14th week of 2022 patent applcation highlights part 52 |
Patent application number | Title | Published |
20220109539 | PHASE TRACKING REFERENCE SIGNALS (PTRSs) WITH ZERO POWER (ZP) TONES - Aspects of the present disclosure can be implemented in a method for wireless communication by a first wireless node. The method generally includes receiving, from a second wireless node, information regarding PTRS tones, designating one or more of the PTRS tones as ZP tones and one or more of the PTRS tones as NZP tones based, at least in part, on the information, and transmitting a PTRS on the NZP tones. In some cases, the first wireless node is a user equipment (UE) and the second wireless node is a network entity. In some cases, the first wireless node is a network entity and the second wireless node is a UE. | 2022-04-07 |
20220109540 | METHODS AND APPARATUS FOR RANDOM ACCESS PROCEDURES WITH SPATIAL SETTINGS - Methods and apparatus for random access procedures with spatial settings. A method of operating a user equipment includes receiving a system information block (SIB). The SIB indicates a set of channel state information reference signals (CSI-RS) resources for CSI-RSs, a set of random access occasions (ROs), and a mapping between the set of ROs and the set of CSI-RS resources. The method further includes determining a first RO from the set of ROs for transmission of a first physical random access channel (PRACH), determining a first spatial setting for the first PRACH transmission based on a first CSI-RS resource from the set of CSI-RS resources that is mapped to the first RO, and transmitting the first PRACH in the first RO using the first spatial setting. | 2022-04-07 |
20220109541 | Spatial Relation in New Radio - A wireless device activates one or more transmission configuration indicator (TCI) states for decoding physical downlink shared channel (PDSCH). A wireless device transmits a sounding reference signal (SRS) with a spatial domain transmission filter determined based on a reference signal in an activated TCI state, of the one or more TCI states, with the lowest TCI state index among one or more TCI state indexes of the one or more TCI states. | 2022-04-07 |
20220109542 | METHOD AND APPARATUS FOR DETERMINING AND TRANSMITTING PARAMETER OF REFERENCE SIGNAL, TERMINAL DEVICE AND BASE STATION - The embodiments of the present disclosure disclose a method for determining a parameter of a reference signal, a method for transmitting a parameter of a reference signal, a terminal device and a base station. The determination method includes: obtaining a parameter of a first type of reference signal by a first signaling; and determining a parameter of a second type of reference signal according to the obtained parameter of the first type of reference signal, and the first type of reference signal and/or the second type of reference signal include at least one of: reference signal for data demodulation, reference signal for phase noise compensation, reference signal for Doppler shift compensation, or extended reference signal for data demodulation. | 2022-04-07 |
20220109543 | POLARIZATION INDICATION SIGNALING FOR CHANNEL STATE INFORMATION REFERENCE SIGNALS - Various aspects of the present disclosure generally relate to wireless communication In some aspects, a base station may determine a polarization associated with a channel state information reference signal (CSI-RS) resource set configuration. The base station may transmit, to a user equipment, a polarization indication that indicates the polarization associated with the CSI-RS resource set configuration. Numerous other aspects are provided. | 2022-04-07 |
20220109544 | SYSTEMS METHODS AND APPARATUSES FOR DETECTING CONTROL CHANNELS IN WIRELESS COMMUNICATION - A wireless navigation system with automatic guidance to the final destination routes capable of operating in Internet-dead zones includes a system of servers containing data of final destinations/routes, Google and, or Apple Maps API, a voice synthesizer server, a GPS/AGPS system of satellites, servers and processing stations, a set of sensors, a microprocessor, a standard mobile operating system, a supra operating system controlling the above systems and a display and sound system for displaying the final output of the system. | 2022-04-07 |
20220109545 | RESOURCE ALLOCATION FOR TRANSMISSION OF DUPLICATES OF DATA IN WIRELESS COMMUNICATION NETWORKS - According to an example aspect of the present invention, there is provided a method comprising, receiving a plurality of sets of radio resource configurations for communicating data via a first logical channel, determining a configuration of duplication and activating, based on a criterion associated with the configuration of duplication, one set of radio resource configurations from the plurality of sets of radio resource configurations for communication of said data via the first logical channel. | 2022-04-07 |
20220109546 | SIDELINK PHYSICAL LAYER PROCEDURES FOR COLLISION AVOIDANCE, HARQ FEEDBACK, AND CSI ACQUISITION - A wireless communication device is disclosed for setting transmission slot priorities in a broadcast environment. Upon receipt of a broadcast signal from the wireless communication environment, the UE analyzes the received signal to determine time slots in which members of its own group are transmitting. The UE then sets priorities of previously-used time slots to be low for allocation purposes. When the UE needs to transmit a signal, it first performs allocation of time slots within the signal frame. This allocation is performed based on the earlier-set priorities such that time slots identified as being used by other group members will not be used unless necessary. | 2022-04-07 |
20220109547 | USER EQUIPMENT AND BASE STATION FOR MANAGING BEAM FAILURE DETECTION - An apparatus includes a processor, a memory; and communication circuitry, the apparatus being connected to a communications network via the communication circuitry, the apparatus further including computer-executable instructions stored in the memory which, when executed by the processor, causes the apparatus to identify an apparatus capability that is an indication of an ability of the apparatus to perform beam failure detection (BFD) for a plurality of cells, transmit the apparatus capability to an other apparatus, receive from the other apparatus at least one message including a change in network configuration; and substitute a second set of cells for the first set of cells on which the apparatus performs BFD based on the change in network configuration so the apparatus capability is not exceeded by the network configuration. | 2022-04-07 |
20220109548 | Allocating a Resource Unit to a Station - In one embodiment, an access point is configured with a plurality of resource units (RUs). Each RU is configured to use a frequency range that differs from frequency ranges used by the other RUs. The access point determines a pattern of recurring signal performance over time. For each RU of the plurality of RUs, the pattern indicates the recurring signal performance with respect to a station when the station is located in a given physical location. The access point allocates one or more of the RUs for communicating with the station. The pattern is used for avoiding allocation of any of the RUs for which the station is predicted to experience strong multipath fading or other destructive interference. | 2022-04-07 |
20220109549 | INTERLEAVED UPLINK-DOWNLINK TRANSMISSIONS IN FULL-DUPLEX USING UNLICENSED RESOURCES - Apparatus, methods, and computer-readable media for facilitating interleaved uplink-downlink transmissions in full-duplex using unlicensed resources are disclosed herein. An example method for wireless communication of a user equipment (UE) includes receiving, from a base station, an indication of an interleaved configuration, the interleaved configuration corresponding to a full-duplex configuration including a first gap duration following a downlink transmission and a second gap duration following an uplink transmission. The example method also includes configuring at least one of uplink transmissions or downlink transmissions based on the indication. Additionally, the example method includes communicating with the base station via the interleaved configuration, communications with the base station including at least one of the uplink transmissions or the downlink transmissions. | 2022-04-07 |
20220109550 | TECHNIQUES FOR PRECODING IN FULL DUPLEX WIRELESS COMMUNICATIONS SYSTEMS - Methods, systems, and devices for wireless communications are described. A communication device, otherwise known as a user equipment (UE) may support use of separate precoding matrices, among other parameters, while the UE is operating in a half duplex mode or a full duplex mode, or a combination thereof. For example, the UE may determine a first precoding matrix associated with wireless communication (e.g., downlink, uplink) when in a half duplex mode during a first portion of a transmission time interval (TTI), and determine a second precoding matrix to use for the wireless communication when in a full duplex mode during a second portion of the TTI. The second precoding matrix may be different from the first precoding. The UE may, as a result, perform the wireless communication based on the second precoding matrix when in the full duplex mode during the second portion of the TTI. | 2022-04-07 |
20220109551 | TECHNIQUES FOR GRANT FREE TRANSMISSIONS IN FULL DUPLEX WIRELESS COMMUNICATION SYSTEMS - Methods, systems, and devices for wireless communications are described. A first device may release an uplink resource associated with a semi-persistent uplink transmission during a portion of a transmission time interval based at least in part on a condition. For example, the first device may determine that a buffer associated with the first device satisfies a buffer threshold (e.g., a threshold amount of temporarily stored uplink data) during a first temporal period. The buffer may temporarily store uplink data associated with the semi-persistent uplink transmission. The first device may, as a result, transmit, to a second device, a feedback message including an indication that the first device skips the semi-persistent uplink transmission based on releasing the uplink resource. | 2022-04-07 |
20220109552 | LEAKAGE AND NOISE CANCELLING FOR DOUBLE BALANCED DUPLEXERS - Systems and method are described for improving electrical isolation between a transmission signal and receiver circuitry of a transceiver communicating over one or more wireless networks via one or more shared antennas. The transceiver may include isolation circuitry to facilitate isolation of the transmission signal from the receiver circuitry. However, a leakage current of the transmission signal and noise signals may appear at the receiver circuitry. Presence of the leakage current or the noise signals in the receiver circuitry may cause interference with the reception signal. As such, the isolation circuitry may benefit from additional isolation between the transmission signal and the receiver circuitry to reduce an effect of the leakage current and the noise signals on the reception signal. | 2022-04-07 |
20220109553 | FLOW CONTROL FEEDBACK FOR FULL-DUPLEX COMMUNICATIONS - Methods, systems, and devices for wireless communication are described. The described techniques provide for improving negative acknowledgment (NACK) feedback from a user equipment (UE) to limit self-interference during full-duplex communications with a base station. After failing to receive a downlink transmission from a base station, a UE may generate feedback associated with self-interference at the UE to transmit to the base station. The UE may then transmit a report to the base station indicating that the UE failed to successfully decode the downlink transmission, and the UE may include the feedback associated with self-interference at the UE in the report. The base station may receive the report and adapt configurations used for full-duplex communications with the UE based on the feedback to limit self-interference at the UE during full-duplex communications. | 2022-04-07 |
20220109554 | LATENCY REDUCTION IN TDD SYSTEMS WITH CARRIER AGGRAGATION - The present invention is concerned with different novel concepts for reducing latency in data transmission. These concepts may be exploited by a transceiver configured to perform wireless data communication with a third party device by aggregating time division duplex carriers having different temporal distribution of uplink times and downlink times. These concepts may further be exploited by an apparatus configured to perform data transmission or reception via allocations of transmission resources of aggregated carriers in units of transmission time intervals into which the aggregated carriers are subdivided, wherein the aggregated carriers are temporally subdivided into the transmission time intervals in a temporal grid, respectively, wherein the aggregated carriers' grids are temporally mutually offset. | 2022-04-07 |
20220109555 | EFFICIENT FREQUENCY DETECTORS FOR CLOCK AND DATA RECOVERY CIRCUITS - A system and method for a frequency detector circuit includes: a transition detector configured to receive a data input and provide a first edge output based on transitions in the data input; a first circuit configured to generate a second edge output; a second circuit configured to generate a third edge output; and a combinational logic configured to output an UP output when at least two of the first edge output, the second edge output, and the third edge output are high and configured to output a DOWN output when the first edge output, the second edge output, and the third edge output are all low. | 2022-04-07 |
20220109556 | SENSOR DEVICE AND ENCRYPTION METHOD - Image encryption in which excessive concealment of information is prevented while reduction in cost is achieved by eliminating a need for a receiving side of an image to take measures against leakage of personal information is realized. In one example, a sensor device includes an array sensor with pixels having a light receiving element of visible or invisible light. A detector detects a target area on the basis of an image signal obtained by the array sensor. The target area in the image signal is encrypted on the basis of information from the detector. Thus, encryption of the image signal can be performed in the image sensor at least to the extent that no individual can be identified. Also, depending on a decryption key on a receiving side of the image, a part of the content of the image can be visually recognized while personal information is concealed. | 2022-04-07 |
20220109557 | EFFICIENT AND SCALABLE MECHANISM TO PROTECT INTEGRITY AND AUTHENTICITY OF LARGE DATA SETS IN CLOUD LOGGING ENVIRONMENTS - The present disclosure relates generally to systems and methods for content authentication. A method can include receiving from a sender system transmitted content (C) and appended content, the appended content including a digital signature associated with the content (C) and a hash tree (“SHT”) associated with the content (C), generating with a signature engine a hash tree (“RHT”) from the content (C), cryptographically verifying the received digital signature to generate a resultant hash value, comparing the resultant hash value to the second hash value of the second root node, determining that the second hash value of the second root node does not match the resultant hash value, identifying a potentially corrupted portion of content (C) via comparison of at least some of the plurality of first nodes of SHT to corresponding second nodes of RHT, and indicating that the digital signature could not be verified. | 2022-04-07 |
20220109558 | XMSS MANAGEMENT TO ADDRESS RANDOMIZED HASHING AND FEDERAL INFORMATION PROCESSING STANDARDS - In one example an apparatus comprises verification circuitry to store an object image in a computer readable memory external to an XMSS verifier circuitry and verify the object image by repeating operations to receive, in a local memory of the XMSS verifier circuitry, a fixed-sized block of data from the object image and process the fixed-sized block of data to compute the signature verification. Other examples may be described. | 2022-04-07 |
20220109559 | METHODS, ENCODER AND DECODER USING ENCRYPTION AND AUTHENTICATION FUNCTIONS FOR ENCRYPTING AND DECRYPTING A MESSAGE - An encoder encrypts a message by generating a nonce, using a first encryption key to encode the nonce, splitting the message into a first part and a second part, using the first encryption key and the encoded nonce to encrypt the first part of the message into a first ciphered part, using a second encryption key, the encoded nonce and the first ciphered part to generate an initialization vector, using the first encryption key and the initialization vector to encrypt the second part of the message into a second ciphered part, and generating a ciphertext comprising the first ciphered part, the second ciphered part, the initialization vector and the nonce. A decoder uses a reverse process to decrypt the message. The decryption comprises generating a copy of the initialization vector, which is compared to the initialization vector in order to verify that the message is properly decrypted. | 2022-04-07 |
20220109560 | Regional Isolation in an Integrated Cloud Service - The present disclosure provides a system for securely maintaining data, wherein the customer has full visibility over all access to that data. In particular, the present disclosure provides for a multi-tenant cloud computing region operated jointly by a cloud platform provider and a local third-party partner. The multi-tenant region includes an isolated region and a non-isolated region, wherein the isolated region includes a proxy controlling access to the isolated region. Defined parameters are stored at the proxy and used to determine whether access to the isolated region should be granted. When requests are granted, credentials encrypted with a regional key are issued to the requester, and the access may be monitored and/or recorded. | 2022-04-07 |
20220109561 | SMART LOCK UNLOCKING METHOD AND RELATED DEVICE - A smart lock unlocking method and a related device are provided, and may be specifically applied to an intelligent vehicle and a self-driving vehicle, to implement an unlocking function of a smart lock of the vehicle. The method includes: A terminal device monitors a distance change trend between the terminal device and an intelligent device, where the intelligent device includes a smart lock (S | 2022-04-07 |
20220109562 | PEER-TO-PEER (P2P) DISTRIBUTED DATA MANAGEMENT SYSTEM - A peer-to-peer (P2P) distributed data management system (DDMS) may operate as an operating system on which P2P distributed applications are utilized to manage data on distributed ledgers, such as blockchains. The DDMS may enable fast development of secure and scalable enterprise P2P distributed applications that support permanent control of every piece of data on a distributed ledger, synchronization, normalization of the data, and encryption of the data. Security of the data in the distributed ledger means that even if someone hacks into the distributed ledger, access is only gained to one block of data (e.g., single email) and not all blocks of data (e.g., entire email account). The DDMS may be integrated into Internet-of-Things (IoT) devices. The DDMS further automatically supports sequential smart contracts on the distributed ledger. | 2022-04-07 |
20220109563 | TRANSPORT OCCUPANT DATA DELIVERY - An example operation includes one or more of receiving, by a transport, first data from an occupant device proximate the transport, modifying, by the transport, a location-based level of trust related to a type and an interaction of the received first data with the occupant device, and receiving, by the transport, second data based on the modified location-based level of trust and a proximity of the occupant device to the transport. | 2022-04-07 |
20220109564 | Encrypted Group Video System and Method - An encrypted group video method and system are disclosed. The method includes scaling, by a first participant of a group video, the first participant's video stream to produce a first scaled video stream the scaling reducing subsequent computation or communication resource requirements for the first scaled video stream. The first scaled video stream is then encrypted and communicated to one or more participants of the group video. Responsive to a request, the video stream is scaled at a scale different to the first scaled stream to produce a second scaled video stream and encrypting and communicating the second scaled video stream to one or more of the participants of the group video. | 2022-04-07 |
20220109565 | Method, Apparatus, Computer Program and Data Carrier for Determining a Shared Secret Cryptographic Key - A system and method for determining a secret crypto-graphic key shared between a sending unit and a receiving unit for secure communication includes obtaining, by the sending unit, a random bit sequence, and transmitting, at the sending unit, a first sequence of electromagnetic pulses to the receiving unit via a communication channel, wherein each electro-magnetic pulse of the first sequence of electromagnetic pulses corresponds to a bit of the random bit sequence according to a ciphering protocol, the signal loss is determined in the communication channel caused by an eavesdropper, and an information advantage is estimated over the eavesdropper based on the determined signal loss. Privacy amplification is performed based on the estimated information advantage in order to establish a shared secret crypto-graphic key. | 2022-04-07 |
20220109566 | Encryption And Decryption Method And Device Based On Random Hash And Bit Operation - Disclosed are an encryption and decryption method and device based on a random hash and bit operation. The method includes the steps of: S1: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file, and a key file, wherein the key file comes from an existing coding sequence and serves as a shared file for encryption and decryption; S2: providing a reversible hash function set used for encryption and decryption, and then uniformly scattering the plaintext in a known binary random hash by an encryption hash function; and S3: introducing a bit operation rule set, changing values of all or partial binary bits of the binary random hash by a bit operation, and mapping the values to a ciphertext space. The device includes a memory and a processor, and is configured to implement the above method. | 2022-04-07 |
20220109567 | CONFIRMING RECEIPT OF AUDIT RECORDS FOR AUDITED USE OF A CRYPTOGRAPHIC KEY - Methods and apparati for auditing uses of audited cryptographic keys. In a method embodiment of the present invention, a set of audited uses for an audited cryptographic key is defined; the key is used inside a protected execution environment of a digital computer; a digitally signed audit record describing an instance of use of the audited cryptographic key is released for each audited use of the audited cryptographic key; a signed receipt of digitally signed audit records is received from an auditor; a digital signature of the signed receipt of the auditor is verified inside the protected execution environment using a public verification key of the auditor; the set of audit records that have not been verified by the auditor is determined; a set of allowable conditions for the set of non-verified audit records is stored; and the protected execution environment is prevented from outputting the results of an instance of an audited use of the audited cryptographic key when the set of non-verified audit records does not meet all of the conditions in the set of allowable conditions. | 2022-04-07 |
20220109568 | SYSTEMS AND METHODS OF KEY SELECTION FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS - Example embodiments of systems and methods for data transmission between a contactless card and a server are provided. The card may include an applet, a counter, and a plurality of encryption keys. The applet may rotate the plurality of keys based on a predetermined key rotation, select one or more keys for a cryptographic operation, perform the operation using the selected keys and the counter to generate a cryptographic result, and transmit the result and the counter to the server. Upon receipt of the result, a server, in communication with the card and containing the plurality of encryption keys, may rotate the plurality of keys based on the predetermined key rotation, select one or more keys for decryption, wherein the keys selected by the server matches the keys selected by the applet, and perform the decryption on the result. | 2022-04-07 |
20220109569 | TOKEN-BASED ZERO-TOUCH ENROLLMENT FOR PROVISIONING EDGE COMPUTING APPLICATIONS - Approaches in accordance with various embodiments allow for zero-touch enrollment of devices with respective manager systems. In at least one embodiment, a device at startup can contact a central directory service (CDS) for information about an associated manager. The CDS can authenticate the device using device information included in the request, and can send a challenge token to the device in response. The challenge token can include information for the manager, protected with multiple layers of security that should only be able to be decrypted by the authenticated device. The device can decrypt this challenge token to determine the manager information, and can convert this challenge token to a bearer token. The device can then send a request to the determined manager that includes the bearer token, which the manager can use to authenticate the device. The manager can then send the device appropriate configuration information. | 2022-04-07 |
20220109570 | WORKFLOW FOR ENABLING DATA-IN-TRANSIT IN A DISTRIBUTED SYSTEM - A distributed system, such as a distributed storage system in a virtualized computing environment and having storage nodes arranged in a cluster, is provided by management server with a transition period between non-encryption and encryption modes of operation. The transition period enables all of the nodes to complete a transition from the non-encryption mode of operation to the encryption mode of operation, without loss of data-in-transit (DIT). An auto-remediation feature is provided by the management server to the cluster, so as to fix inconsistent state(s) of one or more nodes in the cluster. | 2022-04-07 |
20220109571 | SYSTEM FOR INTELLIGENT IDENTIFICATION OF UNAUTHORIZED USERS IN A DISTRIBUTED REGISTER NETWORK - A system for identifying unauthorized users in a distributed register network is provided. In particular, the system may comprise a distributed register network comprising one or more decentralized nodes, each of which may store a separate copy of a distributed data register. The system may further comprise one or more specialized nodes which authenticate users that trigger the generation of blocks in a linked structures of the distributed register network, where the blocks are associated with requests that are submitted by the user. In this way, the system verifies the authenticity of the blocks in the linked structures, thereby providing a more robust distributed register network. | 2022-04-07 |
20220109572 | METHOD AND SYSTEM FOR AUTHENTICATING A USER ON A USER DEVICE - A method for authenticating a user on a user device with an authentication phase that includes: displaying a page of an authentication server in an internet browser, initiating an authentication process via this page to authenticate the user to a server remote from the user device, supplying to the user device a proof of authentication from the remote server, and opening an access session to the user device using this proof of authentication. Embodiments of the invention may include a computer program and an authentication system implementing such a method. | 2022-04-07 |
20220109573 | zkMFA: ZERO-KNOWLEDGE BASED MULTI-FACTOR AUTHENTICATION SYSTEM - An authentication method of a prover by a verifier includes: performing at least once, an enrollment process by an enrollment center computer; and subsequent to performing the enrollment process, performing an on demand authentication process including: receiving at a verifier computer from the prover, a prover authentication request sent from the prover computer device which includes the prover identity and a preferred ZKP protocol identifier; looking up a prover's public key in the database via the identity; the verifier sending a selected ZKP protocol identifier to the prover computer device; commencing a round of authentication by receiving a commitment generated according to the selected ZKP protocol; and repeating the step of commencing a round of authentication until the verifier computer accepts or rejects the prover's identity. A zkMFA method of authentication and an authentication system for authenticating a prover by a verifier are also described. | 2022-04-07 |
20220109574 | METHOD AND SYSTEM FOR PRIVACY PRESERVING MULTIFACTOR BIOMETRIC AUTHENTICATION - Authentication is a key procedure in information systems. Conventional biometric authentication system is based on a trusted third-party server which is not secure. The present disclosure provides a privacy preserving multifactor biometric authentication for authenticating a client without the third-party authentication server. The server receives a plurality of encrypted biometric features from the client, encrypted using Fully Homomorphic Encryption. Further, the server evaluates the plurality of encrypted biometric features to obtain a client identifier value and a plurality of encrypted resultant values. The server encrypts each of the plurality of resultant values based on a time based nonce and the client identifier value. The encrypted authentication tags and the corresponding resultant values are aggregated by the server and transmitted to the client. The client decrypts the resultant value and the authentication tag and transmits to the server. The server authenticates the client after verifying the received information. | 2022-04-07 |
20220109575 | SELECTIVE DEVICE CONNECTION - One embodiment provides a method, including: connecting a USB device to a secure device; provisioning, at the secure device, the USB device, wherein the provisioning comprises encrypting, using a private key, a hash value associated with a device descriptor associated with the USB device into a product field of the device descriptor: introducing the provisioned peripheral device into a client device; determining, using a processor of the client device, that the USB device is an authorized USB device, wherein the determining comprises: decrypting, using a public key that corresponds to the private key, the hash value; producing, by running a hash function on the device descriptor minus the hash value, a new hash value; and identifying that the hash value is equivalent to the new hash value; and enabling the USB device to gain access to a system of the client device. Other aspects are described and claimed. | 2022-04-07 |
20220109576 | INTELLIGENT TACTILE RESOURCE INSTRUMENT ACTIVATION USING ELECTROENCEPHALOGRAM SIGNALS - Embodiments of the present invention provide a system for secure communication of information that may be used to authorize communications or transfer of resources by use of an intelligent resource instrument with embedded tactile or audio feedback mechanism. The provided systems, methods, and computer program products are designed to select and generate stimulus information, simultaneously record EEG readings for a user, and use this information to verify user identity. Upon verification of user identity, the intelligent resource instrument may be activated for use in a resource transfer. | 2022-04-07 |
20220109577 | METHOD FOR VERIFYING THE STATE OF A DISTRIBUTED LEDGER AND DISTRIBUTED LEDGER - The invention provides a method for verifying the state of a distributed ledger. This method comprises the steps of creating a chain of data blocks, performing an authentication writing operation in the chain of data blocks and checking the authentication time of the last authentication block. Each block comprises a signature which is based on information of the previous block. The authentication writing operation comprises authentication information voted by a plurality of trusted authentication nodes, creating at least one authentication block in an authentication time. The checking step is carried out by a software instance, thus considering the information of the distributed ledger as verified and alive until this authentication time. | 2022-04-07 |
20220109578 | METHODS AND SYSTEMS FOR DEVICE AUTHENTICATION - A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity. | 2022-04-07 |
20220109579 | METHOD FOR THE DIGITAL SIGNING OF A MESSAGE - A method for the digital signing of a message by a sender of the message. A check value based on a symmetrical key pair is ascertained using a secret key as part of a symmetrical key pair and the message. A digital signature is ascertained using a private key as part of an asymmetrical key pair and the check value. The digital signature is provided for transmission, to a method for checking a received, digitally signed message by a receiver. | 2022-04-07 |
20220109580 | SYSTEM AND METHOD FOR ELECTRONIC SIGNATURES AS A SERVICE - A computing system includes a server. The server is communicatively coupled to a data repository and is configured to store a data in the data repository. The server is further configured to create, via a visual information flow creation tool, at least one information flow object. The server is additionally configured to create, via the visual information flow creation tool, an electronic signature field in the at least one information flow object, and to provide the at least one information flow object to communicate an electronic signature request to an electronic signature system. | 2022-04-07 |
20220109581 | DISTRIBUTED ATTESTATION IN HETEROGENOUS COMPUTING CLUSTERS - A method comprises receiving, from a first processing node of a distributed processing cluster, an indication of an attestation result and supporting data for a second processing node of the distributed processing cluster, transmitting the indication of attestation result and supporting data for the second processing node of the distributed processing cluster to at least one additional processing node of the processing cluster, and in response to a determination that the indication of an attestation result for the second processing node of the distributed processing cluster indicated that the second processing node of the distributed processing device is secure, establishing a secure communication connection with the second processing node of the distributed processing cluster using the supporting data. | 2022-04-07 |
20220109582 | SYSTEMS AND METHODS FOR AUTOMATED CERTIFICATE RENEWAL MANAGEMENT - A method is provided for automating management of automatic renewal of a public key infrastructure (PM) certificate issued by a certificate authority (CA) for a subscriber. The method includes steps of causing the subscriber to (i) transmit a first alert to a management entity for initiating renewal of the PKI certificate, and (ii) transmit a certificate signing request (CSR) to a registration authority (RA) for issuance of a renewal certificate. The method further includes steps of (iii) transmitting, from the RA to the CA, the CSR signed by the RA, (iv) receiving, at the RA from the CA, an issued renewal certificate signed by the CA, (v) sending, from the RA to the subscriber, the issued renewal certificate signed by the CA, and (vi) causing the subscriber to transmit a second alert to a management entity indicating renewal of the PM certificate. | 2022-04-07 |
20220109583 | SLEEP AND WAKEUP SIGNALING FOR ETHERNET - A first communication device generates an Operation, Administration, and Maintenance (OAM) frame that includes i) OAM message content and ii) an OAM frame header outside of the OAM message content, wherein generating the OAM frame comprises generating the OAM frame header to include information that signals one of i) a low power sleep (LPS) request, and ii) a wake-up request (WUR). The first communication device transmits the OAM frame to a second communication device via a communication medium to signal to the second communication device the one of i) the LPS request, and ii) the WUR. | 2022-04-07 |
20220109584 | SECONDARY NODE STATUS CHANGE INDICATION TO ENABLE DYNAMIC POLICY AND QUOTA MANAGEMENT - Techniques are provided to communicate the serving Radio Access Network (RAN) element information to the packet core network to enable operators to provide differential treatment for fifth generation (5G) subscribers. The techniques presented herein fill these gaps and help drive faster adoption of Dual Connectivity New Radio (DCNR) subscribers by service operator to offer customized policy and quota management to address different business requirements in the 5G Non-Stand Alone (NSA) architecture. | 2022-04-07 |
20220109585 | CUSTOMIZED MEETING NOTES - In an approach to customizing meeting notes, a computer receives audio input of a virtual meeting, converts the audio input to text, and displays the text to a plurality of meeting participants. A computer receives highlighted phrases of the text from the plurality of meeting participants and determines a highlighting frequency of each of the highlighted phrases. A computer determines phrases with a highlighting frequency greater than a pre-defined threshold. A computer orders the phrases based on a chronological order of the phrases in the audio input. A computer determines preferences of a first meeting participant associated with a meeting summary. A computer generates a customized summary of the virtual meeting for the first meeting participant of the plurality of meeting participants based on the ordered phrases with a high frequency of highlighting and on the preferences. A computer transmits the customized summary to the first meeting participant. | 2022-04-07 |
20220109586 | Communication Method and Apparatus - A communication apparatus and method the method including receiving, by an access stratum (AS) of a terminal, a groupcast message, where the terminal corresponds to a member in a group, determining, by the AS of the terminal, a feedback resource based on a sequence number of the member, and sending, by the AS of the terminal, an acknowledgement (ACK)/negative acknowledgement (NACK) message of the groupcast message based on the feedback resource. | 2022-04-07 |
20220109587 | NETWORK SUPPORT FOR RELIABLE MULTICAST OPERATIONS - Examples described herein relate to a switch circuitry that includes circuitry to cause transmission, to multiple destinations, of copies of a packet received from a sender network interface device and circuitry to indicate acknowledgement of packet receipt, from the multiple destinations, to the sender network interface device based on receipt of acknowledgements of packet receipt from the multiple destinations. In some examples, the circuitry is to indicate acknowledgement of packet receipt, from the multiple destinations, to the sender network interface device with a packet index value. | 2022-04-07 |
20220109588 | VIRTUAL INTRANET ACCELERATION METHOD AND SYSTEM, CONFIGURATION METHOD, STORAGE MEDIUM, AND COMPUTER APPARATUS - The present disclosure relates to a virtual Intranet acceleration method and system, a configuration method, a storage medium and a computer apparatus, pertaining to the field of SD-WAN and addressing the problem in which existing processing methods for preventing packet loss consume a large amount of resources and do not achieve a satisfactory results. The method comprises: upon receiving a TCP request sent from a server at an initiating end to a server at a receiving end, customer premise equipment (CPE) at the initiating end transmitting information of the TCP request to CPE at the receiving end; the CPE at the receiving end configuring a connection link between the server at the initiating end and the server at the receiving end according to the information of the TCP request; and transmitting the TCP request and/or TCP response data via the connection link. The technical solution provided by the present disclosure is applicable to data transmission between SD-WAN subsystems, and achieves transparency and acceleration of the TCP connection between the initiating end and the receiving end. | 2022-04-07 |
20220109589 | METHOD AND DEVICE FOR PROCESSING DATA ASSOCIATED WITH MESSAGES TRANSMITTABLE VIA A BUS SYSTEM - A method for processing data associated with messages transmittable via a bus system. The method includes: providing multiple filter groups, each filter group of the multiple filter groups including at least one filter rule, for example, for at least some of the messages, filtering at least one message with the aid of at least two different filter groups of the multiple filter groups. | 2022-04-07 |
20220109590 | UPLINK SOUNDING REFERENCE SIGNAL (SRS) TRANSMISSION IN CARRIER AGGREGATION SYSTEM - An apparatus can receive or transmit parameters for a sounding reference signal (SRS) transmission configuration as an uplink (UL)/downlink (DL) configuration of a serving cell. A time division duplex (TDD) operation with a plurality of component carriers (CCs) can be enabled/generated based on the parameters and at least one component carriers being reserved for the UL transmission or having a higher priority than a physical channel transmission such as a physical uplink shared channel (PUSCH) transmission or a physical uplink control channel (PUCCH) transmission. | 2022-04-07 |
20220109591 | OOK MODULATION DEVICE - A device for OOK modulating an input signal, comprising at least:
| 2022-04-07 |
20220109592 | DEMODULATING SURVEILLANCE SIGNALS - In some examples, a system includes a receiver configured to receive signals encoding first, second, and third messages in first, second, and third frequency bands. The system also includes a mixer configured to down-convert the received signals to intermediate-frequency (IF) signals based on a local oscillator signal. The system further includes at least one analog-to-digital converter configured to sample the IF signals at a sampling rate. A frequency band of the IF signals encoding the first message falls within a first Nyquist region, and a frequency band of the IF signals encoding the second message falls within a second Nyquist region. The first and second Nyquist regions are frequency ranges bounded by multiples of one-half of the sampling rate, and the second Nyquist region is different from the first Nyquist region. The system includes processing circuitry configured to determine data in the first, second, and third messages based on an output of the at least one analog-to-digital converter. | 2022-04-07 |
20220109593 | SYSTEM AND SCHEME OF SCALABLE OFDM NUMEROLOGY - For a wireless communications system, scalable orthogonal frequency division multiplexing (OFDM) numerology is incorporated in a manner that can apply to radio link transmissions in future wireless network for frequency division duplex (FDD) and time division duplex (TDD) communications. | 2022-04-07 |
20220109594 | UPLINK TRANSMISSION IN RADIO ACCESS NETWORK - There is disclosed a method of operating a user equipment in a radio access network. The method includes transmitting signaling on frequency resources, the signaling having a signaling waveform based on the relative position of the frequency resources in a frequency range. The disclosure also pertains to related methods and devices. | 2022-04-07 |
20220109595 | APPARATUS AND METHOD - To provide a mechanism capable of appropriately notifying the reception side of the resource setting for GFDM modulation on the transmission side. | 2022-04-07 |
20220109596 | MULTI-CHANNEL HYBRID TRANSMISSION METHOD AND APPARATUS IN WIRELESS LOCAL AREA NETWORK - This application relates to the field of wireless communications. In an embodiment, a data transmission method comprises generating, by an access point (AP), a scheduling frame, wherein the scheduling frame comprises a first user information field that carries first trigger information for one or more first stations (STAs) and a second user information field that carries second trigger information for one or more second STAs; sending, by the AP, the scheduling frame, wherein the scheduling frame further comprises a field indicating the scheduling frame is an extension scheduling frame, the extension scheduling frame has a trigger frame type that complies with a protocol later than the 802.11ax standard protocol | 2022-04-07 |
20220109597 | CONTROL CHANNEL DECODING CONFIGURATIONS FOR CROSS-CARRIER SCHEDULING - Mechanisms for cross-carrier scheduling from a first cell to a second cell in a wireless networking scheme are provided. In one aspect, a method includes receiving, from a base station (BS), a first configuration for scheduling in a first cell having a first subcarrier spacing (SCS), wherein the first configuration is associated with a first search space in the first cell. The method further includes receiving, from the BS, a second configuration for scheduling in the first cell, wherein the second configuration is associated with a second search space in a second cell, and wherein the second cell is associated with a different second SCS. The method further includes determining a number of blind detections (BDs) based on at least one of the first SCS or the second SCS, and monitoring, based on the number of BDs, for downlink control information (DCI) in the first and second search spaces. | 2022-04-07 |
20220109598 | NUMEROLOGY FOR COMMUNICATIONS WITH A FORWARDING NODE - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a forwarding node may determine a numerology for a forwarding operation, that is associated with forwarding signals between a first wireless node and a second wireless node, based at least in part on one or more of: a numerology of a control link between the forwarding node and a control node, a delay spread of a first link with the first wireless node or a delay spread of a second link with the second wireless node, or a configuration, indicated by the control node, of the forwarding operation. The forwarding node may perform the forwarding operation based at least in part on the numerology. Numerous other aspects are provided. | 2022-04-07 |
20220109599 | METHOD OF SIGNAL GENERATION AND SIGNAL GENERATING DEVICE - A transmission method simultaneously transmitting a first modulated signal and a second modulated signal at a common frequency performs precoding on both signals using a fixed precoding matrix and regularly changes the phase of at least one of the signals, thereby improving received data signal quality for a reception device. | 2022-04-07 |
20220109600 | COEXISTENCE OF OFDM AND ON-OFF KEYING (OOK) SIGNALS IN WLAN - A wireless transmit/receive unit (WTRU) or access point (AP) may transmit a protocol data unit (PDU) of a first 802.11 protocol and a preamble and data of a second 802.11 protocol. The preamble and data of the second 802.11 protocol may be transmitted on resources of the PDU of the first 802.11 protocol with shaping sequences for concurrent transmission. | 2022-04-07 |
20220109601 | CHANGING THE PHASE TRACKING REFERENCE SIGNAL (PTRS) PATTERN OVER DIFFERENT SYMBOLS - Aspects of the present disclosure can be implemented in a method for wireless communication by a first wireless node, such as a user equipment (UE) or network entity. The method generally includes identifying different patterns of phase tracking reference signal (PTRS) tones for receiving a PTRS, determining when to change at least one of the different patterns of the PTRS tones from one symbol to another, and monitoring for one or more symbols of the PTRS, from a second wireless node, according to the determination. | 2022-04-07 |
20220109602 | RECEIVING DEVICE, MOBILE TERMINAL TEST APPARATUS PROVIDED WITH RECEIVING DEVICE, AND MOBILE TERMINAL TEST METHOD - A receiving device includes a reception unit | 2022-04-07 |
20220109603 | SYSTEM FOR REAL TIME RECOVERY OF RESOURCE TRANSFERS OVER A DISTRIBUTED SERVER NETWORK - A system is provided for real time recovery of resource transfers over a distributed server network. In particular, the system may comprise one or more computing systems within a distributed server network, where each computing system may be a node which hosts a copy of a distributed electronic data register. Upon receiving a resource transfer request, the system may, via a system sequence monitor, monitor the various nodes for status updates on the resource transfer. Upon detecting that a node has failed to execute one or more steps in the resource transfer process, a resource transfer restorer may perform a restore process based on the information stored within the distributed data register. The system sequence monitor may further monitor the restore process to ensure the successful completion thereof. In this way, the system may provide instantaneous recovery of failed resource transfers. | 2022-04-07 |
20220109604 | OPTIMIZING MANAGEMENT ENTITY SELECTION RESILIENCY FOR GEO-REDUNDANCY AND LOAD BALANCING IN MOBILE CORE NETWORK - Techniques are presented in which a new information element signaling priority of a management entity is included in a setup (e.g., S1-Setup) response or configuration update message sent by a management entity to a base station entity. The base station entity interprets this priority information along with the relative capacity information in an appropriate way to load-distribute the traffic/calls to highly preferable management entity instances (at a local site) when they are available, and switchover/failover to lower preference management entity instances (at a remote site) when there is a local site outage/failure or insufficient capacity in a geo-resilient pooled network. | 2022-04-07 |
20220109605 | Implementing Affinity and Anti-Affinity with Kubernetes - A KUBERNETES installation processes a script and invokes a scheduling agent in response to encountering an instruction to create a pod. The scheduling agent is an agent of an orchestrator and performs tasks such as identifying a selected node, creating multiple interface objects with multiple IP addresses, and creating storage volumes in coordination with the orchestrator. Upon creation, the pod may call a CNI that is an agent of the orchestrator in order to configure the pod to use the multiple interface objects. The pod may call a CSI that is an agent of the orchestrator in order to bind a storage volume to the pod. The scheduling agent may coordinate with the orchestrator to implement affinity and anti-affinity rules for placement of pods and storage volumes. The script may also be transformed by the orchestrator in order to insert instructions implementing affinity and ant-affinity rules. | 2022-04-07 |
20220109606 | DEVICE PROVISIONING USING DEDICATED CREDENTIAL STORAGE - A disclosed method for provisioning a computing device includes receiving, by provisioning software that executes on the computing device to provision the computing device for access to an enterprise infrastructure from a device orchestration service through which computing devices are provisioned to access the enterprise infrastructure, a digital certificate representing a credential for accessing, by a user via the computing device, the enterprise infrastructure. The method also includes storing, by the provisioning software, the digital certificate in dedicated secure credential storage on the computing device, receiving, by the provisioning software, a one-time-usable nonce value generated by the device orchestration service and usable by the provisioning software to unlock the digital certificate stored in the dedicated secure credential storage, unlocking the digital certificate, and presenting the digital certificate to the enterprise infrastructure to authorize access to the enterprise infrastructure by the user via the computing device. | 2022-04-07 |
20220109607 | CUSTOMER PREMISES EQUIPMENT CONFIGURATION MANAGEMENT METHOD AND APPARATUS - This application provides a CPE configuration management method. A CPE stores information about a first ACS and information about a second ACS. The information about the first ACS and the information about the second ACS are, for example, an identifier of the first ACS and an identifier of the second ACS. The information about the first ACS and the information about the second ACS may be manually configured, or may be configured by another ACS. Because the CPE is preset with the information about the first ACS and the information about the second ACS, the CPE can establish sessions with the first ACS and the second ACS, and simultaneously process first configuration information sent by the first ACS and second configuration information sent by the second ACS. | 2022-04-07 |
20220109608 | Method, System, and Computer Program Product for Configuring a Gateway - Provided is a method for configuring a gateway. The method may include a gateway monitoring current version data stored on at least one first server. The current version data may be associated with a current version of a configuration file. The first server may be remote from the gateway. The current version data may be modified at the first server. In response to the gateway determining that the current version data stored on the first server has been modified, a configuration service may be invoked to retrieve the current version of the configuration file from at least one repository based on the current version data. The repository may include at least one second server remote from the gateway and the first server. The gateway may store a copy of the current version of the configuration file retrieved by the configuration service. A system and computer program product are also disclosed. | 2022-04-07 |
20220109609 | POLICY DETERMINATION APPARATUS, POLICY DETERMINING METHOD AND PROGRAM - According to one embodiment, a policy determination apparatus includes a policy determination unit, a change condition determination unit, and a change request unit. The policy determination unit determines a first policy that the first routing control apparatus uses for controlling a routing destination of a request including first destination data. The change condition determination unit determines, based on the monitoring data, whether or not a predetermined policy change condition is satisfied. When it is determined that the policy change condition is satisfied, the change request unit requests the first policy determination apparatus to change a second policy. | 2022-04-07 |
20220109610 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO ORCHESTRATE INTERMITTENT SURPLUS POWER IN EDGE NETWORKS - Methods, apparatus, systems, and articles of manufacture are disclosed to orchestrate intermittent surplus power in Edge networks. An example apparatus includes power unit analysis circuitry to identify a power surplus, analysis circuitry to (a) apply an acceleration factor to a first trigger threshold of a local task, the acceleration factor to set a second trigger threshold, and (b) designate the local task for early execution when a current metric corresponding to the local task satisfies the second trigger threshold, and adaptive power managing circuitry to execute the local task in response to detecting the designation for early execution. | 2022-04-07 |
20220109611 | Enhanced Service Mapping Based On Natural Language Processing - A computing system includes persistent storage configured to store representations of software applications that include textual data respectively indicative of attributes of the software applications, and a mapping application configured to perform operations. The operations include retrieving a representation corresponding to a software application and, based thereon, identifying character strings present within textual data associated therewith. The operations also include generating, for each character string, a corresponding weight based on a frequency of the character string within the particular textual data and a frequency of the character string within textual data associated with at least a subset of the software applications. The operations additionally include selecting, from the character strings and based on the corresponding weights, candidate tags for the particular software application. The operations further include generating a mapping between the software application and a computing resource based on the candidate tags, and storing a representation of the mapping. | 2022-04-07 |
20220109612 | INTELLIGENT MONITORING AND TESTING SYSTEM FOR CABLE NETWORK - An intelligent monitoring and testing system for a cable network determines measurements for a cable plant (CP), including cable modems (CMs) and common network elements, Metrics determined from the measurements are analyzed to detect a service issue and a service sub-issue. Machine learning is applied to the metrics and other related data to determine an optimized workflow for diagnosing, locating, and remediating the service issue and service sub-issue. | 2022-04-07 |
20220109613 | PROGRAMMABLE TRAFFIC MANAGEMENT ENGINE - Examples herein describe a programmable traffic management engine that includes both programmable and non-programmable hardware components. The non-programmable hardware components are used to generate features that can then be used to perform different traffic management algorithms. Depending on which traffic management algorithm the PTM engine is configured to do, the PTM engine may use a subset (or all) of the features to perform the algorithm. The programmable hardware components in the PTM engine are programmable (e.g., customizable) by the user to perform a selected algorithm using some or all of the features provided by the non-programmable hardware components. | 2022-04-07 |
20220109614 | DYNAMIC ADAPTIVE NETWORK - Systems and methods for managing a network are disclosed. In certain systems and methods, access to a network such as a wireless network, can be granted or denied based upon a threshold number of devices accessing the network. Moreover, access to a first service available over the network can be granted or denied based upon a threshold number of devices accessing the first service. Various network resource can be allocated to the first service based at least upon the number of device access the first service. | 2022-04-07 |
20220109615 | INTEGRATION NAVIGATOR AND INTELLIGENT MONITORING FOR LIVING SYSTEMS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for resolving a contextual ticket. The methods, systems, and apparatus include actions of receiving a request from a user to generate a contextual ticket that indicates an issue with an integration, obtaining baseline information for the issue, generating, based on the baseline information, a ticket knowledge graph, providing the ticket knowledge graph to a machine-learning trained action determination engine, receiving, from the machine-learning trained action determination engine, an indication of an action for resolving the issue, and initiating, based on the indication of the action for resolving the issue, the action for resolving the issue. | 2022-04-07 |
20220109616 | MULTI ACCESS POINT-CLOUD CONTROLLER FOR COLLECTING NETWORK STATISTICAL DATA - A cloud controller for requesting statistical data about a network when at least one network device is unable to respond to the request. The cloud controller sends a command to network devices requesting statistical data be gathered. The cloud controller determines that a network device experiences a problem with obtaining the requested statistical data and identifies a network device as an efficient network device. The cloud controller configures the efficient network device to obtain the requested statistical data from other network devices in the network. The cloud controller determines that the problem with the network device has been resolved, and begins communicating with the network device having the problem resolved to request statistical data concerning the network. | 2022-04-07 |
20220109617 | LATENCY DETERMINATIONS FOR HUMAN INTERFACE DEVICES - In various examples, latency of human interface devices (HIDs) may be accounted for in determining an end-to-end latency of a system. For example, when an input is received at an HID, an amount of time for the input to reach a connected device may be computed by the HID and included in a data packet transmitted by the HID device to the connected device. The addition of the peripheral latency to the end-to-end latency determination may provide a more comprehensive latency result for the system and, where the peripheral latency of an HID is determined to have a non-negligible contribution to the end-to-end latency, a new HID component may be implemented, a configuration setting associated with the HID component may be updated, and/or other actions may be taken to reduce the contribution of the peripheral latency to the overall latency of the system. | 2022-04-07 |
20220109618 | PACKET PROCESSING FRAMEWORK - Techniques are disclosed for improved data routing and forwarding by exploiting the increasing number of logical cores in a computing system. In certain embodiments, a network device comprising several network interfaces and logical cores is disclosed. The network device may also include a plurality of processing nodes, wherein each processing node includes instructions for processing network packets and is associated with a logical core. Furthermore, the network device may include control logic configured to receive a network packet at an interface, select a subset of processing nodes from the plurality of processing nodes for processing the network packet, based on contents of the network packet and the interface that the network packet was received at, and schedule processing of the network packet by the subset of the processing nodes on the respective logical cores associated with each of the subset of the processing nodes. | 2022-04-07 |
20220109619 | PROCESSING DEVICE AND MOVING METHOD - A processing apparatus ( | 2022-04-07 |
20220109620 | SDWAN OVERLAY ROUTING SERVICE - Systems and methods of software-defined wide area network (SDWAN) device routing are provided using a cloud-based overlay routing service that utilizes, a cloud-BGP service (CBS), and a path computation module (PCM), and overlay agents (OAs) implemented on the tenant side. The Oas, CBS, and PCM may interact with each other, e.g., publish/update local states, route prefixes, etc. to create/maintain routing in the SDWAN. | 2022-04-07 |
20220109621 | IP-Based Matching System - In one aspect, an example method includes (i) accessing, by a computing device, a first Internet Protocol (IP) address that encodes first attributes of a first profile; (ii) accessing, by the computing device, a second IP address that encodes second attributes of a second profile; (iii) comparing, by the computing device, the first IP address and the second IP address using a network layer communication function; (iv) determining, by the computing device, that a result of the comparing satisfies a threshold condition; and (v) based on the result of the comparing satisfying the threshold condition, providing, by the computing device to another device, an indication of a match between the first profile and the second profile. | 2022-04-07 |
20220109622 | RELIABILITY ENHANCEMENTS FOR MULTI-ACCESS TRAFFIC MANAGEMENT - The present disclosure is related to multi-access traffic management in multi-access computing environments. A reliability enhancement engine (REE) operated by a multi-access multipath traffic manager identifies traffic flows that have high reliability requirements (“reliability flows”) and performs admission control for the reliability flows. The REE determines a coding rate (e.g., a redundancy factor) and traffic distribution strategies for the identified reliability flows. The REE applies cross-access network coding (NC) on the reliability flows, and handles multi-access acknowledgements and traffic pacing, which may involve multiplexing traffic of the reliability flows with non-high-reliability traffic. Other embodiments may be described and/or claimed. | 2022-04-07 |
20220109623 | BIER PACKET SENDING METHOD AND APPARATUS - This application provides a BIER packet sending method. The method includes: receiving a BIER packet that is encapsulated using an IPv6 protocol and that is sent by a second forwarding device, where the BIER packet includes an IPv6 basic header and a BIER header, a destination address field in the IPv6 basic header is a first IPv6 address of the first forwarding device; determining, based on an identifier corresponding to a first IPv6 address in a forwarding table, to perform BIER forwarding on the BIER packet, where the identifier is used to indicate that the first IPv6 address is a destination address for BIER forwarding. In the technical solution provided in this application, a node may determine, based on the identifier of the first IPv6 address, to perform BIER forwarding on the BIER packet. | 2022-04-07 |
20220109624 | Packet Processing Method and Apparatus, and Computer Storage Medium - This application discloses a packet processing method and apparatus, and a computer storage medium, and belongs to the field of segment routing technologies. In the method, the network node receives a packet carrying an SRH, where the SRH includes one or more TLV fields and a TLV processing attribute, the TLV processing attribute indicates whether the network node needs to process the TLV fields included in the SRH, and the network node determines, based on the TLV processing attribute, processing of the TLV fields included in the SRH. In this way, any segment endpoint node on a segment routing network may determine the TLV processing attribute by using the SRH, so as to determine whether the TLV fields included in the SRH need to be processed. | 2022-04-07 |
20220109625 | ROUTING REQUESTS IN A DISTRIBUTED SYSTEM - Requests can be routed in a distributed system. When a distributed system includes a core service in which a plurality of plugins run and includes a plurality of clients that run external to the core service, the core service can provide a command router that functions as a common mechanism for routing requests to the plugins. The command router can provide an external endpoint by which the external clients can submit requests to access functionality of the plugins. The command router can also provide an internal endpoint by which the plugins can submit requests to access other plugins. Employing a command router within the core service can facilitate adding and removing plugins. | 2022-04-07 |
20220109626 | Forwarding Rules Among Lookup Tables in a Multi-Stage Packet Processor - Processing an ingress packet in a packet pipeline to determine a forwarding rule includes identifying a matching rule in each forwarding table in the pipeline. Prefix lengths of the respective matching rules are compared. The matching rule with the greatest prefix length serves as the basis for forwarding an egress packet. | 2022-04-07 |
20220109627 | Method and Apparatus for Implementing Service Function Processing - The present disclosure includes a method performed by a network device for implementing service function processing. The network device receives a first SRv6 packet, where the first SRv6 packet includes a first IPv6 header and a first NSH. The network device converts the first SRv6 packet to a first NSH packet, where the first NSH packet includes a part obtained by removing the first IPv6 header from the first SRv6 packet. The network device sends the first NSH packet to a service function SF entity. In addition, the present disclosure further includes an apparatus for implementing service function processing. | 2022-04-07 |
20220109628 | DATA PACKET FORWARDING METHOD, NETWORK ADAPTER, HOST DEVICE, AND COMPUTER SYSTEM - A data packet forwarding method, a network adapter and a host device. The method is applied to a network adapter, the network adapter is connected to a host device, the host device includes a first VM, the first VM includes N vNICs, and the network adapter includes a first VF allocated to the first VM, where N is an integer greater than 1. The method includes: receiving mapping relationship information sent by the host device, where the mapping relationship information is used to indicate a mapping relationship between N queue pairs among queues configured for the first VF and the N vNICs, and each of the N queue pairs is used to forward a data packet of a vNIC corresponding to each queue pair; recording the mapping relationship information in a forwarding information table; and forwarding data packets of the N vNICs according to the mapping relationship information. | 2022-04-07 |
20220109629 | MITIGATING SERVICE OVERRUNS - Embodiments of the present disclosure relate to a method for preventing a service executing on a host machine from overrunning. The method receives, by the service running on the host machine, one or more packets via a data path. The method determines that the service is in or approaching an overrun state. Upon the determining, the method identifies a set of one or more virtual computing instances (VCIs) running on the host machine, and sends, via a first path different than the data path, a set of one or more signals to the set of VCIs, the one or more signals indicating to the set of VCIs to slow down transmitting network traffic via the data path. | 2022-04-07 |
20220109630 | Check-In Monitoring For Workflows - A workflow may include function calls to functions executed with respect to instances of elements. Functions may be stored in a file store. When functions are edited and checked in to the file store, change to the function may be detected and workflows implicated by the change to the function are identified. Execution of the implicated workflows may then be invoked in response to detecting the change. Functions may have an exclusivity associated with them such that execution of a workflow includes executing function calls alone where required by the exclusivity or concurrently where permitted by the exclusivity. Check-in monitoring on a repository of element files (element definition and element functions) may be performed. In response to check-in of a file, workflows including elements referencing the file may be executed. | 2022-04-07 |
20220109631 | SYSTEM AND METHOD FOR EFFICIENT NETWORK ISOLATION AND LOAD BALANCING IN A MULTI-TENANT CLUSTER ENVIRONMENT - A system and method for supporting load balancing in a multi-tenant cluster environment, in accordance with an embodiment. One or more tenants can be supported and each associated with a partition, which are each in turn associated with one or more end nodes. The method can provide a plurality of switches, the plurality of switches comprising a plurality of leaf switches and at least one switch at another level, wherein each of the plurality of switches comprise at least one port. The method can assign each node a weight parameter, and based upon this parameter, the method can route the plurality of end nodes within the multi-tenant cluster environment, wherein the routing attempts to preserve partition isolation. | 2022-04-07 |
20220109632 | Cloud System Architecture and Workload Management - Embodiments offer a cloud system allowing workload management through the use of a zone-compartment architecture. A routing engine extracts an identifier from an incoming request to a cloud system. The routing engine then determines from a mapping in a service mesh, a target compartment corresponding to the identifier. Based upon the target compartment, the routing engine receives an IP address from a registry of the service mesh. Using the IP address, the routing engine routes the request to the target compartment for processing by an application. A database of the target compartment is replicated within another compartment within a different zone, thereby ensuring high availability. Based upon a recommendation provided by the zone, the target compartment may be split or merged to accommodate variations in workflow. The mapping and registry are updated according to changes in the compartments. | 2022-04-07 |
20220109633 | SYSTEMS AND METHODS FOR SUPPORTING TRAFFIC STEERING THROUGH A SERVICE FUNCTION CHAIN - Methods and system for supporting traffic steering through a service function chain, the service function chain comprising at least one data processing function. An aspect of the disclosure provides for a method for steering traffic of a packet data unit (PDU) performed by a session management function. The method includes receiving PCC rules from a policy control function, the PCC rules including information comprising at least one of service function chain information; final delivery indication; and selective traffic steering information and associated parameters. The method further includes configuring at least one user plane function (UPF) according to the information. In some embodiments the configuring the at least one UPF includes instructing a first UPF to detect traffic according to the packet detection rules and route the received packet according to the forwarding action rules. | 2022-04-07 |
20220109634 | ENTITY RELATIONSHIP ESTIMATION APPARATUS, ENTITY RELATIONSHIP ESTIMATION METHOD, AND RECORDING MEDIUM - Easy and correct estimation of a relationship between entities is made possible. An entity relationship estimation apparatus that estimates a relationship between a plurality of entities each executing a process is configured to include: a window-based correlation and traffic volume estimation unit that acquires traffic data of a plurality of entities, and calculates correlation values in one or more windows of a predetermined time width of each traffic data of at least one entity pair; and a relationship type estimation unit that estimates a type of relationship between entities of the entity pair based on the correlation values of the windows of the entity pair. | 2022-04-07 |
20220109635 | THROTTLING NETWORK THROUGHPUT BASED ON A THROTTLING FACTOR - As network resources of a network continue to be stretched due to a variety of users and numerous network devices connected to the network, there is a need to provide management of the network resources to optimize access to the network and to provide enhanced QoE for each user of the network without diminishing a particular user's experience. A throttling management application can provide for throttling one or more requests for an asset associated with one or more network devices. A request can be throttled so as to bump higher priority requests in a queue ahead of other network requests based on a throttling factor. The throttling factor can be associated with a throttling management profile that provides a priority to certain requests of certain network devices without delaying requests from other network devices. | 2022-04-07 |
20220109636 | WINDOW ADJUSTMENT METHOD AND APPARATUS, NETWORK DEVICE, TERMINAL DEVICE - A window adjustment method and apparatus, a network device and a terminal device, the method comprising: a network device determining a first sending parameter, the first sending parameter being used to indicate an SN of a first data packet, and sending the first data packet according to the first sending parameter, the first data packet being a next data packet expected to be sent in a send window (501); if the network device confirms that the first data packet has been accurately received by at least one terminal device, the network device moving the send window; a starting SN of the send window before being moved being a first SN, a starting SN of the send window after being moved being a second SN, and the second SN being a first unconfirmed SN after the first SN (502). | 2022-04-07 |
20220109637 | WIRELESS COMMUNICATION METHOD FOR MULTI-USER TRANSMISSION SCHEDULING, AND WIRELESS COMMUNICATION TERMINAL USING SAME - The present invention relates to a wireless communication terminal and a wireless communication method for efficiently scheduling uplink multi-user transmission. | 2022-04-07 |
20220109638 | Multi Radio Media Access Control for Ultra-Low and Bounded Delay - A multi radio media access control (MAC) (MRM) transceiver includes a plurality of transceiver systems, each transceiver system assigned a different MAC address, and a memory configured to aggregate, in a shared queue, a plurality of packets of a data stream received via a computer network. Each of the transceiver systems is configured to asynchronously acquire one or more of the packets from the shared queue for transmission in one of a plurality of transmission channels. Each one of the transmission channels comprises a different frequency. The transmission channels are maintained for simultaneous transmission of the one or more packets to a common target user equipment (UE) that is wirelessly coupled to the MRM transceiver. | 2022-04-07 |