40th week of 2017 patent applcation highlights part 85 |
Patent application number | Title | Published |
20170289031 | INDIRECT VXLAN BRIDGING - A method for transmitting MAC frames between hosts/remote machines and virtual machines across network elements (e.g., switches, routers, and multilayer switches) that conventionally do not hold capacity to address VXLAN encapsulation to any and all possible destination VTEPs within expanding data centers. More specifically, the method permits a network element the functionality of retaining VXLAN encapsulation table entries corresponding to VTEPs on Top of Rack (ToR) switches versus to VTEPs on hosts that reside under those ToR switches. This use of indirect VXLAN bridging may reduce the number of required VTEPs stored on a network element for the purposes of performing VXLAN encapsulation, thereby once again establishing the capability for packets to reach any arbitrary destination VTEP as data centers scale. | 2017-10-05 |
20170289032 | EXTENDING NSH SERVICES INTO THE VPN L2/L3 DOMAIN - Embodiments of the present disclosure are directed to augmenting a Network Service Header (NSH) metadata of a data packet with a virtual routing and forwarding identifier (VRF-ID) and forgoing augmenting a virtual private network (VPN) label into a multiprotocol label switched (MPLS) metadata of the data packet. A provider edge router can use the VRF-ID to identify a next hop for the data packet as a service to be applied prior to forwarding the data packet to a VPN site. | 2017-10-05 |
20170289033 | ADDRESS CACHE FOR TUNNEL ENDPOINT ASSOCIATED WITH AN OVERLAY NETWORK - In some examples, a method includes receiving an address resolution broadcast request from a first virtual machine hosted with a network tunnel endpoint associated with an overlay network. The address resolution broadcast request may include a target internet protocol (IP) address of a second virtual machine to resolve. The method may also include parsing the address resolution broadcast request to identify the target IP address and accessing an address cache maintained by the tunnel endpoint to identify a particular MAC address of the second virtual machine that maps to the target IP address. The method may also include, without broadcasting the address resolution broadcast request to other virtual machines in the overlay network, generating an address resolution response indicating that the target IP address maps to the particular MAC address and sending the address resolution response to the first virtual machine hosted with the tunnel endpoint. | 2017-10-05 |
20170289034 | Packet Processing Match and Action Unit with Configurable Memory Allocation - A packet processing block. The block comprises an input for receiving data in a packet header vector, the vector comprising data values representing information for a packet. The block also comprises circuitry for performing packet match operations in response to at least a portion of the packet header vector and data stored in a match table, and circuitry for performing one or more actions in response to a match detected by the circuitry for performing packet match operations and according to information stored in an action table. Each of said match table and said action table comprise one or more memories selected from a pool of unit memories, wherein each memory in the pool of unit memories is configurable to operate as either a match memory or an action memory. | 2017-10-05 |
20170289035 | METHOD FOR DETERMINING MANAGEMENT DOMAIN, NETWORK DEVICE, AND VIRTUAL CLUSTER - A method for determining a management domain, the method comprising: receiving, by a second network device, a first packet sent by a first network device, where the first packet includes a domain ID of a first management domain and a first IP address set corresponding to the domain ID of the first management domain, and the first IP address set includes an IP address of a network device in the first management domain; and when the second network device determines that the first IP address set includes an IP address of the second network device, determining that the second network device belongs to the first management domain, and storing the domain ID of the first management domain. | 2017-10-05 |
20170289036 | TECHNOLOGIES FOR NETWORK I/O ACCESS - Technologies for accelerating non-uniform network input/output accesses include a multi-home network interface controller (NIC) of a network computing device communicatively coupled to a plurality of non-uniform memory access (NUMA) nodes, each of which include an allocated number of processor cores of a physical processor package and an allocated portion of a main memory directly linked to the physical processor package. The multi-home NIC includes a logical switch communicatively coupled to a plurality of logical NICs, each of which is communicatively coupled to a corresponding NUMA node. The multi-home NIC is configured to facilitate the ingress and egress of network packets by determining a logical path for each network packet received at the multi-home NIC based on a relationship between one of the NUMA nodes and/or a logical NIC (e.g., to forward the network packet from the multi-home NIC) coupled to the one of the NUMA nodes. Other embodiments are described herein. | 2017-10-05 |
20170289037 | METHOD AND DEVICE FOR TRANSMITTING/RECEIVING DATA USING CACHE MEMORY IN WIRELESS COMMUNICATION SYSTEM SUPPORTING RELAY NODE - The present invention relates to a wireless communication system. More particularly, the present invention relates to a method for transmitting a content using a cache memory, and a method for transmitting, by a relay node, a content using a cache memory according to the present invention may comprise the steps of: storing a first content, received from a serving cell, in the cache memory; storing a second content, received from an adjacent cell or the serving cell, in the cache memory; selecting a content to be transmitted to a user equipment (UE) from among the first content requested by the UE and the second content which acts as interference to the first content; and transmitting the second content to the UE. | 2017-10-05 |
20170289038 | TECHNIQUES AND SYSTEMS FOR LOGICAL MESH NETWORKS - Various embodiments are described wherein a set of devices are configured to be a logical mesh network. Each device has a logical mesh network address. Further, the set of logical mesh network addresses form a sequence from a first address to a last address, and intermediate addresses having both a preceding and a next address. The devices store forwarding information used to determine how to forward a received logical mesh network packet. Other embodiments are described and claimed. | 2017-10-05 |
20170289039 | CLIENT COMMUNICATIONS IN MULTI-TENANT DATA CENTER NETWORKS - The present subject matter relates to client communication in multi-tenant data center networks. In an example implementation, a unicast packet comprises a status indicative of one of a forwarding table-match and a forwarding table-miss at a source tunnel end-point (TEP) in a multi-tenant data center network. | 2017-10-05 |
20170289040 | THROUGHPUT RESILIENCE DURING LINK FAILOVER - Techniques disclosed herein provide an approach for providing throughput resilience during link failover when links are aggregated in a link aggregation group (LAG). In one embodiment, failure of a link in the LAG may be detected, and a Transmission Control Protocol/Interact Protocol (TCP/IP) stack notified to ignore packet losses and not perform network congestion avoidance procedure(s) for one round-trip timeout (RTO) period. In a virtualized system in particular, a virtual switch may be configured to generate events in response to detected link failures and notify TCP/IP stacks of a hypervisor and/or virtual machines (VMs) of the link failures. In turn, the notified TCP/IP stacks of the hypervisor and/or VMs may ignore packet losses and not perform network congestion avoidance procedure(s) for one RTO period. | 2017-10-05 |
20170289041 | Data Transmission Method and Apparatus - A data transmission method and an apparatus are provided. The data transmission method in the present invention includes: determining, by a first device and according to data stream information, whether a data transfer protocol TCP parameter in a data stream corresponding to the data stream information needs to be modified, where the data stream information includes at least one of the following information: information about the first device, information about a second device, service information, or network status information; if determining that the TCP parameter needs to be modified, modifying, by the first device, the TCP parameter, to obtain a modified TCP parameter; and generating, by the first device, a modification result of the TCP parameter. | 2017-10-05 |
20170289042 | Congestion Control Handling Between Communication Apparatus And Network - Methods and apparatuses pertaining to congestion control handling between a communication apparatus and a network apparatus. The communication apparatus may transmit a request message to the network apparatus. The network apparatus may transmit a reject message with a back-off timer value and a back-off priority indication to the communication apparatus. The communication apparatus may determine whether to send a further request message to the network apparatus according to the back-off priority indication. | 2017-10-05 |
20170289043 | SYSTEMS AND METHODS FOR PERFORMING TRAFFIC ENGINEERING IN A COMMUNICATIONS NETWORK - A method is disclosed for performing traffic engineering for a flow traversing a communications network having a plurality of nodes communicatively coupled by a plurality of links, with at least one of the plurality of links being a wireless link. The method includes setting an activation factor for the at least one wireless link in accordance with buffer statuses associated with nodes traversed by the flow; and transmitting the activation factor to a scheduling entity for scheduling activation of the at least one wireless link in accordance with the activation factor. | 2017-10-05 |
20170289044 | HIGHLY AVAILABLE SERVERS - Techniques for maintaining high availability servers are disclosed. For example, a method comprises the following steps. One or more client requests are provided to a first server for execution therein. The one or more client requests are also provided to a second server for storage therein. In response to the first server failing, the second server is configured to execute at least one client request of the one or more client requests provided to the first server and the second server that is not properly executed by the first server. | 2017-10-05 |
20170289045 | SWITCH, DEVICES AND METHODS FOR RECEIVING AND FORWARDING ETHERNET PACKETS - A switch receiving Ethernet packets is disclosed, including TCP packets and/or non-TCP packets. The Ethernet packets are forwarded to at least two ports by forwarding each TCP Present application relates to a switch receiving Ethernet packets, including TCP packets and/or non-TCP packets, and forwarding the Ethernet packets to at least two ports by forwarding each of the TCP packets to any one of the at least two ports and forwarding each stream of non-TCP packets to one corresponding port of the at least two ports. | 2017-10-05 |
20170289046 | QUALITY OF SERVICE (QOS) MANAGEMENT IN WIRELESS NETWORKS - A core network (CN) may establish and distribute a quality of service (QoS) policy across a wireless communication system, e.g., by sending QoS policy information to an access network and to user equipment. The QoS policy may be implemented with respect to data network (DN) sessions as well as data sessions. For each DN session or data session, the QoS policy may be applied by explicit or implicit request, and data sessions may in some examples utilize pre-authorized QoS policies without the need to request the QoS. Other aspects, embodiments, and features may also be claimed and described. | 2017-10-05 |
20170289047 | METHOD AND APPARATUS FOR END-TO-END QoS/QoE MANAGEMENT IN 5G SYSTEMS - Various methods are provided for providing dynamic and adaptive QoS and QoE management of U-Plane traffic while implementing user and application specific differentiation and maximizing system resource utilization by, for example, providing utilizing a system comprised of a policy server and one or more enforcement points. In one example system, the policy server may be a logical entity configured for storing a plurality of QoS/QoE policies, each of the plurality of policies identifying at least one of a user, service vertical, application, or context, and associated QoE targets. The policy server may be further configured to provide one or more of the plurality of QoS/QoE policies to the one or more enforcement points. In some embodiments, the QoS/QoE policies may be configured to provide QoE targets, for example, at a high abstraction level and/or at an application session level. | 2017-10-05 |
20170289048 | METHODS AND APPARATUS FOR ALLEVIATING CONGESTION AT A SWITCH, SUCH AS A SHALLOW BUFFERED SWITCH - The problem of collisions and/or congestion at output ports of switches, especially in shallow-buffered commodity switches, can be solved by: (a) receiving by the switch, a packet; (b) extracting destination information from the packet; (c) looking up, using the extracted destination information, an output port for the packet; (d) determining whether or not to redirect the packet based on a congestion level of a buffer associated with the output port; (f) responsive to a determination to redirect the packet, (1) dispatching the packet to a dedicated reservoir port of the switch, wherein the reservoir port enforces a queue discipline, (2) receiving, by a reservoir, the redirected packet, (3) temporarily buffering, in an internal queue of the reservoir, the received, redirected packet, and (4) sending the temporarily buffered, received, redirected packet back to the switch. Otherwise, responsive to a determination to not redirect the packet, the packet is dispatched to the output port of the switch. In at least some example embodiments consistent with the present invention, any packets sent back to the switch are paced such that collisions and congestion at the switch output port is relieved. | 2017-10-05 |
20170289049 | Providing Differentiated Service To Traffic Flows Obscured By Content Distribution Systems - A system for providing differentiated services to traffic flows of a content distribution network is disclosed. In particular, the system may include determining if a first portion of an internet protocol address associated with a traffic flow includes an identifier for a node in the content distribution network by comparing the identifier to a set of prefixes for the content distribution network. Additionally, the system may include determining if a second portion of the internet protocol address matches a unique host address specified by the content distribution network for a customer of the content distribution network. If a rule for providing a differentiated service exists for the customer, the first portion is in the set of prefixes, and the second portion matches the unique host address specified for the customer, the system may provide the differentiated service for the traffic flow. | 2017-10-05 |
20170289050 | HIERARCHICAL ENFORCEMENT OF SERVICE FLOW QUOTAS - Systems and methods may provide for determining a local traffic quota for a service associated with an overlay network and determining an allocation of the local traffic quota across a set of data sources associated with the overlay network. Additionally, the allocation may be imposed on one or more packets received from the set of data sources. In one example, imposing the allocation on the one or more packets includes sending the one or more packets to a parent node connected to the overlay router in a hierarchy of the overlay network if delivery of the one or more packets to the parent node complies with the allocation and delaying delivery of the one or more packets to the parent node if the packets do not comply with the allocation. | 2017-10-05 |
20170289051 | OFFLOADING APPLICATION TRAFFIC TO A SHARED COMMUNICATION CHANNEL FOR SIGNAL OPTIMIZATION IN A WIRELESS NETWORK FOR TRAFFIC UTILIZING PROPRIETARY AND NON-PROPRIETARY PROTOCOLS - A method for conserving network and battery usage is provided. The method includes determining that a device is communicating over at least two overlapping push channels and blocking one of the push channels to eliminate or reduce overlap between the at least two overlapping push channels. Related systems are also provided. | 2017-10-05 |
20170289052 | Network Communication Method, Device, and Internet System - A network communication method, a device, and an Internet system are presented. The method includes receiving, by a first primary node at a first network layer, first communication information sent, by a non-primary node that initiates communication, to a non-primary node that receives communication, where the non-primary node that initiates communication is in a domain to which the first primary node belongs, and the non-primary node that receives communication is in a different domain at the first network layer; determining, first label information, where the first label information is used to indicate a communication path, at a second network layer, from a node that receives the first communication information to a node that has a mapping relationship with a second primary node to which the non-primary node that receives communication belongs; and sending, first information to a node at the second network layer. | 2017-10-05 |
20170289053 | MULTI-TAGGED MULTI-TENANT RATE LIMITING - A rate limiting module receives a first request at a first time that comprises a first tag associated with a first attribute and a second tag associated with a second attribute. A second request is received at a second time that occurs after the first time that includes the first tag and the second tag. Responsive to determining that the second request violates a first rate limit for the first attribute, the rate limiting module rejects the second request. A third request is received at a third time that occurs after the second time that includes the first tag and the second tag. The rate limiting module determines that the third request violates a second rate limit for the second attribute, determines that the second rate limit is to be bypassed, and forwards the third request. | 2017-10-05 |
20170289054 | APPARATUS AND METHOD TO DETERMINE A TYPE OF CONGESTION CONTROL BASED ON TEMPORAL CHANGE IN A WINDOW SIZE - An apparatus acquires time-series information that stores information on a packet transmitted and received between a first apparatus and a second apparatus in association with a time at which the packet is transmitted or received. The apparatus estimates a window size indicating an amount of data that a receiver of the data is able to accept without acknowledging a sender of the data, based on the acquired time-series information, and, based on temporal change in the estimated window size, determines a type of congestion control being executed by the first apparatus, from among a plurality of candidate types of congestion control. | 2017-10-05 |
20170289055 | COMMUNICATION DEVICE AND COMMUNICATION METHOD - In a core node, packet related information included in a packet is extracted, a virtual queue length, which is an estimated value of a queue length of a transmission queue addressed to a user in an edge device, is calculated and held on a user basis on the basis of the packet related information and band information of a line between the edge device and the user, and a determination is made, on a user basis, as to whether or not band control is required, on the basis of the virtual queue length and predetermined conditions so as to perform, on the basis of the result of the determination, the band control of the packet addressed to the user on a user basis in a packet relay part. | 2017-10-05 |
20170289056 | ALLOCATION OF BROADER NETWORK BANDWIDTH WITHIN A LOCAL NETWORK - One embodiment provides a method, including: allocating, at a node within a local network, availability to a broader network into one or more units; associating, using a processor, one or more tokens with the one or more units; distributing, over a network, the one or more tokens to a requesting node; receiving, over a network, the one or more tokens from the requesting node, where the one or more tokens have been associated with network payload; confirming, using the processor, that the one or more tokens are valid; and in response to the confirming, sending the network payload onto the broader network. Other embodiments are described and claimed. | 2017-10-05 |
20170289057 | SELF-TIMED ROUTER WITH VIRTUAL CHANNEL CONTROL - Systems, apparatuses, and methods for implementing an asynchronous router with virtual channel (VC) control. The asynchronous router may support multiple VCs for connections to other routers. The asynchronous router may include an interface unit on each switch boundary, with each interface unit including a data merge unit. The data merge unit may include a full detector unit for each VC, with the full detector unit counting the number of flits sent out on a respective VC and counting the number of credits released by the successor router. Whenever the successor router has no credits available, the full detector unit will assert the full signal to prevent any input requests from requesting to transmit over that particular VC. When the full signal is asserted, a timer unit may be activated to repeatedly check if any credits have been released in the successor router. | 2017-10-05 |
20170289058 | Indicating delays added to packets due to retransmission - System and method indicating delays added to packets due to retransmission events. The method includes the steps of receiving multiple packet streams and multiplexing them into a first multiplexed packet stream; storing in memory the first multiplexed packet stream together with time indications; receiving a retransmission request and selecting data for retransmission; multiplexing the first multiplexed packet stream and the data for retransmission into a second multiplexed packet stream; utilizing the time indications for calculating delays that were added to packets of the second multiplexed packet stream as a result of fulfilling the retransmission request; adding the calculated delays to at least some of the packets of the second multiplexed packet stream; and transmitting the second multiplexed packet stream. | 2017-10-05 |
20170289059 | CONTAINER-BASED MOBILE CODE OFFLOADING SUPPORT SYSTEM IN CLOUD ENVIRONMENT AND OFFLOADING METHOD THEREOF - The present invention discloses a container-based mobile code offloading support system in a cloud environment and the offloading method thereof, comprising a front-end processing layer, a runtime layer and a back-end resource layer. The front-end processing layer is responsible for responding to an arrived request and managing a status of a container, which is realized by a request distribution module, a code caching module and a monitoring and scheduling module; the runtime layer provides the same execution environment as that of a terminal, which is realized by a runtime module consisted of a plurality of mobile cloud containers; and the back-end resource layer solves incompatibility of a cloud platform with an mobile terminal environment and provides underlying resource support for a runtime, which is realized by a resource sharing module and an extended kernel module within a host operating system. The present invention utilizes the built mobile cloud container as the runtime environment for offloading code, ensuring execution requirements of offloading tasks and improving the computing performance of a cloud; cooperation between respective modules makes a further optimization to the performance of the platform, guaranteeing an efficient operation for the system. | 2017-10-05 |
20170289060 | MODEL DRIVEN PROCESS FOR AUTOMATED DEPLOYMENT OF DOMAIN 2.0 VIRTUALIZED SERVICES AND APPLICATIONS ON CLOUD INFRASTRUCTURE - A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness. | 2017-10-05 |
20170289061 | SOFT RESERVATION TECHNIQUES AND SYSTEMS FOR VIRTUALIZED ENVIRONMENTS - A computer program product includes a computer readable medium having computer readable program instructions configured to cause a processor to: track resource requirements for a workload deployed to a virtual environment; monitor one or more health characteristics of one or more systems of the virtual environment; determine whether one or more soft reservations corresponding to the workload should be created on one or more of the systems of the virtual environment; and in response to determining the one or more soft reservations corresponding to the workload should be created, creating the one or more soft reservations on the one or more of the systems of the virtual environment. The one or more of the systems of the virtual environment on which the one or more soft reservations are created are preferably different systems than the system to which the workload was originally deployed. Corresponding systems and methods are also disclosed. | 2017-10-05 |
20170289062 | WORKLOAD DISTRIBUTION BASED ON SERVICEABILITY - Workload distribution based on serviceability includes: generating, for each of a plurality of computing systems, a metric representing serviceability of the computing system for which the metric is generated; and distributing workload among said plurality of computing systems in dependence upon the metrics. | 2017-10-05 |
20170289063 | MODULAR FABRIC INTERNAL DATAPATH - Described is an apparatus comprising one or more router circuitries. One or more of the circuitries may be a shared-bus router circuitry including a plurality of shared-bus ports and a shared-bus datapath, and one or more of the circuitries may be a crossbar router circuitry including a plurality of crossbar ports and a crossbar datapath. Also described are methods of making the apparatus, which may include: providing one or more design files modeling the apparatus, the shared-bus datapath, and the crossbar datapath; incorporating a configuration parameter for the datapath into the one or more design files; and setting an RTL configuration parameter to instantiate either the shared-bus backbone or the crossbar backbone. The methods may also include loading the one or more design files with a design tool and compiling the one or more design files with the design tool. | 2017-10-05 |
20170289064 | ON-CHIP NETWORK DEVICE CAPABLE OF NETWORKING IN DUAL SWITHCHING NETWORK MODES AND OPERATION METHOD THEREOF - Provided is an on-chip network device which basically operates in a packet switching network mode, establishes an exclusive communication path according to a request for a specific path, performs networking in a circuit switching network mode, and switches a network mode back to the packet switching network mode, when communication in the circuit switching network mode is terminated. | 2017-10-05 |
20170289065 | Interworking between physical network and virtual network - A method and device for interworking between a physical network and a virtual network is provided. The implementations may include creating a network connection container. The network connection container may include a first virtual LAN interface configured to connect to a physical network, a second virtual LAN interface configured to connect to a virtual network, and a virtual extensible LAN interface configured to connect the first virtual LAN interface and the second virtual LAN interface. The implementations may further include configuring corresponding routing information for the network connection container and transmitting packets between the physical network and the virtual network via the network connection container based on the routing information. Thus, the network connection container may be added to various network interfaces to achieve physical network and virtual network interworking. | 2017-10-05 |
20170289066 | FACILITATING COMMUNICATION OF DATA PACKETS USING CREDIT-BASED FLOW CONTROL - Apparatuses and methods are described that provide for credit based flow control in a network in which a public buffer is supported at a receiver node, where a transmitter node can control the use of the public buffer. In particular, the transmitter node determines a buffer credit value (TCRi) for each virtual lane of the transmitter node. The buffer credit value (TCRi) is negative (e.g., less than 0) in an instance in which a respective virtual lane private buffer is fully used and thus reflects a loan of credits from the public buffer. In addition, the transmitter node knows the needed buffer size per virtual lane for transmitting a packet in advance based on the round trip time (RTT) and maximum transmission unit (MTU) for the packet and is precluded from consuming more space on the public buffer than required to meet RTT. | 2017-10-05 |
20170289067 | MULTI-PATH VIRTUAL SWITCHING - A virtual switch for packet switching includes an ingress traffic steering manager executing on circuitry and coupled to receive packets from multiple virtual machines or containers, multiple data plane providers, each data plane provider having a data path coupled to selectively receive the packets from the ingress traffic steering manager, and wherein the ingress traffic steering manager classifies the received packets and selects available data paths based on the classification of the packets and a set of distribution rules. | 2017-10-05 |
20170289068 | METHOD AND APPARATUS FOR ACCELERATING VM-TO-VM NETWORK TRAFFIC USING CPU CACHE - Methods and apparatus for accelerating VM-to-VM Network Traffic using CPU cache. A virtual queue manager (VQM) manages data that is to be kept in VM-VM shared data buffers in CPU cache. The VQM stores a list of VM-VM allow entries identifying data transfers between VMs that may use VM-VM cache “fast-path” forwarding. Packets are sent from VMs to the VQM for forwarding to destination VMs. Indicia in the packets (e.g., in a tag or header) is inspected to determine whether a packet is to be forwarded via a VM-VM cache fast path or be forwarded via a virtual switch. The VQM determines the VM data already in the CPU cache domain while concurrently coordinating with the data to and from the external shared memory, and also ensures data coherency between data kept in cache and that which is kept in shared memory. | 2017-10-05 |
20170289069 | Selecting an Autonomous Software Agent - A communication system comprising a user terminal having a processor configured to execute a communication client installed at the terminal and a display. The communication client is configured to display contact identifiers on the display, each contact identifier being selectable to initiate a communication event with a network node addressed by the contact identifier. A first network node provides a first autonomous software agent (ASA) and is addressable by a first contact identifier displayed on the user terminal, the ASA configured to receive an intent conveyed by a user at the user terminal; an agent provisioning service component accessible by the first network node and enabling access to a plurality of servicing autonomous software agents (SASA), each capable of implementing an action. The first network node is configured to respond to the received intent and to select one of the SASAs to implement an action corresponding to the user intent. | 2017-10-05 |
20170289070 | Making a Dialogue Available To an Autonomous Software Agent - A user terminal comprising a processor comprising one or more processing devices configured to run a communication client to establish a communication event with nodes in a communication network; a display on which contact identifiers are displayed, each contact identifier being selectable to initiate a communication event with a node addressed by the contact identifier. A user interface enabling a user to engage in an interaction with the user terminal, including communicating via an established communication events with at least one other node in the communication network associated with a human user, whereby messages in the communication event are available to an autonomous software agent (ASA) to convey an intent conveyed in a dialogue between the user terminal and the human user at the at least one other node, and the processor is configured to receive and present to the user a response to the intent received from the ASA. | 2017-10-05 |
20170289071 | SYSTEM, APPARATUS AND METHOD FOR AUTONOMOUS MESSAGING INTEGRATION - A method of autonomous messaging integration at a computing device executing a primary autonomous messaging application includes: receiving a message from a client device; responsive to receiving the message, obtaining response data corresponding to the message; determining whether the message corresponds to an integration identifier stored in the memory, the integration identifier identifying a second computing device executing a secondary autonomous messaging application; when the determination is affirmative: generating integration data including the integration identifier; and sending a reply containing (i) the response data, (ii) a destination identifier corresponding to the client device, instructing a routing server to transmit the reply to the client device, and (iii) the integration data, instructing the routing server to transmit the reply to the second computing device. | 2017-10-05 |
20170289072 | REAL-TIME NOTIFICATIONS OF CONCURRENT EMAIL THREAD REPLIES - In an embodiment of the present invention, a first message is determined. The first message is associated with two or more users. The two or more users include a sender of the first message and one or more recipients of the first message. In response to determining that a first user of the two or more users is currently generating a second message, which is a response to the first message, it is determined whether a second user of the two or more users of the first message is currently generating a third message, which is a response to the first message. In response to determining that the second user is currently generating the third message, the first user is notified that the second user is currently generating the third message, and the second user is notified that the first user is currently generating the second message. | 2017-10-05 |
20170289073 | SYSTEMS AND METHODS FOR PROVIDING CONTROLS IN A MESSAGING INTERFACE - Described herein is a computer implemented method for displaying a conditional control in a chat interface running on a client device. The method comprises receiving, from a collaboration platform, a conditional control descriptor which defines a conditional control, one or more conditions, and an action to be performed on activation of the conditional control; determining whether the one or more conditions are met; and in response to determining that the one or more conditions are met, displaying the conditional control in the chat interface. | 2017-10-05 |
20170289074 | METHOD FOR MESSENGER OPERATION BASED ON LOCATION INFORMATION AND ELECTRONIC DEVICE SUPPORTING THE SAME - A method for messenger operation based on location information of an electronic device is disclosed. The method may include: creating a chat room with two or more members on the basis of geofence information, monitoring whether a chatroom member enters or exits the geofence, displaying a message input window for the chat room, determining whether all the chatroom members remain in the geofence, and sending, when all chatroom members remain in the geofence, a message to electronic devices of the chatroom members in response to a message transmission request. | 2017-10-05 |
20170289075 | Method and Device for Managing Instant Communication Application Program, and Mobile Terminal thereof - A method and device for managing an instant communication application program, and a mobile terminal thereof are provided. The method includes: when an upper-layer Application Processor (AP) side of a mobile terminal is in a standby state, an instant communication application program is prevented from sending a heartbeat packet to a network server through the upper-layer AP side; and the instant communication application program is replaced to send the heartbeat packet of the instant communication application program to the corresponding network server. | 2017-10-05 |
20170289076 | TECHNOLOGIES FOR PREDICTING AVAILABILITY STATUS CHANGES - Technologies for predicting availability status changes in an instant messaging application include one or more client computing devices usable by a user to interface with the IM application and a provider computing device to manage the IM application. The provider computing device is configured to retrieve present availability status information for a user of an instant messenger (IM) application and identify a behavioral pattern of a plurality of behavioral patterns for the user as a function of the present availability status. The provider computing device is additionally configured to determine a predicted availability status change event and update the availability status of the user based on the identified behavioral pattern. Additional embodiments are described herein. | 2017-10-05 |
20170289077 | INFORMATION PROCESSING APPARATUS AND CELLULAR PHONE TERMINAL - Disclosed is an information processing apparatus including a display unit displaying information on a display screen, an operation unit including a text input key, and a control unit. The control unit displays text in response to input from the operation unit in a state of displaying an initial screen on the display screen, shows an application using text to a user for selection, starts up the application in accordance with the user's selection, and executes the application, using the text inputted from the operation unit. | 2017-10-05 |
20170289078 | SYSTEMS AND METHODS OF SUPPORTING PARALLEL PROCESSOR MESSAGE-BASED COMMUNICATIONS - A method of message-based communication is provided which includes executing, on one or more accelerated processing units, a plurality of groups of work items, receiving a first message from a first group of work items of the plurality of groups of work items executing on the one or more accelerated processing units and storing the first message at a first segment of memory allocated to a second group of work items of the plurality of groups of work items executing on the accelerated processing unit. | 2017-10-05 |
20170289079 | SYSTEMS, METHODS, AND DEVICES FOR ADJUSTING CONTENT OF COMMUNICATION BETWEEN DEVICES FOR CONCEALING THE CONTENT FROM OTHERS - Systems, methods, and devices for adjusting content of communication between devices for concealing the content from others are disclosed. According to an aspect, a method may be implemented at a communications device including a user interface, a processor, and memory. The method includes receiving a communication for presentation on the communications device. Further, the method includes identifying at least one person located in proximity to the communications device. The method also includes determining a profile of a current user of the communications device. Further, the method includes adjusting content of the communication based on a comparison of a profile of the identified at least one person and the determined profile. The method also includes using the user interface to present the adjusted content to the current user. | 2017-10-05 |
20170289080 | SYSTEM FOR ANNOTATION OF ELECTRONIC MESSAGES WITH CONTEXTUAL INFORMATION - A system that transforms electronic messages into annotated messages that include contextual information to aid a recipient in utilizing the electronic message, understanding its meaning, and responding to the message. Annotations are additions or modifications to the original message with contextual information that is related to the features and contents of the original message. Message features are extracted and used to search one or more sources of contextual information. Relevant items are retrieved and added to the message, for example as attachments, hyperlinks, or inline notes. Machine learning techniques may be used to generate or refine modules for feature extraction and information selection. Feedback components may be used to track the usage and value of annotations, in order to iteratively improve the annotation system. | 2017-10-05 |
20170289081 | Systems and Methods For Periodic Posthumous Electronic Delivery of Voice Messages, Video Messages, Images, or Email on Selected Occasions - A system for periodically transmitting posthumous messages from an originator to a recipient stores a message from the originator to the recipient. The message may have a digital attachment including video, audio, or an image. A selected date, which may correspond to a particular occasion, is stored for delivery of the stored message to the recipient when the originator is determined to be deceased. The system automatically transmits the stored message to the recipient periodically on the selected date unless halted by the recipient. | 2017-10-05 |
20170289082 | METHOD AND DEVICE FOR IDENTIFYING SPAM MAIL - A method and a device for identifying spam mail are provided. The method for identifying spam mail may include extracting a mail feature of an e-mail to be identified, the mail feature indicating a feature having a stability characteristic extracted from the e-mail; generating feature string information from the mail feature, and generating a mail fingerprint from the feature string information by a preset fingerprint generating method; comparing the generated mail fingerprint with an existing fingerprint in a preset mail fingerprint set, when the mail fingerprint is matched with the existing fingerprint, increasing a count of e-mails having the mail fingerprint; determining whether the count of e-mails having the mail fingerprint is greater than or equal to a preset threshold; determining the e-mail to be identified as a spam mail, if the count of e-mails having the mail fingerprint is greater than or equal to a preset threshold. | 2017-10-05 |
20170289083 | NET- BASED EMAIL FILTERING - A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email to determine whether it is spam, phishing or contains a virus and sends it back to the local gateway device along with the filtered determination. The local gateway device forwards the received email and the filtered determination to a local junk store which handles the email appropriately. For example, if the email has been determined to be spam, phishing or containing a virus, the junk store can quarantine the email and if the email has been determined to be non-spun and/or not phishing and/or not containing a virus, the junk store can forward the email to a local mail server for delivery. | 2017-10-05 |
20170289084 | MESSAGING FORWARDING SYSTEM AND METHOD - A messaging system having a cluster of receiving applications for handling received messages, and a cluster of messaging engines for receiving messages from one or more message sources and forwarding the received messages to one of the receiving applications is provided. Each messaging engine is operable to transmit load balancing information, the load balancing information comprising an indication of the current loading on the messaging engine. The receiving applications are instructed to establish a connection to receive messages from a particular messaging engine within the cluster based on the load balancing information. Accordingly, applications are able to receive messages in such a way that the messages do not build up unprocessed on a particular messaging engine for too long, and such that messages are routed to messaging engines where messages are being consumed, and so that the receiving applications receive messages from every messaging engine where messages are arriving. | 2017-10-05 |
20170289085 | TERMINAL AND METHOD FOR OEPRATING SAME - A terminal according to an embodiment of the present invention displays at least one message, and obtains, on the basis of at least one of the displayed at least one message and terminal information of the terminal, at least one of: previous dialog information regarding the contents of a previous dialog with another party that corresponds to at least one message; and recommendation information which is information related to the contents of at least one message. In addition, the terminal displays at least one of the obtained previous dialog information and the obtained recommendation information. | 2017-10-05 |
20170289086 | MESSAGING SYSTEM WITH MESSAGE MANAGEMENT CONTROL - A server maintains message status information for a plurality of messages. The status information includes an indicator for each message that indicates if a reply is required. A view is provided on a client device that shows only messages for which a reply is required by the first client device according to the message status information. The view is displayable on a display of the client device. | 2017-10-05 |
20170289087 | NOTIFICATION DELIVERY TO DEVICES WITHOUT APPROPRIATE APPLICATIONS INSTALLED - Systems, methods and computer readable media for delivery of notifications to devices without appropriate applications installed are disclosed. In some implementations, the systems, methods and computer readable media can deliver a notification message and process a response via an alternate mode when an appropriate application is not installed. | 2017-10-05 |
20170289088 | AUTOMATED CLASSIFICATION AND TIME-BASED RELEVANCY PRIORITIZATION OF ELECTRONIC MAIL ITEMS - Automated classification and time-based relevancy prioritization of electronic messages is provided. An electronic mail item is parsed for identifying and extracting attributes for classifying the electronic message and for identifying time-sensitivity associated with the electronic message, and enriched with metadata identifying the classification and the associated time-sensitivity for displaying the electronic message based on the classification and based on relevancy to a receiving user based on the time-sensitivity. | 2017-10-05 |
20170289089 | HELMET WITH INFORMATION-SHARING FUNCTION - A helmet with information-sharing function includes a helmet transmitting unit directly or indirectly connected to a server, by which edited information integrated with at least one captured image and at least one sensed signal of the helmet is uploaded and posted to a social media. | 2017-10-05 |
20170289090 | INFORMATION PROCESSING METHOD, CLIENT, SERVER, AND COMPUTER STORAGE MEDIUM - An information processing method is performed at a server that is communicatively connected to a client device. The method includes: receiving a first request from a first user account of a social application running on the client device; establishing a communications session between the client device and the server after the first request is authenticated; pushing, via the communications session, to the first user account information associated with a social group including the first user account and at least one second user account; and pushing, via the communications session, to the first user account second multi-media information propagated by a third user account of the social application and interaction information by the at least one second user account in the social group on the second multi-media information that satisfy a preset policy. | 2017-10-05 |
20170289091 | WARNING METHOD AND APPARATUS, AND PROCESSING SERVER - Embodiments of the present disclosure provide a warning method, apparatus and a processing server. The method may include: pushing an associated message event to a target official account when the associated message event of the target official account is detected; obtaining abnormal information if the associated message event is not successfully pushed to the target official account; obtaining a warning condition that corresponds to the target official account; generating a warning message according to the abnormal information if the abnormal information satisfies the warning condition, and outputting the warning message to the target official account. By means of the present disclosure, an abnormality in a service process of a target official account can be warned, thereby ensuring that a fault can be resolved in time, an information exchanging process of the target official account is smooth, and service quality of the target official account is improved. | 2017-10-05 |
20170289092 | INFORMATION PROCESSING METHOD, TERMINAL, AND COMPUTER STORAGE MEDIUM - An information processing method is performed at a terminal that is communicatively connected to a remote server. The method includes: logging into a first user account of a social application; pulling, from the remote server, information associated with a social group including the first user account and at least one second user account; selecting, among the information associated with the social group, second multi-media information propagated by a third user account of the social application when the second multi-media information and interaction information by the at least one second user account in the social group on the second multi-media information satisfy preset policies of the remote server; and displaying, on the terminal, the second multi-media information propagated by the third user account of the social application and the interaction information by the at least one second user account in the social group on the second multi-media information. | 2017-10-05 |
20170289093 | Discovering questions, directives, and requests from, and prioritizing replies to, a preferred message sender method and apparatus - When a message contains an actionable request or question the invention measures a time til transmitted reply (TTTR). Replies which contain substantive answers such as dates, decisions, quantities, concurrence, or content are paired with their respective request for each sender-recipient directed dyad. The replies are categorized to the type of action taken in response to the request. The history of each dyad is examined to determine the relative importance each party ascribes to the other and a range of typical TTTR is stored. Questions, directives, and requests are discovered in a message by scanning for deadline words, calendar words, time words, urgency phrases, question words such as who what when, capability syntax, and agreement/disagreement alternatives. A user receives an alert when a response is nearly past a deadline or close to exceeding expected time to reply, immediately upon receipt, or both. An alert offers a potential response. | 2017-10-05 |
20170289094 | PERFORMING DUPLICATE ADDRESS DETECTION FOR AN INTEGRATED ROUTING AND BRIDGING DEVICE - A device may activate a layer 3 interface of the device based on activation of a first layer 2 interface associated with the layer 3 interface. The device may detect activation of a second layer 2 interface, associated with the layer 3 interface, after activating the layer 3 interface. The device may activate a filter to prevent transfer of network traffic via the second layer 2 interface based on detecting activation of the second layer 2 interface. The device may perform duplicate address detection, in association with the second layer 2 interface, for a layer 3 network address assigned to the device. The device may determine whether the layer 3 network address is a duplicate network address based on performing the duplicate address detection. The device may selectively maintain or deactivate the filter based on determining whether the layer 3 network address is a duplicate network address. | 2017-10-05 |
20170289095 | Methods And Systems For Determining An Optimal Subnet - Methods and systems for recommending an optimal subnet for assignment are disclosed. In some embodiments, the methods include the following: receiving a request for assignment of a subnet, the request including request data; accessing a subnet database to review a current register of subnets; querying the current register of subnets to determine a size of each of the available subnets and a number of available subnets positioned numerically before and after each of the available subnets thereby generating subnet availability data; applying predetermined subnet recommendation rules to both the request data and the subnet availability data to determine a recommended subnet for assignment; updating the current register to indicate that the recommended subnet for assignment is unavailable; presenting the recommended subnet; confirming assignment of the recommended subnet; and if assignment of the recommended subnet is not confirmed, updating the current register to indicate that the recommended subnet is available. | 2017-10-05 |
20170289096 | METHODS, DEVICES, AND SYSTEMS FOR GENERATING A PLURALITY OF NETWORK ADDRESSES FOR A PLURALITY OF COMMUNICATION DEVICES - Methods, devices, and systems for generating a plurality of network addresses for a plurality of communication devices communicating over a network. One method includes receiving, with an electronic processor included in a server, geographical coordinates of the network, generating, with the electronic processor, a first set of bits based on the geographical coordinates, generating, with the electronic processor, a second set of bits based on a random number, and generating, with the electronic processor, a baseline address including the first set of bits and the second set of bits. The method also includes generating the plurality of network addresses, wherein each of the plurality of network addresses includes the baseline address and a unique offset. In addition, the method includes assigning one of the plurality of network addresses to one of the plurality of communication devices. | 2017-10-05 |
20170289097 | Multi-Radio Single Internet Protocol Address Wireless Local Area Network Apparatus and Method - An apparatus includes a first media access control (MAC) device with a first radio transceiver and having a first MAC address, and a second MAC device with a second radio transceiver and having a second MAC address. The first MAC device is operative to communicate with a first wireless access point using an Internet Protocol (IP) address. The second MAC device is operatively coupled to the first MAC device, and is operative to communicate with a second wireless access point using the same IP address. | 2017-10-05 |
20170289098 | METHOD AND NETWORK NODE FOR TRANSMITTING IP ADDRESS INFORMATION, AND METHOD AND USER EQUIPMENT FOR RECEIVING IP ADDRESS INFORMATION - Provided is a method for making it impossible to track a vehicle performing vehicle-to-everything (V2X) communication through a network. The network may allocate the same IP address to all UEs performing V2X communication. Since the UEs performing V2X communication transmit data using the same IP address, an application server cannot track a vehicle transmitting corresponding data. | 2017-10-05 |
20170289099 | Method and Device for Managing Internet Protocol Version 6 Address, and Terminal - The method includes that: when a first service has yet not ended before an original lifetime of a first IPv6 address terminates, a first terminal sends an address updating request message for querying about whether or not the first service supports IPv6 address updating to a second terminal; the first terminal receives an address updating response message returned by the second terminal; when a first determination result carried in the address updating response message indicates that the first service supports IPv6 address updating, the first terminal requests to establish a backup session for the first service with the second terminal by virtue of a second IPv6 address, which is pre-stored; and in the case that the first service has yet not ended when the original lifetime of the first IPv6 address terminates, the first terminal continues executing the first service with the second terminal by virtue of the backup session. | 2017-10-05 |
20170289100 | MAINTENANCE METHOD FOR NETWORK CONNECTION AND COMPUTER SYSTEM - A maintenance method for network connection and a computer system are provided. The method is adapted to a computer system having a timer. The timer is configured to regularly wake up the computer system to check whether a network connection is working normally. In the method, the computer system is waked up at intervals of a first time interval within a predetermined period and a current IP address of the computer system is extracted. The predetermined period is divided into a plurality of periods by the first time interval. Whether a change occurs on the IP address is determined withing each of the periods, and accordingly the computer system is waked up to check the network connection. | 2017-10-05 |
20170289101 | NAT AWARE DNS - Systems and methods are provided for resolving conflicting network addresses by utilizing a DNS server to configure an edge computing device. The DNS server may receive, from a client computing device, a request to resolve a hostname of a recipient computing device. The DNS server may determine a resolved network address corresponding to the hostname and may determine that the resolved network address conflicts with another network address. The DNS server may determine a substitute network address, provide the edge computing device with information for translating the substitute network address into the resolved network address, and provide the substitute network address to the client computing device. The edge computing device may receive the substitute network address from the client computing device, translate the substitute network address into the resolved network address of the recipient computing device, and send network data from the client computing device to the recipient computing device. | 2017-10-05 |
20170289102 | EXCHANGE AND USE OF GLOBALLY UNIQUE DEVICE IDENTIFIERS FOR CIRCUIT-SWITCHED AND PACKET SWITCHED INTEGRATION - According to one aspect, a system and method of exchanging GRUUs (Globally Routed User Agent URI (Uniform Resource Identifier)) between a first telephony-enabled device and a second telephony enabled device using a circuit-switched message is provided. Once exchanged, the telephony enabled devices can exchange SIP (session initiated protocol) communications routed by the GRUUs. Any one of the telephony-enabled devices can add a media component to the SIP communications. According to another aspect, a system and method of generating GRUUs is provided. According to another aspect, a system and method of handing off communications to a packet switched network from a circuit switched network is provided. | 2017-10-05 |
20170289103 | AUTOMATED WEBSITE GENERATION VIA INTEGRATED DOMAIN REGISTRATION, HOSTING PROVISIONING, AND WEBSITE BUILDING - Methods of the present inventions allow for generating and providing an enhanced domain name. An exemplary method may comprise providing an enhanced domain to a second party. The enhanced domain may comprise a domain name, a web space automatically enabled and associated with the domain name, and at least one application automatically enabled and associated with the domain name. | 2017-10-05 |
20170289104 | METHOD AND APPARATUS FOR DISTRIBUTING ENCRYPTION AND DECRYPTION PROCESSES BETWEEN NETWORK DEVICES - In one embodiment, a method includes establishing at a security device, a secure session for transmitting data between a client device and an end host, receiving decrypted data at the security device from the client device, inspecting the decrypted data at the security device, encrypting the decrypted data at the security device, and transmitting encrypted data to the end host. Decryption at the client device is offloaded from the security device to distribute decryption and encryption processes between the client device and the security device. An apparatus and logic are also disclosed herein. | 2017-10-05 |
20170289105 | COMMUNICATION APPARATUS AND COMMUNICATION CONTROL APPARATUS - A transmission apparatus transmits a plurality of second packets obtained from a plurality of first packets, wherein each of the plurality of first packets includes a header including a first field, and a payload, and includes first information stored in the first field, and wherein each of the plurality of second packets includes second information in the first field instead of the first information, and includes the first information inserted in the payload. A reception apparatus receives the plurality of second packets, deletes the first information from the payload of the received second packet and obtains data included in the payload of the received packet when third information stored in a memory is stored in the second field of a packet received by the reception unit. | 2017-10-05 |
20170289106 | APPLYING SECURITY POLICY TO AN APPLICATION SESSION - Applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway, determining by the security gateway a user identity of the application session using information about the application session, obtaining by the security gateway the security policy comprising network parameters mapped to the user identity, and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session. | 2017-10-05 |
20170289107 | ENFORCING DATA SECURITY IN A CLEANROOM DATA PROCESSING ENVRIONMENT - Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud environment stores a first set of data provided by a first user account and a second set of data provided by a second user account, where the first user account is associated with a first set of one or more security credentials and the second user account is associated with a second set of security credentials and where the first user account is prevented from accessing at least the second set of data and the second user account is prevented from accessing at least the first set of data. In response to receiving, from the first user account or the second user account, a request to destroy the virtual private cloud environment, at least the first set of data and the second set of data are deleted. | 2017-10-05 |
20170289108 | UPLINK CONTROL CHANNEL SCHEDULING FOR JAMMING RESILIENCE - Methods, systems, and devices for wireless communication are described. The methods, systems, and devices may provide for a time varying allocation of resources which includes a shared pattern of resources. The shared pattern of resources may be generated, determined, or otherwise identified by a base station and transmitted to the user equipment (UE). The shared pattern of resources may include one or more resource blocks (RBs) allocated for uplink transmission such as uplink control information to be transmitted using a physical uplink control channel (PUCCH) or uplink data transmissions using a physical uplink shared channel (PUSCH). | 2017-10-05 |
20170289109 | Systems and Methods for Decrypting Network Traffic in a Virtualized Environment - Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and analysis of malicious software, intrusion detection, and surveillance, among others. The client system executes a virtual machine and an introspection engine outside the virtual machine. The introspection engine is configured to identify memory pages whose contents have changed between a first session event (e.g., a ServerHello message) and a second session event (e.g., a ClientFinished message). The respective memory pages are likely to contain encryption key material for the respective communication session. A decryption engine may then attempt to decrypt an encrypted payload of the respective communication session using information derived from the content of the identified memory pages. | 2017-10-05 |
20170289110 | JOB EXECUTION METHOD AND JOB EXECUTION DEVICE - An editing device generates a first public key and a first private key, receives a manuscript data encrypted using the first public key from an ordering device, and decrypts the encrypted manuscript data using the first private key. The editing device generates, based on the manuscript data, print data encrypted using a second public key generated in a RIP processing device, and deletes the first private key after finishing execution of a job. Using a third public key, the editing device encrypts a log which shows an execution process of the job, the log including information that a finish processing has been executed. The editing device may store the first private key before starting execution of the job, and may control whether the job is to be executed, based on a job ID received from the ordering device. | 2017-10-05 |
20170289111 | SYSTEMS AND METHODS FOR PROVIDING DATA PRIVACY IN A PRIVATE DISTRIBUTED LEDGER - Systems and methods for providing data privacy in a private distributed ledger are disclosed. According to another embodiment a distributed ledger network may include a first node comprising a first node computer processor and hosting a central ledger comprising a plurality of entries for public transactions and private transactions, wherein the entries for public transactions comprise transaction payloads for the respective public transaction, and the entries for private transactions comprise a cryptographic hash digest of a transaction payload for the respective private transaction; and a plurality of second nodes each comprising a second node computer processor and hosting a public database comprising the public transactions, and a private database comprising transaction payloads for the private transactions to which the node is a party. | 2017-10-05 |
20170289112 | Communicating Messages with Intermittently Available Encryption Credentials - Some embodiments relate to a device that transmits/receives encrypted communications with another device. A first device, such as a smart phone or smart watch, may generate a message associated with a certain data class, which may determine the security procedure used in the communication of the message. The first device may establish an encryption session for the purpose of communicating the message to a second device. Prior to sending the message, the first device may wait until encryption credentials are accessible according to certain conditions, which may be determined at least in part by the data class of the message. Similarly, after receiving the message, the second device may not be able to decrypt the message until encryption credentials are accessible according to certain conditions, which may be determined at least in part by the message data class. | 2017-10-05 |
20170289113 | Multi-Broadcast Beacon Signals - Disclosed herein are techniques and systems for transmitting a multi-broadcast signal from a wireless broadcasting device (or beacon) as part of a beacon recognition process. Specifically, the multi-broadcast signal may be in the form of multiple packets that are broadcast from the beacon within a recognition time period. A process may include creating a first packet having a first identifier (ID) and a randomly generated value, broadcasting the first packet from the beacon, generating a second ID based at least in part on the randomly generated value included in the first packet, and broadcasting, within a period of time from the broadcast of the first packet, a second packet having the second ID and a device ID that uniquely identifies the beacon. A mobile device in proximity to the beacon may include logic to detect and interpret a multi-broadcast signal from the beacon. | 2017-10-05 |
20170289114 | METHOD AND SYSTEM FOR MUTATING AND CACHING CONTENT IN A CONTENT CENTRIC NETWORK - One embodiment provides a system that facilitates mutating and caching content in a CCN. During operation, the system receives, by an intermediate node, a content object that indicates an encrypted payload, a signature, and a parameter for a group to which the content object belongs, wherein the content object includes a name that is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level. The system re-encrypts the content object based on the encrypted payload and the parameter to obtain a new encrypted payload and a new signature, wherein re-encrypting is not based on a private key or a public key associated with the encrypted payload. The system transmits the re-encrypted content object to a client computing device, thereby allowing the client computing device to decrypt the re-encrypted content object and verify the new signature. | 2017-10-05 |
20170289115 | UPDATE-DRIVEN MIGRATION OF DATA - A current operating system that is stored in a persistent storage circuit of a secure element is replaced by receiving a set of migration rules that specify changes to a set of data object types. Based upon the set of migration rules, a migration engine identifies data objects stored in a persistent storage circuit and corresponding to the set of data object types. For each of the identified data objects: a subset of the migration rules are selected that correspond to a data object type that corresponds to a particular data object, and based upon the selected subset, the particular data object is transformed. A new operating system can then be enabled. | 2017-10-05 |
20170289116 | SYSTEM AND METHOD FOR SECURING AUTHENTICATION INFORMATION IN A NETWORKED ENVIRONMENT - This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user. The encrypted authentication information is sent to a cloud based service which then sends it to an on-premises component residing behind a firewall of an enterprise. The on-premises component decrypts the authentication information using a private key, validates the authentication information, and returns the result to the cloud based service over a network. If validated, the cloud based service establishes a secure connection between the client device and the on-premises component such that the user can access the enterprise's content without the enterprise having to share the authentication information with the cloud based service. | 2017-10-05 |
20170289117 | COMMUNICATION DEVICE FOR IMPLEMENTING TRUSTED RELATIONSHIPS IN A SOFTWARE DEFINED NETWORK - The present disclosure pertains to systems and methods for establishing trust relationships between a software defined network (SDN) controller and a SDN communication device. In one embodiment, a SDN controller may comprise a communications interface configured to communicate with a plurality of SDN network devices. A commissioning subsystem configured to detect a new device associated with the SDN. In response to a new device, a user interface subsystem may be configured to receive a user approval to commission the new device. A trust subsystem configured to establish a first SDN controller trusted credential and to transmit a first device trusted credential based on the first SDN controller credential to the new device. Programming instructions to the new device authenticated using the first SDN controller trusted credential by a SDN programming subsystem. | 2017-10-05 |
20170289118 | PROXIMITY DETECTION SYSTEM - Various systems and methods for providing a walk away lock are provided herein. A plurality of data packets may be received at a compute device from a user device. Here, each packet has corresponding time-to-receive value. A baseline latency value of the plurality of data packets may be determined based on their respective time-to-receive values. Additional data packets may be received from the user device, each of these additional data packets having their own corresponding time-to-receive values. A current latency value of the additional data packets may be calculated based on the respective time-to-receive values. A security operation may be performed based on the baseline latency value and the current latency value. | 2017-10-05 |
20170289119 | PRESENCE-BASED NETWORK AUTHENTICATION - Systems and methods are provided to authenticating an electronic device with a wireless network using a presence-based authentication process. As part of the presence-based authentication process, an authentication entity may receive a registration message from an electronic device. The authentication entity may respond to the registration message by transmitting an authentication challenge associated with providing access to the wireless network and/or network feature thereof. If the electronic device provides a successful response to the authentication challenge, then the authentication entity may authenticate the electronic device to utilize the wireless network and/or network feature thereof. | 2017-10-05 |
20170289120 | SYSTEMS AND METHODS FOR AUTHENTICATING USER FOR SECURE DATA ACCESS USING MULTI-PARTY AUTHENTICATION SYSTEM - A method for authenticating a user for accessing secure data from a first data provider is provided. The method is implemented by an authentication system of a second data provider. The method includes receiving user credentials and authentication information associated with a user and storing the user credentials and authentication information in an authentication profile associated with the user. The method further includes receiving user credentials from the first data provider, detecting that the stored authentication profile includes user credentials that match the received user credentials and transmitting a challenge message to a user device associated with the user. The challenge message prompts the user device for authentication information. The method additionally includes receiving a challenge response including collected authentication information from the user device, authenticating the user based on the authentication profile and the collected authentication information, and notifying the first data provider that the user is authenticated. | 2017-10-05 |
20170289121 | OPERATOR AUTHENTICATION FOR A WORK MACHINE - A mobile device receives a shared access key corresponding to a work machine. An access code is generated from the shared access key, and from a changing value (such as a time-sensitive value). The access code is transmitted to the work machine which, itself, calculates an access code based on the shared access key and based on the changing value. If the access code provided to the work machine and the access code generated by the work machine match one another, then the work machine unlocks corresponding functionality so that the operator can use the work machine. | 2017-10-05 |
20170289122 | WIRELESS GATEWAY, NETWORK ACCESS, AND MANAGEMENT - A wireless gateway controls access through a communication portal to a shared communication link. By way of non-limiting example, the wireless gateway receives input (such as a passcode) from a user operating a communication device in a subscriber domain. The user provides the input to communicate through the communication portal or wireless gateway over the shared communication link. The wireless gateway maps the received input to corresponding access profile information stored in a repository of the wireless gateway hardware. The wireless gateway then provides the communication device access to a remote network over the shared communication link through the communication portal in a manner as specified by the corresponding access profile information. | 2017-10-05 |
20170289123 | COMPUTER SYSTEM AUTHENTICATION USING SECURITY INDICATOR - A method to authenticate an application on a first computer system at a second computer system is disclosed. The first computer system receives an authentication bitmap from a second computer system identifying locations in an application. The first computer system extracts portions of the application based on the identified locations in the bitmap. A hashing algorithm is applied by the first computer system to the extracted portions producing a resultant hash. The resultant hash is transmitted to the second computer system for authentication of the application. | 2017-10-05 |
20170289124 | System And Method For Efficient Replication Of And Access To Application Specific Environments And Data - A peer-to-peer system and method for efficient replication of and access to application specific environments and their data that includes automatically accessing application specific metadata to determine the location of application specific data and then replicating or providing access to the application metadata and data to a set of peers. A system and method for efficient replication of and access to application specific environments and data that includes automatically accessing a source application's metadata to determine the location of the source application's data and then automatically transferring and transferring the application metadata and data to a target application's metadata and data. | 2017-10-05 |
20170289125 | SHARING ACCOUNT INFORMATION AMONG MULTIPLE USERS - Disclosed are various embodiments for sharing network site account information among multiple users. Account information for a network site account is received from a first user at a first client. An indication is received from the first user that the account information is to be shared with a second user. The second user is authenticated at a second client. The account information is transferred to the second client. | 2017-10-05 |
20170289126 | Method, apparatus and system for implementing third party application in micro-blogging service - A method for implementing a third party application in a micro-blogging service is provided, in which upon reception of a first request for presenting a media message provided by a third party media source, a micro-blog server obtains login information of a user and configuration information corresponding to the third party media source, converts the login information to authorization information, generates a second request for presenting the media message provided by the third party media source, and transmits the second request to a third party application server; the third party application server extracts the media message corresponding to the second request from the third party media source through a micro-blog open platform, by using the authorization information of the user and the configuration information corresponding to the third party media source, and presents it for the user. | 2017-10-05 |
20170289127 | SMART DATA CARDS THAT ENABLE THE PERFORMANCE OF VARIOUS FUNCTIONS UPON ACTIVATION/AUTHENTICATION BY A USER'S FINGERPRINT, ONCARD PIN NUMBER ENTRY, AND/OR BY FACIAL RECOGNITION OF THE USER, OR BY FACIAL RECOGNITION OF A USER ALONE, INCLUDING AN AUTOMATED CHANGING SECURITY NUMBER THAT IS DISPLAYED ON A SCREEN ON A CARD'S SURFACE FOLLOWING AN AUTHENTICATED BIOMETRIC MATCH - A smart card such as an EMV card that connects, wirelessly or by contact, to a reader or other device, and permits the flow of information/data to/from the card when connected thereto, after fingerprint scanning authorization/user verification system; or image scanning authorization/user verification, or PIN number entry from an on-card pad, or both, including a display screen for displaying changing/static user identification data stored thereon/therein alter such authorization/verification. | 2017-10-05 |
20170289128 | ASSOCIATING USER ACCOUNTS WITH ENTERPRISE WORKSPACES - Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operation of at least a portion of the computing device. A management component creates a user account with a distributor of the operating system based on an email address. The management component requests an authentication service to authenticate a user. The user account is associated with an enterprise workspace of the computing device. | 2017-10-05 |
20170289129 | System, Apparatus And Method For Securely Protecting A Processor In Transit - In one embodiment, a processor includes: a first die including at least one processor core to execute instructions and a non-volatile storage to store an identifier to be provisioned into the processor during manufacture; a second die to couple to the first die, the second die including a wireless circuit and a second non-volatile storage; and a wireless interface to couple to the second die to enable wireless communication with a wireless device. The processor may be disabled if the identifier is not stored in the second non-volatile storage. Other embodiments are described and claimed. | 2017-10-05 |
20170289130 | APPARATUS AND METHOD FOR AUTHENTICATION BASED ON COGNITIVE INFORMATION - An authentication apparatus and method based on cognitive information. The authentication apparatus based on cognitive information includes an authentication request reception unit for receiving a request to authenticate an authentication target, a behavioral and contextual information collection unit for collecting behavioral and contextual information corresponding to the authentication target, a cognitive information extraction unit for extracting cognitive information corresponding to the request from previously stored big data, and an authentication processing unit for authenticating the authentication target in consideration of the behavioral and contextual information based on the extracted cognitive information. | 2017-10-05 |