40th week of 2021 patent applcation highlights part 70 |
Patent application number | Title | Published |
20210314141 | BYZANTINE FAULT TOLERANCE ALGORITHM-BASED BLOCKCHAIN CONSENSUS METHOD, APPARATUS, AND SYSTEM - A blockchain consensus method includes receiving, by a second consensus node of a blockchain, a consensus proposal initiated by a first consensus node of the blockchain, wherein the consensus proposal comprises a first proposal digest, and the first proposal digest is based on a transaction set that needs to be proposed and a first newest block hash maintained by the first consensus node; generating, by the second consensus node of the blockchain in response to the consensus proposal, a second proposal digest based on a second newest block hash maintained by the second consensus node and the transaction set; determining, by the second consensus node, whether the first proposal digest matches the second proposal digest. | 2021-10-07 |
20210314142 | METHODS FOR THRESHOLD PASSWORD-HARDENED ENCRYPTION AND DECRYPTION - A Computer-implemented method is provided for encrypting data by a server in cooperation with a predetermined number of rate limiters. The method includes receiving, by the server, a user identification, and a password to be encrypted and creating a secret message, the secret message being a key suitable for use with a symmetric key encryption/decryption scheme. The method further includes generating, on the basis of a predetermined interactive cryptographic encryption protocol, a ciphertext which encrypts the user password, and the secret message using secret keys of the rate limiters of the subset, where the threshold is smaller than or equal to the number of rate limiters, and the protocol is adapted such that the server needs only to interact with a subset of the predetermined size of the number of rate limiters for decryption of the ciphertext to recover the secret message. | 2021-10-07 |
20210314143 | ENCRYPTION FOR BLOCKCHAIN CRYPTOCURRENCY TRANSACTIONS AND USES IN CONJUNCTION WITH CARBON CREDITS - Encryption for blockchain cryptocurrency. In some embodiments, the encryption is implemented using one-time pad techniques. The key for the one-time pad may be derived from a true random sequence. Data messages are encrypted and decrypted using the one-time pad key. Also disclosed is an Internet-of-Things system that comprises an Internet-connected device that has a sensor that generates a stream measurement data. This stream of measurement data may be the basis for the true random sequence used for deriving the one-time pad key. Also disclosed is a method of trading carbon credits using a cryptocurrency market platform. The blockchain platform may use a proof-of-elapsed time (PoET) protocol for energy-use savings during mining. | 2021-10-07 |
20210314144 | MODIFIABLE CLIENT-SIDE ENCRYPTED DATA IN THE CLOUD - Particular embodiments described herein provide for a system that can be configured to receive a notification that a client device is requesting, to modify original data associated with an online application, wherein the original data is stored in encrypted format in a cloud; decrypt the original data using a first client encryption key; store the decrypted data in a location accessible by the online application; enable editing capability of the decrypted data; receive a notification that the client device is finished modifying the data in decrypted format; determine whether the original data in decrypted format was modified; encrypt, based on a determination that the original data was modified, the modified data using a second client encryption key; and upload the modified data in encrypted format to the cloud. | 2021-10-07 |
20210314145 | SECURE JOINING SYSTEM, METHOD, SECURE COMPUTING APPARATUS AND PROGRAM - A secure joining system is a secure joining system including a plurality of secure computing apparatuses. The plurality of secure computing apparatuses include a first vector joining unit, a first permutation calculation unit, a first vector generation unit, a second vector joining unit, a first permutation application unit, a second vector generation unit, a first inverse permutation application unit, a first vector extraction unit, a second permutation application unit, a third vector generation unit, a second inverse permutation application unit, a second vector extraction unit, a modified second table generation unit, a third permutation application unit, a fourth vector generation unit, a shifting unit, a third inverse permutation application unit, a bit inversion unit, a third vector extraction unit, a modified first table generation unit, a first table joining unit, and a first table formatting unit. | 2021-10-07 |
20210314146 | KEY EXCHANGE METHOD AND KEY EXCHANGE SYSTEM - Plurality of users share a common key while permitting change of members sharing the common key and computational complexity required for key exchange is reduced. R | 2021-10-07 |
20210314147 | KEY DATA PROCESSING - A parent cryptographic key associated with a blockchain object is obtained. A number of parties (N) to share control over the blockchain object is obtained. N child cryptographic keys are generated based on the parent cryptographic key by applying a predetermined algorithm to the parent cryptographic key, wherein N is an integer greater than or equal to 2, and wherein the N child cryptographic keys are collectively configured to enable reconstruction of the parent cryptographic key. | 2021-10-07 |
20210314148 | ELECTRONIC SUBSCRIBER IDENTITY MODULE TRANSFER CREDENTIAL WRAPPING - Embodiments described herein relate to credential wrapping for secure transfer of electronic SIMs (eSIMs) between wireless devices. Transfer of an eSIM from a source device to a target device includes re-encryption of sensitive eSIM data, e.g., eSIM encryption keys, financial transaction credentials, transit authority credentials, and the like, using new encryption keys that include ephemeral elements applicable to a single, particular transfer session between the source device and the target device. The sensitive eSIM data encrypted with a symmetric key (K | 2021-10-07 |
20210314149 | SERVICE-TO-SERVICE STRONG AUTHENTICATION - A request is received from a computing device for substitute data, with access to the substitute data being contingent upon successful multi-factor authentication of the first service. Signature data based on the request is generated using a first key of public-private key pair. Credential proof and the signature is provided to a second service, which verifies the credential proof as a first factor of the multi-factor authentication and verifies, using a second key, the signature as a second factor of the multi-factor authentication. The substitute data is obtained as a result of authentication by the second service. The computing device is caused, by providing the substitute data to the computing device, to input the substitute data into the interface in place of data associated with the first entity. | 2021-10-07 |
20210314150 | CRYPTOGRAPHIC KEY MANAGEMENT BASED ON IDENTITY INFORMATION - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing cryptographic keys based on user identity information. One of the methods includes receiving a request to store identity information and a user key pair to a memory on a chip, the request being digitally signed with a digital signature, the identity information uniquely identifying the user, and the user key pair being assigned to the user; determining that the digital signature is authentic based on a public key pre-stored in the memory; encrypting the identity information and the user key pair; and storing the identity information and the user key pair to the memory. | 2021-10-07 |
20210314151 | In-Vehicle Key Generation Method, a Vehicle using the Method and a Computer-Readable Storage Medium - A vehicle-mounted key-generation method is for a vehicle including electronic control units (ECUs) that communicate with each other via a vehicle-mounted network. At least one ECU includes a key generation module and a key transmission module, and each of the other ECUs includes a key receiving module and a key invoking module. The method includes receiving, through at least one ECU, a secure access request sent from an authorized user through a secure access device, and, after confirming to accept the secure access request from the secure access device, waiting for the secure access device to send a key generation request. The method further includes, after receiving the key generation request, generating a key through the to key generation module, using the key transmission module to send the key to other ECUs via the vehicle-mounted network, and receiving the key through the key receiving module in other ECUs. | 2021-10-07 |
20210314152 | DETERMINISTIC VERIFICATION OF DIGITAL IDENTITY DOCUMENTS - A method, computer program product, and system obtaining and identity verification request that include a specification for one or more electronic identity documents including one or more requested document types to fulfill the identity verification request. One or more processors locate at least one electronic identity document including each of the requested document types. Each electronic identity document in the repository includes machine readable metadata that includes the document type of that document. The one or more processors per form a deterministic match to select one electronic identity document including each of the one or more requested document types to utilize in formulating a response to the identity verification request and formulate a response to the identity verification request, based on the selected electronic identity document(s). | 2021-10-07 |
20210314153 | ZERO-KNOWLEDGE KEY ESCROW - Disclosed are various embodiments for implementing a key escrow system without disclosure of a client's encryption key to third parties. An encryption key is split into a plurality of key segments pursuant to a shared secret protocol. A plurality of peer client devices are then identified. Each peer client device in the plurality of peer client devices is then verified and the respective one of the plurality of key segments are sent to a respective one of the plurality of peer client devices. A response is then received from each respective one of the plurality of peer client devices, the response confirming receipt of the respective one of the plurality of key segments. A list identifying the plurality of peer client devices is finally provided to a key escrow service, the list comprising key-value pairs that identify each respective one of the plurality of peer client devices and the respective one of the plurality of key segments. | 2021-10-07 |
20210314154 | APPARATUS AND METHOD FOR DYNAMIC SHARDING OF CONCURRENT BLOCKCHAINS - An apparatus, being a network entity of a computer network is provided. The apparatus comprises a communication module to receive and to send information on a blockchain. Moreover, the apparatus comprises a query module to obtain from a master chain of the blockchain a rule for a first shard and a second shard of the blockchain with respect to a smart contract. Furthermore, the query module is to obtain information on the smart contract from the first shard or from the second shard depending on the rule. Moreover, the query module is to output the information on the smart contract. | 2021-10-07 |
20210314155 | TRUSTED LEDGER STAMPING - An example operation includes one or more of detecting, by a validation service node, an access of a block on a blockchain ledger, accessing, by the validation service node, a block validation stamp comprising meta-data signed by a trusted stamping authority (TSA) on the blockchain ledger, and validating the block based on the meta-data. | 2021-10-07 |
20210314156 | AUTHENTICATION METHOD, CONTENT DELIVERY NETWORK CDN, AND CONTENT SERVER - An authentication method, a content delivery network CDN, and a content server are provided. The method includes: receiving, by a CDN, a content access request that is sent by a client and that carries a first authentication credential and a second authentication credential, where the first authentication credential is generated by a content server based on a first key allocated by the CDN, and the second authentication credential is generated by the content server based on a second key allocated by a cloud server; performing, by the CDN, authentication on the first authentication credential by using the first key; and performing, by the cloud server, authentication on the second authentication credential by using the second key. In this manner, the CDN and the cloud storage server separately allocate different keys to the content server. | 2021-10-07 |
20210314157 | CENTRALIZED CREDENTIAL ISSUANCE AND ROTATION - Embodiments relate to a system that may include a third-party server and a domain name system (DNS). The third-party server may be configured to receive a request for a credential from a named entity device for the named entity device to communicate with an application programming interface (API). The API may be associated with a domain. The third-party server may obtain the credential from the API. The third-party server may encrypt the credential with a public key corresponding to the named entity device to generate an encrypted credential. The DNS may be configured to receive the encrypted credential and publish a DNS record at a namespace of the DNS, the DNS record containing the encrypted credential for the named entity device to retrieve the credential. The named entity device may decrypt the encrypted credential by the private key stored at the device. | 2021-10-07 |
20210314158 | ALGEBRAIC PROOF-OF-WORK ALGORITHM FOR BLOCKCHAINS - An algebraic proof-of-work algorithm is provided that can be used as part of the consensus algorithm used by cryptocurrencies such as Bitcoin. Instead of solving blocks using a hash puzzle, the present algorithm uses an algebraic puzzle such as a lattice-based puzzle based on the shortest vector problem and/or the knapsack problem. A cryptocurrency using the proposed proof-of-work algorithm has only a small quantum advantage when compared with existing proof-of-work algorithms. | 2021-10-07 |
20210314159 | ENHANCED VEHICLE OPERATION - A computer includes a processor and a memory, the memory storing instructions executable by the processor to collect a digital image that includes a plurality of pixels with a first sensor, input a reference data string, a key data string, and a set of collected data from a second sensor into a permutation generator that outputs a watermark data string, and embed the watermark data string in the digital image at specified pixels in the plurality of pixels. | 2021-10-07 |
20210314160 | METHOD FOR SECURING THE RENDEZVOUS CONNECTION IN A CLOUD SERVICE USING ROUTING TOKENS - Systems and methods for establishing a secure connection are described. A server receives a plurality of routing tokens for establishing a service connection between a service node and the server along a network path through a plurality of network devices. The routing tokens can be validated by a corresponding network device. The server transmits a packet including the routing tokens to a first network device. The first network device validates a first routing token associated therewith, then directs the packet along the network path to a second network device, and so forth, until each of the network device receives and validates their routing token. The server establishes a cryptographic context between the service node and server for establishing a secure channel between the service node and the server. The server transmits a service node routing token to the service node via the secure channel for validation. | 2021-10-07 |
20210314161 | REAL-TIME ATTESTATION OF CRYPTOPROCESSORS LACKING TIMERS AND COUNTERS - The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor. | 2021-10-07 |
20210314162 | CONSENSUS METHODS AND SYSTEMS IN CONSORTIUM BLOCKCHAIN - Disclosed herein are consensus methods, systems, and media. One of the methods includes: splitting, by a primary node in a consensus network, transactions into data fragments, wherein a number of data fragments equals that of the nodes; constructing a Merkle tree based on the data fragments; constructing first messages, wherein each first message comprises a data fragment, a Merkle tree path, and a root hash of the Merkle tree, and wherein each first message corresponds to a respective data fragment and a respective node; sending each first message to the respective node; saving one first message to the primary node; constructing, a second message based on the first message corresponding to the primary node; and broadcasting the second message to the consensus network; receiving other second messages broadcasted by other nodes; and determining, whether a consensus on the transactions is reached based on the other second messages. | 2021-10-07 |
20210314163 | SYSTEM AND METHOD FOR MAINTAINING USAGE RECORDS IN A SHARED COMPUTING ENVIRONMENT - A method for maintaining a log of events in a shared computing environment is provided. One example of the disclosed method includes receiving one or more data streams from the shared computing environment that include transactions conducted in the shared computing environment by a first entity and a second entity that is different from the first entity. The method further includes creating a first blockchain entry for a first transaction conducted in the shared computing environment for the first entity, creating a second blockchain entry for a second transaction conducted in the shared computing environment for the second entity, where the second blockchain entry includes a signature that points to the first blockchain entry, and then causing the first and second blockchain entries to be written to a common blockchain data structure in a database that is made accessible to both the first entity and the second entity. | 2021-10-07 |
20210314164 | BLOCK CONTENT EDITING METHODS AND APPARATUSES - Disclosed are methods, systems, and media for block content editing in blockchains. One method includes: receiving a transaction to edit original content m of a block of a blockchain to target content m′, wherein a parent hash of the block is recorded in another block of the blockchain and generated based on the original content m, a public key H, and an original random number r; generating a private key X based on private keys x1 to xn; determining a target random number r′ based on the original content m, the target block m′, the original random number r, and the private key X, wherein a hash value generated using the target content m′, the public key H, and the target random number r′ is the same as the parent hash; and updating the original content m to the target content m′. | 2021-10-07 |
20210314165 | DATA CENTER SECURITY MECHANISM - A system to facilitate data center security is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a plurality of resources that are to be provided to process a workload, receive one or more characteristics associated with each of the plurality of resources, generate a resource signature for each of the plurality of resources using the one or more characteristics associated with each resource and generate an aggregated signature using the resource signatures generated for each of the plurality of resources. | 2021-10-07 |
20210314166 | SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURES - Systems and methods are provided for use in appending log entries to a data structure. One exemplary method includes receiving, at a communication device, a log entry from a terminal and signing the log entry with a private key of a key pair specific to the communication device. The method also includes transmitting the signed log entry to an identity provider (IDP) and receiving, by the communication device, from the IDP, a signed, encrypted log entry. The method further includes verifying, by the communication device, a signature of the signed, encrypted log entry based on a public key associated with a key pair specific to the IDP and then appending the encrypted log entry to a digital identity included in the communication device. | 2021-10-07 |
20210314167 | METHODS AND SYSTEMS FOR CONSENSUS IN BLOCKCHAINS - This specification discloses a method and a system. The method includes: obtaining a Merkle root of one or more proposals initiated by one or more nodes associated with a blockchain; signing the Merkle root of the one or more proposals to obtain a digital signature of the one or more proposals; transmitting the digital signature of the one or more proposals to one or more nodes associated with the blockchain; receiving one or more digital signatures of the one or more proposals from one or more nodes associated with the blockchain respectively; determining that a quantity of the received one or more digital signatures is at least 2 f+1, wherein f is a maximum quantity of abnormal nodes permitted by the blockchain; and generating a proof of consensus for the one or more proposals based on the received one or more digital signatures. | 2021-10-07 |
20210314168 | TECHNOLOGIES FOR PROVIDING CERTIFIED TELEMETRY DATA INDICATIVE OF RESOURCES UTILIZATIONS - Technologies for providing certified telemetry data indicative of resource utilizations include a device with circuitry configured to obtain telemetry data indicative of a utilization of one or more device resources over a time period. The circuitry is additionally configured to validate the obtained telemetry data with a private key associated with the present device. Further, the circuitry is configured to send the validated telemetry data to a telemetry service for analysis | 2021-10-07 |
20210314169 | DIGITAL CERTIFICATE INVALIDATION AND VERIFICATION METHOD AND DEVICE - Methods, systems, and devices, including computer programs encoded on computer storage media, for verifying a digital certificate are provided. One of the methods includes: determining that a first digital certificate is a to-be-invalidated digital certificate; obtaining a first certificate identification of the first digital certificate; sending a recording request to a first node in a blockchain network to cause the first node to record the first certificate identification in a blockchain; obtaining a second certificate identification of a second digital certificate; sending a search request to a second node in the blockchain network to cause the second node to determine whether the second certificate identification is recorded in the blockchain; receiving a search result showing that the second certificate is recorded in the blockchain; and determining that the second digital certificate is invalid. The recording request comprises the first certificate identification, and the search request comprises the second certificate identification. | 2021-10-07 |
20210314170 | METHOD AND DEVICE FOR MANAGING DIGITAL CERTIFICATE - A method and device for managing a digital certificate are provided. A digital certificate requesting device negotiates with a digital certificate issuing device by using an acquired authorization code, to establish a security data channel and generate a security key, and messages can be encrypted with the generated data communication key during a process of message interaction between the digital certificate requesting device and the digital certificate issuing device, thereby effectively increasing the security in data transmission. The method and device are applicable for automatically requesting for, querying, updating, revoking a digital certificate and acquiring a digital certificate revocation list in various scenarios | 2021-10-07 |
20210314171 | SYSTEM AND METHOD FOR ESTABLISHING DYNAMIC TRUST CREDENTIALS FOR NETWORK FUNCTIONS - Systems and methods leverage trust anchors to generate tokens which can then be used by network functions (NFs). A virtualization infrastructure manager (VIM) for a virtualized platform receives a NF software package and a certificate request token (CRT) from a management function. The NF is a virtual NF, a containerized NF, or another virtual entity (xNF) to be deployed. The CRT is digitally signed by the management function and includes a network address of a trust anchor platform and a NF profile. The VIM deploys the NF and provides the CRT to the NF. The NF obtains from the CRT the network address of the trust anchor platform, generates a certificate signing request (CSR) for a digital certificate, and submits the CSR and the CRT to the trust anchor platform. The NF receives a digital certificate from the trust anchor platform based on validation of both the CSR and CRT. | 2021-10-07 |
20210314172 | VALIDATING INTEGRITY OF PRIVATE KEYS FOR ON A DATA COMMUNICATIONS NETWORK USING BLOCKCHAIN KEY REGISTRY - Block chain registries track the handling of private keys for validating the integrity of private keys for SSL certificates and other forms of private keys presented during transaction requests. | 2021-10-07 |
20210314173 | STORAGE SYSTEM COMMUNICATION - A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an authority initiating an I/O command, wherein the token is specific to assignment of the authority and a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable. | 2021-10-07 |
20210314174 | SYSTEM AND METHOD FOR VERIFYING AN IDENTITY OF A USER USING A CRYPTOGRAPHIC CHALLENGE BASED ON A CRYPTOGRAPHIC OPERATION - A processor-implemented system and method for enabling a relying party device associated with a relying party to verify an identity of a user. The method includes the steps of (i) generating, using a cryptographic processor on a user device associated with the user, a first set of credentials including a public-private key pair associated with the user, (ii) receiving at least one cryptographic challenge from the relying party device associated with the relying party, (iii) verifying at least one of a biometric or a PIN code, (iv) responding to the at least one cryptographic challenge by performing the at least one cryptographic operation on the cryptographic challenge using the user private key to form a result of the at least one cryptographic operation and (v) transmitting the result of the at least one cryptographic operation as a cryptographic challenge response to the relying party device. | 2021-10-07 |
20210314175 | PHYSICALLY UNCLONABLE FUNCTION (PUF) GENERATION - A PUF generator includes a difference generator circuit with first and second transistors having a first predetermined VT. The difference generator circuit is configured to provide a first output signal for generating a PUF signature based on respective turn on times of the first and second transistors. An amplifier includes a plurality of transistors having a second predetermined VT. The amplifier is configured to receive the first output signal and output the PUF signature. | 2021-10-07 |
20210314176 | FAST CRYPTOGRAPHIC KEY GENERATION FROM MEMRISTOR-BASED PHYSICAL UNCLONABLE COMPUTED FUNCTIONS - Systems and methods for symmetric encryption between a client and a server device include a client device having an array of physical unclonable function devices and a server device storing information sufficient to reconstruct responses of the devices to an applied stimulus such as varying levels of electrical current. The server shares a challenge with the client, which measures characteristics such as electrical resistances for a subset of the devices according to instructions extracted from the challenge. The client measures a corresponding reference device in the array for each device of the subset and assigns a value determined based on a comparison of each device with the corresponding reference device to generate a cryptographic key. The server calculates an expected response of the client to the challenge according to a model of the devices in the array, and uses the calculated response to generate the key independently. | 2021-10-07 |
20210314177 | DISTINCT CHIP IDENTIFIER SEQUENCE UTILIZING UNCLONABLE CHARACTERISTICS OF RESISTIVE MEMORY ON A CHIP - Stochastic or near-stochastic physical characteristics of resistive switching devices are utilized for generating data distinct to those resistive switching devices. The distinct data can be utilized for applications related to electronic identification. As one example, data generated from physical characteristics of resistive switching devices on a semiconductor chip can be utilized to form a distinct identifier sequence for that semiconductor chip, utilized for verification applications for communications with the semiconductor chip or utilized for generating cryptographic keys or the like for cryptographic applications. | 2021-10-07 |
20210314178 | TEMPERATURE SENSING PHYSICAL UNCLONABLE FUNCTION (PUF) AUTHENTICATION SYSTEM - A temperature sensing security token may include a first resistor having a first side connected to a voltage source, a second resistor having a first side connected to the voltage source, an analog comparator having a first input connected to a second side of the first resistor and a second input connected to a second side of the second resistor and an output that represents at least one bit of a key, and an analog to digital converter having an input connected to the second side of the first resistor wherein an output of said analog to digital converter is related to temperature by a temperature coefficient of resistivity of the first resistor. The first resistor and the second resistor may have the same nominal resistance. The first resistor, the second resistor and the analog to digital comparator may be encased in the same package. The package may be configured to inhibit inspection and discovery of components contained in said package. A processor may be connected to a key register and to a temperature table wherein said processor may be configured to store the key bits in the key register and is configured to store data corresponding to temperature. The processor may be configured to store a time stamp associated with an entry in the temperature table. A communications interface may be connected to the processor. | 2021-10-07 |
20210314179 | METHODS AND CONSENSUS NODES FOR BLOCK GENERATION - A method and a consensus node for block generation are provided. The method includes: initiating a target consensus proposal carrying a first timestamp provided by the first consensus node; receiving the target consensus proposal; determining a second timestamp based on a time that the target consensus proposal is received; verifying the first timestamp based on a third timestamp of a local ending block of the second consensus node and the second timestamp; if successfully verifying the first timestamp, executing consensus logic on the target consensus proposal to reach a consensus with the first consensus node regarding the target consensus proposal; and generating a new block recording data of the target consensus proposal, wherein the generated new block comprises a fourth timestamp that is determined based on at least the first timestamp and is not earlier than timestamps of existing local blocks the first consensus node and the second consensus node. | 2021-10-07 |
20210314180 | Port Adaptation Method and Apparatus - A network device probes whether a first port of the network device is coupled to power sourcing equipment, and when probing that the first port is coupled to power sourcing equipment, maintain or change the first port to a powered state, and lock the first port as a power drawing port, or when probing that the first port is decoupled to power sourcing equipment, and the network device has a power supply for supplying power, change the first port to a powering state. In this way, the first port may adaptively serve as a power drawing port or a power sourcing port according to a coupled device such that manually distinguished a port during device interconnection is not necessary and a coupling error rate is reduced. | 2021-10-07 |
20210314181 | SYSTEM AND METHOD FOR ADATPTING A POLARITY OF A DATA SIGNAL - The present disclosure relates to a polarity correction circuit. The polarity correction circuit may include a detection module and a switching module. The detection module may be configured to detect a polarity of a DC voltage transmitted to a powered device and generate one or more control signals based on the polarity of the DC voltage. The switching module may be configured to receive the one or more control signals and a data signal transmitted from the powered device. The switching module may be further configured to adapt a polarity of the data signal based on the one or more control signals such that the polarity of the data signal is accordant with the polarity of the DC voltage. | 2021-10-07 |
20210314182 | MULTICAST ROUTING IN A LOGICAL ROUTER HAVING SEPARATED NORTH/SOUTH AND EAST/WEST PACKET HANDLERS - The technology disclosed herein enables multicast network traffic to pass an RPF check in a logical router having separated packet handlers. In a particular embodiment, a method includes, in a north/south packet handler of a first logical router, receiving first network traffic from an east/west packet handler of the logical router. The first network traffic is multicast network traffic and the logical router is a first hop router for the first network traffic from a source of the first network traffic. The method further includes identifying an entry for the source in unicast routing information for unicast network traffic. Identifying the entry indicates that the first network traffic passes a reverse path forwarding (RPF) check. In response to the first network traffic passing the RPF check, the method includes transferring the first network traffic from the north/south packet handler to a next hop for the first network traffic indicated by first multicast routing information. | 2021-10-07 |
20210314183 | INTERNET OF THINGS DEVICE CONNECTIVITY REAL TIME NOTIFICATION - A device may include a memory storing instructions and processor configured to execute the instructions to maintain an Internet of Things (IoT) device database that stores, for an IoT device in the IoT device database, an application server device list that includes one or more application server devices that are to be notified when the IoT device is determined to be in an awake state. The processor may be further configured to receive a first indication from a first application server device that the IoT device is in an awake state; access the IoT device database to identify a second application server device associated with the IoT device; and send a second indication to the second application server device that the IoT device is in the awake state based on the received first indication from the first application server device. | 2021-10-07 |
20210314184 | METHODS AND SYSTEMS FOR POWER MANAGEMENT IN COMMUNICATION DEVICES BASED ON CABLE CONNECTIVITY - A communication device includes a communication port including a first connector and a signal path communicatively coupled between device components and the connector and a power management module configured to determine whether an external cable is mated to the first connector and to transition the communication device to a sleep mode if it is determined that an external cable is not mated to the first connector. | 2021-10-07 |
20210314185 | PRIORITY-ARBITRATED ACCESS TO A SET OF ONE OR MORE COMPUTATIONAL ENGINES - The present invention discloses a method for managing priority-arbitrated access to a set of one or more computational engines of a physical computing device. The method includes providing a multiplexer module and a network bus in the physical computing device, wherein the multiplexer module is connected to the network bus. The method further includes receiving, by the multiplexer module, a first data processing request from a driver and inferring, by the multiplexer module, a first priority class from the first data processing request according to at least one property of the first data processing request. The method further includes manipulating, by the multiplexer module, a priority according to which the physical computing device handles data associated with the first data processing request in relation to data associated with other data processing requests, wherein the priority is determined by the first priority class. | 2021-10-07 |
20210314186 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND PROGRAM - A communication system includes master and slave devices connectable to each other and forming a ring communication path. The master device outputs management data to manage communication along the ring communication path in a CW and CCW directions and receives the management data in the CW direction and in the CCW direction, and outputs, in the CW direction and in the CCW direction, control data to be used by the slave device to control equipment. The slave device acquires a history of transmission of the management data output from the master device and received by the slave device in the CW direction and in the CCW direction, and processes, based on the acquired history, one of the control data output from the master device in the CW direction and the control data output from the master device in the CCW direction to control the equipment. | 2021-10-07 |
20210314187 | DYNAMIC CELLULAR CONNECTIVITY BETWEEN THE HYPERVISORS AND VIRTUAL MACHINES - Systems, methods, and computer-readable media for requesting a cellular IP address by initiating a call with a modem, establishing data packet network connectivity with the cellular IP address, assigning the cellular IP address to a virtual L2-bridge interface, wherein the virtual L2-bridge interface includes a MAC address, mapping a MAC address of a virtual machine with the MAC address of the virtual L2-bridge interface, detecting a change in the cellular IP address, and updating the virtual L2-bridge interface with a different cellular IP address while maintaining the data packet network connectivity. | 2021-10-07 |
20210314188 | Dead Peer Detection Across Split Control Plane Nodes and Data Plane Nodes of a Tunneled Communication Session - Techniques for detecting inactive peers of a tunneled communication session, while allowing for a scalable tunneled protocol that includes split control plane nodes and data plane nodes are described herein. A method according to a technique described herein may include establishing a communication session between a first node and a second node in a network such that control plane traffic of the communication session flows through one or more control nodes and data plane traffic of the communication session flows through one or more data nodes different than the one or more control nodes. The method may also include receiving, at a control node, an indication from a data node that a probe message is to be generated. The probe message may be configured to determine data plane connectivity in the communication session. Additionally, the control node may generate the probe message and send it to the first node. | 2021-10-07 |
20210314189 | VIRTUAL NETWORK - A virtual network includes a virtual entry device, a virtual exit device, and a communication channel that couples the virtual entry device to the virtual exit device in a web that lies between and interconnects a local router/switch with a remote router/switch device, where the virtual entry device and the virtual exit device have static forwarding tables which provide substantially improved performance. | 2021-10-07 |
20210314190 | VIRTUAL NETWORK CUSTOM RESOURCE DEFINITION - Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files. | 2021-10-07 |
20210314191 | METHOD OF FORMING A VIRTUAL NETWORK - A method of forming a virtual network includes forming an arrangement of virtual fibers from physical fiber optic cables that interconnect virtual entry devices, virtual forwarding devices, and virtual exit devices together. The virtual entry devices combine data and frames to allow a number of sources with data and frame rates that are less than a predetermined frame rate of a physical port to be output from the physical port. | 2021-10-07 |
20210314192 | ARCHITECTURE FOR STRETCHING LOGICAL SWITCHES BETWEEN MULTIPLE DATACENTERS - Some embodiments provide a system for implementing a logical network that spans multiple datacenters. The system includes, at each of the datacenters, a set of host computers that execute (i) data compute nodes (DCNs) belonging to the logical network and (ii) managed forwarding elements (MFEs) that implement the logical network to process data messages for the DCNs executing on the host computers. The system also includes, at each of the datacenters, a set of computing devices implementing logical network gateways for logical forwarding elements (LFEs) of the logical network. The logical network gateways are connected to the logical network gateways for the LFEs at the other datacenters. The MFEs executing on the host computers in a first datacenter communicate with the MFEs executing on the host computers in a second datacenter via the logical network gateways of the first and second datacenters. | 2021-10-07 |
20210314193 | TUNNEL ENDPOINT GROUP RECORDS FOR INTER-DATACENTER TRAFFIC - Some embodiments provide a method for an edge computing device in a first datacenter that implements a logical network gateway for processing data traffic for a particular LFE between the first datacenter and multiple other datacenters. For each particular other datacenter, the method stores a record that maps logical network addresses for DCNs connected to the particular LFE and operating in the particular datacenter to a group of TEP addresses corresponding to logical network gateways that handle data traffic for the particular LFE between the particular datacenter and the other datacenters, including the first datacenter. Upon receiving a data message for the particular LFE from a host computer in the first datacenter, the method uses a destination address of the data message to identify one of the groups of TEP addresses. The method encapsulates the data message with one of the TEP addresses from the identified group of TEP addresses. | 2021-10-07 |
20210314194 | TRANSMISSION TECHNIQUES OVER DELAY-DOPPLER CHANNELS - Methods, systems, and devices for wireless communications are described. Generally, a transmitting device may send transmissions using a first numerology for a first type of user equipment (UE). The transmitting device may partition a stream of modulated data symbol tones into one or more contiguous subsets of modulated data symbol tones that result in a roughly frequency-flat channel for a second type of UE. The transmitting device may then perform precoding on individual subsets of the one or more contiguous subsets of modulated data symbol tones, and may insert a frequency-domain cyclic prefix, cyclic postfix, or guard interval after each precoded subset. Thus, the first type of UE may communicate using the first numerology and the second type of UE may communicate using the first numerology but with the frequency-domain cyclic prefixes to address doppler spread experienced by the second type of UE. | 2021-10-07 |
20210314195 | SOUNDING REFERENCE SIGNAL (SRS) TRANSMISSION FOR POSITIONING ON FLEXIBLE SYMBOLS - Sounding Reference Signal (SRS) transmission for positioning can be utilized on flexible symbols. Techniques disclosed for transmitting a reference signal for positioning comprise receiving, from a serving base station, a message comprising an indication to transmit a SRS on a set of symbols of an orthogonal frequency division multiplexing (OFDM) slot. Techniques may also comprise determining the SRS is to be used for positioning, and receiving, from the serving base station, downlink control information (DCI) having a slot format indicator (SFI) that designates a subset of the set of symbols as flexible. Techniques may also comprise transmitting the SRS on at least a portion of the subset. | 2021-10-07 |
20210314196 | SOUNDING-INTERVAL ADAPTATION USING LINK QUALITY - A method for sounding-interval adaptation using link quality for use in an apparatus is provided. The apparatus includes a sounding transceiver. The method includes the following steps: periodically transmitting a sounding packet to a beamformee through a downlink channel from the apparatus to the beamformee using a first sounding interval; in response to the sound transceiver successfully receiving a report packet from the beamformee to respond to the sounding packet, obtaining a current first channel profile from the report packet, and calculating a first LQ (link quality) value of the beamformee using the current first channel profile and a previous first channel profile; searching an LQ-mapping table using the first LQ value to obtain a second sounding interval; and adaptively adjusting the first sounding interval using the second sounding interval in response to a comparison result of the current first channel profile and the previous first channel profile. | 2021-10-07 |
20210314197 | DOPPLER SPREAD ESTIMATION BASED ON SUPERVISED LEARNING - A radio receiver includes a channel estimator processing circuit including: a feature extractor configured to extract one or more features from a received signal, the features including a channel correlation estimated based on a reference signal in a current slot, the estimated channel correlation indicating a rate of change of a wireless channel over time; and a Doppler spread estimator configured to estimate a Doppler spread of the wireless channel by supplying the features to one or more Doppler shift predictors trained on training data across a training signal-to-noise ratio (SNR) range and across a training Doppler shift range, each Doppler shift predictor being trained on a portion of the training data corresponding to a different portion of the training data. | 2021-10-07 |
20210314198 | PDP ESTIMATION FOR BUNDLE-BASED CHANNEL ESTIMATION VIA LEARNING APPROACH - A method of channel estimation for a precoded channel includes generating an initial frequency autocorrelation of the precoded channel for a current bundle of a received data transmission, generating an expanded frequency autocorrelation based on the initial frequency autocorrelation of the precoded channel, providing the expanded frequency autocorrelation to a neural network, generating, by the neural network, an estimated frequency autocorrelation of an unprecoded channel based on the expanded frequency autocorrelation, and generating an estimated power distribution profile of the unprecoded channel based on the estimated frequency autocorrelation. | 2021-10-07 |
20210314199 | METHOD AND SYSTEM FOR SELECTING IMPORTANT DELAY TAPS OF CHANNEL IMPULSE RESPONSE - A method and a system for selecting important delay taps of channel impulse response are provided, which belong to the field of adaptive transmission technology of wireless communication. The method performs local predictability estimation on all delay taps in the channel impulse response in wireless communication, thereby selecting the important delay taps in the channel impulse response. The disclosure uses recurrence rates of the delay taps to estimate local predictability of the delay taps. Noise delay taps are distinguished from the important delay taps through the local predictability of the delay taps, which improves the identification rate of the important delay taps of the channel impulse response in wireless communication. The disclosure may implement the selection of the important delay taps of the channel impulse response, which provides guarantee for implementing adaptive transmission and adaptive coding of wireless communication. | 2021-10-07 |
20210314200 | REDUCTION AND/OR MITIGATION OF SPATIAL EMISSIONS IN MULTI-ANTENNA WIRELESS COMMUNICATION SYSTEMS FOR ADVANCED NETWORKS - Facilitating the reduction and/or mitigation of spatial emissions in a multi antenna wireless communications system is provided herein. A system can comprise a memory that stores executable instructions that, when executed by a processor, facilitate performance of operations that can comprise applying a first signal linearization to a first output signal of a first power amplifier based on a determination that an adjacent channel leakage ratio of the first output signal of the first power amplifier fails to satisfy a defined output value. The operations can also comprise applying a second signal linearization to a group of output signals of a group of power amplifiers for a defined azimuth direction associated with channel frequencies of the group of output signals and applying a third signal linearization to the group of output signals for a defined elevation direction associated with the channel frequencies of the group of output signals. | 2021-10-07 |
20210314201 | COMMUNICATIONS METHOD AND APPARATUS - Communications method and apparatus include encoding information into a high-peakedness designed pulse train, converting the designed pulse train into a low-peakedness signal suitable for modulating a narrowband carrier to generate a physical communication signal with desired spectral and temporal properties, and generating and transmitting the physical communication signal. The communications method and apparatus also include receiving and demodulating the physical communication signal, and further converting the demodulated signal into a high-peakedness received pulse train corresponding to the designed pulse train, so that the encoded information may be extracted from the received pulse train. | 2021-10-07 |
20210314202 | RECEIVER AND INTERNAL TCM DECODER AND ASSOCIATED DECODING METHOD - The present invention discloses a Trellis-Coded-Modulation (TCM) decoder applied in a receiver, wherein the TCM decoder includes a branch metric unit, a path metric unit, a trace-back length selection circuit and a survival path management circuit. In operations of the TCM decoder, the branch metric unit is configured to receive multiple input codes to generate multiple sets of branch information. The path metric unit is configured to calculate multiple survival paths according to the multiple sets of branch information. The trace-back length selection circuit is configured to select a trace-back length, wherein the trace-back length is determined according to a signal quality of the receiver. The survival path management circuit is configured to return the multiple survival paths for the trace-back length in order to generate an output code. | 2021-10-07 |
20210314203 | COMPUTER-GENERATED SEQUENCE DESIGN FOR BINARY PHASE SHIFT KEYING MODULATION DATA - Methods, systems, and devices for wireless communications are described. A device (e.g., a base station or a user equipment (UE)) may identify a sequence length corresponding to a number of resource blocks, and select a modulation scheme based on the sequence length. The device may select, from a set of sequences associated with the modulation scheme, a sequence having the sequence length. In some examples, the set of sequences may include at least one of a set of time domain phase shift keying computer-generated sequences or a set of frequency domain phase shift keying computer-generated sequences. The device may generate a reference signal for a data transmission based on the sequence and transmit the reference signal within the number of resource blocks. | 2021-10-07 |
20210314204 | Polar Transmitter with FeedThrough Compensation - A circuit includes a polar transmitter to generate a radio frequency output from amplitude and phase signal components. The polar transmitter includes an amplifier to combine amplitude and phase signal components. A processor is coupled to the polar transmitter to provide the amplitude and phase signal components. The processor includes: a digital modulation circuit to generate a modulated digital signal including in-phase and quadrature signal components and a correction circuit to calculate and apply a complex digital offset for local oscillator feedthrough of the amplifier. The complex digital offset includes an in-phase offset correction factor and a quadrature offset correction factor. | 2021-10-07 |
20210314205 | LONG PACKET EXTENSION SIGNALING - This disclosure describes systems, methods, and devices related to long packet extension signaling. A device may calculate a residual value based on a duration of a packet extension, a transmit time, and a signal extension time. The device may generate one or more data symbols of a frame to be transmitted to a station device (STA). The device may compare the residual value to a duration of a first data symbol of the one or more data symbols. The device may include a packet extension dis-ambiguity value to the frame based on the comparison. The device may cause to send the frame to the STA. | 2021-10-07 |
20210314206 | TIME DOMAIN CHANNEL PREDICTION METHOD AND TIME DOMAIN CHANNEL PREDICTION SYSTEM FOR OFDM WIRELESS COMMUNICATION SYSTEM - Provided are a time domain channel prediction method and a time domain channel prediction system for an OFDM wireless communication system, which relate to the technical field of adaptive transmission in wireless communication. Frequency domain channel information is converted into time domain tap information by inverse Fourier transform. With respect to each time domain tap information, tap information prediction based on an extreme learning machine is realized, and finally predicted tap information is converted into frequency domain channel information by Fourier transform. To improve a generalization ability of a channel predictor, an output weight of the extreme learning machine is punished by a combination of l | 2021-10-07 |
20210314207 | DIMENSIONING APPROACH FOR DATA NETWORKS - A network dimensioning algorithm for networks, such as DOCSIS 3.1 networks are described. The present system and method combines per-profile traffic characteristics, available bandwidth, legacy coexistence, and detail overhead contributions of cyclic prefix, pilots, excluded subcarriers, FEC, and bit loading among other parameters. | 2021-10-07 |
20210314208 | COMMUNICATION METHOD, COMMUNICATIONS APPARATUS, AND COMMUNICATIONS SYSTEM - Embodiments of this application provide a communication method, a communications apparatus, and a communications system, to determine a physical resource block (PRB) grid when a center frequency of a synchronization signal (SS) is inconsistent with a center frequency of a carrier. The method includes: receiving, by a terminal, an SS from a network device; determining, by the terminal, a first PRB grid based on the SS; receiving, by the terminal, first indication information from the network device, where the first indication information is used to indicate a first frequency offset between the first PRB grid and a second PRB grid; and determining, by the terminal, the second PRB grid based on the first PRB grid and the first frequency offset. | 2021-10-07 |
20210314209 | TRANSMITTING APPARATUS AND MAPPING METHOD THEREOF - A transmitting apparatus is disclosed. The transmitting apparatus includes an encoder to perform channel encoding with respect to bits and generate a codeword, an interleaver to interleave the codeword, and a modulator to map the interleaved codeword onto a non-uniform constellation according to a modulation scheme, and the constellation may include constellation points defined based on various tables according to the modulation scheme. | 2021-10-07 |
20210314210 | SYSTEM AND METHOD FOR DIGITAL MEMORIZED PREDISTORTION FOR WIRELESS COMMUNICATION - A power amplifier system includes an input operable to receive an original value that reflects information to be communicated and an address data former operable to generate a digital lookup table key. The power amplifier system also includes a predistortion lookup table coupled to the address data former and a power amplifier having an output and coupled to the predistortion lookup table. The power amplifier system further includes a feedback loop providing a signal associated with the output of the power amplifier to the predistortion lookup table and a switch disposed in the feedback loop and operable to disconnect the predistortion lookup table from the output of the power amplifier. | 2021-10-07 |
20210314211 | THIRD GENERATION PARTNERSHIP PROJECT (3GPP) PLUG AND PLAY (PNP) OPERATION IN A HYBRID OPEN RADIO ACCESS NETWORK (O-RAN) ENVIRONMENT - Presented herein are techniques to facilitate Third (3rd) Generation Partnership Project (3GPP) Plug and Play (PnP) operation in a hybrid Open Radio Access Network (O-RAN) architecture. In one example, a method is provided that may include establishing a first network configuration session between a first network entity and a second network entity using first network configuration session triggers, wherein the second network entity is identified in a list of known network entities; repeatedly transmitting second network configuration session triggers to establish a second network configuration session between the first network entity and a third network entity not identified in the list of known network entities; and upon establishing the second network configuration session between the first network entity and the third network entity not identified in the list of known network entities, stopping the transmitting of the second network configuration session triggers. | 2021-10-07 |
20210314212 | NETWORK MANAGEMENT SYSTEM FOR FEDERATED MULTI-SITE LOGICAL NETWORK - Some embodiments provide a network management system for managing a logical network that spans multiple physical sites. The network management system includes a global network manager for receiving global logical network configuration data for the multiple physical sites. The network management system includes, at each of the physical sites, (i) a local network manager for receiving a logical network configuration for the physical site from the global network manager and (ii) a set of central controllers for distributing logical network configuration data to computing devices that implement the logical network at the physical site. | 2021-10-07 |
20210314213 | METHOD AND CONTROL SYSTEM FOR MONITORING PLURALITY OF EQUIPMENT IN SNMP BASED NETWORK - The present invention discloses a method and control system for monitoring plurality of equipment in industrial plant connected over SNMP based network. Each of plurality of equipment is associated with a server which is communicatively connected with client. One or more equipment which are capable of reporting monitoring objects are identified using a configuration file. Further, polling for monitoring objects based on capability data associated with one or more equipment is performed. By proposed invention, efficient and secure configuration of plurality of equipment in SNMP based network may be achieved. Also, efficient management of network traffic may be performed. Unauthorized extraction of monitoring objects is reduced in the network. | 2021-10-07 |
20210314214 | IPSEC Acceleration Method, Apparatus, and System - An Internet Protocol Security (IPsec) acceleration method includes generating, by an Internet Key Exchange (IKE) device, an IKE link establishment session packet according to an IPSec configuration parameter and a security policy in a security policy database (SPD), sending, by the IKE device, the IKE link establishment session packet to a peer device, establishing a security association (SA) with the peer device, and sending, by the IKE module, the SA to a data forwarding device, where the IKE device and the data forwarding device are discrete devices. | 2021-10-07 |
20210314215 | REPLICATION OF LOGICAL NETWORK DATA BETWEEN GLOBAL MANAGERS - Some embodiments provide a method that, at a first machine that operates at a first physical site as a primary global manager for a logical network spanning a plurality of physical sites, receives a set of ordered data describing a configuration of the logical network. The method stores, in a particular order, the received set of ordered data in a first database located at the first physical site. Through a channel between (i) the first machine and (ii) a second machine that operates at a second physical site as a secondary global manager for the logical network in case of failure of the primary global manager, the method provides the set of ordered data in the particular order for the second machine to store in a second database in the particular order. The second database located at the second physical site. | 2021-10-07 |
20210314216 | BLOCKCHAIN CONSENSUS METHOD, NODE, AND SYSTEM BASED ON HONEY BADGER BYZANTINE FAULT TOLERANCE CONSENSUS MECHANISM - A blockchain consensus method includes: performing, by a target consensus node of a blockchain, a current round of consensus, to count consensus votes of N consensus proposals; traversing, by the target consensus node, a first set of consensus proposals, to perform the following steps: migrating consensus proposals that each receive greater than or equal to f+1 and less than 2f+1 identical consensus votes into a second set of consensus proposals; and migrating consensus proposals that each receive less than f+1 identical consensus votes into a third set of consensus proposals as opposition consensus opinions, wherein f is a number of fault tolerant consensus nodes of the blockchain. | 2021-10-07 |
20210314217 | AUTOMATIC LOCAL GATEWAY ROUTER BACKUP OF A NETWORK GATEWAY ROUTER - Automatic local gateway router backup of a network gateway router is disclosed. A local gateway router communicatively coupled to a local subnet determines that a network gateway router that serves as a default gateway router for the local subnet has stopped responding. The local gateway router and the network gateway router are configured to communicate with one another via a tunnel implemented by a tunneling protocol. In response to determining that the network gateway router has stopped responding, automatically switching, by the local gateway router, from a tunneling mode to a routing mode, such that the local gateway router becomes the default gateway router for the local subnet. | 2021-10-07 |
20210314218 | METHOD FOR PERFORMING BEAM FAILURE DETECTION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - Disclosed are a method for performing beam failure detection in a wireless communication system and an apparatus therefor. Specifically, a method for performing beam failure detection by means of a user equipment (UE) in a wireless communication system comprises the steps of: receiving a reference signal (RS) from a base station; determining whether a beam fails by measuring the reference signal; and transmitting, to the base station, the determination result on whether the beam fails, wherein by separating a case i) in which the base station does not transmit the reference signal from a case ii) in which the quality of the reference signal transmitted by the base station does not satisfy a specific threshold range, the step of determining whether the beam fails may be determined to be a beam failure only in the case ii). | 2021-10-07 |
20210314219 | LOCATION CRITERIA FOR SECURITY GROUPS - Some embodiments provide a method for distributing a group definition for a group of machines. The method receives the group definition, which includes (i) a span of the group that specifies a set of sites at which the group is to be used and (ii) a set of criteria for machines to be included in the group. The set of criteria includes at least a location criteria specifying one or more sites. The method distributes the group definition to each site in the set of sites. At each site in the set of sites, a local network control system of the site determines a set of machines in the group based on the set of criteria. Only machines in the one or more sites specified by the location criteria are determined to be in the group. | 2021-10-07 |
20210314220 | ASSOCIATION OF 3GPP (THIRD GENERATION PARTNERSHIP PROJECT) UPF (USER PLANE FUNCTION) AND EDGE COMPUTING APPLICATION SERVER - Techniques discussed herein can facilitate EC (Edge Computing) in connection with 5GC (Fifth Generation Core Network) system architecture. Various embodiments can facilitate one or more of: (1) providing the location of one or more UPFs (User Plane Functions) associated with at least one AS (Application Server) to a non-3GPP (Third Generation Partnership Project) EC management system; (2) providing the location of at least one AS associated with one or more UPFs to a 3GPP management system; and/or (3) establishing a relation between one or more UPFs and at least one AS. | 2021-10-07 |
20210314221 | CONSISTENT HASHING FOR NETWORK TRAFFIC DISPATCHING - A method is provided that uses a consistent hashing technique to dispatch incoming packets in a stable system prior to adding of a node. The method uses a hash table and assigns hash buckets in the table to each network node. A set of fields in each incoming packet is hashed and is used to identify the corresponding hash bucket. The packets are then dispatched to the network nodes based on the nodes' hash buckets. During an observation period, the method identifies the ongoing sessions by creating a bit vector table that is used to identify the old and new sessions during a re-dispatching period. The method uses the consistent hashing method and the probabilistic method dispatch the incoming packets such that each packet that belongs to an old session is dispatched to the same old node that has been processing the other packets of the session. | 2021-10-07 |
20210314222 | Proximal Playback Devices - Systems and methods disclosed herein include, determining a proximity of the first networked device to a second networked device, determining whether there is a wired network connection existing between the first networked device and the second networked device, and in response to determining the proximity and the existence of a wired network connection, reconfiguring one or more operational parameters of one or both of the first networked device and the second networked device. | 2021-10-07 |
20210314223 | Managing Virtual Network Functions - Examples disclosed herein include a method of managing virtual network functions of a network functions virtualization (NFV) network environment includes generating an integration virtual network function (integration VNF) to allow a user to perform tasks related to integration and deployment of a first virtual network function (first VNF), and generating an orchestration template for a first virtual network function (first VNF) with an NFV orchestrator of the NFV environment. The method further includes reviewing the orchestration template with the integration VNF, and orchestrating deployment of the first VNF with a virtual infrastructure manager (VIM) of the NFV environment based on the orchestration template. | 2021-10-07 |
20210314224 | COMMUNICATION SYSTEM, PROVIDER NODE, COMMUNICATION NODE, AND METHOD FOR PROVIDING A VIRTUAL NETWORK FUNCTION TO A CUSTOMER NODE - The disclosure is directed to providing virtual network functions to a customer node by a communication system with a provider node in an automatic, traceable, and auditable way. The provider node includes a retrieving module, a validation module, and a deployment module. The retrieving module is configured to retrieve a notification signal, wherein the notification signal is indicative of a selected one of a plurality of virtual network functions and the customer node. The validation module is configured to establish service level agreement data and to validate the agreement service level data, based on the notification signal. The deployment module is configured to selectively transmit a deployment signal to a communication node depending on the validation of the service level agreement data for providing the selected virtual network function to the customer node. | 2021-10-07 |
20210314225 | NETWORK CONTROLLER FOR MULTI-SITE LOGICAL NETWORK - Some embodiments provide a method for a first network controller executing at a first site of multiple sites spanned by a logical network. Network controllers execute at each site. The method generates logical network state data for the first site based on (i) data received from computing devices that implement the logical network at the first site and (ii) logical network configuration data from a network manager at the first site. The method provides the logical network state data for the first site to a second network controller executing at a second site. The method provides logical network state data received from the second site to the computing devices that implement the logical network at the first site. | 2021-10-07 |
20210314226 | DETERMINING SPAN OF LOGICAL NETWORK ELEMENT - Some embodiments provide a method for distributing rules associated with a particular logical network element that is implemented across one or more physical sites. The method uses a set of attributes of a set of elements associated with the particular logical network element to identify a particular set of physical sites spanned by the particular logical network element. The method identifies a set of rules associated with the particular logical network element. The method distributes the identified set of rules to each site of the identified set of physical sites. | 2021-10-07 |
20210314227 | MULTI-SITE SECURITY GROUPS - Some embodiments provide a method for distributing a service rule that is to be enforced across a first set of sites and that is defined by reference to a group identifier that identifies a group of machines. The method distributes the service rule to each site in the first set of sites. The method identifies at least one site in the first set of sites that is not in a second set of sites that has already received a definition of the group. The method distributes the group definition to each identified site in the first set of sites that has not already received the definition of the group. | 2021-10-07 |
20210314228 | MIGRATION OF DATA COMPUTE NODE ACROSS SITES - Some embodiments provide a method for configuring a DCN migrated from a first host computer at a first site of multiple sites spanned by a logical network to a second host computer at a second site. At the second host, the method receives, from the first host, data for configuring the DCN and implementing the logical network on the second site. The data includes (i) data particular to the first site and (ii) a global identifier for a logical port to which the DCN attaches. The method provides the global identifier to a local logical network manager, which uses the global identifier to retrieve data regarding the logical port from a global network manager that manages the logical network across the sites. Based on data retrieved from the global network manager, the method modifies the data particular to the first site into data particular to the second site. | 2021-10-07 |
20210314229 | IOT DEVICE GROUPING AND LABELING - Techniques for grouping and labeling Internet of Things (IoT) devices are disclosed. A set of raw events associated with a first IoT device is identified. A context of the first IoT device is identified, and used to enrich at least some of the raw events. At least some of the raw events are aggregated. A context-based IoT device grouping model is generated based at least in part on the aggregated events and events associated with a second IoT device in operation. The model is applied to determine that a third IoT device belongs to a particular group. A deviation by the third IoT device from group behavior is detected and an alert is generated in response. | 2021-10-07 |
20210314230 | SLICE OPERATION DEVICE, COMMUNICATION SYSTEM, AND SLICE OPERATION METHOD - A slice operation device managing a plurality of slices to each of which a service using the virtual network is allocated, the slice operation device including: a slice information holding unit configured to hold allowable diversion degree information that is information on a resource amount which can be diverted to transmission and reception using a slice different from a slice in question, among resources regarding the slice in question, the allowable diversion degree information being held for each of the plurality of slices; and a signal control unit configured, in a case where resources of one of the plurality of slices are insufficient, to cause resources of a slice different from the slice whose resources are insufficient to be diverted to transmission and reception of a signal using the slice whose resources are insufficient, based on the allowable diversion degree information held by the slice information holding unit. | 2021-10-07 |
20210314231 | Capacity Management of Computing Resources Based on Time Series Analysis - An online system receives time series data and analyzes the data for identifying trend changes or level shifts in the time series. The time series data may describe resource utilization of systems, for example, bandwidth of computer networks. The online system uses prediction models, for example, machine learning based prediction models using regression to predict data values for the time series. The online system determines error residue values based on difference between predicted data values and actual data values of the time series. The online system determines level change in the error residue to identify change-points representing trend changes or level-shifts in the original time-series. The online system takes corrective action based on the change-point information and the trend following the occurrence of the change-point, for example, sending alerts or instructions for causing reconfiguration of the systems such as the computer network. | 2021-10-07 |
20210314232 | TRAFFIC MANAGEMENT FOR SMART NETWORK INTERFACE CARDS - Systems, methods, and computer-readable for load distribution amongst smart network interface cards (sNICs) connected to a host device include a controller. The controller can instantiate an agent in the host device to obtain telemetry information pertaining to the sNICs, where the sNICs can be used for communication between the host device and upstream devices in a software-defined network. The telemetry information indicates service offloading capabilities of the sNICs. The controller can also obtain network topology information pertaining to at least the host device, the sNICs and the upstream devices, and determine load distribution policies for the sNICs based on the network topology information and the telemetry information. The controller can provide the load distribution policies to the one or more upstream devices, where the load distribution policies take into account the service offload capabilities of the sNICs. | 2021-10-07 |
20210314233 | AUTOMATED CLASSIFICATION OF NETWORK DEVICES TO PROTECTION GROUPS - A method and system for automatically classifying protected devices of a protected network to protection groups providing customized protection. The method includes accessing network flow information that includes network statistics processed from observed data obtained by packet interception devices, accessing at least one model that was trained using machine learning and a training data set of the network flow information to classify protected devices having addresses that correspond to destination addresses associated with the training data set to respective protection groups as a function of the network statistics that correspond to the training data set, and classifying a protected device that has an address that corresponds to a destination address associated with a portion of the network flow information to at least one of the protection groups using the at least one model and machine learning and as a function of the network statistics that correspond to the portion of the network flow information. | 2021-10-07 |
20210314234 | SYSTEMS AND METHODS FOR PREDICTION OF ANOMALIES - There is provided a method for adapting components of a network, comprising: providing graphs each indicative of a respective sequential snapshot of a dynamic graph obtained over a historical time interval, wherein nodes of the graphs denote entities, and edges of the graphs denote interactions between the entities over a network, computing community graphs according to the graphs, computing meta-community graphs according to the community graphs, analyzing dynamics of the community graphs to detect changes between two temporally adjacent community graphs, analyzing dynamics of the meta-community graphs to detect changes between two temporally adjacent meta-community graphs, identifying at least one entity corresponding to node(s) of the dynamic graph according to a predicted likelihood of performing an anomalous action during a future time interval, and generating instructions for adapting component(s) of the network for ensuring availability of network resources for interactions between entities during the future time interval. | 2021-10-07 |
20210314235 | USER INTERFACE FOR ACCESSING MULTI-SITE LOGICAL NETWORK - Some embodiments provide a method for providing a user interface (UI) for a network management application. The method provides a first UI for accessing a global network manager through the network management application to configure a global logical network spanning multiple physical sites. For each respective site, the method provides an additional UI for accessing a respective local network manager for the site (i) to modify the global logical network at the respective site and (ii) to configure a local logical network at the respective site. The method provides a UI item for toggling between the first UI and the additional UIs. Multiple UI items available in the first UI are also available in the additional UIs. | 2021-10-07 |
20210314236 | METHODS, SYSTEMS AND APPARATUS FOR CUSTOM INTERFACE SPECIFICATION IN A CLOUD MANAGEMENT SYSTEM - Methods, apparatus and articles of manufacture for custom interface specification in a cloud management system are disclosed. An example cloud management system includes: a first interface to communicate with a second interface external to the cloud management system; and a host to manage requests from the second interface and allocate resources to the second interface as a reverse proxy for the second interface with respect to a backend. The example host is to at least: add, at the request of the second interface, an endpoint with respect to the second interface; fetch, at the request of the second interface, data for the endpoint from the backend, the backend identified for the endpoint based on metadata in a component registry; and provide the data from the backend to the second interface. | 2021-10-07 |
20210314237 | SECURITY THREAT DETECTION DURING SERVICE QUERY HANDLING - Example methods and systems for a computer system to perform security threat detection during service query handling are described. In one example, a process running on a virtualized computing instance supported by the computer system may generate and send a first service query specifying a query input according to a service protocol. The first service query may be detected by a security agent configured to operate in a secure enclave that is isolated from the process. Next, the security agent may generate and send a second service query specifying the query input in the first service query. It is then determined whether there is a potential security threat based on a comparison between (a) a first reply received responsive to the first service query and (b) a second reply received responsive to the second service query. | 2021-10-07 |
20210314238 | SYSTEMS AND METHODS FOR REMOTE COLLABORATION - Described herein are systems and methods for work from home solutions according to various embodiments of the invention. These solutions accurately diagnose connectivity issue locations and severity from any, some, or all points in a network framework. Embodiments of these solutions may also use artificial intelligence and machine learning to process customer quality-of-experience (QoE) feedback and other relevant indicators. The solutions may improve network connectivity based on these measurements and processes. | 2021-10-07 |
20210314239 | AUTO DEPLOYING NETWORK FOR VIRTUAL PRIVATE CLOUD WITH HETEROGENOUS WORKLOADS - Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files. | 2021-10-07 |
20210314240 | DEPLOYING AND CONFIGURING DIFFERENT VIRTUAL NETWORKS FOR DIFFERENT WORKLOADS - Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files. | 2021-10-07 |