44th week of 2015 patent applcation highlights part 70 |
Patent application number | Title | Published |
20150312131 | Software Defined Wireless Device Management - The present disclosure discloses a method and network device for software-defined client device management. Specifically, a network device can cause a client device to switch association with a first access point to a second access point. The network device determines whether a number of times the client device has been caused to switch association with an access point exceeds a threshold value for the first period of time. If not, the network device causes the client device to switch to an association with a third access point. Also, the network device determines a configuration indicating when any access point with which a client device is associated may be modified. Based on the configuration, the network device determines whether an association of the client device should not be modified. Also, based on one or more attributes, the network device selectively causes the client device to switch an association. | 2015-10-29 |
20150312132 | METHOD TO CHECK HEALTH OF AUTOMATICALLY DISCOVERED CONTROLLERS IN SOFTWARE DEFINED NETWORKS (SDNs) - A method to check health of automatically discovered controllers comprises the steps of: (a) a first controller generating a first Controller-Advertisement message carrying the information required to identify and access the first controller when a new switch port becomes active; (b) the first controller sending the generated first Controller-Advertisement to a first switch having the newly activated port; (c) the first controller receiving at least a second Controller-Advertisement message from at least a second controller; (d) the first controller generating a third unsolicited Controller-Advertisement message with its access information to check health of the second controller; (e) the first controller receiving at least a fourth Controller-Advertisement message from the second controller indicating health information of the second controller, wherein the health information is stored in first controller's Controller Information Base (CIB). | 2015-10-29 |
20150312133 | Autonomous System Border Router (ASBR) Advertising Routes with a Same Forwarding Label - In one embodiment, an autonomous system border router (ASBR) advertises a same forwarding label for received advertised routes of a merging context that were advertised with a same forwarding label for the ASBR to use when sending corresponding packets. An ASBR receives via a routing protocol from a particular router in the same autonomous system, a plurality of same-labeled received routes advertised with a same first forwarding label within a merging context. In response to each of the plurality of same-labeled received routes having the same first forwarding label to use to forward packets to the particular router and being in the same merging context, the ASBR determines a merged forwarding label and advertises to a peer ASBR in another autonomous system (AS) each of the plurality of same-labeled received routes with the merged forwarding label for the peer ASBR to use to forward packets to the ASBR. | 2015-10-29 |
20150312134 | SYSTEM AND METHOD FOR ENABLING CONVERSATIONAL LEARNING IN A NETWORK ENVIRONMENT - A system and a method for providing conversational learning is implemented in a network environment. An exemplary method includes receiving a subnet route advertisement that includes an attribute that triggers glean behavior for routing decisions; and installing a subnet entry in a Forwarding Information Base/Adjacency (FIB/ADJ) table. The subnet entry includes a subnet associated with the subnet route advertisement and a corresponding glean adjacency. The corresponding glean adjacency is configured to trigger installation of a host entry associated with a host in an active conversation in a network. | 2015-10-29 |
20150312135 | SYSTEM AND METHOD FOR MULTICAST ROUTING USING PEER GROUPS - A system and method for multicast routing using peer groups includes a router. The router includes a control unit and a memory coupled to the control unit. The memory stores one or more first multicast routing entries. The control unit is configured to receive a multicast packet on an input interface, determine one or more properties of the multicast packet, determine one or more output interfaces based on the properties and the first multicast routing entries, and forward copies of the multicast packet on each of the output interfaces. The router is configured to be coupled to a peer router via an inter-chassis link (ICL). The first multicast routing entries include one or more second multicast routing entries associated with multicast routing trees associated with the router and one or more third multicast routing entries associated with multicast routing trees associated with the peer router. | 2015-10-29 |
20150312136 | CENTRALLY OPTIMIZED VARIABLE LENGTH CODING FOR SOURCE ROUTED MULTICAST - A system, controller and method having centrally optimized coding for a source routed forwarding based multicast network. The network comprises a plurality of nodes configured to transfer data packets to one another via a plurality of links. A controller is configured to control each of the nodes, and is configured to control forwarding of the data packets by establishing a header for each flow. The header defines a path for the flow of the data packets from a source to multiple destinations, wherein the length of the header is a function of the nodes and the branches in the path. The multicast path is represented as a header that consists of codewords representing interfaces, links and instructions. Some of the codewords are assigned different lengths in order to reduce the size of the header. Other codewords have a fixed size comprising a bit field. | 2015-10-29 |
20150312137 | TRANSFERRING DATA IN A GATEWAY - The present invention discloses a gateway and its method of transferring data, the gateway being connected to a network by a SIMM-node. In response to a request to establish multi-MAC address routing information of a SIMM-node, multiple MAC addresses corresponding to an IP address of the SIMM-node are obtained. The multi-MAC address routing information of the SIMM-node is established at least according to the obtained multiple MAC addresses corresponding to the IP address of the SIMM-node. In response to receiving a data message sent to the IP address of the SIMM-node, the data message is routed by using the established multi-MAC address routing information of the SIMM-node. | 2015-10-29 |
20150312138 | BICASTING USING NON-CONGRUENT PATHS IN A LOOP-FREE ROUTING TOPOLOGY HAVING ROUTING ARCS - In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a destination network node, each routing arc comprising a first network node as a first end of the routing arc, a second network node as a second end of the routing arc, and at least a third network node configured for routing any network traffic along the routing arc toward the destination node via any one of the first or second ends of the routing arc, the loop-free routing topology providing first and second non-congruent paths; and forwarding bicasting data, comprising a data packet in a first direction from a network node and a bicasted copy of the data packet in a second direction from the network node, concurrently to the destination node respectively via the first and second non-congruent paths. | 2015-10-29 |
20150312139 | Method and Device for Bidirectional Forwarding Detection under Condition of Parameter Update - A method and device for Bidirectional Forwarding Detection under a condition of parameter update, wherein a first router establishes a link with a second router; the first router modifies packet sending parameters and/or packet receiving parameters, and sends to the second router a message with an identifier of the modification of this time; the second router returns to the first router a feedback message with an identifier of the modification of this time after receiving the message with the identifier of the modification of this time sent by the first router; the packet sending parameters and/or packet receiving parameters which are modified this time take effect after the first router receives the feedback message with the identifier sent by the second router. | 2015-10-29 |
20150312140 | Method and System for Handling Failure in a Coordinated Multicast Streaming System - According to one embodiment of the invention, a non-transitory computer readable medium for handling the failure of a controller within a communications network is provided. One embodiment of the non-transitory computer readable medium comprises instructions that cause a secondary network device to identify one or more multicast streams received by a primary network device and detect that the primary network device has failed; and responsive to detecting that the primary network device has failed, cause the secondary network device to subscribe to the multicast streams. | 2015-10-29 |
20150312141 | INFORMATION PROCESSING SYSTEM AND CONTROL METHOD FOR INFORMATION PROCESSING SYSTEM - An effect range identifying unit identifies servers that were in communication. Then, the effect range identifying unit identifies virtual machines that were in communication in the identified servers. However, the effect range identifying unit excludes the virtual machine in which the time elapsed after the occurrence of the failure is greater than the aging time from the virtual machines that were in communication. Furthermore, the effect range identifying unit refers to the ARP management table and excludes the virtual machine in which the failure occurrence time is not greater than the transmission time from the virtual machines that are in communication. Then, the effect range identifying unit refers to VM allocation information and tunnel path information and identifies a tenant and a communication path that are affected by the failure. | 2015-10-29 |
20150312142 | Propagating a Flow Policy by Control Packet in a Software Defined Network (SDN) Based Network - Propagating a flow policy within a software defined network (SDN) includes sending a route path request for a flow from a first forwarding node to an SDN controller of the SDN, receiving route path information specifying a route path for the flow from the SDN controller, and generating, using a processor of the first forwarding node, a control packet including the route path. The control packet is communicated from the first forwarding node to a second forwarding node. | 2015-10-29 |
20150312143 | COMMUNICATION NODE, CONTROL APPARATUS, COMMUNICATION SYSTEM, PACKET PROCESSING METHOD, COMMUNICATION NODE CONTROLLING METHOD AND PROGRAM - A communication node includes an entry memory capable of retaining a control information entry stipulating a processing to be applied to a packet received, a packet processor referencing the entry memory to process the packet received, and a request suppressing unit. Triggered by reception of a packet, the request suppressing unit requests a preset control apparatus to set a control information entry, and subsequently suppresses control information entry setting requests for a preset time for packets having a characteristic in common with the packet for which the control information entry setting request was made to the preset control apparatus. | 2015-10-29 |
20150312144 | TECHNOLOGIES FOR DISTRIBUTED ROUTING TABLE LOOKUP - Technologies for distributed table lookup via a distributed router includes an ingress computing node, an intermediate computing node, and an egress computing node. Each computing node of the distributed router includes a forwarding table to store a different set of network routing entries obtained from a routing table of the distributed router. The ingress computing node generates a hash key based on the destination address included in a received network packet. The hash key identifies the intermediate computing node of the distributed router that stores the forwarding table that includes a network routing entry corresponding to the destination address. The ingress computing node forwards the received network packet to the intermediate computing node for routing. The intermediate computing node receives the forwarded network packet, determines a destination address of the network packet, and determines the egress computing node for transmission of the network packet from the distributed router. | 2015-10-29 |
20150312145 | Buffer-Less Virtual Routing - A network includes a plurality of endpoint routers and intermediate routers. When a new data stream is detected at any endpoint router, the first packet is sent to a virtual routing server with knowledge of the entire network topology. Based on the topology, current usage, and historical usage, the virtual routing server determined a path for the data stream and begins to update the routing tables of the intermediate routers to reflect the determined path. Until the update is complete, all packets in the data stream are routed first to the virtual routing server and then to their destination. Once the update is complete, packets in the data stream are routed directly along the determined path. | 2015-10-29 |
20150312146 | METHOD AND DEVICE FOR HOSTING APPLICATION BY ACCESS NODE - A method and device for hosting an application by an access node which provides network access to a terminal in a mobile communication system are provided. The method includes receiving a request packet for a service request from a user application of a mobile terminal, delivering the request packet to an application included in the access node, if a destination of the request packet corresponds to the application of the access node, providing a service to the user application of the mobile terminal through the application, and delivering the request packet to a corresponding public application on an external network, if the application corresponding to the destination of the request packet does not exist in the access node. | 2015-10-29 |
20150312147 | SWITCHING SYSTEM, SWITCHING CONTROL SYSTEM, AND STORAGE MEDIUM - A communication apparatus to forward a packet, the communication apparatus comprising of a control unit to communicate with a controller, based on a predetermined control protocol, being capable of transmitting a first packet forwarding rule to a plurality of the communication apparatus, and a table divided into a first region to store the first packet forwarding rule and a second region to store a second packet forwarding rule set by the communication apparatus. | 2015-10-29 |
20150312148 | SYSTEM AND METHOD FOR SCALING IPV6 ON A THREE-TIER NETWORK ARCHITECTURE AT A LARGE DATA CENTER - Some implementations provide a method for managing switches in a data center that includes: (1) establishing a connection from one switch to another switch in the data center, the data center providing a plurality of virtual local area networks (VLANs), each VLAN including at least one Virtual Machine and capable of spanning across more than one of the plurality of switches; (2) provisioning device prefixes for IPv6 addresses, a given device prefix corresponding to a particular VLAN on a particular switch in the data center, the given device prefix included in a host address of a particular virtual machine, the particular virtual machine hosted on a server computer, the sever computer connected to the particular switch without additional intervening switches; (3) configuring a hardware memory to include prefix information and address information; and (4) transferring packets by using the prefix information and the address information. | 2015-10-29 |
20150312149 | DATA PROCESSING - Measures for processing data in a packet-switched network. At a first device in the network, a packet transmitted from a second device in the network is received. The received packet comprising an Internet Protocol (IP) address for a third device in the network. On the basis of the IP address for the third device comprised in the received data packet, lookup in an IP routing table of the second device is initiated to obtain a next-hop address for the received packet. The obtained next-hop IP address is determined to be an IP address of a device connected to the first device. | 2015-10-29 |
20150312150 | METHOD FOR CLASSIFYING A DATA SEGMENT WITH RESPECT TO ITS FURTHER PROCESSING - A method is provided for classifying a data segment with respect to its further processing in a data transporting unit, in particular in a network processor. The data segment is provided by an input interface. A first key for a lookup table is ascertained as a function of an identifier (chid) established in advance and as a function of an identifier (devid) of the input interface from which the data segment stems. A second key for the lookup table is ascertained. | 2015-10-29 |
20150312151 | ENHANCED LOAD DISTRIBUTION OF NON-UNICAST TRAFFIC TO MULTI-HOMED NODES IN A PORT EXTENDER ENVIRONMENT - Aspects of the present invention include multi-homed node in a port extender environment. In embodiments of the present invention, each port extender can communicate data traffic to the multi-homed node thereby increasing the number of available links to the multi-homed node. The communication with the multi-homed node is based on an identification associated with the data traffic. | 2015-10-29 |
20150312152 | Network Path Selection by Customer Premises Equipment - A system and method for providing a user of communications services with free market based pricing may include providing for communications over one of multiple network paths serviced by multiple respective communications service providers via at least one communications network. One of the network paths over which to communicate based on current pricing from the multiple communications service providers may be selected and communications may be performed over the selected network path. | 2015-10-29 |
20150312153 | SYSTEMS AND METHODS FOR LOAD-BALANCING IN A DATA CENTER - Methods of load-balancing in a network are provided herein. One such method includes steps of receiving network traffic at a network device, the network traffic having a destination address and of performing a look-up in a multipath group table using the destination address. The multipath group table includes entries for recursive next-hops, each recursive next hop being associated with a connected next hop in the multipath group table. The method also include a step of hashing the network traffic according to a number of recursive next-hops associated with the destination address in the multipath group table. Additional methods and information handling system are also provided. | 2015-10-29 |
20150312154 | SYSTEMS AND METHODS COMPRISING ONE OR MORE DATA FEED MECHANISMS FOR IMPROVING DOMAIN NAME SYSTEM TRAFFIC MANAGEMENT - Systems and methods improve Domain Name System (DNS) traffic management and comprise ingesting first input data associated with one or more candidate DNS answers, compiling or manipulating of the first input data into a normalized form to provide normalized data that is usable by at least one dynamic DNS system for computing one or more answers to DNS queries, and transferring the normalized data to at least one globally distributed DNS software actor that is responsible for executing one or more DNS traffic management algorithms using the normalized data as second input data for use, wherein the at least one globally distributed DNS software actor is configured to execute a dynamic DNS decision making process utilizing the normalized data. | 2015-10-29 |
20150312155 | SYSTEM AND METHOD FOR EFECTUATING PACKET DISTRIBUTION AMONG SERVERS IN A NETWORK - A packet distribution scheme for forwarding incoming packets to servers in a network. Depending on a hash value of the incoming flow's identification parameters, a hash flow table or database is queried to determine the server to which the packet is to be forwarded. If multiple flows have the same hash index and are associated with different servers, a secondary flow table or database is queried for determining the server. In an example implementation, only the secondary flow table is configured to store fully qualified flow identification parameters whereas the hash flow table is operative to store reduced or compressed state information. | 2015-10-29 |
20150312156 | BANDWIDTH CONTROL DEVICE AND BANDWIDTH CONTROL METHOD - A bandwidth control device includes: a management unit to subtract, when a first bandwidth control device (first device) or one or more second bandwidth control devices (second devices) allow a packet to pass, an amount of the passed packet from a permissible passage amount to be passed the first device; and a correction unit to correct the permissible passage amount of the first device or a threshold value of the first device based on a result of a comparison between a passage amount of packets passed the first device and passage amounts of packets passed the second devices, wherein the first device determines whether a packet is to be allowed to pass through or not based on a result of a comparison between the permissible passage amount and the threshold value and allows the packet to pass or discard the packet according to the determination result. | 2015-10-29 |
20150312157 | METHOD FOR ALIGNING QoS OF WLAN AND QoS OF PACKET CORE NETWORK - A method for aligning QoS of a WLAN network and QoS of a packet core network is disclosed. The method includes: establishing multiple first Internet Protocol Security (IPSEC) tunnels between a User Equipment (UE) and a WLAN, each first IPSEC tunnel corresponding to a different bearer, and transporting different DSCP values of different bearers to the WLAN via the first IPSEC tunnels; establishing multiple second IPSEC tunnels between the WLAN and the packet core network, mapping the different DSCP values to different Quality of Services (QoSs) on the WLAN, and transporting the QoSs to the packet core network via the second IPSEC tunnels; and the WLAN performing QoS scheduling on services of the bearers according to the different DSCP values. | 2015-10-29 |
20150312158 | METHOD AND SYSTEM FOR MEDIUM ACCESS CONTROL (MAC) LAYER SPECIALIZATION FOR VOICE AND MULTIMEDIA DATA STREAMS - Aspects of a method and system for medium access control (MAC) layer specialization for voice and multimedia data streams are presented. Aspects of the method include determining a number of attempts for transmitting one or more medium access control (MAC) frames. Aspects of the system may include a processor that enables determination of a number of attempts for transmitting one or more MAC frames. A maximum number for such attempts may be determined based on one or more priority levels associated with different portions of multimedia information being communicated via a wireless medium and contained within the one or more MAC frames. | 2015-10-29 |
20150312159 | MECHANISM TO SAVE SYSTEM POWER USING PACKET FILTERING BY NETWORK INTERFACE - A network interface that connects a computing device to a network may be configured to process incoming packets and determine an action to take with respect to each packet, thus decreasing processing demands on a processor of the computing device. The action may be indicating the packet to an operating system of the computing device immediately, storing the packet in a queue of one or more queues or discarding the packet. When the processor is interrupted, multiple packets aggregated on the network interface may be indicated to the operating system all at once to increase the device's power efficiency. Hardware of the network interface may be programmed to process the packets using filter criteria specified by the operating system based on information gathered by the operating system, such as firewall rules. | 2015-10-29 |
20150312160 | SYSTEM FOR FLEXIBLE DYNAMIC REASSIGNMENT OF THROUGHPUT - A network switch including a set of communication ports is provided. The communication ports may have an allocated prebuffer to store data during packet switching operations. The network switch may further include a calendar associated with the set of communication ports that provides bandwidth configuration for the set of communication ports. The network switch may further include a secondary calendar that may be dynamically setup. The secondary calendar may provide an alternative bandwidth configuration strategy for the set of communication ports. The switch includes circuitry that may increase the prebuffer size and upon the successful increase of the prebuffer size reconfigure the set of communication ports from the original calendar to the secondary calendar, without a reboot. The circuitry may reset the prebuffer size after reconfiguration is complete and the switch may continue operation according to the reconfigured settings. | 2015-10-29 |
20150312161 | HANDLING LARGE FRAMES IN A VIRTUALIZED FIBRE CHANNEL OVER ETHERNET (FCOE) DATA FORWARDER - A switch unit has one frame buffer pool for storing received frames and another frame buffer pool for storing large frames. The frame size in the large frame buffer pool may be optimized to the largest amount of data the switch unit that an FCoE switching is running on can support (i.e., a limitation of zone entries). Should free space be unavailable in the large frame buffer pool, or if a sequence grows bigger than can be supported, the switch unit may still continue to send response frames back to the sender. While the switch unit may store header information of the frame, the switch unit does not store the data of subsequent frames any longer. Once the sequence has been received completely, a rejection message is sent back with an appropriate error or reason code. The rejection message enables the sender to attempt a retransmission or cancel the current request altogether. | 2015-10-29 |
20150312162 | HANDLING LARGE FRAMES IN A VIRTUALIZED FIBRE CHANNEL OVER ETHERNET (FCOE) DATA FORWARDER - A switch unit has one frame buffer pool for storing received frames and another frame buffer pool for storing large frames. The frame size in the large frame buffer pool may be optimized to the largest amount of data the switch unit that an FCoE switching is running on can support (i.e., a limitation of zone entries). Should free space be unavailable in the large frame buffer pool, or if a sequence grows bigger than can be supported, the switch unit may still continue to send response frames back to the sender. While the switch unit may store header information of the frame, the switch unit does not store the data of subsequent frames any longer. Once the sequence has been received completely, a rejection message is sent back with an appropriate error or reason code. The rejection message enables the sender to attempt a retransmission or cancel the current request altogether. | 2015-10-29 |
20150312163 | METHOD TO ACHIEVE BOUNDED BUFFER SIZES AND QUALITY OF SERVICE GUARANTEES IN THE INTERNET NETWORK - Methods to achieve bounded router buffer sizes and Quality of Service guarantees for traffic flows in a packet-switched network are described. The network can be an Internet Protocol (IP) network, a Differentiated Services network, an MPLS network, wireless mesh network or an optical network. The routers can use input queueing, possibly in combination with crosspoint queueing and/or output queueing. Routers may schedule QoS-enabled traffic flows to ensure a bounded normalized service lead/lag. Each QoS-enabled traffic flow will buffer O(K) packets per router, where K is an integer bound on the normalized service lead/lag. Three flow-scheduling methods are analysed. Non-work-conserving flow-scheduling methods can guarantee a bound on the normalized service lead/lag, while work-conserving flow-scheduling methods typically cannot guarantee the same small bound. The amount of buffering required in a router can be reduced significantly, the network links can operate near peak capacity, and strict QoS guarantees can be achieved. | 2015-10-29 |
20150312164 | MOBILE INFORMATION TERMINAL AND PROGRAM THEREOF - A mobile information terminal determines whether or not access to a site which is specified by a signal is permitted when the signal transmitted from a transmission source is received, based on identification information. When it is determined that access to the site is permitted, the terminal changes a state of the identification information to a state in which access is not permitted by accessing the site. When it is determined that access to the site is not permitted, the terminal receives an instruction on access to the site while the signal is received. When the instruction on access is received, the terminal accesses the site. | 2015-10-29 |
20150312165 | TEMPORAL BASED COLLABORATIVE MUTUAL EXCLUSION CONTROL OF A SHARED RESOURCE - The present invention relates to a temporal base method of mutual exclusion control of a shared resource. The invention will usually be implemented by a plurality of host computers sharing a shared resource where each host computer will read a reservation memory that is associated with the shared resource. Typically a first host computer will perform and initial read of the reservation memory and when the reservation memory indicates that the shared resource is available, the first host computer will write to the reservation memory. After a time delay, the host computer will read the reservation memory again to determine whether it has won access to the resource. The first host computer may determine that it has won access to the shared resource by checking that data in the reservation memory includes an identifier corresponding to the first host computer. | 2015-10-29 |
20150312166 | SOFTWARE LOAD BALANCER TO MAXIMIZE UTILIZATION - A load balancer receives a sequence of requests for computing service and distributes the requests for computing service to a computing node in an ordered list of computing nodes until the computing node reaches its maximum allowable compute capability. Responsive to an indication that the computing node has reached its maximum allowable compute capability, the load balancer distributes subsequent requests for computing service to another computing node in the ordered list. If the computing node is the last computing node in the ordered list, the load balancer distributes a subsequent request for computing service to a computing node other than one of the computing nodes in the ordered list of computing nodes. If the computing node is not the last computing node in the ordered list, the load balancer distributes a subsequent request for computing service to another computing node in the ordered list of computing nodes. | 2015-10-29 |
20150312167 | MAXIMIZING SERVER UTILIZATION WITHIN A DATACENTER - A method of maximizing server utilization within a datacenter comprising collocating a number of workloads to a subset of a number of physical servers within a datacenter, adjusting access to resources by critical and non-critical workloads, isolating a number of critical workloads that share resources to the subset of resource instances, and controlling resource utilization of the collocated workloads. A system for collocating workloads in a datacenter, the system comprising a number of servers communicatively coupled to each other and a collocation module that receives information from each server and decides whether to leave a workload running on one of any of the servers on that server, or migrate a workload running on one of the number of servers to another server. | 2015-10-29 |
20150312168 | EFFICIENT METHOD FOR ACCESSING IMAGE DATA STORED IN A CLOUD - A device transmits a request to access image data stored in a cloud and then receives an access path to the image data. If the image data are in a first data format, the device reads the image data via the access path, converts them into the second data format, and stores the converted image data in the cloud. It also modifies the access path according to a modification rule and stores the modified access path in the cloud. If the image data are in the second data format, the device either always reads the image data in the second data format via the access path or checks whether a special instruction has been defined. On the basis of the special instruction, the device either reads the image data in the second data format via the access path or remodifies the access path using the modification rule. | 2015-10-29 |
20150312169 | Adaptive Resource Management - Allocation of resources across multiple consumers allows efficient utilization of shared resources. Observed usages of resources by consumers over time intervals are used to determine a total throughput of resources by the consumers. The total throughput of resources is used to determine allocation of resources for a subsequent time interval. The consumers are associated with priorities used to determine their allocations. Minimum and maximum resource guarantees may be associated with consumers. The resource allocation aims to allocate resources based on the priorities of the consumers while aiming to avoid starvation by any consumer. The resource allocation allows efficient usage of network resources in a database storage system storing multiple virtual databases. | 2015-10-29 |
20150312170 | METHOD FOR ACTIVATING A SERVICE ON A PRINCIPAL DEVICE, AND RESPECTIVE APPARATUS - The method for activating a service on a principal device being connected, via a port connector comprising a set of pins, to a device suitable to provide an Ethernet service to the principal device, the set of pins having a first subset and a second subset of pins, wherein the first and the second subset of pins have no pins in common. The method comprises the steps of sensing always in an initial state for a Fast Ethernet service at the first subset pins and for a second service at the second subset of pins; detecting which of the Fast Ethernet service and the second service is signaled on the first and the second subset of pins; in case the second service is detected, then selecting the second subset of pins and activating the second service on the principal device; and in case the Fast Ethernet service is detected, then disabling the second service, selecting the first subset and second subset of pins and activating the Fast Ethernet service; and further, if a Gigabit Ethernet service is possible, enabling the Gigabit Ethernet service instead of the fast Ethernet service. | 2015-10-29 |
20150312171 | PACKET SWITCH METHODS AND SYSTEMS - The present invention relates to a packet switch and a packet switching method. An example embodiment of the present invention comprises at least three network ports, at least one instrument port, a mux-switch, a packet switch fabric, and an address table. The embodiment updates the address table to include the source address of each ingress packet of each network port and associate the source address with that network port. The mux-switch routes the ingress packet traffic of each network port according to the identity of the network port so that at least a copy of the packet traffic of one of the network ports is routed to an instrument port. The packet switch fabric routes the packets from the instrument ports to the network ports according the destination address of the packet and the identity of the network port that is associated with the destination address as recorded in the address table. | 2015-10-29 |
20150312172 | SYNCHRONIZING OUT-OF-SYNC ELEMENTS IN A DISTRIBUTED FIBRE CHANNEL FORWARDER - Techniques are provided for synchronizing, in a distributed Fibre Channel fabric or a distributed FCoE fabric in which FC frames are encapsulated in Ethernet frames, a controlling FCoE forwarder (cFCF) with the FCoE data-plane forwarder (FDF). The operation includes entering a recovery mode at the FDF. The FDF is modified based on a route distribution message provided by the cFCF which includes fabric-provided MAC addresses (FPMAs). The FDF notifies the cFCF of differences between the FPMAs supplied by the route distribution message with the FPMAs known by the FDF. The FDF leaves the recovery mode and sends an acknowledgement to the cFCF. | 2015-10-29 |
20150312173 | SYNCHRONIZING OUT-OF-SYNC ELEMENTS IN A DISTRIBUTED FIBRE CHANNEL FORWARDER - Techniques are provided for synchronizing, in a distributed Fibre Channel fabric or a distributed FCoE fabric in which FC frames are encapsulated in Ethernet frames, a controlling FCoE forwarder (cFCF) with the FCoE data-plane forwarder (FDF). The operation includes entering a recovery mode at the FDF. The FDF is modified based on a route distribution message provided by the cFCF which includes fabric-provided MAC addresses (FPMAs). The FDF notifies the cFCF of differences between the FPMAs supplied by the route distribution message with the FPMAs known by the FDF. The FDF leaves the recovery mode and sends an acknowledgement to the cFCF. | 2015-10-29 |
20150312174 | HYBRID DATA TRANSMISSION METHOD AND RELATED HYBRID SYSTEM - A hybrid data transmission method includes broadcasting a request via a first channel from a first host device, wherein the request comprises Internet protocol (IP) address information; replying to the request with a hardware address and a bus identity of a second host device via the first channel according to the IP address information when the second host device receives the request; transmitting the hardware address and the bus identity to a second interface controller when a first interface controller receives the hardware address and the bus identity; setting a second channel according to the hardware address and the bus identity when the second interface controller receives the hardware address and the bus identity; and transmitting a plurality of data packets between the first host device and the second host device via the second channel. | 2015-10-29 |
20150312175 | PROVIDING INTELLIGENT TRANSCRIPTIONS OF SOUND MESSAGES IN A MESSAGING APPLICATION - One or more embodiments described herein include methods and systems of creating transcribed electronic communications based on sound inputs. More specifically, systems and methods described herein provide users the ability to easily and effectively send an electronic communication that includes a textual message transcribed from a sound input. Additionally, systems and methods described herein provide an analysis of a textual message transcribed from a sound input allowing users to correct an inaccurate or incorrect transcription. | 2015-10-29 |
20150312176 | Instant Messaging Systems and Methods - Data describing a request to obtain access to an instant messaging system is received from a requesting device. The request to obtain access includes an identifier. A plugin is identified from a data repository based on the identifier in the request. The plugin is adapted to extend an instant messaging application installed on the requesting device. In some aspects, the plugin received during an instant messaging session extends the instant messaging application until the instant messaging session is terminated. | 2015-10-29 |
20150312177 | MESSAGING BASED SIGNALING FOR COMMUNICATIONS SESSIONS - According to one embodiment of the present invention, a system for providing call signaling services to client devices transmits a start channel message on a service topic from a first client device to a service instance. The system publishes from the service instance to the client devices a channel message including a channel topic. The service instance subscribes to the service topic and an associated channel topic. Each client device subscribes to a corresponding client topic. The system transfers signaling information between the client devices and the service instance by publishing signaling information to a channel topic and client topics to establish a communication channel between the client devices. The system communicates between the client devices by publishing information over the communication channel. Embodiments of the present invention further include a method and computer program product for providing call signaling services in substantially the same manners described above. | 2015-10-29 |
20150312178 | ELECTRONIC DEVICE AND METHOD OF PROCESSING MESSAGE IN ELECTRONIC DEVICE - Methods and apparatus are provided for processing a message in an electronic device. A first message application is executed, which displays a first message and a second message in a combined message display window of an interlocutor. A second message application is executed, which provides the second message to the first message application while the first message application is executed. The first message is received and/or transmitted through the first message application, and the second message is received and/or transmitted through the second message application. The first message application and the second message application have different message reception and transmission techniques. | 2015-10-29 |
20150312179 | MESSAGING BASED SIGNALING FOR COMMUNICATIONS SESSIONS - According to one embodiment of the present invention, a system for providing call signaling services to client devices transmits a start channel message on a service topic from a first client device to a service instance. The system publishes from the service instance to the client devices a channel message including a channel topic. The service instance subscribes to the service topic and an associated channel topic. Each client device subscribes to a corresponding client topic. The system transfers signaling information between the client devices and the service instance by publishing signaling information to a channel topic and client topics to establish a communication Channel between the client devices. The system communicates between the client devices by publishing information over the communication channel. Embodiments of the present invention further include a method and computer program product for providing call signaling services in substantially the same manners described above. | 2015-10-29 |
20150312180 | Expandable Graphical Icon for Response to Electronic Text Transmission - A graphical user interface utility for message data sent from a sender personal communications device to a recipient personal communications device displays a base response prompt, according to an instruction from the sender, in the message data that appears on the recipient personal communications device. The graphical user interface utility changes the appearance of the base response prompt when the base response prompt is selected by the recipient by displaying one or more recipient-actuable selection elements along with the message content. At least one of the one or more recipient-actuable selection elements has an associated response signal that is transmitted back to the sender according to recipient selection. | 2015-10-29 |
20150312181 | SYSTEMS, APPARATUS AND METHODS FOR FACILITATING DISPLAY AND MANAGEMENT OF INFORMATION FOR COMMUNICATION DEVICES - Information management and display is enabled. A method can include displaying, via a user interface of a communication device, a dynamically updatable wallpaper comprising a personalized theme personalized to a user of the communication device. The method can also include updating the dynamically updatable wallpaper to display one or more animated icons. Displaying the animated icons can be based, at least, on detected activity of respective contacts associated with the one or more animated icons. An apparatus can comprise a user interface component configured to display images indicative of contacts, wherein the plurality of contacts are predefined by a user of the apparatus. The apparatus can also include a messaging component configured to: integrate different types of text messages for one of the contacts; and provide concurrent display of the text messages and social media information for one of the contacts. | 2015-10-29 |
20150312182 | COMPOSING MESSAGES WITHIN A COMMUNICATION THREAD - One or more embodiments described herein include methods and systems of organizing a user interface of a communication system. More specifically, systems and methods described herein provide users the ability to easily and effectively compose an electronic communication directly in a communication thread, thus reducing user interface clutter. Additionally, systems and methods described herein selectively provide display elements within a messaging user interface according to the type of message a user is creating. | 2015-10-29 |
20150312183 | VARIABLE IMAGE ACQUISITION AND PROCESSING TECHNIQUES BASED ON IMAGE DATA TYPE - A server device may receive file data from a user device via a web browser application associated with the user device. The file data may be extracted by an application, different from the web browser application, associated with the user device. The server device may determine an acquisition technique based on the file data; obtain a computer file, associated with the file data, using the acquisition technique; receive, from the user device, a request to transmit a message including the computer file; insert the computer file in the message; and transmit the message. | 2015-10-29 |
20150312184 | FACILITATING THE SENDING OF MULTIMEDIA AS A MESSAGE - One or more embodiments described herein include methods and systems of sending multimedia content items as electronic communications. More specifically, systems and methods described herein provide user the ability to easily and effectively select multimedia content items stored on a computing device for inclusion in a communication session without navigating away from the communication session. Additionally, systems and methods described herein provide a user the ability to edit multimedia content items for inclusion in the communication session. | 2015-10-29 |
20150312185 | CAPTURING AND SENDING MULTIMEDIA AS ELECTRONIC MESSAGES - One or more embodiments described herein include methods and systems of capturing and sending multimedia content items as electronic message. More specifically, systems and methods described herein provide users the ability to easily and effectively capture multimedia content items for inclusion in a communication session without navigating away from the communication session. Additionally, systems and methods described herein allow a multimedia content item to be sent to one or more co-users immediately following the capture of the multimedia content item without further user interaction. In other words, the system and methods can capture and automatically send a multimedia content item in response to a single user interaction. | 2015-10-29 |
20150312186 | METHODS OF GENERATING SIGNATURES FROM GROUPS OF ELECTRONIC MESSAGES AND RELATED METHODS AND SYSTEMS FOR IDENTIFYING SPAM MESSAGES - A method of generating a signature for a group of electronic messages that each include a plurality of characters comprises extracting a plurality of blocks of characters from each of the electronic messages, mathematically processing each of the blocks of characters from each electronic message, and generating a signature for the group of electronic messages based at least in part on the mathematically processed blocks of characters. In some embodiments a counting Bloom filter may be used to generate the signature. The signatures generated by these methods may be used to identify spam. | 2015-10-29 |
20150312187 | SYSTEMS AND METHODS FOR MODIFYING A RECIPIENT LIST OF A MESSAGE - Systems and methods are provided for facilitating an exchange in a messaging conversation between an originating entity and a plurality of recipient entities. According to certain aspects, a facilitating entity receives a message from the originating entity that specifies a list of the plurality of recipient entities. The facilitating entity analyzes the message to determine how to modify the list of the recipient entities and modifies the list according to the analysis. The facilitating entity sends the message to the plurality of recipient entities that are specified by the modified list. In aspects, the facilitating entity can manage rounds of message and response exchanges with one or more of the recipient entities until a predefined criteria is met, or according to other parameters. | 2015-10-29 |
20150312188 | DISTRIBUTED POLICY ENFORCEMENT FOR ENTERPRISE COMMUNICATIONS - An active compliance engine used to control/restrict communication or collaboration is provided. The active compliance engines may include a content inspection module that inspects the content of a message for inappropriate language or information. Content could be an instant message, content of an attached file, speech from a voice session, sign language from a video session, or content shared through desktop sharing. The active compliance engines may include a content tagging module that tags inspected content. Ethical wall rules are used in the inspection of participants to a communication to see whether they are allowed to communicate or collaborate with each other. A communication management module manages communications or event based on an inspection. | 2015-10-29 |
20150312189 | METHOD OF AUTOMATICALLY RECEIVING NOTIFICATION APPLIED TO A PORTABLE DEVICE AND RELATED SYSTEM THEREOF - A system of automatically receiving notification applied to a portable device includes a first portable device transmitting position coordinates thereof to a server; the server receiving the position coordinates, storing the position coordinates to a database of the server, and updating previous position coordinates of the first portable device according to the position coordinates; the server finding a second user within the database matching customization conditions of a first user having the first portable device according to the position coordinates and the customization conditions of the first user; the server simultaneously transmitting a first push notification message to the first portable device and a second push notification message to a second portable device of the second user according to a push notification function. | 2015-10-29 |
20150312190 | SYSTEM AND METHODS FOR INTEGRATING SOCIAL NETWORK INFORMATION - A system for integrating social media information or other electronic interactions may comprise a database configured to store instances of interaction among a plurality of users, such as users of one or more electronic social media networks, and an application configured to be installed on the computer system of a first one of the plurality of users. The application may be configured to collect information from a website displayed in a web browser on the user's computer system, determine if the information includes a second one of the plurality of users, and display on the user's computer system one or more instances of interaction between the first user and the second user that are stored in the database. The application may be configured to operate with one or both of social media network websites and non-social-media network websites. | 2015-10-29 |
20150312191 | METHODS AND SYSTEMS FOR MANAGING MULTIPLE TIMELINES OF NETWORK FEEDS - Systems and methods are provided for managing timelines of network feeds. A system accesses network feeds associated with at least one social network. The system identifies a set of network feeds based on an associated name, keyword, calendar date, and/or geographic location. The system outputs, to a display device, a chronological representation of the set of network feeds based on calendar dates associated with the set of network feeds. The system can supplement the chronological representations of network feeds with additional network feeds associated with other network users. | 2015-10-29 |
20150312192 | USING ORGANIZATIONAL RANK TO FACILITATE ELECTRONIC COMMUNICATION - A system for electronic communications. Receiving a sender identifier and a recipient identifier. A first message is received from the sender identifier to send to the recipient identifier. Determining the relative ranking of the sender and the recipient. In response to determining that the recipient has a higher relative ranking than the sender, determining whether the first message contains an action item. In response to determining that the first message contains an action item, transmitting a second message to the sender. In response to receiving an indication from the sender to send the first message, sending the first message from the sender identifier to the recipient identifier. | 2015-10-29 |
20150312193 | SYSTEMS AND METHODS FOR ACCUMULATING MESSAGES IN A MESSAGING CONVERSATION - Systems and methods are provided for facilitating an exchange in a messaging conversation between an originating entity and a plurality of recipient entities. According to certain aspects, a facilitating entity detects that an originating entity has sent a message to a plurality of recipient entities. The facilitating entity receives response messages from at least some of the recipient entities and accumulates the response messages into a single accumulated message, In some embodiments, die facilitating entity accumulates the response messages in response to a predefined criteria being met, Further, in accumulating the response message, the facilitating entity can initiate an application. | 2015-10-29 |
20150312194 | BOOKING METHOD AND SYSTEM - The invention relates to a method and system for booking reservations in a booking system and synchronizing bookings among several booking systems. The system comprises at least one booking system; at least one service provider; a mediator service; a client, and at least one client terminal device that can be a mobile device and that includes a dialogue. The client uses the dialogue to enter information into the system and the mediator receives inquiries and answers from the at least one booking system, the at least one service provider, and the at least one client. The mediator transfers and adapts information between them. The method and system are particularly suited for use with mobile phone users by Small Message Service messages. | 2015-10-29 |
20150312195 | System and Method for Displaying Message or User Lists - A system and method displays lists of users or messages in segments, with some segments showing messages or users believed to be more relevant to the user than others on the list. | 2015-10-29 |
20150312196 | METHOD AND SYSTEM FOR MESSAGING - The present invention relates to a messaging technique, and more specifically, relates to a method and system for messaging using information of predetermined message recipients. According to one aspect of the present invention, there is provided a method for messaging, comprising: obtaining message recipients designated by a to-be-sent message; obtaining predetermined message recipients corresponding to the to-be-sent message; and in response to inconsistency between the designated message recipients and the predetermined message recipients, unifying the designated message recipients and the predetermined message recipients. According to the method and system for messaging provided by the present invention, message recipients may be efficiently controlled and uniformed so as to avoid missing of recipients or to promptly update message recipient information. Further, the messaged content can be efficiently controlled and unified. | 2015-10-29 |
20150312197 | PREVENTION OF SENDING MESSAGES BY MISTAKE - Machine logic implemented techniques for preventing sending messages by mistake (with such “mistakes” including sending a message to an unintended recipient). One embodiment of the technique includes: detecting an intention of sending a message to a target user; responsive to detection of the intention, predicting a risk that the target user is not a desired recipient of the message; and providing a prompt responsive to the predicted risk being higher than a predetermined threshold. | 2015-10-29 |
20150312198 | MESSAGE DISTRIBUTION WARNING INDICATION - An apparatus and method for receiving and sending messages from a communication device is disclosed. Message recipient information is compared to stored information for potential recipients to determine whether a characteristic of the expression of the message on a device display should be changed such that the user perceives an unavoidable visual indication relating to the result of the comparison. | 2015-10-29 |
20150312199 | ORGANIZING SOCIAL NETWORK MESSAGES BASED ON TEMPORAL CHARACTERISTICS - A method for organizing messages may include detecting, by a processor, receipt of each new message of an activity stream comprising a group of messages and determining, by the processor, a tense associated with each new message. The method may also include associating, by the processor, the tense with each new message. At least the tense may be used for organizing the group of messages of the activity stream. The method may additionally include adding, by the processor, each new message and the associated tense of the message to the activity stream. | 2015-10-29 |
20150312200 | METHODS, SYSTEMS, AND DEVICES FOR OUTCOME PREDICTION OF TEXT SUBMISSION TO NETWORK BASED ON CORPORA ANALYSIS - Computationally implemented methods and systems include acquiring a message that is configured to be submitted to a network for publication, performing text-based analysis on the acquired message to determine an objective message prediction, wherein the text-based analysis is at least partially based on a corpus of one or more related texts, and transmitting the objective message prediction to a destination device, wherein the objective message prediction is configured to be presented on the destination device prior to submission of the acquired message to the network. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-10-29 |
20150312201 | ORGANIZING SOCIAL NETWORK MESSAGES BASED ON TEMPORAL CHARACTERISTICS - A method for organizing messages may include detecting, by a processor, receipt of each new message of an activity stream comprising a group of messages and determining, by the processor, a tense associated with each new message. The method may also include associating, by the processor, the tense with each new message. At least the tense may be used for organizing the group of messages of the activity stream. The method may additionally include adding, by the processor, each new message and the associated tense of the message to the activity stream. | 2015-10-29 |
20150312202 | Method of Managing Social Media Distractions over a Social Networking Application by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium - A method of managing social media distractions over a social networking application allows status descriptions to be automatically generated and displayed on a networking application based on automatic detection of media being engaged with on a device. Additionally, users are aided in managing distractions such as video chatting on social media while consuming media or experiencing leisure. Furthermore, a method of organizing text messages in a message stack is provided. | 2015-10-29 |
20150312203 | MOBILE STATUS UPDATE DISPLAY - A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. The messages may include user status messages, which are messages posted to the hub by the user, and the user status messages and subscription messages may be displayed on separate ones of the two screens. An apparatus for performing the method may include a processor coupled to a memory holding encoded instructions for performing operations of the method. | 2015-10-29 |
20150312204 | Tagging Posted Content in a Social Networking System with Media Information - A social networking system allows a user to insert media information into content posted by the user, where the media information identifies a media item that the user is consuming while composing the posted content. When a user of a social networking system composes content via a composer interface, the user may select an option on the composer interface to record audio using a microphone on the user's device. A media item is identified from the recorded audio and information about the identified media item is added to the user's posted content. The system may also update information about the identified media item and the composing user. | 2015-10-29 |
20150312205 | SYSTEM AND METHOD FOR IMPLEMENTING A SUBSCRIPTION-BASED SOCIAL MEDIA PLATFORM - Systems and methods for implementing a subscription-based social media or fan club platform are provided. A content creator generates live content on a mobile device and sends requests to a server for initializing a live stream from the mobile device. The server sends requests to encoding service providers. The encoded live content is send to a content storage server. Subscribers of the social media or fan club platform can access the live content on their mobile devices from the content storage server. | 2015-10-29 |
20150312206 | CONTROL APPARATUS, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM - A control apparatus includes: a first control information setting unit configured to set first control information for forwarding packets between predetermined machines in relay apparatuses on a predetermined path on the basis of a first hierarchical address; and a second control information setting unit configured to set, when receiving a packet whose destination address is a second hierarchical address, which is a higher level address than the first hierarchical address, from one of the machines in which the first control information has already been set, via one of the relay apparatuses, second control information for converting a first hierarchical destination address of the packet whose destination address is the second hierarchical address into a first hierarchical address specified in the first control information and forwarding the converted packet, in the relay apparatus. | 2015-10-29 |
20150312207 | Unifying Web and Phone Presence - The subject matter of this specification can be embodied in, among other things, a computer-implemented method that includes obtaining, at a computer system, a plurality of contact identifiers for a computer account holder, wherein the identifiers represent a plurality of different communication modes; identifying a handle for the account holder, wherein the handle is associated with a uniform resource locator; and correlating the handle with the plurality of contact identifiers, and storing the handle and plurality of contact identifiers together so as to permit retrieval of the contact identifiers in response to identification of the handle. | 2015-10-29 |
20150312208 | ADAPTIVE DYNAMIC HOST CONFIGURATION PROTOCOL ASSIGNMENT WITH VIRTUAL LOCAL AREA NETWORK POOL - The present disclosure discloses a method and network device for adaptive DHCP assignment with VLAN pool. Specifically, a network device can assign a client device to a first Virtual Local Area Network (VLAN). The network device then detects a first DHCP Discover message, transmitted by a client device, corresponding to a first VLAN. Also, the network device determines that no DHCP offer message, responsive to the first DHCP Discover message, is transmitted to the client device. Then, the network device transmits on behalf of the client device a second DHCP Discover message for the second VLAN to a DHCP server, and receives a DHCP Offer message in response to the second DHCP Discover message. The network device then assigns the client device to a second VLAN, and subsequently transmits the DHCP Offer message for the second VLAN to the client device. | 2015-10-29 |
20150312209 | SYSTEM AND METHOD FOR NETWORK ADDRESSING - An improved computer system for maintaining a network connection with a remote computer by providing persistent network addressing system, the improved computer system comprising: a local computer that includes: at least one processor; a local routable address; and a memory device that stores a persistent address application, the at least one processor being adapted by the persistent address application to: receive a first request, from a requesting application, to send a first outbound data to a remote computer, the remote computer including: at least one remote processor, a remote routable address, and a remote memory device; send the first outbound data to the remote computer based at least in part on the local and remote routable addresses; and present at least one of the following to the requesting application: a local persistent address as the local routable address, where the local persistent address is configured to remain the same while the local routable address changes; and a remote persistent address as the remote routable address, where the remote persistent address is configured to remain the same while the remote routable address changes; where the persistent address application utilizes network implementation details while allowing the requesting application to bypass network implementation details. A method for providing persistent network addressing comprising: receiving, at a local computer that includes: at least one processor; a local routable address; and a memory device that stores a persistent address application, a first request, from a requesting application, to send a first outbound data to a remote computer, the remote computer including: at least one remote processor; a remote routable address; and a remote memory device; sending, by way of the at least one processor being adapted by the persistent address application, the first outbound data to the remote computer based at least in part on the local and remote routable address; and presenting, by way of the at least one processor being adapted by the persistent address application, at least one of the following to the requesting application: a local persistent address as the local routable address, where the local persistent address is configured to remain the same while the local routable address changes; a remote persistent address as the remote routable address, where the remote persistent address is configured to remain the same while the remote routable address changes; and where the persistent address application utilizes network implementation details while allowing the requesting application to bypass network implementation details. | 2015-10-29 |
20150312210 | HOST-SLAVE CONTROL SYSTEM AND ADDRESSING METHOD THEREOF - A host-slave control system and an addressing method thereof are provided. The host-slave control system includes a plurality of slave devices, a host device, and a remote control device. The host device is coupled to and controls the slave devices through a host-slave transmission interface. When one of the slave devices receives an addressing signal sent by the remote control device, the one of the slave devices sends an addressing information to the host device, such that the host device assigns a specific address as the address of the one of the slave devices according to the addressing information. In particular, the addressing information includes a default identification code of the one of the slave devices, and the address assigned to the one of the slave devices corresponds to the default identification code of the one of the slave devices. | 2015-10-29 |
20150312211 | METHOD AND SYSTEM FOR GENERATING DURABLE HOST IDENTIFIERS USING NETWORK ARTIFACTS - A host identification engine receives network traffic from a network and uses one or more artifact extractors to extract artifact data items that can identify a host. The artifact data items can be stored in a host signature database. Network addresses to which the hosts correspond can be stored in a network address database. A mapping table can be implemented to match the data in the signature database and network database to generate durable host identification data that can accurately track hosts as they use different identification data and/or move between hosts. | 2015-10-29 |
20150312212 | HOLISTIC EMBODIMENT OF DNA AND IPV6 - A method and apparatus for utilizing the specific genetic code of an organism, as defined by the organism's DNA, to define the unique and specific IPv6 address of the organism is provided. The IPv6 address may be within existing digital network infrastructures and may be decoded to define the organism's DNA sequence, which uniquely and accurately defines the organism's digital presence within the network. The described method and apparatus utilizes an algorithm or conversion formula to convert any DNA sequence into a digital IP address via an Alpha-binary-hexagonal converter. The same method may also define an organism's DNA by virtue of converting the IPv6 address into a DNA sequence, thereby allowing for DNA to be generated from an IPv6 address. | 2015-10-29 |
20150312213 | Method of Providing a Naming Service Inside an Industrial Communication System, and a Router - Router advertisements containing name information from superordinate subnetworks are received by routers associated with subordinate subnetworks. The router advertisements are supplemented with a topological and/or hierarchical name component associated with the respective router and are distributed inside the respective subordinate subnetwork. Communication terminals independently generate their device name from topological and/or hierarchical name components and a unique name component inside their respective subnetwork. | 2015-10-29 |
20150312214 | SECURING EMAIL COMMUNICATIONS - Methods and systems are provided for securing email communications. According to one embodiment, a network device receives an outbound email originated by a computing device of an internal network and directed to a target recipient. It is determined whether a domain name of the target recipient is present in a global doppelganger database. When the domain name is determined to be present in the global doppelganger database, transmission of the outbound email to the target recipient is prevented if the domain name is an unacceptable domain name and transmission of the the outbound email to the target recipient is permitted if the domain name is an acceptable domain name. | 2015-10-29 |
20150312215 | GENERATING OPTIMAL PATHWAYS IN SOFTWARE-DEFINED NETWORKING (SDN) - A method for optimizing delivery of digital information packets across a network of linked, packet switching nodes is disclosed. A suitably programmed computer translates business oriented requests into network technical requirements. The computer then uses knowledge including pre-stored or real-time discovered topographical maps of the network, and a database of the current attributes of the components of the network, to automatically determine settings for software addressable forwarding devices on the network to implement the network technical requirements. This may take the form of a security setting that may be delivered to a network security appliance such as a firewall. Each firewall may then configure all or part of the network via the software addressable switches at nodes under its control. | 2015-10-29 |
20150312216 | LEGACY DEVICE SECURITIZATION WITHIN A MICROGRID SYSTEM - Devices, methods, systems, and computer-readable media for legacy device securitization within a microgrid system are described herein. One or more embodiments include a system having a microgrid network with at least one remote network connection to a non-local network device and the network having at least one local legacy device in communication with the non-local network device and a bump-in-the-wire (BITW) security device between the local legacy device and the at least one remote connection. | 2015-10-29 |
20150312217 | CLIENT-SIDE ENCRYPTION OF FORM DATA - Disclosed are various embodiments that facilitate client-side encryption of form data. A network page is sent to a client. The network page includes executable encryption code configured to encrypt a form data item. The client is configured to receive the form data item via a form field of the network page. In response to receiving the form data item from the client, it is determined whether the form data item that has been received has been encrypted in the client by the executable encryption code. The form data item is then encrypted when the form data item that has been received has not been encrypted in the client by the executable encryption code. However, the form data item is not encrypted when the form data item that has been received has been encrypted in the client by the executable encryption code. | 2015-10-29 |
20150312218 | TRAVERSING FIREWALLS - A remote administrator device is provided outside a firewall that prevents remote devices from accessing, but allows remote devices to send electronic mail messages to a plurality of local network devices. The remote administrator device can send an electronic mail message to a respective one of the plurality of local network devices behind the firewall. The electronic mail message can include instructions for the respective local network device to establish a connection with the remote administrator device through the firewall. Once the connection is established, the remote administrator device can monitor state data received over the connection for the respective local network device. | 2015-10-29 |
20150312219 | Asset Management Via Virtual Tunnels - An asset management system is presented. The management system includes monitoring devices able to provide asset data across firewalls without requiring reconfiguration of the firewalls. The asset data pass through a forwarding service that instantiates a virtual tunnel comprising a communication channel between the monitoring devices and remote asset management engines. The asset management engines can also be located behind firewalls. As the management engines aggregate asset data, the engines can present one or more alerts via a management interface. | 2015-10-29 |
20150312220 | POLICY-BASED CONTENT FILTERING - Methods and systems for processing application-level content of network service protocols are described. According to one embodiment, a network connection is received at a networking subsystem of a firewall. The connection is characterized by a source IP address, a destination IP address and a network service protocol. The network service protocol of the network connection is determined. A matching firewall policy is identified for the connection. When the connection is allowed, it is redirected to a proxy module that is configured to support the network service protocol. A content processing configuration scheme identified by the matching firewall policy is retrieved that includes multiple content processing configuration settings, specifying whether a particular type of content filtering is to be performed, for each of multiple network service protocols. Application-level content of a packet stream associated with the network connection is reconstructed and filtered based on the applicable content processing configuration settings. | 2015-10-29 |
20150312221 | SECURE DATA EXCHANGE TECHNIQUE - Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common without having access to any other data of any other parties. | 2015-10-29 |
20150312222 | DIGITAL ENCRYPTION SHREDDER AND DOCUMENT CUBE REBUILDER - A method of storing a document includes converting the document into a table of symbols and shredding the table into a plurality of randomly selected strips of symbols. The method further includes randomly selecting a plurality of storage locations and storing the strips of data in the plurality of locations. The method generates a key including pointers to the plurality of locations and encrypts the key. | 2015-10-29 |
20150312223 | REALIZING AUTHORIZATION VIA INCORRECT FUNCTIONAL BEHAVIOR OF A WHITE-BOX IMPLEMENTATION - A method of authorization in a cryptographic system that provides separate authorization for a plurality of different input message groups using a single cryptographic key, including: receiving, by the cryptographic system, a first input message from a first input message group; performing, by the cryptographic system, a keyed cryptographic operation mapping the first input message into a first output message, wherein the keyed cryptographic operation produces a correct output message when the cryptographic system is authorized for the first input message group, wherein the keyed cryptographic operation does not produce a correct output when the cryptographic system is not authorized for the first input message group, and wherein each of the plurality of input message groups has an associated set of input messages wherein the sets of input messages do not overlap. | 2015-10-29 |
20150312224 | IMPLEMENTING USE-DEPENDENT SECURITY SETTINGS IN A SINGLE WHITE-BOX IMPLEMENTATION - A method of enforcing security settings in a cryptographic system, including: receiving, by the cryptographic system, a first input message associated with a first security setting of a plurality of security settings; performing, by the cryptographic system, a keyed cryptographic operation mapping the first input message into a first output message, wherein the keyed cryptographic operation produces a correct output message when the cryptographic system is authorized for the first security setting, wherein each of the plurality of security settings has an associated set of input messages wherein the sets of input messages do not overlap. | 2015-10-29 |
20150312225 | SECURITY PATCH WITHOUT CHANGING THE KEY - A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to the cryptographic implementation, wherein the first message uses a first portion of the cryptographic implementation; deciding to patch the cryptographic implementation; sending a second message from a second message set to the cryptographic implementation after deciding to patch the cryptographic implementation, wherein the second message use a second portion of the cryptographic implementation that is not used for any messages in the first message set. | 2015-10-29 |
20150312226 | METHOD FOR INCLUDING AN IMPLICIT INTEGRITY OR AUTHENTICITY CHECK INTO A WHITE-BOX IMPLEMENTATION - A method of performing a cryptographic operation using a cryptographic implementation in a cryptographic system, including: receiving, by the cryptographic system, an identifying string value; receiving, by the cryptographic system, an input message; performing, by the cryptographic system, a keyed cryptographic operation mapping the input message into an output message wherein the output message is the correct result when the indentifying string value equals a binding string value | 2015-10-29 |
20150312227 | PRIVACY PRESERVING ELECTRONIC DOCUMENT SIGNATURE SERVICE - An electronic document signature system preserves the security of an electronic document while tracking a signature process corresponding to the electronic document. In particular, using a client application on a client device, an originating user can protect an electronic document and send the protected electronic document to a tracking server. The tracking server receives only a protected document such that the security the electronic document is preserved. Using a client applications on client devices, one or more participating users can subsequently receive the protected document from the tracking server, access the contents of the electronic document, and sign the electronic document. The tracking server can record events that occur with respect to the protected document to create an event log. | 2015-10-29 |
20150312228 | REMOTE STATION FOR DERIVING A DERIVATIVE KEY IN A SYSTEM-ON-A-CHIP DEVICE - An integrated circuit may comprise a processor configured to: receive a delegate certificate, wherein the delegate certificate includes a first public key; validate a digital signature of the delegate certificate using a second public key; and generate a derivative key using a secret key securely stored in the integrated circuit and using the first public key as inputs to a key derivation function. | 2015-10-29 |
20150312229 | STREAMING SYSTEM AND METHOD - A streaming system includes an authoring unit, a stream server and a client terminal. The authoring unit generates a file composed of encrypted contents data and the ancillary information at least containing the packetizing control information for generating an RTP packet, a non-encrypted codec dependent header made up of the information pertinent to encoded contents data, and the encryption information for decrypting the encrypted contents data form packet to packet. The streaming server packetizes the encrypted contents data along with at least the codec dependent header and distributes the resulting data as a stream. The client terminal refers to the codec dependent header of the received packet, re-assembles the packet, and decrypts the encrypted contents data of the re-assembled packet to generate contents data. | 2015-10-29 |
20150312230 | APPARATUS AND METHOD FOR TRANSFERRING NETWORK ACCESS INFORMATION OF SMART HOUSEHOLD APPLIANCES - An apparatus and method for transferring network access information of smart household appliances are provided. The apparatus includes a detection unit for detecting whether a public IP address of an external interface of an indoor IP sharer has changed. An extraction unit is configured to, if the public IP address of the external interface has changed, extract network access information of a smart household appliance connected to an internal interface of the indoor IP sharer, the network access information being updated together with change in the public IP address. An encryption and generation unit encrypts the network access information using a pre-stored encryption key, and generates data to be transmitted to a smart grid service provider server using the encrypted information and an ID of a customer user. A transmission unit transmits the data generated by the encryption and generation unit to the smart grid service provider server. | 2015-10-29 |