12th week of 2020 patent applcation highlights part 73 |
Patent application number | Title | Published |
20200092168 | PRODUCTION SOFTWARE APPLICATION PERFORMANCE AND RESILIENCY TESTING - Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: marking of a request to define a marked request that includes associated metadata, wherein the metadata specifies action for performing by a resource interface associated to a production environment resource of a production environment, wherein the resource interface is configured for emulating functionality of the production environment resource; and sending the marked request to the resource interface for performance of the action specified by the metadata. | 2020-03-19 |
20200092169 | Method for Obtaining Standard Configuration Template of Network Device, and Computing Device - A method for obtaining a standard configuration template of a network device and a computing device includes obtaining configuration commands of a plurality of network devices, erating a command template set including a plurality of different command templates, generating a correlation matrix based on the command template set, clustering the plurality of network devices based on the correlation matrix to obtain at least two categories of network devices, dividing the correlation matrix into a plurality of submatrixes based on a clustering result, performing singular value decomposition on each submatrix to obtain a non-zero singular value, and using, as a standard configuration template of a corresponding category, a command template in the command template set that makes a contribution greater than a threshold to the non-zero singular value. | 2020-03-19 |
20200092170 | PROFILE EDITING SYSTEM - The present invention provides a profile editing system, including: a plurality of devices; a plurality of device control modules, configured to respectively control the devices; and a profile control module, configured to record control settings that are preset by the device control modules for the devices as a profile, so that a user may enable the profile to make the devices work by using the control settings recorded in the profile, to form environmental conditions preset by the user. | 2020-03-19 |
20200092171 | FRONT-HAUL PLUG-AND-PLAY CONFIGURATION FOR A C-RAN - This disclosure relates to automatically configuring a front-haul switched Ethernet network for a C-RAN. The topology of the front-haul switched Ethernet network is automatically discovered. One or more switches in the front-haul switched Ethernet network are automatically configured. The configuration of the one or more switches in the front-haul switched Ethernet network is automatically verified. The discovered topology can be automatically verified. Also, the discovered topology or the configuration of the front-haul switched Ethernet network can be automatically validated to check if it corresponds to a network design for the front-haul switched Ethernet network. | 2020-03-19 |
20200092172 | DETECTING NETWORK ENTITY GROUPS WITH ABNORMAL TIME EVOLVING BEHAVIOR - In one embodiment, a network assurance service that monitors a network calculates network frequency distributions of a performance measurement from the network over a plurality of different time periods. The service calculates entity frequency distributions of the performance measurement for a plurality of different groupings of one or more network entities in the network over the plurality of different time periods. The service determines distance measurements between the network frequency distributions and the entity frequency distributions. The service identifies a particular one of the grouping of one or more networking entities as an outlier, based on a change in distance measurements between the network frequency distributions and the entity frequency distributions for the particular grouping. The service provides an indication of the identified outlier grouping to a user interface. | 2020-03-19 |
20200092173 | AUTOMATED INVENTORY FOR IOT DEVICES - Improving automated discovery of inventory, includes obtaining a discovery message from a network device, wherein the discovery message identifies an identifier, a location, and one or more capabilities of the network device, wherein the discovery message is detected by a management instrumentation discovery (MID) server, automatically modifying a data structure of an inventory data store to include the identifier, the location, and the one or more capabilities based on the discovery message, wherein the inventory data store identifies enterprise assets and configurations of the enterprise assets, and providing the modified data structure of the inventory data store to a controller such that the network device is usable by the controller. | 2020-03-19 |
20200092174 | SYSTEMS AND METHODS FOR NON-INTRUSIVE NETWORK PERFORMANCE MONITORING - A first network device may receive packets as part of a traffic flow of an internet protocol session, select a packet based on a rule, and add, to a packet replica of the selected packet, routing information capable of being used to generate performance indicators associated with the IP session. The first network device may modify a portion of the packet replica to include values that will cause the packet replica to fail to reach a destination device associated with the IP session, and provide the packet replica to other network devices to cause a second network device to perform a validation procedure to determine that the packet replica is unable to be validated based on the values, to generate the performance indicators using the packet replica or a group of packet replicas that have been modified, and to provide the performance indicators to a particular device. | 2020-03-19 |
20200092175 | MACHINE LEARNING ALGORITHMS FOR QUALITY OF SERVICE ASSURANCE IN NETWORK TRAFFIC - The present disclosure generally relates to apparatus, software and methods for predicting future network traffic. The disclosed apparatus, software and methods alleviate congestion and/or increase overall traffic flow by providing methods for reallocating future idle capacity. | 2020-03-19 |
20200092176 | MACHINE LEARNING ALGORITHMS FOR QUALITY OF SERVICE ASSURANCE IN NETWORK TRAFFIC - The present disclosure generally relates to apparatus, software and methods for predicting future network traffic. The disclosed apparatus, software and methods alleviate congestion and/or increase overall traffic flow by providing methods for reallocating future idle capacity. | 2020-03-19 |
20200092177 | SYSTEMS AND METHODS FOR PROVIDING NOTIFICATIONS OF CHANGES IN A CLOUD-BASED FILE SYSTEM - A subscription request to obtain notifications of actions pertaining to the data file that has been previously stored at the cloud-based file system is received. The subscription request identifies the networked device and a set of actions to the data file that are to prompt the notifications to be transmitted to the networked device. An occurrence of an action is identified from the set of actions specified in the subscription request and involving the data file. Responsive to identifying the occurrence of the action from the set of actions involving the data file and in view of the subscription request identifying the networked device, a notification indicating the occurrence of the action involving the data file is transmitted to the networked device. | 2020-03-19 |
20200092178 | DECISION TABLES AND FLOW ENGINE FOR BUILDING AUTOMATED FLOWS WITHIN A CLOUD BASED DEVELOPMENT PLATFORM - A trigger element of a design-time flow plan is set so that the trigger element activates in response computing conditions being satisfied. A decision action element of the design-time flow plan executed at run-time in response to activation of the trigger element is set. The decision action element is implemented by a decision table that includes decision inputs and respective condition logic based on the decision inputs for each of a plurality of decision answers associated with the decision table. The decision table is external to the design-time flow plan. First and second decision answer action elements are defined to execute at run-time respectively when a decision answer served-up by the decision table corresponds to first and second decision answer paths in the design-time flow plan that are associated with a first and second one of the plurality of decision answers, respectively. The design-time flow plan is published. | 2020-03-19 |
20200092179 | COMPLIANCE VALIDATION FOR SERVICES BASED ON USER SELECTION - Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist. | 2020-03-19 |
20200092180 | METHODS AND SYSTEMS FOR MICROSERVICES OBSERVABILITY AUTOMATION - A monitoring system includes a non-transitory computer readable medium and a processor. The processor receives, in real time, information of an observable item emitted by each stack layer of an observable system according to an observability specification. The observability specification defines the observable item of each stack layer of the observable system to be monitored. The non-transitory computer readable medium stores the received information of the observable item emitted by each stack layer of the observable system. A graphical user interface displays in real time the received information of the observable item emitted by each stack layer of the observable system. | 2020-03-19 |
20200092181 | PROVIDING NETWORK TRAFFIC ENDPOINT RECOMMENDATION BASED ON NETWORK TRAFFIC DATA ANALYSIS - The disclosure herein describes establishing an endpoint within a network for a customer to reduce latency of the customer's network. Latency data associated with accessing a first endpoint within a network by end user devices from a plurality of geographic regions is collected, wherein the end user devices are associated with a plurality of customers. Performance scores for the geographic regions are calculated based on the latency data. A subset of the performance scores of one of the plurality of customers is selected. A second endpoint is identified within the network for the one of the plurality of customers based on the selected performance scores. The second endpoint is established for the one of the plurality customers for network traffic originating from the one or more of the geographic regions to reduce latency. The analysis of the network traffic data for customers improves network performance. | 2020-03-19 |
20200092182 | RESOURCE MONITORING SYSTEM, RESOURCE MONITORING METHOD, AND INFORMATION STORAGE MEDIUM - A computer of a resource monitoring system is configured to execute an application for analyzing an operation of an industrial device. A use status acquisition module is configured to acquire a use status of a resource of the computer by the application. A display control module is configured to display the use status on a resource monitoring screen. | 2020-03-19 |
20200092183 | Record Compression for a Message System - A method, apparatus, system, and computer program product for processing messages for a messaging system. A client identifier in a request received from a client is replaced with a system identifier. The request is sent to the messaging system. A record is received from the messaging system in response to sending the request to the messaging system. The record comprises a record and a time stamp. The record is placed into a time slot based on the time stamp for the record. The record is combined with a number of records in the time slot that have adjacent ranges with the record. A set of records in the time slot is sent to an analysis system to identify message metrics. | 2020-03-19 |
20200092184 | METHOD AND APPARATUS FOR MANAGING NETWORK QUALITY IN COMMUNICATION SYSTEM - The present disclosure relates to a pre-5 | 2020-03-19 |
20200092185 | TECHNOLOGIES FOR JITTER-ADAPTIVE LOW-LATENCY, LOW POWER DATA STREAMING BETWEEN DEVICE COMPONENTS - Technologies for low-latency data streaming include a computing device having a processor that includes a producer and a consumer. The producer generates a data item, and in a local buffer producer mode adds the data item to a local buffer, and in a remote buffer producer mode adds the data item to a remote buffer. When the local buffer is full, the producer switches to the remote buffer producer mode, and when the remote buffer is below a predetermined low threshold, the producer switches to the local buffer producer mode. The consumer reads the data item from the local buffer while operating in a local buffer consumer mode and reads the data item from the remote buffer while operating in a remote buffer consumer mode. When the local buffer is above a predetermined high threshold, the consumer may switch to a catch-up operating mode. Other embodiments are described and claimed. | 2020-03-19 |
20200092186 | Systems and methods for capturing packet loss and disruption duration information during service restoration - Systems and methods with a service operating in a network between an originating node and a terminating node include, responsive to detection of a fault on a service, determining a first snapshot of information at each of the originating node and the terminating node; responsive to detection of clearing of the fault, determining a second snapshot of information at each of the originating node and the terminating node; and utilizing the first snapshot of information at each of the originating node and the terminating node and the second snapshot of information at each of the originating node and the terminating node to determine packet disruption information for the service based on the fault and the clearing of the fault. | 2020-03-19 |
20200092187 | METHODS AND APPARATUS TO EXCLUDE NETWORK COMMUNICATION TRAFFIC FROM MEDIA MONITORING RECORDS - Methods and apparatus to exclude network communication traffic from media monitoring records are disclosed herein. An example apparatus includes a first communication radio to collect records of network traffic on a communication network and a second communication radio to transmit the records identifying a portion of the network traffic to an audience measurement entity. The example apparatus further includes a MAC address determiner to determine the MAC address of the second communication radio and a record filter to remove the network communication associated with the MAC address from the records. | 2020-03-19 |
20200092188 | SYSTEM AND METHOD FOR CREATING, DEPLOYING, AND ADMINISTERING DISTINCT VIRTUAL COMPUTER NETWORKS - Embodiments of the invention relate to a centralized managing system and method for creating, deploying, administering, and managing a plurality of separate and distinct virtual computer networks on a virtualization platform for offering cloud computing services (SaaS). Embodiments of the invention relate to a computer system for a centralized management of separate and distinct virtual computer networks, which has a security grid which has at least one grid processor and a memory device that stores a managing application. The managing application has a virtualization platform, a grid access layer, a virtual computer network template system, a plurality of resource distribution tools and a plurality of monitoring and metering tools. The grid processor is adapted by the managing application so that it can create, deploy, administer, and manage the plurality of separate and distinct computer networks. | 2020-03-19 |
20200092189 | TELECOMMUNICATIONS NETWORK - A method of dimensioning a link in a telecommunications network, and a device for implementing the method, the method including determining, for a first plurality of sets of traffic observations, wherein each set of the first plurality of sets includes a series of traffic observations each indicating the amount of traffic on a link within an observation interval of a particular duration for that set, a peak value of a traffic observation of the series of traffic observations within each set of the first plurality of sets and an average value of the series of traffic observations within each set of the first plurality of sets; calculating a first peak to average ratio for each observation interval duration based on the determined peak and average values within each set of the first plurality of sets; determining a goodness of fit value for a power function of the first peak to average ratio against its respective observation interval duration; selecting a dimensioning interval duration based on the determined goodness of fit value; and estimating a capacity of the link based on the selected dimensioning interval duration. | 2020-03-19 |
20200092190 | TRANSMISSION DEVICE, AVAILABLE BANDWIDTH ESTIMATION DEVICE, AVAILABLE BANDWIDTH ESTIMATION SYSTEM, METHOD, AND RECORDING MEDIUM - In order to enable to reduce a communication load while maintaining estimation accuracy of available bandwidth estimation being high, a transmission method includes: transmitting estimation packets, a packet size of each of which successively increases, to an available bandwidth estimation device at equal intervals, and, when receiving a signal indicating that a reception interval between the estimation packets at the available bandwidth estimation device starts to increase, stopping the transmission of the estimation packets. | 2020-03-19 |
20200092191 | Data-Less Clock Compensation for Ranging - Methods for a data-less ranging procedure may include initiating a ranging procedure via a polling message transmitted at a first time and receiving response messages at second and third times. The time intervals between the first and second time and the second and third times may be pre-defined. A time of flight may be calculated based on the pre-defined time intervals and the first, second, and third times. | 2020-03-19 |
20200092192 | TESTING FUNCTIONALITY OF AN INTERNET OF THINGS ENVIRONMENT - Testing functionality of an Internet of Things environment includes obtaining a description of the IoT environment, ascertaining, based on the description, objective function(s) of the IoT environment, crawling online resources and discovering example scenario(s) in which problems related to the ascertained objective function(s) are identified, the example scenario(s) each involving a respective set of IoT devices, and automatically testing the IoT environment to assess functionality of the IoT environment in performing at least one of the objective function(s). The automatically testing includes selectively controlling communications between a set of IoT devices of the IoT environment, which are selected from the IoT devices of the IoT environment based on the example scenario(s) discovered from the crawling. | 2020-03-19 |
20200092193 | SCALABLE VIRTUAL TRAFFIC HUB INTERCONNECTING ISOLATED NETWORKS - Metadata indicating that an action implementation node and a routing decision master node have been assigned to a virtual traffic hub programmatically associated with one or more isolated networks is stored. The routing decision master node determines a first action to be implemented for packets of a network flow using state information of the isolated networks, and provides a representation of a first action to the first action implementation node. Based on performing the first action at the action implementation node, contents of a data packet received from one isolated network are transmitted to another isolated network. | 2020-03-19 |
20200092194 | AUTOMATED ROUTE PROPAGATION AMONG NETWORKS ATTACHED TO SCALABLE VIRTUAL TRAFFIC HUBS - Metadata indicating that a virtual traffic hub enabling connectivity between a plurality of isolated networks has been established is stored. A determination is made that a first entry of a first isolated network attached to the hub is to be represented in a second routing table of a second isolated network attached to the hub, e.g., to enable network packets originating at resources of the second isolated network to be transmitted via the hub to the first isolated network. A new entry corresponding to the first entry is included in the second routing table. | 2020-03-19 |
20200092195 | PATH SELECTION METHOD AND APPARATUS - The present application describes a path selection method and apparatus. The method may include obtaining a required latency of a service. The method may further include determining a target path for the service from m strict explicit paths based on the required latency, where a latency of the target path is less than or equal to the required latency, all the m strict explicit paths are unallocated paths, any subpath of a first strict explicit path in the m strict explicit paths exists in only the first strict explicit path, the first strict explicit path is any path in the m strict explicit paths, and m is an integer greater than or equal to 1. The present invention is applicable to the field of communications technologies and resolves at least a problem where a path computation element (PCE) cannot ensure that a path allocated to a service can meet a latency requirement of the service. | 2020-03-19 |
20200092196 | PARALLEL COMPUTER SYSTEM, METHOD OF CONTROLLING A PARALLEL COMPUTER SYSTEM, AND A NON-TEMPORARY COMPUTER-READABLE MEDIUM THAT STORES A PROGRAM - A parallel computer system includes: direct links that forms a direct connection between a sending node and a receiving node, one-hop links that forms a connection between a sending node and a receiving node by way of a return node that is other than the sending node and the receiving node, and a communication control unit that, when transferring data from a sending node to a receiving node, selects the link that connects the sending node and the receiving node from among a link that uses only a direct link, a link that uses only a one-hop link, and a link that forms a connection combines and uses the direct link and the one-hop link. | 2020-03-19 |
20200092197 | IOAM-BASED QUALITY OF EXPERIENCE PROPAGATION TO ENDPOINTS AND SEAMLESS SWITCHOVER TO ALTERNATE CALL PATH - A system for switching from a first communication session between two endpoints to a secondary communication session when media degradation is detected is disclosed. A first endpoint is included within a first enterprise network and a second endpoint is included within a second enterprise network. The first enterprise network includes a call controller and a plurality of session border controllers (SBCs). The SBC in the first communication session detects media degradation and notifies the first endpoint of the media degradation. The first endpoint directs the call controller to establish a secondary communication session with the second endpoint when there is sufficient media degradation. The call controller directs a second SBC to establish the secondary communication session with the second endpoint. When the secondary communication session is established, the call controller directs the first endpoint to send media data using the second SBC. | 2020-03-19 |
20200092198 | INTERWORKING WITH LEGACY RADIO ACCESS TECHNOLOGIES FOR CONNECTIVITY TO NEXT GENERATION CORE NETWORK - Aspects of the disclosure relate to mechanisms for interworking between legacy and next generation radio access technologies (RATs) in a communication network. In some examples, a handover from a next generation access network to a legacy access network may be performed via a next generation core network and a legacy core network. A handover request received at a next generation core network serving node may include an identifier of a target cell within the legacy access network. The next generation core network serving node may identify a legacy core network serving node to which the handover may be forwarded based on the target cell identifier. Packet data units may then be routed over the legacy access network and the next generation core network by mapping data flows in the next generation core network to packet data connections in the legacy access network. | 2020-03-19 |
20200092199 | SYSTEMS AND METHODS FOR BACKUP COMMUNICATIONS - Systems and methods for enabling communication in a downhole power and communications system installed in a well, where one or more components of a wired backbone of the system have failed. Equipment positioned at the surface of a well is connected to a wired power and communication backbone that has one or more conductors and one or more nodes with standardized interfaces that enable downhole devices to be interchangeably connected to the wired backbone. When the wired backbone has failed at one or more points, preventing wired communications between the surface equipment and one or more downhole devices installed at the nodes, one or more wireless-enabled modules are installed at corresponding nodes of the wired backbone to establish wireless channels that bridge the failed portion of the wired backbone and thereby enable communication between the surface equipment and the downhole devices. | 2020-03-19 |
20200092200 | METHOD AND SYSTEM TO AVOID TEMPORARY TRAFFIC LOSS WITH BGP ETHERNET VPN MULTI-HOMING WITH DATA-PLANE MAC ADDRESS LEARNING - Embodiments are directed to a process and system for avoiding temporary traffic loss in a network having first and second computers and provider edge devices, by retaining, in each provider edge device, path information including a MAC address for the first host computer in a control plane as a dynamic address, and maintaining, in each provider edge device, its own routing table listing network addresses of the other provider edge devices as multi-homed peers. A failure recovery process in each provider edge devices advertises all multi-homed peer network addresses as addresses that each respective provider edge device has dynamically learnt in the control plane such that when a provider edge device receives a route with a locally connected host, it re-advertises the host address on its own. | 2020-03-19 |
20200092201 | SCALABLE CELL-BASED PACKET PROCESSING SERVICE USING CLIENT-PROVIDED DECISION METADATA - An isolated packet processing cell of a packet processing service, comprising an action implementation node and a decision master node, is assigned to an application. An indication of processing rules of the application is transmitted to the decision master node. In response to receiving a particular packet, the action implementation node obtains a representation of an action (which is based on the processing rules) from the decision master node and executes the action. | 2020-03-19 |
20200092202 | HIGH-QUALITY ADAPTIVE BITRATE VIDEO THROUGH MULTIPLE LINKS - Delivery of high quality video in an adaptive bit rate (ABR) download session is achieved using obtained using lower quality communication paths. The method involves detecting that an ABR download session of a video is in a steady-state condition. If so a further determination is made as to whether there is sufficient pre-fetch time available to download an (N+1)th video segment of the video using at alternative connection path through a virtual WAN having a lower quality than a first connection path through the virtual WAN. If sufficient pre-fetch time is available, the (N+1)th video segment is prefetched using at least the second connection path instead of the first connection path. | 2020-03-19 |
20200092203 | Routing in Communication Networks | 2020-03-19 |
20200092204 | TUNNEL PROVISIONING WITH LINK AGGREGATION - A method for processing data packets in a communication network includes establishing a path for a flow of the data packets through the communication network. At a node along the path having a plurality of aggregated ports, a port is selected from among the plurality to serve as part of the path. A label is chosen responsively to the selected port. The label is attached to the data packets in the flow at a point on the path upstream from the node. Upon receiving the data packets at the node, the data packets are switched through the selected port responsively to the label. | 2020-03-19 |
20200092205 | SYSTEM AND METHOD FOR SUPPORTING INTER-SUBNET CONTROL PLANE PROTOCOL FOR CONSISTENT MULTICAST MEMBERSHIP AND CONNECTIVITY IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - Systems and methods for supporting inter subnet control plane protocol for consistent multicast membership and connectivity across multiple subnets in a high performance computing environment. In accordance with an embodiment, by associating a multicast group with an inter-subnet partition, and enforcing a dedicated router port for the multicast group, multicast loop avoidance can be provided for between connected subnets. Because only a single router port is selected as being capable of handling the MC packet, no other router port in the subnet can then pass a multicast packet back to the originating subnet. | 2020-03-19 |
20200092206 | Method and Apparatus for Network Congestion Control Based on Transmission Rate Gradients - A method for congestion control in a data communication protocol employing acknowledged communication may include measuring a flight size. A transmission rate may be measured. A trend of the flight size may be determined. A trend of the transmission rate may be determined, and the trend may be derived from a transmission rate gradient calculation, in which either the transmission rate measurements or the transmission rate gradient calculations or both may be filtered to reduce their temporal variability. Whether there is a congestion may be detected according to the determined trend of the transmission rate and the trend of the flight size. Upon detection of the congestion, a change may be made from a current congestion control state to a new congestion control state. Data may be transmitted while respecting a maximum amount of unacknowledged data which the transmitting node may transmit. An apparatus is also disclosed. | 2020-03-19 |
20200092207 | Distributed Software Defined Wireless Packet Core System - A distributed software defined network (SDN) packet core system is configured to support a plurality of radio access technologies. The distributed SDN packet core system can include a cloud-based SDN centralized infrastructure instance and a plurality of local SDN infrastructure instances distributed in proximity to wireless access networks and radio access points thereof. The cloud-based centralized SDN infrastructure instance can be configured to handle network operations that are not latency sensitive. Each local SDN infrastructure instance can include a plurality of computer devices configured to execute a plurality of RAT specific control-plane modules and a plurality of RAT independent packet processing modules for performing latency sensitive network operations. | 2020-03-19 |
20200092208 | PHANTOM QUEUE LINK LEVEL LOAD BALANCING SYSTEM, METHOD AND DEVICE - A data processing system includes a phantom queue for each of a plurality of output ports each associated with an output link for outputting data. The phantom queues receive/monitor traffic on the respective ports and/or the associated links such that the congestion or traffic volume on the output ports/links is able to be determined by a congestion mapper coupled with the phantom queues. Based on the determined congestion level on each of the ports/links, the congestion mapper selects one or more non or less congested ports/links as destination of one or more packets. A link selection logic element then processes the packets according to the selected path or multi-path thereby reducing congestion on the system. | 2020-03-19 |
20200092209 | OPTIMIZING APPLICATION THROUGHPUT - An approach is provided for optimizing application throughput. Data is collected about traffic flow in a computer network from one or more switches and one or more switches in the computer network. A hot spot destination in the computer network is identified by performing analytics on the collected data about the traffic flow against a traffic pattern in the computer network. An application-optimized software-defined networking (SDN) path is created for new flows to the hot spot destination. In response to an establishment of a new flow, the new flow is forwarded to the application-optimized SDN path. | 2020-03-19 |
20200092210 | Policy Based Dual Connectivity Traffic Steering - Policy based dual connectivity traffic steering is described herein. A master Long-Term Evolution (LTE) base station may operate in conjunction with a secondary New Radio (NR) base station to provide dual connectivity to user equipment (UE) operating in an environment. The LTE base station can steer traffic between the LTE base station and the NR base station based at least in part on policy information received at the LTE base station. The policy information can indicate, for a particular UE and for a particular Quality of Service (QoS) Class Identifier (QCI), whether the LTE base station can transfer a communication to the NR base station. Thus, traffic steering determinations can be based on the policy information, quality identifiers, device capability, signal strength(s), load level(s), and the like, thereby providing a flexible framework for steering wireless traffic in a dual connectivity environment. | 2020-03-19 |
20200092211 | PACKET TELEMETRY DATA VIA FIRST HOP NODE CONFIGURATION - Techniques for monitoring packet telemetry are provided. A policy is received at a first node from a controller, where the policy includes an indication of a first flow. A first packet belonging to the first flow is received at the first node. A second node in a network path for the first packet is determined. A first header is added to the first packet based on the policy, wherein the first header includes an indication of the controller. The first packet is transmitted to the second node. Finally, telemetry data associated with the first node is transmitted to the controller based on the policy. | 2020-03-19 |
20200092212 | QUALITY OF SERVICE CONTROL METHOD, DEVICE, AND SYSTEM - This application discloses a QoS control method, device, and system, to implement QoS control when a 5G core network or another future network is accessed through a network such as, for example, a fixed network. The method, performed by an access gateway function entity, includes: obtaining a correspondence between a QoS file and a virtual local area network (VLAN) priority, where the correspondence between the QoS file and the VLAN priority includes a correspondence between a first QoS file and a first VLAN priority; sending a first message to a terminal, where the first message includes the correspondence between the QoS file and the VLAN priority; receiving an uplink data packet from the terminal, where a QoS file corresponding to the uplink data packet is the first QoS file, and the uplink data packet carries the first VLAN priority; and performing QoS control on the uplink data packet based on the first VLAN priority. | 2020-03-19 |
20200092213 | SYSTEM, APPARATUSES AND METHOD FOR TRAFFIC PROFILING OF MOBILE VIDEO STREAMING - The present invention relates to traffic profiling in real time within a video streaming session. First, multiple data packet flows at a lower layer of the OSI model are observed. A data packet flow pattern is obtained for each observed flow, and each obtained pattern is compared to a pre-defined characteristic streaming pattern. From the observed flows, any data packet flow that has its data packet flow pattern close to the pre-defined characteristic streaming pattern is selected as a video streaming flow. A buffer state of the video streaming flow is identified amongst a filling state, a steady state, and a depletion state, by observing a slope of accumulated data over time. Eventually, multimedia-related information of the selected video streaming flow is provided based on its data packet flow pattern. | 2020-03-19 |
20200092214 | DYNAMIC RESOURCE ALLOCATION BASED UPON NETWORK FLOW CONTROL - One or more techniques and/or devices are provided for dynamic resource allocation based upon network flow control. For example, a first counter, corresponding to a count of communication availability signals provided by a network interface to a storage process, may be maintained. A second counter, corresponding to a count of communication unavailability signals provided by the network interface to the storage process, may be maintained. Responsive to the first counter exceeding a resource allocation threshold, additional resources may be dynamically allocated to the storage process during operation of the storage process. Responsive to the second counter exceeding a resource deallocation threshold, resources may be dynamically deallocated from the storage process during operation of the storage process. In this way, resources allocation for the storage process may be dynamically adjusted based upon real-time network flow control information indicative of whether the storage process is efficiently utilizing network communication channel availability. | 2020-03-19 |
20200092215 | FEEDBACK LOOP FOR FRAME MAXIMIZATION - The present disclosure describes a method for characterizing a maximum frame size in a network data transmission with a feedback loop. A source device transmits a set of current frames with an initial frame size to a designation device, and receives returning frames from the designation device via a loopback interface. The frame size of subsequent frames to be transmitted is adjusted in bytes. The adjustment of the frame size may be based on a predetermined condition related to the returning frames. The maximum value of the frame size satisfied with the predetermined condition may be designated as the maximum frame size. A plurality of algorithms and machine learning may be used to project the frame size of the subsequent frames and obtain a precise value of the maximum frame size in a network route. | 2020-03-19 |
20200092216 | USER DIRECTED BANDWIDTH OPTIMIZATION - Systems and methods are provided to optimize bandwidth usage associated with a local network. As part of the bandwidth optimization techniques, an authentication entity may receive an indication of an access profile selected by a user of an electronic device. The authentication entity may assign the access profile to the electronic device. Accordingly, when the electronic device transmits data, a network regulation entity may process the traffic in accordance with the access profile. To this end, the network regulation entity may correspond communication sessions within the traffic to an application. The network regulation entity may then query the access profile to determine a priority for each application. When the traffic exceeds a threshold byte volume, the network regulation entity may queue lower priority communication sessions. By processing the traffic based upon a user-indicated access profile, compliance with network neutrality principles may be maintained. | 2020-03-19 |
20200092217 | Device, System, and Method of RTP Packet Transmission and Analysis of Voice-over-IP Communications - Device, system, and method of Voice over Internet Protocol (VoIP) communications, and particularly of Real Time Protocol (RTP) communication. In order to improve quality-of-service or quality-of-experience for a group of VoIP calls that are served by a VoIP router, each VoIP transmitter implements and adds a pseudo-random waiting-period prior to transmitting each outgoing RTP packet, or otherwise re-orders or mixes or shuffles the order of channels of RTP packets that are buffered or queued for transmission. Accordingly, no particular VoIP channel suffers from repeated drops of its RTP packets at the VoIP router. Additionally, VoIP network analyzers operate to measure the overall VoIP network overuse, or the average RTP packet loss rate of multiple VoIP channels, based on measuring RTP packet loss rate of a single VoIP channel which enforces a random pre-transmission waiting-period. | 2020-03-19 |
20200092218 | System, Device, and Method of RTP Packet Transmission and Analysis of Voice-over-IP Communications - Device, system, and method of Voice over Internet Protocol (VoIP) communications, and particularly of Real Time Protocol (RTP) communication. In order to improve quality-of-service or quality-of-experience for a group of VoIP calls that are served by a VoIP router, each VoIP transmitter implements and adds a pseudo-random waiting-period prior to transmitting each outgoing RTP packet, or otherwise re-orders or mixes or shuffles the order of channels of RTP packets that are buffered or queued for transmission. Accordingly, no particular VoIP channel suffers from repeated drops of its RTP packets at the VoIP router. Additionally, VoIP network analyzers operate to measure the overall VoIP network overuse, or the average RTP packet loss rate of multiple VoIP channels, based on measuring RTP packet loss rate of a single VoIP channel which enforces a random pre-transmission waiting-period. | 2020-03-19 |
20200092219 | PRIORITIZING FLOWS IN SOFTWARE DEFINED NETWORKS - Described herein are systems, methods, and software to enhance network traffic management. In one implementation, a method of operating a network interface system on a host computing system includes receiving a plurality of network packets and, for each packet in the plurality of network packets, identifying whether the packet comprises a control packet for fault detection in a software defined network (SDN). The method further includes prioritizing, for processing by a main processing system of the computing system, each packet in the plurality of network packets based on whether the packet comprises a control packet for fault detection in a SDN. | 2020-03-19 |
20200092220 | TIMER MANAGEMENT FOR NETWORK DEVICES - Timer management techniques are described. An example processing device includes a memory configured to store successive wheels available to be included in traversal paths for timers running on the device, each wheel representing a queue of timers, each wheel having a different, corresponding time delay (TO) value for queuing a timer, and processing circuitry in communication with the memory. The processing circuitry is configured to determine, in response to a request for a timer, a total traversal time for the timer, to select, from the stored wheels, a subset of wheels such that a sum of the respective TO values of the selected subset is within a predetermined margin of error with respect to the total traversal time for the timer, and to sequence the selected subset of wheels based on the respective TO values of the selected subset of wheels to form a traversal path for the timer. | 2020-03-19 |
20200092221 | System, Apparatus, And Method For Controlling Internet Devices Via A Mobile Device Session - Methods, a system, and apparatus for managing the separation and distribution of digital controls wherein the digital content in a network system includes receiving a request from any one of control devices, host server response to control device request (and output devices), host server may either non-discriminatively or discriminatively broadcast to any of the control devices, and control device handling responses throughout home network system. The methods, system, and computer readable medium include user experience optimized application types for (optimally) separating and distributing the associated control and associated status information elements during active sessions from the host server to the control devices and output devices within a network system. Configuring a control session comprises receiving a request to execute an input/output application from a control application executing on a mobile control device Configuring the control session also includes aggregating a plurality of real-world connectable processing nodes into an application session set of processing nodes by allocating at least one function required by the input/output application for execution on each processing node in the set of processing nodes, wherein the set of processing nodes is determined based on processing requirements of the input/output application. | 2020-03-19 |
20200092222 | AUTOMATED MIGRATION OF COMPUTE INSTANCES TO ISOLATED VIRTUAL NETWORKS - A migration manager (MM) identifies a source group of compute instances (at a first partition of a provider network) to be migrated to an isolated virtual network (IVN) implemented in a second partition. The MM triggers the establishment within the IVN of an equivalence group of instances corresponding to the source group instances. Connectivity between the equivalence group and a first load balancer which was being used for the source group in the first partition is maintained by modifying one or more configuration settings. After a replacement load balancer is established within the IVN, the first load balancer is decommissioned. | 2020-03-19 |
20200092223 | DYNAMIC BUFFER ALLOCATION IN SIMILAR INFRASTRUCTURES - A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statistics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal. | 2020-03-19 |
20200092224 | DYNAMIC BUFFER ALLOCATION IN SIMILAR INFRASTRUCTURES - A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal. | 2020-03-19 |
20200092225 | ELECTRICAL COMPUTER SYSTEM PROCESSING ARCHITECTURE FOR EQUITABLE ASSIGNMENT OF IMPROVEMENTS - An electrical computer system processing architecture for providing fairness amongst client computers of the computer system is disclosed. The electrical computer system processing architecture comprises a plurality of client computers connected to at least one server by a computer network. Each of the client computers is configured to provide requests to the at least one server. The or each server comprises a store for storing requests provided by the plurality of client computers. The or each server is configured to: match complementary requests from the plurality of client computers stored in the store; following matching of complementary requests, assign an indication of how well the requests have been met compared to requests of other client computers of the computer system; accumulate the indications to form an accumulation of indications; and when the accumulation exceeds a predetermined threshold, match future requests in favor of the client computer whose requests have not been met as favorably with requests of other client computers of the computer system, thereby providing fairness amongst client computers of the computer system. | 2020-03-19 |
20200092226 | SYSTEM-ON-CHIP INCLUDING NETWORK FOR DEBUGGING - Provided is a system-on-chip. A central controller is configured to, in response to a request from a host, generate a first signal for requesting error information related to an error from a design of an IP. A local controller is configured to generate a second signal including the error information of the target IP if the request from the host is determined to be for the target IP based on the first signal. | 2020-03-19 |
20200092227 | FAULT-TOLERANT ARCHITECTURE FOR PACKET CAPTURE - Embodiments are directed to a method of implementing a packet capture ring. The packet capture ring includes a plurality of appliances, and the plurality of appliances includes a first appliance and a second appliance. The first appliance and the second appliance are both attached to a network tap, and the first appliance works as a master appliance. The master appliance ingests packets from the network tap, encapsulates the packets and forwards encapsulated packets in the packet capture ring. The method includes: detecting, by the second appliance, a failure of the first appliance; working, by the second appliance, as the master appliance; and removing, by the second appliance, the first appliance from a forwarding designation list. | 2020-03-19 |
20200092228 | ULTRA-SCALABLE, DISAGGREGATED INTERNET PROTOCOL (IP) AND ETHERNET SWITCHING SYSTEM FOR A WIDE AREA NETWORK - Systems and Methods for IP and Ethernet switching in an ultra-scalable disaggregated wide area common carrier (WACC) disaggregated networking switching system. The WACC network switching system may include an Ethernet fabric having a set of M Ethernet switches each including a set of N switch ports, and a set of N input/output (IO) devices each including a set of W IO ports, a set of M Ethernet ports, an IO side packet processor (IOSP), and a fabric side packet processor (FSP). Each Ethernet switch may establish switch queues. Each IO device may establish a set of M hierarchical virtual output queues each including a set of N ingress-IOSP queues and ingress-virtual output queues, a set of W egress-IOSP queues, a set of M ingress-FSP queues, and a set of N hierarchical virtual input queues each including a set of N egress-FSP queues and egress-virtual input queues. | 2020-03-19 |
20200092229 | Direct Packet Placement - Communication apparatus includes a host interface and a network interface, which receives from a packet communication network at least one packet stream including a sequence of data packets, which include headers containing respective sequence numbers and data payloads containing slices of the data segment having a predefined, fixed size per slice. Packet processing circuitry is configured to receive the data packets from the network interface, and to map the data payloads of the data packets in the at least one packet stream, using a linear mapping of the sequence numbers, to respective addresses in the buffer. | 2020-03-19 |
20200092230 | PARTIAL RECONFIGURATION FOR NETWORK-ON-CHIP (NOC) - Examples described herein provide for an electronic circuit, such as a System-on-Chip (SoC), having a Network-on-Chip (NoC). The NoC is configurable and has capabilities to be partially reconfigured. In an example, a NoC on an integrated circuit is configured. Subsystems on the integrated circuit communicate via the NoC. The NoC is partially reconfigured. A first subset of the NoC is reconfigured during the partial reconfiguration, and a second subset of the NoC is capable of continuing to pass communications uninterruptedly during the partial reconfiguration. After the partial reconfiguration, two or more of the subsystems communicate via the first subset of the NoC. | 2020-03-19 |
20200092231 | Information Prompt Method And Apparatus - The present disclosure relates to information prompt methods and apparatus. One example method includes determining a first communication object from a target communication object set, obtaining first interaction information corresponding to the first communication object, receiving input information by using an information input interface of the first communication object, determining a matching degree between the input information and the first communication object based on the input information and the first interaction information, and performing prompt if the matching degree is less than a first threshold. | 2020-03-19 |
20200092232 | INFORMATION PROCESSING APPARATUS, USER TERMINAL APPARATUS, AND CONTROL METHOD - In an information processing apparatus, a question information acquisition unit acquires question information from a user terminal apparatus. A chat data acquisition unit acquires chat data including one or more pieces of second question data and one or more pieces of second answer data. Each piece of second question data is a collection of one or more pieces of similar first question data selected from FAQ data including the pieces of first question data and first answer data thereto. The second answer data is data obtained by simplifying corresponding one or more pieces of first answer data. An answer data acquisition unit acquires a piece of second answer data corresponding to a piece of second question data identical or similar to the question information. A transmission unit transmits the piece of second answer data acquired by the answer data acquisition unit to the user terminal apparatus. | 2020-03-19 |
20200092233 | MODIFICATION OF AUDIO-BASED COMPUTER PROGRAM OUTPUT - Modifying computer program output in a voice or non-text input activated environment is provided. A system can receive audio signals detected by a microphone of a device. The system can parse the audio signal to identify a computer program to invoke. The computer program can identify a dialog data structure. The system can modify the identified dialog data structure to include a content item. The system can provide the modified dialog data structure to a computing device for presentation. | 2020-03-19 |
20200092234 | MESSAGE TRANSMISSION METHOD AND DEVICE, TERMINAL AND STORAGE MEDIUM - Provided are a message transmission method and device, a terminal and a storage medium, belonging to the technical field of communications. The method includes: sending an instant messaging message to a second terminal, the instant messaging message being a message input in first chat interface; when a transmission mode switching condition is satisfied, switching the first chat interface to a second chat interface, the second chat interface being used for displaying an LPWAN communication record between the first terminal and the second terminal; acquiring a first LPWAN communication message input in the second chat interface; and sending the first LPWAN communication message to the second terminal through a connection with the second terminal for display of the first LPWAN communication message in the second chat interface of the local terminal. The second chat interface adopts a public or private wireless protocol. | 2020-03-19 |
20200092235 | Method and Apparatus for Composite User Interface Generation - A method for directing messages between a composite user interface and at least one source application. A message is to be directed to a predetermined set of services, each service executes a command specified by the message and the message comprises details of the predetermined set of services. Each service in the predetermined set of services uses said details to determine whether the message should be sent to another service, and if it is determined that the message should be sent to another service transmits the message to an appropriate service. | 2020-03-19 |
20200092236 | Poisoned Message Detection System - A method, apparatus, system, and computer program product for processing messages. A message is received from a producer by a computer system. The message is sent to a consumer by the computer system. The message is sent to a set of consumers in addition to the consumer by the computer system in response to an adverse condition being present for the consumer after sending the message the consumer. A set of actions is performed in response to the adverse condition being present in the set of consumers receiving the message. | 2020-03-19 |
20200092237 | INLINE RESPONSES TO VIDEO OR VOICE MESSAGES - The method includes receiving sender media that was recorded by a sender device associated with a sender. The method further comprises playing, by a recipient device, the sender media for a recipient. The method further comprises detecting that the recipient is speaking. The method further comprises recording recipient media based on detecting that the recipient is speaking. The method further comprises determining a location in the sender media at which the recipient media is to be included. The method further comprises generating combined media that includes at least a portion of the sender media and the recipient media at the location. | 2020-03-19 |
20200092238 | DYNAMIC MESSAGE CONTENT FILTER - Embodiments determine message text content amount limits as a function of recipient context, wherein in some embodiments processors are configured to determine whether a physical proximity distance of a recipient of an electronic message to another, identified person is within a minimum specified threshold distance. In response to determining that the physical proximity distance is within the minimum specified threshold distance, some embodiments compare a total amount of text content of the message to a threshold maximum content value; and, in response to determining that the total amount of the message text content exceeds the threshold maximum content value, notify a sender of the message that the threshold maximum content value currently applies to messages sent to the recipient. | 2020-03-19 |
20200092239 | USING SENSOR DATA TO CONTROL MESSAGE DELIVERY - A method, computer system, and computer program product for using sensor data to control message delivery to a user. The method may include defining one or more criteria which may include a message delivery, sensor, bypass, or rerouting criterion. The message delivery criterion may include a rule for delivering messages. The method may include operations performed by a device communicating with a communications network. The device may have a computer and may receive a message from a user of a plurality of users and data from a sensor. The method may determine whether the sensor data meets the message delivery criterion and suppress a message notification based on the message delivery criterion. In some embodiments, the sensor is an image sensor and the method includes determining that content of an image captured by the image sensor includes an activity corresponding with a message delivery criterion. | 2020-03-19 |
20200092240 | TOKEN-BASED MESSAGE EXCHANGE SYSTEM - Techniques are disclosed relating to exchanging tokens for processing messages. A first system may access information identifying a first requested amount of tokens for a message to be processed by a second system. The first system may cause a first transaction to be written to a distributed ledger that records a transfer of the first requested amount from an account of the first system to an account of the second system. The first system may send a message to the second system. The first system may provide information identifying a second requested amount of tokens for a message to be processed by the first system. The first system may process a message from a third system in response to verifying that there is a second transaction that records a transfer of the second requested amount from an account of the third system to the account of the first system. | 2020-03-19 |
20200092241 | SYSTEMS AND METHODS FOR CONDITIONALLY DISPLAYING NOTIFICATION MESSAGES - A user engagement system and methods for operating the same to display notification messages are provided herein. The user engagement system may include a camera assembly, an image monitor, and a controller configured to initiate a message-display operation based on a signal received from a user device. The camera assembly may be mounted in a fixed position and directed away from a cabinet of a cooking appliance. The image monitor may be directed away from the cabinet. | 2020-03-19 |
20200092242 | PERSONALIZED COMMUNICATIONS - In some embodiments, security and/or automation systems, collectively referred to as automation systems, may facilitate communications between a remote user and an occupant of a residence. The automation system may receive one or more communications from a user and deliver the communication to the specified recipient when the recipient occupies the residence. The automation system may determine the recipient is proximate the residence and may notify the recipient of the pending communication. The recipient may use the control panel or another device associated with the security and/or automation system to receive the message. | 2020-03-19 |
20200092243 | AUTOMATIC SUGGESTIONS FOR MESSAGE EXCHANGE THREADS - A system and method for identifying an entity from a message exchange thread and generating a suggestion that is directed to the entity, such as a suggestion for a user to take an action on the entity. A suggestion application receives at least one electronic message from a message exchange thread, identifies an entity that can be actionable from the electronic message, determines contextual indicators of the entity, determines whether the entity is actionable based on the contextual indicators, and responsive to the entity being actionable, provides a suggestion that is directed to the entity to a participant(s) of the message exchange thread. | 2020-03-19 |
20200092244 | SYSTEM AND METHOD FOR LOCATING A MINYAN - A method and system for organizing a quorum is provided. The method includes requesting, using an application on an electronic device, the formation of a quorum at a predetermined geographic location, identifying a plurality of individuals within that predetermined geographic location, and sending a notification to a secondary electronic device for each of the plurality of individuals, wherein the notification notifies each of the plurality of individuals of the predetermined geolocation of the quorum. | 2020-03-19 |
20200092245 | PROVOKING AND MAINTAINING USER ATTENTION FOR URGENT MESSAGES BY ACTIVELY MONITORING USER ACTIVITY AND BIOMETRICS - A computer-implemented method comprising: monitoring, by the computing device, user behavior and user biometrics of a user, detecting, by the computing device, user device activity of a user device that triggers an attention provoking action; executing, by the computing device, attention provoking instructions based on the detecting the user device activity that triggers the attention provoking action; detecting, by the computing device, that attention level criteria has been satisfied based on the monitoring the user behavior and the user biometrics; and discontinuing, by the computing device, the executing the attention provoking instructions based on the detecting that the attention provoking level has been satisfied. | 2020-03-19 |
20200092246 | METHOD AND SYSTEM FOR PROVIDING NOTIFICATION - A system for providing a notification for a plurality of messages is disclosed. The system may include a memory and at least one processor. The at least one processor may be configured to receive the plurality of messages from one or more devices associated with one or more users; identify one or more subjects associated with the plurality of messages; and provide the notification including the plurality of messages to a device associated with a recipient, wherein the plurality of messages are arranged in the notification based on the identified one or more subjects, and wherein the one or more users and the recipient exchange the plurality of messages in a collaborative environment. | 2020-03-19 |
20200092247 | DISPLAY METHOD OF EXCHANGING MESSAGES AMONG USERS IN A GROUP - The display method executed by a terminal including setting a first user name of the first user on the terminal, displaying the first user name and a second user name of the second user in a display area of the terminal based on a first input on the terminal, deleting the displayed second user name from the display area of the terminal based on a second input constituting at least a portion of the set first user name being inputted into the terminal, the displayed second user name being different from the set first user name, based on a second input constituting a part of the first user name, displaying first information representing that a message is destined for the first user, based on a selection of the first user by the user of the terminal, and transmitting the message including the first information to the terminals may be provided. | 2020-03-19 |
20200092248 | Mobile Application with Dating Questionnaire - A method having the following steps: (1) receiving input from a first user to open a mobile application of a dating questionnaire with a first electronic device and solicit first user data about a possible interaction; (2) prompting the first user to access a first user avatar; (3) prompting responses from first user to questions from the dating questionnaire; (4) displaying the first user avatar in which the first user avatar visually gestures a confirmation that the responses were successfully received; (5) transmitting an invitation to a second electronic device associated with the second user; (6) providing a digital prompt that enables the second user to access the mobile application; (7) prompting the second user to access a second user avatar; (8) displaying the first user avatar and the second user avatar in a virtual meeting; (9) providing the first user data to the second user; (10) prompting the second user to enter their responses to the dating questionnaire; (11) comparing the first user data (responses) and the second user data (responses); and (12) identifying differences, if any, between the first user data and the second user data. | 2020-03-19 |
20200092249 | SOCIAL NETWORK GRAPH INFERENCE AND AGGREGATION WITH PORTABILITY, PROTECTED SHARED CONTENT, AND APPLICATION PROGRAMS SPANNING MULTIPLE SOCIAL NETWORKS - An application program spans a plurality of digital social networks. The application program includes an inferred digital social network. Consent is obtained from a plurality of users of the digital social networks to participation in the inferred digital social network. Information is automatically obtained from the digital social networks for the users, through a plurality of respective communication channels, which can be application program interfaces or covert or subliminal channels. The information includes link information between each of the users and other individuals in the digital social networks. The information is aggregated for the users to form the inferred digital social network, corresponding to a graph having nodes representing the users and the other individuals and having links between the nodes representing social relationships. Each of the users is enabled to send and receive message information with other users, to view profile information of other users, and to view social contact information of other users, through the inferred digital social network. In response to inputs from the users, the application program provides state information to the digital social networks spanned by the application program that the digital social networks cause to be communicated to users of the digital social networks. | 2020-03-19 |
20200092250 | COMMUNICATIONS AND ANALYSIS SYSTEM - An electronic communications method includes sending, by a user device, an electronic communication to a device. The electronic communications method further includes receiving, by the user device, an electronic confirmation message. The electronic communications method further includes sending, by the user device, electronic information. The electronic communications message further includes receiving, by the user device, a value. The value is based on electronically analyzing simultaneous electronic information being sent to the device. The electronic communications message further includes receiving, by the user device, an electronic recommendation message. The electronic recommendation message includes a recommended schedule of communications based on the score. The electronic communications method further includes sending, by the user device, an electronic request message based on the value and the electronic recommendation message. | 2020-03-19 |
20200092251 | UNIQUE IDENTITIES OF ENDPOINTS ACROSS LAYER 3 NETWORKS - Systems and methods provide for determining unique identities of endpoints across L3 networks. For example, a first networking device of a network management system in a first L3 network can receive a mapping of a first L3 network address to a first L2 network address from a second networking device in a second L3 network. The system can determine that the first L2 network address is associated with a third networking device. The system can receive a mapping of the L3 address to a second L2 network address from the third device. The system can determine that the second L2 address is associated with an endpoint. The system can store the L3 address and the second L2 address as an identity of the endpoint. The system can present network utilization information of the endpoint using traffic to/from the L3 address correlated to the endpoint based on its identity. | 2020-03-19 |
20200092252 | DOMAIN NAME SYSTEM OPERATIONS IMPLEMENTED USING SCALABLE VIRTUAL TRAFFIC HUB - Connectivity is enabled between a first and second isolated network using a virtual traffic hub that includes a decision master node responsible for determining a routing action for a packet received at the hub. At the hub, a determination is made that a particular domain name system (DNS) message being directed to a first resource in the first isolated network is to include an indication of a second resource in the second isolated network. The second resource is assigned a network address within a private address range of the second isolated network, which overlaps with a private address range being used in the first isolated network. The hub causes a transformed version of the network address to be included in the DNS message delivered to the first resource. | 2020-03-19 |
20200092253 | USING DYNAMIC HOST CONTROL PROTOCOL (DHCP) AND A SPECIAL FILE FORMAT TO CONVEY QUALITY OF SERVICE (QOS) AND SERVICE INFORMATION TO CUSTOMER EQUIPMENT - A request is received from customer premises equipment of a customer; the request is responded to with a pointer to a configuration file containing circuit configuration information for the customer. The configuration file is generated. Responsive to the customer premises equipment of the customer following the pointer, the configuration file is served out to the customer premises equipment of the customer. Subsequent internet traffic from the customer is treated in accordance with the configuration file | 2020-03-19 |
20200092254 | SYSTEMS AND METHODS FOR MICRO NETWORK SEGMENTATION - A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet. | 2020-03-19 |
20200092255 | ENHANCED COMMUNICATION OF SERVICE STATUS INFORMATION IN A COMPUTING ENVIRONMENT - Described herein are systems, methods, and software to improve distribution of service information in a computing environment. In one implementation, a computing element identifies a modification to a locally maintained service data structure that maintains status information for services of a computing environment. In response to the modification, the computing element may identify a key-value pair and add the key-value pair to a gateway protocol packet. Once added to the packet, the computing element may communicate the packet to a second computing element. | 2020-03-19 |
20200092256 | RESTRICT COMMUNICATIONS TO DEVICE BASED ON INTERNET ACCESS - Examples disclosed herein relate to securing a controller of a device. The controller is to determine whether a network interface of the device is connected to the Internet. Communications are restricted on the network interface in response to the port having access to the Internet. In some examples, the restriction can be related to a vulnerability. | 2020-03-19 |
20200092257 | ENTITY-SEPARATED EMAIL DOMAIN AUTHENTICATION FOR KNOWN AND OPEN SIGN-UP DOMAINS - An email validation system receives an email validation request from a requestor to validate an email, the email validation request indicating at least a sender domain indicating a domain of the sender of the email. The email validation system determines whether the sender domain is in a whitelist of known domains, wherein a known domain is a domain that is linked to an organization whose provenance is known, such that it can be linked to an identifiable entity in the real world. The email validation system generates, in response to determining that the sender domain is not in the list of known domains, a message indicating that the email is not valid. The email validation system generates, in response to determining that the sender domain is in the list of known domains, the message indicating that the email is valid, and transmits the message to the requestor. | 2020-03-19 |
20200092258 | Method and System for First Party and Third Party Detection and for the Occlusion of Network Device TLS Signatures - A method for uniquely identifying a network client or application based on a transport layer security (TLS) handshake includes: storing, in a computing device, a list of cipher suites and a list of supported curves; intercepting, by the computing device, a data packet transmitted to as part of the TLS handshake; filtering, by the computing device, cipher suites included in the list of cipher suites from the data packet; filtering, by the computing device, supported curves included in the list of supported curves from the data packet; building, by the computing device, a data string using data in the data packet remaining after filtering; generating, by the computing device, a signature value by hashing the data string; and identifying, by the computing device, a network client or application using the generated signature value. | 2020-03-19 |
20200092259 | MEDICAL DEVICE SYSTEM INCLUDING INFORMATION TECHNOLOGY INFRASTRUCTURE HAVING SECURE CLUSTER DOMAIN SUPPORTING EXTERNAL DOMAIN - A medical device information technology (“IT”) data transfer system in one embodiment includes a cluster domain, an external domain and an interface domain. Equipment belonging to the cluster domain may communicate in real time such that availability, safety, security, reliable integrity and performance are guaranteed. The external domain includes equipment not enabled for direct inclusion in the cluster domain, and may include equipment for external information systems, presentation equipment, personal computer equipment, shared medical equipment and bedside medical equipment. The interface domain enables external domain equipment to communicate with cluster equipment in a bidirectional manner. Communication may be via certain access nodes in the cluster. The access nodes enable exchange of information between the open external domain and the closed and private cluster domain. | 2020-03-19 |
20200092260 | SYSTEM AND METHOD FOR MANAGEMENT OF CONFIDENTIAL DATA - A management request is received by a system for carrying out one or more data management operations (including, but not limited to, adding data, merging data or searching for data). The management request is received from a requesting entity. The system comprises a representation database, which comprises at least one secure element. The at least one secure element is a representation of at least one dataset containing confidential data elements stored in at least one database owned or operated by a third party entity. The management request is processed by performing at least one operation, for example by a processing component in the system, on the representation database. In a third step, a processing result is provided, which comprises any suitable information or data content. The processing result is dependent on the contents of the management request. | 2020-03-19 |
20200092261 | USER ANONYMITY THROUGH DATA SWAPPING - A size of collected data to swap is identified, over vehicle-to-vehicle communication between first and second vehicles. A first segment of data of the size stored to the first vehicle is swapped with a second segment of data of the size stored to the second vehicle over the vehicle-to-vehicle communication between the first and second vehicles. The swapped data received from the second vehicle is sent from the first vehicle to a server. | 2020-03-19 |
20200092262 | SYSTEM AND DEVICES FOR ENABLING ANONYMOUS COMMUNICATION BASED ON MOTOR VEHICLE IDENTIFIERS - A device implements anonymous communication between users through an anonymous communication system. The device transmits a search query to a server of the anonymous communication system, where the search query corresponds to a motor vehicle identifier. The device receives from the server, an indication of whether the motor vehicle identifier is registered or is not registered with the anonymous communication system. If the motor vehicle identifier is registered, the device enables creation of content to be communicated and transmits the content to the server for retransmission to a device associated with the registered motor vehicle identifier. If, however, the motor vehicle identifier is not registered, the device presents a mechanism to enable creation of content to be communicated and transmits the content to the server for storage and retransmission to a device associated with the motor vehicle identifier if the motor vehicle identifier subsequently becomes registered with the anonymous communication system. | 2020-03-19 |
20200092263 | SECURE DEVICE-BOUND EDGE WORKLOAD RECEIPT - The disclosed technology provides for processing a secure cloud workload with an associated unique workload identifier received from a workload provisioning service including one or more workload provisioning servers at an edge device. A unique device identifier is provided to the one or more workload provisioning servers. The unique device identifier is associated with the edge device. A packaged secure cloud workload is received from the one or more workload provisioning servers and is encrypted by the one more workload provisioning servers using a unique packaging key generated by the one or more workload provisioning servers based on the unique device identifier, the unique workload identifier, and a nonce. The edge device cryptographically generates the unique packaging key using the unique device identifier, the unique workload identifier, and the nonce. The packaged secure cloud workload is decrypted using the generated unique packaging key cryptographically generated by the edge device. | 2020-03-19 |
20200092264 | END-POINT ASSISTED GATEWAY DECRYPTION WITHOUT MAN-IN-THE-MIDDLE - A method, system, and computer-usable medium are disclosed for, responsive to receipt at a security device of a connection request from a client to a server receiving a message from the client to the server, extracting from a memory associated with the client a secret for performing decryption of application messages communicated from the server to the client, and using the secret to decrypt the application messages to perform at least one of monitoring and inspection of the application messages as decrypted in accordance with a security policy, while allowing the client and the server to maintain an end-to-end connection without intermediate termination at the security device. | 2020-03-19 |
20200092265 | SELECTIVE COGNITIVE SECURITY FOR COMMUNICATION DATA - An approach for securing sensitive information in communication data is provided. In an embodiment, communication data is received from an ongoing communication (e.g., phone conversation, exchange of text messages, etc.) between a user and at least one other person. Contextual input is derived based on the content of the communication data and historical data from one or more external sources. A sensitivity index score for each element (e.g., portion) of the communication data is derived based on an assessment of the contextual input. The elements of the communication data having a sensitivity index score greater than a predefined threshold value are deemed to be security sensitive and, therefore, are encoded prior to transmission to its intended recipient. | 2020-03-19 |
20200092266 | DYNAMIC TRANSMISSION OF ENCRYPTED DATA - Embodiments of the present disclosure may be used to securely transmit data between multiple computing devices. Among other things, this can greatly extend the range of data transmissions in comparison to fixed-position wireless beacons and access points. | 2020-03-19 |
20200092267 | SECURE PROCESSING ENVIRONMENT FOR PROTECTING SENSITIVE INFORMATION - A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data. | 2020-03-19 |