02-14 |
20190052579 | LIFECYCLE MANAGEMENT FOR NSI AND CSI - A network management entity configured to: deactivate a Network Slice Instance without releasing network resources previously allocated to the Network Slice Instance; and subsequent to deactivating the Network Slice Instance, activating the Network Slice Instance using the network resources previously allocated to the Network Slice Instance. A Network Slice Management Function (NSMF) perform slice specific Lifecycle Management (LCM) for a Network Slice Instance (NSI) based on Communication Service Instance (CSI) requirements is also disclosed. Customer Service Management Function (CSMF) for receiving service requirements from a Service Manager (SM) and transmitting the CSI requirements a Network Slice Management Function (NSMF) is also disclosed. | 2019-02-14 |
20190052580 | Interactions Between A Broadband Network Gateway And A Fifth Generation Core - A broadband network gateway (BNG) in a wireline network. The BNG includes an interworking function in a control plane (IF-CP), the IF-CP configured to use a control plane interface (N1′/N2′) between the BNG in the wireline network and a fifth generation (5G) core in a 5G network to couple a control plane of the BNG to a control plane of the 5G core; an interworking function in a user plane (IF-UP), the IF-UP configured to use a user plane interface (N3′) between the BNG in the wireline network and the 5G core in the 5G network to couple a user plane of the BNG to a user plane of the 5G core; and a transmitter configured to transmit data packets toward the 5G core after the user plane of the BNG and the user plane of the 5G core have been coupled. | 2019-02-14 |
20190052581 | COMPLIANCE TEST APPARATUS AND METHOD FOR A COMMUNICATION NODE - An apparatus for a compliance test on a communication node includes: a monitoring port; a switch turning on or off a connection between the monitoring port and a communication port connected to the communication node; and a processor controlling the switch to turn on or off the connection between the monitoring port and the communication port. | 2019-02-14 |
20190052582 | BUFFER MANAGEMENT FOR MULTIPLE RADIO ACCESS TECHNOLOGIES - Certain aspects of the present disclosure relate to methods and apparatus for buffer management for a user equipment (UE) for multiple radio access technologies (RATs). Certain aspects provide transmitting data using a first RAT and second RAT to the UE based on an assumed size of a first portion of a buffer at the UE assumed allocated for storing data received by the UE using the first RAT and an assumed size of a second portion of the buffer assumed allocated for storing data received by the UE using the second RAT. The size of the first portion is based on a first number of resources the UE is capable of using for communicating and a second number of resources the UE is configured or allocated to use. The size of the second portion is based on an overall size of the buffer and the size of the first portion. | 2019-02-14 |
20190052583 | SCALABLE COMMUNICATION WITH A PACKET PROCESSING UNIT - Particular embodiments described herein provide for a system for enabling communication between a packet processing unit and a network interface controller (NIC) using an extension object, the system can include memory, one or more processors, and a processing unit extension object engine. The processing unit extension object engine can be configured to cause a packet to be received at the packet processing unit, where the packet processing unit is on a system on chip (SoC), add an extension object portion to the packet to create a modified packet, and cause the modified packet to be communicated to the NIC located on the same SoC. In an example, the extension object portion includes type data and partition data. The packet can be an Ethernet packet and the extension object portion can be added before a payload portion of the packet. | 2019-02-14 |
20190052584 | PASSING EMOTIONAL CHATBOT SESSIONS TO THE BEST SUITED AGENT - Embodiments of the present invention disclose a method, computer program product, and system for an automated chat bot conversation session and an agent transfer system for the conversation session. The computer receives a user input from a user in an automated chat bot conversation session. The computer analyzes the user input for at least one sentiment, wherein an at least one analysis result is a value assigned to the at least one sentiment contained within the user input. The computer compares the at least one analysis result to a threshold value to determine if the user should be transferred from the automated chat bot conversation session to a conversation session with a suitable agent. The computer then transfers the user to the conversation session with the suitable agent. | 2019-02-14 |
20190052585 | VIRTUAL CHAT ROOMS - One or more computing devices, systems, and/or methods for hosting virtual chat rooms of a chat room are provided. For example, users (e.g., 3,000 users) may access video interfaces, hosting a video, and chat room interfaces associated with a chat room for the video (e.g., users may access a news website providing a live stream of a current event along with a chat room for discussing the live stream). Signals of the users (e.g., a user location, age, account profile information, prior chat room message behavior, etc.) are evaluated to identify user properties (e.g., the user is an active participant within chat rooms). The chat room may be sharded into a set of virtual chat rooms into which users are assigned based upon the user properties (e.g., 300 virtual chat rooms of 100 users each). In this way, users may have more meaningful interactions within the smaller virtual chat rooms. | 2019-02-14 |
20190052586 | METHOD AND APPARATUS FOR CLASSIFYING ELECTRONIC MESSAGES - Systems and methods for processing a message are provided. A message may be processed to generate a message summary by removing or replacing certain words, phrases, sentences, punctuation, and the like. Message signatures based upon the message summary may be generated and stored in a signature database, which may be used to identify and/or classify spam messages. Subsequently received messages may be classified by signature and processed based on classification. | 2019-02-14 |
20190052587 | APPLICATION-INDEPENDENT MESSAGING SYSTEM - Among other things, embodiments of the present disclosure improve the functionality of electronic messaging software and systems by allowing senders to transmit messages and content using a messaging system, and recipients to access such messages and content, even if the recipients do not have access to the messaging system. | 2019-02-14 |
20190052588 | SYSTEM FOR SHARING MEDIA FILES - A media file is shared by a user by first registering with a media-sharing-server. Upon registration, the user submits facial recognition images, which are used by the media-sharing-server to identify received media files that pertain to that user. Other users also register and agree to share media by conveying to the media-sharing-server media files created upon capturing images or audio. | 2019-02-14 |
20190052589 | SYSTEMS AND METHODS FOR IMPROVED PROCESSING OF MESSAGE QUERIES - A method of processing messages executes at a computing device having one or more processors and memory. The memory stores one or more programs configured for execution by the one or more processors. A first message for a user is analyzed for a structured content element. When found, content from a data source distinct from the message is obtained by executing an associated action. A first message display state is formed for the message comprising a message notification and the content. A messaging application user interface, comprising an electronic message list with a plurality of objects, is updated. Responsive to selection of a first object of the plurality of objects, the first object representing the first message, the user is enabled to toggle the first message display state between first and second display states, the second display state differing from the first by providing direct access to the first message. | 2019-02-14 |
20190052590 | TELECOMMUNICATION AND MULTIMEDIA MANAGEMENT METHOD AND APPARATUS - A telecommunication and multimedia management apparatus and method that supports voice and other media communications and that enables users to: (i) participate in multiple conversation modes, including live phone calls, conference calls, instant voice messaging or tactical communications; (ii) review the messages of conversations in either a live mode or a time-shifted mode and to seamlessly transition back and forth between the two modes; (iii) participate in multiple conversations either concurrently or simultaneously; (iv) archive the messages of conversations for later review or processing; and (v) persistently store media either created or received on the communication devices of users. The latter feature enables users to generate or review media when either disconnected from the network or network conditions are poor and to optimize the delivery of media over the network based on network conditions and the intention of the users participating in conversations. | 2019-02-14 |
20190052591 | IDENTIFYING RELEVANT CONTENT CONTAINED IN MESSAGE STREAMS THAT APPEAR TO BE IRRELEVANT - A first level of relevance, to at least one interest of a user, of content within a topic message within a message stream can be determined. Responsive to determining that the first level of relevance, to the at least one interest of the user, of the content within the topic message is below a threshold value, each of a plurality of reply messages within the message stream can be processed using natural language processing performed by a processor. For each of the reply messages, a respective second level of relevance of the reply message to the at least one interest of the user can be determined. For each of the reply messages for which the respective second level of relevance is equal to or above the threshold value, an alert can be presented to bring an attention of the user to the reply message. | 2019-02-14 |
20190052592 | SYSTEM AND METHOD FOR REGULATING ELECTRONIC MESSAGE TRANSMISSIONS - Systems and methods for regulating electronic messages transmissions. A message delay system is disposed between one or more first entities and a second entity within at least one network. Electronic messages are received from among at least one the first entities and the second entity at one or more message arrival times. A message delay component applies a delay to each received electronic message, based on a predefined delay time common to all of the first entities and a first entity delay offset associated with a first entity that is associated with the received message. The first entity delay offset is based on a geographical origin of the first entity relative to a geographical origin of the second entity. Each delayed message is transmitted to a designated recipient via the network, where the designated recipient is among the second entity and the first entities. | 2019-02-14 |
20190052593 | LEVERAGING AN INTERNET OF THINGS TO INITIATE A PHYSICAL OBJECT TO PERFORM A SPECIFIC ACT THAT ENHANCES AN INTERACTION OF A USER WITH THE PHYSICAL OBJECT - An enterprise IoT concentrator can receive, from a first community IoT concentrator, first data corresponding to a security issue detected by at least one of a first plurality of devices located within a first physical environment, wherein the first plurality of devices are communicatively linked to one another within a first device domain that is a member of a first device community which includes the first community IoT concentrator. Responsive to receiving the first data, the enterprise IoT concentrator can process the first data to generate second data corresponding to the security issue. The second data can be configured to be processed by a second community IoT concentrator to initiate at least one device located within a second physical environment to perform a specific act that enhances security in the second physical environment. The enterprise IoT concentrator can communicate the second data to the second community IoT concentrator. | 2019-02-14 |
20190052594 | Smart Routing Synchronization System for Providing an Optimally Sourced Broadcast to a Social Consumer Group - Smart routing synchronization systems socialize a synthetic rebroadcast or group stream for enabling members of a user group to (re)broadcast select content to other members of the user group and collaboratively curate content delivery. The systems are based on a content-identification process and further a process for (re)broadcasting content. These processes are cooperable among a group of member clients each of which are in communication with at least two content sources. The synchronization process identifies select content and directs delivery of the content from an optimal resource for each member client via a smart routing protocol. The (re)broadcast process prompts delivery of the select content to members of the user group from a content origination member of the group, and group members are thereby able to simultaneously access the content for the purpose of providing a content-based platform for social interaction. | 2019-02-14 |
20190052595 | CLIENT SUBNET EFFICIENCY BY EQUIVALENCE CLASS AGGREGATION - A method for improving client subnet efficiency by equivalence class aggregation includes receiving a Domain Name System (DNS) query from a client, determining, based on predetermined class criteria, that the client is associated with an equivalency class, searching a cache associated with the equivalence class for an answer corresponding to the DNS query, and upon locating the answer, serving the answer to the client. If it is determined that the cache does not include the answer, the method proceeds with querying, by a recursive server, an authoritative server using client subnet data associated with the equivalence class, receiving the answer from the authoritative server, storing the answer to the cache associated with the equivalency class, and serving the answer to the client. The client subnet data may include a representative CIDR block, the representative CIDR block being used to make queries on behalf of all clients associated with the equivalence class. | 2019-02-14 |
20190052596 | DNS RENDEZVOUS LOCALIZATION - A method of generating a routing table containing information as to the weighted distance between client's that use a resolver and each rack gateway, taking into account how traffic to each client can egress from the CDN AS. The routing table is generated from matrix multiplication of two matrices. One matrix contains information as to the proportion of each client's use of each resolver in a first autonomous system. The second matrix contains information as to the distance between each client and each rack, with respect to an egress gateway, in a second autonomous system. The resulting routing table is used to identify a gateway from which to serve content to a client. | 2019-02-14 |
20190052597 | OPTIMIZING CHOICE OF NETWORKING PROTOCOL - Network performance data metrics are gathered and aggregated. A policy engine chooses an optimal selection of networking protocol based on the metrics. Data delivery strategies are applied to a portion of a network to deliver content using the received choice of networking protocol policy optimized by machine learning techniques. | 2019-02-14 |
20190052598 | MANAGING NETWORK CONNECTIVITY BETWEEN CLOUD COMPUTING SERVICE ENDPOINTS AND VIRTUAL MACHINES - Described herein are systems, methods, and software to enhance connectivity between cloud computing service endpoints and virtual machines. In one implementation, a method of managing data packet addressing in a first namespace includes receiving a data packet at a first interface for the first namespace, wherein the first interface is paired with a second interface of a second namespace. The method also includes identifying if the packet is destined for a service node in an underlay network outside of an overlay network for the second namespace, and if destined for a service node outside of an overlay network for the second namespace, modifying addressing in the data packet to support the underlay network and transferring the data packet over a virtual network interface for the virtual machine. | 2019-02-14 |
20190052599 | METHOD FOR TRANSMITTING AT LEAST ONE IP DATA PACKET, RELATED SYSTEM AND COMPUTER PROGRAM PRODUCT - A method for transmitting an Internet Protocol (IP) data packet from a first device to a second device, includes: transmitting a message from the first device to a telephone number associated with the second device; receiving the message at the second device and, in response to the message, determining a first IP address of the first device and transmitting a first IP packet from the second device to the first IP address; receiving the first IP packet at the first device and determining a source IP address of the first IP packet; and transmitting a second IP packet from the first device to the source IP address of the first IP packet. | 2019-02-14 |
20190052600 | ONE STEP REMOVED SHADOW NETWORK - A system and method includes an operational network that communicates with an external network by opening a first transmission protocol socket. A data diode coupled to the operational network and a gateway enables the one-way transfer of all information received from the external network and transmitted by the operational network to the gateway such that no information travels from the gateway to the operational network or the external network. The gateway opens a second transmission protocol socket by mapping a sequence number to an acknowledgement number and increasing that mapped acknowledgement number by a value of one. A transmitter then transmits the acknowledgment to a remote network or a gateway. | 2019-02-14 |
20190052601 | DYNAMICALLY DEFINED VIRTUAL PRIVATE NETWORK TUNNELS IN HYBRID CLOUD ENVIRONMENTS - A method, apparatus and computer program product manage a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. A first virtual private network (VPN) agent manages a first VPN tunnel in a plurality of VPN tunnels. The first VPN tunnel provides communication for traffic between a first node in a first cloud and a second node in a second cloud in a hybrid cloud environment. The agent receives a request from a VPN manager which includes a first set of requirements for a first cloud application for the first VPN tunnel in the plurality of VPN tunnels. The agent creates the first VPN tunnel according to the first set of requirements. Next, the agent receives a modification request from the VPN manager containing a second set of requirements for a second cloud application. The modification request comprises a request either to tune the first VPN tunnel according to both the first and second set of requirements if the first and second requirements are compatible. Alternatively, the request may include creating a second VPN tunnel between the first node and the second node if the first and second requirements are not compatible. The second VPN tunnel is managed by the VPN agent. | 2019-02-14 |
20190052602 | GENERATING RULES TO DETECT SECURITY VULNERABILITIES BASED ON VULNERABILITY PRIMITIVES WITH ENTRY POINT FINDER - A computer-based method is disclosed for generating rules to detect security vulnerabilities in a target business-critical application computer system based on vulnerability primitives. The method includes running a computer-based entry point finder at the target business-critical application computer system so that the entry point finder can access and extract information about source code that is actually installed at the target business-critical application computer system. The computer-based entry point finder creates a graphical-style database that represents software objects extracted from the target business-critical application computer system and relationships between the extracted software objects. The process includes identifying a vulnerability primitive for a security vulnerability at the target business-critical application computer system, and correlate the vulnerability primitive against information in the graphical-style database to help identify any relationships between a software object that is identified by the vulnerability primitive as being vulnerable and one or more other software objects in the target business-critical application computer system. | 2019-02-14 |
20190052603 | A METHOD FOR SECURE WIFI CALLING CONNECTIVITY OVER MANAGED PUBLIC WLAN ACCESS - Embodiments of the invention relate to methods and apparatus for establishing a secure connectivity for WiFi calling service to the EPC over a trusted or managed WLAN by establishing an IPSec tunnel over the WLAN with a gateway in the EPC (ePDG) through an HTTP server and logging to the HTTP server that may be co-located with the ePDG. The disclosure could enable internet traffic to be routed through the WLAN or through the HTTP server itself while routing WiFi calling service related traffic through the HTTP server and ePDG. The UE authentication used to establish the IPSec tunnel is used as a common authentication for the secure connectivity for WiFi calling service and local routing of internet traffic as permitted. | 2019-02-14 |
20190052604 | NETWORK ISOLATION - Methods and systems are disclosed for isolation of communications between a host computer system and one or more untrusted network destinations. An Internet isolation system may include a network, one or more host computer systems, a border firewall, an authorization device, and/or a proxy device. The Internet isolation system may be configured to implement network isolation between one or more untrusted network destinations, the one or more host computer systems, and/or the network. The network isolation may be implemented via one or more of a host-based firewall on each of the one or more host computer systems, the border firewall, the authorization device, the proxy device, an internal isolation firewall on each of the one or more host computer systems, and/or a segregation of a trusted memory space and an untrusted memory space on each of the one or more host computer systems. | 2019-02-14 |
20190052605 | Secure Communications with Internet-Enabled Devices - A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer. | 2019-02-14 |
20190052606 | Secure Communications with Internet-Enabled Devices - A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer. | 2019-02-14 |
20190052607 | RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORK - According to an exemplary embodiment, there is provided a method of operating a terminal device. The method includes operating the terminal device in a connected state with respect to the communication network. The method further includes receiving a first signal from a first radio access node in the communication network indicating that the connected state is to be suspended, the first signal including information for use in determining a first key for encrypting data to be sent between the terminal device and one of the first radio access node and another radio access node in the communication network if the connected state is resumed. | 2019-02-14 |
20190052608 | ESTABLISHING A COMMUNICATION EVENT USING SECURE SIGNALLING - A communication event is established between an initiating device and a responding device under the control of a remote communications controller. In a pre-communication event establishment phase, a secure connection is established between the initiating device and the communications controller, and session key negotiation messages are exchanged between the initiating device and the communications controller via the secure connection to obtain session key data in an electronic storage location accessible to the initiating device. The secure connection terminates once the session key data has been obtained. In a subsequent communication event establishment phase—after the session key data has been obtained and the secure connection has terminated in the pre-establishment phase—a communication event request is transmitted from the initiating device to the communications controller comprising a payload encrypted with the session key data. | 2019-02-14 |
20190052609 | ESTABLISHING A COMMUNICATION EVENT USING SECURE SIGNALING - A communication event is established between an initiating device and a responding device under the control of a remote communications controller. In a pre-communication event establishment phase, a secure connection is established between the initiating device and the communications controller, and session key negotiation messages are exchanged between the initiating device and the communications controller via the secure connection to obtain session key data in an electronic storage location accessible to the initiating device. The secure connection terminates once the session key data has been obtained. In a subsequent communication event establishment phase—after the session key data has been obtained and the secure connection has terminated in the pre-establishment phase—a communication event request is transmitted from the initiating device to the communications controller comprising a payload encrypted with the session key data. | 2019-02-14 |
20190052610 | APPARATUS AND METHOD FOR ENCAPSULATION OF PROFILE CERTIFICATE PRIVATE KEYS OR OTHER DATA - A method includes generating a first encryption key based on a first cryptographic operation performed by cryptographic circuitry and involving a cryptographic key securely stored in a memory of the cryptographic circuitry. The method also includes encrypting data to be protected using the first encryption key and storing the encrypted data on a persistent storage device external to the cryptographic circuitry. The method could also include retrieving the encrypted data from the persistent storage device. The method could further include generating a second encryption key based on a second cryptographic operation performed by the cryptographic circuitry and involving the cryptographic key, where the second encryption key matches the first encryption key. In addition, the method could include decrypting the encrypted data using the second encryption key. | 2019-02-14 |
20190052611 | SECURED DATA TRANSMISSION USING IDENTITY-BASED CRYPTOGRAPHY - A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which each of the public encryption keys are unique to a designated message recipient and generated using an input including the public master key, a validity period, and an identifier of the designated message recipient. The system may also store a revocation list that includes identifiers of message recipients that have revoked access to the public master key or private decryption key, and based thereon determine whether or not to encrypt and transmit the work order message, or receive and decrypt the work order message. | 2019-02-14 |
20190052612 | Approach for Message Level Encryption for Service APIs - Disclosed are requesting party and responding party computer systems which perform a message level encryption for messages sent through the computer systems. Using the message level encryption, the computer systems may prevent those with access to an unsecured zone in one or more of the computer systems from viewing the messages. | 2019-02-14 |