08th week of 2016 patent applcation highlights part 62 |
Patent application number | Title | Published |
20160056950 | COMMUNICATION SYNCHRONIZATION - Aspects of the present disclosure provide communications between local and remote devices having low-frequency (LF) and high-frequency (HF) circuits. As may be implemented in accordance with one or more embodiments, the local device transmits an LF signal to the remote device, which synchronizes its clock based on the LF signal. Another LF signal is communicated from the local device to the remote device using a reduced quality factor, which can be implemented to facilitate synchronization. The clock is resynchronized based on the second LF signal and used to transmit an HF signal with a time delay. The local device synchronizes its clock based on the HF signal, and transmits another HF signal to the remote device using the clock and another time delay. The remote device re-synchronizes its clock based on the second HF signal while accounting for a trip time for communicating the first and/or second HF signals. | 2016-02-25 |
20160056951 | COMMUNICATION APPARATUS AND RECEPTION METHOD - In a communication apparatus for receiving signals of frequency channels, a synchronization determiner determines whether synchronization of a demodulated signal is established. A BER calculator calculates a pseudo BER of the demodulated signal with the synchronization established. A comparator detects a frequency channel having the lowest pseudo BER, that is, the best value of the evaluation scale defined for transmission quality. A correction value calculator calculates a correction value for a symbol clock frequency in each frequency channel, based on a symbol clock frequency deviation in the frequency channel having the best value of the evaluation scale. | 2016-02-25 |
20160056952 | SEMICONDUCTOR DEVICE, RADIO COMMUNICATION TERMINAL, AND METHOD FOR CONTROLLING SEMICONDUCTOR DEVICE - A semiconductor device according to the present invention includes a PLL circuit, in which the PLL circuit includes: a phase difference detection unit that detects a phase difference between a reference signal and a division signal; a filter that outputs a control signal according to a detection result of the phase difference detection unit; an oscillation unit that outputs an oscillation signal of a frequency according to the control signal; a division unit that divides the oscillation signal to output it as the division signal; a noise intensity detection unit that detects a noise intensity of a predetermined frequency component included in the control signal; and a phase difference adjustment unit that adjusts a phase difference between the reference signal and the division signal based on the noise intensity detected by the noise intensity detection unit. | 2016-02-25 |
20160056953 | DATA GENERATING DEVICE, COMMUNICATION DEVICE, MOBILE OBJECT, DATA GENERATING METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a data generating device includes a first generator, an obtainer, a second generator, a verifier, and an operation selector. The first generator generates device-specific first data. The obtainer obtains second data from outside of the data generating device. The second generator generates third data based on the first data and the second data. The verifier verifies correctness of the third data. When the third data is determined to be incorrect, the operation selector selects at least one of regenerating the first data, re-obtaining the second data, and disabling the data generating device according to a predetermined selection rule. | 2016-02-25 |
20160056954 | APPARATUS AND METHOD FOR PROVIDING FEISTEL-BASED VARIABLE LENGTH BLOCK CIPHER - An apparatus and method for providing a Feistel-based variable length block cipher, which are configured to when plaintext having a certain bit length is encrypted, generate ciphertext having the same bit length as plaintext, and to decrypt ciphertext into plaintext having the same bit length. The apparatus includes an encryption/decryption key generation unit for generating a number of encryption/decryption keys corresponding to a preset number of rounds, based on a secret key, the length of the secret key, the length of plaintext, and a round constant; an encryption/decryption tweak generation unit for generating an encryption/decryption tweak based on a tweak, a length of tweak, and the length of plaintext; and a ciphertext output unit for outputting ciphertext having length identical to that of plaintext, based on plaintext, the length of the plaintext, the length of the secret key, the encryption/decryption keys, and the encryption/decryption tweak. | 2016-02-25 |
20160056955 | Symmetrical iterated block encryption method and corresponding apparatus - A symmetrical iterated block encryption method includes: a bitwise XOR combination of a predetermined data word of a predetermined block with a predetermined data word of a predetermined round key; and a bitwise XOR combination of the predetermined data word with at least one other predetermined data word. | 2016-02-25 |
20160056956 | SYSTEMS AND METHODS FOR SECURE WORKGROUP MANAGEMENT AND COMMUNICATION - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split or share a data set into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting an original data set into portions of data that may be communicated using one or more communications paths. Secure workgroup communication is supported through the secure distribution and management of a workgroup key for use with the secure data parser. | 2016-02-25 |
20160056957 | AUTONOMOUS AND SEAMLESS KEY DISTRIBUTION MECHANISM - A satellite system comprises first and second devices, one of the first and second devices being a satellite and the other one of the first and second devices being a device arranged to send signals to the satellite and/or receive signals from the satellite. A session key can be distributed in the satellite system by obtaining the session key at the first device, protecting the session key at the first device, based on a private key of the first device and a public key of the second device, and transmitting the protected session key from the first device to the second device. The second device can receive the protected session key from the first device and obtain the session key from the protected session key based on a public key of the first device and a private key of the second device. Replay detection information can be transmitted with the protected session key, for determining whether the session key has been transmitted previously. The protected session key can be transmitted by inserting a predetermined number of bytes of the protected session key into each frame of a data stream, for example a telemetry (TM) data stream as defined in the Consultative Committee for Space Data Systems (CCSDS) TM protocol. Validity information can be transmitted with the protected session key, defining a period in which the session key is valid. The protected session key can be transmitted bonded to a command message, for example a telecommand (TC) as defined in the CCSDS TC protocol. | 2016-02-25 |
20160056958 | INFORMATION RENDERING SCHEME - Technologies are generally described for implementing an information rendering scheme. In some examples, a method performed under control of an end device may include obtaining a decryption key; decrypting encrypted information based on the obtained decryption key; and rendering the decrypted information stored in a video random access memory (VRAM) that is operatively connected to a graphic processing unit (GPU) of the end device. | 2016-02-25 |
20160056959 | Key Management For Secure Communication - A method and arrangement is disclosed for managing session keys for secure communication between a first and at least a second user device in a communications network. The method is characterized being independent of what type of credential each user device implements for security operations. A first user receives from a first key management server keying information and a voucher and generates a first session key. The voucher is forwarded to at least a responding user device that, with support from a second key management server communicating with the first key management server, resolves the voucher and determines a second session keys. First and second session keys are, thereafter, used for secure communication. In one embodiment the communication traverses an intermediary whereby first and second session keys protect communication with respective leg to intermediary. | 2016-02-25 |
20160056960 | SYSTEM AND METHOD FOR EXECUTION OF A SECURED ENVIRONMENT INITIALIZATION INSTRUCTION - A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations. | 2016-02-25 |
20160056961 | METHOD, APPARATUS, AND INSTRUCTIONS FOR SAFELY STORING SECRETS IN SYSTEM MEMORY - Embodiments of an invention for method, apparatus, and instructions for safely storing secrets in system memory are disclosed. In one embodiment, a processor includes a hardware key, an instruction unit, and an encryption unit. The instruction unit is to receive an encryption instruction and a compare instruction. The encryption instruction is to have a first plaintext input value. The compare instruction is to have a second plaintext input value. The encryption unit is to, in response to the encryption instruction, encrypt the first plaintext input value using the hardware key to generate a ciphertext value, and, in response to the compare instruction, decrypt the ciphertext value using the hardware key to generate a plaintext output value and compare the plaintext output value to the second plaintext input value. | 2016-02-25 |
20160056962 | TRANSACTION AUTHORIZATION METHOD AND SYSTEM - Authorizing transactions by an authentication provider involves at least one preparatory phase and an authorization phase. The preparatory phase includes registering a user account with several personal devices, each with an authentication application installed. The authorization phase receives knowledge of the transaction; determines the user account related to the transaction; determines at least one personal device registered with the user account related to the transaction; receives a request for details specific to the transaction from at least one personal device; provides the authentication application of the at least one personal device with the requested details specific to the transaction; receives from the authentication application a digitally signed transmission which indicates transaction-specific instructions received by the authentication application; and authorizes or denies the transaction based on the received transaction-specific instructions. | 2016-02-25 |
20160056963 | POLICY-BASED SIGNATURE AUTHENTICATION SYSTEM AND METHOD - In various example embodiments, a system and method for providing policy-based authentication is provided. In example embodiments, a request to access and sign a document is received from a device of an intended signer. A policy assigned to the intended signer is determined. Based on the policy, a determination is made whether an authentication mechanism is applicable to the intended signer. In response to the determining that the authentication mechanism is applicable to the intended signer, the intended user is required to perform the authentication mechanism. The intended user is provided access to view and sign the document based on the intended user satisfying the authentication mechanism. | 2016-02-25 |
20160056964 | HANDLING SENSOR DATA - An apparatus, a system and a method for securing sensor data by a security engine circuitry of a system on chip (SoC). For example, the security engine may receive from a processor circuitry of the SoC an inter processor communication (IPC) request to secure sensor data, and may send to an integrated sensor hub (ISH) of the SoC an IPC request to receive sensor data. The ISH may collect sensor data from one or more internal and/or external sensors, and may send the collected sensor data to the security engine. The security engine may receive the collected sensor data from the ISH, may secure the collected sensor data, and may send secured sensor data to the processor circuitry. | 2016-02-25 |
20160056965 | MANAGEMENT OF DIGITAL CERTIFICATES - Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server. | 2016-02-25 |
20160056966 | System and Method to Control a Wireless Power Transmission System by Configuration of Wireless Power Transmission Control Parameters - A system and method to control a wireless power transmission system by configuration of wireless power transmission control parameters is disclosed. The configuration of the system may be performed by an operator using a standard web browser on a computing device where the system configuration GUI presented to the operator may be functionally identical regardless of the computing device running the browser. The system configuration GUI may be connected to system through a system configuration API. According to some aspects of this embodiment, a method to control wireless power transmission system by configuration of wireless power transmission control parameters may include accessing the system configuration GUI, displaying operational or other parameter to configure the system, selecting an operational parameter, configuring the selected operational parameter, and then continuing to configure others operational parameter if needed, storing configuration parameters in the computer memory, and communicating configuration parameters to others system computers. | 2016-02-25 |
20160056967 | POWERED DEVICE INTERFACE CLASSIFICATION APPARATUS AND METHOD - A powered device interface constituted of: a first and second rectifier bridge, the outputs and returns thereof in electrical communication with each other; and a selection circuit; and a classification current circuit in electrical communication with the output and return of each of the first rectifier bridge and the second rectifier bridge, and further in electrical communication with a first and second input of the first rectifier bridge, wherein the classification current circuit is arranged, responsive to a classification voltage received at one of the first rectifier bridge and the second rectifier bridge, to: in the event that the classification voltage is received at the first rectifier bridge, output a first classification current exhibiting a first magnitude; and in the event that the classification voltage is received at the second rectifier bridge, output a second classification current exhibiting a second magnitude. | 2016-02-25 |
20160056968 | REMOTELY CONTROLLABLE ELECTRONIC DEVICE, NETWORK SYSTEM FOR CONTROLLING THE ELECTRONIC DEVICE AND REMOTE CONTROL METHOD THEREOF - An electronic device including: a processor configured to control the electronic device while the electronic device is turned-on and turn-off the electronic device in response to a turn-off command; a network interface card (NIC) configured to periodically exchange a keep awake message with an external server through a repeater while the processor is turned-off; and a power supply configured to supply power to the NIC while the electronic device is turned-off. | 2016-02-25 |
20160056969 | METHOD AND SYSTEM FOR A HIGH CAPACITY CABLE NETWORK - A cable modem termination system (CMTS) may communicate with a plurality of cable modems using a plurality of orthogonal frequency division multiplexed (OFDM) subcarriers. The CMTS may determine a performance metric of each of the cable modems. For each of the OFDM subcarriers and each of the cable modems, the CMTS may select physical layer parameters to be used for communication with that cable modem on that OFDM subcarrier based on a performance metric of that cable modem. The parameters may be selected for each individual modem and/or each individual subcarrier, or may be selected for groups of modems and/or groups of subcarriers. The parameters may include, for example, one or more of: transmit power, receive sensitivity, timeslot duration, modulation type, modulation order, forward error correction (FEC) type, and FEC code rate. | 2016-02-25 |
20160056970 | HOME DEVICE, REMOTE CONTROL SYSTEM AND PROGRAM - A controller of an in-home controller receives, via a terminal communicator, input data related to a manager registration transmitted from a terminal device. The controller performs a manager registration based on the received input data. Also, the controller generates user registration request data containing a user ID and a password extracted from the received input data, a controller ID read from data storage. The controller transmits the generated user registration request data to an external server via a wide-area communicator. | 2016-02-25 |
20160056971 | WIRELESS LIGHTING CONTROL - Exemplary embodiments include a wireless lighting system. Exemplary embodiments also include systems and methods for automatically configuring and/or mapping nodes within a system of nodes for control by a single and/or remote device. | 2016-02-25 |
20160056972 | WEB OF THINS PLUG-IN SYSTEM - Exemplary embodiments of the present invention relate to a resource processing scheme which can be used for web of things services. The web of things plug-in system according to exemplary embodiments of the present invention comprises: a web of things resource storing unit configured to store a web of things resource which represent at least one of a thing itself and any data produced by the thing; and a web of things resource processing unit configured to perform resource processing on the web of things resources stored in the web of things resource storing unit. According to exemplary embodiments of the present invention, information from things can be provided in the form of web resources through the web to web of things service user as well as to another things. | 2016-02-25 |
20160056973 | LIN NETWORK SLAVE NODE CONTROL SYSTEM, LIN NETWORK SLAVE NODE AND METHOD - An LIN slave node control system, an LIN slave node and a method are provided. The system includes an electronic control part, which includes: an LIN signal detection, reception, and control module, a processing module connected to the LIN signal detection, reception, and control module and an LIN signal transmitting module connected to the processing module; the processing module generates, according to acquired analysis results, control signals for activating the LIN signal transmitting module, and transmits the control signals to the LIN signal detection, reception, and control module, or blocks LIN signal transmitting module and/or processing module control signals; the LIN signal detection, reception, and control module activates the processing module according to awake signals from an LIN bus, activates the LIN signal transmitting module according to the control signals from the processing module, or can block the LIN signal transmitting module and/or the processing module. | 2016-02-25 |
20160056974 | REDUNDANT CONTENT BRIDGING BETWEEN SUBSTATION COMMUNICATION NETWORKS - A method is disclosed for providing a network bridge between a source and a receiving network of a communication network, wherein the network bridge includes two content-bridging nodes connected between the source and the receiving networks according to a redundancy schema defined in IEC62439-3. The method can include assigning a common source network node identifier to the two content-bridging nodes; receiving, by each of the two content-bridging nodes, network traffic within the source network; and forwarding, by each of the two content-bridging nodes using the source network identifier, the network traffic from the source to the receiving networks. | 2016-02-25 |
20160056975 | System and Method for Virtualizing an IT Infrastructure with Remotely Accessible Virtual Desktops - A system and method for virtualizing an IT infrastructure providing remotely accessible virtual desktops. The system includes a portal for interfacing with a user to obtain and display IT infrastructure configuration and operating data. The system also includes platform creation module for creating, on a computer network accessible IT infrastructure platform device, a virtual computer network accessible over the TCP/IP computer network and comprising at least one remotely accessible virtual desktop. The platform creation module performs such operation automatically through use of specialized software scripts. | 2016-02-25 |
20160056976 | Integrating Communications - A method of accessing a first communication system of a first communication provider via a packet-based network, the first communication system maintaining a first list of contacts being users of the first communication system. The method comprises establishing a contact-sharing channel with a second communication system of a second, partner communication provider, wherein the second communication system is accessible via an independently executable web-browser and the packet-based network, and wherein the second communication system maintains second group of contacts being users of the second communication system. The contact-sharing channel is used to fetch contact information of one or more of the second contacts, so as to display at least part of the fetched contact information in the client application and establish a communication based on at least part of the fetched contact information. | 2016-02-25 |
20160056977 | METHODS AND APPARATUSES FOR DATA TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM - Embodiments of the present disclosure relate to downlink/uplink data transmission in a wireless communication system. In an embodiment of the present disclosure, there is provided a method for downlink data transmission in a wireless communication system which comprises transmitting an indication for a new-type reference signal to a user equipment, wherein the new-type reference signal has an identical location in frequency domain to a legacy reference signal; and transmitting the new-type reference signal and the legacy reference signal to the user equipment for using in channel estimation. In a case of more than one antenna port, the new-type reference signal may be designed to have a different location in time domain from a legacy reference signal to avoid interference to other antenna ports. With embodiments of the present disclosure, it is possible to perform a channel estimation based on both the legacy reference signal and the new-type reference signal to achieve a higher accuracy of channel estimation, and thus a UE with a low SNR may be also used in LTE networks. | 2016-02-25 |
20160056978 | SYSTEMS AND METHODS TO SWITCH RADIO FREQUENCY SIGNALS FOR GREATER ISOLATION - In semiconductor switches, the isolation can be limited by the capacitive coupling between the switch input and the switch output. Ultra-high isolation can be achieved by adding a coupled transmission line to the semiconductor switch. The coupled transmission line introduces inductive coupling, which cancels at least a part of the capacitive coupling between the switch input and the switch output. | 2016-02-25 |
20160056979 | DUTY-CYCLED EQUALIZATIONS - An information handling system (IHS) selectively performs duty-cycled equalization of data transmission on a communication link between a sending component and a receiving component. A controller activates an equalizer associated with the communication link. Following equalizer convergence, the controller determines power consumption and/or data throughput corresponding to data samples propagated over the communication link. If power consumption and/or data throughput do not exceed respective specified threshold values, the controller maintains or applies continuous equalization. However, if power consumption and/or data throughput exceed the respective threshold values, the controller initiates duty-cycled equalization using a selected duty cycle value. The duty-cycled equalization activates the equalizer during the first interval to minimize accumulating inter-symbol interference (ISI) effects associated with a first set of data samples, and de-activates the equalizer during a second interval enabling a second set of data samples to bypass equalization, while satisfying power consumption and signal quality requirements. | 2016-02-25 |
20160056980 | METHOD FOR PERFORMING DATA SAMPLING CONTROL IN AN ELECTRONIC DEVICE, AND ASSOCIATED APPARATUS - A method for performing data sampling control in an electronic device and an associated apparatus are provided, where the method includes the steps of: detecting whether a data pattern of a received signal of a decision feedback equalizer (DFE) receiver in the electronic device matches a predetermined data pattern, to selectively trigger a data sampling time shift configuration of the DFE receiver; and when the data sampling time shift configuration is triggered, utilizing a phase shift clock, rather than a normal clock corresponding to a normal configuration of the DFE receiver, as an edge sampler clock of an edge sampler in the DFE receiver, to lock onto edge timing of the received signal, and controlling the phase shift clock and the normal clock to have different phases, respectively, to shift data sampling time of the DFE receiver, for performing data sampling in the DFE receiver. | 2016-02-25 |
20160056981 | Two-dimensional (2D) decision feedback equalizer (DFE) slicer within communication systems - A communication device (alternatively, device) includes a processor configured to support communications with other communication device(s) and to generate and process signals for such communications. In some examples, the device includes a communication interface and a processor, among other possible circuitries, components, elements, etc. to support communications with other communication device(s) and to generate and process signals for such communications. For example, the device's processor receives one or more signals from a communication channel. The processor then processes the one or more signals to generate 2D DFE soft slicer outputs and to decode the one or more signals based on the 2D DFE soft slicer outputs to generate estimates of information encoded within the one or more signals. The processor may process the 2D DFE soft slicer outputs to generate 2D DFE hard decisions and then generates other estimates of the information encoded based on the 2D DFE hard decisions. | 2016-02-25 |
20160056982 | Phase Control Method, Array Antenna, and System - A phase control method in the present disclosure includes dividing, by a power divider, the high frequency current into at least two current branches, and separately feeding the at least two current branches into corresponding radio frequency input ports on a digital phase shifter, determining, by the switch controller according to the digital control flow, radio frequency paths that are in the digital phase shifter and for the at least two current branches fed into the digital phase shifter, and controlling the drive voltage to act on the digital phase shifter, and separately establishing, by the digital phase shifter according to the drive voltage and for the at least two current branches, radio frequency paths for currents to flow through, and controlling duration of phase delays for the at least two current branches by controlling lengths of the radio frequency paths through which the at least two current branches flow. | 2016-02-25 |
20160056983 | Signal Combining System for Constant Envelope Transmission of Information - A method and apparatus for producing a transmission of constant envelope on a carrier signal. All possible combinations of all component codes for phases for producing the transmission are defined. Desired component code powers and desired intercode phases between all pairs of component codes are also defined. Still further, a portion of variables of a search process to reduce a number of variables searched by the search process is defined. Even further, deltas and weight variations for standard differences in a Jacobian matrix for use in the search process are defined. Penalty factors to evaluate an objective function of the search process are also defined. The search process is performed. | 2016-02-25 |
20160056984 | CAPACITY FOR NARROW-BAND HYBRID MODULATION - Techniques and apparatus are disclosed for multiplexing multiple Narrowband Hybrid Modulation sub-channels in the same radio channel. This is accomplished by applying symbol phase rotation and/or phase rotation of the modulated I/Q samples to at least one of two or more simultaneously transmitted Narrowband Hybrid Modulation bursts in the same GSM/GPRS radio frequency channel, in the same cell. Other embodiments of the techniques disclosed herein exploit this symbol/sample rotation approach to create orthogonal channels of Narrowband Hybrid Modulation bursts, on the same radio frequency channel. These orthogonal channels can be transmitted in different cells, to allow the use of the same GSM/GPRS radio frequency channel in multiple adjacent cells while at the same time minimizing inter-cell interference. | 2016-02-25 |
20160056985 | ENERGY EFFICIENT HIGHWAY ADDRESSABLE REMOTE TRANSDUCER SOFT MODEM - A method and a highway addressable remote transducer (HART) soft modem device for modulating and demodulating analog signals with HART messages are provided. A phase coherent frequency shift keying (FSK) modulator modulates and transmits analog signals with HART messages, and a phase coherent FSK demodulator receives and demodulates the analog signals with the HART messages. The FSK modulator is a digital modulator that outputs 1 or 0 for transmission. With oversampling and low pass filtering, the digital modulation results in low jitter and good signal to noise ratio. The FSK demodulator applies a fast energy detect algorithm and dynamically reduces or increases a clock speed of a central processing unit (CPU) of the HART soft modem device for reducing power consumption of the CPU. Furthermore, the HART soft modem device uses direct memory access (DMA) to further reduce the power consumption, thereby reducing the overall power consumption by around 50%. | 2016-02-25 |
20160056986 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - An apparatus includes an encoder to encode service data corresponding to each of a plurality of Physical Layer Pipes, an encoder to encode signaling data by performing LDPC (Low Density Parity Check) encoding the signaling data by adding parity bits, block interleaving the LDPC encoded signaling data, and demultiplexing the block interleaved signaling data using shifting method. The shifting method is performed based on the modulation order and indices of bits. A frame builder builds at least one signal frame including the encoded service data, the encoded signaling data, a modulator modulates the at least one signal frame by an OFDM (Orthogonal Frequency Division Multiplex) scheme, and a transmitter transmits the broadcast signals carrying the at least one modulated signal frame. | 2016-02-25 |
20160056987 | MULTI IQ-PATH SYNCHRONIZATION - Aspects of a wireless apparatus and a method for handling a modulated signal include a frequency generator that produces a clock signal, a first synchronization circuit that generates a first sync enable signal based on an even edge of the clock signal, a second synchronization circuit that generates a second sync enable signal based on an even edge of the clock signal, a first divider having a first initial operating condition that generates a first IQ path based on the first sync enable signal, and a second divider having a second initial operating condition that generates a second IQ path based on the second sync enable signal, wherein the first and second operating conditions are not equal when initially powered. | 2016-02-25 |
20160056988 | TIMING SYNCHRONIZATION IN AN ORTHOGONAL FREQUENCY-DIVISION MULTIPLEXING (OFDM) SYSTEM - A transmitting end of an OFDM wireless communication system may generate a training sequence and attach the training sequence to a data sequence that contains information data. A receiving end of the OFDM wireless communication system may identify a starting position of the data sequence and further extract the data sequence. | 2016-02-25 |
20160056989 | TRANSMISSION METHOD - Provided is a transmission method that contributes to an increase in data reception quality when iterative detection is performed at a receive apparatus side. A transmit apparatus alternates between two types of modulation scheme that each shift amplitude and phase, performs mapping to constellation points according to a selected modulation scheme, and transmits a modulated signal obtained by mapping. | 2016-02-25 |
20160056990 | TX IQ MISMATCH PRE-COMPENSATION USING DIRECT LEARNING ADAPTATION - A direct conversion wireless transmitter includes IQ mismatch pre-compensation using direct learning adaptation to adjust IQ pre-compensation filtering. Widely-linear IQ_mismatch pre-compensation filtering compensates for IQ mismatch in the TX analog chain, filtering of input data x(n) to provide pre-compensated data y(n) with a compensation image designed to interfere destructively with the IQ_mismatch image. A feedback receiver FBRX captures feedback data z(n) used for direct learning adaptation. DL adaptation adjusts IQ_mismatch filters, modeled as an x(n)_direct and complex conjugate x(n)_image transfer functions w | 2016-02-25 |
20160056991 | METHOD AND APPARATUS FOR GENERATING A PHY DATA UNIT - In a method for generating a physical layer (PHY) data unit for transmission via a communication channel, information bits to be included in the PHY data unit are encoded using a forward error correction (FEC) encoder. Also, the information bits are encoded according to a block coding scheme, where m copies of each bit are included in the information bits, and one or more bits in the m copies of each bit are flipped. The information bits are mapped to a plurality of constellation symbols, and a plurality of orthogonal frequency division multiplexing (OFDM) symbols are generated to include the plurality of constellation symbols. The PHY data unit is generated to include the plurality of OFDM symbols. | 2016-02-25 |
20160056992 | DIAMETER/XML PROTOCOL CONVERSION - Embodiments of protocol converters (PCs), and related techniques, are disclosed herein. In some embodiments, a PC may include reception logic to receive Extensible Markup Language (XML) data transmitted by an Application Function (AF), conversion logic to convert the XML data into a Diameter Protocol (DP) message, and provision logic to provide the DP message for transmission to a Policy and Charging Rules Function (PCRF). Other embodiments may be disclosed and/or claimed. | 2016-02-25 |
20160056993 | Tenant-Specific Log for Events Related to a Cloud-Based Service - A method, system, and/or computer program product establishes and utilizes a tenant-specific log for events related to a cloud-based service. A metamodel is created for a cloud-based service running on a cloud. The cloud-based service is provided to a specific tenant of the cloud, and the metamodel describes types of resources, on the cloud, that are providing the cloud-based service for the specific tenant. The metamodel is appended to the cloud-based service. In response to the cloud-based service being executed for the specific tenant of the cloud, the metamodel is used to identify a set of resources that are actually providing the cloud-based service for the specific tenant. A tenant-specific log for events related to the cloud-based service is established, where the tenant-specific log tracks events that occur on each actual resource on the cloud that provides the cloud-based service to the specific tenant. The tenant-specific log is then retrieved. | 2016-02-25 |
20160056994 | Diagnosing Network Misconfiguration Externally - In one embodiment, a network service client | 2016-02-25 |
20160056995 | Relay System and Relay Device - A relay device includes: a first port and a second port which are connected to a ring network; a relay path for relaying a frame between the first port and the second port; and a first monitoring point and a second monitoring point provided on a side close to the second port on the relay path. The first monitoring point monitors continuity between itself and the second monitoring point of a different device via the relay path of its own device by using a CCM frame based on Ethernet OAM. The second monitoring point monitors continuity between itself and the first monitoring point of a different device via the relay path of the different device by using the CCM frame. | 2016-02-25 |
20160056996 | System and Method for Implementing High Availability of Server in Cloud Environment - This invention relates to a system and method for implementing high availability of the server/nodes in a cluster of a cloud network. An application with respect to a customer/client can be received at a high availability manager of a cluster in a cloud network to assign the application to a server/node within the cluster. A seed server/node from a plurality of server/nodes within the cluster can be identified with respect to the application based on the application information and correlation identify of the customer. The seed server/node can be assigned with a primary server/node status to hereby communicate the cluster information with respect to the seed server/node to the plurality of server/node located with the cluster. A secondary server/node with respect to the application can be identified and assigned a secondary server/node status to thereby route the traffic of the seed server/node upon detecting a failure/alert is generated to effectively implement the high availability of server/nodes within the cluster of the cloud network. | 2016-02-25 |
20160056997 | DISASTER RECOVERY WITH A CENTRAL CONFERENCING ROUTING SERVER - Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing routing server is configured to respond to a failure in a conference bridge to allow for repair to the network and/or account for split conferences that may occur due to the bridge failure. In one embodiment, the CCRS may account for moving a conference bridge into an offline state by removing the conference bridge from consideration for hosting a collaboration conference. | 2016-02-25 |
20160056998 | RELIABLE ISP ACCESS CLOUD STATE DETECTION METHOD AND APPARATUS - A Multi-Homing System is equipped with an Adaptive JSP Access Cloud State Detection apparatus (ACSD) that improves the reliability of the availability of digital connections (links) between computer sites, such as a Computer Premises Network and the Internet, in which such connections are made by connecting through a multiplicity of ISP Access Clouds (links). Reliability is improved over prior art methods by using data elements of Internet Protocol datagrams, e.g. record fields or bits of fields, that are regularly and normally exchanged between the ISP Access Clouds and the CPN without creating additional data traffic. Data Elements from each ISP Access Cloud are used by processing functions of the by the ACSD to test for conditions that indicate that it may be in a DOWN status. when a DOWN status is suspected, other functions in the ACSD initiate transmission of a set of PROBE packets that can reliably determine if the suspect link is actually DOWN or merely giving a response that would be interpreted as DOWN by prior art methods. | 2016-02-25 |
20160056999 | Powering off and Rebooting Method, Device and System - Disclosed are a powering off and rebooting method, apparatus and system. Wherein, the method includes: an office-end device monitoring a user-end access device; and when the office-end device monitors that the user-end access device is halted, sending a reboot command to the user-end access device; wherein the reboot command is used for indicating a power supply module in the user-end access device to perform a powering off and rebooting operation on the user-end access device. The abovementioned solution solves the problem in the related art that technical personnel have to go to the site to reboot a device if the software reset is invalid when the device is halted, so that research and development technical personnel can timely and easily power off and reboot the device without going to the site, thus treating a failure timely and reducing maintenance costs, and improving the operability and maintenance efficiency of maintenance personnel. | 2016-02-25 |
20160057000 | DISTRIBUTED CONFIGURATION MANAGEMENT SYSTEM AND METHOD - A configuration management system includes a configuration management application for receiving configuration management information from a user device. The configuration management information including data associated with one or more parameters of the user device to be configured in the user device. The application further, for each parameter, accesses a parameter value associated with the parameter from at least one device configuration file stored in server, and transmits the accessed parameter values to the user device, wherein the parameters of the user device are configured using the parameter values received from the application. | 2016-02-25 |
20160057001 | UPDATE OF PROGRAMMABLE FOR COMPUTING NODES - For computing nodes having a first programmable and comprising a first node and a second node, an update of the first node from the first programmable to a second programmable across an external network is initiated. In response to the update being interrupted, the first programmable is automatically reinstated on the first node by retrieving the first programmable from the second node across an internal network. The second node is automatically updated to the second programmable by retrieving the second programmable from the first node across the internal network in response to completion of the update of the first node to the second programmable. | 2016-02-25 |
20160057002 | REMOTE VERIFICATION FOR CONFIGURATION UPDATES - In various embodiments, a control client is configured to determine whether or not the most current configuration profile has been installed within a corresponding mobile device. In particular embodiments, the client is configured to store its own copy of a configuration profile and to compare its copy with the most current configuration profile generated by a device management system as well as to the configuration profile currently installed and applied by a configuration manager within the mobile device. Each configuration profile includes an embedded verification token that facilitates this process. Furthermore, the client may be configured to inform the device management system as to whether or not the current configuration profile has been installed. The device management system may govern enterprise access by the mobile device based on whether or not the current configuration profile has been installed. | 2016-02-25 |
20160057003 | NODE PARTITIONING - A set of wireless nodes is provided, in which a subset of the wireless nodes are also wired nodes. A method of processing the set comprises performing a node initialisation, thereby linking nodes in the set of wireless nodes, performing a link evaluation, thereby determining a quality characteristic of links between nodes, and segmenting the nodes into partitions, each partition comprising at least one wired node and each node in a partition having a link to another node in the same partition with the determined quality characteristic above a predetermined threshold. | 2016-02-25 |
20160057004 | SYSTEMS AND METHODS FOR MACHINE-TO-MACHINE AD-HOC COMMUNICATION - A method for dynamically establishing an ad-hoc network including a plurality of work machines includes receiving, by a communication module of a first work machine, a data packet, identifying an information type of the data packet, including determining, based on an information type identifier of the data packet, whether the data packet includes one of a first information type or a second information type, processing the data packet based on the information type identification, and forwarding the processed data packet a second work machine. The forwarding includes forwarding the data packet at one of a first rate or a second rate based on the categorization of the data packet into the first type of information or the second type of information. | 2016-02-25 |
20160057005 | ENABLING UNIFORM SWITCH MANAGEMENT IN VIRTUAL INFRASTRUCTURE - A method of configuring a logical network in a datacenter is provided. The datacenter includes a plurality of host physical computing devices, a compute manager to configure one or more data compute nodes (DCNs) on virtualization software of each host, and a network manager. The method configures, by the network manager, a logical network. the method provides, by the network manager, a read-only configuration construct of the logical network to the virtualization software of a set of hosts in the plurality of hosts. The method obtains, by the compute manager, the read-only configuration construct of the logical network from the virtualization software of the set of hosts. The method configures, by the compute manager, a plurality of DCNs to connect to the logical network using the read only configuration construct of the logical network. | 2016-02-25 |
20160057006 | METHOD AND SYSTEM OF PROVISIONING LOGICAL NETWORKS ON A HOST MACHINE - A physical computing device is provided that includes a set of processing units and a set of machine readable media (CRM) for execution by the set of processing units. The CRM stores a plurality of data compute nodes (DCNs) deployed by a compute manager of a datacenter, virtualization software, and a network manager agent. The network manager receives a read-only configuration construct for each of a set of logical networks from a network manager of the datacenter, the logical networks configured and managed by the network manager. the agent provisions the set of logical networks on the physical computing device for use by the virtualization software. The agent provides a copy of the read-only construct of each logical network to the compute manager to allow the compute manager to connect one or more DCNs to each of the logical networks. | 2016-02-25 |
20160057007 | TECHNIQUES FOR INDICATING AND CHANGING NETWORK COMMUNICATION SETTINGS OF A COMPUTER HOST - A technique for setting network communications for a computer host having multiple network interface controllers (NICs) includes performing network communication for a baseboard management controller (BMC) using a first NIC. In response to actuation of a switch of a network connector jack that is associated with the first NIC, a switching signal is sent from the switch to the BMC. In response to receipt of the switching signal at the BMC, network communication for the BMC is performed using a second NIC. | 2016-02-25 |
20160057008 | AUTO RE-PAIRING AND VIRTUAL PORT NUMBER FOR REMOTE MANAGEMENT SYSTEM FOR SERVERS - In a KVM switch system where multiple servers and clients are connected to one or more KVM switches, dongles (adapters) are connected between each server and the KVM switch. Each dongle is always connected to the same server, and its unique dongle ID can be used to identify the servers. During a communication session between a target server and a client, if the target server is moved from one computer port of the KVM switch system to another, the KVM switch automatically detects the move using dongle IDs, and automatically re-establish communication between the client and the target server via the other computer port, without the client initiating a new connection request. Virtual port numbers are associated with dongle IDs and are used by the on-screen display of the client so that the displayed list of servers is not affected when the servers are moved to different ports. | 2016-02-25 |
20160057009 | CONFIGURATION OF PEERED CLUSTER STORAGE ENVIRONMENT ORGANIZED AS DISASTER RECOVERY GROUP - A technique efficiently configures a peered cluster storage environment. The configuration technique illustratively includes three phases: a discovery phase, a node setup phase and a cluster setup phase. The discovery phase may be employed to initiate discovery of nodes of a disaster recovery (DR) group through transmission of multicast advertisement packets by the nodes over interconnects, including a Fibre Channel (FC) fabric, to each other node of the group. In the node setup phase, each node of a cluster assigns its relationships to the nodes discovered and present in the FC fabric; illustratively, the assigned relationships include high availability (HA) partner, DR primary partner and DR auxiliary partner. In the cluster setup phase, the discovered nodes of the FC fabric are organized as the peered cluster storage environment (DR group) configured to service data in a highly reliable and available manner. | 2016-02-25 |
20160057010 | METHOD AND SYSTEM FOR MAPPING DIFFERENT LAYOUTS - There is described a method for automatically mapping network configurations to enable at least two elements belonging to a first layer network to communicate with each other over a second layer network,
| 2016-02-25 |
20160057011 | MULTIMEDIA NETWORK SYSTEM WITH CONTENT IMPORTATION, CONTENT EXPORTATION, AND INTEGRATED CONTENT MANAGEMENT - This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determine the license status of content and update the license status of content which was previously provided by that provider. The external content can be accessed in real time or downloaded and stored within the system for later access at the convenience of the user. The usage of some content is controlled by the use of encryption and other protection methods. The system allows for storage of live video by storing the digitized video and allowing the user to control how, when and where the content is viewed. The system makes available multiple multimedia services to all users in the network or connected via the internet. | 2016-02-25 |
20160057012 | METHOD AND APPARATUS FOR VERIFYING AND MANAGING A CLIENT SYSTEM NETWORK AND NETWORK DEVICES - An approach is provided for managing and verifying configuration of a client network and the network devices by assessing or sharing network/device information. The approach includes querying a client system to determine one or more information items associated with a network and one or more network devices in the client system. The approach further includes generating a verified profile for the network and the one or more network devices. The approach also includes analyzing a modification in an active profile associated with the network and the one or more network devices. Further, the approach includes initiating an update to the verified profile or to the active profile based on a validation of the modification. | 2016-02-25 |
20160057013 | TESTING TOLL-FREE DATA SERVICE CAMPAIGNS - A device may receive information that identifies a toll-free data service campaign to be tested. The device may receive information that identifies a network to be used to test the toll-free data service campaign. The device may deploy the toll-free data service campaign on the network by deploying a campaign rule, associated with the toll-free data service campaign, that identifies a condition for charging a content provider, associated with the toll-free data service campaign, for data used by a mobile device in association with the toll-free data service campaign. The device may determine a testing criteria for testing the toll-free data service campaign on the network. The device may test the toll-free data service campaign on the network using the testing criteria. The device may determine a test result based on testing the toll-free data service campaign, and may provide information that identifies the test result. | 2016-02-25 |
20160057014 | ENABLING VIRTUAL MACHINES ACCESS TO SWITCHES CONFIGURED BY DIFFERENT MANAGEMENT ENTITIES - A method of configuring a plurality of logical forwarding elements (LFEs) on a physical computing device comprising virtualization software and a plurality of data compute nodes (DCNs) is provided. The method provisions a first LFE configured and managed by a network manager of a datacenter on the physical computing device, the first LFE for performing OSI L | 2016-02-25 |
20160057015 | SOFTWARE DEFINED NETWORKING PORTAL - Implementations described and claimed herein provide systems and methods for custom-defined network routing. In one implementation, a set of custom defined network flow rules is received at an edge router of a primary network, which is in communication with a customer network. The set of custom defined network flow rules correspond to network traffic associated with the customer network. The set of custom defined network flow rules is stored in a forwarding table on the edge router. A packet of data is received at the edge router. The packet of data is attributed to the customer network. The set of custom defined network flow rules is applied to the pack of data using the forwarding table. | 2016-02-25 |
20160057016 | SYSTEM AND METHOD FOR CLUSTER MANAGEMENT BASED ON HPC ARCHITECTURE - Cluster management software comprises a plurality of cluster agents, with each cluster agent associated with an HPC node including an integrated fabric and the cluster agent operable to determine a status of the associated HPC node. The software further includes a cluster management engine communicably coupled with the plurality of the HPC nodes and operable to execute an HPC job using a dynamically allocated subset of the plurality of HPC nodes based on the determined status of the plurality of HPC nodes. | 2016-02-25 |
20160057017 | SYSTEMS AND METHODS FOR GROUP BANDWIDTH MANAGEMENT IN A COMMUNICATION SYSTEMS NETWORK - An embodiment is a method of managing bandwidth, performed by a computing system. The system receives user-selected connection parameters associated with a subscriber device. The system associates a network identifier of the subscriber device with a group bandwidth policy, based on the user-selected connection parameters. The system stores, in computer-readable storage media, parameters associated with the group bandwidth policy, in association with the network identifier of the subscriber device. The system receives, at a gateway device, network communication data from the subscriber device. The system limits, at the gateway device, bandwidth available to the network communication data, based on the stored parameters associated with the group bandwidth policy. | 2016-02-25 |
20160057018 | OPTIMIZATION FRAMEWORK FOR MULTI-TENANT DATA CENTERS - Systems and methods for decoupled searching and optimization for one or more data centers, including determining a network topology for one or more networks of interconnected computer systems embedded in the one or more data center, searching for routing candidates based on a network topology determined, and updating and applying one or more objective functions to the routing candidates to determine an optimal routing candidate to satisfy embedding goals based on tenant requests, and to embed the optimal routing candidate in the one or more data centers. | 2016-02-25 |
20160057019 | INTEGRATED CLOUD DATA CENTER MANAGEMENT - The present invention is generally directed at systems and methods for managing one or more data centers. Systems in accordance with some embodiments of the invention may include a software as a service (SaaS) application including a user interface for designing or modifying a topology, a VAR application in selective communication with the SaaS application and with one or more data stores, configured to determine how to create or modify the topology by configuring the one or more data centers. Methods in accordance with some embodiments of the invention may include receiving a topology design or edit, communicating with one or more data centers, determining how to satisfy the topology design or edit based on the topology design or edit and communications with the one or more data centers; and satisfying the topology design or edit by creating the designed topology or editing the pre-existing topology. | 2016-02-25 |
20160057020 | DYNAMIC GROUPING OF MANAGED DEVICES - A particular method includes generating, at a server configured to access inventory data associated with one or more managed devices, a graphical user interface (GUI) that is operable to define grouping criteria for one or more dynamic groups of managed devices. The method also includes receiving, at the server via the GUI, first grouping criteria and data identifying an action to be performed with respect to managed devices that satisfy the first grouping criteria. The first grouping criteria is based on at least second grouping criteria and a logical operator. The method further includes determining, at the server based on the inventory data, a group of managed devices that satisfy the first grouping criteria. The method includes initiating, by the server, transmission of a push notification regarding the action to each managed device in the group of managed devices. | 2016-02-25 |
20160057021 | INTELLIGENT INFRASTRUCTURE MANAGEMENT USER DEVICE - An infrastructure management device comprises a processor configured to obtain port status and networking device status for each of one or more physicals networking devices in a system. The device also comprises a display unit coupled to the processor and configured to display one or more virtual networking devices, and a user input element configured to provide user input to the processor. The port status indicates that a cable is inserted into the first port and the processor obtains cable data identifying one or more characteristics of the cable inserted into the first port. The processor is configured to compare the one or more characteristics of the cable inserted into the first port with one or more characteristics defined in the work order. The processor is configured to provide a notification to a user indicating whether the one or more characteristics of the inserted cable comply with the work order. | 2016-02-25 |
20160057022 | ACCESS NETWORK MANAGEMENT - Currently, under bitstream access, communications providers are only given limited control over the services they offer. In order to prevent customers being accidently or maliciously reconfigured by a competitor, each communications provider's circuit is isolated from the other communications providers, and dynamic line management profile choice is maintained by the network operator. The present invention proposes allowing greater access to communications providers to configure physical layer configuration parameters associated with a line, through the use of an adaptation gateway. The adaptation gateway is used to manage configuration requests to digital subscriber lines from the communications providers. The adaptation gateway allows configuration of certain DSL line, channel or data path parameters (such as those listed in ITU-T Recommendation G.997.1), but prevents modification to any of those parameters that might affect or cause harm to the service of another line. | 2016-02-25 |
20160057023 | INTERNET ACCESS AUTHORIZATION AND REGULATION SYSTEMS AND METHODS FOR CONTROLLED ENVIRONMENT OF AN INSTITUTIONAL FACILITY - Access and regulations systems to facilitate safe and secure access of web content by residents of an institutional facility such as a correctional facility includes an administrator workstation to define authorized and prohibited web content, a resident workstation displaying on a predetermined list of web content, and a server receiving and processing the authorized and prohibited web content and requests made by institutional residents. | 2016-02-25 |
20160057024 | METHOD AND DEVICE FOR TERMINAL DEVICE MANAGEMENT BASED ON RIGHT CONTROL - A method and a device for terminal device management based on right control are provided. The method includes the following steps. A Get command on an access control list (ACL) of a managed node in a device management tree (DMT) from a device management (DM) server is received, where the Get command includes a Unified Resource Identity (URI) of the managed node. It is determined whether the DM server has a direct right of executing the Get command on the managed node. The Get command is processed when it is determined that the DM server has the direct right of executing the Get command on the managed node. The method and the device simplify the complexity of right management, and reduce the number of times of message interaction between the DM server and a terminal device, thereby improving the efficiency and performance of terminal device management. | 2016-02-25 |
20160057025 | Policy Declarations for Cloud Management System - Some embodiments provide a method for a system that monitors a network to prevent violations of declared policies. The method stores network state data received from a plurality of data sources as a set of tables. The method receives a declaration of a policy that specifies a set of conditions for a particular set of network state entities received from at least two of the data sources. The set of conditions is specified as an existence of a set of data tuples involving the set of network state entities in the stored set of tables. The method monitors the network state data according to the declared policy. | 2016-02-25 |
20160057026 | Policy Management System with Proactive and Reactive Monitoring and Enforcement - Some embodiments provide a method for a system that monitors a network to prevent violations of network policies. The method stores network state data that describes the network. The method identifies that a first set of stored network state data violates a particular policy declared for the network. The method issues a command to a first cloud management application to modify the network state data such that the modified network state data does not violate the particular policy. The method determines whether a requested action that modifies a second set of network state data, received from a second cloud management application, violates any policies. The method responds to the second cloud management application to permit the requested change when the modified second set of network state data does not violate any policies and deny the requested change when the modified second set of network state data violates the particular policy. | 2016-02-25 |
20160057027 | Policy Management System for Heterogeneous Cloud Services - Some embodiments provide a method for a system that enforces policy for a network. The method receives (i) a first set of network state data from a first cloud management application that manages a first aspect of the network and stores its network state data in a first format and (ii) a second set of network state data from a second cloud management application that manages a second aspect of the network and stores its network state data in a second format. The method stores the first and second sets of network state data in a single, unified data format. The method monitors the stored sets of network state data to determine whether the network state violates one or more network policies that constrain the network state received from the first and second cloud management applications. | 2016-02-25 |
20160057028 | MONITORING NETWORK PERFORMANCE - Methods and apparatus are disclosed for monitoring network performance in respect of a digital communications network comprising a user-network ( | 2016-02-25 |
20160057029 | INFORMATION PROVIDING METHOD - An information providing method is an information providing method for consumer electronics devices, a display device, and a server, all of which are connected via a public network, the information providing method including: (a) receiving, by the server from the consumer electronics devices, information pieces on the consumer electronics devices; (b) filtering, by the server, the information pieces on the consumer electronics devices received in step (a), to obtain one or more filtered information pieces, and performing, by the server, processing for generating display information for display, by the display device, in a specific display format; and (c) transmitting, by the server, the display information generated in step (b) to the display device. | 2016-02-25 |
20160057030 | MONITORING INTERACTIONS WITH AUDIOVISUAL CONTENT - Embodiments of the invention relates to a method for monitoring interactions with audiovisual content, performed by a monitoring device ( | 2016-02-25 |
20160057031 | SYSTEMS AND METHODS FOR HIGH VOLUME LOGGING AND SYNCHRONIZATION FOR LARGE SCALE NETWORK ADDRESS TRANSLATION - The present invention is related to a method for high volume logging for large scale network address translation. A first device intermediary to a plurality of clients and a plurality of database servers allocates a portion of memory to each packet engine in a plurality of packet engines executing on a respective core of a plurality of cores of the first device. The first device establishes large scale network address translation (LSN) for the plurality of clients, the first device logging LSN information of sessions to a corresponding logging buffer established in a respective packet engine's portion of memory. The first device identifies, for a LSN session, a packet engine from the plurality of packet engines to log the information for the LSN session and stores information of the LSN session to the logging buffer in the packet engine's portion of memory. | 2016-02-25 |
20160057032 | AIRCRAFT MONITORING WITH IMPROVED SITUATIONAL AWARENESS - Devices, methods and systems are provided for monitoring an aircraft. One exemplary method involves a processing system at a ground location obtaining first information associated with a first region identified by a detection system onboard the aircraft, obtaining second information associated with a second region identified by an external system coupled to the processing system, and displaying a flight tracking image associated with the aircraft that includes a first graphical representation of the first region and a second graphical representation of the second region. The method continues by capturing at least a portion of the flight tracking image displayed on a display device at the ground location and transmitting the captured flight tracking image to the aircraft for subsequent presentation on an onboard display device. | 2016-02-25 |
20160057033 | CLIENT APPLICATION INTEGRATION FOR WORKFLOWS - A method for providing client application integration for workflow management includes receiving a verification file, accessing a file through a client application, determining, based on the verification file, whether the accessed file includes a reference to a workflow component of a workflow stored on a server, retrieving the workflow component from the server, and displaying the workflow component referenced by the accessed file via an in-line user interface of the client application, further including displaying at least one selectable workflow management option for managing the workflow component using the client application. | 2016-02-25 |
20160057034 | SYSTEMS AND METHODS FOR CORRELATING DERIVED METRICS FOR SYSTEM ACTIVITY - A system can correlate derived metrics for system activity to determine problems and recommend solutions. Using a hierarchy of derived metrics from a set of raw metrics, a system can identify a problem, correlate related metrics and determine a recommended solution. For example, raw metrics can be collected about computing resources. Analyzers can process the raw metrics and outputs from other analyzers to gather metrics that include metrics derived from other metrics. When a problem symptom is discovered, derived metrics (and other metrics) can be correlated with the symptom to help identify the problem. Using the correlated metrics, a system can recommend a solution to an identified problem. | 2016-02-25 |
20160057035 | Analyte Monitoring System Having an Alert - Described herein are analyte monitoring systems including a receiver or data processing component that is configured to automatically issue a first alert notification when a first predetermined number of consecutive data packets are not received from the sensor/sensor electronics, and automatically issue a second alert notification when a second predetermined number of consecutive data packets are not received by the sensor/sensor electronics. The receiver may also be configured to enable a user to disenable alert or alarm notifications that are triggered based on detected events. | 2016-02-25 |
20160057036 | Direct Binary File Transfer based Network Management System Free of Messaging, Commands and Data Format Conversions - Telecommunication network management operations are performed based on accessing network management data (NMD) files via GUIs and general purpose computers including a network management system (NMS) server, and automatic routines for transferring binary NMD files between the general purpose computers and remote network elements (NEs) being managed. A system user produces configuration files at the NMS server for NEs using a network management GUI, and the hardware of NEs automatically complete the network management operations indicated by the NMD files transferred to them from the NMS server and produce their status files to the NMS server. The network management GUI displays network status based on the latest NE status files at the NMS server. This provides direct, binary file transfer based NMS communication that avoids the complexity and restrictions of intermediate messaging protocols or transaction languages and conversions thereof. | 2016-02-25 |
20160057037 | DATA TRANSMISSION DEVICE, DATA TRANSMISSION METHOD, AND PROGRAM THEREFOR - To provide a data transmission device for effectively improving throughput (transmission efficiency) regardless of whether a physical bandwidth in a network varies frequently; the data transmission device for transmitting data to a user terminal via a network and controlling subsequent transmitting operations by correlating delay of a packet pertaining to this transmission with network information includes: a variation detection circuit that detects, on the basis of the delay and the network information, that a minimum value of the delay has increased; and an alteration processing circuit that calculates, when the increase is detected by the variation detection circuit, the increased minimum delay value by using data pertaining to a specific packet, and updating a current minimum delay value with the calculated value. | 2016-02-25 |
20160057038 | COMMUNICATION SYSTEM, FAILURE CONTROL DEVICE, AND FAILURE CONTROL METHOD - A communication system includes: a first communication device configured to include first buffers to store data to be transmitted and received; a second communication device configured to include second buffers to store data to be transmitted and received; and a failure control device configured to include: an obtainment unit configured to obtain buffer usage state information to indicate a state of use of each of the first buffers and the second buffers from each of the first communication device and the second communication device; and an identification unit configured to identify a failure occurrence site on a channel, based on the obtained buffer usage state information, wherein the first communication device is configured to transmit and receive the data via the channel to and from the second communication device. | 2016-02-25 |
20160057039 | SYSTEMS AND METHODS TO COMPUTE CARBON FOOTPRINT OF NETWORK SERVICES WITH NETWORK FUNCTION VIRTUALIZATION (NFV) AND SOFTWARE DEFINED NETWORKING (SDN) - A method, through a server, to determine carbon footprint of a network service, in a network, includes determining power consumption and cooling requirements of network devices associated with the network service; determining associated carbon footprint coefficients for power sources associated with each of the network devices; and determining carbon footprint of the network service based on the power consumption, the cooling requirements, and the associated carbon footprint coefficients. | 2016-02-25 |
20160057040 | STORING DATA ASSOCIATED WITH PACKET RELATED METRICS - Methods, systems, and computer readable media for storing data associated with packet related metrics are disclosed. According to one method, the method includes generating a test packet including a port tuple sequence number (PTSN), wherein the PTSN indicates a number of packets across multiple flows associated with a same port tuple, wherein the port tuple indicates an ingress port and an egress port that the test packet traverses at a device under test (DUT), and storing the PTSN in an entry of a data structure, wherein the entry is indexed by the port tuple. | 2016-02-25 |
20160057041 | AUTOMATIC REMEDIATION OF POOR-PERFORMING VIRTUAL MACHINES FOR SCALABLE APPLICATIONS - A management system and method for remediating poor-performing clients running in a distributed computer system uses a machine learning technique to automatically detect one or more poor-performing clients among a plurality of clients running in the distributed computer based on at least performance data and resource usage data of the clients. An action is then initiated to mitigate the effects of the poor-performing clients. | 2016-02-25 |
20160057042 | PROVIDING AN UNSEEN MESSAGE COUNT ACROSS DEVICES - Embodiments are directed to providing an indication of unseen email messages to a mobile device user, to establishing an unseen email message count and to maintaining a consistent unseen email message count across multiple mobile devices. In one scenario, a computer system receives subscription data that subscribes a user to email push notifications. The subscription data includes a token ID and a timestamp. The computer system determines that a new email message has arrived at the user's inbox and accesses the user's email inbox to determine the number of unseen email messages (which includes the number of email messages that have been received at the user's inbox and have not been seen since the time listed on the timestamp). The computer system also sends a push notification with the number of unseen email messages to each of the user's subscribed mobile devices. | 2016-02-25 |
20160057043 | DIAGNOSTIC ROUTING SYSTEM AND METHOD FOR A LINK ACCESS GROUP - An apparatus is provided for managing diagnostic routing procedures through a communication node having a link aggregation group (LAG). The apparatus receives a first diagnostic routing request message to perform a diagnostic routing procedure on a communication path between the first communication node and a second communication node. When the communication path between the first communication node and the second communication node is configured in a link aggregation group (LAG), the apparatus transmits a second diagnostic routing request message through each of the links of the LAG to the second communication node, the LAG comprising a plurality of independent links that collectively convey the communication path, and receives a response to the second diagnostic routing request message from the second communication node through one or more of the links. | 2016-02-25 |
20160057044 | REDUCTION OF BUFFER OVERFLOW - Technology for reducing buffer overflow at a Third Generation Partnership Project (3GPP) Serving Gateway (S-GW) is described. A buffer overflow message may be received, at an evolved node B (eNB) from the S-GW, indicating potential overflow of downlink information at an S-GW buffer. The downlink information may be stored at the S-GW buffer until a plurality of user equipments (UEs) awake from a low power mode during a discontinuous reception (DRX) sleep cycle. One or more UEs may be selected from the plurality of UEs according to predefined criteria, wherein the one or more UEs are in a connected mode. The DRX configurations of the one or more UEs may be modified in order to reduce the downlink information that is stored at the S-GW buffer, thereby reducing the potential for overflow at the S-GW buffer. | 2016-02-25 |
20160057045 | HARDWARE ASSIST FOR REDUNDANT ETHERNET NETWORK - A method includes receiving downlink packets from multiple physical Ethernet interfaces and selectively discarding some of the downlink packets based on a packet filtering criterion. The method also includes updating a network connectivity database using address information in non-discarded downlink packets. The method further includes mapping a path for each of the non-discarded downlink packets using the database and transmitting the non-discarded downlink packets to a single network interface. The method could also include receiving an uplink packet from the single network interface, selecting a primary physical Ethernet interface from the multiple physical Ethernet interfaces based on information in the database, and transmitting the uplink packet through the selected primary physical Ethernet interface. | 2016-02-25 |
20160057046 | Peer-to-Peer Building Automation System Without Knowledge Being Required of Network Topology - An automation system without any of the devices in the system being required to have knowledge of each other or of the topology of the network. The automation system comprises sensor nodes and actor nodes. The sensor nodes transmit information via a wireless network based on changes that are sensed by the sensors, such as a button being pushed or motion being detected. The actor nodes detect the information that is transmitted over the wireless network and control appliance functions based on the information detected. After the sensor and actor nodes are initialized, the sensor nodes transmit packets into the network based on changes that are detected in their environment. Meanwhile, the actor nodes monitor the network for packets that contain information of scenes that are relevant to each node. Based on the information contained in each such packet, the node acts on the information by controlling its appliance function. | 2016-02-25 |
20160057047 | GATEWAY DEVICE - When a packet to a terminal is received from a terminal, a management communication processing unit transmits by broadcasting or multicasting to a network a destination information query packet for investigating a gateway device to which the terminal is connected, receives from a gateway device a destination information response packet for notifying that the terminal is connected to the gateway device, and updates a terminal information storage table based on the destination information response packet. When the terminal information storage table is erased, the history information exchange unit transmits by broadcasting or multicasting to the network a history information query packet for requesting to re-notify of the terminal that has been notified in the destination information response packet, receives from the gateway device a history information response packet for re-notifying of the terminal, and updates the terminal information storage table based on the history information response packet. | 2016-02-25 |
20160057048 | Maintaining Routing Information - An apparatus for use in a mesh network is described and includes memory storing instructions, one or more routing tables, and processing devices to execute the instructions to perform operations including receiving a routing packet including routing information and a route count value. Incrementing the route count value to produce an incremented count and transmitting the routing packet over the mesh network if the incremented count does not exceed a maximum count corresponding to a maximum number of hops for the routing packet. | 2016-02-25 |
20160057049 | SYSTEM AND METHOD FOR IDENTIFYING NETWORK TOPOLOGY INFORMATION IN MULTIPLE AREAS - A system and method identifies topology information of an autonomous system as well as other autonomous systems, and can provide topology information in response to requests. | 2016-02-25 |